100 research outputs found

    Cyber security investigation for Raspberry Pi devices

    Get PDF
    Big Data on Cloud application is growing rapidly. When the cloud is attacked, the investigation relies on digital forensics evidence. This paper proposed the data collection via Raspberry Pi devices, in a healthcare situation. The significance of this work is that could be expanded into a digital device array that takes big data security issues into account. There are many potential impacts in health area. The field of Digital Forensics Science has been tagged as a reactive science by some who believe research and study in the field often arise as a result of the need to respond to event which brought about the needs for investigation; this work was carried as a proactive research that will add knowledge to the field of Digital Forensic Science. The Raspberry Pi is a cost-effective, pocket sized computer that has gained global recognition since its development in 2008; with the wide spread usage of the device for different computing purposes. Raspberry Pi can potentially be a cyber security device, which can relate with forensics investigation in the near future. This work has used a systematic approach to study the structure and operation of the device and has established security issues that the widespread usage of the device can pose, such as health or smart city. Furthermore, its evidential information applied in security will be useful in the event that the device becomes a subject of digital forensic investigation in the foreseeable future. In healthcare system, PII (personal identifiable information) is a very important issue. When Raspberry Pi plays a processor role, its security is vital; consequently, digital forensics investigation on the Raspberry Pies becomes necessary

    A hybrid queueing model for fast broadband networking simulation

    Get PDF
    PhDThis research focuses on the investigation of a fast simulation method for broadband telecommunication networks, such as ATM networks and IP networks. As a result of this research, a hybrid simulation model is proposed, which combines the analytical modelling and event-driven simulation modelling to speeding up the overall simulation. The division between foreground and background traffic and the way of dealing with these different types of traffic to achieve improvement in simulation time is the major contribution reported in this thesis. Background traffic is present to ensure that proper buffering behaviour is included during the course of the simulation experiments, but only the foreground traffic of interest is simulated, unlike traditional simulation techniques. Foreground and background traffic are dealt with in a different way. To avoid the need for extra events on the event list, and the processing overhead, associated with the background traffic, the novel technique investigated in this research is to remove the background traffic completely, adjusting the service time of the queues for the background traffic to compensate (in most cases, the service time for the foreground traffic will increase). By removing the background traffic from the event-driven simulator the number of cell processing events dealt with is reduced drastically. Validation of this approach shows that, overall, the method works well, but the simulation using this method does have some differences compared with experimental results on a testbed. The reason for this is mainly because of the assumptions behind the analytical model that make the modelling tractable. Hence, the analytical model needs to be adjusted. This is done by having a neural network trained to learn the relationship between the input traffic parameters and the output difference between the proposed model and the testbed. Following this training, simulations can be run using the output of the neural network to adjust the analytical model for those particular traffic conditions. The approach is applied to cell scale and burst scale queueing to simulate an ATM switch, and it is also used to simulate an IP router. In all the applications, the method ensures a fast simulation as well as an accurate result

    Cognitive radio-enabled Internet of Vehicles (IoVs): a cooperative spectrum sensing and allocation for vehicular communication

    Get PDF
    Internet of Things (IoTs) era is expected to empower all aspects of Intelligent Transportation System (ITS) to improve transport safety and reduce road accidents. US Federal Communication Commission (FCC) officially allocated 75MHz spectrum in the 5.9GHz band to support vehicular communication which many studies have found insufficient. In this paper, we studied the application of Cognitive Radio (CR) technology to IoVs in order to increase the spectrum resource opportunities available for vehicular communication, especially when the officially allocated 75MHz spectrum in 5.9GHz band is not enough due to high demands as a result of increasing number of connected vehicles as already foreseen in the near era of IoTs. We proposed a novel CR Assisted Vehicular NETwork (CRAVNET) framework which empowers CR enabled vehicles to make opportunistic usage of licensed spectrum bands on the highways. We also developed a novel co-operative three-state spectrum sensing and allocation model which makes CR vehicular secondary units (SUs) aware of additional spectrum resources opportunities on their current and future positions and applies optimal sensing node allocation algorithm to guarantee timely acquisition of the available channels within a limited sensing time. The results of the theoretical analyses and simulation experiments have demonstrated that the proposed model can significantly improve the performance of a cooperative spectrum sensing and provide vehicles with additional spectrum opportunities without harmful interference against the Primary Users (PUs) activities

    Timely and reliable packets delivery over Internet of Vehicles (IoVs) for road accidents prevention: a cross-layer approach

    Get PDF
    With the envisioned era of Internet of Things (IoTs), all aspects of Intelligent Transportation Systems (ITS) will be connected to improve transport safety, relieve traffic congestion, reduce air pollution, enhance the comfort of transportation and significantly reduce road accidents. In IoVs, regular exchange of current position, direction, velocity, etc., enables mobile vehicles to predict an upcoming accident and alert the human drivers in time or proactively take precautionary actions to avoid the accident. The actualization of this concept requires the use of channel access protocols that can guarantee reliable and timely broadcast of safety messages. This paper investigates the application of network coding concept to increase content of every transmission and achieve improved broadcast reliability with less number of retransmission. In particular, we proposed Code Aided Retransmission-based Error Recovery (CARER) scheme, introduced an RTB/CTB handshake to overcome hidden node problem and reduce packets collision rate. In order to avoid broadcast storm problem associated with the use of RTB/CTB packet in a broadcast transmission, we developed a rebroadcasting metric used to successfully select a vehicle to rebroadcast the encoded message. The performance of CARER protocol is clearly shown with detailed theoretical analysis and further validated with simulation experiments

    Spatial-Temporal Convolutional Attention for Mapping Functional Brain Networks

    Full text link
    Using functional magnetic resonance imaging (fMRI) and deep learning to explore functional brain networks (FBNs) has attracted many researchers. However, most of these studies are still based on the temporal correlation between the sources and voxel signals, and lack of researches on the dynamics of brain function. Due to the widespread local correlations in the volumes, FBNs can be generated directly in the spatial domain in a self-supervised manner by using spatial-wise attention (SA), and the resulting FBNs has a higher spatial similarity with templates compared to the classical method. Therefore, we proposed a novel Spatial-Temporal Convolutional Attention (STCA) model to discover the dynamic FBNs by using the sliding windows. To validate the performance of the proposed method, we evaluate the approach on HCP-rest dataset. The results indicate that STCA can be used to discover FBNs in a dynamic way which provide a novel approach to better understand human brain.Comment: 5 pages, 5 figures, submitted to 20th IEEE International Symposium on Biomedical Imaging (ISBI 2023

    Performance analysis of a generalized and autonomous DRX scheme

    Get PDF
    A generalized and autonomous DRX (discontinuous reception) scheme, applicable to both 3GPP and IEEE 802.16e standards, is analyzed by two - level Markov chain modeling along with the ETSI packet traffic model. Numerical analysis showed that this scheme is capable of autonomously adjusting DRX cycle to keep up with changing UE activity level with no signaling overhead increase, thus produces a better tuned DRX operation. Quantitative comparison with the power saving schemes of 3GPP and 802.16e standards demonstrated that it is advantageous over and generalization of these power saving schemes

    Power Characteristics of Wireless Charging for Sensor Networks in Tunnels

    Get PDF
    In order to generate wireless microwave power charging technology in coal mine tunnels, it is necessary to know the power characteristics of wireless electromagnetic wave along the tunnel walls. In this paper, the experimental results of narrowband wireless electromagnetic wave propagation measurements are presented, and a statistical model of the power characteristics at 2.4 GHz in real rectangular mine tunnels is proposed. Two standard half-wave dipole antennas were used to perform the field experiments in tunnels with different wall materials. A 10-meter wireless charging distance belongs to the free-space propagation zone. The path loss exponents rely heavily on the location of the receiver and antenna polarizations. To obtain more power, the locations of the receiver should match the corresponding polarizations

    Physical detection of misbehavior in relay systems with unreliable channel state information

    Get PDF
    We study the detection 1 of misbehavior in a Gaussian relay system, where the source transmits information to the destination with the assistance of an amplify-and-forward relay node subject to unreliable channel state information (CSI). The relay node may be potentially malicious and corrupt the network by forwarding garbled information. In this situation, misleading feedback may take place, since reliable CSI is unavailable at the source and/or the destination. By classifying the action of the relay as detectable or undetectable, we propose a novel approach that is capable of coping with any malicious attack detected and continuing to work effectively in the presence of unreliable CSI. We demonstrate that the detectable class of attacks can be successfully detected with a high probability. Meanwhile, the undetectable class of attacks does not affect the performance improvements that are achievable by cooperative diversity, even though such an attack may fool the proposed detection approach. We also extend the method to deal with the case in which there is no direct link between the source and the destination. The effectiveness of the proposed approach has been validated by numerical results
    • 

    corecore