10 research outputs found

    Quarantine region scheme to mitigate spam attacks in wireless sensor networks

    Get PDF
    The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a tradeoff between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processe

    A spatial data sructure and a graphical interface for fire management systems

    No full text

    Modeling and simulation support to the defense planning process

    No full text
    Defense planning is a crucial part of the defense process. It identifies the capabilities required for the future defense environment, analyzes the capability shortfalls, prioritizes them, and provides the fundamental inputs for their development. Modeling and simulation may significantly contribute to the success of defense planning. However, neither the theory nor the tools are mature enough to fulfill the defense planning requirements. Various types of simulation tools, such as static, dynamic, deterministic, stochastic, closed, discrete, continuous, and symbiotic, in multiple levels of resolution and fidelity are needed to support the different stages and phases. The verification and validation of the models and the analysis of the input and output data are critical. Yet another challenge is that the uncertainties related to the contemporary defense scenarios are mostly not in aleatory but in the epistemic domain. In this paper, we briefly present a new computer-assisted defense planning process. Then, we introduce the service-oriented cloud approach for the modeling and simulation support to the process.Publisher's Versio

    Grafik ve simge tabanlı bilgisayar kullanıcı arabirimi

    No full text
    Kalem tabanlı ve duyarlıklı ekran özelliğine sahip taşınabilir bilgisayar ortamlarında etkin, kullanıcı ile program arasındaki iletişimi grafik bir yapıda gerçekleştirmeye yönelik, genellikle 2-boyutlu tüm uygulamalarda, öncellikle ise harita ve benzeri kavramların programatik bir yapıda girilmesi ve kullanılması amaçlarına yönelik bir biçimde gerçekleştirilen yazılım ve algoritmalar tanıtılmaktadır

    Querying sensor networks by using dynamic task sets

    No full text
    A data querying scheme is introduced for sensor networks where queries formed for each sensing task are sent to task sets. The sensor field is partitioned into subregions by using quadtree based addressing, and then a given number of sensors from each subregion are assigned to each task set by using a distributed algorithm. The number of nodes in a task set depends on the task specifications. Hence, the sensed data is retrieved from a sensor network in the level of detail specified by users, and a tradeoff mechanism between data resolution and query cost is provided. Experiments show that the dynamic task sets scheme systematically reduces the number of sensors involved in a query in the orders of magnitude in the expense of slight reduction in the event detection rate.Publisher's Versio

    Sensor wars: detecting and defending against spam attacks in tactical AdHoc sensor networks

    No full text
    Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network

    A model to describe hybrid conflict environments

    No full text
    This article focuses on the definition, implementation and testing of a model to describe Hybrid Conflict Environments. Without the need of citing specific cases or countries, it is clear that hybrid strategy and warfare are becoming more important. A hybrid strategy can affect policy makers, military operations, economics and financial trends, intelligence and legal activities as well as information and media. A conceptual model is introduced to define and to gain further insight into hybrid environments. The model is then implemented and tested by running experiments to provide evidence on its relevance. Finally, results are presented and discussed.Publisher's Versio
    corecore