10 research outputs found
Quarantine region scheme to mitigate spam attacks in wireless sensor networks
The Quarantine Region Scheme (QRS) is introduced to defend against spam attacks in wireless sensor networks where malicious antinodes frequently generate dummy spam messages to be relayed toward the sink. The aim of the attacker is the exhaustion of the sensor node batteries and the extra delay caused by processing the spam messages. Network-wide message authentication may solve this problem with a cost of cryptographic operations to be performed over all messages. QRS is designed to reduce this cost by applying authentication only whenever and wherever necessary. In QRS, the nodes that detect a nearby spam attack assume themselves to be in a quarantine region. This detection is performed by intermittent authentication checks. Once quarantined, a node continuously applies authentication measures until the spam attack ceases. In the QRS scheme, there is a tradeoff between the resilience against spam attacks and the number of authentications. Our experiments show that, in the worst-case scenario that we considered, a not quarantined node catches 80 percent of the spam messages by authenticating only 50 percent of all messages that it processe
Modeling and simulation support to the defense planning process
Defense planning is a crucial part of the defense process. It identifies the capabilities required for the future defense environment, analyzes the capability shortfalls, prioritizes them, and provides the fundamental inputs for their development. Modeling and simulation may significantly contribute to the success of defense planning. However, neither the theory nor the tools are mature enough to fulfill the defense planning requirements. Various types of simulation tools, such as static, dynamic, deterministic, stochastic, closed, discrete, continuous, and symbiotic, in multiple levels of resolution and fidelity are needed to support the different stages and phases. The verification and validation of the models and the analysis of the input and output data are critical. Yet another challenge is that the uncertainties related to the contemporary defense scenarios are mostly not in aleatory but in the epistemic domain. In this paper, we briefly present a new computer-assisted defense planning process. Then, we introduce the service-oriented cloud approach for the modeling and simulation support to the process.Publisher's Versio
Grafik ve simge tabanlı bilgisayar kullanıcı arabirimi
Kalem tabanlı ve duyarlıklı ekran özelliğine sahip taşınabilir bilgisayar ortamlarında etkin, kullanıcı ile program arasındaki iletişimi grafik bir yapıda gerçekleştirmeye yönelik, genellikle 2-boyutlu tüm uygulamalarda, öncellikle ise harita ve benzeri kavramların programatik bir yapıda girilmesi ve kullanılması amaçlarına yönelik bir biçimde gerçekleştirilen yazılım ve algoritmalar tanıtılmaktadır
Querying sensor networks by using dynamic task sets
A data querying scheme is introduced for sensor networks where queries formed for each sensing task are sent to task sets. The sensor field is partitioned into subregions by using quadtree based addressing, and then a given number of sensors from each subregion are assigned to each task set by using a distributed algorithm. The number of nodes in a task set depends on the task specifications. Hence, the sensed data is retrieved from a sensor network in the level of detail specified by users, and a tradeoff mechanism between data resolution and query cost is provided. Experiments show that the dynamic task sets scheme systematically reduces the number of sensors involved in a query in the orders of magnitude in the expense of slight reduction in the event detection rate.Publisher's Versio
Sensor wars: detecting and defending against spam attacks in tactical AdHoc sensor networks
Anti-nodes deployed inside a wireless sensor network can frequently generate dummy data packets that make the nodes relaying them deplete their energy. Especially the nodes closer to the sink fail sooner, because they convey more data packets. This causes the sink to be disconnected from the sensor network. The counter-measures for this type of attacks, namely spam attacks, should consider that the sensor nodes have limited energy, computational power and memory. In this paper, we propose detect and defend against spams (DADS) scheme. In DADS the vicinity of the detected malicious node is notified about
the quarantine region, and nodes do not relay unauthenticated messages coming from a node in the quarantine region. Our experiments show that our scheme fits the requirements of the sensor network
A model to describe hybrid conflict environments
This article focuses on the definition, implementation and testing of a model to describe Hybrid Conflict Environments. Without the need of citing specific cases or countries, it is clear that hybrid strategy and warfare are becoming more important. A hybrid strategy can affect policy makers, military operations, economics and financial trends, intelligence and legal activities as well as information and media. A conceptual model is introduced to define and to gain further insight into hybrid environments. The model is then implemented and tested by running experiments to provide evidence on its relevance. Finally, results are presented and discussed.Publisher's Versio