Minimizing the sensing activity during the pre-attack phase while meeting the performance requirements is critical for reducing the operational costs of chemical sensor networks. In this paper, we present a formal pro...
详细信息
The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short ...
详细信息
Chemical sensor networks are used to detect the presence of hazardous chemicals released intentionally or accidentally into the atmosphere. Although many performance attributes of chemical sensor networks, such as ene...
详细信息
This paper deals with the iterative learning control (ILC) design for multiple-input multiple-output (MIMO),time-delay systems (TDS).Two feedback ILC schemes are considered using the so-called two-dimensional ...
详细信息
This paper deals with the iterative learning control (ILC) design for multiple-input multiple-output (MIMO),time-delay systems (TDS).Two feedback ILC schemes are considered using the so-called two-dimensional (2D) analysis *** shows that continuous-discrete 2D Roesser systems can be developed to describe the entire learning dynamics of both ILC schemes,based on which necessary and sufficient conditions for their stability can be provided.A numerical example is included to validate the theoretical analysis.
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages....
详细信息
ISBN:
(纸本)9789898425249
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages. Although a lot of security measures have been proposed for application and transport layer, we have found that there is not enough research geared towards securing the network at the routing layer. In this paper, we propose a novel solution for securing against external as well as internal attacks. The protocol maintains a working network by using redundant multiple paths despite attacks at one route. It also identifies and removes the malicious nodes from the system. Since the system is totally distributed and does not require a central server as required in some of the other protocols, there is no single point of failure. We also keep in mind the limited computing resources and network bandwidth of the wireless sensor nodes. Finally the paper quantifies the protocol's effectiveness against some of the existing secure routing protocols namely QDV and SNEP using simulation studies.
Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decen...
详细信息
This paper presents an eResearch tool for evaluating and comparing Chemical, Biological, Radiological and Nuclear (CBRN) source-backtracking algorithms. The tool enables users to define a CBRN threat scenario to be si...
详细信息
ISBN:
(纸本)9780769542904
This paper presents an eResearch tool for evaluating and comparing Chemical, Biological, Radiological and Nuclear (CBRN) source-backtracking algorithms. The tool enables users to define a CBRN threat scenario to be simulated, which includes the geographical area of concern specified through a map, the simulated threat sources and their placement, and the configuration of sensors. Users can define multiple searchers who act as clients that interact with a central server and search for the simulated radiological source or sources. Based on the simulated measurements received from the searchers, and a chosen source backtracking algorithm, the central server updates the source estimates and issues control vectors to guide each searcher.
Component-based software development (CBSD) has been got considerable adoption in software industry, but it is still lack of language support to ensure proper interactions among components, i.e. modularity assurance, ...
详细信息
ISBN:
(纸本)9781424455690
Component-based software development (CBSD) has been got considerable adoption in software industry, but it is still lack of language support to ensure proper interactions among components, i.e. modularity assurance, which usually causes the software hard to maintain and evolve because of the improper dependencies among the components. In this paper, we propose an AOP approach to ensure that the interactions among components are strictly conformed to the sated API usage policies of the components. Also, by using AOP, we can separate the constraints violation checking code from the normal functional code via the so called aspects, thus improving the software quality by separation of concern. Experiment using AspectJ as the AOP implementation technique shows that the performance is comparable to the non embedded code.
Although component-based software development, model-driven development, software product line engineering, and similar things considerably improve software productivity and software quality, modern web based enterpri...
详细信息
Although component-based software development, model-driven development, software product line engineering, and similar things considerably improve software productivity and software quality, modern web based enterprise application development is still facing great challenges. This paper addresses how to deal with the complexity of enterprise application development via platform engineering (PE). We also propose the lessons learned in PE, challenges we are still facing, and some open issues we need to discuss.
This paper proposes a Friend-based security scheme for efficient routing in mobile ad hoc networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in...
详细信息
ISBN:
(纸本)9781617387036
This paper proposes a Friend-based security scheme for efficient routing in mobile ad hoc networks. The idea behind this technique is the establishment of friend networks in the same way as the formation of friends in real life scenarios. The algorithm provides authentication of nodes by sending challenges and creating friend lists of nodes that complete the challenge. Friends are rated on the basis of the amount of data they transfer through themselves and according to the rating of other friends, which is obtained during the friend list sharing process. The data is finally routed through the route with the greatest number of trusted friends. One of the greatest advantages of this technique is that the nodes do not need to work in the promiscuous mode. The information about the malicious nodes is gathered effectively by using challenges. This reduces the overhead on the network significantly. Through various simulation experiments it has been found that the proposed algorithm works very efficiently in terms of detecting the malicious nodes and also allowing lesser number of packets to be routed through these detected malicious nodes.
暂无评论