Network security design has seen significant advances in recent years. This has been demonstrated by a growing number of new encryption algorithms, more intelligent firewall and intrusion detection techniques, new dev...
详细信息
Minimizing the sensing activity during the pre-attack phase while meeting the performance requirements is critical for reducing the operational costs of chemical sensor networks. In this paper, we present a formal pro...
详细信息
Chemical sensor networks are used to detect the presence of hazardous chemicals released intentionally or accidentally into the atmosphere. Although many performance attributes of chemical sensor networks, such as ene...
详细信息
Recent technological advancements in the field of nanotechnology have increased the computation power of the wireless nodes while adhering to the energy constraints. This has made the use of the Wireless Sensor Networ...
详细信息
Modern software-defined radios are large, expensive, and power-hungry devices and this, we argue, hampers their more widespread deployment and use, particularly in low-power, size-constrained application settings like...
详细信息
Due to the significant amount of energy consumed by chemical sensors for sensing, reducing sensing activity is critical for improving the lifespan of chemical sensor networks. In this paper, we consider a simple decen...
详细信息
This paper presents an eResearch tool for evaluating and comparing Chemical, Biological, Radiological and Nuclear (CBRN) source-backtracking algorithms. The tool enables users to define a CBRN threat scenario to be si...
详细信息
ISBN:
(纸本)9780769542904
This paper presents an eResearch tool for evaluating and comparing Chemical, Biological, Radiological and Nuclear (CBRN) source-backtracking algorithms. The tool enables users to define a CBRN threat scenario to be simulated, which includes the geographical area of concern specified through a map, the simulated threat sources and their placement, and the configuration of sensors. Users can define multiple searchers who act as clients that interact with a central server and search for the simulated radiological source or sources. Based on the simulated measurements received from the searchers, and a chosen source backtracking algorithm, the central server updates the source estimates and issues control vectors to guide each searcher.
The alerts produced by network-based intrusion detection systems, e.g. Snort, can be difficult for network administrators to efficiently review and respond to due to the enormous number of alerts generated in a short ...
详细信息
This paper deals with the iterative learning control (ILC) design for multiple-input multiple-output (MIMO),time-delay systems (TDS).Two feedback ILC schemes are considered using the so-called two-dimensional ...
详细信息
This paper deals with the iterative learning control (ILC) design for multiple-input multiple-output (MIMO),time-delay systems (TDS).Two feedback ILC schemes are considered using the so-called two-dimensional (2D) analysis *** shows that continuous-discrete 2D Roesser systems can be developed to describe the entire learning dynamics of both ILC schemes,based on which necessary and sufficient conditions for their stability can be provided.A numerical example is included to validate the theoretical analysis.
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages....
详细信息
ISBN:
(纸本)9789898425249
Security is essential in wireless sensor networks as they are being used in urban environments, life saving disaster management and rescue operations. Any serious attack at the routing layer can cause serious damages. Although a lot of security measures have been proposed for application and transport layer, we have found that there is not enough research geared towards securing the network at the routing layer. In this paper, we propose a novel solution for securing against external as well as internal attacks. The protocol maintains a working network by using redundant multiple paths despite attacks at one route. It also identifies and removes the malicious nodes from the system. Since the system is totally distributed and does not require a central server as required in some of the other protocols, there is no single point of failure. We also keep in mind the limited computing resources and network bandwidth of the wireless sensor nodes. Finally the paper quantifies the protocol's effectiveness against some of the existing secure routing protocols namely QDV and SNEP using simulation studies.
暂无评论