Search results for "Networking & Telecommunications"
showing 10 items of 962 documents
A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks
2018
International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…
A distributed real-time data prediction and adaptive sensing approach for wireless sensor networks
2018
International audience; Many approaches have been proposed in the literature to reduce energy consumption in Wireless Sensor Networks (WSNs). Influenced by the fact that radio communication and sensing are considered to be the most energy consuming activities in such networks. Most of these approaches focused on either reducing the number of collected data using adaptive sampling techniques or on reducing the number of data transmitted over the network using prediction models. In this article, we propose a novel prediction-based data reduction method. furthermore, we combine it with an adaptive sampling rate technique, allowing us to significantly decrease energy consumption and extend the …
Health-Promoting Effects of Serial vs. Integrated Combined Strength and Aerobic Training
2016
Combined strength and aerobic training programs are widely used for improving markers of physical fitness and health. We compared the efficiency of a serial and an integrated combined training program on health and overall fitness in middle-aged females. 54 females (46.7±4.5yrs) were assigned to a serial (SCG) or an integrated (ICG) combined training group or to a control group (CG). The SCG and ICG performed a 3-month training combining aerobic dance and calisthenics. The 2 training programs differ in the sequence of aerobic and strength exercises. SCG performed the strength exercises prior to aerobic; in ICG, the aerobic and strength exercises were altered in a predetermined order. Body c…
A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory
2018
Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…
State of the Art Literature Review on Network Anomaly Detection with Deep Learning
2018
As network attacks are evolving along with extreme growth in the amount of data that is present in networks, there is a significant need for faster and more effective anomaly detection methods. Even though current systems perform well when identifying known attacks, previously unknown attacks are still difficult to identify under occurrence. To emphasize, attacks that might have more than one ongoing attack vectors in one network at the same time, or also known as APT (Advanced Persistent Threat) attack, may be hardly notable since it masquerades itself as legitimate traffic. Furthermore, with the help of hiding functionality, this type of attack can even hide in a network for years. Additi…
A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization
2017
Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…
Symmetric and asymmetric cryptographic key exchange protocols in the octonion algebra
2019
AbstractWe propose three cryptographic key exchange protocols in the octonion algebra. Using the totient function, defined for integral octonions, we generalize the RSA public-key cryptosystem to the octonion arithmetics. The two proposed symmetric cryptographic key exchange protocols are based on the automorphism and the derivation of the octonion algebra.
A Hardware and Secure Pseudorandom Generator for Constrained Devices
2018
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…
Modelling and Analysis of Nonstationary Vehicle-to-Infrastructure Channels with Time-Variant Angles of Arrival
2018
In mobile radio channel modelling, it is generally assumed that the angles of arrival (AOAs) are independent of time. This assumption does not in general agree with real-world channels in which the AOAs vary with the position of a moving receiver. In this paper, we first present a mathematical model for the time-variant AOAs. This model serves as the basis for the development of two nonstationary multipath fading channels models for vehicle-to-infrastructure communications. The statistical properties of both channel models are analysed with emphasis on the time-dependent autocorrelation function (ACF), time-dependent mean Doppler shift, time-dependent Doppler spread, and the Wigner-Ville sp…