Filters








13 Hits in 10.9 sec

Applying time series analysis and neighbourhood voting in a decentralised approach for fault detection and classification in WSNs

Tuan Anh Nguyen, Doina Bucur, Marco Aiello, Kenji Tei
2013 Proceedings of the Fourth Symposium on Information and Communication Technology - SoICT '13  
A combination of neighbourhood voting and time series data analysis techniques are used to detect faults.  ...  We thus design a decentralised scheme for fault detection and classification in sensor data in which each sensor node does localised fault detection.  ...  Tuan Anh Nguyen thanks the Honiden lab at the National Institute of Informatics, Tokyo, Japan for supporting him during his internship during which he conducted the reported research.  ... 
doi:10.1145/2542050.2542080 dblp:conf/soict/NguyenBAT13 fatcat:qxxqxgdxk5bfjhbnsma7yqor2e

Thermal Management in Large Data Centres: Security Threats and Mitigation [chapter]

Betty Saridou, Gueltoum Bendiab, Stavros N. Shiaeles, Basil K. Papadopoulos
2021 Communications in Computer and Information Science  
Data centres are experiencing significant growth in their scale, especially, with the ever-increasing demand for cloud and IoT services.  ...  Finally, we propose a hybrid method that uses multi-variant anomaly detection to prevent thermal attacks, as well as a fuzzy-based health factor to enhance data center thermal awareness and security  ...  This work reflects authors' view and Agency is not responsible for any use that may be made of the information it contains. Bibliography  ... 
doi:10.1007/978-981-16-0422-5_12 fatcat:fcqxto4yfjfwdg7yzsz4sx2fbq

A Survey on Fault Tolerance BasedClustering Evolution in WSN

Hitesh Mohapatra, Amiya Kumar Rath
2020 IET Networks  
In our survey work, we focus on low R e -based fault and its related fault-tolerant algorithms. The preferences of the clustering approach-based fault are illustrated in Fig. 2.  ...  There must and should be a proper healing mechanism for handling fault occurrence and to make the SeN robust and reliable for making a correct decision irrespective of fault presence or absence.  ...  Analysis The thorough study on various clustering approaches concludes about the several parameters, which are normally considered for cluster classification in WSN.  ... 
doi:10.1049/iet-net.2019.0155 fatcat:syvobur3czbejem6rmgumzheuq

A Review of Intrusion Detection Systems and Their Evaluation in the IoT [article]

Luca Arnaboldi, Charles Morisset
2021 arXiv   pre-print
In the current state of literature, a number of approaches have been proposed to improve the efficiency of intrusion detection, catering to some of these limitations, such as resource constraints and mobility  ...  While these works provide valuable insights and solutions for sub-parts of these constraints, we discuss the limitations of these solutions as a whole, in particular what kinds of attacks these approaches  ...  : variables holding internal PLC state such as program counters, clocks, and timeouts. 3) modelling and detection, to model the behaviour they use autoregressive modelling, which creates a time series  ... 
arXiv:2105.08096v1 fatcat:5gzpin2jxnajnema34pn744gry

Energy theft in smart grids: A survey on data-driven attack strategies and detection methods

Ahlam Althobaiti, Anish Jindal, Angelos K. Marnerides, Utz Roedig
2021 IEEE Access  
Different attack detection models for theft detection in the smart grid are categorized.  ...  Apart from the financial gain for a malicious actor, energy theft can also affect critical grid processes with a direct impact on its overall resilience and safety.  ...  ACKNOWLEDGMENT This work has received funding from the EU H2020 EASY-RES project (grant agreement no. 764090) and also sponsored by Taif University and the Royal Embassy of Saudi Arabia Cultural Bureau  ... 
doi:10.1109/access.2021.3131220 fatcat:3auj524rxvhyflltul4qr3hnoq

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  Potential countermeasures to this attack include approaches used for fault tolerance such as majority voting and reputation-based frameworks [12, 15] .  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

D3.1 – State-of-the-Art and Market Analysis Report

ASSIST-IoT Consortium
2021 Zenodo  
Document with main results of SotA review and stakeholders and market analysis carried out.  ...  Fault localization Truly self-diagnosing system should be capable of localizing faults. Two most common approaches are rootcause analysis.  ...  This approach requires calibrating signature, which is a non-trivial task. Moreover, if there is a new type of fault -signature-based detection will not be able to detect it.  ... 
doi:10.5281/zenodo.6705158 fatcat:xote6pjzubcvxo4aqxxbraooxi

Recognising patterns in large data sets: a distributed approach

Anang Hudaya Muhamad Amin
2017
of high performance and parallel computing to artificial intelligence and machine learning and thus proposes a distributed processing approach for scalable pattern recognition.  ...  To scale up the recognition process, a pattern recognition system should acquire simple learning mechanisms and the ability to parallelise and distribute its processes for analysis of increasingly large  ...  Fault management scheme provides a capability to detect, isolate, and resolve the failures. This research applies a holistic approach in managing fault that occurs at subnet level.  ... 
doi:10.4225/03/5927db97ee3d7 fatcat:7i6ig6wiqrbgraysftycige37a

An event detection framework for wireless sensor networks

Kh Mahmudul Alam
2017
Wireless Sensor Networks (WSNs) introduce a new paradigm for sensing and disseminating information from various sources in the physical environment around us.  ...  WSNs facilitate the detection of various real-world phenomena (e.g. environmental anomaly, natural disasters, structural faults, man-made hazards and so forth) and thereby aim to reduce any economic and  ...  In our approach, we divide time into a series of periodic sensing cycles where at each cycle, a sensor senses its surrounding environment and the information acquired thereby is used to decide on event  ... 
doi:10.4225/03/58b6102f061b5 fatcat:ymztj2tcezblxhaea2aq7hq7ce

The Vessel Schedule Recovery Problem (VSRP) – A MIP model for handling disruptions in liner shipping

Berit D. Brouer, Jakob Dirksen, David Pisinger, Christian E.M. Plum, Bo Vaaben
2013 European Journal of Operational Research  
We demonstrate our approach on the routing problem for unmanned air vehicles with minimization of distance traveled and minimization of radar detection threat objectives. , Gokcen Turkel Dynamic scheduling  ...  model is applied in a case study of van deliveries.Achievements of this study will not only contribute to the research,but will also open a new angle in the logistics vision.  ...  -Optimal Dynamic Tax Evasion: A Portfolio Approach Francesco Menoncin, Economics, Brescia University, Via S. Faustino, 74/B, 25122, Brescia, Italy, menoncin@eco.unibs.it, Rosella Levaggi  ... 
doi:10.1016/j.ejor.2012.08.016 fatcat:c27kagfnxnhjfbil2rydhjhomm

Self-healing in Wireless Sensor Networks

Themistoklis Bourdenas, Morris Sloman, Emil Lupu
2012
We describe a fault detection mechanism for sensor readings based on heuristic and Bayesian probabilistic approaches that accurately identifies error occurrences in readings and minimises false positives  ...  We extend previous work on self-managed cell (SMC), which introduced an infrastructure for autonomous pervasive systems, with fault detection and recovery services.  ...  Acknowledgements I need to thank my thesis supervisor, Professor Morris Sloman, for his strong support and  ... 
doi:10.25560/9523 fatcat:qpj7nzm22nc3pedc7gg2vmzlk4

Distributed pattern recognition schemes for wireless sensor networks

Waleed Alfehaid
2017
Additionally, WSNs are of a dynamic nature in terms of network deployment and the appearance of activities in the field of interest.  ...  Adaptive and machine learning techniques have been proposed and implemented to work in conjunction with WSNs to serve a number of applications, such as physical activities detection, network security threats  ...  These characteristics make GN a very suitable approach for real time pattern recognition in WSNs.  ... 
doi:10.4225/03/58b60eeed2fb2 fatcat:7oqm6xzfv5hzzenyvwr25f3rw4

Wireless sensor and event localization

Anindya Iqbal
2017
Accessibility of the region of interest (ROI) and requirement of localization quality govern the choice of techniques applicable in a specific scenario.  ...  Localization, in the form of pin-pointing a randomly deployed sensor using location-aware anchors beaming beacon signals or confining a random event to a small boundary using sensors having overlapped  ...  Australian outback.  To locate survivors in a collapsed building while using WSNs based disaster monitoring system, it is critical to report their location accurately.  Detecting a machine fault or  ... 
doi:10.4225/03/58a65c53b437f fatcat:mgwcsz6bizag3pq52y7ityneuy