12 Hits in 8.5 sec

Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids

Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, Mansoor Alam
2011 IEEE Transactions on Smart Grid  
These intelligent modules employ Support Vector Machines and Artificial Immune System to detect and classify malicious data and possible cyber attacks.  ...  Green II, and all the other Lab members for their support and feedback on various parts of this thesis. I am grateful for having been among you during my Master's study here in Toledo.  ...  The communication network topology chosen for the SGDIDS architecture is the wireless mesh network (WMN).  ... 
doi:10.1109/tsg.2011.2159818 fatcat:ufxfqjib6ncjblkv22xixnztvu

A survey on resource discovery mechanisms, peer-to-peer and service discovery frameworks

Elena Meshkova, Janne Riihijärvi, Marina Petrova, Petri Mähönen
2008 Computer Networks  
Peer-to-peer overlays are discussed in detail and solutions for non-IP-based networks are also included in the review.  ...  We also specifically comment on issues related to wireless networks, and give an overview of the various issues and complications that should be considered in future work in this domain.  ...  Overlay topology construction and topology mismatching In theory most of the DHT-based systems can guarantee that any object in the network will be located in O(log N ) steps.  ... 
doi:10.1016/j.comnet.2008.03.006 fatcat:taublleoprhargi7doaj2sm7ay

Fake BTS Attacks of GSM System on Software Radio Platform

Yubo Song, Kan Zhou, Xi Chen
2012 Journal of Networks  
Experimental results show that the proposed method performs well in terms of both security and error-immunity.  ...  The basic knowledge of extension theory is introduced and the inspiration from it to problem in this paper is illustrated.  ...  , neural networks, immune-based and so on.  ... 
doi:10.4304/jnw.7.2.275-281 fatcat:3ejjimllcvewjeifopbvhl3zmi

A Survey of Security Challenges, Attacks Taxonomy and Advanced Countermeasures in the Internet of Things

Shapla Khanam, Ismail Bin Ahmedy, Mohd Yamani Idna Idris, Mohamed Hisham Jaward, Aznul Qalid Bin Md Sabri
2020 IEEE Access  
Game theory-based detection model presented in [152] , [153] to model and detect SF attacks for wireless mesh networks (WMNs) efficiently.  ...  The following security goals on availability must be considered for constant data and system availability.  Fault Tolerance: The system must be able to use the selfprotection approach along with self-healing  ... 
doi:10.1109/access.2020.3037359 fatcat:pw4fsmelmjgc5anm7hp537l63e

Implicit Sleep Mode Determination in Power Management of Event-Driven Deeply Embedded Systems [chapter]

André Sieber, Karsten Walther, Stefan Nürnberger, Jörg Nolte
2009 Lecture Notes in Computer Science  
The test environment is based on a 7 × 7 grid of 49 battery operated Tmote Sky sensor nodes.  ...  Based on these models, a new network infrastructure will be developed, followed by a large set of algorithms solving global tasks like exploration of unknown areas or target tracking.  ...  The overhead necessary for fault-tolerant deadlock handling and device access scheduling can be saved. For energy efficiency operating systems are built event-based and driven by hardware interrupts.  ... 
doi:10.1007/978-3-642-02118-3_2 fatcat:prjsfyqcojcnpcetw7vfnvqwpy

The University of Texas at Dallas-Richardson, USA Monique P. Fargues, Naval Postgraduate School

Pascal Lorenz, Eugen Borcoci, Javier Del, Ser Lorente, Michel Diaz, France Ghita, Pascal Lorenz, Joel Rodrigues, Zary Segall, Maria Striki, Eugen Borcoci, Joel Rodrigues (+44 others)
CTRQ 2011 The Fourth International Conference on Communication Theory, Reliability, and Andras Farago   unpublished
in communication theory.  ...  events focusing on the achievements on communication theory with respect to reliability and quality of service.  ...  ACKNOWLEDGMENT The authors thank to all the members of ETSI STF 360, and also thank to the members of ANR's project UBIS for their work on our platform.  ... 

Special Issue: Advances in Secure Data Streaming Systems

Fatos Xhafa, Jin Li, Vladi Kolici, Anton Železnikar, Matjaž Gams, Jožef Stefan, Drago Torkar, Jožef Stefan, Juan Carlos, Augusto, Argentina, Vladimir Batagelj (+18 others)
2015 unpublished
This work was funded in part by the U.S. Army under grant #W911NF-11-1-0124.  ...  and are fault tolerant and highly available in nature.  ...  its fault tolerant behavior [24] .  ... 

Security adaptation in highly dynamic wireless networks

Tewfiq El Maliki, Jean-Marc Seigneur, Dimitri Konstantas
Sans aucun doute, un moniteur de référence, qui adapte sa sécurité hautement dynamique, doit être basé sur un système bio-inspiré.  ...  En particulier, notre système est basé sur les caractéristiques bio-inspirées telles que l'autogestion et l'auto-optimisation.  ...  It is my great good fortune to have met him, because he has had the aptitude to encourage me in starting as well as in finishing this thesis.  ... 
doi:10.13097/archive-ouverte/unige:37196 fatcat:5qslswmmzvfrvnedumq6vs3wlu

ICWMC 2016 Committee ICWMC Advisory Committee

Barcelona, Spain, Carlos Westphall, David Sanchez, Mari Carmen, Aguayo Torres, Abdulrahman Yarali, Mohamad Sayed, Hassan, Dragana Krstic, Mari Carmen, Aguayo Torres (+142 others)
on the previous events on advanced wireless technologies, wireless networking, and wireless applications.  ...  We are grateful to the members of the ICWMC 2016 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success.  ...  [6] proposes a classification of power control mechanisms in WSN, based on Control Theory and actually related to power control protocols only.  ... 

Game Theoretic Load Management Schemes for Smart Grids

Naouar Yaagoubi, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
The proposed approach is based on game theory using a modified regret matching procedure.  ...  In this thesis, we focus mainly on energy savings by critically investigating the problem of load management in the smart grid.  ...  of nodes organized in a mesh topology.  ... 
doi:10.20381/ruor-5202 fatcat:tiubgfkwzfh6bagd7drfki6wj4

Self-repairing hierarchical tree-based link restoration scheme for mesh networks

Shahram Shah-Heydari, Université D'Ottawa / University Of Ottawa, Université D'Ottawa / University Of Ottawa
In this thesis we propose and study a self-repairing tree-based pre-planned link protection scheme for backbone mesh survivable networks.  ...  We conduct extensive studies of the performance trends of the hierarchical protection trees on a database that we built from thousands of randomly generated mesh networks with varying topology parameters  ...  The proof is based on the following theorem from basic graph theory about trees [GrYe99]: Theorem 3.1: Suppose in the undirected, connected graph G(V, E), subgraph T(V ,E ) a G forms a tree.  ... 
doi:10.20381/ruor-12964 fatcat:f4rgcv63hrd63bjy6xcxobkjyy

Self-Organizing Infrastructures for Ambient Services [chapter]

Klaus Herrmann
Kommunikation in Verteilten Systemen (KiVS)  
The focus of the research work presented in this thesis is on the global-scale interactions in an AmI system.  ...  There are still many challenges ahead on the way towards the realization of AmI.  ...  Autonomic managers shall control autonomic elements using some form of closed control loop, a concept that has been known from control theory for several decades, based on higher-level policies.  ... 
doi:10.1007/978-3-540-69962-0_27 dblp:conf/kivs/Herrmann07 fatcat:rtafhtrjkrgmpcfhcz2algsqw4