Sunday, December 17, 2017

Topology Map Analysis for Effective Choice of Network Attack Scenario

Hidema Tanaka 

National Defense Academy of Japan 

Hashirimizu 1-10-20 Yokosuka, Kanagawa Japan 239-8686

ABSTRACT 

In general, network attack should be prohibited and information security technology should contribute to improve the trust of network communication. Almost network communication is based on IP packet that is standardized by the international organization. So, network attack does not work without following the standardized protocols and data format. Therefore, network attack also leaks information concerning adversaries by their IP packets. In this paper, we propose an effective choice for network attack scenario which counter-attacks adversary. We collect and analyze IP packets from the adversary, and derive network topology map of the adversary. The characteristics of topology map can be evaluated by the Eigen value of topology matrix. We observe the changes of characteristics of topology map by the influence of attack scenario. Then we can choose the most effective or suitable network counter-attack strategy. In this paper, we assume two kinds of attack scenarios and three types of tactics. And we show an example choice of attack using actual data of adversary which were observed by our dark-net monitoring.

KEYWORDS 

Network attack, Dark-net Monitoring, Topology map, Adjacency matrix, Laplacian matrix, Total accessibility matrix 

Friday, December 15, 2017

Multicasting Based Enhanced Proactive Source Routing in MANETs

1Deepa Dasarathan and 2 P. Nirmal Kumar 1

Research Scholar, Department of Electronics & Communication Engineering, 1 Sathyabama University, Chennai, India 

2Associate Professor, Department of Electronics & Communication Engineering, 2College of Engineering, Guindy, Anna University, Chennai, India

 ABSTRACT:

Mobile Ad-hoc Network (MANET) is an accumulation of movable nodes organizing a irregular topology without centralized administration. In a MANET, multicasting is a significant technique for utilizing data communication system. Multicasting based enhanced proactive source routing is proposed in this paper for Mobile Ad hoc Networks. It explains an innovative multicasting algorithm that considers the transmission energy and residual energy while forwarding the data packets. It improves the network throughput and raises the network lifetimes. Simulation analysis is carried in this proposed system and this method shows improved performance over the existing system.

KEYWORDS:

Mobile Ad hoc Network, residual energy, transmission energy, simulation analysis.

Tuesday, December 12, 2017

A Rapid Deployment Big Data Computing Platform for Cloud Robotics

Leigh Duggan1 , James Dowzard2 , Jayantha Katupitiya3 , and Ka C. Chan4 

1,2,3,4Department of Mechatronic Engineering, University of New South Wales, Australia 

4Department of Computer Science and Information Technology, La Trobe University, Australia 

ABSTRACT 

The primary contribution of this research is the production of a general cloud robotics architecture that leverages the established and evolving big data technologies. Prior research in this area has not released all details of their deployed architectures, which prevents experimental results from being replicated and verified. By providing a general-purpose architecture, it is hoped that this framework will allow future research to build upon and begin to create a standardised platform, where research can be easily repeated, validated and compared.The secondary contribution is the critical evaluation of the design of cloud robotic architectures. Whilst prior research has demonstrated that cloud-based robotic processing is achievable via big data technologies, such research has not discussed the choice in design. With the ecosystem of big data technologies expanding in recent years, a review of the most relevant technologies for cloud robotics is appropriate to demonstrate and validate the proposed architectural design. 

KEYWORDS 

Cloud robotics, big data, OpenStack, Apache, ROS. 

EWER:"Electromagnetic Wave Exposure Reduction" Service for Sensitive Users with Privacy Concerns

Mohamed Aymen Chalouf1 , Francine Krief2 and Dramane Ouattara2 

1 IRISA, University of Rennes 1, 6 rue Kerampont 22300 Lannion, France 

2LaBRI, University of Bordeaux, 351 cours de la Libération , 33400 Talence, France 

ABSTRACT 

The impact of electromagnetic waves, and consequently of wireless and mobile transmissions, on human health represented an open debate for many years. That is why, for example, demonstrations take place regularly against the installation of new transmission antennas in urban areas. In this paper, we propose a service aiming at limiting the exposure level of individuals to electromagnetic radiation in some areas. This could be achieved thanks to a dynamic adaptation of transmission parameters (frequency, power, etc.), for example. The proposed service defines some components implementing the intelligence required to compute the exposure level of a person and to carry out the adapted actions. It also relies on a signalling protocol that integrates an "Electromagnetic Wave Exposure" component which groups the parameters required to manage the exposure level of sensitive persons. To our knowledge, there is no solution providing a similar service to reduce the exposure level of sensitive persons to electromagnetic radiation. Moreover, by controlling the electromagnetic radiation exposure level of individuals, our proposal may lead to the limitation of electromagnetic waves. This will also help to meet the energy-saving constraints that future networks, particularly 5G, should be able to meet. 

KEYWORDS 

Sensitive persons, Electromagnetic radiation (EMR), EMR exposure level, Wireless communications, Signalling protocol, Network auto-configuration.  

Thursday, December 7, 2017

A Proposal to Improve SEP Routing Protocol Using Insensitive Fuzzy C-Means in Wireless Sensor Network

Phan Thi The, Ngo Quang Quyen, Vu Ngoc Phan and Tran Cong Hung 

Post & Telecommunications Institute of Technology,Vietnam 

ABSTRACT 

Nowadays, with the rapid development of science and technology and the ever-increasing demand in every field, wireless sensor networks are emerging as a necessary scientific achievement to meet the demand of human in modern society. The wireless sensor network (WSN) is designed to help us not lose too much energy, workforce, avoid danger and they bring high efficiency to work. Various routing protocols are being used to increase the energy efficiency of the network, with two distinct types of protocols, homogenous and heterogeneous. In these two protocols, the SEP (Stable Election Protocol) is one of the most effective heterogeneous protocols which increase the stability of the network. In this paper, we propose an approaching the εFCM algorithm in clustering the SEP protocol which makes the WSN network more energy efficient. The simulation results showed that the SEP-εFCM proposed protocol performed better than the conventional SEP protocol 

KEYWORDS 

Wireless sensor network (WSN), Insensitive Fuzzy C-Means, Stable Election Protocol(SEP), SEPInsensitive Fuzzy C-Means.  


Wednesday, December 6, 2017

Analysis of LTE Radio Load and User Throughput

Jari Salo1 and Eduardo Zacarías B.2 

Nokia Networks 1Taguig City, Phillipines and 2Ulm, Germany 

Abstract 

A recurring topic in LTE radio planning pertains to the maximum acceptable LTE radio interface load, up to which a targeted user data rate can be maintained. We explore this topic by using Queuing Theory elements to express the downlink user throughput as a function of the LTE Physical Resource Block (PRB) utilization. The resulting formulas are expressed in terms of standardized 3GPP KPIs and can be readily evaluated from network performance counters. Examples from live networks are given to illustrate the results, and the suitability of a linear decrease model is quantified upon data from a commercial LTE network. 

Keywords 

LTE, Traffic Model, Processor Sharing, Network Measurements

Tuesday, December 5, 2017

Enhancement and Migration of Knowledge Science

Shawon S. M. Rahman, Ph.D1 and Syed V. Ahamed, Ph.D2 

1 Associate Professor, Dept. of Computer Science and Engineering University of Hawaii-Hilo, Hilo, Hawaii, USA 

2 Professor Emeritus, City University of New York Staten Island, New York 10134, USA 

ABSTRACT 

In this paper, we present a basis for treating, evaluating and measuring knowledge as an energy acquired by knowledge centric objects in society. The energy level acquired is indicated as their knowledge potential or KnP. Some objects get more charged in the knowledge domain and exhibit a longer and/or more intense energy trail. The Rate of knowledge acquisition, intellectual caliber and need intensity driving to acquire knowledge all play a role in the knowledge energy (Kenergy) thus acquired. Bounded by established principles of measurement, units, quantification and equations for dealing with knowledge, it becomes amenable to its own (knowledge) science with laws derived from the many disciplines and their own distinctive principles. We fall back on equations from thermodynamics, electrical engineering, fluid mechanics and transmission theory to quantify the flow-properties of knowledge. Though not completely precise and accurate at this stage of development in the science of knowledge, these disciplines offer a framework for utilizing the wealth of knowledge to stand on the shoulders of many a giant in their respective expertise. In the computational domain, symbols denote both the tangible and intangible objects and linkages handle the connectivity and updating reflecting an active and dynamic profile of knowledge. Hence, objects in the physical world and their actions become symbols and their interactions become processes in the programming domain. 

KEYWORDS 

Knowledge Science, Flow of Knowledge, Velocity of Knowledge, Social Sciences.

Sunday, December 3, 2017

Grid Based Priority Routing Protocol for UWSNs

Faiza Al-Salti, N. Alzeidi, Khaled Day, Bassel Arafeh and Abderezak Touzene

Department of Computer Science, Sultan Qaboos University, Oman

ABSTRACT

In this paper, we devise and evaluate a new Grid-Based Priority Routing (GBPR) protocol for Underwater Wireless Sensor Networks (UWSNs). GBPR utilizes a 3D logical grid view of the monitored area to deliver data packets to sink nodes. Particularly, data packets are forwarded on a cell-by-cell-basis using elected sensor nodes called cell-heads. The unique feature in GBPR is the classification of the neighboring cells in different priority levels according to their distances to the sink node. Cells closer to the sink are given higher priority to be selected as the next hop. This mechanism helps in reducing the number of hops; thus, reducing the energy consumption and end-to-end delay, and increasing the reliability. The protocol is evaluated and compared against EMGGR and EEF protocols available in the literature. Simulation results show that GBPR outperforms the other two protocols in terms of energy efficiency, average delay and packet delivery ratio.

KEYWORDS

Underwater wireless sensor networks, UWSNs, routing protocol, location-based, grid, cell-head election& void-handling algorithm.