scholarly journals PrioDeX

2021 ◽  
Vol 2 (3) ◽  
pp. 1-32
Author(s):  
Georgios Bouloukakis ◽  
Kyle Benson ◽  
Luca Scalzotto ◽  
Paolo Bellavista ◽  
Casey Grant ◽  
...  

Real-time event detection and targeted decision making for emerging mission-critical applications require systems that extract and process relevant data from IoT sources in smart spaces. Oftentimes, this data is heterogeneous in size, relevance, and urgency, which creates a challenge when considering that different groups of stakeholders (e.g., first responders, medical staff, government officials, etc.) require such data to be delivered in a reliable and timely manner. Furthermore, in mission-critical settings, networks can become constrained due to lossy channels and failed components, which ultimately add to the complexity of the problem. In this article, we propose PrioDeX, a cross-layer middleware system that enables timely and reliable delivery of mission-critical data from IoT sources to relevant consumers through the prioritization of messages. It integrates parameters at the application, network, and middleware layers into a data exchange service that accurately estimates end-to-end performance metrics through a queueing analytical model. PrioDeX proposes novel algorithms that utilize the results of this analysis to tune data exchange configurations (event priorities and dropping policies), which is necessary for satisfying situational awareness requirements and resource constraints. PrioDeX leverages Software-Defined Networking (SDN) methodologies to enforce these configurations in the IoT network infrastructure. We evaluate our approach using both simulated and prototype-based experiments in a smart building fire response scenario. Our application-aware prioritization algorithm improves the value of exchanged information by 36% when compared with no prioritization; the addition of our network-aware drop rate policies improves this performance by 42% over priorities only and by 94% over no prioritization.

2021 ◽  
Vol 18 (4) ◽  
pp. 1-22
Author(s):  
Jerzy Proficz

Two novel algorithms for the all-gather operation resilient to imbalanced process arrival patterns (PATs) are presented. The first one, Background Disseminated Ring (BDR), is based on the regular parallel ring algorithm often supplied in MPI implementations and exploits an auxiliary background thread for early data exchange from faster processes to accelerate the performed all-gather operation. The other algorithm, Background Sorted Linear synchronized tree with Broadcast (BSLB), is built upon the already existing PAP-aware gather algorithm, that is, Background Sorted Linear Synchronized tree (BSLS), followed by a regular broadcast distributing gathered data to all participating processes. The background of the imbalanced PAP subject is described, along with the PAP monitoring and evaluation topics. An experimental evaluation of the algorithms based on a proposed mini-benchmark is presented. The mini-benchmark was performed over 2,000 times in a typical HPC cluster architecture with homogeneous compute nodes. The obtained results are analyzed according to different PATs, data sizes, and process numbers, showing that the proposed optimization works well for various configurations, is scalable, and can significantly reduce the all-gather elapsed times, in our case, up to factor 1.9 or 47% in comparison with the best state-of-the-art solution.


Author(s):  
Lauren-Brooke Eisen ◽  
Miriam Aroni Krinsky

Local prosecutors are responsible for 95 percent of criminal cases in the United States—their charging decisions holding enormous influence over the number of people incarcerated and the length of sentences served. Performance metrics are a tool that can align the vision of elected prosecutors with the tangible actions of their offices’ line attorneys. The right metrics can provide clarity to individual line attorneys around the mission of the office and the goals of their job. Historically, however, prosecutor offices have relied on evaluation metrics that incentivize individual attorneys to prioritize more punitive responses and volume-driven activity—such as tracking the number of cases processed, indictments, guilty pleas, convictions, and sentence lengths. Under these past approaches, funding, budgeting, and promotional decisions are frequently linked to regressive measures that fail to account for just results. As more Americans have embraced the need to end mass incarceration, a new wave of reform-minded district attorneys have won elections. To ensure they are accountable to the voters who elected them into office and achieve the changes they championed, they must align measures of success with new priorities for their offices. New performance metrics predicated on the goals of reducing incarceration and enhancing fairness can shrink prison and jail populations, while improving public trust and promoting healthier and safer communities. The authors propose a new set of metrics for elected prosecutors to consider in designing performance evaluations, both for their offices and for individual attorneys. The authors also suggest that for these new performance measures to effectively drive decarceration practices, they must be coupled with careful, thoughtful implementation and critical data-management infrastructure.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 25
Author(s):  
E Ramya ◽  
R Gobinath

Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations. 


2021 ◽  
pp. 1-13
Author(s):  
Gareth Wimpenny ◽  
Jan Šafář ◽  
Alan Grant ◽  
Martin Bransby

Abstract The civilian Automatic Identification System (AIS) has no inherent protection against spoofing. Spoofed AIS messages have the potential to interfere with the safe navigation of a vessel by, amongst other approaches, spoofing maritime virtual aids to navigation and/or differential global navigation satellite system (DGNSS) correction data conveyed across it. Acting maliciously, a single transmitter may spoof thousands of AIS messages per minute with the potential to cause considerable nuisance; compromising information provided by AIS intended to enhance the mariner's situational awareness. This work describes an approach to authenticate AIS messages using public key cryptography (PKC) and thus provide unequivocal evidence that AIS messages originate from genuine sources and so can be trusted. Improvements to the proposed AIS authentication scheme are identified which address a security weakness and help avoid false positives to spoofing caused by changes to message syntax. A channel loading investigation concludes that sufficient bandwidth is available to routinely authenticate all AIS messages whilst retaining backwards compatibility by carrying PKC ‘digital signatures’ in a separate VHF Data Exchange System (VDES) side channel.


Aerospace ◽  
2020 ◽  
Vol 7 (11) ◽  
pp. 154
Author(s):  
Nichakorn Pongsakornsathien ◽  
Suraj Bijjahalli ◽  
Alessandro Gardi ◽  
Angus Symons ◽  
Yuting Xi ◽  
...  

Recent evolutions of the Unmanned Aircraft Systems (UAS) Traffic Management (UTM) concept are driving the introduction of new airspace structures and classifications, which must be suitable for low-altitude airspace and provide the required level of safety and flexibility, particularly in dense urban and suburban areas. Therefore, airspace classifications and structures need to evolve based on appropriate performance metrics, while new models and tools are needed to address UTM operational requirements, with an increasing focus on the coexistence of manned and unmanned Urban Air Mobility (UAM) vehicles and associated Communication, Navigation and Surveillance (CNS) infrastructure. This paper presents a novel airspace model for UTM adopting Performance-Based Operation (PBO) criteria, and specifically addressing urban airspace requirements. In particular, a novel airspace discretisation methodology is introduced, which allows dynamic management of airspace resources based on navigation and surveillance performance. Additionally, an airspace sectorisation methodology is developed balancing the trade-off between communication overhead and computational complexity of trajectory planning and re-planning. Two simulation case studies are conducted: over the skyline and below the skyline in Melbourne central business district, utilising Global Navigation Satellite Systems (GNSS) and Automatic Dependent Surveillance-Broadcast (ADS-B). The results confirm that the proposed airspace sectorisation methodology promotes operational safety and efficiency and enhances the UTM operators’ situational awareness under dense traffic conditions introducing a new effective 3D airspace visualisation scheme, which is suitable both for mission planning and pre-tactical UTM operations. Additionally, the proposed performance-based methodology can accommodate the diversity of infrastructure and vehicle performance requirements currently envisaged in the UTM context. This facilitates the adoption of this methodology for low-level airspace integration of UAS (which may differ significantly in terms of their avionics CNS capabilities) and set foundations for future work on tactical online UTM operations.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Wesley D. Garey ◽  
Yishen Sun ◽  
Richard A. Rouil

Proximity Services (ProSe) and Wi-Fi are two promising technologies that may provide support for Mission Critical Voice (MCV) applications in remote and rural areas by enabling Device-to-Device (D2D) communication. In this paper, several performance metrics of ProSe and Wi-Fi are evaluated and compared side-by-side under various configurations. The ns-3 simulation results show that ProSe outperforms Wi-Fi in terms of coverage range and access time with a medium traffic load, while Wi-Fi has a shorter access time under a light traffic load. In addition, with various user densities, ProSe offers better coverage range and access time a majority of the time. The evaluation in this paper provides insights to first responders on what to expect with either technology and how to improve the performance by adjusting different system parameters.


2014 ◽  
Vol 602-605 ◽  
pp. 2807-2810
Author(s):  
Quan Gang Wen

To protect the security of critical data and application system, generally, many companies or departments use a parallel way of intranet and internet. Because every kind of security technology has its limitations, traditional security products such as firewall, VPN, data encryption, intrusion detection and network vulnerability scanning can not completely solve various security problems in information exchange between different networks. It is not able to meet all the security needs of critical networks and security data with the general products only. The way of data exchange of most of the existing products of "GAP" is mainly logic isolation .This paper describes a design and implementation of a hot switch circuit card in way of physical isolation .The data exchange mode of this circuit card is a half-duplex which can physically completely isolate intranet and internet. Through functional test and performance test, we can draw a conclusion that the circuit card can effectively achieve our demand of data exchange between different networks.


Sensors ◽  
2021 ◽  
Vol 21 (17) ◽  
pp. 5790
Author(s):  
Salwa Saafi ◽  
Jiri Hosek ◽  
Aneta Kolackova

Public safety agencies have been working on the modernization of their communication networks and the enhancement of their mission-critical capabilities with novel technologies and applications. As part of these efforts, migrating from traditional land mobile radio (LMR) systems toward cellular-enabled, next-generation, mission-critical networks is at the top of these agencies’ agendas. In this paper, we provide an overview of cellular technologies ratified by the 3rd Generation Partnership Project (3GPP) to enable next-generation public safety networks. On top of using wireless communication technologies, emergency first responders need to be equipped with advanced devices to develop situational awareness. Therefore, we introduce the concept of the Internet of Life-Saving Things (IoLST) and focus on the role of wearable devices—more precisely, cellular-enabled wearables, in creating new solutions for enhanced public safety operations. Finally, we conduct a performance evaluation of wearable-based, mission-critical applications. So far, most of the mission-critical service evaluations target latency performance without taking into account reliability requirements. In our evaluation, we examine the impact of device- and application-related parameters on the latency and the reliability performance. We also identify major future considerations for better support of the studied requirements in next-generation public safety networks.


Author(s):  
Jennifer Bellizzi ◽  
Mark Vella ◽  
Christian Colombo ◽  
Julio Hernandez-Castro

AbstractAttackers regularly target Android phones and come up with new ways to bypass detection mechanisms to achieve long-term stealth on a victim’s phone. One way attackers do this is by leveraging critical benign app functionality to carry out specific attacks.In this paper, we present a novel generalised framework, JIT-MF (Just-in-time Memory Forensics), which aims to address the problem of timely collection of short-lived evidence in volatile memory to solve the stealthiest of Android attacks. The main components of this framework are i) Identification of critical data objects in memory linked with critical benign application steps that may be misused by an attacker; and ii) Careful selection of trigger points, which identify when memory dumps should be taken during benign app execution.The effectiveness and cost of trigger point selection, a cornerstone of this framework, are evaluated in a preliminary qualitative study using Telegram and Pushbullet as the victim apps targeted by stealthy malware. Our study identifies that JIT-MF is successful in dumping critical data objects on time, providing evidence that eludes all other forensic sources. Experimentation offers insight into identifying categories of trigger points that can strike a balance between the effort required for selection and the resulting effectiveness and storage costs. Several optimisation measures for the JIT-MF tools are presented, considering the typical resource constraints of Android devices.


2019 ◽  
Vol 11 (1) ◽  
pp. 18 ◽  
Author(s):  
Jinpeng Wang ◽  
Gérard Chalhoub ◽  
Michel Misson

Recently, mobility support has become an important requirement in various Wireless Sensor Networks (WSNs). Low-power and Lossy Networks (LLNs) are a special type of WSNs that tolerate a certain degree of packet loss. However, due to the strict resource constraints in the computation, energy, and memory of LLNs, most routing protocols only support static network topologies. Data collection and data dissemination are two basic traffic modes in LLNs. Unlike data collection, data dissemination is less investigated in LLNs. There are two sorts of data-dissemination methods: point-to-multipoint and point-to-point. In this paper, we focus on the point-to-point method, which requires the source node to build routes to reach the destination node. We propose an adaptive routing protocol that integrates together point-to-point traffic and data-collection traffic, and supports highly mobile scenarios. This protocol quickly reacts to the movement of nodes to make faster decisions for the next-hop selection in data collection and dynamically build routes for point-to-point traffic. Results obtained through simulation show that our work outperforms two generic ad hoc routing protocols AODV and flooding on different performance metrics. Results also show the efficiency of our work in highly mobile scenarios with multiple traffic patterns.


Sign in / Sign up

Export Citation Format

Share Document