scholarly journals Spread and Control of Mobile Benign Worm Based on Two-Stage Repairing Mechanism

2014 ◽  
Vol 2014 ◽  
pp. 1-14 ◽  
Author(s):  
Meng Wang ◽  
Zhide Chen ◽  
Li Xu ◽  
Huan Zhan

Both in traditional social network and in mobile network environment, the worm is a serious threat, and this threat is growing all the time. Mobile smartphones generally promote the development of mobile network. The traditional antivirus technologies have become powerless when facing mobile networks. The development of benign worms, especially active benign worms and passive benign worms, has become a new network security measure. In this paper, we focused on the spread of worm in mobile environment and proposed the benign worm control and repair mechanism. The control process of mobile benign worms is divided into two stages: the first stage is rapid repair control, which uses active benign worm to deal with malicious worm in the mobile network; when the network is relatively stable, it enters the second stage of postrepair and uses passive mode to optimize the environment for the purpose of controlling the mobile network. Considering whether the existence of benign worm, we simplified the model and analyzed the four situations. Finally, we use simulation to verify the model. This control mechanism for benign worm propagation is of guiding significance to control the network security.

2014 ◽  
Vol 635-637 ◽  
pp. 1526-1529
Author(s):  
Na Li ◽  
Yan Hui Du ◽  
Guang Xun Chen

In order to detect hacker attacks and take early countermeasures, this paper introduced a novel mobile botnet called CPbot which uses Google Cloud Messaging (GCM) to spread Trojan on Android devices. First, we presented the network model of this GCM based mobile botnet as well as its command and control (C&C) mechanism. Secondly, we illustrated the different roles that this botnet can play. Finally, we setup a simulation model to discuss the topology of this mobile botnet. The MATLAB simulation result shows that CPbot is robust against single point of failures and has good resiliency to shutdown attempts, its command dissemination is highly efficient and the bot App has very low battery consumption. This analysis indicates that mobile botnet is a leading threat to mobile network security; therefore we must deploy defense strategies against this botnet.


Author(s):  
Mamata Rath ◽  
Jhum Swain ◽  
Bibudhendu Pati ◽  
Binod Kumar Pattanayak

This chapter describes how with the rapid increase of internet users, more people have access to global information and communication technology. As a result of which, the issues of using the internet as a global platform for the enabling of smart objects and machines to coordinate, communicate, compute and calculate, gradually emerge. In Mobile Ad-hoc Networks (MANETs) the individual nodes are self-reconfigurable according to the changes of the network topology. Joint effort between portable hubs is more critical because they face major challenges such as powerlessness to work safely while protecting its assets and performing secure steering among hubs. With the existence of malicious nodes, one of the principal challenges in MANETs is to outline powerful security arrangement that can shield MANETs from various routing attacks. This chapter highlights major attacks and control mechanism in MANETs with an intention that it will open directions for researchers to explore more in the field of network security. At the end of this chapter, basic security mechanisms and issues related to emergence of IoT from Mobile networks has been highlighted.


2020 ◽  
Vol 39 (4) ◽  
pp. 5449-5458
Author(s):  
A. Arokiaraj Jovith ◽  
S.V. Kasmir Raja ◽  
A. Razia Sulthana

Interference in Wireless Sensor Network (WSN) predominantly affects the performance of the WSN. Energy consumption in WSN is one of the greatest concerns in the current generation. This work presents an approach for interference measurement and interference mitigation in point to point network. The nodes are distributed in the network and interference is measured by grouping the nodes in the region of a specific diameter. Hence this approach is scalable and isextended to large scale WSN. Interference is measured in two stages. In the first stage, interference is overcome by allocating time slots to the node stations in Time Division Multiple Access (TDMA) fashion. The node area is split into larger regions and smaller regions. The time slots are allocated to smaller regions in TDMA fashion. A TDMA based time slot allocation algorithm is proposed in this paper to enable reuse of timeslots with minimal interference between smaller regions. In the second stage, the network density and control parameter is introduced to reduce interference in a minor level within smaller node regions. The algorithm issimulated and the system is tested with varying control parameter. The node-level interference and the energy dissipation at nodes are captured by varying the node density of the network. The results indicate that the proposed approach measures the interference and mitigates with minimal energy consumption at nodes and with less overhead transmission.


2018 ◽  
Author(s):  
Phanidra Palagummi ◽  
Vedant Somani ◽  
Krishna M. Sivalingam ◽  
Balaji Venkat

Networking connectivity is increasingly based on wireless network technologies, especially in developing nations where the wired network infrastructure is not accessible to a large segment of the population. Wireless data network technologies based on 2G and 3G are quite common globally; 4G-based deployments are on the rise during the past few years. At the same time, the increasing high-bandwidth and low-latency requirements of mobile applications has propelled the Third Generation Partnership Project (3GPP) standards organization to develop standards for the next generation of mobile networks, based on recent advances in wireless communication technologies. This standard is called the Fifth Generation (5G) wireless network standard. This paper presents a high-level overview of the important architectural components, of the advanced communication technologies, of the advanced networking technologies such as Network Function Virtualization and other important aspects that are part of the 5G network standards. The paper also describes some of the common future generation applications that require low-latency and high-bandwidth communications.


Author(s):  
Ellahe Mohyadin ◽  
Zohreh Ghorashi ◽  
Zahra Molamomanaei

AbstractBackgroundAnxiety and fear of labor pain has led to elevated cesarean section rate in some countries. This study was conducted to investigate the effect of yoga in pregnancy on anxiety, labor pain and length of labor stages.MethodsThis clinical trial study was performed on 84 nulliparous women who were at least 18 years old and were randomly divided into two groups of yoga and control groups. Pregnancy Yoga Program consisting of 6 60-min training sessions was started every 2 weeks from week 26 of pregnancy and continued until 37 weeks of gestation. Anxiety severity at maternal admission to labor was measured by the Spielbergers State-Trait Anxiety Inventory, and labor pain was measured by Visual Analogue Scale (VAS) at dilatation (4–5 cm) and 2 h after the first measurement. Data were analyzed using Chi-Square and t-test.ResultsIntervention group reported less pain at dilatation (4–5 cm) (p=0.001) and 2 h after the first measurement (p=0.001) than the control group. Stat anxiety was also lower in intervention group than the control group (p=0.003) at the entrance to labor room. Subjects in the control group required more induction compared to intervention group (p=0.003). Women in intervention group experienced shorter duration of the first phase of the labor than the control group (p=0.002). Also, the total duration of two stages of labor was shorter in intervention group than the control group (p=0.003).ConclusionsPracticing yoga during pregnancy may reduce women’s anxiety during labor; shorten labor stages, and lower labor pain.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2013 ◽  
Vol 464 ◽  
pp. 253-257
Author(s):  
Hui Fang Chen

This paper takes the automatic control system of controllable pitch propeller in a multipurpose ocean tug as an example to describe the application of the S7-200 series PLC in the control system of 4500 horse power controllable pitch propeller in detail. The principle of control system is addressed, as well as the hardware configuration, the design idea of the main software and control process. The system shows high reliability, accuracy and good control performance in practical in practical running.


2021 ◽  
Author(s):  
Dmitry Moiseevich Olenchikov

Abstract Recently, more and more reservoir flow models are being extended to integrated ones to consider the influence of the surface network on the field development. A serious numerical problem is the handling of constraints in the form of inequalities. It is especially difficult in combination with optimization and automatic control of well and surface equipment. Traditional numerical methods solve the problem iteratively, choosing the operation modes for network elements. Sometimes solution may violate constraints or not be an optimal. The paper proposes a new flexible and relatively efficient method that allows to reliably handle constraints. The idea is to work with entire set of all possible operation modes according to constraints and control capabilities. Let's call this set an operation modes domain (OMD). The problem is solved in two stages. On the first stage (direct course) the OMD are calculated for all network elements from wells to terminal. Constraints are handled by narrowing the OMD. On the second stage (backward course) the optimal solution is chosen from OMD.


Sign in / Sign up

Export Citation Format

Share Document