scholarly journals Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System

2019 ◽  
Vol 2019 ◽  
pp. 1-22 ◽  
Author(s):  
Krzysztof Cabaj ◽  
Marcin Gregorczyk ◽  
Wojciech Mazurczyk ◽  
Piotr Nowakowski ◽  
Piotr Żórawski

Currently 5G communication networks are envisioned to offer in a near future a wide range of high-quality services and unfaltering user experiences. In order to achieve this, several issues including security, privacy, and trust aspects need to be solved so that the 5G networks can be widely welcomed and accepted. Considering above, in this paper, we take a step towards these requirements by proposing a dedicated SDN-based integrated security framework for the Internet of Radio Light (IoRL) system that is following 5G architecture design. In particular, we present how TCP SYN-based scanning activities and DHCP-related network threats like Denial of Service (DoS), traffic eavesdropping, etc. can be detected and mitigated using such an approach. Enclosed experimental results prove that the proposed security framework is effective and efficient and thus can be considered as a promising defensive solution.

2020 ◽  
Vol 2020 (4) ◽  
pp. 116-1-116-7
Author(s):  
Raphael Antonius Frick ◽  
Sascha Zmudzinski ◽  
Martin Steinebach

In recent years, the number of forged videos circulating on the Internet has immensely increased. Software and services to create such forgeries have become more and more accessible to the public. In this regard, the risk of malicious use of forged videos has risen. This work proposes an approach based on the Ghost effect knwon from image forensics for detecting forgeries in videos that can replace faces in video sequences or change the mimic of a face. The experimental results show that the proposed approach is able to identify forgery in high-quality encoded video content.


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


2015 ◽  
Vol 24 (3) ◽  
pp. 289-292 ◽  
Author(s):  
Zheng Yen Ng ◽  
Sue Archbold ◽  
Connie Mayer ◽  
Imran Mulla

Purpose The Internet has been a growing source of health information on hearing loss, but the information provided often varies in quality, readability, and usability. Additionally, the information is provided across a wide range of domains, making access challenging to those who need it. This research forum article describes the development of a new website, SoundSpace Online (Ng, Archbold, Mayer, & Mulla, 2014), which aims to tackle these issues and bring together information and resources for all those concerned with hearing loss. Method The SoundSpace Online website's current developmental state was reached through the following methods: (a) discussions with a group of individuals that included experts in e-learning, education, research, and hearing loss; (b) interviews with different target groups (e.g., users, families, and professionals); and (c) collaboration with contributors. Result The website is structured to become a go-to resource on various topics related to hearing loss, providing accurate, comprehensive, and functional information and resources at varying levels of complexity for the intended users. Conclusion The literature and the range of interest have illustrated the need for an up-to-date website providing information and resources on hearing loss. Challenges include monitoring and keeping the website up to date; in this article, a plan of action is discussed. The website is currently in development, with plans for a launch in the near future.


2017 ◽  
Vol 8 (4) ◽  
pp. 23-29
Author(s):  
Rajaguru D. ◽  
Puviyarasi T. ◽  
Vengattaraman T.

The Internet of Things(IoT) such as the use of robots, sensors, actuators, electronic signalization and a variety of other internet-enabled physical devices may provide for new advanced smart applications to be used in construction in the very near future. Such applications require real-time responses and are therefore time-critical. Therefore, in order to support collaboration, control, monitoring, supply management, safety and other construction processes, they have to meet dependability requirements, including requirements for high Quality of Service (QoS). Dependability and high QoS can be achieved by using adequate number and quality of computing resources, such as processing, memory and networking elements, geographically close to the smart environments for handheld device computing (HDC).


2021 ◽  
pp. 7-19
Author(s):  
Hayder A. Naser ◽  
Alaa Thaer Lateef ◽  
Falah A. Bida ◽  
Mohammed Zorah

Internet of nano things (IoNT) is a new and modern part of the internet of things (IoT). Applications that operate in the field of nano scale show a new advantage in communication networks. IoNT opened the door to many applications in various fields with new features derived from the advantages of nanotechnology. In this work, a description of the IoNT during 2015-2021 was achieved, including taxonomy, architecture, motives, applications and challenges, in addition to recommendations. The architecture of the IoNT and the most important technologies used in Nano communication networks have been identified, with an indication of the advantages of each. This study, we hope, will make a contribution to this field of science, thus contributing to providing assistance to researchers in this emerging field and covering the challenges they face in this way. That would permit communication between nano-devices to be conventional, making these calibrations to be implemented in various IoNT applications. Until the IoNT system is designed without any problems in the near future, which if achieved, will provide great services, especially in medical applications and other applications.


Author(s):  
Sobana Sikkanan ◽  
Kasthuri M.

The internet is designed for processing and forwarding of any packet in a best effort manner. The packets carried by the internet may be malicious or not. Most of the time, internet architecture provides an unregulated path to victims. Denial-of-service (DoS) attack is the most common critical threat that causes devastating effects on the internet. The Botnet-based DoS attack aims to exhaust both the target resources and network bandwidth, thereby making the network resources unavailable for its valid users. The resources are utilized by either injecting a computer virus or flooding the network with useless traffic. This chapter provides a systematic analysis of the causes of DoS attacks, including motivations and history, analysis of different attacks, detection and protection techniques, various mitigation techniques, the limitations and challenges of DoS research areas. Finally, this chapter discusses some important research directions which will need more attention in the near future to guarantee the successful defense against DoS attacks.


Author(s):  
Zainab Salih Ageed ◽  
Awder Mohammed Ahmed ◽  
Naaman Omar ◽  
Shakir Fattah Kak ◽  
Ibrahim Mahmood Ibrahim ◽  
...  

Nanotechnology is a field of study that aims to make our lives easier, safer, and more environmentally friendly. With current upgrades and alterations to available networking and communication paradigms, incorporating Wireless Nano Sensor Networks (WNSN) with various products, sensors, and devices would introduce new network paradigms. The Internet of Nano Things is a term for this concept (IoNT), To achieve seamless interconnection between Nano networks and existing communication networks and the Internet, many topologies and communication paradigms must be developed while technological hurdles are addressed. The amount of data accessible limits how much research and decision-making can be done. This research visualizes a wide range of nanotechnology applications. The goal of this project was to show in more than way this research method may be used to information recommendation services. The routing protocol is critical in WNSN and IoNT because of the many nanoscale constraints. While ensuring the flow of data and information, this routing protocol must take into account the specific features of nanoscale communication.This research aims to provide insight into the WNSN (Wireless Nano Sensor Networks) and IoNT (The Internet of Nano Things) paradigms, as well as a detailed assessment of a large number of current routing protocols that are tailored to the characteristics and features of nano communication. Big data applications with their features and characteristics in general also use cloud computing. This paper explains different hands based on neural networks and implemented on FPGAs (which is Field-Programmable Gate Array) and other genetic algorithms and neural networks. Many more approaches and models compare.


Author(s):  
Artemis Yagou

Playful representations of history are quite widespread in various types of modern toys and games. The author of this essay focused specifically on commercially available construction sets inspired by Greek antiquity. In order to acquire an understanding of user behaviour vis à vis such playthings, she employed as sources consumer reactions published on on line marketplaces. User generated feedback that is available on the Internet clearly offers an extremely rich and relatively untapped resource for researchers of user experiences. The on line exploration was complemented by a self study of using one of these sets to construct a mini Parthenon; it was a pleasurable and rewarding activity The combined consideration of consumer comments and self study suggest that the experience of making miniature replicas of ancient buildings is mostly positive for a wide range of users, as it successfully combines entertainment with learning. At the same time, such play activities offer sufficient scope for improvisation and creativity.


2016 ◽  
Vol 17 (2) ◽  
pp. 83-93 ◽  
Author(s):  
Emad Samadaei ◽  
Seyyed Asghar Gholamian ◽  
Abdolreza Sheikholeslami ◽  
Jafar Adabi

ABSTRACT:  Multilevel inverters have been introduced as useful devices to connect between DC-AC systems. They are high quality output and cost benefit systems with a wide range of applications. Asymmetric multilevel inverters are a type of multilevel inverters with unequal DC link to create more voltage levels through fewer components. This paper presents new topologies of cascade multilevel inverter by a new module with a reduced component. Base module produces 13 levels by two types of unequal DC sources and 10 switches. Modular can be used to produce more and higher voltages levels. The designing of proposed multilevel inverter makes some preferable index with better quality than similar modular multilevel inverters, such as less semiconductors and DC sources, low switching frequency, creating of negative levels without any additional circuit, and module in cascade connections. Also, two cascade topologies are presented in the modular connections of the proposed module to achieve high and significant number of levels. Nearest level control (NLC) method as a switching technique is used in step changing levels for topologies to get more quality and lower harmonics. The presented module and cascade topologies are simulated by MATLAB/Simulink and are implemented by the experimental prototype in laboratory to validate the performance of proposed topologies in which simulated and experimental results show a good performance with the high quality output.


Author(s):  
Irina Lobacheva ◽  
◽  
Nataliya Koceruba ◽  

With the development of information systems and technologies, their spread and improvement, mankind has invented a large number of ways to make life easier with the help of the Internet and electronics. The economy is also not standing still: for example, a few years ago, online stores became very popular, offering customers a wide range of products. Thanks to them, many different economic transactions are conducted every day via the Internet. As a result, the concept of e-commerce has developed rapidly. This term means doing business on global networks. In a simpler sense - trade via the Internet. In addition to stationary stores, various companies also open online ones. As a result, such companies have the opportunity to increase competitiveness, reduce costs associated with the sale of products and provide more useful and high-quality information about goods to their customers.


Sign in / Sign up

Export Citation Format

Share Document