scholarly journals Resilient Green Cellular IoT for Landslide Monitoring Using Voice Channels

2021 ◽  
Vol 10 (3) ◽  
pp. 59
Author(s):  
Sangeeth Kumar ◽  
Subhasri Duttagupta ◽  
Venkat P. Rangan

A wide-scale outdoor remote deployment involves a large number of low-cost nodes that are powered by green energy, such as solar. We deal with such a system for landslide monitoring where the tiny nodes with ultra-low memory as little as 2 KB are directly connected to the Internet using cellular networks, thereby constituting Cellular IoT’s (C-IoT). This makes them vulnerable to a wide range of Denial of Service (DoS) attacks during their collaborative communications. Further, due to memory constraints, the nodes are not able to run resource-hungry security algorithms. Existing IoT protocols also cannot offer resiliency to DoS attacks for these memory-constrained devices. This paper proposes the Voice Response Internet of Things (VRITHI), which addresses the above issues by using the voice channel between the nodes. To the best of our knowledge, this is the first solution in the IoT domain where both the voice and data channels are being used for collaborative communications. Evaluation results demonstrate that VRITHI is able to reduce external DoS attacks from 82–65% to less than 28% and improves real-time communications in such a memory-constrained environment. In addition, it also contributes to green IoT energy saving by more than 50% in comparison with other IoT protocols.

The emergence of sensor networks as one of the dominant technology trends in the coming decades has posed numerous unique challenges on their security to researchers. These networks are likely to be composed of thousands of tiny sensor nodes, which are low-cost devices equipped with limited memory, processing, radio, and in many cases, without access to renewable energy resources. While the set of challenges in sensor networks are diverse, we focus on security of Wireless Sensor Network in this paper. First, we propose some of the security goal for Wireless Sensor Network. To perform any task in WSN, the goal is to ensure the best possible utilization of sensor resources so that the network could be kept functional as long as possible. In contrast to this crucial objective of sensor network management, a Denial of Service (DoS) attack targets to degrade the efficient use of network resources and disrupts the essential services in the network. DoS attack could be considered as one of th


2020 ◽  
Author(s):  
Lavinia Tunini ◽  
David Zuliani ◽  
Paolo Fabris ◽  
Marco Severin

<p>The Global Navigation Satellite Systems (GNSS) provide a globally extended dataset of primordial importance for a wide range of applications, such as crustal deformation, topographic measurements, or near surface processes studies. However, the high costs of GNSS receivers and the supporting software can represent a strong limitation for the applicability to landslide monitoring. Low-cost tools and techniques are strongly required to face the plausible risk of losing the equipment during a landslide event.</p><p>Centro di Ricerche Sismologiche (CRS) of Istituto Nazionale di Oceanografia e di Geofisica Sperimentale OGS in collaboration with SoluTOP, in the last years, has developed a cost-effective GNSS device, called LZER0, both for post-processing and real-time applications. The aim is to satisfy the needs of both scientific and professional communities which require low-cost equipment to increase and improve the measurements on structures at risk, such as landslides or buildings, without losing precision.</p><p>The landslide monitoring system implements single-frequency GNSS devices and open source software packages for GNSS positioning, dialoguing through Linux shell scripts. Furthermore a front-end web page has been developed to show real-time tracks. The system allows measuring real-time surface displacements with a centimetre precision and with a cost ten times minor than a standard RTK GPS operational system.</p><p>This monitoring system has been tested and now applied to two landslides in NE- Italy: one near Tolmezzo municipality and one near Brugnera village. Part of the device development has been included inside the project CLARA 'CLoud plAtform and smart underground imaging for natural Risk Assessment' funded by the Italian Ministry of Education, University and Research (MIUR).</p>


Author(s):  
K. SUBBA RAO ◽  
N. PRAGINA

To access multimedia data mobile users like to use their own consumer electronic devices anywhere and at anytime . Hence, we expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. The data flooding attack causes Denial of Service (DoS) attacks by flooding many data packets. However, there are a few existing defense systems against data flooding attacks. Moreover, the existing schemes may not guarantee the Quality of Service (QoS) of burst traffic since multimedia data are usually burst. Therefore, we propose a novel defense mechanism against data flooding attacks with the aim of enhancing the throughput. The simulation results show that the proposed scheme enhances the throughput of burst traffic.


Author(s):  
H. H. Ibrahim ◽  
A. E. Hamzah ◽  
H. A. Saeed ◽  
H. H. Qasim ◽  
O. S. Hamed ◽  
...  

With the dramatic evolution in networks nowadays, an equivalent growth of challenges has been depicted toward implementing and deployment of such networks. One of the serious challenges is the security where wide range of attacks would threat these networks. Denial-of-Service (DoS) is one of the common attacks that targets several types of networks in which a huge amount of information is being flooded into a specific server for the purpose of turning of such server. Many research studies have examined the simulation of networks in order to observe the behavior of DoS. However, the variety of its types hinders the process of configuring the DoS attacks. In particular, the Distributed DoS (DDoS) is considered to be the most challenging threat to various networks. Hence, this paper aims to accommodate a comprehensive simulation in order to figure out and detect DDoS attacks. Using the well-known simulator technique of NS-2, the experiments showed that different types of DDoS have been characterized, examined and detected. This implies the efficacy of the comprehensive simulation proposed by this study.


2016 ◽  
Vol 2016 ◽  
pp. 1-16 ◽  
Author(s):  
Iman Almomani ◽  
Bassam Al-Kasasbeh ◽  
Mousa AL-Akhras

Wireless Sensor Networks (WSN) have become increasingly one of the hottest research areas in computer science due to their wide range of applications including critical military and civilian applications. Such applications have created various security threats, especially in unattended environments. To ensure the security and dependability of WSN services, an Intrusion Detection System (IDS) should be in place. This IDS has to be compatible with the characteristics of WSNs and capable of detecting the largest possible number of security threats. In this paper a specialized dataset for WSN is developed to help better detect and classify four types of Denial of Service (DoS) attacks: Blackhole, Grayhole, Flooding, and Scheduling attacks. This paper considers the use of LEACH protocol which is one of the most popular hierarchical routing protocols in WSNs. A scheme has been defined to collect data from Network Simulator 2 (NS-2) and then processed to produce 23 features. The collected dataset is called WSN-DS. Artificial Neural Network (ANN) has been trained on the dataset to detect and classify different DoS attacks. The results show that WSN-DS improved the ability of IDS to achieve higher classification accuracy rate. WEKA toolbox was used with holdout and 10-Fold Cross Validation methods. The best results were achieved with 10-Fold Cross Validation with one hidden layer. The classification accuracies of attacks were 92.8%, 99.4%, 92.2%, 75.6%, and 99.8% for Blackhole, Flooding, Scheduling, and Grayhole attacks, in addition to the normal case (without attacks), respectively.


2019 ◽  
Vol 9 (1) ◽  
pp. 7 ◽  
Author(s):  
Cesar Chaves ◽  
Siavoosh Azad ◽  
Thomas Hollstein ◽  
Johanna Sepúlveda

Denial of Service (DoS) attacks are an increasing threat for Multiprocessor System-on-Chip (MPSoC) architectures. By exploiting the shared resources on the chip, an attacker is able to prevent completion or degrade the performance of a task. This is extremely dangerous for MPSoCs used in critical applications. The Network-on-Chip (NoC), as a central MPSoC infrastructure, is exposed to this attack. In order to maintain communication availability, NoCs should be enhanced with an effective and precise attack detection mechanism that allows the triggering of effective attack mitigation mechanisms. Previous research works demonstrate DoS attacks on NoCs and propose detection methods being implemented in NoC routers. These countermeasures typically led to a significantly increased router complexity and to a high degradation of the MPSoC’s performance. To this end, we present two contributions. First, we provide an analysis of information that helps to narrow down the location of the attacker in the MPSoC, achieving up to a 69% search space reduction for locating the attacker. Second, we propose a low cost mechanism for detecting the location and direction of the interference, by enhancing the communication packet structure and placing communication degradation monitors in the NoC routers. Our experiments show that our NoC router architecture detects single-source DoS attacks and determines, with high precision, the location and direction of the collision, while incurring a low area and power overhead.


2021 ◽  
pp. 096100062110165
Author(s):  
Mohammadhiwa Abdekhoda ◽  
Fatemeh Ranjbaran ◽  
Asghar Sattari

This study was conducted with the aim of evaluating the role of information and information resources in the awareness, control, and prevention of COVID-19. This study was a descriptive-analytical survey in which 450 participants were selected for the study. The data collection instrument was a researcher-made questionnaire. Descriptive and inferential statistics were used to analyze the data through SPSS. The findings show that a wide range of mass media has become well known as information resources for COVID-19. Other findings indicate a significant statistical difference in the rate of using information resources during COVID-19 based on age and gender; however, this difference is not significant regarding the reliability of information resources with regard to age and gender. Health information has an undisputable role in the prevention and control of pandemic diseases such as COVID-19. Providing accurate, reliable, and evidence-based information in a timely manner for the use of resources and information channels related to COVID-19 can be a fast and low-cost strategic approach in confronting this disease.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Maria Elena Antinori ◽  
Marco Contardi ◽  
Giulia Suarato ◽  
Andrea Armirotti ◽  
Rosalia Bertorelli ◽  
...  

AbstractMycelia, the vegetative part of fungi, are emerging as the avant-garde generation of natural, sustainable, and biodegradable materials for a wide range of applications. They are constituted of a self-growing and interconnected fibrous network of elongated cells, and their chemical and physical properties can be adjusted depending on the conditions of growth and the substrate they are fed upon. So far, only extracts and derivatives from mycelia have been evaluated and tested for biomedical applications. In this study, the entire fibrous structures of mycelia of the edible fungi Pleurotus ostreatus and Ganoderma lucidum are presented as self-growing bio-composites that mimic the extracellular matrix of human body tissues, ideal as tissue engineering bio-scaffolds. To this purpose, the two mycelial strains are inactivated by autoclaving after growth, and their morphology, cell wall chemical composition, and hydrodynamical and mechanical features are studied. Finally, their biocompatibility and direct interaction with primary human dermal fibroblasts are investigated. The findings demonstrate the potentiality of mycelia as all-natural and low-cost bio-scaffolds, alternative to the tissue engineering systems currently in place.


Polymers ◽  
2021 ◽  
Vol 13 (11) ◽  
pp. 1807
Author(s):  
Estefanía Álvarez-Castillo ◽  
José Manuel Aguilar ◽  
Carlos Bengoechea ◽  
María Luisa López-Castejón ◽  
Antonio Guerrero

Composite materials based on proteins and carbohydrates normally offer improved water solubility, biodegradability, and biocompatibility, which make them attractive for a wide range of applications. Soy protein isolate (SPI) has shown superabsorbent properties that are useful in fields such as agriculture. Alginate salts (ALG) are linear anionic polysaccharides obtained at a low cost from brown algae, displaying a good enough biocompatibility to be considered for medical applications. As alginates are quite hydrophilic, the exchange of ions from guluronic acid present in its molecular structure with divalent cations, particularly Ca2+, may induce its gelation, which would inhibit its solubilization in water. Both biopolymers SPI and ALG were used to produce composites through injection moulding using glycerol (Gly) as a plasticizer. Different biopolymer/plasticizer ratios were employed, and the SPI/ALG ratio within the biopolymer fraction was also varied. Furthermore, composites were immersed in different CaCl2 solutions to inhibit the amount of soluble matter loss and to enhance the mechanical properties of the resulting porous matrices. The main goal of the present work was the development and characterization of green porous matrices with inhibited solubility thanks to the gelation of alginate.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Duy Tung Phan ◽  
Chang Won Jung

AbstractAn electromagnetic pulse (EMP) with high energy can damage electronic equipment instantly within a wide range of thousands of kilometers. Generally, a metal plate placed inside a thick concrete wall is used against an EMP, but it is not suitable for an EMP shielding window, which requires not only strong shielding effectiveness (SE) but also optical transparency (OT). In this paper, we propose a very thin and optically transparent structure with excellent SE for EMP shielding window application. The proposed structure consists of a saltwater layer held between two glass substrates and two metal mesh layers on the outside of the glass, with a total thickness of less than 1.5 cm. The SE and OT of the structure are above 80 dB and 45%, respectively, which not only meet the requirement of EMP shielding for military purposes but also retain the procedure of good observation. Moreover, the OT of the structure can be significantly improved using only one metal mesh film (MMF) layer, while the SE is still maintained high to satisfy the required SE for home applicants. With the major advantages of low cost, optical transparency, strong SE, and flexible performance, the proposed structure can be considered a good solution for transparent EMP shielding windows.


Sign in / Sign up

Export Citation Format

Share Document