scholarly journals New Detection Paradigms to Improve Wireless Sensor Network Performance under Jamming Attacks

Sensors ◽  
2019 ◽  
Vol 19 (11) ◽  
pp. 2489 ◽  
Author(s):  
Carolina Del-Valle-Soto ◽  
Carlos Mex-Perera ◽  
Ivan Aldaya ◽  
Fernando Lezama ◽  
Juan Arturo Nolazco-Flores ◽  
...  

In this work, two new self-tuning collaborative-based mechanisms for jamming detection are proposed. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism. The first one detects jamming by comparing the performance parameters with respect to directly connected neighbors by interchanging packets with performance metric information, whereas the latter, jamming detection relays comparing defined zones of nodes related with a collector node, and using information of this collector detects a possible affected zone. The effectiveness of these techniques were tested in simulated environment of a quadrangular grid of 7 × 7, each node delivering 10 packets/sec, and defining as collector node, the one in the lower left corner of the grid. The jammer node is sending packets under reactive jamming. The mechanism was implemented and tested in AODV (Ad hoc On Demand Distance Vector), DSR (Dynamic Source Routing), and MPH (Multi-Parent Hierarchical), named AODV-M, DSR-M and MPH-M, respectively. Results reveal that the proposed techniques increase the accurate of the detected zone, reducing the detection of the affected zone up to 15% for AODV-M and DSR-M and up to 4% using the MPH-M protocol.


2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772569 ◽  
Author(s):  
Liang Pang ◽  
Xiao Chen ◽  
Yong Shi ◽  
Zhi Xue ◽  
Rida Khatoun

In vehicular ad hoc network, wireless jamming attacks are easy to be launched in the control channel and can cause serious influence on the network performance which may cause further safety accidents. In order to address the issue of wireless jamming attacks, a new technique which localizes the jamming attackers and prevents vehicles from jamming through human intervention is proposed. In this article, we propose a range-free approach to localize the source of the attacker and determine the number of jamming attackers. The data set is the locating information and the jamming detection information associated with each vehicle. Then, we formulate the problem of determining the number of attackers as a multiclass detection problem. We define the incorrectly classified area and use it to measure the distance between samples and centroids in fuzzy c-means algorithm. We further determine the number of jamming attackers through the coverage rate of beaconing circles and utilize weight-based fuzzy c-means to classify the data set. When the data set is classified as acceptable, we further explore the means of using particle swarm optimization algorithm to calculate the positional coordinates of each attacker. We simulate our techniques in MATLAB, and both urban traffic area and open area are considered in our simulation. The experimental results suggest that the proposed algorithm can achieve high precision when determining the number of attackers while the result of the classified performance is always satisfying. Our localization results lead to higher accuracy than other existing solutions. Also, when the data set is limited, the chances of taking accurate localization are higher than other measures.



2016 ◽  
Vol 7 (4) ◽  
pp. 72 ◽  
Author(s):  
Carlos Cambra ◽  
Sandra Sendra ◽  
Jaime Lloret ◽  
Lorena Parra

Intelligent Unmanned Aerial Vehicles (UAVs) on emergency rescue is widely used to detect injured mountaineers in inaccessible areas. These systems should satisfied several features. On the one hand, it is important to know the georeference of the injured mountaineers. It is also important to have real-time images of the situation and the area where people have been hilly. For this reasons, in this paper, we present the development of a UAV integrated within a wireless ad hoc network and a communication protocol able to transfer between several UAV’s and Smartphones working with Android OS. This paper also shows how to extend the concept of ad hoc network on Smartphones to extend wireless coverage for emergency situations in critical areas without GSM cellular coverage. After developing our system, we have focused our effort on demonstrating the correct operation of our UAV and its network performance when the system is used to track within a zone. Experimental results show the big potential of this kind of networks working on hostile terrain such as big mountains, ravines and river canyons without GSM signal communication.



Author(s):  
Alexander Meisel

Until recently, the clinical management of cancer heavily relied on anatomical and histopathological criteria, with ad hoc guidelines directing the therapeutic choices in specific indications. In the last years, the development and therapeutic implementation of novel anticancer therapies significantly improved the clinical outcome of cancer patients. Nonetheless, such cutting-edge approaches revealed the limitation of the one-size-fits-all paradigm. The newly discovered molecular targets can be exploited either as bona fide targets for subsequent drug development, or as tools to precision medicine, in the form of prognostic and/or predictive biomarkers. This article provides an overview of some of the most recent advances in precision medicine in oncology, with a focus on novel tissue-agnostic anticancer therapies. The definition and implementation of biomarkers and companion diagnostics in clinical trials and clinical practice are also discussed, as well as the changing landscape in clinical trial design.



2009 ◽  
Vol 28 (9) ◽  
pp. 2210-2212
Author(s):  
Yang TAO ◽  
Tao SUN ◽  
Jian WANG


2020 ◽  
Vol 36 (S1) ◽  
pp. 37-37
Author(s):  
Americo Cicchetti ◽  
Rossella Di Bidino ◽  
Entela Xoxi ◽  
Irene Luccarini ◽  
Alessia Brigido

IntroductionDifferent value frameworks (VFs) have been proposed in order to translate available evidence on risk-benefit profiles of new treatments into Pricing & Reimbursement (P&R) decisions. However limited evidence is available on the impact of their implementation. It's relevant to distinguish among VFs proposed by scientific societies and providers, which usually are applicable to all treatments, and VFs elaborated by regulatory agencies and health technology assessment (HTA), which focused on specific therapeutic areas. Such heterogeneity in VFs has significant implications in terms of value dimension considered and criteria adopted to define or support a price decision.MethodsA literature research was conducted to identify already proposed or adopted VF for onco-hematology treatments. Both scientific and grey literature were investigated. Then, an ad hoc data collection was conducted for multiple myeloma; breast, prostate and urothelial cancer; and Non Small Cell Lung Cancer (NSCLC) therapies. Pharmaceutical products authorized by European Medicines Agency from January 2014 till December 2019 were identified. Primary sources of data were European Public Assessment Reports and P&R decision taken by the Italian Medicines Agency (AIFA) till September 2019.ResultsThe analysis allowed to define a taxonomy to distinguish categories of VF relevant to onco-hematological treatments. We identified the “real-world” VF that emerged given past P&R decisions taken at the Italian level. Data was collected both for clinical and economical outcomes/indicators, as well as decisions taken on innovativeness of therapies. Relevant differences emerge between the real world value framework and the one that should be applied given the normative framework of the Italian Health System.ConclusionsThe value framework that emerged from the analysis addressed issues of specific aspects of onco-hematological treatments which emerged during an ad hoc analysis conducted on treatment authorized in the last 5 years. The perspective adopted to elaborate the VF was the one of an HTA agency responsible for P&R decisions at a national level. Furthermore, comparing a real-world value framework with the one based on the general criteria defined by the national legislation, our analysis allowed identification of the most critical point of the current national P&R process in terms ofsustainability of current and future therapies as advance therapies and agnostic-tumor therapies.



Electronics ◽  
2021 ◽  
Vol 10 (14) ◽  
pp. 1635
Author(s):  
Neeraj Chugh ◽  
Geetam Singh Tomar ◽  
Robin Singh Bhadoria ◽  
Neetesh Saxena

To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation of a sophisticated security mechanism requires a large number of network resources that degrade network performance. In addition, routing protocols designed for MANETs should be energy efficient in order to maximize network performance. In line with this view, this work proposes a new hybrid method called the data-driven zone-based routing protocol (DD-ZRP) for resource-constrained MANETs that incorporate anomaly detection schemes for security and energy awareness using Network Simulator 3. Most of the existing schemes use constant threshold values, which leads to false positive issues in the network. DD-ZRP uses a dynamic threshold to detect anomalies in MANETs. The simulation results show an improved detection ratio and performance for DD-ZRP over existing schemes; the method is substantially better than the prevailing protocols with respect to anomaly detection for security enhancement, energy efficiency, and optimization of available resources.



Author(s):  
Ashutosh Srivastava ◽  
Sachin Kumar Gupta ◽  
Mohd Najim ◽  
Nitesh Sahu ◽  
Geetika Aggarwal ◽  
...  

AbstractMobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.



Author(s):  
Juan P. Martínez ◽  
Inmaculada Méndez ◽  
Esther Secanilla ◽  
Ana Benavente ◽  
Julia García Sevilla

Starting from previous studies in professional caregivers of people with dementia and other diseases in institutionalized centers of different regions, the aim of this study was to compare burnout levels that workers present depending on the center, to create a caregiver profile with high professional accomplishment and to describe the quality of life that residents perceive Murcia and Barcelona. The instruments used were the Maslach Burnout Inventory (MBI), the Professional Caregiver Survey developed ad hoc and the Brief Questionnaire of Quality of Life (CUBRECAVI in Spanish) on residents. The results show, on the one hand, that levels of professional accomplishment may be paradoxically higher in the case of catastrophe and, on the other hand, the 98.2% of users are satisfied with the residence in which is located and 81.8% with the manner in which occupy the time. The conclusions that are extrapolated from the study shed light on the current situation of workers and residents and the influence that an earthquake can have on them.



Sign in / Sign up

Export Citation Format

Share Document