Cyberspace is an integration of cyber physical system components that integrates computation, networking, physical processes, embedded computers and network monitors which uses feedback loops for controlling the processes where the computations are affected by processes and vice versa. More general, cyber physical systems include all equipments operated on preprogrammed instructions ranging from simple electronic devices to the ultra-modern warfare equipments along with life saving devices. Active cyber-attacks can cause cyber warfare situations by disrupting an entire community of people, which in turn raises an emergency situation to the nation. Thus, cyber warfare is a major threat to the nation at large. In this paper, we analyze the various aspects of cyber warfare situations and a survey on ongoing attacks, defense and cyber forensics strategies in that field. Internet of Things (IoT) is an emerging computing area which enables Machine to Machine communication in cyber physical systems. An attack on IoT causes major issues to the security on the devices and thus, the various threats and attacks on IoT are analyzed here. Overall monitoring and data acquisition in cyber physical systems is done by Supervisory Control and Data Acquisition systems and are mainly targeted by the attackers in order to leave the cyberspace applications not functioning. Therefore, the various threats, attacks and research issues pertaining to the cyberspace are surveyed in this paper along with a few research issues and challenges that are to be solved in the area of cyber warfare.
相似文献A standout amongst the most dangers to the cyber security is known as Botnet since it offers a conveyed stage for many undesirable activities. From the network traffic flow, the identification of Botnet is a fundamental test. Artificial Neural Network–Particle Swarm Optimization (ANN–PSO) based botnet discovery is proposed in this paper. In this paper, ISCX dataset is utilized for botnet location. The features are classified as botnet flow and normal flow by giving the features separated from the dataset as a contribution to the grouping. For grouping, we have displayed ANN–PSO which lessens the false classification ratio and time multifaceted nature to 3.3% and 14 s. We contrast our proposed work with other existing work and demonstrate that our work is superior to anything that of alternate works in the simulation results.
相似文献The smart grid is the next-generation electrical power system that combines operations technology (OT) and information technology (IT) for the efficient generation, delivery, and consumption of electrical energy. We aim to provide a brief overview of machine to machine (M2M) communication and its history, its application in the smart grid, security issues affecting M2M data on the smart grid, and some available solutions to detect and prevent cyber threats. With the emergence of 5G networks, we also provide an introduction to this evolving technology, how the smart grid will benefit from its deployment, and some security concerns.
相似文献Advances in both telecommunications and Information technology have improved the way users do business online. Android, an open-source mobile operating system, is becoming an attractive target for cyber criminals to exploit due to its predefined permission model. Without classification, the mobile operating system permits installation of mobile applications of all kinds, including Trojans, thus making its trustworthiness into question. In this paper, we present a security system called collaborative policy-based security scheme (CSS) that permits users to customize the access permissions of Android applications during runtime. The proposed CSS security scheme validates the trustworthiness of each application before being installed. The experimental results show that the proposed CSS successfully detects all malicious applications with a run-time overhead of 2.7%.
相似文献A design methodology for level shifters voltage translators, where the output voltage ranges from 0 to 18 V, and the input voltage ranges from 2 to 5.5 V in a 0.6 µm CMOS-HV technology, is presented. This family of circuits have a special interest in the case of implantable medical devices where is common to handle previously unknown voltages either positive or negative, above or below the control logic supply VDD. Two application examples are presented: a composite switch to control negative stimuli voltage pulses, and a multi-channel programmable charge-pump voltage multiplier, aimed at charging the output capacitors of an IMD.
相似文献Wireless communication networks have much data to sense, process, and transmit. It tends to develop a security mechanism to care for these needs for such modern-day systems. An intrusion detection system (IDS) is a solution that has recently gained the researcher’s attention with the application of deep learning techniques in IDS. In this paper, we propose an IDS model that uses a deep learning algorithm, conditional generative adversarial network (CGAN), enabling unsupervised learning in the model and adding an eXtreme gradient boosting (XGBoost) classifier for faster comparison and visualization of results. The proposed method can reduce the need to deploy extra sensors to generate fake data to fool the intruder 1.2–2.6%, as the proposed system generates this fake data. The parameters were selected to give optimal results to our model without significant alterations and complications. The model learns from its dataset samples with the multiple-layer network for a refined training process. We aimed that the proposed model could improve the accuracy and thus, decrease the false detection rate and obtain good precision in the cases of both the datasets, NSL-KDD and the CICIDS2017, which can be used as a detector for cyber intrusions. The false alarm rate of the proposed model decreases by about 1.827%.
相似文献Presently employed underwater communication systems suffer from issues such as low data rates and short communication ranges. In this paper, a novel hybrid underwater intelligent communication system is proposed and modeled to address both issues. The proposed system provides higher data rate, longer communication range and secure data transmission by employing optical fiber, underwater free space optics (UFSO) and free space optics (FSO). An intelligent routing mechanism governed by Tabu search (TS) algorithm is used for optical path selection based on data traffic, data rate and communication length to maintain a desired quality of service (QoS) while ensuring security of data transmission. For, modeling, optical fiber channel, priority aware (PA) scheduling algorithm for packet-switched optical network (PSON) for data transmission is used whereas for the FSO channel modeling, orthogonal frequency division multiplexing (OFDM) and On–Off Keying (OOK) are used.To simulate underwater turbulent conditions for UFSO channel, scintillation model with gamma-gamma distribution (GGD) is applied. A data rate of 10 Gbps with BER of 10–9 has been achieved for communication ranges of 140 and 200 m for the cases of turbulent and non-turbulent water conditions. In each of the cases, QoS meeting IEEE standards is ensured.
相似文献Communication in Terahertz (THz) band is envisioned as a promising technology to meet the ever-growing data rate demand, and to enable new applications in both nano-scale and macro-scale wireless paradigms. In this study, we propose the first system-level design that is suitable for THz communication in macro-scale range with 100+ Gbps data rate. The design is based on the proposed terahertz pulse-level beam-switching with energy control (TRPLE), and motivated by the rise in Graphene-based electronics, which include not only compact generator and detector for pulse communication, but also the capability of beam scanning aided with nano-antenna-arrays. The very high path loss seen in THz wireless channel requires the use of narrow beam to reach longer transmission ranges. On the other hand, impulse radio that emits femtosecond-long pulses allows the beam direction to steer at pulse-level, rather than at packet-level. For TRPLE, we mathematically analyze the data rate for an arbitrary wireless link under the THz channel characteristics and the energy modulation scheme. Then, a novel optimization model is formulated to solve the parameters of the inter-pulse separation and the inter-symbol separation, in order to maximize the data rate while meeting the interference requirement. With the optimization, the data rate of 167 Gbps is shown achievable for most users in 20-m range. A MAC protocol framework is then presented to harness the benefits of the pulse separation optimization.
相似文献In wireless sensor networks, the overlapped sub-regions (faces) are generated due to the intersections among the sensing ranges of nodes. The faces play a significant role in solving the three problems k-coverage (i.e., all the points in the interested field should be covered by at least k active nodes while maintaining connectivity between all active nodes), coverage scheduling and cover sets. To find the faces and discover their coverage degrees, this article presents a distributed algorithm that runs in three steps. First, a colored graph called Intersection Points Colored Graph (IPCG) is proposed, in which the vertices are defined by the range-intersections of nodes-devices and are colored according to the position of these intersections in relation to the ranges of the nodes. The vertex that located on perimeter of the node’s range is colored by red, while the green vertex is an intersection of two ranges inside the range of a third node. The edge that joins two red vertices is colored by red and the edge that joins two green vertices is colored by green while the edge that joins two distinct colored vertices is colored by blue. Second, based on their properties and distinct features, the faces in IPCG are classified into five classes (simple, negative, red, green and positive). Third, based on faces classification, the Three Colored Trees algorithm is proposed to extract the faces in linear time in terms of the number of vertices and edges in IPCG.
相似文献Coverage of the bounded region gets importance in Wireless Sensor Network (WSN). Area coverage is based on effective surface coverage with a minimum number of sensor nodes. Most of the researchers contemplate the coverage region of interest as a square and manifest the radio ranges as a circle. The area of a circle is much higher than the area of a square because of the perimeter. To utilize the advantage of the circle, the coverage region of interest is presumed as a circle for sensor node deployment. This paper proposes a novel coverage improved disc shape deployment strategy. Comparative analysis has been observed between circle and square regions of interest based on the cumulative number of sensor nodes required to cover the entire region. A new strategy named as disc shape deployment strategy is also proposed. Traditional hexagon and strip-based deployment strategies are compared with the disc shape deployment strategy. The simulation result shows that the circle shape coverage region of interest extremely reduces the required number of sensor nodes. The proposed deployment strategy provides desirable coverage, and it requires few more sensor nodes than hexagon shape deployment strategy.
相似文献In this work a novel inductive tuning technique for millimeter wave (mmw) applications is presented. Fine frequency tuning is performed using a transformer. For the LC tanks inductive element, transformer is used. To tune the VCO MOS switch is placed at center tapping of the secondary coil of the transformer. The simulation shows that by changing the operating condition of MOS switch frequency band from 59.1 GHz to 64.6 GHz is obtained. The proposed 60 GHz VCO is designed using UMC 65 nm CMOS single Poly eight Metal (1P8M) Technology. Obtained Frequency Tuning Range (FTR) is 8.89% and the corresponding phase noise variation is from ???112.4 dBc/Hz to ???115.9 dBc/Hz at 10 MHz offset from the carrier. The worst phase noise value is ???112.4 dBc/Hz which is obtained at 0.3 V tuning voltage. For 0.8 V supply voltage 7.44 mW of power is dissipated. And the calculated Figure of Merit (FOM) for whole FTR, ranges from ???179.89 dBc/Hz to ???182.62 dBc/Hz.
相似文献Internet of Things (IoT) and its applications are the most popular research areas at present. The characteristics of IoT on one side make it easily applicable to real-life applications, whereas on the other side expose it to cyber threats. Denial of Service (DoS) is one of the most catastrophic attacks against IoT. In this paper, we investigate the prospects of using machine learning classification algorithms for securing IoT against DoS attacks. A comprehensive study is carried on the classifiers which can advance the development of anomaly-based intrusion detection systems (IDSs). Performance assessment of classifiers is done in terms of prominent metrics and validation methods. Popular datasets CIDDS-001, UNSW-NB15, and NSL-KDD are used for benchmarking classifiers. Friedman and Nemenyi tests are employed to analyze the significant differences among classifiers statistically. In addition, Raspberry Pi is used to evaluate the response time of classifiers on IoT specific hardware. We also discuss a methodology for selecting the best classifier as per application requirements. The main goals of this study are to motivate IoT security researchers for developing IDSs using ensemble learning, and suggesting appropriate methods for statistical assessment of classifier’s performance.
相似文献