Filters
total: 11929
-
Catalog
- Publications 6546 available results
- Journals 757 available results
- Conferences 412 available results
- Publishing Houses 2 available results
- People 299 available results
- Inventions 2 available results
- Projects 18 available results
- Laboratories 1 available results
- Research Equipment 4 available results
- e-Learning Courses 301 available results
- Events 59 available results
- Offers 1 available results
- Open Research Data 3527 available results
displaying 1000 best results Help
Search results for: AUTONOMOUS NODES, GAME THEORY, IEEE 802.11, QUALITY OF SERVICE (QOS) SECURITY, SELFISH ATTACKS, WIRELESS NETWORKS
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublicationQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Sylwester Kaczmarek dr hab. inż.
PeopleSylwester Kaczmarek received his M.Sc in electronics engineering, Ph.D. and D.Sc. in switching and teletraffic science from the Gdansk University of Technology, Gdansk, Poland, in 1972, 1981 and 1994, respectively. His research interests include: IP QoS and GMPLS and SDN networks, switching, QoS routing, teletraffic, multimedia services and quality of services. Currently, his research is focused on developing and applicability...
-
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
PublicationIn wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...
-
Sławomir Jerzy Ambroziak dr hab. inż.
PeopleSławomir J. Ambroziak was born in Poland, in 1982. He received the M.Sc., Ph.D. and D.Sc. degrees in radio communication from Gdańsk University of Technology (Gdańsk Tech), Poland, in 2008, 2013, and 2020 respectively. Since 2008 he is with the Department of Radiocommunication Systems and Networks of the Gdańsk Tech: 2008-2013 as Research Assistant, 2013-2020 as Assistant Professor, and since 2020 as Associate Professor. He is...
-
Traffic Remapping Attacks in Ad Hoc Networks
PublicationAd hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...
-
Quality of service games in an IEEE 802.11 ad hoc wireless LAN
PublicationW pracy wykazano, że gdy wymaganie na minimalną przepływnośc stacji przekracza wielkość wyznaczoną przez punkt optimum w sensie Pareto, okazjonalna egoistyczna konfiguracja MAC pozwala stacjom uczestniczyć w grze typu kolejkowego, w której wypłatą jest uzyskana przepływność. Zaprezentowano przykładowe scenariusze takiej gry oraz dokonano jej analizy przy pomocy modelu gry stochastycznej, wykazując istnienie punktu równowagi oraz...
-
Józef Woźniak prof. dr hab. inż.
PeopleProfessor Józef Woźniak received his M.Sc., Ph.D. and D.Sc. degrees in electronics and telecommunications from the Faculty of Electronics, Gdańsk University of Technology (GUT), Poland, in 1971, 1976 and 1991, respectively. In January 2002 he became a full professor. In 1993 he was elected Associate Dean of the Faculty of Electronics and in 1994 he was he was appointed a Professor at GUT. Simultaneously, from October 1994 till...
-
QoS-sensitive selfish behavior in ad hoc wireless lans: a stochastic game model
PublicationRozważany jest prosty model stacji sieci bezprzewodowej wprowadzają-cych ruch elastyczny przy wymaganiu minimalnej przepływności. Każda stacja, okresowo przełączając się na egoistyczną konfigurację MAC, próbuje wyeliminować inne stacje z ubiegania się o pasmo sieci. Dla powstającej w ten sposób gry zastosowano model gry markowowskiej i pokazano istnienie symetrycznego punktu równowagi strategicznej.
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublicationHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Performance of FAN conception of traffic control in IP QoS networks
PublicationIn this paper we present the architectural implementation of Flow Aware Networking (FAN), a new approach for realizing QoS guarantees in the Internet. We also propose FAN traffic control algorithm which performs traffic control on flow level. Using the proposed FAN node model, we conduct simulation research to prove if FAN can be a new approach for realizing QoS guarantees. The basis of this research is finding a way to guarantee...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublicationWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks
PublicationThe paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...
-
Assessment of Connectivity-based Resilience to Attacks Against Multiple Nodes in SDNs
PublicationIn Software Defined Networks (SDNs), the control plane of a network is decoupled from its data plane. For scalability and robustness, the logically centralized control plane is implemented by physically placing different controllers throughout the network. The determination of the number and placement of controllers is known as the Controller Placement Problem (CPP). In the regular (i.e., failure-free) state, the control plane...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublicationThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Trust Management Method for Wireless Sensor Networks
PublicationA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Evaluation of IEEE 802.11E extensions for quality of service
PublicationZaprezentowano założenia wersji "e" standardu 802.11, wspierającej obsługę zróżnicowanych, pod względem potrzeb QoS, strumień ruchu. Przeprowadzono różnorodne badania symulacyjne dla opcji EDCF oraz HCF tego standardu. Wskazano na mankamenty oraz zalety nowych rozwiązań.
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublicationMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
A station strategy to deter backoff attacks in IEEE 802.11 LANs
PublicationDla konstrukcji strategii zapobiegającej atakom na mechanizm odczekania w sieciach lokalnych IEEE 802.11 zastosowano wybór konfiguracji MAC sterowany przez liczniki etapów gry z losowymi wartościami początkowymi. Wykazano, że przy pewnych warunkach nałożonych na rozkady prawdopodobieństwa liczników standardowe ustawienia parametrów MAC stają się punktem doskonałej równowagi strategicznej.
-
IEEE Antennas and Wireless Propagation Letters
Journals -
New Tool for Examining QoS in the VToIP Service
PublicationThis paper is dedicated to the subject of measuring QoS in the Video Telephony over IP (VToIP) service. QoS measurement models in general and then models designed specifically for measuring QoS in the VToIP service are presented. A new numerical tool for examining the quality of VToIP video streams VToIP is described. The tool’s functionality is then put to the test in a number of analysis scenarios. The results and insights gained...
-
Service-based Resilience for Embedded IoT Networks
PublicationEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
MAC-layer vulnerabilities of IEEE 802.11 wireless networks
PublicationDla sieci bezprzewodowych pracujących według standardu IEEE 802.11 przeprowadzono analizę symulacyjną i badania pomiarowe w specjalnie zestawionej konfiguracji w celu określenia rozdziału pasma transmisyjnego pomiędzy stacje uczciwe i stacje atakujące wybrane mechanizmy protokołu MAC.
-
Measures of region failure survivability for wireless mesh networks
PublicationWireless mesh networks (WMNs) are considered as a promising alternative to wired local, or metropolitan area networks. However, owing to their exposure to various disruptive events, including natural disasters, or human threats, many WMN network elements located close to the failure epicentre are frequently in danger of a simultaneous failure, referred to as a region failure. Therefore, network survivability, being the ability...
-
Piotr Rajchowski dr inż.
PeoplePiotr Rajchowski (Member, IEEE) was born in Poland, in 1989. He received the E.Eng., M.Sc., and Ph.D. degrees in radio communication from the Gdańsk University of Technology (Gdańsk Tech), Poland, in 2012, 2013, and 2017, respectively. Since 2013, he has been working at the Department of Radiocommunication Systems and Networks, Faculty of Electronics, Telecommunications and Informatics, Gdańsk University of Technology, as a IT...
-
Service restoration in survivable networks under attacks
PublicationW artykule dokonano porównania jakości odtwarzania usług w przeżywalnych sieciach optycznych, uszkadzanych w wyniku awarii fizycznych oraz na skutek ataków. Przeanalizowano wariant ochrony ścieżek ('path protection') poprzez wyznaczane zawczasu ścieżki zabezpieczające. Z uwagi na NP-zupełność problemu optymalizacji doboru tras w przeżywalnych sieciach optycznych, zaproponowano efektywny algorytm heurystyczny SCNDP. Autorski symulator...
-
Determining QoS in the Video Telephony Service in an IP Environment
PublicationIP networks are indispensable nowadays. They are among the most efficient platforms. The constantly growing number of users and new services in these networks - the largest being the Internet - requires a good quality of any application used.Determining the QoS in real-time services is particularly important. This work is dedicated to exactly this aspect of the real-time service Video Telephony over IP (VToIP). First, the ITU-T...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Guessing Intrinsic Forwarding Trustworthiness of Wireless Ad Hoc Network Nodes
PublicationA novel node misbehavior detection system called GIFTED is proposed for a multihop wireless ad hoc network (WAHN) whose nodes may selfishly refuse to forward transit packets. The system guesses the nodes’ intrinsic forwarding trustworthiness (IFT) by analyzing end-to-end path performance rather than utilizing unreliable and incentive incompatible low-layer mechanisms. It can work with occasional IFT jumps, directional antennae,...
-
Self-Organizing Wireless Nodes Monitoring Network
PublicationThe concept of data monitoring system and self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the wireless monitoring system for containers, and the second is the mobile monitoring system for gas air pollution measurements.
-
Service restoration in survivable networks under malicious attacks
PublicationW artykule przedstawiono porównanie jakości odtwarzania usług w przeżywalnych sieciach optycznych poddanych awariom losowym oraz celowym działaniom niszczącym (atakom). Założenia odnośnie przeżywalności są następujące: ochrona od krańca do krańca, rozłączność węzłowa każdej pary ścieżek: aktywnej i zabezpieczającej.Z powodu NP-zupełności problemu przeżywalnego doboru tras i przydziału długości fali w sieciach optycznych, zaproponowano...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
End-to-end service survivability under attacks on networks
PublicationW artykule zaproponowano model znajdowania przeżywalnych i odpornych na ataki połączeń od końca do końca dla sieci o topologii bezskalowej. Głównymi założeniami są: zróżnicowanie sposobu zapewniania przeżywalności połączeń w zależności od klasy ruchu oraz omijanie przez ścieżki aktywne węzłów, narażonych na ataki (tzw. centrów). Wprowadzono nową metrykę dla wyznaczania ścieżek, proporcjonalną do wymaganej jakości obsługi połączeń,...
-
Communication Networks in the Service of the Environmental Monitoring
PublicationIn the paper selected issues relating to communication networks in the services of the environmental monitoring (EM) have been described. It is divided into three main parts: introduction, wire and wireless networks. At the beginning of the basic definitions were explained. The wire part focuses on a plain old telephone service (POTS), an integrated services digital network (ISDN), a digital subscriber line (DSL) and a fiber-optic...
-
Interworking and Cross-layer Service Discovery Extensions for IEEEE802.11s Wireless Mesh Standard
PublicationWith the rapid popularization of mobile end-user electronic devices wireless network technologies begin to play a crucial role as networks access technologies. While classic point-to-multipoint wireless access systems, based on fixed infrastructure of base stations providing access to clients, remain the main most popular solution, an increasing attention is devoted to wireless mesh systems, where each connecting client can extend...
-
Influence of the jitter buffer on the quality of service VoIP.
PublicationVoIP (Voice over IP) is a modern service with enormous potential for yet further growth. It uses the already available and universally implemented IP transport platform. One significant problem, however, is ensuring the Quality of Service, abbreviated QoS. This paper addresses exactly that issue. In an extensive investigation the influence of jitter buffers on QoS is being examined in depth. Two implementations, namely a passive...
-
IEEE MICROWAVE AND WIRELESS COMPONENTS LETTERS
Journals -
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Quality of service in optical burst switched networks
PublicationIn the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...
-
Quality of service in optical burst switched networks
PublicationIn the paper analytical models of two service differentiation schemes for optical burst switched network: extended offset time based and PPS (Preemptive Priority Scheme) are revised. Also accordance of analytical models for those schemes is studied when complete class isolation is assumed. Furthermore authors introduce an analytical model which describes an effective degree of isolation when burst switched network employs both...
-
Impact of SDN Controller’s Performance on Quality of Service
PublicationSoftware Defined Networking is a paradigm in network architecture; that is quickly becoming commonplace in modern telecommunication systems. It facilitates network customization for the requirements of different applications and simplifies the implementation of new services. Since its proposal, a significant evolution in its functionality has occurred. However, this development brought along problems of efficiency and performance,...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Cross-layer mDNS/ARP integration for IEEE 802.11s Wireless mesh Network
PublicationPopularization of mobile computing devices created a need for robust, efficient and ubiquitous methods of communication and network access. At the same time, evolution and standardization of Wireless Local Area Network (WLAN) technologies made them an attractive solution for building of complex network systems. Moreover, growing maturity of WLAN standards such as IEEE 802.11 allows for introduction of WLAN architectures other than...
-
Playing CSMA/CA game to deter backoff attacks in ad hoc wireless LANs
PublicationPrzedstawiono wieloetapowe strategie konfiguracji okien rywalizacyjnych w mechanizmie CSMA/CA dla bezprzewodowych sieci lokalnych silnie obciążonych ruchem, zapewniające osiągnięcie doskonałego punktu równowagi Nasha przy konfiguracji standardowej. Wykonano badania symulacyjne dla oceny zbieżności skumulowanych udziałów w pasmie transmisyjnym do wartości w równowadze.