Filters
total: 25
Search results for: MULTI-HOP
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network
PublicationIn multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...
-
Resilience through multicast – An optimization model for multi-hop wireless sensor networks
Publication -
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Maximization of multicast periodic traffic throughput in multi-hop wireless networks with broadcast transmissions
Publication -
Throughput vs. Resilience in Multi-hop Wireless Sensor Networks with Periodic Packet Traffic
Publication -
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublicationStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Jerzy Konorski dr hab. inż.
PeopleJerzy Konorski received his M. Sc. degree in telecommunications from Gdansk University of Technology, Poland, and his Ph. D. degree in computer science from the Polish Academy of Sciences, Warsaw, Poland. In 2007, he defended his D. Sc. thesis at the Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. He has authored over 150 papers, led scientific projects funded by the European Union,...
-
A taxonomy of challenges to resilient message dissemination in VANETs
PublicationInter-vehicular communications is seen as a promising solution to a number of issues related with public road safety, road congestion management, and infotainment. However, Vehicular Ad-hoc NETworks (VANETs) characterized by high mobility of vehicles and facing a number of other issues related with high frequency wireless communications and network disconnections, encounter major challenges related with reliability of message delivery....
-
NetBaltic System-Heterogenous Wireless Network for Maritime Communications
PublicationIn case of maritime communications, we observe a growing interest in deployment of multitask satellite-based solutions and development of new maritime-specific systems intended for improvements in safety of e-navigation. Analysis of different types of currently used maritime communication systems leads, however, to a conclusion that neither global and still very expensive satellite systems nor cheaper, but short-ranged transmission...
-
DATABASE AND BIGDATA PROCESSING SYSTEM FOR ANALYSIS OF AIS MESSAGES IN THE NETBALTIC RESEARCH PROJECT
PublicationA specialized database and a software tool for graphical and numerical presentation of maritime measurement results has been designed and implemented as part of the research conducted under the netBaltic project (Internet over the Baltic Sea – the implementation of a multi-system, self-organizing broadband communications network over the sea for enhancing navigation safety through the development of e-navigation services.) The...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublicationIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
The reliability of any-hop star networks with respect to failures of communication nodes.
PublicationThis paper investigated the reliability of any-hop star networks. The any-hop star topology is used in centralized computer networks. We will assume that the all nodes fail independently, links are failure-free. Following measures of network reliability are assumed: the expected number of nodes, which can communicate with the central node; the expected number of node pairs, which are connected by a path through the central node;...
-
Neurotrophic factors in human milk in early lactation and the effect of Holder and microwave pasteurization on their concentrations
PublicationObjective: The objective of this study was to determine the level of brain-derived neurotrophic factor (BDNF) and glial cell line-derived neurotrophic factor (GDNF) in human milk in the first two weeks of breastfeeding and compare of the effects of Holder pasteurization (HoP, 62.5°C, 30 minutes) and microwave pasteurization (MP) at constant temperature (62.5°C) on the concentraion of both neurotrophic factors (NFs). Methods: Concentration...
-
Neural Graph Collaborative Filtering: Analysis of Possibilities on Diverse Datasets
PublicationThis paper continues the work by Wang et al. [17]. Its goal is to verify the robustness of the NGCF (Neural Graph Collaborative Filtering) technique by assessing its ability to generalize across different datasets. To achieve this, we first replicated the experiments conducted by Wang et al. [17] to ensure that their replication package is functional. We received sligthly better results for ndcg@20 and somewhat poorer results for...
-
Can high hydrostatic pressure processing be the best way to preserve human milk?
PublicationBreastfeeding is one of the most important factors influencing proper child development. When a mother cannot breastfeed, the best alternative, especially for feeding premature infants, is to then use of human milk (HM) which has been collected, preserved and stored in Human Milk Banks (HMB). Scope and approach: In this review, the impact of some stages of the management of HM in HMB on its final biological value and microbiological...
-
A Reputation Scheme to Discourage Selfish QoS Manipulation in Two-Hop Wireless Relay Networks
PublicationIn wireless networks, stations can improve their received quality of service (QoS) by handling packets of source flows with higher priority. Additionally, in cooperative relay networks, the relays can handle transit flows with lower priority. We use game theory to model a two-hop relay network where each of the two involved stations can commit such selfish QoS manipulation. We design and evaluate a reputation-based incentive scheme...
-
Effect of microwave and convection heating on selected nutrients of human milk
PublicationThe aim of this study was to determine the influence of the microwave heating method (MWH) on selected determinants of the nutritional value of human milk (HM) and compare to the effect exerted by the standard convection heating (CH) method, including holder pasteurization (HoP). It was showed that using MWH under conditions assumed to ensure microbiological safety, changes in the level of the nutrients were not observed. In these...
-
Badanie wpływu ruchu niższego priorytetu na jakość usług o wymaganiach czasu rzeczywistego w sieci IP QoS.
PublicationW artykule przedstawiono wyniki badań dotyczące wpływu rozkładu długości pakietów ruchu o niższym priorytecie na jakość usług o wymaganiach czasu rzeczywistego (real time services), korzystających ze schematu obsługi Expedited Forwarding Per Hop Behavior (EF PHB) w sieci IP QoS Differentiated Services (DiffServ). Wyniki zaprezentowane w referacie zostały uzyskane zarówno przy pomocy modeli analitycznych, opisujących gwarancje statystyczne...
-
Methods for evaluation packet delay distribution of flows using Expedited Forwarding PHB.
PublicationArtykuł dotyczy problemu zapewnienia statystycznych gwarancji jakości obsługi dla strumieni czasu rzeczywistego korzystających z Expedited Forwarding Per Hop Behavior (EF PHB) w sieci IP Differentiated Services. Statystyczne podejście do określenia gwarancji jakościowych, oparte na obliczaniu prawdopodobieństwa że opóźnienie pakietów od końca do końca jest większe niż określona wielkość, pozwala lepsze wykorzystanie sieci niż poprzednio...
-
Modelowanie strumienia niższego priorytetu z rzeczywistym rozkładem długości pakietów w systemie obsługi z uogólnionymi wakacjami.
PublicationW sieci IP QoS Differentiated Services (DiffServ) wskazanym sposobem realizacji Expedited Per Hop Behavior (EF PHB) jest przyjęcie priorytetowego systemu kolejkowego. Wyniki najnowszych pomiarów parametrów charakteryzujących sieci IP wskazują, że w przypadku rozkładu długości pakietów mamy do czynienia z występowaniem zarówno bardzo krótkich, jak i bardzo długich pakietów o znacząco odmiennych wartościach prawdopodobieństw ich...
-
DC and AC Conductivity, Biosolubility and Thermal Properties of Mg-Doped Na2O–CaO–P2O5 Glasses
PublicationBioactive glasses have recently been extensively used to replace, regenerate, and repair hard tissues in the human body because of their ability to bond with living tissue. In this work, the effects of replacing Na2O with MgO on the electrical, biosolubility, and thermal properties of the target glass 10Na2O–60P2O5–30CaO (in mol%) were investigated. The electrical properties of the glasses were studied with the impedance spectroscopy...
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
Opóźnienie efektywne i jego zastosowanie do sterowania ruchem w sieciach pakietowych
PublicationW rozprawie doktorskiej przeanalizowano problem zapewnienia gwarancji jakości usług (Quality of Service, QoS) w sieciach pakietowych, ze szczególnym uwzględnieniem usług o ściśle określonych wymaganiach opisujących opóźnienie pakietów i jego zmienność w sieciach z agregacją strumieni, takich jak np. sieć IP QoS z Differentiated Services (DiffServ) realizująca schemat obsługi Expedited Forwarding Per Hop Behavior (EF PHB) lub sieć...