Search results for: TRAFFIC REMAPPING ATTACK - Bridge of Knowledge

Search

Search results for: TRAFFIC REMAPPING ATTACK

Search results for: TRAFFIC REMAPPING ATTACK

  • Modeling a Traffic Remapping Attack Game in a Multi-hop Ad Hoc Network

    Publication

    - Year 2017

    In multi-hop ad hoc networks, selfish nodes may unduly acquire high quality of service (QoS) by assigning higher priority to source packets and lower priority to transit packets. Such traffic remapping attacks (TRAs) are cheap to launch, impossible to prevent, hard to detect, and harmful to non-selfish nodes. While studied mostly in single-hop wireless network settings, TRAs have resisted analysis in multi-hop settings. In this paper...

    Full text available to download

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publication

    - IEEE COMMUNICATIONS MAGAZINE - Year 2018

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Full text available to download

  • Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks

    Publication

    Quality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...

    Full text available to download

  • Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks

    Publication

    Multihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...

    Full text available to download

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

    Publication

    - IEEE COMMUNICATIONS LETTERS - Year 2017

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Full text available to download

  • Adversarial attack algorithm for traffic sign recognition

    Publication

    - MULTIMEDIA TOOLS AND APPLICATIONS - Year 2022

    Deep learning suffers from the threat of adversarial attacks, and its defense methods have become a research hotspot. In all applications of deep learning, intelligent driving is an important and promising one, facing serious threat of adversarial attack in the meanwhile. To address the adversarial attack, this paper takes the traffic sign recognition as a typical object, for it is the core function of intelligent driving. Considering...

    Full text to download in external service

  • A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks

    Publication

    - Year 2021

    For traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...

    Full text to download in external service

  • Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures

    Publication

    In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...

    Full text available to download

  • Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej

    Stacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publication
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Year 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Full text available to download

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publication

    - IEEE Access - Year 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Full text available to download

  • Wojciech Kustra dr inż.

      I am a Faculty member (Assistant Professor, Highway and Transportation Engineering Department) at the Faculty of Civil and Environmental Engineering, Gdansk University of Technology, Poland). My main research interests include: road safety, accident analysis, traffic modeling, transportation planning, traffic engineering, transport management, gis analysis.

  • TRAFFIC

    Journals

    ISSN: 1398-9219 , eISSN: 1600-0854

  • Traffic Type Influence on QoS Network Performance of Streaming Traffic Class

    Publication

    - Year 2013

    Feasibility study on QoS routing proved that the traffic type influence the network performance. The performance is defined here as a number of packets serviced by the network. In the paper additional element - buffers lengths used in service system was verified in terms of dependencies with routing performance. We present results obtained by simulation for many simulation scenarios. Analysis was done for two different network...

  • Comparison of Traffic Flow Models with Real Traffic Data Based on a Quantitative Assessment

    Publication

    The fundamental relationship of traffic flow and bivariate relations between speed and flow, speed and density, and flow and density are of great importance in transportation engineering. Fundamental relationship models may be applied to assess and forecast traffic conditions at uninterrupted traffic flow facilities. The objective of the article was to analyze and compare existing models of the fundamental relationship. To that...

    Full text available to download

  • Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange

    This paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...

  • Analysing the impact of traffic incidents on express road traffic flow using FREEVAL

    Traffic incidents occurring on motorways or express roads cause disruptions and deteriorate traffic conditions. The impact will differ depending on the type of incident, its duration and space blocked on the roadway and can be measured with e.g. average speed reduction, extension of travel time, time lost or overall costs of traffic disruptions. The aim of the paper is to analyse this impact, based on data from the Tri-City Ring...

    Full text available to download

  • High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks

    Publication
    • G. Savva
    • K. Manousakis
    • J. Rak
    • I. Tomkos
    • G. Ellinas

    - IEEE Access - Year 2021

    This work presents efficient connection provisioning techniques mitigating high-power jamming attacks in spectrally-spatially flexible optical networks (SS-FONs) utilizing multicore fibers. High-power jamming attacks are modeled based on their impact on the lightpaths’ quality of transmission (QoT) through inter-core crosstalk. Based on a desired threshold on a lightpath’s QoT, the modulation format used, the length of the path,...

    Full text available to download

  • Deep learning techniques for biometric security: A systematic review of presentation attack detection systems

    Publication

    - ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE - Year 2024

    Biometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...

    Full text to download in external service

  • Pedestrian Safety in Road Traffic in Poland

    Every third road accident in Poland involves a pedestrian as a participant or, most of the time, a casualty. Pedestrian accidents are usually the result of complex situations and the outcome of a number of factors related to driver and pedestrian behaviour and road infrastructure. Safety depends largely on how well the traffic condition is perceived and on visibility in traffic. The paper presents the results of analyses of methodologies...

    Full text available to download

  • Impact of adverse winter weather on traffic flow

    Publication

    The paper aims to analyse the impact of adverse weather in winter on traffic flow using data from a dual carriageway section of an express road located in Gdansk. For the purposes of the analysis, traffic and meteorological data were collected for a period of 15 months in 2014-2015 and aggregated to 5 minutes intervals. The impact of winter weather conditions on traffic flow was assessed by comparing aggregated traffic stream parameters...

    Full text to download in external service

  • Application of autoencoder to traffic noise analysis

    The aim of an autoencoder neural network is to transform the input data into a lower-dimensional code and then to reconstruct the output from this code representation. Applications of autoencoders to classifying sound events in the road traffic have not been found in the literature. The presented research aims to determine whether such an unsupervised learning method may be used for deploying classification algorithms applied to...

    Full text available to download

  • Traffic Modeling in IMS-based NGN Networks

    In the modern world the need for accurate and quickly delivered information is becoming more and more essential. In order to fulfill these requirements, next generation telecommunication networks should be fast introduced and correctly dimensioned. For this reason proper traffic models must be identified, which is the subject of this paper. In the paper standardization of IMS (IP Multimedia Subsystem) concept and IMS-based NGN...

  • Traffic Type Influence on Performance of OSPF QoS Routing

    Feasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed On-Off model was used for self-similar traffic generation. Comparison of simulation results was presented using both relative and non-relative...

    Full text available to download

  • Traffic-induced vibrations. The impact on buildings and people

    Publication

    Traffic-induced vibrations have recently been of major concern to engineers as one of the aspects of so called physical environmental pollution. The interest is related to the observations of serious negative effects of such kind of vibrations on buildings and their inhabitants. Traffic-induced vibrations may cause plaster cracks, structural damage and even failure and collapse of the structure. They may also be the reason of serious...

    Full text to download in external service

  • Traffic Type Influence on Performance of OSPF QoS Routing

    Publication

    - Year 2012

    Feasibility studies with QoS routing proved that the network traffic type has influence on routing performance. In this work influence of self-similar traffic for network with DiffServ architecture and OSPF QoS routing has been verified. Analysis has been done for three traffic classes. Multiplexed ON-OFF model was used for self-similar traffic generation. Comparison of simulation results were presented using both relative and...

  • An application of acoustic sensors for the monitoring of road traffic

    Publication

    Assessment of road traffic parameters for the developed intelligent speed limit setting decision system constitutes the subject addressed in the paper. Current traffic conditions providing vital data source for the calculation of the locally fitted speed limits are assessed employing an economical embedded platform placed at the roadside. The use of the developed platform employing a low-powered processing unit with a set of microphones,...

    Full text to download in external service

  • The application of microscopic models in the study of pedestrian traffic

    Cities (especially in Central and Eastern Europe) focus on improving the road network, which aims to improve the efficiency of motor traffic and minimize congestion. Most of existing tools for analysing the effectiveness of urban transport networks do not assume to analyse the impact of walking and cycling on efficiency of transport systems. It is therefore necessary to develop solutions...

    Full text available to download

  • Modelling the loss of time caused by traffic incidents on motorways

    Publication

    For each road incident important factors like location, capacity reduction, traffic management, duration of road incidents and amount of traffic should be defined. All performer operations and effects of incidents affect the capacity of the road, average speed, time loss, vehicle queues and traffic jams. In the article road incidents were divided into planned and unexpected. Statistical analysis prepared using the database of traffic...

    Full text to download in external service

  • Risks to Older People in Road Traffic

    he article looks at road traffic risks and main trends from the perspective of older road users (drivers, cyclists, pedestrians). With a longer time to react, poor eyesight and hearing, impaired mobility, ill health and medication, older road users are put at risk. A comprehensive and pro-active strategy is needed to deal with these risk factors and meet the safety and mobility needs...

    Full text available to download

  • Automatic road traffic safety management system in urban areas

    Publication

    Traffic incidents and accidents contribute to decreasing levels of transport system reliability and safety. Traffic management and emergency systems on the road, using, among others, automatic detection, video surveillance, communication technologies and institutional solutions improve the organization of the work of various departments involved in traffic and safety management. Automation of incident management helps to reduce...

    Full text available to download

  • A Survey of Vehicular Network Systems for Road Traffic Management

    Publication

    In this survey, we analyze the proposals of vehicular communication systems in the context of road traffic management. Starting with the definition of communications between vehicles (V2V), vehicles-to-infrastructure (V2I) and vehicles-to-everything (V2X), we first focus on the requirements and current standards for the Intelligent Transport Systems (ITS), including the maximum communication delay, the communication range and the...

    Full text available to download

  • Analysis of the regenerative braking process for the urban traffic conditions

    Publication

    In a regular drive system, with an internal combustion engine, vehicle braking is connected with the unproductive dissipation of kinetic and potential energy accumulated in the mass of the vehicle into the environment. This energy can constitute up to 70% of the energy used to drive a vehicle under urban conditions. Its recovery and reuse is one of the basic advantages of hybrid and electric vehicles. Modern traffic management...

    Full text available to download

  • TRAFFIC MODEL OF A MULTIDOMAIN IMS/NGN

    In this paper we continue our research and present an analytical traffic model of a multidomain Next Generation Network (NGN), which is standardized for delivering multimedia services based on the IP Multimedia Subsystem (IMS). The model takes into account several service scenarios (including registration, intra- and inter-operator calls) and a large set of network parameters. Using the model mean Call Set-up Delay and mean Call...

  • A game-theoretic study of CSMA/CA under a backoff attack

    Analizowany jest rozdział pasma realizowany przez protokół CSMA/CA w obecności anonimowych stacji egoistycznych, atakujących wykładniczy mechanizm odczekania. Przy założeniu ruchu nasycającego sieć pokazuje się, że powstaje w ten sposób niekooperacyjna gra o strukturze wypłat wieloosobowego dylematu więźnia. Wykorzystując własności macierzy wypłat zaproponowano strategię dla odpowiedniej gry wieloetapowej, zapewniającą asymptotyczne...

  • Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features

    Publication

    - Year 2017

    Automatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...

    Full text to download in external service

  • Solvability of a Markovian model of an IEEE 802.11 LANunder a backoff attack

    Publication

    - Year 2005

    Przedstawiono ulepszony model jakościowy mechanizmu CSMA/CA dla bezprzewodowych sieci lokalnych z indywidualną konfiguracją okien rywalizacji. Sformułowano warunki dostateczne rozwiązywalności modelu oraz wykazano obecność bezwarunkowej motywacji do zmniejszania okien rywalizacji.

  • Performance of an ad-hoc 802.11 LAN under a backoff attack

    Publication

    - Year 2005

    Samowolna rekonfiguracja wartości okien rywalizacji w protokole MAC sieci bezprzewodowych 802.11 może prowadzić do niesprawiedliwego rozdziału dostępnego pasma transmisyjnego. Dla dużego obciążenia ruchowego sformułowano prosty model markowowski umożliwiający szybką symulację Monte Carlo dla oceny udziału w pasmie poszczególnych stacji sieci. Traktując otrzymane wielkości jako wypłaty w grze niekoalicyjnej przedstawiono niektóre...

  • Traffic Noise Analysis Applied to Automatic Vehicle Counting and Classification

    Problems related to determining traffic noise characteristics are discussed in the context of automatic dynamic noise analysis based on noise level measurements and traffic prediction models. The obtained analytical results provide the second goal of the study, namely automatic vehicle counting and classification. Several traffic prediction models are presented and compared to the results of in-situ noise level measurements. Synchronized...

  • Testing the durability and function of road traffic management devices

    Publication

    - MATEC Web of Conferences - Year 2017

    Traffic management measures (vertical signs and horizontal marking, reflective elements) are used for guiding vehicles optically, indicating road mileage, marking objects in road gauge, marking vehicle and pedestrian safeguards and driver information and warning. This paper presents a synthesis of a literature study and the results of research conducted under stage one of the project LifeRoSE. The requirements for different traffic...

    Full text available to download

  • Influence of Self-Similar Traffic Type on Performance of QoS Routing Algorithms

    Providing a Quality of Services (QoS) into current telecommunication networks based on packet technology is a big challenge nowadays. Network operators have to support a number of new services like voice or video which generate new type of traffic. This traffic serviced with QoS in consequence requires access to appropriate network resources. Additionally, new traffic type is mixed with older one, like best-effort. Analysis of...

    Full text available to download

  • Influence of Toll Collection Method on Motorways on Traffic Safety and Efficiency

    Publication

    The paper presents the results of the effectiveness analysis for various forms of toll collection on motorway gates and their impact on safety and efficiency of traffic. The results from field tests that were performed on the A1 motorway in Rusocin were used for the analysis. The research included the analysis of the video image of driver behaviour on the way to the toll booths and at toll booths. The PTV VISSIM tool was used to...

    Full text to download in external service

  • Performance of FAN conception of traffic control in IP QoS networks

    Publication

    - Year 2008

    In this paper we present the architectural implementation of Flow Aware Networking (FAN), a new approach for realizing QoS guarantees in the Internet. We also propose FAN traffic control algorithm which performs traffic control on flow level. Using the proposed FAN node model, we conduct simulation research to prove if FAN can be a new approach for realizing QoS guarantees. The basis of this research is finding a way to guarantee...

    Full text to download in external service

  • Bicycle Traffic Model for Sustainable Urban Mobility Planning

    Publication

    Modelling tools and transport models are required to assess the impact of measures for the effective planning of cycling routes in cities. This paper presents the methodology for developing a four-stage macroscopic model of bicycle traffic for the city of Gdynia, and its use in planning new bicycle routes, considering a modal shift. The model presented in this paper allows for the evaluation of the influence of the characteristics...

    Full text available to download

  • Investigating the Impact of Weather Conditions and Time of Day on Traffic Flow Characteristics

    Adverse weather such as rain, snow, and fog may significantly reduce visibility or change adhesion properties and, as a consequence, affect drivers’ sense of safety, driving comfort, and their reaction to a changing driving environment (i.e., lower speed and increased headways). The changed behavior of individual drivers affects both traffic flow characteristics, that is, average speed and headways, and parameters related to highway...

    Full text available to download

  • Analysis of Signalized Intersections in the Context of Pedestrian Traffic

    Gdynia is a city in the Pomeranian Voivod e ship of Poland with a population of about 250,000. It faces a growing motorization rate th at needs to be addressed. Car ownership in Gdynia now exceed s 500 vehicles per 1000 residents. Travel by public transport is decreasing and the rate of walking and cycling remains low. It is necessary to reverse these negative trends by implementing solu tions based...

    Full text to download in external service

  • Comparative study on the effectiveness of various types of road traffic intensity detectors

    Publication

    - Year 2019

    Vehicle detection and speed measurements are crucial tasks in traffic monitoring systems. In this work, we focus on several types of electronic sensors, operating on different physical principles in order to compare their effectiveness in real traffic conditions. Commercial solutions are based on road tubes, microwave sensors, LiDARs, and video cameras. Distributed traffic monitoring systems require a high number of monitoring...

    Full text to download in external service

  • Estimation of Vehicle Energy Consumption at Intersections Using Microscopic Traffic Models

    Publication

    This paper addresses issues related to modeling energy consumption and emissions using microscopic traffic simulations. This paper develops a method in which a traffic model is used to calculate the energy needed to travel through selected types of intersections. This paper focuses on energy consumption and derived values of calculated energy, which can be, for example, carbon dioxide emissions. The authors present a review of...

    Full text available to download

  • Evolutionary approach to ship's trajectory planning within Traffic Separation Schemes

    Publication

    The paper presents the continuation of the author's research on evolutionary approach to ship trajectory planning. While the general problem of the evolutionary trajectory planning has already been solved, no one has yet touched one of its specific aspects: evolutionary trajectory planning within Traffic Separation Schemes. Traffic Separation Scheme (TSS) is a traffic-management route-system complying with rules of the International...

    Full text available to download

  • Benchmark of the traffic congestion in electrical transport by means of multi criteria decision analysis

    Publication

    - Przegląd Elektrotechniczny - Year 2013

    Congestion of the road traffic is an important aspect related to the issues of energy consumption in public transport. Due to the multiattribute nature, the expression of traffic congestion in a quantitative valueis difficult to achieve. The article presents a method of estimation of traffic congestion by means of a multiattribute decision analysis.

    Full text available to download