KEYWORDS: Current controlled current source, Mobile communications, Networks, Computer simulations, Telecommunications, Wireless communications, Neodymium, Unmanned aerial vehicles, Modeling and simulation, Defense systems
A mobile ad hoc network is a collection of mobile nodes which communicate without a fixed backbone or centralized infrastructure. Due to the frequent mobility of nodes, routes connecting two distant nodes may change. Therefore, it is not possible to establish a priori fixed paths for message delivery through the network. Because of its importance, routing is the most studied problem in mobile ad hoc networks. In addition, if the Quality of Service (QoS) is demanded, one must guarantee the QoS not only over a single hop but over an entire wireless multi-hop path which may not be a trivial task. In turns, this requires the propagation of QoS information within the network. The key to the support of QoS reporting is QoS routing, which provides path QoS information at each source. To support QoS for real-time traffic one needs to know not only minimum delay on the path to the destination but also the bandwidth available on it. Therefore, throughput, end-to-end delay, and routing overhead are traditional performance metrics used to evaluate the performance of routing protocol. To obtain additional information about the link, most of quality-link metrics are based on calculation of the lost probabilities of links by broadcasting probe packets. In this paper, we address the problem of including multiple routing metrics in existing routing packets that are broadcasted through the network. We evaluate the efficiency of such approach with modified version of DSDV routing protocols in ns-3 simulator.
KEYWORDS: Global system for mobile communications, Network security, Mobile communications, Oxygen, Cell phones, RF communications, Receivers, Computer security, Information security, Databases
Global System for Mobile communication (GSM) is the most widespread technology for mobile communications in the world and serving over 7 billion users. Since first publication of system documentation there has been notified a potential safety problem’s occurrence. Selected types of attacks, based on the analysis of the technical feasibility and the degree of risk of these weaknesses, were implemented and demonstrated in laboratory of the VSB-Technical University of Ostrava, Czech Republic. These vulnerabilities were analyzed and afterwards possible attacks were described. These attacks were implemented using open-source tools, software programmable radio USRP (Universal Software RadioPeripheral) and DVB-T (Digital Video Broadcasting – Terrestrial) receiver. GSM security architecture is being scrutinized since first public releases of its specification mainly pointing out weaknesses in authentication and ciphering mechanisms. This contribution also summarizes practically proofed and used scenarios that are performed using opensource software tools and variety of scripts mostly written in Python. Main goal of this paper is in analyzing security issues in GSM network and practical demonstration of selected attacks.
It is well known that Quantum Key Distribution (QKD) can be used with the highest level of security for distribution of the secret key, which is further used for symmetrical encryption. B92 is one of the oldest QKD protocols. It uses only two non-orthogonal states, each one coding for one bit-value. It is much faster and simpler when compared to its predecessors, but with the idealized maximum efficiencies of 25% over the quantum channel. B92 consists of several phases in which initial key is significantly reduced: secret key exchange, extraction of the raw key (sifting), error rate estimation, key reconciliation and privacy amplification. QKD communication is performed over two channels: the quantum channel and the classical public channel. In order to prevent a man-in-the-middle attack and modification of messages on the public channel, authentication of exchanged values must be performed. We used Wegman-Carter authentication because it describes an upper bound for needed symmetric authentication key. We explained the reduction of the initial key in each of QKD phases.
Impact of changes in blood pressure and pulse from human speech is disclosed in this article. The symptoms of increased physical activity are pulse, systolic and diastolic pressure. There are many methods of measuring and indicating these parameters. The measurements must be carried out using devices which are not used in everyday life. In most cases, the measurement of blood pressure and pulse following health problems or other adverse feelings. Nowadays, research teams are trying to design and implement modern methods in ordinary human activities. The main objective of the proposal is to reduce the delay between detecting the adverse pressure and to the mentioned warning signs and feelings. Common and frequent activity of man is speaking, while it is known that the function of the vocal tract can be affected by the change in heart activity. Therefore, it can be a useful parameter for detecting physiological changes. A method for detecting human physiological changes by speech processing and artificial neural network classification is described in this article. The pulse and blood pressure changes was induced by physical exercises in this experiment. The set of measured subjects was formed by ten healthy volunteers of both sexes. None of the subjects was a professional athlete. The process of the experiment was divided into phases before, during and after physical training. Pulse, systolic, diastolic pressure was measured and voice activity was recorded after each of them. The results of this experiment describe a method for detecting increased cardiac activity from human speech using artificial neural network.
This paper concerns available steganographic techniques that can be used for sending hidden data through public
network. Typically, in steganographic communication it is advised to use popular/often used method for sending hidden
data and amount of that data need to be high as much as possible. We confirmed this by choosing a Domain Name
System (DNS) as a vital protocol of each network and choosing Distributed denial of service (DDoS) attacks that are
most popular network attacks currently represented in the world. Apart from characterizing existing steganographic
methods we provide new insights by presenting two new techniques. The first one is network steganography solution
which exploits free/unused protocols fields and is known for IP, UDP or TCP protocols, but has never been applied to
DNS (Domain Name Server) which are the fundamental part of network communications. The second explains the usage
of DNS Amplification DDoS Attack to send seamlessly data through public network. The calculation that was performed
to estimate the total amount of data that can be covertly transferred by using these technique, regardless of steganalysis,
is included in this paper.
KEYWORDS: Video, Telecommunications, Information security, Multimedia, Global system for mobile communications, Network security, Web services, Tablets, Operating systems, Environmental management
The paper deals with presentation of the IVAS system within the 7FP EU INDECT project. The INDECT project aims at
developing the tools for enhancing the security of citizens and protecting the confidentiality of recorded and stored
information. It is a part of the Seventh Framework Programme of European Union. We participate in INDECT portal and
the Interactive Video Audio System (IVAS). This IVAS system provides a communication gateway between police
officers working in dispatching centre and police officers in terrain. The officers in dispatching centre have capabilities
to obtain information about all online police officers in terrain, they can command officers in terrain via text messages,
voice or video calls and they are able to manage multimedia files from CCTV cameras or other sources, which can be
interesting for officers in terrain. The police officers in terrain are equipped by smartphones or tablets. Besides common
communication, they can reach pictures or videos sent by commander in office and they can respond to the command via
text or multimedia messages taken by their devices. Our IVAS system is unique because we are developing it according
to the special requirements from the Police of the Czech Republic. The IVAS communication system is designed to use
modern Voice over Internet Protocol (VoIP) services. The whole solution is based on open source software including
linux and android operating systems. The technical details of our solution are presented in the paper.
Emotional states of humans and their impact on physiological and neurological characteristics are discussed in this
paper. This problem is the goal of many teams who have dealt with this topic. Nowadays, it is necessary to increase the
accuracy of methods for obtaining information about correlations between emotional state and physiological changes. To
be able to record these changes, we focused on two majority emotional states. Studied subjects were psychologically
stimulated to neutral - calm and then to the stress state. Electrocardiography, Electroencephalography and blood pressure
represented neurological and physiological samples that were collected during patient’s stimulated conditions. Speech
activity was recording during the patient was reading selected text. Feature extraction was calculated by speech
processing operations. Classifier based on Gaussian Mixture Model was trained and tested using Mel-Frequency Cepstral
Coefficients extracted from the patient's speech. All measurements were performed in a chamber with electromagnetic
compatibility. The article discusses a method for determining the influence of stress emotional state on the human and
his physiological and neurological changes.
Various types of monitoring mechanism allow us to detect and monitor behavior of attackers in VoIP networks. Analysis
of detected malicious traffic is crucial for further investigation and hardening the network. This analysis is typically
based on statistical methods and the article brings a solution based on neural network. The proposed algorithm is used as
a classifier of attacks in a distributed monitoring network of independent honeypot probes. Information about attacks on
these honeypots is collected on a centralized server and then classified. This classification is based on different
mechanisms. One of them is based on the multilayer perceptron neural network. The article describes inner structure of
used neural network and also information about implementation of this network. The learning set for this neural network
is based on real attack data collected from IP telephony honeypot called Dionaea. We prepare the learning set from real
attack data after collecting, cleaning and aggregation of this information. After proper learning is the neural network
capable to classify 6 types of most commonly used VoIP attacks. Using neural network classifier brings more accurate
attack classification in a distributed system of honeypots. With this approach is possible to detect malicious behavior in a
different part of networks, which are logically or geographically divided and use the information from one network to
harden security in other networks. Centralized server for distributed set of nodes serves not only as a collector and
classifier of attack data, but also as a mechanism for generating a precaution steps against attacks.
In this paper the predictive model for speech quality estimation is described. This model allows its user to gain the
information about the speech quality in VoIP networks without the need of performing the actual call and the
consecutive time consuming sound file evaluation. This rapidly increases usability of the speech quality measurement
especially in high load networks, where the actual processing of all calls is rendered difficult or even impossible. This
model can reach its results that are highly conformant with the PESQ algorithm only based on the network state
parameters that are easily obtainable by the commonly used software tools. Experiments were carried out to investigate
whether different languages (English, Czech) have an effect on perceived voice quality for the same network conditions
and the language factor was incorporated directly into the model.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.