Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 6 de 6
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 23(9)2023 Apr 26.
Artigo em Inglês | MEDLINE | ID: mdl-37177488

RESUMO

Internet scams are fraudulent attempts aim to lure computer users to reveal their credentials or redirect their connections to spoofed webpages rather than the actual ones. Users' confidential information, such as usernames, passwords, and financial account numbers, is the main target of these fraudulent attempts. Internet scammers often use phishing attacks, which have no boundaries, since they could exceed hijacking conventional cyber ecosystems to hack intelligent systems, which emerged recently for the use within smart cities. This paper therefore develops a real-time framework inspired by the honeybee defense mechanism in nature for filtering phishing website attacks in smart cities. In particular, the proposed framework filters phishing websites through three main phases of investigation: PhishTank-Match (PM), Undesirable-Absent (UA), and Desirable-Present (DP) investigation phases. The PM phase is used at first in order to check whether the requested URL is listed in the blacklist of the PhishTank database. On the other hand, the UA phase is used for investigation and checking for the absence of undesirable symbols in uniform resource locators (URLs) of the requested website. Finally, the DP phase is used as another level of investigation in order to check for the presence of the requested URL in the desirable whitelist. The obtained results show that the proposed framework is deployable and capable of filtering various types of phishing website by maintaining a low rate of false alarms.

2.
Sensors (Basel) ; 23(2)2023 Jan 13.
Artigo em Inglês | MEDLINE | ID: mdl-36679718

RESUMO

Delay-tolerant networks (DTNs) are networks where there is no immediate connection between the source and the destination. Instead, nodes in these networks use a store-carry-forward method to route traffic. However, approaches that rely on flooding the network with unlimited copies of messages may not be effective if network resources are limited. On the other hand, quota-based approaches are more resource-efficient but can have low delivery rates and high delivery delays. This paper introduces the Enhanced Message Replication Technique (EMRT), which dynamically adjusts the number of message replicas based on a node's ability to quickly disseminate the message. This decision is based on factors such as current connections, encounter history, buffer size history, time-to-live values, and energy. The EMRT is applied to three different quota-based protocols: Spray and Wait, Encounter-Based Routing (EBR), and the Destination-Based Routing Protocol (DBRP). The simulation results show that applying the EMRT to these protocols improves the delivery ratio, overhead ratio, and latency average. For example, when combined with Spray and Wait, EBR, and DBRP, the delivery probability is improved by 13%, 8%, and 10%, respectively, while the latency average is reduced by 51%, 14%, and 13%, respectively.


Assuntos
Algoritmos , Redes de Comunicação de Computadores , Simulação por Computador , Probabilidade
3.
Sensors (Basel) ; 20(6)2020 Mar 12.
Artigo em Inglês | MEDLINE | ID: mdl-32178299

RESUMO

In a smart grid system, the utility server collects data from various smart grid devices. These data play an important role in the energy distribution and balancing between the energy providers and energy consumers. However, these data are prone to tampering attacks by an attacker, while traversing from the smart grid devices to the utility servers, which may result in energy disruption or imbalance. Thus, an authentication is mandatory to efficiently authenticate the devices and the utility servers and avoid tampering attacks. To this end, a group authentication algorithm is proposed for preserving demand-response security in a smart grid. The proposed mechanism also provides a fine-grained access control feature where the utility server can only access a limited number of smart grid devices. The initial authentication between the utility server and smart grid device in a group involves a single public key operation, while the subsequent authentications with the same device or other devices in the same group do not need a public key operation. This reduces the overall computation and communication overheads and takes less time to successfully establish a secret session key, which is used to exchange sensitive information over an unsecured wireless channel. The resilience of the proposed algorithm is tested against various attacks using formal and informal security analysis.

4.
Sensors (Basel) ; 20(4)2020 Feb 13.
Artigo em Inglês | MEDLINE | ID: mdl-32069811

RESUMO

The field of cooperative intelligent transport systems and more specifically pedestrians to vehicles could be characterized as quite challenging, since there is a broad research area to be studied, with direct positive results to society. Pedestrians to vehicles is a type of cooperative intelligent transport system, within the group of early warning collision/safety system. In this article, we examine the research and applications carried out so far within the field of pedestrians to vehicles cooperative transport systems by leveraging the information coming from vulnerable road users' smartphones. Moreover, an extensive literature review has been carried out in the fields of vulnerable road users outdoor localisation via smartphones and vulnerable road users next step/movement prediction, which are closely related to pedestrian to vehicle applications and research. We identify gaps that exist in these fields that could be improved/extended/enhanced or newly developed, while we address future research objectives and methodologies that could support the improvement/development of those identified gaps.


Assuntos
Smartphone , Meios de Transporte , Algoritmos , Comunicação , Humanos , Pedestres
5.
Sensors (Basel) ; 19(9)2019 May 02.
Artigo em Inglês | MEDLINE | ID: mdl-31052531

RESUMO

Wireless Sensor Network is a network of large number of nodes with limited power and computational capabilities. It has the potential of event monitoring in unattended locations where there is a chance of unauthorized access. The work that is presented here identifies and addresses the problem of eavesdropping in the exposed environment of the sensor network, which makes it easy for the adversary to trace the packets to find the originator source node, hence compromising the contextual privacy. Our scheme provides an enhanced three-level security system for source location privacy. The base station is at the center of square grid of four quadrants and it is surrounded by a ring of flooding nodes, which act as a first step in confusing the adversary. The fake node is deployed in the opposite quadrant of actual source and start reporting base station. The selection of phantom node using our algorithm in another quadrant provides the third level of confusion. The results show that Dissemination in Wireless Sensor Networks (DeLP) has reduced the energy utilization by 50% percent, increased the safety period by 26%, while providing a six times more packet delivery ratio along with a further 15% decrease in the packet delivery delay as compared to the tree-based scheme. It also provides 334% more safety period than the phantom routing, while it lags behind in other parameters due to the simplicity of phantom scheme. This work illustrates the privacy protection of the source node and the designed procedure may be useful in designing more robust algorithms for location privacy.

6.
Accid Anal Prev ; 103: 72-84, 2017 Jun.
Artigo em Inglês | MEDLINE | ID: mdl-28388530

RESUMO

New vehicle safety systems have led to a steady improvement of road safety and a reduction in the risk of suffering a major injury in vehicle accidents. A huge leap forward in the development of new vehicle safety systems are actuators that have to be activated irreversibly shortly before a collision in order to mitigate accident consequences. The triggering decision has to be based on measurements of exteroceptive sensors currently used in driver assistance systems. This paper focuses on developing a novel context-aware system designed to detect potential collisions and to trigger safety actuators even before an accident occurs. In this context, the analysis examines the information that can be collected from exteroceptive sensors (pre-crash data) to predict a certain collision and its severity to decide whether a triggering is entitled or not. A five-layer context-aware architecture is presented, that is able to collect contextual information about the vehicle environment and the actual driving state using different sensors, to perform reasoning about potential collisions, and to trigger safety functions upon that information. Accident analysis is used in a data model to represent uncertain knowledge and to perform reasoning. A simulation concept based on real accident data is introduced to evaluate the presented system concept.


Assuntos
Acidentes de Trânsito/prevenção & controle , Condução de Veículo/estatística & dados numéricos , Equipamentos de Proteção , Segurança , Acidentes de Trânsito/estatística & dados numéricos , Condução de Veículo/psicologia , Humanos , Modelos Teóricos , Fatores Desencadeantes
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...