Spelling suggestions: "subject:"trust managemement anda 2security"" "subject:"trust managemement anda bsecurity""
1 |
A simulation-based methodology for the assessment of server-based security architectures for mobile ad hoc networks (MANETs)Darwish, Salaheddin January 2015 (has links)
A Mobile Ad hoc Network (MANET) is typically a set of wireless mobile nodes enabled to communicate dynamically in a multi-hop manner without any pre-existing network infrastructure. MANETs have several unique characteristics in contrast to other typical networks, such as dynamic topology, intermittent connectivity, limited resources, and lack of physical security. Securing MANETs is a critical issue as these are vulnerable to many different attacks and failures and have no clear line of defence. To develop effective security services in MANETs, it is important to consider an appropriate trust infrastructure which is tailored to a given MANET and associated application. However, most of the proposed trust infrastructures do not to take the MANET application context into account. This may result in overly secure MANETs that incur an increase in performance and communication overheads due to possible unnecessary security measures. Designing and evaluating trust infrastructures for MANETs is very challenging. This stems from several pivotal overlapping aspects such as MANET constraints, application settings and performance. Also, there is a lack of practical approaches for assessing security in MANETs that take into account most of these aspects. Based on this, this thesis provides a methodological approach which consists of well-structured stages that allows the exploration of possible security alternatives and evaluates these alternatives against dimensions to selecting the best option. These dimensions include the operational level, security strength, performance, MANET contexts along with main security components in a form of a multidimensional security conceptual framework. The methodology describes interdependencies among these dimensions, focusing specifically on the service operational level in the network. To explore these different possibilities, the Server-based Security Architectures for MANETs (SSAM) simulation model has been created in the OMNeT++ simulation language. The thesis describes the conceptualisation, implementation, verification and validation of SSAM, as well as experimentation approaches that use SSAM to support the methodology of this thesis. In addition, three different real cases scenarios (academic, emergency and military domains) are incorporated in this study to substantiate the feasibility of the proposed methodology. The outcome of this approach provides MANET developers with a strategy along with guidelines of how to consider the appropriate security infrastructure that satisfies the settings and requirements of given MANET context.
|
2 |
Fog Computing based traffic Safety for Connected Vulnerable Road Users / Assurer la sécurité des usagers vulnérables de la route connectés grâce à leur Smartphones et au concept de Fog ComputingJalew, Esubalew Alemneh 25 October 2019 (has links)
Chaque année, des millions de personnes meurent et beaucoup d'autres subissent des séquelles graves à la suite d'accidents de la route. Malgré une multitude d’initiatives, le nombre de cas mortels et d'accidents graves augmente chaque année en engendrant des problèmes préoccupants à la fois sociaux, économiques et sanitaires. En raison de leur nombre élevé et de l'absence de protection personnelle, plus de la moitié de ces décès concerne les usagers vulnérables (en anglais, vulnerable road users - VRU) regroupant les piétons, cyclistes et motocyclistes. Les appareils mobiles, combinés à la technologie de Fog Computing (ou informatique géodistribuée, ou même informatique en brouillard), représentent une solution réaliste à court terme pour les protéger en les avertissant de l’imminence d'un accident de circulation. L’omniprésence des appareils mobiles et leurs capacités de calcul élevées font de ces appareils un élément important à considérer dans les solutions de sécurité routière. Le Fog Computing offre des fonctionnalités adaptées aux applications de sécurité routière, puisqu’il s’agit d’une extension du Cloud Computing permettant de rapprocher les services informatiques, le stockage et le réseau au plus près des utilisateurs finaux. Par conséquent, dans cette thèse, nous proposons une architecture réseau sans infrastructure supplémentaire (PV-Alert) pour des fins de sécurité routière et reposant uniquement sur les appareils mobiles des VRU et des conducteurs sur la route avec l’aide du concept de Fog Computing. Les données géographiques et cinématiques de ces appareils sont collectées et envoyées périodiquement au serveur fog situé à proximité. Le serveur fog traite ces données en exécutant un algorithme de calcul de risque d’accident de circulation et renvoie des notifications en cas d'accident imminent. L’évaluation de cette architecture montre qu’elle est capable de générer des alertes en temps réel et qu’elle est plus performante que d’autres architectures en termes de fiabilité, d’évolutivité et de latence. / Annually, millions of people die and many more sustain non-fatal injuries because of road traffic crashes. Despite multitude of countermeasures, the number of causalities and disabilities owing to traffic accidents are increasing each year causing grinding social, economic, and health problems. Due to their high volume and lack of protective-shells, more than half of road traffic deaths are imputed to vulnerable road users (VRUs): pedestrians, cyclists and motorcyclists. Mobile devices combined with fog computing can provide feasible solutions to protect VRUs by predicting collusions and warning users of an imminent traffic accident. Mobile devices’ ubiquity and high computational capabilities make the devices an important components of traffic safety solutions. Fog computing has features that suits to traffic safety applications as it is an extension of cloud computing that brings down computing, storage, and network services to the proximity of end user. Therefore, in this thesis, we have proposed an infrastructure-less traffic safety architecture that depends on fog computing and mobile devices possessed by VRUs and drivers. The main duties of mobile devices are extracting their positions and other related data and sending cooperative awareness message to a nearby fog server using wireless connection. The fog server estimates collision using a collision prediction algorithm and sends an alert message, if an about-to-occur collision is predicted. Evaluation results shows that the proposed architecture is able to render alerts in real time. Moreover, analytical and performance evaluations depict that the architecture outperforms other related road safety architectures in terms of reliability, scalability and latency. However, before deploying the architecture, challenges pertaining to weaknesses of important ingredients of the architecture should be treated prudently. Position read by mobile devices are not accurate and do not meet maximum position sampling rates traffic safety applications demand. Moreover, continuous and high rate position sampling drains mobile devices battery quickly. From fog computing’s point of view, it confronts new privacy and security challenges in addition to those assumed from cloud computing. For aforementioned challenges, we have proposed new solutions: (i) In order to improve GPS accuracy, we have proposed an efficient and effective two-stage map matching algorithm. In the first stage, GPS readings obtained from smartphones are passed through Kalman filter to smooth outlier readings. In the second stage, the smoothed positions are mapped to road segments using online time warping algorithm. (ii) position sampling frequency requirement is fulfilled by an energy efficient location prediction system that fuses GPS and inertial sensors’ data. (iii) For energy efficiency, we proposed an energy efficient fuzzy logic-based adaptive beaconing rate management that ensures safety of VRUs. (iv) finally, privacy and security issues are addressed indirectly using trust management system. The two-way subjective logic-based trust management system enables fog clients to evaluate the trust level of fog servers before awarding the service and allows the servers to check out the trustworthiness of the service demanders. Engaging omnipresent mobile device and QoS-aware fog computing paradigm in active traffic safety applications has the potential to reduce overwhelming number of traffic accidents on VRUs.
|
Page generated in 0.1135 seconds