PeerJ Computer Science Preprints: Computer Networks and Communicationshttps://peerj.com/preprints/index.atom?journal=cs&subject=9200Computer Networks and Communications articles published in PeerJ Computer Science PreprintsSecuring ad hoc on-demand distance vector routing protocol against the black hole DoS attack in MANETshttps://peerj.com/preprints/279052019-08-172019-08-17Rohi TariqSheeraz AhmedRaees Shah SaniZeeshan NajamShahryar Shafique
Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.
Mobile Ad hoc network is the collection of nodes without having any physical structure involved i.e. access points, routers etc. MANETs are wide-open to similar forms of threats as other wireless mobile communication systems. In Ad-hoc Network nodes performing both as end-points of the communication and routers which makes the Ad-hoc routing protocols further prone towards the security attacks. Black Hole attack is a common security issue encountered in MANET routing protocols. The Black-Hole attack is security attack in which a malicious node imposters themselves as a node with the shortest hop count to the destination node during a packet transmission. A malicious node is capable of disturbing the network with Black Hole attack pretends to have the minimum hop-count route to the destination node (DS). This node responds to all route requests (RREQ) messages in positive and thus catches all the transmission to it. The source node (SN) not knowing the malicious nature of the Black-Hole node thus transmits all the important data. The Black Hole node discards all the important data packets. In this paper a comparatively effective, efficient and easy implemented way for identifying and therefore eluding the attacks of Black-Hole in mobile Ad-hoc networks is presented. The Network Simulator (NS-2) has been used for the implementation of our proposed solution to assess its work in terms of Network Routing load, End-to-End delay and Packet delivery ratio. The results show a considerable improvement in the performance metrics.Citation.js: a format-independent, modular bibliography tool for the browser and command linehttps://peerj.com/preprints/274662019-07-112019-07-11Lars G Willighagen
Background. Given the vast number of standards and formats for bibliographical data, any program working with bibliographies and citations has to be able to interpret such data. This paper describes the development of Citation.js (https://citation.js.org/), a tool to parse and format according to those standards. The program follows modern guidelines for software in general and JavaScript in specific, such as version control, source code analysis, integration testing and semantic versioning.
Results. The result is an extensible tool that has already seen adaption in a variety of sources and use cases: as part of a server-side page generator of a publishing platform, as part of a local extensible document generator, and as part of an in-browser converter of extracted references. Use cases range from transforming a list of DOIs or Wikidata identifiers into a BibTeX file on the command line, to displaying RIS references on a webpage with added Altmetric badges to generating "How to cite this" sections on a blog. The accuracy of conversions is currently 27 % for properties and 60 % for types on average and a typical initialization takes 120 ms in browsers and 1 s with Node.js on the command line.
Conclusions. Citation.js is a library supporting various formats of bibliographic information in a broad selection of use cases and environments. Given the support for plugins, more formats can be added with relative ease.
Background. Given the vast number of standards and formats for bibliographical data, any program working with bibliographies and citations has to be able to interpret such data. This paper describes the development of Citation.js (https://citation.js.org/), a tool to parse and format according to those standards. The program follows modern guidelines for software in general and JavaScript in specific, such as version control, source code analysis, integration testing and semantic versioning.Results. The result is an extensible tool that has already seen adaption in a variety of sources and use cases: as part of a server-side page generator of a publishing platform, as part of a local extensible document generator, and as part of an in-browser converter of extracted references. Use cases range from transforming a list of DOIs or Wikidata identifiers into a BibTeX file on the command line, to displaying RIS references on a webpage with added Altmetric badges to generating "How to cite this" sections on a blog. The accuracy of conversions is currently 27 % for properties and 60 % for types on average and a typical initialization takes 120 ms in browsers and 1 s with Node.js on the command line.Conclusions. Citation.js is a library supporting various formats of bibliographic information in a broad selection of use cases and environments. Given the support for plugins, more formats can be added with relative ease.Software-defined networks: A walkthrough guide from occurrence To data plane fault tolerancehttps://peerj.com/preprints/276242019-04-012019-04-01Ali MalikBenjamin AzizAli Al-HajMo Adda
In recent years, the emerging paradigm of software-defined networking has become a hot and thriving topic that grabbed the attention of industry sector as well as the academic research community. The decoupling between the network control and data planes means that software-defined networking architecture is programmable, adjustable and dynamically re-configurable. As a result, a large number of leading companies across the world have latterly launched software-defined solutions in their data centers and it is expected that most of the service providers will do so in the near future due to the new opportunities enabled by software-defined architectures. Nonetheless, each emerging technology is accompanied by new issues and concerns, and fault tolerance and recovery is one such issue that faces software-defined networking. Although there have been numerous studies that have discussed this issue, gaps still exist and need to be highlighted. In this paper, we start by tracing the evolution of networking systems from the mid 1990's until the emergence of programmable networks and software-defined networking, and then define a taxonomy for software-defined networking dependability by means of fault tolerance of data plane to cover all aspects, challenges and factors that need to be considered in future solutions. We discuss in a detailed manner current state-of-the-art literature in this area. Finally, we analyse the current gaps in current research and propose possible directions for future work.
In recent years, the emerging paradigm of software-defined networking has become a hot and thriving topic that grabbed the attention of industry sector as well as the academic research community. The decoupling between the network control and data planes means that software-defined networking architecture is programmable, adjustable and dynamically re-configurable. As a result, a large number of leading companies across the world have latterly launched software-defined solutions in their data centers and it is expected that most of the service providers will do so in the near future due to the new opportunities enabled by software-defined architectures. Nonetheless, each emerging technology is accompanied by new issues and concerns, and fault tolerance and recovery is one such issue that faces software-defined networking. Although there have been numerous studies that have discussed this issue, gaps still exist and need to be highlighted. In this paper, we start by tracing the evolution of networking systems from the mid 1990's until the emergence of programmable networks and software-defined networking, and then define a taxonomy for software-defined networking dependability by means of fault tolerance of data plane to cover all aspects, challenges and factors that need to be considered in future solutions. We discuss in a detailed manner current state-of-the-art literature in this area. Finally, we analyse the current gaps in current research and propose possible directions for future work.Event-driven industrial robot control architecture for the Adept V+ platformhttps://peerj.com/preprints/275522019-02-272019-02-27Oleksandr SemeniutaPetter Falkman
Modern industrial robotic systems are highly interconnected. They operate in a distributed environment and communicate with sensors, computer vision systems, mechatronic devices, and computational components. On the fundamental level, communication and coordination between all parties in such distributed system are characterized by discrete event behavior. The latter is largely attributed to the specifics of communication over the network, which, in terms, facilitates asynchronous programming and explicit event handling. In addition, on the conceptual level, events are an important building block for realizing reactivity and coordination. Event-driven architecture has manifested its effectiveness for building loosely-coupled systems based on publish-subscribe middleware, either general-purpose or robotic-oriented. Despite all the advances in middleware, industrial robots remain difficult to program in context of distributed systems, to a large extent due to the limitation of the native robot platforms. This paper proposes an architecture for flexible event-based control of industrial robots based on the Adept V+ platform. The architecture is based on the robot controller providing a TCP/IP server and a collection of robot skills, and a high-level control module deployed to a dedicated computing device. The control module possesses bidirectional communication with the robot controller and publish/subscribe messaging with external systems. It is programmed in asynchronous style using pyadept, a Python library based on Python coroutines, AsyncIO event loop and ZeroMQ middleware. The proposed solution facilitates integration of Adept robots into distributed environments and building more flexible robotic solutions with event-based logic.
Modern industrial robotic systems are highly interconnected. They operate in a distributed environment and communicate with sensors, computer vision systems, mechatronic devices, and computational components. On the fundamental level, communication and coordination between all parties in such distributed system are characterized by discrete event behavior. The latter is largely attributed to the specifics of communication over the network, which, in terms, facilitates asynchronous programming and explicit event handling. In addition, on the conceptual level, events are an important building block for realizing reactivity and coordination. Event-driven architecture has manifested its effectiveness for building loosely-coupled systems based on publish-subscribe middleware, either general-purpose or robotic-oriented. Despite all the advances in middleware, industrial robots remain difficult to program in context of distributed systems, to a large extent due to the limitation of the native robot platforms. This paper proposes an architecture for flexible event-based control of industrial robots based on the Adept V+ platform. The architecture is based on the robot controller providing a TCP/IP server and a collection of robot skills, and a high-level control module deployed to a dedicated computing device. The control module possesses bidirectional communication with the robot controller and publish/subscribe messaging with external systems. It is programmed in asynchronous style using pyadept, a Python library based on Python coroutines, AsyncIO event loop and ZeroMQ middleware. The proposed solution facilitates integration of Adept robots into distributed environments and building more flexible robotic solutions with event-based logic.Prioritizing computer security controls for home usershttps://peerj.com/preprints/275402019-02-152019-02-15Justin FanelliJohn Waxler
Hundreds of thousands of home users are victimized by cyber-attacks every year. Most experts agree that average home users are not doing enough to protect their computers and their information from cyber-attacks. Improperly managed home computers can lead to individuals losing data, systems performing slowly, loss of identity, and ransom payments; en masse attacks can act in concert to infect personal computers in business and government. Currently, home users receive conflicting guidance for a complicated terrain, often in the form of anecdotal 'Top 10' lists, that is not appropriate for their specific needs, and in many instances, users ignore all guidance. Often, these popular ‘Top 10’ lists appear to be based solely on opinion. Ultimately, we asked ourselves the following: how can we provide home users with better guidance for determining and applying appropriate security controls that meet their needs and can be verified by the cyber security community? In this paper, we propose a methodology for determining and prioritizing the most appropriate security controls for home computing. Using Multi Criteria Decision Making (MCDM) and subject matter expertise, we identify, analyze and prioritize security controls used by government and industry to determine which controls can substantively improve home computing security. We apply our methodology using examples to demonstrate its benefits.
Hundreds of thousands of home users are victimized by cyber-attacks every year. Most experts agree that average home users are not doing enough to protect their computers and their information from cyber-attacks. Improperly managed home computers can lead to individuals losing data, systems performing slowly, loss of identity, and ransom payments; en masse attacks can act in concert to infect personal computers in business and government. Currently, home users receive conflicting guidance for a complicated terrain, often in the form of anecdotal 'Top 10' lists, that is not appropriate for their specific needs, and in many instances, users ignore all guidance. Often, these popular ‘Top 10’ lists appear to be based solely on opinion. Ultimately, we asked ourselves the following: how can we provide home users with better guidance for determining and applying appropriate security controls that meet their needs and can be verified by the cyber security community? In this paper, we propose a methodology for determining and prioritizing the most appropriate security controls for home computing. Using Multi Criteria Decision Making (MCDM) and subject matter expertise, we identify, analyze and prioritize security controls used by government and industry to determine which controls can substantively improve home computing security. We apply our methodology using examples to demonstrate its benefits.Deployment of coordinated worm-hole peer in MANETshttps://peerj.com/preprints/275162019-02-032019-02-03Fahmina TaranumSyeda Hajra Mahin
With the enhancement in technical field of communication, efforts are made by the researchers to provide security. Security is dispensing protection and privacy to the system for the channeled data against any unwarranted access and refinements. MANET is a variant of wireless network used essentially by the dynamic devices with high motility and vulnerability. The distinctions like dynamic layout and curbed resources make them susceptible to miscellaneous kinds of threats. One such attack is wormhole which sneak and peep data with malicious intensions and operates either in coordinated or uncoordinated fashion. In its coordinated version, the malicious nodes coordinate their operations whereas in the uncoordinated version; they operate solitarily with the aim to decline the network performance. In this work, we aim to propose an algorithm for deployment of wormhole attack communicating with its peer through a tunnel. Planting of this attack in the network lays the foundation for developing successful strategies to mitigate their effects on the system.
With the enhancement in technical field of communication, efforts are made by the researchers to provide security. Security is dispensing protection and privacy to the system for the channeled data against any unwarranted access and refinements. MANET is a variant of wireless network used essentially by the dynamic devices with high motility and vulnerability. The distinctions like dynamic layout and curbed resources make them susceptible to miscellaneous kinds of threats. One such attack is wormhole which sneak and peep data with malicious intensions and operates either in coordinated or uncoordinated fashion. In its coordinated version, the malicious nodes coordinate their operations whereas in the uncoordinated version; they operate solitarily with the aim to decline the network performance. In this work, we aim to propose an algorithm for deployment of wormhole attack communicating with its peer through a tunnel. Planting of this attack in the network lays the foundation for developing successful strategies to mitigate their effects on the system.ALBIS: integrated system for risk-based surveillance of invasive mosquito Aedes albopictushttps://peerj.com/preprints/272512018-10-032018-10-03Milan P. AntonovicMassimiliano CannataAndrea DananiLukas EngelerEleonora FlacioFrancesca MangiliDamiana RavasiDaniele StrigaroMauro Tonolla
According to predictions bases on a climate-driven large-scale model the areas surrounding Lake Léman and, to some extent, the Swiss Plateau are suitable for the spread of Ae. albopictus North of the Alps, while other areas in Switzerland (e.g., the city of Zürich) seem currently too cold in winter for the survival of eggs. However, this model does not take into account particular micro-climate conditions in urban areas where the specie thrives. Climate conditions in urban micro-habitats (in particular catch basins) increase the probability of the survival of diapausing eggs in the winter season favoring the colonization of new cities that were thought to be too cold for the survival of the eggs. Therefore, there is an urgent need for appropriate monitoring tools and risk-based surveillance of Ae. albopictus populations. In 2018 a multidisciplinary group of researchers from the University of Applied Sciences and Arts of Southern Switzerland (SUPSI) has joined launching the project ALBIS (Albopictus Integrated System). The designed system focuses on the monitoring of urban catch basins, primarily on micro-climate environmental sensing, data transmission, data acquisition and data dissemination. The gathered data are the input for an empirical machine learning model for the prediction of spatial and temporal distribution of the Ae. albopictus. The first real time monitoring tests are in progress in the pilot area in the city of Lugano in the Canton Ticino. Fully functional prototypes have been engineered by the Institute of Earth Science in collaboration with a local electronics manufacturer (TECinvent) combined with the Open Source istSOS OGC Sensor Observation Service software for data acquisition and dissemination, and in the first tests cases have demonstrated good quality in terms of energy efficiency, data quality and data transmission reliability. The first results demonstrated that temperature in catch basins can be different from outside temperature that is detected by traditional terrain measures: in February 2018 during a period of cold air temperature in Canton Ticino of down to -8°C, the prototype sensor monitoring the catch basins' wall surface shows temperatures up to 6°C higher. Considering that one of the Ae. albopictus establishment thresholds is to have a mean January temperature of >0°C to allow egg overwintering, taking into account this micro-climate environments could lead to more realistic predictions.
According to predictions bases on a climate-driven large-scale model the areas surrounding Lake Léman and, to some extent, the Swiss Plateau are suitable for the spread of Ae. albopictus North of the Alps, while other areas in Switzerland (e.g., the city of Zürich) seem currently too cold in winter for the survival of eggs. However, this model does not take into account particular micro-climate conditions in urban areas where the specie thrives. Climate conditions in urban micro-habitats (in particular catch basins) increase the probability of the survival of diapausing eggs in the winter season favoring the colonization of new cities that were thought to be too cold for the survival of the eggs. Therefore, there is an urgent need for appropriate monitoring tools and risk-based surveillance of Ae. albopictus populations. In 2018 a multidisciplinary group of researchers from the University of Applied Sciences and Arts of Southern Switzerland (SUPSI) has joined launching the project ALBIS (Albopictus Integrated System). The designed system focuses on the monitoring of urban catch basins, primarily on micro-climate environmental sensing, data transmission, data acquisition and data dissemination. The gathered data are the input for an empirical machine learning model for the prediction of spatial and temporal distribution of the Ae. albopictus. The first real time monitoring tests are in progress in the pilot area in the city of Lugano in the Canton Ticino. Fully functional prototypes have been engineered by the Institute of Earth Science in collaboration with a local electronics manufacturer (TECinvent) combined with the Open Source istSOS OGC Sensor Observation Service software for data acquisition and dissemination, and in the first tests cases have demonstrated good quality in terms of energy efficiency, data quality and data transmission reliability. The first results demonstrated that temperature in catch basins can be different from outside temperature that is detected by traditional terrain measures: in February 2018 during a period of cold air temperature in Canton Ticino of down to -8°C, the prototype sensor monitoring the catch basins' wall surface shows temperatures up to 6°C higher. Considering that one of the Ae. albopictus establishment thresholds is to have a mean January temperature of >0°C to allow egg overwintering, taking into account this micro-climate environments could lead to more realistic predictions.Robust telematics health monitoring and dispatching management system based on IoT and M2M Technologieshttps://peerj.com/preprints/270872018-08-022018-08-02Mohammadali FarahpoorEbrahim Sabouri
The Internet of Things is a telecommunication phenomenon which has been introduced during these years, wherein every physical thing would be equipped with electronic parts such as transceivers, sensors, Microcontrollers, RFID, actuators, and proper procedures that can make them able to interact with each other and even with the people, turning into an integrated portion of the Internet. The IOT in fact can be used in various areas, including industrial automation, automotive, home automation, transportation and fleet management, medical aids, smart power management, and a lot of other domains and needless to say that is one of the principles and integral parts of smart city and in a comprehensive view smart world. In this paper, first, we introduce our patent called “Intelligent Health Monitoring and Dispatching System (IHMDS)” based on IOT, telematics and M2M technologies for fleet management on construction, mining, and agriculture machinery. Then we will discuss how these type of systems can be used in smart cities and help to urban management. This system has been installed on more than 100 mining equipment (Dump-truck, Excavator, Loader, etc.) in five big iron mines in Iran and helps companies to maximize safety and increase their productivity. IHMDS is an embedded system comprises 5 main parts: sensors, controllers, industrial PC and a touch panel, network transceiver (GPRS/Wi-Fi), and GPS. A cloud-based software which uses GPS coordinates, artificial intelligence methods, queueing theory and shortest path algorithms provides dispatching and maintenance processes.
The Internet of Things is a telecommunication phenomenon which has been introduced during these years, wherein every physical thing would be equipped with electronic parts such as transceivers, sensors, Microcontrollers, RFID, actuators, and proper procedures that can make them able to interact with each other and even with the people, turning into an integrated portion of the Internet. The IOT in fact can be used in various areas, including industrial automation, automotive, home automation, transportation and fleet management, medical aids, smart power management, and a lot of other domains and needless to say that is one of the principles and integral parts of smart city and in a comprehensive view smart world. In this paper, first, we introduce our patent called “Intelligent Health Monitoring and Dispatching System (IHMDS)” based on IOT, telematics and M2M technologies for fleet management on construction, mining, and agriculture machinery. Then we will discuss how these type of systems can be used in smart cities and help to urban management. This system has been installed on more than 100 mining equipment (Dump-truck, Excavator, Loader, etc.) in five big iron mines in Iran and helps companies to maximize safety and increase their productivity. IHMDS is an embedded system comprises 5 main parts: sensors, controllers, industrial PC and a touch panel, network transceiver (GPRS/Wi-Fi), and GPS. A cloud-based software which uses GPS coordinates, artificial intelligence methods, queueing theory and shortest path algorithms provides dispatching and maintenance processes.A survey on approaches to the protection of personal data gathered by IoT deviceshttps://peerj.com/preprints/264732018-07-252018-07-25Henry Tranter
Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.
Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.Data security issues in the realm of mobile cloud computing: A surveyhttps://peerj.com/preprints/270502018-07-242018-07-24Mohammed-Ali Anwar
Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.
Mobile Cloud Computing (MCC) is a recent technological development, which has emerged from two popular technology trends; mobile computing and cloud. In essence it revolutionises the capabilities of mobile devices by integrating both storage and processing of the cloud environment with mobile computing and in doing so providing greater optimisation and operating power, allowing for transparent and seamless use of resources provided by the cloud. However, expanding the capability of resource constrained mobile devices in this manner comes at a price. There are many risks associated with the security of data within the cloud environment and as MCC essentially uses the cloud, it also inherits any security issues that are associated with cloud computing. The aim of this survey is to identify potential data security issues, and analyse and present some pioneering security mechanisms and finally suggest some future directions for better data security with MCC.