Table 3 - uploaded by Audrey Gendreau
Content may be subject to copyright.
Traffic level load factor values

Traffic level load factor values

Source publication
Conference Paper
Full-text available
Abstract— Analysis of the security situation of networks is an important area in the information security research field. Furthermore, situation awareness is critical to the Internet of Things (IoT) given the limited lifetime, and autonomous nature of wireless sensor networks (WSN). In this work, a measurement for situation awareness for the IoT i...

Citations

... Wireless energy analysis, measurement, and management based on the situational awareness (SA) strategies tries to explore the elaboration of schemes for the efficient distributed computing and monitoring of the execution of plans, based on the high-performance techniques [1]. Furthermore, the SA-centric schemes are also employed for the efficient deployment of a number of strategic applications, including the cybersecurity [2][3], Internet of things (IoT) and big data [4][5][6], power systems and smart grid [7][8][9][10][11][12][13][14], and computer, communication, and mobile networks [15][16][17][18]. ...
... In 1999, Tim Bass proposed the cyberspace situational awareness (CSA) concept [5]. In addition, SA is used in WSN that can be formed in a hierarchical framework in which the cluster heads are responsible for a number of tasks including the routing, connection to other clusters and neighbours, and monitoring and administration of the nodes [6]. Dealing with the missing data, by using the information available in an environment where the SA is deployed, interpolation is the best way in order to estimate the missing data for a short period of time, while historic load features are more beneficial when dealing with lost data in a longer time [9]. ...
Conference Paper
Full-text available
Energy management theory and techniques for home environments are facing several technical challenges in areas including the real-time scheduling, power distribution, and automation of network of home appliances/renewables for achieving maximum energy efficiency. In this paper, situational awareness (SA) has made this crucial decision making process more efficient, by providing the valuable data about the surrounding environment. In a smart home, apart from the electrical appliances, the intelligent sensors are also consuming energy while transmitting data or when they are in idle mode. In this contribution, our focus is on implementing and analysing a situational awareness-based ad-hoc network in a home environment, in order to reduce the energy consumption, and therefore, increasing the lifetime of these networks. The presented results demonstrate the effectiveness of the proposed SA-centric method, and further confirm the energy consumption in the intended environment is decreased dramatically due to the applied schedule and limitations on the working hours of the devices. Moreover, the sensors are switched to doze mode when there is no data to exchange.
... Situation awareness (SA) is a concept that originated from research in aviation psychology and was later used in the battlefield [6] to assess the enemy's situation. In 1999, Tim Bass presented a similar concept named cyberspace situation awareness (CSA) [5]. ...
... In 1999, Tim Bass presented a similar concept named cyberspace situation awareness (CSA) [5]. Eventually, the term cyberspace security situation awareness (CSSA) was adopted to focus on the security state of technology [6]. While related, the elements of information that are used to determine the network state for CSA are triggered by events which contribute to the overall security situation in CSSA. ...
... The authors summarize that cluster-based schemes reduce energy-costs, and emphasized the lack of research regarding the effect of IDS on energy consumption. To the best of our knowledge, adapted from a LAN IDS implementation [6], addressing the energy issue, the cluster-based risk costs analysis for WSN IDS in this current work is a unique approach to the problem. Another energy saving method prevalent in the IoT WSN IDS literature is to conserve energy by utilizing a router or computer for the IDS processing. ...
Conference Paper
Abstract—The Internet of Things (IoT) is one of the largest technological evolutions of computing; by 2022 it is estimated that a trillion IP addresses (objects) will be connected to the Internet. The obscurity and low accessibility of many of these devices in this vast heterogeneous network will make it difficult to holistically monitor information flow. Nonetheless, to safeguard networks, unauthorized intruders must be detected within the constraints of each type of device or sub-network before any system information can be disseminated. In this paper, a survey of the Intrusion Detection Systems (IDS) using the most recent ideas and methods proposed for the IoT is presented. To understand and illustrate IDS platform differences and the current research trend towards a universal, cross-platform distributed approach, the survey starts with an historical examination of intrusion detection systems. This examination of the foundations of IDS research based on the components that make up the IoT is followed by a look at the current holistic trend and an analysis of these schemes. Finally, guidelines to potential IDS in the IoT are proposed before identifying the open research problems.
... Situation awareness (SA) is a concept that originated from research in aviation psychology and was later used in the battlefield [6] to assess the enemy's situation. In 1999, Tim Bass presented a similar concept named cyberspace situation awareness (CSA) [5]. ...
... In 1999, Tim Bass presented a similar concept named cyberspace situation awareness (CSA) [5]. Eventually, the term cyberspace security situation awareness (CSSA) was adopted to focus on the security state of technology [6]. While related, the elements of information that are used to determine the network state for CSA are triggered by events which contribute to the overall security situation in CSSA. ...
... The authors summarize that cluster-based schemes reduce energy-costs, and emphasized the lack of research regarding the effect of IDS on energy consumption. To the best of our knowledge, adapted from a LAN IDS implementation [6], addressing the energy issue, the cluster-based risk costs analysis for WSN IDS in this current work is a unique approach to the problem. Another energy saving method prevalent in the IoT WSN IDS literature is to conserve energy by utilizing a router or computer for the IDS processing. ...
Conference Paper
The Internet of Things (IoT) is a heterogeneous network of objects that communicate with each other and their owners over the Internet. In the future, the utilization of distributed technologies in combination with their object applications will result in an unprecedented level of knowledge and awareness, creating new business opportunities and expanding existing ones. However, in this paradigm where almost everything can be monitored and tracked, an awareness of the state of the monitoring systems' situation will be important. Given the anticipated scale of business opportunities resulting from new object monitoring and tracking capabilities, IoT adoption has not been as fast as expected. The reason for the slow growth of application objects is the immaturity of the standards, which can be partly attributed to their unique system requirements and characteristics. In particular, the IoT standards must exhibit efficient self-reliant management and monitoring capability, which in a hierarchical topology is the role of cluster heads. IoT standards must be robust, scalable, adaptable, reliable, and trustworthy. These criteria are predicated upon the limited lifetime, and the autonomous nature, of wireless personal area networks (WPANs), of which wireless sensor networks (WSNs) are a major technological solution and research area in the IoT. In this paper, the energy efficiency of a self-reliant management and monitoring WSN cluster head selection algorithm, previously used for situation awareness, was improved upon by sharing particular established application cluster heads. This enhancement saved energy and reporting time by reducing the path length to the monitoring node. Also, a proposal to enhance the risk assessment component of the model is made. We demonstrate through experiments that when benchmarked against both a power and randomized cluster head deployment, the proposed enhancement to the situation awareness metric used less power. Potentially, this approach can be used to design a more energy efficient cluster-based management and monitoring algorithm for the advancement of security, e.g. Intrusion detection systems (IDSs), and other standards in the IoT.
Article
With the rise of technologies such as mobile Internet, 5G networks and artificial intelligence, the development of Internet of Vehicle Information Security (ICVS) has become the mainstream and direction for the future development of the automotive industry. ICVS, people, roads, clouds, and APP constitute a complex network of vehicles. As part of the Internet, vehicle networking will inevitably face various complex information security threats and risks. This paper aims to design a kind of security situation awareness of Internet of vehicles based on intrusion detection protection systems (IDPS). By collecting the security data of car, app and private cloud for big data analysis, the whole smart car security situation awareness system is constructed. The system can be used to analyze potential threats, send out warnings, and carry out emergency responses.