691 research outputs found

    A Data Fusion Technique to Detect Wireless Network Virtual Jamming Attacks

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Wireless communications are potentially exposed to jamming due to the openness of the medium and, in particular, to virtual jamming, which allows more energy-efficient attacks. In this paper we tackle the problem of virtual jamming attacks on IEEE 802.11 networks and present a data fusion solution for the detection of a type of virtual jamming attack (namely, NAV attacks), based on the real-time monitoring of a set of metrics. The detection performance is evaluated in a number of real scenarios

    Unified model for network dynamics exhibiting nonextensive statistics

    Full text link
    We introduce a dynamical network model which unifies a number of network families which are individually known to exhibit qq-exponential degree distributions. The present model dynamics incorporates static (non-growing) self-organizing networks, preferentially growing networks, and (preferentially) rewiring networks. Further, it exhibits a natural random graph limit. The proposed model generalizes network dynamics to rewiring and growth modes which depend on internal topology as well as on a metric imposed by the space they are embedded in. In all of the networks emerging from the presented model we find q-exponential degree distributions over a large parameter space. We comment on the parameter dependence of the corresponding entropic index q for the degree distributions, and on the behavior of the clustering coefficients and neighboring connectivity distributions.Comment: 11 pages 8 fig

    On-Line Identification of Autonomous Underwater Vehicles through Global Derivative-Free Optimization

    No full text
    We describe the design and implementation of an on-line identification scheme for Autonomous Underwater Vehicles (AUVs). The proposed method estimates the dynamic parameters of the vehicle based on a global derivative-free optimization algorithm. It is not sensitive to initial conditions, unlike other on-line identification schemes, and does not depend on the differentiability of the model with respect to the parameters. The identification scheme consists of three distinct modules: a) System Excitation, b) Metric Calculator and c) Optimization Algorithm. The System Excitation module sends excitation inputs to the vehicle. The Optimization Algorithm module calculates a candidate parameter vector, which is fed to the Metric Calculator module. The Metric Calculator module evaluates the candidate parameter vector, using a metric based on the residual of the actual and the predicted commands. The predicted commands are calculated utilizing the candidate parameter vector and the vehicle state vector, which is available via a complete navigation module. Then, the metric is directly fed back to the Optimization Algorithm module, and it is used to correct the estimated parameter vector. The procedure continues iteratively until the convergence properties are met. The proposed method is generic, demonstrates quick convergence and does not require a linear formulation of the model with respect to the parameter vector. The applicability and performance of the proposed algorithm is experimentally verified using the AUV Girona 500. © 2013 IEEE

    Dilatonic interpolation between Reissner-Nordstrom and Bertotti-Robinson spacetimes with physical consequences

    Full text link
    We give a general class of static, spherically symmetric, non-asymptotically flat and asymptotically non-(anti) de Sitter black hole solutions in Einstein-Maxwell-Dilaton (EMD) theory of gravity in 4-dimensions. In this general study we couple a magnetic Maxwell field with a general dilaton potential, while double Liouville-type potentials are coupled with the gravity. We show that the dilatonic parameters play the key role in switching between the Bertotti-Robinson and Reissner-Nordstr\"om spacetimes. We study the stability of such black holes under a linear radial perturbation, and in this sense we find exceptional cases that the EMD black holes are unstable. In continuation we give a detailed study of the spin-weighted harmonics in dilatonic Hawking radiation spectrum and compare our results with the previously known ones. Finally, we investigate the status of resulting naked singularities of our general solution when probed with quantum test particles.Comment: 27 pages, 4 figures, to appear in CQG

    Emergence of good conduct, scaling and Zipf laws in human behavioral sequences in an online world

    Get PDF
    We study behavioral action sequences of players in a massive multiplayer online game. In their virtual life players use eight basic actions which allow them to interact with each other. These actions are communication, trade, establishing or breaking friendships and enmities, attack, and punishment. We measure the probabilities for these actions conditional on previous taken and received actions and find a dramatic increase of negative behavior immediately after receiving negative actions. Similarly, positive behavior is intensified by receiving positive actions. We observe a tendency towards anti-persistence in communication sequences. Classifying actions as positive (good) and negative (bad) allows us to define binary 'world lines' of lives of individuals. Positive and negative actions are persistent and occur in clusters, indicated by large scaling exponents alpha~0.87 of the mean square displacement of the world lines. For all eight action types we find strong signs for high levels of repetitiveness, especially for negative actions. We partition behavioral sequences into segments of length n (behavioral `words' and 'motifs') and study their statistical properties. We find two approximate power laws in the word ranking distribution, one with an exponent of kappa-1 for the ranks up to 100, and another with a lower exponent for higher ranks. The Shannon n-tuple redundancy yields large values and increases in terms of word length, further underscoring the non-trivial statistical properties of behavioral sequences. On the collective, societal level the timeseries of particular actions per day can be understood by a simple mean-reverting log-normal model.Comment: 6 pages, 5 figure

    Quasiperiodic graphs: structural design, scaling and entropic properties

    Get PDF
    A novel class of graphs, here named quasiperiodic, are constructed via application of the Horizontal Visibility algorithm to the time series generated along the quasiperiodic route to chaos. We show how the hierarchy of mode-locked regions represented by the Farey tree is inherited by their associated graphs. We are able to establish, via Renormalization Group (RG) theory, the architecture of the quasiperiodic graphs produced by irrational winding numbers with pure periodic continued fraction. And finally, we demonstrate that the RG fixed-point degree distributions are recovered via optimization of a suitably defined graph entropy
    corecore