691 research outputs found
A Data Fusion Technique to Detect Wireless Network Virtual Jamming Attacks
The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Wireless communications are potentially exposed to jamming due to the openness of the medium and, in particular, to virtual jamming, which allows more energy-efficient attacks. In this paper we tackle the problem of virtual jamming attacks on IEEE 802.11 networks and present a data fusion solution for the detection of a type of virtual jamming attack (namely, NAV attacks), based on the real-time monitoring of a set of metrics. The detection performance is evaluated in a number of real scenarios
Unified model for network dynamics exhibiting nonextensive statistics
We introduce a dynamical network model which unifies a number of network
families which are individually known to exhibit -exponential degree
distributions. The present model dynamics incorporates static (non-growing)
self-organizing networks, preferentially growing networks, and (preferentially)
rewiring networks. Further, it exhibits a natural random graph limit. The
proposed model generalizes network dynamics to rewiring and growth modes which
depend on internal topology as well as on a metric imposed by the space they
are embedded in. In all of the networks emerging from the presented model we
find q-exponential degree distributions over a large parameter space. We
comment on the parameter dependence of the corresponding entropic index q for
the degree distributions, and on the behavior of the clustering coefficients
and neighboring connectivity distributions.Comment: 11 pages 8 fig
On-Line Identification of Autonomous Underwater Vehicles through Global Derivative-Free Optimization
We describe the design and implementation of an on-line identification scheme for Autonomous Underwater Vehicles (AUVs). The proposed method estimates the dynamic parameters of the vehicle based on a global derivative-free optimization algorithm. It is not sensitive to initial conditions, unlike other on-line identification schemes, and does not depend on the differentiability of the model with respect to the parameters. The identification scheme consists of three distinct modules: a) System Excitation, b) Metric Calculator and c) Optimization Algorithm. The System Excitation module sends excitation inputs to the vehicle. The Optimization Algorithm module calculates a candidate parameter vector, which is fed to the Metric Calculator module. The Metric Calculator module evaluates the candidate parameter vector, using a metric based on the residual of the actual and the predicted commands. The predicted commands are calculated utilizing the candidate parameter vector and the vehicle state vector, which is available via a complete navigation module. Then, the metric is directly fed back to the Optimization Algorithm module, and it is used to correct the estimated parameter vector. The procedure continues iteratively until the convergence properties are met. The proposed method is generic, demonstrates quick convergence and does not require a linear formulation of the model with respect to the parameter vector. The applicability and performance of the proposed algorithm is experimentally verified using the AUV Girona 500. © 2013 IEEE
Dilatonic interpolation between Reissner-Nordstrom and Bertotti-Robinson spacetimes with physical consequences
We give a general class of static, spherically symmetric, non-asymptotically
flat and asymptotically non-(anti) de Sitter black hole solutions in
Einstein-Maxwell-Dilaton (EMD) theory of gravity in 4-dimensions. In this
general study we couple a magnetic Maxwell field with a general dilaton
potential, while double Liouville-type potentials are coupled with the gravity.
We show that the dilatonic parameters play the key role in switching between
the Bertotti-Robinson and Reissner-Nordstr\"om spacetimes. We study the
stability of such black holes under a linear radial perturbation, and in this
sense we find exceptional cases that the EMD black holes are unstable. In
continuation we give a detailed study of the spin-weighted harmonics in
dilatonic Hawking radiation spectrum and compare our results with the
previously known ones. Finally, we investigate the status of resulting naked
singularities of our general solution when probed with quantum test particles.Comment: 27 pages, 4 figures, to appear in CQG
Emergence of good conduct, scaling and Zipf laws in human behavioral sequences in an online world
We study behavioral action sequences of players in a massive multiplayer
online game. In their virtual life players use eight basic actions which allow
them to interact with each other. These actions are communication, trade,
establishing or breaking friendships and enmities, attack, and punishment. We
measure the probabilities for these actions conditional on previous taken and
received actions and find a dramatic increase of negative behavior immediately
after receiving negative actions. Similarly, positive behavior is intensified
by receiving positive actions. We observe a tendency towards anti-persistence
in communication sequences. Classifying actions as positive (good) and negative
(bad) allows us to define binary 'world lines' of lives of individuals.
Positive and negative actions are persistent and occur in clusters, indicated
by large scaling exponents alpha~0.87 of the mean square displacement of the
world lines. For all eight action types we find strong signs for high levels of
repetitiveness, especially for negative actions. We partition behavioral
sequences into segments of length n (behavioral `words' and 'motifs') and study
their statistical properties. We find two approximate power laws in the word
ranking distribution, one with an exponent of kappa-1 for the ranks up to 100,
and another with a lower exponent for higher ranks. The Shannon n-tuple
redundancy yields large values and increases in terms of word length, further
underscoring the non-trivial statistical properties of behavioral sequences. On
the collective, societal level the timeseries of particular actions per day can
be understood by a simple mean-reverting log-normal model.Comment: 6 pages, 5 figure
Quasiperiodic graphs: structural design, scaling and entropic properties
A novel class of graphs, here named quasiperiodic, are constructed via
application of the Horizontal Visibility algorithm to the time series generated
along the quasiperiodic route to chaos. We show how the hierarchy of
mode-locked regions represented by the Farey tree is inherited by their
associated graphs. We are able to establish, via Renormalization Group (RG)
theory, the architecture of the quasiperiodic graphs produced by irrational
winding numbers with pure periodic continued fraction. And finally, we
demonstrate that the RG fixed-point degree distributions are recovered via
optimization of a suitably defined graph entropy
- …
