Advanced search in Research products
Research products
arrow_drop_down
Searching FieldsTerms
Any field
arrow_drop_down
includes
arrow_drop_down
The following results are related to Rural Digital Europe. Are you interested to view more results? Visit OpenAIRE - Explore.
59 Research products

  • Rural Digital Europe
  • 2013-2022
  • Closed Access
  • Doctoral thesis

10
arrow_drop_down
Relevance
arrow_drop_down
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2015
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2015
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Biondi, Antonio; Milenovic, Milan;
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao IRIS - Università de...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao IRIS - Università de...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2016
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2016
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2013
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2013
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2022
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2022
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2019
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2019
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Pinto, Roberto; Zambetti, Michela Giuseppina;

    Nell'ultimo decennio, due macro fenomeni stanno rappresentato una sfida nei confronti delle strategie delle aziende manifatturiere: Servitizzazione e Digitalizzazione (Frank, Mendes, Ayala, & Ghezzi, 2019). Da un lato la possibilit� di affrontare la concorrenza vendendo pacchetti di prodotti e servizi, instaurando con il cliente un rapporto duraturo e basato sulla creazione di valore e dall'altro il progresso nel campo tecnologico che consente lo sviluppo di sistemi e prodotti automatici e intelligenti. All?incrocio dei due, uno degli aspetti pi� rilevanti da considerare � la possibilit� di raccogliere una grande quantit� di dati da fonti connesse che, abbinate ad efficaci strumenti di analisi, possono diventare una fonte chiave di creazione di valore nel contesto della fornitura di servizi. Sebbene le opportunit� in questo contesto siano chiare, la loro realizzazione sta creando difficolt� sia per dal punto di vista accademico che applicativo. In questo contesto, la ricerca presentata in questa tesi, contribuisce alla conoscenza e realizzazione di sistemi prodotto-servizio basati sulla raccolta dati, tramite lo sviluppo di conoscenze sistematiche nel contesto del Data-Driven Product Service System (DDPSS), formalizzando le caratteristiche dei DDPSS in un framework concettuale a due livelli e fornendo una metodologia data-driven di ingegnerizzazione dei servizi per le prime fasi del loro sviluppo. La ricerca � stata sviluppata in collaborazione continua con ABB, azienda che ha sponsorizzato il progetto e nella quale si sono svolte attivit� di action research. Inoltre, grazie al coinvolgimento nel ASAP Service Managemnt Forum, la ricerca ha beneficiato della collaborazione con svariate aziende impegnate nello sviluppo do DDPSS.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Archivio Istituziona...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    https://doi.org/10.13122/zambe...
    Other literature type . 2021
    Data sources: Datacite
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Archivio Istituziona...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      https://doi.org/10.13122/zambe...
      Other literature type . 2021
      Data sources: Datacite
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ioannou, Christiana A.;

    Includes bibliography (p. 155-165). Number of sources in the bibliography: 114 Thesis (Ph. D.) -- University of Cyprus, Faculty of Pure and Applied Sciences, Department of Computer Science, 2017. The University of Cyprus Library holds the printed form of the thesis. Τα Ασύρματα Δίκτυα Αισθητήρων (WSN) χρησιμοποιούνται για κρίσιμες εφαρμογές χάρη στην ικανότητά τους να παρέχουν χαμηλού κόστους, χαμηλής ισχύος, και διαφοροποιημένες υπηρεσίες παρακολούθησης. Επίσης, προσελκύουν και ανθρώπους με κακόβουλες προθέσεις που στοχεύουν στη διακοπή του δικτύου με κάθε δυνατό μέσο. Οι υφιστάμενες μέθοδοι ασφαλείας αποτυγχάνουν στον εντοπισμό αγνώστων κακόβουλων επιθέσεων και απαιτούν μνήμη και υπολογιστική ισχύ, στοιχεία τα όποια είναι περιοριστικά για τα ασύρματα δίκτυα αισθητήρων. Τα Συστήματα Ανίχνευσης Παρεισδύσεων Δικτύου (IDS) βρίσκονται στη δεύτερη γραμμή της άμυνας και ενεργοποιούνται αφότου οι επιθέσεις έχουν διεισδύσει την πρώτη γραμμή της άμυνας, το προληπτικό στρώμα. Οι περισσότερες μέθοδοι ανίχνευσης εισβολέων για ασύρματα δίκτυα αισθητήρων στη βιβλιογραφία, αξιολογούνται με τη χρήση εργαλείων προσομοίωσης ή με μαθηματικά μοντέλα. Στην παρούσα διδακτορική διατριβή παρουσιάζουμε το εργαλείο mIDS, το οποίο έχει τη δυνατότητα να εντοπίζει άγνωστες επιθέσεις, σε πραγματικό χρόνο με τη χρήση ελάχιστης ισχύς υπολογισμού και μνήμης. Δημιουργήσαμε και εφαρμόσαμε ένα εργαλείο παρακολούθησης στο λειτουργικό σύστημα Contiki O/S, το RMT, το οποίο παρακολουθεί και συλλέγει δεδομένα από πολλαπλά επίπεδα του δικτύου, σε πραγματικό χρόνο. Το εργαλείο RMT συγκεντρώνει στατιστικά στοιχεία από τα διάφορα επίπεδα του αισθητήρα και έχει τη δυνατότητα προκαθορισμού, τόσο των επίπεδων, όσο και των παραμέτρων που θα συλλέξει, ώστε να μειώσει τη χρήση μνήμης. Το RMT παρέχει πληροφορίες παρακολούθησης σε Συστήματα Ανίχνευσης Παρεισδύσεων Δικτύου (IDS), το mIDS, το οποίο ανιχνεύει επιθέσεις εντός του δικτύου. Σε μια εκτός σύνδεσης διαδικασία, τα δεδομένα που συγκεντρώνονται από την παρακολούθηση που διενεργεί το RMT αναλύονται χρησιμοποιώντας το στατιστικό εργαλείο Binary Logistic Regression (BLR), για καθορισμό της συνήθους δραστηριότητας του αισθητήρα. Ένα ακριβές μοντέλο ανίχνευσης συμπεριλαμβάνει καλοήθεις και ιογενείς συμπεριφορές, ώστε να είναι δυνατή η διαμόρφωση του πεδίου φυσιολογικής συμπεριφοράς. Εφαρμόσαμε επιθέσεις WSN που εντοπίζουν και μεταχειρίζονται τις ευπάθειες των πρωτοκόλλων στο επίπεδο δρομολόγησης για επιμόλυνση του αισθητήρα. Κατά το χρόνο εκτέλεσης, το mIDS χρησιμοποιεί δεδομένα καταχώρησης από το RMT και το προφίλ κανονικής δραστηριότητας, με σκοπό την ανίχνευση ανωμαλιών εντός του δικτύου. Σε προκαθορισμένα χρονικά διαστήματα, το mIDS αναλύει τη δραστηριότητα του αισθητήρα, χρησιμοποιώντας την εξίσωση πιθανοτήτων η οποία προέκυψε κατά την εκτός σύνδεσης διαδικασία με τη χρήση του BLR. Το mIDS προς το παρόν έχει εγκατασταθεί στους περιοριστικούς αισθητήρες με σκοπό την παρακολούθηση της δραστηριότητας του τοπικού αισθητήρα. Έχουμε αναπτύξει μοντέλα BLR για τη δρομολόγηση και για τα διαδικτυακά επίπεδα MAC, για την ανίχνευση επιθέσεων δρομολόγησης. Τα μοντέλα BLR τα οποία πέτυχαν 96 % - 100 % ακρίβεια ήταν αυτά που «εκπαιδεύτηκαν» με τα δεδομένα του επίπεδου δρομολόγησης. Επίσης, έχουμε αναπτύξει μοντέλα BLR για κάθε επίθεση, τα οποία εφαρμόζονται και αξιολογούνται σε πραγματικό χρόνο σε τρεις διαφορετικές τοπολογίες. Αναλόγως με το ποιο BLR μοντέλο παρουσίαζε προειδοποίηση, ήταν δυνατός ο προσδιορισμός του είδους της επίθεσης, κατά πόσο ο ιός είναι τύπου Selective Forward ή Blackhole ή αν η επίθεση είναι τύπου Sinkhole. Το μοντέλο BLR συγκεκριμένα για την επίθεση τύπου Sinkhole ανίχνευσε την επίθεση σε όλες τις διαδικτυακές τοπολογίες με 100% ακρίβεια. Wireless sensor networks are used for critical applications due to their ability to provide low-cost, low-power, and diversified monitoring services. They also attract people with malicious intent who aim in disrupting the network by any means possible. Existing security methods fail in identifying unknown malicious attacks and require memory and power which are limited resources for WSNs. Intrusion Detection Systems (IDS) are found at the second line of security defense. They are engaged once the intruder has penetrated the first line of defense, the preventive layer. Most intrusion detection solutions for WSNs in the literature, are evaluated using simulation tools or mathematical models. We propose and evaluate mIDS; a run-time, low-memory overhead IDS that can detect unknown attacks by imposing minimum computation power. We implemented a monitoring tool in Contiki O/S, called RMT, that monitors and collects data from multiple network layers, in real time. RMT gathers statistics from the various sensor node's layers that can be customized to decrease memory cost. RMT provides monitoring information to an anomaly IDS, called mIDS, that detects attacks within the network. At an offline stage the data gathered from the RMT monitoring is analysed using the profiling statistical Binary Logistic Regression (BLR) to define normal sensor activity. To have a fine grain detection model both benign and viral behaviors are included to form the plane of what is normal behavior. We implemented routing WSN attacks that take advantage of the routing layer vulnerabilities to infect the sensor node. At run time, mIDS uses input data from RMT and the normal activity profile to detect abnormalities within the network. At prede_ned intervals mIDS analyses sensor node activity using the probability equation extracted at the offline stage using BLR. mIDS is currently installed at the constrained nodes and it is responsible for monitoring local sensor behavior. We developed BLR models for the routing and the MAC network layers to detect routing attacks. The BLR models that achieved 96% - 100% accuracy levels were the ones trained with routing layer data. We developed BLR models for each attack implemented and evaluated real time in three different topologies. Depending which BLR model raised an alarm, we can classify the type of the attack if it has Selective Forward and/or Blackhole or if the attack is of type Sinkhole. The BLR model for Sinkhole attack detected, in all network topologies the attack with no false alarms.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao LEKYTHOSarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    LEKYTHOS
    Doctoral thesis . 2017
    Data sources: LEKYTHOS
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao LEKYTHOSarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      LEKYTHOS
      Doctoral thesis . 2017
      Data sources: LEKYTHOS
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2016
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2016
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2022
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2022
      Data sources: VIRTA
Advanced search in Research products
Research products
arrow_drop_down
Searching FieldsTerms
Any field
arrow_drop_down
includes
arrow_drop_down
The following results are related to Rural Digital Europe. Are you interested to view more results? Visit OpenAIRE - Explore.
59 Research products
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2015
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2015
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Biondi, Antonio; Milenovic, Milan;
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao IRIS - Università de...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao IRIS - Università de...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2016
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2016
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2013
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2013
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2022
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2022
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    VIRTA
    Doctoral thesis . 2019
    Data sources: VIRTA
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      VIRTA
      Doctoral thesis . 2019
      Data sources: VIRTA
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Pinto, Roberto; Zambetti, Michela Giuseppina;

    Nell'ultimo decennio, due macro fenomeni stanno rappresentato una sfida nei confronti delle strategie delle aziende manifatturiere: Servitizzazione e Digitalizzazione (Frank, Mendes, Ayala, & Ghezzi, 2019). Da un lato la possibilit� di affrontare la concorrenza vendendo pacchetti di prodotti e servizi, instaurando con il cliente un rapporto duraturo e basato sulla creazione di valore e dall'altro il progresso nel campo tecnologico che consente lo sviluppo di sistemi e prodotti automatici e intelligenti. All?incrocio dei due, uno degli aspetti pi� rilevanti da considerare � la possibilit� di raccogliere una grande quantit� di dati da fonti connesse che, abbinate ad efficaci strumenti di analisi, possono diventare una fonte chiave di creazione di valore nel contesto della fornitura di servizi. Sebbene le opportunit� in questo contesto siano chiare, la loro realizzazione sta creando difficolt� sia per dal punto di vista accademico che applicativo. In questo contesto, la ricerca presentata in questa tesi, contribuisce alla conoscenza e realizzazione di sistemi prodotto-servizio basati sulla raccolta dati, tramite lo sviluppo di conoscenze sistematiche nel contesto del Data-Driven Product Service System (DDPSS), formalizzando le caratteristiche dei DDPSS in un framework concettuale a due livelli e fornendo una metodologia data-driven di ingegnerizzazione dei servizi per le prime fasi del loro sviluppo. La ricerca � stata sviluppata in collaborazione continua con ABB, azienda che ha sponsorizzato il progetto e nella quale si sono svolte attivit� di action research. Inoltre, grazie al coinvolgimento nel ASAP Service Managemnt Forum, la ricerca ha beneficiato della collaborazione con svariate aziende impegnate nello sviluppo do DDPSS.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Archivio Istituziona...arrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    https://doi.org/10.13122/zambe...
    Other literature type . 2021
    Data sources: Datacite
    addClaim

    This Research product is the result of merged Research products in OpenAIRE.

    You have already added works in your ORCID record related to the merged Research product.
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Archivio Istituziona...arrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      https://doi.org/10.13122/zambe...
      Other literature type . 2021
      Data sources: Datacite
      addClaim

      This Research product is the result of merged Research products in OpenAIRE.

      You have already added works in your ORCID record related to the merged Research product.
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    Authors: Ioannou, Christiana A.;

    Includes bibliography (p. 155-165). Number of sources in the bibliography: 114 Thesis (Ph. D.) -- University of Cyprus, Faculty of Pure and Applied Sciences, Department of Computer Science, 2017. The University of Cyprus Library holds the printed form of the thesis. Τα Ασύρματα Δίκτυα Αισθητήρων (WSN) χρησιμοποιούνται για κρίσιμες εφαρμογές χάρη στην ικανότητά τους να παρέχουν χαμηλού κόστους, χαμηλής ισχύος, και διαφοροποιημένες υπηρεσίες παρακολούθησης. Επίσης, προσελκύουν και ανθρώπους με κακόβουλες προθέσεις που στοχεύουν στη διακοπή του δικτύου με κάθε δυνατό μέσο. Οι υφιστάμενες μέθοδοι ασφαλείας αποτυγχάνουν στον εντοπισμό αγνώστων κακόβουλων επιθέσεων και απαιτούν μνήμη και υπολογιστική ισχύ, στοιχεία τα όποια είναι περιοριστικά για τα ασύρματα δίκτυα αισθητήρων. Τα Συστήματα Ανίχνευσης Παρεισδύσεων Δικτύου (IDS) βρίσκονται στη δεύτερη γραμμή της άμυνας και ενεργοποιούνται αφότου οι επιθέσεις έχουν διεισδύσει την πρώτη γραμμή της άμυνας, το προληπτικό στρώμα. Οι περισσότερες μέθοδοι ανίχνευσης εισβολέων για ασύρματα δίκτυα αισθητήρων στη βιβλιογραφία, αξιολογούνται με τη χρήση εργαλείων προσομοίωσης ή με μαθηματικά μοντέλα. Στην παρούσα διδακτορική διατριβή παρουσιάζουμε το εργαλείο mIDS, το οποίο έχει τη δυνατότητα να εντοπίζει άγνωστες επιθέσεις, σε πραγματικό χρόνο με τη χρήση ελάχιστης ισχύς υπολογισμού και μνήμης. Δημιουργήσαμε και εφαρμόσαμε ένα εργαλείο παρακολούθησης στο λειτουργικό σύστημα Contiki O/S, το RMT, το οποίο παρακολουθεί και συλλέγει δεδομένα από πολλαπλά επίπεδα του δικτύου, σε πραγματικό χρόνο. Το εργαλείο RMT συγκεντρώνει στατιστικά στοιχεία από τα διάφορα επίπεδα του αισθητήρα και έχει τη δυνατότητα προκαθορισμού, τόσο των επίπεδων, όσο και των παραμέτρων που θα συλλέξει, ώστε να μειώσει τη χρήση μνήμης. Το RMT παρέχει πληροφορίες παρακολούθησης σε Συστήματα Ανίχνευσης Παρεισδύσεων Δικτύου (IDS), το mIDS, το οποίο ανιχνεύει επιθέσεις εντός του δικτύου. Σε μια εκτός σύνδεσης διαδικασία, τα δεδομένα που συγκεντρώνονται από την παρακολούθηση που διενεργεί το RMT αναλύονται χρησιμοποιώντας το στατιστικό εργαλείο Binary Logistic Regression (BLR), για καθορισμό της συνήθους δραστηριότητας του αισθητήρα. Ένα ακριβές μοντέλο ανίχνευσης συμπεριλαμβάνει καλοήθεις και ιογενείς συμπεριφορές, ώστε να είναι δυνατή η διαμόρφωση του πεδίου φυσιολογικής συμπεριφοράς. Εφαρμόσαμε επιθέσεις WSN που εντοπίζουν και μεταχειρίζονται τις ευπάθειες των πρωτοκόλλων στο επίπεδο δρομολόγησης για επιμόλυνση του αισθητήρα. Κατά το χρόνο εκτέλεσης, το mIDS χρησιμοποιεί δεδομένα καταχώρησης από το RMT και το προφίλ κανονικής δραστηριότητας, με σκοπό την ανίχνευση ανωμαλιών εντός του δικτύου. Σε προκαθορισμένα χρονικά διαστήματα, το mIDS αναλύει τη δραστηριότητα του αισθητήρα, χρησιμοποιώντας την εξίσωση πιθανοτήτων η οποία προέκυψε κατά την εκτός σύνδεσης διαδικασία με τη χρήση του BLR. Το mIDS προς το παρόν έχει εγκατασταθεί στους περιοριστικούς αισθητήρες με σκοπό την παρακολούθηση της δραστηριότητας του τοπικού αισθητήρα. Έχουμε αναπτύξει μοντέλα BLR για τη δρομολόγηση και για τα διαδικτυακά επίπεδα MAC, για την ανίχνευση επιθέσεων δρομολόγησης. Τα μοντέλα BLR τα οποία πέτυχαν 96 % - 100 % ακρίβεια ήταν αυτά που «εκπαιδεύτηκαν» με τα δεδομένα του επίπεδου δρομολόγησης. Επίσης, έχουμε αναπτύξει μοντέλα BLR για κάθε επίθεση, τα οποία εφαρμόζονται και αξιολογούνται σε πραγματικό χρόνο σε τρεις διαφορετικές τοπολογίες. Αναλόγως με το ποιο BLR μοντέλο παρουσίαζε προειδοποίηση, ήταν δυνατός ο προσδιορισμός του είδους της επίθεσης, κατά πόσο ο ιός είναι τύπου Selective Forward ή Blackhole ή αν η επίθεση είναι τύπου Sinkhole. Το μοντέλο BLR συγκεκριμένα για την επίθεση τύπου Sinkhole ανίχνευσε την επίθεση σε όλες τις διαδικτυακές τοπολογίες με 100% ακρίβεια. Wireless sensor networks are used for critical applications due to their ability to provide low-cost, low-power, and diversified monitoring services. They also attract people with malicious intent who aim in disrupting the network by any means possible. Existing security methods fail in identifying unknown malicious attacks and require memory and power which are limited resources for WSNs. Intrusion Detection Systems (IDS) are found at the second line of security defense. They are engaged once the intruder has penetrated the first line of defense, the preventive layer. Most intrusion detection solutions for WSNs in the literature, are evaluated using simulation tools or mathematical models. We propose and evaluate mIDS; a run-time, low-memory overhead IDS that can detect unknown attacks by imposing minimum computation power. We implemented a monitoring tool in Contiki O/S, called RMT, that monitors and collects data from multiple network layers, in real time. RMT gathers statistics from the various sensor node's layers that can be customized to decrease memory cost. RMT provides monitoring information to an anomaly IDS, called mIDS, that detects attacks within the network. At an offline stage the data gathered from the RMT monitoring is analysed using the profiling statistical Binary Logistic Regression (BLR) to define normal sensor activity. To have a fine grain detection model both benign and viral behaviors are included to form the plane of what is normal behavior. We implemented routing WSN attacks that take advantage of the routing layer vulnerabilities to infect the sensor node. At run time, mIDS uses input data from RMT and the normal activity profile to detect abnormalities within the network. At prede_ned intervals mIDS analyses sensor node activity using the probability equation extracted at the offline stage using BLR. mIDS is currently installed at the constrained nodes and it is responsible for monitoring local sensor behavior. We developed BLR models for the routing and the MAC network layers to detect routing attacks. The BLR models that achieved 96% - 100% accuracy levels were the ones trained with routing layer data. We developed BLR models for each attack implemented and evaluated real time in three different topologies. Depending which BLR model raised an alarm, we can classify the type of the attack if it has Selective Forward and/or Blackhole or if the attack is of type Sinkhole. The BLR model for Sinkhole attack detected, in all network topologies the attack with no false alarms.

    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao LEKYTHOSarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    LEKYTHOS
    Doctoral thesis . 2017
    Data sources: LEKYTHOS
    0
    citations0
    popularityAverage
    influenceAverage
    impulseAverage
    BIP!Powered by BIP!
    more_vert
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao LEKYTHOSarrow_drop_down
      image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
      LEKYTHOS
      Doctoral thesis . 2017
      Data sources: LEKYTHOS
  • image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao VIRTAarrow_drop_down
    image/svg+xml Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao Closed Access logo, derived from PLoS Open Access logo. This version with transparent background. http://commons.wikimedia.org/wiki/File:Closed_Access_logo_transparent.svg Jakob Voss, based on art designer at PLoS, modified by Wikipedia users Nina and Beao