Search results

1 – 10 of 948
Article
Publication date: 10 October 2016

Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…

Abstract

Purpose

Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network.

Design/methodology/approach

This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network.

Findings

A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms.

Originality/value

It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.

Details

Information & Computer Security, vol. 24 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 1 February 1983

M.P. Howarth and M.F. Guyote

Eddy current and ultrasonic sensing have potentially large advantages over vision systems for guidance of arc welding, except with very complex geometries. They are simpler, less…

Abstract

Eddy current and ultrasonic sensing have potentially large advantages over vision systems for guidance of arc welding, except with very complex geometries. They are simpler, less expensive, and eddy current is immune to fumes from the arc. The authors review work currently in progress at Oxford.

Details

Sensor Review, vol. 3 no. 2
Type: Research Article
ISSN: 0260-2288

Article
Publication date: 21 September 2021

Satyanarayana Pamarthi and R. Narmadha

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine…

408

Abstract

Purpose

Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.

Design/methodology/approach

This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.

Findings

It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.

Originality/value

This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.

Details

International Journal of Intelligent Unmanned Systems, vol. 10 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 14 October 2019

Rajendran N., Jawahar P.K. and Priyadarshini R.

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing…

Abstract

Purpose

The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network.

Design/methodology/approach

It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node.

Findings

The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches.

Research limitations/implications

In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA).

Practical implications

It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time.

Social implications

When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput.

Originality/value

The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.

Details

International Journal of Intelligent Unmanned Systems, vol. 7 no. 4
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 3 February 2012

Robert Kay and Marc Desmulliez

The purpose of this paper is to present a detailed overview of the current stencil printing process for microelectronic packaging.

1290

Abstract

Purpose

The purpose of this paper is to present a detailed overview of the current stencil printing process for microelectronic packaging.

Design/methodology/approach

This paper gives a thorough review of stencil printing for electronic packaging including the current state of the art.

Findings

This article explains the different stencil technologies and printing materials. It then examines the various factors that determine the outcome of a successful printing process, including printing parameters, materials, apparatus and squeegees. Relevant technical innovations in the art of stencil printing for microelectronics packaging are examined as each part of the printing process is explained.

Originality/value

Stencil printing is currently the cheapest and highest throughput technique to create the mechanical and electrically conductive connections between substrates, bare die, packaged chips and discrete components. As a result, this process is used extensively in the electronic packaging industry and therefore such a review paper should be of interest to a large selection of the electronics interconnect and assembly community.

Details

Soldering & Surface Mount Technology, vol. 24 no. 1
Type: Research Article
ISSN: 0954-0911

Keywords

Book part
Publication date: 20 March 2018

Brian Parsons

Abstract

Details

The Evolution of the British Funeral Industry in the 20th Century: From Undertaker to Funeral Director
Type: Book
ISBN: 978-1-78743-630-5

Content available
Article
Publication date: 25 June 2024

Emma O’Neill, Molly Bird and Simon Riches

Auditory hallucinations (“hearing voices”) are a relatively common experience, which is often highly distressing and debilitating. As mental health services are under increasing…

Abstract

Purpose

Auditory hallucinations (“hearing voices”) are a relatively common experience, which is often highly distressing and debilitating. As mental health services are under increasing pressures, services have witnessed a transformative shift with the integration of technology into psychological care. This study aims to narratively synthesise evidence of technology-enhanced psychological assessment and treatment of distressing voices (PROSPERO 393831).

Design/methodology/approach

This review was carried out according to the preferred reporting items for systematic reviews and meta-analyses. Embase, MEDLINE, PsycINFO and Web of Science were searched until 30th May 2023. The Effective Public Health Practice Project (EPHPP) tool assessed methodological quality of studies.

Findings

Searching identified 9,254 titles. Fourteen studies (two assessment studies, twelve treatment studies, published 2010–2022, n = 1,578) were included in the review. Most studies were conducted in the UK, the USA or Canada. Technologies included avatar therapy, mobile apps, virtual reality, a computerised Web-based programme and a mobile-assisted treatment. Overall, technology-enhanced psychological assessments and treatments appear feasible, acceptable and effective, with avatar therapy the most used intervention. EPHPP ratings were “strong” (n = 8), “moderate” (n = 5) and “weak” (n = 1).

Originality/value

To the best of the authors’ knowledge, this is the first systematic review to investigate these technologies, specifically for distressing voices. Despite the relatively small number of studies, findings offer promising evidence for the clinical benefits of these technologies for enhancing mental health care for individuals with distressing voices. More high-quality research on a wider range of technologies is warranted.

Details

Mental Health and Digital Technologies, vol. 1 no. 2
Type: Research Article
ISSN: 2976-8756

Keywords

Book part
Publication date: 23 December 2013

Lucy Budd, Steven Griggs and David Howarth

This chapter examines the torsions and blind spots that structure the contemporary debate on the politics and policy of aviation. It also generates different scenarios for the…

Abstract

Purpose

This chapter examines the torsions and blind spots that structure the contemporary debate on the politics and policy of aviation. It also generates different scenarios for the future of air travel, which can help to unblock the current impasse about the perceived costs and benefits of aviation and its attendant infrastructural needs.

Originality

This chapter characterises and evaluates the competing frames that organise the contested realities of air transport. By mapping out the current fault lines of aviation politics and policy, the chapter is also able to delineate four main scenarios regarding the future of aviation, which we name the ‘post-carbon’, ‘high-modernist’, ‘market regulation’ and ‘demand management’ projections respectively.

Methodology/approach

The chapter problematises and criticises the existing literature, policy reports and stakeholder briefings that inform the contemporary standoff in UK aviation policy. It uses the definition of sustainable development as a heuristic device to map and identify the fault lines structuring contemporary debates on aviation futures. It then builds upon this analysis to delimit four different scenarios for the future of flying.

Findings

The chapter analyses the contested realities of aviation politics. It re-affirms the political nature of such divisions, which in turn structure the rival understandings of aviation. The analysis suggests that the identified fault lines are constantly reiterated by competing appeals to ambiguous and contradictory evidence-bases or policy frames. Ultimately, the chapter claims that any significant reframing of aviation policy and politics rests on the outcome of political negotiations and persuasion. But it also depends on the broader views of citizens and stakeholders about the future challenges facing society, as well as the way in which governments and affected agents put in place and coordinate the multiple arenas in which a dialogue over the future of aviation can be held. Aviation futures cannot be reduced to the narrow confines of the technical merits or claims surrounding the feasibility of policy instruments.

Details

Sustainable Aviation Futures
Type: Book
ISBN: 978-1-78190-595-1

Keywords

Book part
Publication date: 26 November 2014

Michael Briguglio

This chapter analyses the politics of bird hunting in relation to the empowerment of environmental non-governmental organizations (ENGOs) in the European Union (EU), with specific…

Abstract

This chapter analyses the politics of bird hunting in relation to the empowerment of environmental non-governmental organizations (ENGOs) in the European Union (EU), with specific reference to Malta’s first years of EU accession.

In particular, the analysis focuses on the activism of Maltese and International ENGOs – with special focus on Birdlife Malta and Birdlife International – on this issue, which is characterized by extensive EU legislation and by constant lobbying.

This chapter argues that ENGOs, both Maltese and European, were influential on State power in Malta, especially by resorting to the EU, and also being given prominence by the media. Yet the hunting lobby was influential too, and its influence on Malta’s main political parties is an overdetermining factor, which remained in place even after EU accession.

This chapter concludes that despite Malta’s EU accession, national political factors remain highly influential in the Maltese hunting issue, and that one can expect more antagonism in the years to come.

Details

Occupy the Earth: Global Environmental Movements
Type: Book
ISBN: 978-1-78350-697-2

Keywords

Abstract

Purpose

To consider Critical Management Studies as a social movement.

Design/methodology/approach

The purpose is fulfilled by reflecting upon the history of Critical Management Studies by reference to social movement theory, institutional theory and the social theory of hegemony.

Findings

Critical Management Studies is plausibly understood as a social movement.

Originality/value

The chapter offers a fresh perspective on Critical Management Studies by representing it as a movement rather than as a specialist field of knowledge.

1 – 10 of 948