Search results
1 – 10 of 948Abdelaziz Amara Korba, Mehdi Nafaa and Salim Ghanemi
Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and…
Abstract
Purpose
Wireless multi-hop ad hoc networks are becoming very attractive and widely deployed in many kinds of communication and networking applications. However, distributed and collaborative routing in such networks makes them vulnerable to various security attacks. This paper aims to design and implement a new efficient intrusion detection and prevention framework, called EIDPF, a host-based framework suitable for mobile ad hoc network’s characteristics such as high node’s mobility, resource-constraints and rapid topology change. EIDPF aims to protect an AODV-based network against routing attacks that could target such network.
Design/methodology/approach
This detection and prevention framework is composed of three complementary modules: a specification-based intrusion detection system to detect attacks violating the protocol specification, a load balancer to prevent fast-forwarding attacks such as wormhole and rushing and adaptive response mechanism to isolate malicious node from the network.
Findings
A key advantage of the proposed framework is its capacity to efficiently avoid fast-forwarding attacks and its real-time detection of both known and unknown attacks violating specification. The simulation results show that EIDPF exhibits a high detection rate, low false positive rate and no extra communication overhead compared to other protection mechanisms.
Originality/value
It is a new intrusion detection and prevention framework to protect ad hoc network against routing attacks. A key strength of the proposed framework is its ability to guarantee a real-time detection of known and unknown attacks that violate the protocol specification, and avoiding wormhole and rushing attacks by providing a load balancing route discovery.
Details
Keywords
Eddy current and ultrasonic sensing have potentially large advantages over vision systems for guidance of arc welding, except with very complex geometries. They are simpler, less…
Abstract
Eddy current and ultrasonic sensing have potentially large advantages over vision systems for guidance of arc welding, except with very complex geometries. They are simpler, less expensive, and eddy current is immune to fumes from the arc. The authors review work currently in progress at Oxford.
Satyanarayana Pamarthi and R. Narmadha
Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine…
Abstract
Purpose
Nowadays, more interest is found among the researchers in MANETs in practical and theoretical areas and their performance under various environments. WSNs have begun to combine with the IoT via the sensing capability of Internet-connected devices and the Internet access ability of sensor nodes. It is essential to shelter the network from attacks over the Internet by keeping the secure router.
Design/methodology/approach
This paper plans to frame an effective literature review on diverse intrusion detection and prevention systems in Wireless Sensor Networks (WSNs) and Mobile Ad hoc NETworks (MANETs) highly suitable for security in Internet of Things (IoT) applications. The literature review is focused on various types of attacks concentrated in each contribution and the adoption of prevention and mitigation models are observed. In addition, the types of the dataset used, types of attacks concentrated, types of tools used for implementation, and performance measures analyzed in each contribution are analyzed. Finally, an attempt is made to conclude the review with several future research directions in designing and implementing IDS for MANETs that preserve the security aspects of IoT.
Findings
It observed the different attack types focused on every contribution and the adoption of prevention and mitigation models. Additionally, the used dataset types, the focused attack types, the tool types used for implementation, and the performance measures were investigated in every contribution.
Originality/value
This paper presents a literature review on diverse contributions of attack detection and prevention, and the stand of different machine learning and deep learning models along with the analysis of types of the dataset used, attacks concentrated, tools used for implementation and performance measures on the network security for IoT applications.
Details
Keywords
Rajendran N., Jawahar P.K. and Priyadarshini R.
The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing…
Abstract
Purpose
The purpose of this paper is to apply security policies over the mobile ad hoc networks. A mobile ad hoc network refers to infrastructure-less, persistently self-designing systems; likewise, there is a noteworthy innovation that supplies virtual equipment and programming assets according to the requirement of mobile ad hoc network.
Design/methodology/approach
It faces different execution and effectiveness-based difficulties. The major challenge is the compromise of performance because of unavailable resources with respect to the MANET. In order to increase the MANET environment’s performance, various techniques are employed for routing and security purpose. An efficient security module requires a quality-of-service (QoS)-based security policy. It performs the task of routing and of the mobile nodes, and it also reduces the routing cost by finding the most trusted node.
Findings
The experimental results specify that QoS-based security policy effectively minimizes the cost, response time as well as the mobile makespan (routing cost and response time) of an application with respect to other existing approaches.
Research limitations/implications
In this paper, the authors proposed an enhancement of Cross Centric Intrusion Detection System named as PIHNSPRA Routing Algorithm (PIHNSPRA).
Practical implications
It maps the security with the secure IDS communication and distributes the packets among different destinations, based on priority. This calculation is proposed for the purpose of routing and security by considering greatest throughput with least routing cost and reaction time.
Social implications
When the concept is applied to practical applications. Quality of Service introduced in the proposed research reduces the cost of routing and improves the throughput.
Originality/value
The proposed calculation is tested by NS2 simulator and the outcomes showed that the execution of the calculation is superior to other conventional algorithms.
Details
Keywords
Robert Kay and Marc Desmulliez
The purpose of this paper is to present a detailed overview of the current stencil printing process for microelectronic packaging.
Abstract
Purpose
The purpose of this paper is to present a detailed overview of the current stencil printing process for microelectronic packaging.
Design/methodology/approach
This paper gives a thorough review of stencil printing for electronic packaging including the current state of the art.
Findings
This article explains the different stencil technologies and printing materials. It then examines the various factors that determine the outcome of a successful printing process, including printing parameters, materials, apparatus and squeegees. Relevant technical innovations in the art of stencil printing for microelectronics packaging are examined as each part of the printing process is explained.
Originality/value
Stencil printing is currently the cheapest and highest throughput technique to create the mechanical and electrically conductive connections between substrates, bare die, packaged chips and discrete components. As a result, this process is used extensively in the electronic packaging industry and therefore such a review paper should be of interest to a large selection of the electronics interconnect and assembly community.
Details
Keywords
Emma O’Neill, Molly Bird and Simon Riches
Auditory hallucinations (“hearing voices”) are a relatively common experience, which is often highly distressing and debilitating. As mental health services are under increasing…
Abstract
Purpose
Auditory hallucinations (“hearing voices”) are a relatively common experience, which is often highly distressing and debilitating. As mental health services are under increasing pressures, services have witnessed a transformative shift with the integration of technology into psychological care. This study aims to narratively synthesise evidence of technology-enhanced psychological assessment and treatment of distressing voices (PROSPERO 393831).
Design/methodology/approach
This review was carried out according to the preferred reporting items for systematic reviews and meta-analyses. Embase, MEDLINE, PsycINFO and Web of Science were searched until 30th May 2023. The Effective Public Health Practice Project (EPHPP) tool assessed methodological quality of studies.
Findings
Searching identified 9,254 titles. Fourteen studies (two assessment studies, twelve treatment studies, published 2010–2022, n = 1,578) were included in the review. Most studies were conducted in the UK, the USA or Canada. Technologies included avatar therapy, mobile apps, virtual reality, a computerised Web-based programme and a mobile-assisted treatment. Overall, technology-enhanced psychological assessments and treatments appear feasible, acceptable and effective, with avatar therapy the most used intervention. EPHPP ratings were “strong” (n = 8), “moderate” (n = 5) and “weak” (n = 1).
Originality/value
To the best of the authors’ knowledge, this is the first systematic review to investigate these technologies, specifically for distressing voices. Despite the relatively small number of studies, findings offer promising evidence for the clinical benefits of these technologies for enhancing mental health care for individuals with distressing voices. More high-quality research on a wider range of technologies is warranted.
Details
Keywords
Lucy Budd, Steven Griggs and David Howarth
This chapter examines the torsions and blind spots that structure the contemporary debate on the politics and policy of aviation. It also generates different scenarios for the…
Abstract
Purpose
This chapter examines the torsions and blind spots that structure the contemporary debate on the politics and policy of aviation. It also generates different scenarios for the future of air travel, which can help to unblock the current impasse about the perceived costs and benefits of aviation and its attendant infrastructural needs.
Originality
This chapter characterises and evaluates the competing frames that organise the contested realities of air transport. By mapping out the current fault lines of aviation politics and policy, the chapter is also able to delineate four main scenarios regarding the future of aviation, which we name the ‘post-carbon’, ‘high-modernist’, ‘market regulation’ and ‘demand management’ projections respectively.
Methodology/approach
The chapter problematises and criticises the existing literature, policy reports and stakeholder briefings that inform the contemporary standoff in UK aviation policy. It uses the definition of sustainable development as a heuristic device to map and identify the fault lines structuring contemporary debates on aviation futures. It then builds upon this analysis to delimit four different scenarios for the future of flying.
Findings
The chapter analyses the contested realities of aviation politics. It re-affirms the political nature of such divisions, which in turn structure the rival understandings of aviation. The analysis suggests that the identified fault lines are constantly reiterated by competing appeals to ambiguous and contradictory evidence-bases or policy frames. Ultimately, the chapter claims that any significant reframing of aviation policy and politics rests on the outcome of political negotiations and persuasion. But it also depends on the broader views of citizens and stakeholders about the future challenges facing society, as well as the way in which governments and affected agents put in place and coordinate the multiple arenas in which a dialogue over the future of aviation can be held. Aviation futures cannot be reduced to the narrow confines of the technical merits or claims surrounding the feasibility of policy instruments.
Details
Keywords
This chapter analyses the politics of bird hunting in relation to the empowerment of environmental non-governmental organizations (ENGOs) in the European Union (EU), with specific…
Abstract
This chapter analyses the politics of bird hunting in relation to the empowerment of environmental non-governmental organizations (ENGOs) in the European Union (EU), with specific reference to Malta’s first years of EU accession.
In particular, the analysis focuses on the activism of Maltese and International ENGOs – with special focus on Birdlife Malta and Birdlife International – on this issue, which is characterized by extensive EU legislation and by constant lobbying.
This chapter argues that ENGOs, both Maltese and European, were influential on State power in Malta, especially by resorting to the EU, and also being given prominence by the media. Yet the hunting lobby was influential too, and its influence on Malta’s main political parties is an overdetermining factor, which remained in place even after EU accession.
This chapter concludes that despite Malta’s EU accession, national political factors remain highly influential in the Maltese hunting issue, and that one can expect more antagonism in the years to come.
Details
Keywords
To consider Critical Management Studies as a social movement.
Abstract
Purpose
To consider Critical Management Studies as a social movement.
Design/methodology/approach
The purpose is fulfilled by reflecting upon the history of Critical Management Studies by reference to social movement theory, institutional theory and the social theory of hegemony.
Findings
Critical Management Studies is plausibly understood as a social movement.
Originality/value
The chapter offers a fresh perspective on Critical Management Studies by representing it as a movement rather than as a specialist field of knowledge.
Details