This paper seeks to better understand the highly multi-dimensional, multi-faceted challenges of meeting trust and reliability requirements in critical, disaster aftermath communication networks comprising heterogeneous groups of nodes. Through emulation of a UK based flooding event in the South of England we show the impact of selfish and malicious nodes on disaster communications when disparate, distributed, and disconnected nodes are carrying sensitive messages relating to resource availability and need. To further support the need for trust-aware schemes in such environments we compare benchmark DTN protocols against our reliable, trust-aware framework, TACID, which penalises and excludes malicious nodes. We show that in disaster aftermath networks trust-aware schemes can significantly reduce the impact of malicious intermediary nodes and increase overall reliability whilst simultaneously maintaining message confidentiality. I.
Abstract-Video over vehicular networks continues to receive warranted attention, with envisioned applications having the potential to present entirely new opportunities and revolutionise existing services. Many video systems have been proposed, ranging from safety to advertising. We propose a novel system for VANETs, namely the TArgeted Remote Surveillance (TARS) module for the existing Greedy Perimeter Stateless Routing (GPSR) protocol which permits multiple mobile vehicles to request and receive live video feeds from vehicles within a select geographic region. The multi-hop, vehicle-to-vehicle system enables mobile units to surveil a target area in real time by leveraging the dashboard cameras of vehicles moving within the target region. We combine several proposed extensions to the core protocol to introduce a dynamic real time congestion aware clustering scheme to achieve this. Our proposed system is compared against existing routing protocols using mobility data from Nottingham. GPSR-TARS outperforms the protocols assessed in key criteria crucial for meeting the quality of service demands of live multimedia dissemination.
The Manchester Cochlear Implant Programme was established in 1988 and over 1000 patients have been implanted to date. Developments and improvements in cochlear implant technology over the past 21 years have resulted in new generations of implants and speech processors becoming available for use with patients. Since 2004, our patients have been asked to choose a device, based on their own preferences.This study looks at the speech discrimination scores of adults fitted with the latest generation of speech processors, including the Freedom (n=40), the Harmony (n=3) and the Opus 2 (n=7). These scores are also compared to those of patients using earlier generations of speech processors, including the Esprit 3G (n=89), the Auria (n=9) and the Tempo+ (n=38).Speech discrimination assessments (CUNY sentences, BKB sentences (in quiet and in noise) and AB words) were undertaken at the following intervals: 1 week, 3 months, 9 months and 21 months post switch-on. Patients were grouped according to their speech processor type and speech discrimination scores compared across the 6 groups.Our findings show that patients using the newer generation of speech processors tend to have higher speech discrimination scores than those using older generations of processor.
The emerging Smart Grid (SG) paradigm promises to address decreasing grid stability from thinning safe operating margins, meet continually rising demand from pervasive high capacity devices such as electric vehicles (EVs), and fully embrace the shift towards green energy solutions. At the SG edge, widespread decentralisation of heterogeneous devices coupled with fluctuating energy availability and need as well as a greatly increased fluidity between their roles as energy producers, consumers, and stores raises significant challenges to ensuring robustness and security of both information and energy exchange. Detecting and mitigating both malicious and non-malicious threats in these environments is essential to the realisation of the full potential of the SG. To address this need for robust, localised, real-time security at the grid edge we propose CONCEDE, a collaborative cross-layer ego-network integrity awareness and attack impact reduction extension to our previous work on delay-tolerant cognitive adaptive energy exchange. We detail a substantial, targeted, energy disruption attack perpetrated by colluding mobile energy prosumers. Our CONCEDE proposal is then evaluated in multiple, diverse smart micro-grid (SMG) scenarios using hybrid traces of EVs and infrastructure from Europe, North America, and South America in the presence of a coordinated attack from malicious distributors seeking to disrupt energy supply to a target community. We show that CONCEDE successfully detects and identifies the nodes exhibiting malicious, dishonest behaviour and that CONCEDE also reduces the impact of a coordinated energy disruption attack on innocent parties in all explored scenarios across multiple criteria.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.