IOTA is a revolutionary new, next generation public distributed ledger that utilizes a novel invention, called a “Tangle”, at its core. The Tangle is a new data structure based on a Directed Acyclic Graph (DAG). As such it has no Blocks, no Chain and also no Miners. Because of this radical new architecture, things in IOTA work quite differently compared to other Blockchains.
Abstract:We have been using mobiles and laptops for quite a long time, yet their security is poor. Any pattern or alpha-numeric lock can be forged by an un-authentic user. When someone wants to perform a major change in operating system's settings they are not asked to re-authenticate the user. Our application guards the system using facial recognition.
This project presents a prototype security door that can be remotely controlled by a GSM phone set acting as the transmitter and another GSM phone set with a dual tone multi-frequency (DTMF) connected to the door motor through a DTMF decoder interfaced with micro controller unit and a stepper motor. The design is composed of four main functional modules, namely; the GSM module, the IR SENSOR module, GAS SENSOR module and the FIRE SENSOR module. The GSM module act as both transmitting and receiving unit employs the use of a mobile phone set serving as the communication device between the user at one end and the object of access (i.e. the door) at the other receiving end. The codes for this project was written in Embedded C language with Android application compiled by visual studio and keil software , the program run without error before it was burn onto the micro controller using a device called the programmer by placing the micro controller on it socket equal to the pin number.
Abstract-With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET) geared towards routing efficiency, the resulting protocols tend to be vulnerable to various attacks. Over the years, emphasis has also been placed on improving the security of these networks. Different solutions have been proposed for different types of attacks, however, these solutions often compromise routing efficiency or network overload. One major DOS attack against the Optimized Link State Routing protocol (OLSR) known as the node isolation attack occurs when topological knowledge of the network is exploited by an attacker who is able to isolate the victim from the rest of the network and subsequently deny communication services to the victim. In this paper, we suggest a novel solution to defend the OLSR protocol from node isolation attack by employing the same tactics used by the attack itself. Through extensive experimentation, we demonstrate that 1) the proposed protection prevents more than 95 percent of attacks, and 2) the overhead required drastically decreases as the network size increases until it is nondiscernable. Last, we suggest that this type of solution can be extended to other similar DOS attacks on OLSR.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.