Learn More
—We present the site-specific signal strength measurement results for path loss, shadowing, and fading in 2.4GHz band under typical harsh environment (high temperature 40-50 C and humidity 80-90%). We use spectrum analyzer Rohde & Schwarz FSH8 and InSSIDer (free software for WLANs). Measurements are taken in indoor and outdoor environments at various(More)
Given the recent emergence of the smart grid and smart grid related technologies, their security is a prime concern. Intrusion detection provides a second line of defence. However, conventional intrusion detection systems (IDSs) are unable to adequately address the unique requirements of the smart grid. This paper presents a gap analysis of contemporary(More)
Digital forensic examiners often need to identify the type of a file or file fragment based on the content of the file. Content-based file type identification schemes typically use a byte frequency distribution with statistical machine learning to classify file types. Most algorithms analyze the entire file content to obtain the byte frequency distribution,(More)
When security incidents occur, several challenges exist for conducting an effective forensic investigation of SCADA systems, which run 24/7 to control and monitor industrial and infrastructure processes. The Web extra at http://youtu.be/L0EFnr-famg is an audio interview with Irfan Ahmed about SCADA (supervisory control and data acquisition) systems.
This paper presents an energy efficient cluster ID based routing scheme with maximum residual node energy as one of routing metrics. The uneven load in network is minimized by cluster size adaptation technique. Our new routing protocol CIDRSN (Cluster ID based Routing in Sensor Networks) takes the cluster ID as next hop address instead of cluster-head ID)(More)
This paper presents an energy efficient selection of cooperative nodes with respect to their geographical location and the number of nodes participating in cooperative communications in wireless sensor networks. The cooperative communication in wireless sensor networks (WSN) gives us leverage to get the inherent advantages of its random node's locations and(More)
Identifying the file type (TXT, EXE, JPEG, etc.) is important for computer security applications such as computer forensics, steganalysis, and antivirus programs. The common approach for this is to use file extensions , magic numbers, or other header information. However, these are susceptible to tampering or corruption ; for instance, the file extension(More)
We develop and analyze an ARQ (Automatic Repeat reQuest) initialized transmit diversity protocol for cooperative communications. Medium access control (MAC) layer packet retransmission limit (similar to aShortRetryLimit or aLongRetryLimit [802.11-1997]) has been used as an actuator for transmit cooperative diversity initialization. We take the channel state(More)