Reading, United Kingdom
Reading, United Kingdom

Time filter

Source Type

Gottwalt F.,University of New South Wales | Waller A.,Thales Research and Technology UK Ltd | Liu W.,Queen's University of Belfast
Proceedings - 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications, IEEE TrustCom/BigDataSE/ISPA 2016 | Year: 2016

The major challenges current network anomaly detection methods are facing is how to handle large amounts of data and how to model normal and anomalous behaviour in continuously changing environments. To address these issues, this paper investigates the applicability of natural laws as a baseline for network anomaly detection. Natural laws have the advantage of being computationally efficient without the requirement of a training phase and they have successfully shown their potential to detect anomalies in other areas. To evaluate if natural laws can be used to detect anomalies in network traffic, it is essential in a first step to find out if normal traffic obeys a natural law. For that, several TCP flow characteristics have been empirically evaluated against their compliance with three natural laws for normal, benign traffic. The results have shown that almost all characteristics do have a connection to the natural laws with some following them very accurately. The first precondition for the approach is thereby fulfilled and in our next work we are going to evaluate the approach on data containing anomalies. © 2016 IEEE.


Krukowski A.,Intracom S. A. Telecom Solutions | Efremidis S.,Athens Information Technology | Piira K.,VTT Technical Research Center of Finland | Stenlund O.,VTT Technical Research Center of Finland | And 4 more authors.
International Journal of Simulation: Systems, Science and Technology | Year: 2010

The paper presents the results of a joint work on the Integrated Building Information Management System developed and tested in the frame of the European research project I3CON funded from the 6th Framework Program. This innovative system proposes an innovative approach to dealing with building information managing, employing Wireless Sensor Networks and the Rule Based Engine for monitoring the building environment as well as for automatic control of its infrastructures (water, electricity, heating, cooling etc). It involved also the development of integrated user interfaces allowing location and context aware operation of the mobile system including methods and tools for their implementation for Building Service Operative applications. This allows mobile service personnel to have a full access to the building information system from their mobile terminals enhanced with location awareness (employing latest active RFID technologies), context awareness and multi-modal user interfaces for handsfree intuitive operation of a mobile system with little or no need for manual operation or control. A generic object browser was developed enabling of browsing building automation objects in real-time as well as static building database objects and properties using standard data communication protocols. The described technologies have been already deployed and tested in real environment of the residential Margarita building in the center of Madrid.


Lo A.,Technical University of Delft | Bauge T.,Thales Research and Technology UK Ltd | Harmer D.,Thales Research and Technology UK Ltd
IEEE Wireless Communications and Networking Conference, WCNC | Year: 2010

An Indoor Positioning System (IPS) routing protocol based on anycast is proposed for localization of emergency responders - referred to as IPS Anycast Routing (IAR). A cross-layer methodology is present in the design. This leads to IAR being extremely simple and lightweight. No dedicated routing packets are needed. Routing information is carried in the network header of data packets. The header consumes less than 1% of the total capacity. The anycast mechanism delivers a robust operation in dynamic and hostile environments. Simulation results show that the proposed routing protocol became highly scalable as the number of units increases. The route discovery and end-to-end packet delays are linearly proportional to and bounded by the network diameter. Simulation results also reveal that increasing the frequency of broadcasting position data packets does not significantly increase the speed of route discovery. A low broadcasting frequency conserves bandwidth but is slow in detecting topological changes. ©2010 IEEE.


Medjiah S.,University of Bordeaux 1 | Ahmed T.,University of Bordeaux 1 | Asgari A.H.,Thales Research and Technology UK Ltd.
International Journal of Sensor Networks | Year: 2012

Routing is a challenge to Wireless Multimedia Sensor Networks (WMSNs) for supporting multimedia applications due to nodes' energy constraints and computational capabilities, and the ways sensor nodes obtain forwarding information. In this paper, we propose an online multipath routing protocol that uses nodes' positions to make forwarding decisions at each hop. Real-time decisions are made without any need to have the entire network topology knowledge. The protocol achieves load-balancing and minimises nodes' energy consumption by utilising: (a) smart greedy forwarding scheme for selecting next hop, and (b) walking back forwarding scheme to bypass network holes. Performance comparisons of the proposed protocol (schemes) are made with TPGF and GPSR. The results show that our schemes: (a) maximise the overall network lifespan by not draining energy from some specific nodes, (b) provide QoS delivery for video streams by using best nodes along the route, and (c) scale better in highdensity WMSN. Copyright © 2012 Inderscience Enterprises Ltd.


Zhou B.,Liverpool John Moores University | Drew O.,Liverpool John Moores University | Arabo A.,Liverpool John Moores University | Llewellyn-Jones D.,Liverpool John Moores University | And 6 more authors.
2010 5th International Conference on System of Systems Engineering, SoSE 2010 | Year: 2010

In any system-of-systems the potential exists for interactions between systems to occur that may affect the security of the overall system. We present a scenario that aims to highlight such problems, in particular that of security at a network boundary. This scenario considers cooperation and interactions between organisations and systems in the context of a major public event, such as a sporting or entertainment event. Based on this we present a modelling tool able to highlight potential access violations that might occur through transfer of data between multiple organisations and suggest ways to mitigate these vulnerabilities. The use of the modelling tool for network boundary checking is demonstrated, using the example scenario. Suggestions are made as to how security and effectiveness can be achieved by applying safeguards to vulnerable areas, while allowing the free flow of data between organisations where this is known to be safe. © 2010 IEEE.


Mitseva A.,University of Aalborg | Aivaloglou E.,University of Aegean | Marchitti M.,University of Aalborg | Prasad N.R.,University of Aalborg | And 5 more authors.
Wireless Communications and Mobile Computing | Year: 2010

The integration of wireless sensor networks with different network systems gives rise to many research challenges to ensure security, privacy and trust in the overall architecture. The main contribution of this paper is a generic security, privacy and trust framework providing context-aware adaptability, flexibility and scalability which allows customisation of wireless sensor networks to a diverse set of application spaces. Suitable protocols and mechanisms are identified, which when combined according to the framework form a complete toolbox solution which fits the architecture of Beyond 3G environments. Performance evaluation results demonstrate the feasibility and estimate the benefits of the security framework for a variety of scenarios. Copyright © 2008 John Wiley & Sons, Ltd.


Asgari A.,Thales Research and Technology UK Ltd. | Stansfield E.V.,Thales Research and Technology UK Ltd.
International Journal of Network Management | Year: 2013

Wireless mesh networks (WMNs) as community- and city-wide type networks are required to extend their capability to offer real-time multimedia services. While technologies exist to support quality of service (QoS) at node level, we propose here a network-wide multi-step solution to manage and offer QoS across a WMN. From a provider perspective, the provisioning and fulfillment of QoS-based services fall under the realms of service management, network and traffic engineering functions. We describe the relevant functions required to design, implement and operate a WMN for providing a qualitative QoS to end-users. Our proposed solution considers network planning aspects, including node placement, node clustering and frequency assignments, route discovery between ingress-egress points and appropriate QoS provisioning across the network. Route-level QoS provisioning is defined as the process of allocating resources to the nodes along the identified routes to meet a priori known aggregated traffic demands in order to satisfy the QoS requirements for different types of application. Simulation and experimental tests are conducted to validate the correct behavior of processes/algorithms and to access the solution in achieving QoS for aggregate user traffic. Copyright © 2012 John Wiley & Sons, Ltd.

Loading Thales Research and Technology UK Ltd collaborators
Loading Thales Research and Technology UK Ltd collaborators