+48 22 5128 100  
info@il-pib.pl

Szachowa 1,
04-894 Warszawa

Journal of Telecommunications and Information Technology (JTIT) - 2/2019

Ewa Niewiadomska-Szynkiewicz
Preface
https://doi.org/10.26636/jtit.2019.preface2
[ Bibtex Plain ]
Marek Janiszewski, Anna Felkner and Piotr Lewandowski
A Novel Approach to National-level Cyber Risk Assessment Based on Vulnerability Management and Threat Intelligence
Real-time assessment of IT-related risks, performed at the national level, is very important due to the evolving nature of threats that may originate from individual hackers, organized cyber-criminal groups, as well as state activities. Evaluation of risk that is based on technical information, as well as on mutual relationships between various institutions and services, may result in very valuable situational awareness. The paper describes (in general) cyber risk analysis method which will be implemented in Polish National Cybersecurity Platform.
https://doi.org/10.26636/jtit.2019.130919
[ Bibtex Plain ]
Andrzej Karbowski, Krzysztof Malinowski, Sebastian Szwaczyk and Przemysław Jaskóła
Critical Infrastructure Risk Assessment Using Markov Chain Model
The paper presents application of the Markov chain model to assess the risk affecting critical national infrastructure. A method for relating different service states to transition probabilities is shown. Then, a real-life example is thoroughly analyzed. Finally, results of a numerical test concerning this problem are provided.
https://doi.org/10.26636/jtit.2019.130819
[ Bibtex Plain ]
Adam Padée, Michał Wójcik, Arkadiusz Ćwiek, Konrad Klimaszewski, Przemysław Kopka, Sylwester Kozioł, Krzysztof Kuźmicki, Rafał Możdżonek, Wojciech Wiślicki and Tomasz Włodarski
On Preventing and Detecting Cyber Attacks in Industrial Control System Networks
This paper outlines the problem of cybersecurity in OT (operations/operational technology) networks. It provides descriptions of the most common components of these systems, summarizes the threats and compares them with those present in the IT domain. A considerable section of the paper summarizes research conducted over the past decade, focusing on how common the problem is and in which countries it prevails. The article presents techniques most commonly used in the protection of these systems, with many examples from the nuclear industry given.
https://doi.org/10.26636/jtit.2019.131219
[ Bibtex Plain ]
Wojciech Dudek and Wojciech Szynkiewicz
Cyber-security for Mobile Service Robots – Challenges for Cyber-physical System Safety
A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.
https://doi.org/10.26636/jtit.2019.131019
[ Bibtex Plain ]
Philokypros P. Ioulianou, Vassilios G. Vassilakis and Michael D. Logothetis
Battery Drain Denial-of-Service Attacks and Defenses in the Internet of Things
IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a popular routing protocol used in wireless sensor networks and in the Internet of Things (IoT). RPL was standardized by the IETF in 2012 and has been designed for devices with limited resources and capabilities. Open-source RPL implementations are supported by popular IoT operating systems (OS), such as ContikiOS and TinyOS. In this work, we investigate the possibility of battery drain Denial-of-Service (DoS) attacks in the RPL implementation of ContikiOS. In particular, we use the popular Cooja simulator and implement two types of DoS attacks, particularly version number modification and “Hello” flooding. We demonstrate the impact of these attacks on the power consumption of IoT devices. Finally, we discuss potential defenses relying on distributed intrusion detection modules.
https://doi.org/10.26636/jtit.2019.131919
[ Bibtex Plain ]
Andrzej Wilczyński and Adrian Widłak
Blockchain Networks – Security Aspects and Consensus Models
Data integration and fast effective data processing are the primary challenges in today’s high-performance computing systems used for Big Data processing and analysis in practical scenarios. Blockchain (BC) is a hot, modern technology that ensures high security of data processes stored in highly distributed networks and ICT infrastructures. BC enables secure data transfers in distributed systems without the need for all operations and processes in the network to be initiated and monitored by any central authority (system manager). This paper presents the background of a generic architectural model of a BC system and explains the concept behind the consensus models used in BC transactions. Security is the main aspect of all defined operations and BC nodes. The paper presents also specific BC use cases to illustrate the performance of the system in practical scenarios.
https://doi.org/10.26636/jtit.2019.132019
[ Bibtex Plain ]
Kummathi Chenna Reddy, Geetha D. Devanagavi and Thippeswamy M. N
CL-mWSNs: Cross Layer Model-Based QoS Centric Routing Protocol for Mission-Critical Cooperative Communication in Mobile WSNs
The paper presents a robust QoS centric routing protocol for mission-critical communication over mobile Wireless Sensor Networks (CL-mWSN) that exploits dynamic network states from the different layers of the IEEE 802.15.4 protocol stack to make the routing decision. The CL-mWSN protocol exploits three key layers: application layer, network layer and MAC layer. It exhibits proactive network and node table management, service differentiation, fair resource scheduling and congestion detection, avoidance at the network layer, as well as dynamic link quality estimation and packet injection rate estimation at the MAC layer to assess its candidature as the best forwarding node for QoS-centric mission-critical communication. Simulation reveals that the proposed routing model exhibits higher throughput, minimum loss and deadline miss ratio that augments QoS provision in mobile WSNs.
https://doi.org/10.26636/jtit.2019.129318
[ Bibtex Plain ]
Kiyoshi Ueda and Takumi Miyoshi
Autonomous Navigation Control of UAV Using Wireless Smart Meter Devices
In preparation for the upcoming home delivery services that rely on Unmanned Aerial Vehicles (UAVs), we developed a new multi-hop radio network that is laid over a smart meter network transferring electric energy information only. In this network, a UAV follows, for navigation purposes, the topology of a virtual network overlaid on the physical smart meter network. We established a service management control method which does not rely on image analysis or map information processing, i.e. processes that consume precious power resources of the UAV. Instead, navigation is based on the routing technology. The current distance between the UAV and a node of the smart meter network is measured by means of the radio transmission loss value, therefore determining the position of the UAV. A two-layer network model has been proposed. One layer consists of a network of nodes in a residential area with scattered buildings – a location that is safer to navigate – while the other is an access network of nodes in a densely populated area. Then, we proposed methods to determine the direction of movement towards the next hop node on the data-link layer and the end node on the network layer, which is the target destination. We implemented a software-based test system and verified the effectiveness of the proposed methods.
https://doi.org/10.26636/jtit.2019.132319
[ Bibtex Plain ]
Ewa Niewiadomska-Szynkiewicz and Michał P. Karpowicz
Infrastructure and Energy Conservation in Big Data Computing: A Survey
Progress in life, physical sciences and technology depends on efficient data-mining and modern computing technologies. The rapid growth of data-intensive domains requires a continuous development of new solutions for network infrastructure, servers and storage in order to address Big Datarelated problems. Development of software frameworks, include smart calculation, communication management, data decomposition and allocation algorithms is clearly one of the major technological challenges we are faced with. Reduction in energy consumption is another challenge arising in connection with the development of efficient HPC infrastructures. This paper addresses the vital problem of energy-efficient high performance distributed and parallel computing. An overview of recent technologies for Big Data processing is presented. The attention is focused on the most popular middleware and software platforms. Various energy-saving approaches are presented and discussed as well.
https://doi.org/10.26636/jtit.2019.132419
[ Bibtex Plain ]
Ranya Al-Musawi and Obada Al-Khatib
Optimized Energy Aware Resource Allocation Algorithm Using Software Defined Network Technology
The number of data centers (DCs) used for storing and processing data has evolved rapidly in recent years. However, the operations held by DCs may relate to a number of disadvantages, primarily presuming in excessive energy and power consumption due to the poor management standards applied. This may lead to a situation in which many devices within the DC operate at full capacity without any tasks assigned for actual execution. A Software Defined Network (SDN) is a network architecture where the control plane is an independent entity from the data plane, yielding to a higher controllability and flexibility over the network. Through the utilization of SDN architecture, a highly functional energy aware network may be established. In this paper, we propose a heuristic algorithm that monitors the current status of an SDN network (in addition to all ingoing and outgoing traffic), in order to dynamically and efficiently allocate network resources by ensuring that only the necessary network devices are active and by turning the idle ones off. The results show that the proposed algorithm reduces energy consumption of the network compared to existing solutions.
https://doi.org/10.26636/jtit.2019.129418
[ Bibtex Plain ]
Jolanta Brzostek-Pawłowska
Multimedia Mathematical Communication in a Diverse Group of Students
The article tackles the problem of improving mathematical communication in a group of students with different visual impairment levels, under the guidance of a group leader or a teacher. Visually impaired persons face a problem while learning mathematics. The said problem results from the specific nature in which mathematical content (formulas, function graphs, geometrical figures and projections of solids) is recorded and presented. The effectiveness of learning mathematics is boosted when students work in a group moderated by a leader. This requires them to share documents, with the leader being able to keep track of the individual work of each participant, and with the group discussing specific solutions. In order for a visually impaired student to be able to participate in and contribute to the work of the group, either remotely or locally, all participants must use universal IT tools that support visually impaired students without complicating the work of others. This paper presents interactive multimedia solutions developed under two research projects carried out by the author. The said solutions support communication in mathematics. Results of qualitative surveys on new solutions are presented, confirming their usefulness and the measurable impact they exert on the efficiency of the group’s work concerning mathematical problems.
https://doi.org/10.26636/jtit.2019.132819
[ Bibtex Plain ]