Real-time data muling using a team of heterogeneous unmanned aerial vehicles
Authors:
Emmanuel Tuyishimire,
Antoine Bagula,
Slim Rekhis,
Noureddine Boudriga
Abstract:
The use of Unmanned Aerial Vehicles (UAVs) in Data transport has attracted a lot of attention and applications, as a modern traffic engineering technique used in data sensing, transport, and delivery to where infrastructure is available for its interpretation. Due to UAVs constraints such as limited power lifetime, it has been necessary to assist them with ground sensors to gather local data which…
▽ More
The use of Unmanned Aerial Vehicles (UAVs) in Data transport has attracted a lot of attention and applications, as a modern traffic engineering technique used in data sensing, transport, and delivery to where infrastructure is available for its interpretation. Due to UAVs constraints such as limited power lifetime, it has been necessary to assist them with ground sensors to gather local data which has to be transferred to UAVs upon visiting the sensors. The management of such ground sensor communication together with a team of flying UAVs constitutes an interesting data muling problem which still deserves to be addressed and investigated. This paper revisits the issue of traffic engineering in Internet-of- Things (IoT) settings, to assess the relevance of using UAVs for the persistent collection of sensor readings from the sensor nodes located into an environment and their delivery to base stations where further processing is performed. We propose a persistent path planning and UAV allocation model, where a team of heterogeneous UAVs coming from various base stations are used to collect data from ground sensors and deliver the collected information to their closest base stations. This problem is mathematically formalised as a real-time constrained optimisation model, and proven to be NP-hard. The paper proposes a heuristic solution to the problem and evaluates its relative efficiency through performing experiments on both artificial and real sensors networks, using various scenarios of UAVs settings.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
Digital Investigation of Security Attacks on Cardiac Implantable Medical Devices
Authors:
Nourhene Ellouze,
Slim Rekhis,
Mohamed Allouche,
Noureddine Boudriga
Abstract:
A Cardiac Implantable Medical device (IMD) is a device, which is surgically implanted into a patient's body, and wirelessly configured using an external programmer by prescribing physicians and doctors. A set of lethal attacks targeting these devices can be conducted due to the use of vulnerable wireless communication and security protocols, and the lack of security protection mechanisms deployed…
▽ More
A Cardiac Implantable Medical device (IMD) is a device, which is surgically implanted into a patient's body, and wirelessly configured using an external programmer by prescribing physicians and doctors. A set of lethal attacks targeting these devices can be conducted due to the use of vulnerable wireless communication and security protocols, and the lack of security protection mechanisms deployed on IMDs. In this paper, we propose a system for postmortem analysis of lethal attack scenarios targeting cardiac IMDs. Such a system reconciles in the same framework conclusions derived by technical investigators and deductions generated by pathologists. An inference system integrating a library of medical rules is used to automatically infer potential medical scenarios that could have led to the death of a patient. A Model Checking based formal technique allowing the reconstruction of potential technical attack scenarios on the IMD, starting from the collected evidence, is also proposed. A correlation between the results obtained by the two techniques allows to prove whether a potential attack scenario is the source of the patient's death.
△ Less
Submitted 16 October, 2014;
originally announced October 2014.