-
Joint position and trajectory optimization of flying base station in 5G cellular networks, based on users' current and predicted location
Authors:
Mehdi Sookhak,
Amir Hossein Mohajerzadeh
Abstract:
Nowadays, Unmanned Aerial Vehicles (UAVs) have been significantly improved, and one of their most important applications is to provide temporary coverage for cellular users. Static Base Station cannot service all users due to temporary crashes because of temporary events such as ground BS breakdowns, bad weather conditions, natural disasters, transmission errors, etc., drones equipped with small c…
▽ More
Nowadays, Unmanned Aerial Vehicles (UAVs) have been significantly improved, and one of their most important applications is to provide temporary coverage for cellular users. Static Base Station cannot service all users due to temporary crashes because of temporary events such as ground BS breakdowns, bad weather conditions, natural disasters, transmission errors, etc., drones equipped with small cellular BS. The Drone Base Station is immediately sent to the target location and establishes the necessary communication links without requiring any predetermined infrastructure and covers that area. Finding the optimal location and the appropriate number (DBS) of drone-BS in this area is a challenge. Therefore, in this paper, the optimal location and optimal number of DBSs are distributed in the current state of the users and the subsequent user states determined by the prediction. Finally, the DBS transition is optimized from the current state to the predicted future locations. The simulation results show that the proposed method can provide acceptable coverage on the network.
△ Less
Submitted 8 February, 2022;
originally announced February 2022.
-
Deterrence and Prevention-based Model to Mitigate Information Security Insider Threats in Organisations
Authors:
Nader Sohrabi Safa,
Carsten Maple,
Steve Furnell,
Muhammad Ajmal Azad,
Charith Perera,
Mohammad Dabbagh,
Mehdi Sookhak
Abstract:
Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information as…
▽ More
Previous studies show that information security breaches and privacy violations are important issues for organisations and people. It is acknowledged that decreasing the risk in this domain requires consideration of the technological aspects of information security alongside human aspects. Employees intentionally or unintentionally account for a significant portion of the threats to information assets in organisations. This research presents a novel conceptual framework to mitigate the risk of insiders using deterrence and prevention approaches. Deterrence factors discourage employees from engaging in information security misbehaviour in organisations, and situational crime prevention factors encourage them to prevent information security misconduct. Our findings show that perceived sanctions certainty and severity significantly influence individuals' attitudes and deter them from information security misconduct. In addition, the output revealed that increasing the effort, risk and reducing the reward (benefits of crime) influence the employees' attitudes towards prevent information security misbehaviour. However, removing excuses and reducing provocations do not significantly influence individuals' attitudes towards prevent information security misconduct. Finally, the output of the data analysis also showed that subjective norms, perceived behavioural control and attitude influence individuals' intentions, and, ultimately, their behaviour towards avoiding information security misbehaviour.
△ Less
Submitted 15 March, 2019;
originally announced March 2019.
-
Secure Geographic Routing Protocols: Issues and Approaches
Authors:
Mehdi sookhak,
Ramin Karimi,
Mahboobeh Haghparast,
Ismail Fauzi ISnin
Abstract:
In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.
In the years, routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing of wireless sensor network .In this paper we review the existing secure geographic routing protocols for wireless sensor network (WSN) and also provide a qualitative comparison of them.
△ Less
Submitted 28 November, 2011;
originally announced November 2011.