Academic literature on the topic 'FLOODING CONTROL PROTOCOL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'FLOODING CONTROL PROTOCOL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "FLOODING CONTROL PROTOCOL"

1

ZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Full text
Abstract:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol adapts to the specific routing requirements of the task and the dynamic changes of the network. We analyze this framework in simulation using some real-world applications in sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (2021): 2274. http://dx.doi.org/10.3390/electronics10182274.

Full text
Abstract:
The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads, end-to-end delay, and average per-hop one-way delay in comparison to the BLE mesh (flooding) protocol and AODV protocol for all three scenarios (linear topology with ten nodes, multipath topology with six and ten nodes). In addition, the proposed protocol exhibited practically constant route requests and route reply setup times. Furthermore, the proposed protocol demonstrated a better Packet Delivery Ratio (PDR) for O-AODV (84%) in comparison to AODV (71%), but lower than the PDR of the mesh (flooding) protocol with 93%.
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Churan, and Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding." ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.

Full text
Abstract:
A central question in wireless sensor network research is how to reduce the consumption of the energy of the sensor nodes. Theoretically, the network coding technology proposed by Ahlswede et al (2000) can improve the network reliability and network throughput, increase the robustness and save energy. Based on the classic flooding routing protocol, the present study proposes a new flooding control protocol, i.e. NC-Flooding for wireless sensor networks. NC-Flooding protocol introduces five mechanisms to enhance the efficiency of wireless sensor networks. As shown by MATLAB simulation results, NC-Flooding protocol reduces the number of broadcasts of wireless sensor networks, increases the throughput of the network and increases the bandwidth utilization. We conclude that NC-Flooding protocol reduces data forwarding cost and node energy consumption and extends nodes’ life cycle, thus increasing network utilization.
APA, Harvard, Vancouver, ISO, and other styles
4

Al-Shihri, Fatima, and Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.

Full text
Abstract:
The authors proposed a Reliable and energy efficient Routing Protocol (RRP) for underwater sensor network, integrating the desired features of the Directional Flooding based Routing (DFR) and Vector Based Void Avoidance (VBVA) protocols. The new algorithm considers reliability and takes into consideration the residual energy for each node before choosing the forwarding node. RRP relies on a packet flooding technique to increase reliability. However, to prevent a packet from flooding to the whole network, they control the number of nodes forwarding a packet by measuring a link quality between nodes in a hop by hop. To mitigate the effect of the inherent void problem, the authors consider residual energy, link quality, and distance from destination node to choose a reliable path to forward packet to destination. The authors observe that RRP protocol has better performance in terms of the packet delivery ratio than the DFR protocol due to the void avoidance technique.
APA, Harvard, Vancouver, ISO, and other styles
5

Prabhu. M, Mr Dinesh, and Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach." International Journal of Engineering and Computer Science 10, no. 12 (2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.

Full text
Abstract:
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work. Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques
APA, Harvard, Vancouver, ISO, and other styles
6

Singh, Prabhdeep, Anuj Kumar Gupta, and Ravinder Singh. "Improved priority-based data aggregation congestion control protocol." Modern Physics Letters B 34, no. 02 (2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.

Full text
Abstract:
With advancement in multimedia applications, Wireless sensor networks (WSNs) are becoming popular due to their inherent characteristics and wide range of applications. However, WSNs contain very small sensor nodes, these nodes are battery constrained. Also, the batteries of these sensor nodes are not either replaceable or rechargeable. Therefore, many energy efficient protocols have been implemented so far to improve the network lifetime. However, the data aggregation at sink may suffer from data flooding issue, which reduces the network lifetime of WSNs. For handling this issue, in this paper, an effective data aggregation approach is designed. We have designed a priority-based data aggregation control protocol, which considers token bucket, Lempel–Ziv–Welch (LZW) compression and a hybrid of ant colony optimization and particle swarm optimization-based soft computing approach. Extensive experiments reveal that the presented protocol provides better network lifetime in contrast to the existing energy efficient protocols.
APA, Harvard, Vancouver, ISO, and other styles
7

Shams Shafigh, Alireza, Kamran Abdollahi, and Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.

Full text
Abstract:
Multicast routing is an efficient method to lead data packets from one source group to several nodes as destination group. Although multicast routing algorithms could be efficient in many situations but their routing mechanism like as route request flooding packets likely results in poor performance in comparison to unicast routing algorithms. In this research, two efficient methods are proposed to improve the performance of On Demand Multicast Routing Protocol (ODMRP). The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmenting the Join Query packets with additional information such as speed, power level of node, and link bandwidths. Besides, the control overhead is further reduced by restricting the domain of control packet flooding (by restricting the domain of control packet flooding). The performance evaluation shows that the proposed scheme increases the packet delivery rate by up to 40%, while reducing average end-to-end delay and consumed power by about 35% and 45%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
8

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Full text
Abstract:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prove that AMBR is a sound and robust protocol in terms of flooding, routing overhead and hence, enhances reliability
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, et al. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.

Full text
Abstract:
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect network topology status. The OFDP detects the link between switches by generating link layer discovery protocol (LLDP) packets. However, OFDP is not a security protocol. Attackers can use it to perform topology discovery via injection, man-in-the-middle, and flooding attacks to confuse the network topology. This study proposes a correlation-based topology anomaly detection mechanism. Spearman’s rank correlation is used to analyze the network traffic between links and measure the round-trip time of each LLDP frame to determine whether a topology discovery via man-in-the-middle attack exists. This study also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using topology discovery via injection attack to generate fake links and topology discovery via flooding attack to cause network routing or switching abnormalities.
APA, Harvard, Vancouver, ISO, and other styles
10

Elejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, and Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks." Applied Sciences 12, no. 12 (2022): 6150. http://dx.doi.org/10.3390/app12126150.

Full text
Abstract:
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, it exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they are mandatory messages that cannot be blocked or disabled. One of the threats currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial of service (DDoS) attacks. Therefore, this paper proposes a deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks by introducing an ensemble feature selection technique that utilizes chi-square and information gain ratio methods to select significant features for attack detection with high accuracy. In addition, a long short-term memory (LSTM) is employed to train the detection model on the selected features. The proposed approach was evaluated using a synthetic dataset for false-positive rate (FPR), detection accuracy, F-measure, recall, and precision, achieving 0.55%, 98.41%, 98.39%, 97.3%, and 99.4%, respectively. Additionally, the results reveal that the proposed approach outperforms the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "FLOODING CONTROL PROTOCOL"

1

Hussein, Abedellatif Mohammed. "Flooding control in route discovery for reactive routing in mobile ad hoc networks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KUMAR, S. P. AJITH. "ROUTING AND CONGESTION CONTROL IN OPPORTUNISTIC NETWORKS." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14606.

Full text
Abstract:
ABSTRACT Opportunistic networks are one of the most interesting evolutions of MANETs. Mobile nodes are enabled to communicate with each other in opportunistic networks even if there is no route to connect them. Also, nodes are not having knowledge about the network topology, which (instead) is necessary in MANET routing protocols. In this network routes are building dynamically, whenever messages are en route between the sender and the destination(s), and any potential node can be opportunistically used as the next hop, provided it is bringing the message nearer to the destination. These necessities make opportunistic networks a challenging and demanding research field. In this project, a new routing protocol named as Reduced Flooding Epidemic Protocol (RFEP) for infrastructure-less is proposed and is an existing Epidemic routing protocol improvement model. Its objective is to reduce the amount of flooding done in the Epidemic protocol. Therefore it reduces the resource consumption and network bandwidth and as well as power of nodes that helps in maximizing the network lifetime. Also a method for congestion control is proposed here for opportunistic networks. Congestion is an important problem in this network because some nodes having better connection comparing with other nodes and so the load is unfairly distributed towards them. Therefore, a threshold based packet forwarding scheme is proposed in this work to overcome this issue. Number of nodes is selected as the subsequent hop to forward the packets whose utility metric computed based on its social metrics, delay and packet dropping probability which is higher than the current host by the predefined threshold. The outcome shows that it generated very good results in terms of delivery probability, overhead ratio and reduced number of packets dropped.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "FLOODING CONTROL PROTOCOL"

1

Al-Na'amneh, Qais, Walid Dhifallah, Rahaf Hazaymih, et al. "DIS Flooding Attack Impact in RPL-Based 6LowPAN Network." In Advances in Computational Intelligence and Robotics. IGI Global, 2024. http://dx.doi.org/10.4018/979-8-3693-7540-2.ch004.

Full text
Abstract:
Networks that use RPL are vulnerable to security concerns called RPL flood attacks. The IPv6 Routing Protocol for Low-Power and Lossy Networks mitigation technique Secure-RPL is proposed in this study to effectively identify and prevent DIS flooding attacks with minimal overhead. Malicious nodes overload available resources, obstruct communication, and impede data transfer, which may result in performance issues and service outages. It is essential to use countermeasures like message filtering and intrusion detection systems. This chapter shows that the DIS flooding assault increases the network's control packet overhead, greatly degrading network performance. This raises the network nodes' power consumption. To solve this issue, a mitigation strategy called Secure-RPL is proposed. The suggested approach considerably reduces the impact of a DIS flooding attack on the network performance. The effectiveness of the suggested Secure-RPL system is compared to the normal RPL protocol.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Bahadili, Hussein, Abdel Rahman Alzoubaidi, and Ali Al-Khalidi. "Comparing Various Route Discovery Algorithms in Ad Hoc Wireless Networks." In Simulation in Computer Network Design and Modeling. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch010.

Full text
Abstract:
Dynamic (reactive or on-demand) routing protocols used in wireless ad hoc networks suffer from transmitting a huge number of control packets during the route discovery phase of the protocols, which increases the overhead significantly. Therefore, a number of optimization protocols have been developed throughout the years. This chapter compares the performance of various route discovery algorithms in ad hoc wireless networks, namely, pure flooding, probabilistic, Location-Aided Routing scheme 1 (LAR-1), LAR-1-Probabilsitic (LAR-1P), and Optimal Multipoint Relying (OMPR). The results obtained through the different simulations are analyzed and compared. This chapter will help practitioners of various kinds (academics, professionals, researchers, and students) grasp a solid understanding of the behavior of ad hoc wireless network route discovery algorithms and develop an appreciation for flooding optimization mechanisms. It also substantiates the case of experimenting via simulation with such models and shows how the different simulation parameters interplay.
APA, Harvard, Vancouver, ISO, and other styles
3

Afzal, Saad. "Implementation of Flooding Free Routing in Smart Grid." In Smart Grid as a Solution for Renewable and Efficient Energy. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0072-8.ch013.

Full text
Abstract:
Smart Grid is a communication and automatic control capabilities in electric power grid system for improving efficiency, reliability, management, capabilities and security of electric power grid. Routing is important in Smart Grid to send data from one point to another point. Routing in Smart Grid is necessary to search /identify destination point/node for communication and to computer the best available route in the network topology among which the data to be sent during communication. Smart Grid can be a combination of fixed nodes (home appliances, smart meter, control centre, etc.) but the nature of communication between fixed nodes is dynamic due to the switch on/off or the fluctuation in electricity flow. Therefore the fixed nodes can also be disappeared from the network topology in Smart Grid. Existing routing protocols for Smart Grid are based on flooding mechanism. We would like to examine the feasibility of flooding free routing in Smart Grid. Then we will propose a flooding-free routing for Smart.
APA, Harvard, Vancouver, ISO, and other styles
4

Mnif, Kais, and Michel Kadoch. "Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks." In Innovations in Mobile Multimedia Communications and Applications. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-563-6.ch004.

Full text
Abstract:
This paper proposes to use virtual backbone structure to handle control messages in ad hoc networks. This structure is effective in reducing the overhead of disseminating control information. In the first part, the approach to build the virtual backbone on the setup phase is presented. The construction of backbone is based on the Minimum Connected Dominating Set (MCDS). The novelty is in the way on finding the MCDS. A Linear Programming approach is used to build a Minimum Dominating Set (MDS). Then, a spanning tree algorithm is applied to provide the MCDS. A theoretical analysis based on probabilistic approach is developed to evaluate the size of MCDS. Different techniques of diffusion in ad hoc networks are presented and compared. The flooding technique is simple and efficient, but it is expensive in term of bandwidth consumption and causes broadcast storm problem. Simulation results show that technique using virtual backbone performs flooding and it is compared to MPR (Multipoint Relay). The second part of this paper presents a distributed procedure to maintain the backbone when the mobility of terminals is introduced. A maintenance procedure will be executed by the node which changes its position. This procedure is distributed and guarantees the node connectivity to the backbone. The authors believe that the maintenance of the backbone with small size will be more effective. Simulation results show the performance of this procedure when mobility and scalability are considered.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "FLOODING CONTROL PROTOCOL"

1

McInnes, Allan I. "Model-checking the Flooding Time Synchronization Protocol." In 2009 IEEE International Conference on Control and Automation (ICCA). IEEE, 2009. http://dx.doi.org/10.1109/icca.2009.5410508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Terada, Shinsuke, Takumi Miyoshi, Hiroaki Morino, Masakatsu Ogawa, and Kaoru Sezaki. "AD HOC Routing Protocol with Flooding Control using Unidirectional Links." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yamamura, Natsuru, and Takuo Nakashima. "Flooding Features for the AODV Protocol under the Different Communication Distances." In 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC). IEEE, 2009. http://dx.doi.org/10.1109/icicic.2009.213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sawant, Khushboo, Manoj Kumar Rawat, and Aakansha Jain. "Implementation of energy aware secure routing protocol over flooding environment in MANET." In 2015 International Conference on Computer, Communication and Control (IC4). IEEE, 2015. http://dx.doi.org/10.1109/ic4.2015.7375560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mkuzangwe, Nenekazi N. P., Andre McDonald, and Fulufhelo V. Nelwamondo. "Implementation of anomaly detection algorithms for detecting Transmission Control Protocol Synchronized flooding attacks." In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2015. http://dx.doi.org/10.1109/fskd.2015.7382282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elamsy, Tarik, and Randa El-Marakby. "Flooding Zone Control Protocol (FZCP): enhancing the reliability of real-time multimedia delivery in WSNs." In 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2009. http://dx.doi.org/10.1109/isspit.2009.5407585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sha, Y., W. Xiong, L. C. Zhu, L. L. Zhang, Z. W. Zhang, and Q. W. Fan. "Research of a flooding control routing protocol based on location prediction in an Ad Hoc network." In International Conference on Computer Science and Technology. WIT Press, 2014. http://dx.doi.org/10.2495/iccst140991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rekha, S. Nithya, and C. Chandrasekar. "A comparative analysis of probabilistic broadcasting to reduce flooding with FSR (Fisheye State Routing) protocol and grid FSR using MANET." In PROCEEDINGS OF THE SIXTH GLOBAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION. AIP, 2012. http://dx.doi.org/10.1063/1.4769018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Al-Murayri, Mohammed Taha, Hadeel Faisal Abdulraheem, Faisal Ahmed Qureshi, et al. "Significant Oil Uplift from Field Implementation of the First High Salinity Polymer-Flood Targeting a Sour Heavy Oil Reservoir Worldwide." In ADIPEC. SPE, 2023. http://dx.doi.org/10.2118/216595-ms.

Full text
Abstract:
Abstract A regular 5-spot pattern has been used to evaluate the techno-economic feasibility of polymerflooding after water-flooding using high salinity effluent water (up to 200,000 ppm TDS) for the Umm Niqa Lower Fars (UNLF) reservoir using a sulfonated synthetic polymer (Polymer A) that was selected based on extensive lab evaluation followed by a one-spot EOR pilot (Al-Murayri et al., 2020). Upon acquiring positive one-spot EOR pilot results, it was decided to proceed with a regular 5spot water-flooding/polymer-flooding pilot composed of 4 injectors, one producer, and one disposal well. Water-flooding started in 2021 and continued for approximately 1.5 years. After establishing a water-flooding baseline, polymer-flooding was initiated by late 2022. An integrated surveillance/monitoring protocol has been established including downhole pressure/temperature sensors, wellhead gauges, flowmeters, in-line viscometer(s), well logging, passive/partitioning tracer campaigns and detailed lab analysis of produced and injected samples. Besides lab analysis of produced samples, oil cut measurements have been regularly validated using a multi-phase flowmeter, a 3-phase separator and portable 2-phase separators. Water injection into UNLF was successfully implemented under sub-fracturing conditions. Tracer data indicated that two of the injectors are more connected to the central producer compared to the other two. A steep increase in water cut at the central pilot producer was clearly noticed reaching ~90% before the commencement of polymer-flooding. Approximately 0.55 PV of water was injected prior to polymer injection. The central producer has been producing since January 2016. Oil recovery from natural depletion and water-flooding is estimated to be around 23%. After polymer-flooding, water cut from the central pilot producer was reduced to 40% within 4 weeks. This favorable trend of oil cut increase continued, thus reaching a peak of ~70%, with a plateau between 60-65% after 3 months of continuous polymer injection. These field results are fairly in line with reservoir modelling forecasts and have been validated using 4 independent oil cut sources, namely: 3-phase separator, portable 2-phase separator(s), MPFM and on-site lab analysis. The strong water cut reversal trend that was observed post polymer-flooding unequivocally demonstrates considerable improvement in volumetric sweep efficiency and conformance control. Work is underway to acquire additional surveillance/ monitoring data to fine-tune the reservoir model and continue optimizing polymer-flooding techno-commercial feasibility. The acquired field results from UNLF polymer-flooding to this point demonstrate the feasibility of using high-salinity effluent water with customized sulfonated polymers to increase oil recovery from a shallow, sour and unconsolidated heavy oil sandstone reservoir. Field operations are in progress to gather high-quality data in preparation of a smooth and expeditious transition towards phased commercial polymer-flooding development.
APA, Harvard, Vancouver, ISO, and other styles
10

Nnaji, David, and Jeremy Daily. "Trucking Forward: Intrusion Detection for SAE J1708/J1587 Networks in Heavy-Duty Vehicles." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2805.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Automotive researchers and industry experts have extensively documented vulnerabilities arising from unauthorized in-vehicle communication through academic research, industry investigations, sponsored events, and learnings from real-world attacks. While current cybersecurity endeavors in the heavy-duty (HD) vehicle space focus on securing conventional communication technologies such as the controller area network (CAN), there is a notable deficiency in defensive research concerning legacy technologies, particularly those utilized between trucks and trailers. In fact, state-of-the-art attacks on these systems have only come to public attention through official disclosures and public presentations as recently as 2020.</div><div class="htmlview paragraph">To address these risks, this paper introduces a system-wide security concept called Legacy Intrusion Detection System (LIDS) for heavy-duty vehicle applications utilizing the SAE J1708/J1587 protocol stack. LIDS relies on coordinated network gateways at each host and employs specialized J1587 security messages to alert other hosts of anomalies. Each gateway uses configurable busload, access control, and transmission rate parameters to perform signature-based and anomaly-based detection on inbound and outbound network traffic for its host.</div><div class="htmlview paragraph">This paper also presents the development process of the gateway and summarizes the experiments conducted to satisfy the hardware, software, and security requirements imposed by the J1708/J1587 stack and the LIDS concept. Subsequently, we deploy, test, and evaluate LIDS on a retrofitted dual air brake system simulator (DABSS) at CSU's Powerhouse Energy Campus. Under the assumptions presented, the experiments show that LIDS is effective against message spoofing attacks originating from a compromised host or rogue device and flooding attacks from hosts. However, LIDS' effectiveness against flooding attacks from rogue nodes depends on the designer's false positive tolerance. This research builds upon learnings in prior work while incorporating guidelines outlined in SAE J3061. To the best of current knowledge, this publication marks the first presentation of cybersecurity defense research on the SAE J1708/J1587 protocol stack.</div></div>
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!