11,184 research outputs found

    Solutions and Tools for Secure Communication in Wireless Sensor Networks

    Get PDF
    Secure communication is considered a vital requirement in Wireless Sensor Network (WSN) applications. Such a requirement embraces different aspects, including confidentiality, integrity and authenticity of exchanged information, proper management of security material, and effective prevention and reaction against security threats and attacks. However, WSNs are mainly composed of resource-constrained devices. That is, network nodes feature reduced capabilities, especially in terms of memory storage, computing power, transmission rate, and energy availability. As a consequence, assuring secure communication in WSNs results to be more difficult than in other kinds of network. In fact, trading effectiveness of adopted solutions with their efficiency becomes far more important. In addition, specific device classes or technologies may require to design ad hoc security solutions. Also, it is necessary to efficiently manage security material, and dynamically cope with changes of security requirements. Finally, security threats and countermeasures have to be carefully considered since from the network design phase. This Ph.D. dissertion considers secure communication in WSNs, and provides the following contributions. First, we provide a performance evaluation of IEEE 802.15.4 security services. Then, we focus on the ZigBee technology and its security services, and propose possible solutions to some deficiencies and inefficiencies. Second, we present HISS, a highly scalable and efficient key management scheme, able to contrast collusion attacks while displaying a graceful degradation of performance. Third, we present STaR, a software component for WSNs that secures multiple traffic flows at the same time. It is transparent to the application, and provides runtime reconfigurability, thus coping with dynamic changes of security requirements. Finally, we describe ASF, our attack simulation framework for WSNs. Such a tool helps network designers to quantitatively evaluate effects of security attacks, produce an attack ranking based on their severity, and thus select the most appropriate countermeasures

    Science for Place-based Socioecological Management: Lessons from the Maya Forest (Chiapas and Petén)

    Get PDF
    The role humans should play in conservation is a pervasive issue of debate in environmental thinking. Two long-established poles of this debate can be identified on a preservation-sustainable use continuum. At one extreme are use bans and natural science-based, top-down management for preservation. At the other extreme is community-based, multidisciplinary management for sustainable resource use and livelihoods. In this paper, we discuss and illustrate how these two strategies have competed and conflicted in conservation initiatives in the Maya forest (MF) of the Middle Usumacinta River watershed (Guatemala and Mexico). We further argue that both extremes have produced unconvincing results in terms of the region’s sustainability. An alternative consists of sustainability initiatives based on place-based and integrated-knowledge approaches. These approaches imply a flexible combination of disciplines and types of knowledge in the context of nature-human interactions occurring in a place. They can be operationalized within the framework of sustainability science in three steps: 1) characterize the contextual circumstances that are most relevant for sustainability in a place; 2) identify the disciplines and knowledge(s) that need to be combined to appropriately address these contextual circumstances; and 3) decide how these disciplines and knowledge can be effectively combined and integrated. Epistemological flexibility in the design of analytic and implementation frameworks is key. Place-based and integrative-knowledge approaches strive to deal with local context and complexity, including that of human individuals and cultures. The success of any sustainability initiative will ultimately depend on its structural coupling with the context in which it is applied

    Knowledge, Food and Place: a way of producing a way of knowing

    Get PDF
    The article examines the dynamics of knowledge in the valorisation of local food, drawing on the results from the CORASON project (A cognitive approach to rural sustainable development: the dynamics of expert and lay knowledge), funded by the EU under its Framework Programme 6. It is based on the analysis of several in-depth case studies on food relocalisation carried out in 10 European countries

    Harnessing and Sharing the Benefits of State Sponsored Research

    Get PDF
    In recent years data-sharing has been a recurring focus of struggle within the scientific research community as improvements in information technology and digital networks have expanded the ways that data can be produced, disseminated, and used. Information technology makes it easier to share data in publicly accessible archives that aggregate data from multiple sources. Such sharing and aggregation facilitate observations that would otherwise be impossible. But data disclosure poses a dilemma for scientists. Data have long been the stock in trade of working scientists, lending credibility to their claims while highlighting new questions that are worthy of future research funding. Some disclosure is necessary in order to claim these benefits, but data disclosure may also benefit one\u27s research competitors. Scientists who share their data promptly and freely may find themselves at a competitive disadvantage relative to free riders in the race to make future observations and thereby to earn further recognition and funding. The possibility of commercial gain further raises the competitive stakes. This article discusses data sharing in California\u27s stem cell initiative against the background of other data sharing efforts and in light of the competing interests that the California Institute for Regenerative Medicine (CIRM) is directed to balance. We begin by considering how IP law affects data-sharing. We then assess the strategic considerations that guide the IP and data policies and strategies of federal, state, and private research sponsors. With this background, we discuss four specific sets of issues that public sponsors of data-rich research, including CIRM, are likely to confront: (1) how to motivate researchers to contribute data; (2) who may have access to the data and on what conditions; (3) what data get deposited and when do they get deposited; and (4) how to establish database architecture and curate and maintain the database

    The future of Cybersecurity in Italy: Strategic focus area

    Get PDF
    This volume has been created as a continuation of the previous one, with the aim of outlining a set of focus areas and actions that the Italian Nation research community considers essential. The book touches many aspects of cyber security, ranging from the definition of the infrastructure and controls needed to organize cyberdefence to the actions and technologies to be developed to be better protected, from the identification of the main technologies to be defended to the proposal of a set of horizontal actions for training, awareness raising, and risk management

    Is Meat the New Tobacco? Regulating Food Demand in the Age of Climate Change

    Get PDF
    Switching from a meat-heavy to a plant-based diet is one of the highest-impact lifestyle changes for climate mitigation and adaptation. Conventional demand-side energy policy has focused on increasing consumption of efficient machines and fuels. Regulating food demand has key advantages. First, food consumption is biologically constrained, thus switching to more efficient foods avoids unintended consequences of switching to more efficient machines, like higher overall energy consumption. Second, food consumption, like smoking, is primed for norm- shifting because it occurs in socially conspicuous environments. While place-based bans and information regulation were essential in lowering the prevalence of smoking, the same strategies may be even more effective in reducing meat demand. Several policy reforms can be implemented at the federal level, from reform of food marketing schemes to publicly subsidized meal programs

    Tracermarks: A Proposed Information Intervention

    Get PDF
    We live in a world of information. But paradoxically, we simultaneously suffer from a scarcity of “smart” information: information that is traceable and therefore reliable, trust-worthy, and ultimately verifiable. Combining the insights of global governance theory with behavioral economics, this Article approaches this challenge from a knowledge governance framework, sets forth various reasons for this unnecessary deficit and proposes an intervention to address it — tracermarks. Envisioned as a hybrid of trademarks and certification marks, tracermarks would encourage various stakeholders to disclose, disseminate and ultimately make decisions about previously hidden qualities of specific goods and services throughout global value networks. Digital networks have tremendous potential to combine with other kinds of technologies (e.g., QR or UPC codes, smart phone apps, and other intermediaries and platforms), and thus to contribute to the production and distribution of smart information about specific goods and services. Improving the capacity for meaningful consumer and producer choices through smart information would also increase net social welfare through innovation, which is a primary public policy goal of intellectual property

    AN ANALYSIS OF TRANSACTIONS IN E-PAYMENT SYSTEM USING MOBILE AGENTS

    Get PDF
    Commercial interactions between merchants and customers pose a significant concern as they are associated with a large volume of data and complex information, especially when there is a need for switching requirements. This paper presents an agent-based analysis of e-payment transactions with the switching operations. The model adopts an inter-bank transaction network and consists of a terminal point of sale (POI) and three essential players in e-payment: customer, bank (merchant), and the Switch. This study analyses the various payment interactions using agent technology. The agent coordinates movement while the negotiation protocol serves as an internal control of the payment agreements, while the interactive hosts are the platforms that determine the status of transactions. Each agent host is equipped with a Certification Authority (CA) to secure communication between the merchant and the customer. Different transactions that agents could make are examined with formal descriptions. The implementation is achieved in Jade and compares with the object serialization mechanism. The simulation results show higher quality adaptation of agent systems and evidence of agentisation of e-transaction with Switch.     &nbsp
    • …
    corecore