2,463 research outputs found
Trust-based security for the OLSR routing protocol
International audienceThe trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities. In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR
Critique of Creativity: Precarity, Subjectivity and Resistance in the ‘Creative Industries’
234 p. : il., Tablas.Libro ElectrónicoLa creatividad siempre está en movimiento: surge, se establece en el ente colectivo, palidece y desaparece a veces en el olvido; renace, vuelve con innovaciones, se reformula y resurge iniciando de nuevo el ciclo.
Los viejos mitos de la creación y los creadores, los trabajos consagrados y los organismos privilegiados de los demiurgos están de nuevo en marcha, produciendo nuevos cambios. Los ensayos recogidos en este libro analizan ese resurgimiento complejo del mito de la creación y proponen una crítica contemporánea de la creatividad.Creativity is astir: reborn, re-conjured, re-branded, resurgent. The old myths of creation and creators – the hallowed labors and privileged agencies of demiurges and prime movers, of Biblical world-makers and self-fashioning artist-geniuses – are back underway, producing effects, circulating appeals. Much as the Catholic Church dresses the old creationism in the new gowns of ‘intelligent design’, the Creative Industries sound the clarion call to the Cultural Entrepreneurs. In the hype of the ‘creative class’ and the high flights of the digital bohemians, the renaissance of ‘the creatives’ is visibly enacted. The essays collected in this book analyze this complex resurgence of creation myths and formulate a contemporary critique of creativity.Contents vii
Contributors ix
Acknowledgements xv
Introduction: On the Strange Case of ‘Creativity’ and its
Troubled Resurrection 1
PART ONE: CREATIVITY 7
1 Immanent Effects: Notes on Cre-activity 9
2 The Geopolitics of Pimping 23
3 The Misfortunes of the ‘Artistic Critique’ and of Cultural Employment 41
4 ‘Creativity and Innovation’ in the Nineteenth Century: Harrison C. White and the Impressionist Revolution Reconsidered 57
PART TWO: PRECARIZATION 77
5 Virtuosos of Freedom: On the Implosion of Political Virtuosity and Productive Labour 79
6 Experiences Without Me, or, the Uncanny Grin of Precarity 91
7 Wit and Innovation 101
PART THREE: CREATIVITY INDUSTRIES 107
8 GovernCreativity, or, Creative Industries Austrian Style 109
9 The Los Angelesation of London: Three Short Waves of Young People’s Micro-Economies of Culture and Creativity in the UK 119
10 Unpredictable Outcomes / Unpredictable Outcasts: On Recent Debates over Creativity and the Creative Industries 133
11 Chanting the Creative Mantra: The Accelerating Economization of EU Cultural Policy 147
PART FOUR: CULTURE INDUSTRY 165
12 Culture Industry and the Administration of Terror 167
13 Add Value to Contents: The Valorization of Culture Today 183
14 Creative Industries as Mass Deception 191
Bibliography 20
The Hierarchical Model of Interaction Between Intelligent Agents in The Manet Control Systems
The hierarchical model of interaction between intelligent agents in the MANET control systems is proposed in the paper. Proposed model is based on the conceptual representation of the intelligent MANET control systems as a hierarchical structure with vertical connections that define management tasks subordination in the MANET
Security Verification of Secure MANET Routing Protocols
Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their security properties. Previous research focuses on verifying secure, reactive, accumulation-based routing protocols. An improved methodology and framework for secure MANET routing protocol verification is proposed which includes table-based and proactive protocols. The model checker, SPIN, is selected as the core of the secure MANET verification framework. Security is defined by both accuracy and availability: a protocol forms accurate routes and these routes are always accurate. The framework enables exhaustive verification of protocols and results in a counter-example if the protocol is deemed insecure. The framework is applied to models of the Optimized Link-State Routing (OLSR) and Secure OLSR protocol against five attack vectors. These vectors are based on known attacks against each protocol. Vulnerabilities consistent with published findings are automatically revealed. No unknown attacks were found; however, future attack vectors may lead to new attacks. The new framework for verifying secure MANET protocols extends verification capabilities to table-based and proactive protocols
Recommended from our members
BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs
There is a considerable body of literature and technology that provides access control and security of communication for Mobile Ad-hoc Networks (MANETs) based on cryptographic authentication technologies and protocols. We introduce a new method of granting access and securing communication in a MANET environment to augment, not replace, existing techniques. Previous approaches grant access to the MANET, or to its services, merely by means of an authenticated identity or a qualified role. We present BARTER, a framework that, in addition, requires nodes to exchange a model of their behavior to grant access to the MANET and to assess the legitimacy of their subsequent communication. This framework forces the nodes not only to say who or what they are, but also how they behave. BARTER will continuously run membership acceptance and update protocols to give access to and accept traffic only from nodes whose behavior model is considered "normal" according to the behavior model of the nodes in the MANET. We implement and experimentally evaluate the merger between BARTER and other cryptographic technologies and show that BARTER can implement a fully distributed automatic access control and update with small cryptographic costs. Although the methods proposed involve the use of content-based anomaly detection models, the generic infrastructure implementing the methodology may utilize any behavior model. Even though the experiments are implemented for MANETs, the idea of model exchange for access control can be applied to any type of network
Factors Impacting Key Management Effectiveness in Secured Wireless Networks
The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This research seeks to identify best practices in securing networks which may be applied to new network architectures
Validation of Routing Protocol for Mobile Ad Hoc Networks using Colored PetriNets
In a Mobile Ad Hoc Network (MANET), mobile nodes directly send messages to each other via other nodes in a wireless environment. A node can send a message to a destination node beyond its transmission range by using other nodes as relay points, and thus a node can function as a router. With the explosive growth of the Internet and mobile communication networks, challenging requirements have been introduced into MANETs and designing routing protocols has become more complex. For a successful application of MANETS, it is very important to ensure that a routing protocol is unambiguous, complete and functionally correct. One approach to ensuring correctness of an existing routing protocol is to create a formal model for the protocol, and analyze the model to determine if needed the protocol provides the defined service correctly.
Colored Petri Nets (CPNs) are a suitable modeling language for this purpose, as it can conveniently express non-determinism , concurrency and different levels of abstraction that are inherent in routing protocols. However it is not easy to build a CPN model of a MANET because a node can move in and out of its transmission range and thus the MANET’s topology dynamically changes. So a topology approximation (TA) mechanism has been proposed to address this problem of mobility and perform simulations of routing protocol called Ad Hoc On demand Distance Vector Routing (AODV) and Distance Source Routing(DSR) and to perform comparison based on the simulation results
- …