2,463 research outputs found

    Trust-based security for the OLSR routing protocol

    Get PDF
    International audienceThe trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the wireless range of such nodes is limited, the nodes mutually cooperate with their neighbors in order to extend the remote nodes and the entire network. In our work, we are interested by trust as security solution for OLSR protocol. This approach fits particularly with characteristics of ad hoc networks. Moreover, the explicit trust management allows entities to reason with and about trust, and to take decisions regarding other entities. In this paper, we detail the techniques and the contributions in trust-based security in OLSR. We present trust-based analysis of the OLSR protocol using trust specification language, and we show how trust-based reasoning can allow each node to evaluate the behavior of the other nodes. After the detection of misbehaving nodes, we propose solutions of prevention and countermeasures to resolve the situations of inconsistency, and counter the malicious nodes. We demonstrate the effectiveness of our solution taking different simulated attacks scenarios. Our approach brings few modifications and is still compatible with the bare OLSR

    Critique of Creativity: Precarity, Subjectivity and Resistance in the ‘Creative Industries’

    Get PDF
    234 p. : il., Tablas.Libro ElectrónicoLa creatividad siempre está en movimiento: surge, se establece en el ente colectivo, palidece y desaparece a veces en el olvido; renace, vuelve con innovaciones, se reformula y resurge iniciando de nuevo el ciclo. Los viejos mitos de la creación y los creadores, los trabajos consagrados y los organismos privilegiados de los demiurgos están de nuevo en marcha, produciendo nuevos cambios. Los ensayos recogidos en este libro analizan ese resurgimiento complejo del mito de la creación y proponen una crítica contemporánea de la creatividad.Creativity is astir: reborn, re-conjured, re-branded, resurgent. The old myths of creation and creators – the hallowed labors and privileged agencies of demiurges and prime movers, of Biblical world-makers and self-fashioning artist-geniuses – are back underway, producing effects, circulating appeals. Much as the Catholic Church dresses the old creationism in the new gowns of ‘intelligent design’, the Creative Industries sound the clarion call to the Cultural Entrepreneurs. In the hype of the ‘creative class’ and the high flights of the digital bohemians, the renaissance of ‘the creatives’ is visibly enacted. The essays collected in this book analyze this complex resurgence of creation myths and formulate a contemporary critique of creativity.Contents vii Contributors ix Acknowledgements xv Introduction: On the Strange Case of ‘Creativity’ and its Troubled Resurrection 1 PART ONE: CREATIVITY 7 1 Immanent Effects: Notes on Cre-activity 9 2 The Geopolitics of Pimping 23 3 The Misfortunes of the ‘Artistic Critique’ and of Cultural Employment 41 4 ‘Creativity and Innovation’ in the Nineteenth Century: Harrison C. White and the Impressionist Revolution Reconsidered 57 PART TWO: PRECARIZATION 77 5 Virtuosos of Freedom: On the Implosion of Political Virtuosity and Productive Labour 79 6 Experiences Without Me, or, the Uncanny Grin of Precarity 91 7 Wit and Innovation 101 PART THREE: CREATIVITY INDUSTRIES 107 8 GovernCreativity, or, Creative Industries Austrian Style 109 9 The Los Angelesation of London: Three Short Waves of Young People’s Micro-Economies of Culture and Creativity in the UK 119 10 Unpredictable Outcomes / Unpredictable Outcasts: On Recent Debates over Creativity and the Creative Industries 133 11 Chanting the Creative Mantra: The Accelerating Economization of EU Cultural Policy 147 PART FOUR: CULTURE INDUSTRY 165 12 Culture Industry and the Administration of Terror 167 13 Add Value to Contents: The Valorization of Culture Today 183 14 Creative Industries as Mass Deception 191 Bibliography 20

    The Hierarchical Model of Interaction Between Intelligent Agents in The Manet Control Systems

    Get PDF
    The hierarchical model of interaction between intelligent agents in the MANET control systems is proposed in the paper. Proposed model is based on the conceptual representation of the intelligent MANET control systems as a hierarchical structure with vertical connections that define management tasks subordination in the MANET

    Security Verification of Secure MANET Routing Protocols

    Get PDF
    Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their security properties. Previous research focuses on verifying secure, reactive, accumulation-based routing protocols. An improved methodology and framework for secure MANET routing protocol verification is proposed which includes table-based and proactive protocols. The model checker, SPIN, is selected as the core of the secure MANET verification framework. Security is defined by both accuracy and availability: a protocol forms accurate routes and these routes are always accurate. The framework enables exhaustive verification of protocols and results in a counter-example if the protocol is deemed insecure. The framework is applied to models of the Optimized Link-State Routing (OLSR) and Secure OLSR protocol against five attack vectors. These vectors are based on known attacks against each protocol. Vulnerabilities consistent with published findings are automatically revealed. No unknown attacks were found; however, future attack vectors may lead to new attacks. The new framework for verifying secure MANET protocols extends verification capabilities to table-based and proactive protocols

    Factors Impacting Key Management Effectiveness in Secured Wireless Networks

    Get PDF
    The use of a Public Key Infrastructure (PKI) offers a cryptographic solution that can overcome many, but not all, of the MANET security problems. One of the most critical aspects of a PKI system is how well it implements Key Management. Key Management deals with key generation, key storage, key distribution, key updating, key revocation, and certificate service in accordance with security policies over the lifecycle of the cryptography. The approach supported by traditional PKI works well in fixed wired networks, but it may not appropriate for MANET due to the lack of fixed infrastructure to support the PKI. This research seeks to identify best practices in securing networks which may be applied to new network architectures

    Validation of Routing Protocol for Mobile Ad Hoc Networks using Colored PetriNets

    Get PDF
    In a Mobile Ad Hoc Network (MANET), mobile nodes directly send messages to each other via other nodes in a wireless environment. A node can send a message to a destination node beyond its transmission range by using other nodes as relay points, and thus a node can function as a router. With the explosive growth of the Internet and mobile communication networks, challenging requirements have been introduced into MANETs and designing routing protocols has become more complex. For a successful application of MANETS, it is very important to ensure that a routing protocol is unambiguous, complete and functionally correct. One approach to ensuring correctness of an existing routing protocol is to create a formal model for the protocol, and analyze the model to determine if needed the protocol provides the defined service correctly. Colored Petri Nets (CPNs) are a suitable modeling language for this purpose, as it can conveniently express non-determinism , concurrency and different levels of abstraction that are inherent in routing protocols. However it is not easy to build a CPN model of a MANET because a node can move in and out of its transmission range and thus the MANET’s topology dynamically changes. So a topology approximation (TA) mechanism has been proposed to address this problem of mobility and perform simulations of routing protocol called Ad Hoc On demand Distance Vector Routing (AODV) and Distance Source Routing(DSR) and to perform comparison based on the simulation results
    corecore