151 research outputs found

    Key management for wireless sensor network security

    Get PDF
    Wireless Sensor Networks (WSNs) have attracted great attention not only in industry but also in academia due to their enormous application potential and unique security challenges. A typical sensor network can be seen as a combination of a number of low-cost sensor nodes which have very limited computation and communication capability, memory space, and energy supply. The nodes are self-organized into a network to sense or monitor surrounding information in an unattended environment, while the self-organization property makes the networks vulnerable to various attacks.Many cryptographic mechanisms that solve network security problems rely directly on secure and efficient key management making key management a fundamental research topic in the field of WSNs security. Although key management for WSNs has been studied over the last years, the majority of the literature has focused on some assumed vulnerabilities along with corresponding countermeasures. Specific application, which is an important factor in determining the feasibility of the scheme, has been overlooked to a large extent in the existing literature.This thesis is an effort to develop a key management framework and specific schemes for WSNs by which different types of keys can be established and also can be distributed in a self-healing manner; explicit/ implicit authentication can be integrated according to the security requirements of expected applications. The proposed solutions would provide reliable and robust security infrastructure for facilitating secure communications in WSNs.There are five main parts in the thesis. In Part I, we begin with an introduction to the research background, problems definition and overview of existing solutions. From Part II to Part IV, we propose specific solutions, including purely Symmetric Key Cryptography based solutions, purely Public Key Cryptography based solutions, and a hybrid solution. While there is always a trade-off between security and performance, analysis and experimental results prove that each proposed solution can achieve the expected security aims with acceptable overheads for some specific applications. Finally, we recapitulate the main contribution of our work and identify future research directions in Part V

    Government Influence on the Press in Democracies, Journalists’ Perception of the Influence, and the Media Environment: The Cases of South Korea and Germany

    Get PDF
    This study started with the awareness of the problem of government influence on the press in democracies in the 21st century. In other words, to ensure that the press can freely and faithfully fulfil its role as a ‘watchdog’ for power as originally sought by the 21st-century democracies, it is necessary to face up to how and in what way the governments have exerted their influence on the press. Accordingly, the study aimed to identify what and how governments in the 21st-century democracies exerted on the press, how the media environment responded to it, and what perceptions journalists have of their government’s influence. To this end, as objects of the study, the researcher took two countries of the East and the West, South Korea and Germany, that are externally recognized as countries with freedom of the press due to their fairly developed democratic systems and that have different forms of government. Also, as a qualitative research method, case study and in-depth interviews were carried out sequentially

    Scandal and Democracy

    Get PDF
    After a nation has transitioned from authoritarianism to democracy, how are democratic norms most effectively fostered and maintained? This book uses as its case study Indonesia after the fall of the dictator Suharto to reveal that a contentious, even scandal-obsessed press can actually prove extremely useful for an emergent democracy. A society that can tolerate and protect journalists willing to expose corruption and scandal among elites is one, the author finds, in which ordinary citizens are willing to believe in and support other democratic institutions. Based on extensive interviews and research in Indonesia, this book offers a new and surprising perspective on the role of the press and the nature of scandal-driven journalism in fledgling democracies

    Security and Privacy for Modern Wireless Communication Systems

    Get PDF
    The aim of this reprint focuses on the latest protocol research, software/hardware development and implementation, and system architecture design in addressing emerging security and privacy issues for modern wireless communication networks. Relevant topics include, but are not limited to, the following: deep-learning-based security and privacy design; covert communications; information-theoretical foundations for advanced security and privacy techniques; lightweight cryptography for power constrained networks; physical layer key generation; prototypes and testbeds for security and privacy solutions; encryption and decryption algorithm for low-latency constrained networks; security protocols for modern wireless communication networks; network intrusion detection; physical layer design with security consideration; anonymity in data transmission; vulnerabilities in security and privacy in modern wireless communication networks; challenges of security and privacy in node–edge–cloud computation; security and privacy design for low-power wide-area IoT networks; security and privacy design for vehicle networks; security and privacy design for underwater communications networks

    Journal of Food Law & Policy - Fall 2021

    Get PDF
    • …
    corecore