284 research outputs found

    IP spoofing defense: An introduction

    Get PDF
    In current Internet communication world, validity of source IP packet is and important issue.The problems of IP spoofing alarm the legitimate user of the Internet.This paper review recent progress of spoofing defenses by various researchers.Techniques and mechanisms proposed are being categorized to better illustrate the deployment and functionality of the mechanism.Overall, this paper summarizes the current anti spoofing mechanism in the Internet

    Technological Perspectives of Countering UAV Swarms

    Get PDF
    Conventional AD systems have been found less effective for countering UAVs and loitering munitions. Thishas necessitated the development of counter-UAV systems with different functionalities. A cluster of armed UAVsas swarm formations has further rendered the conventional AD systems far from effective, emphasizing the need to consider countering swarms as the most crucial element in new-generation aerial threat mitigation strategies. In this paper, the capabilities of UAV swarms and vital military assets exposed to such attacks are identified. To protect the vital assets from aerial swarm threats, ideal system characteristics of a counter-UAV (C-UAV) swarm system to overcome the challenges are discussed. Currently available acquisition & engagement technology is analyzed and the application of these systems to counter swarm applications is brought out. New requirements are discussed and a conceptual design of a layered system is derived which can handle a large spectrum of aerial threats including a swarm of UAVs. This system is expected to have a higher rate of engagement and can be designed with low-cost network-integrated systems

    DANE Trusted Email for Supply Chain Management

    Get PDF
    Supply chain management is critically dependent on trusted email mechanisms that address forgery, confidentiality, and sender authenticity. The IETF protocol ‘Domain Authentication of Named Entities’ (DANE) described in this paper has been extended from its initial goal of providing TLS web site validation to also offer a foundation for globally scalable and interoperable email security. Widespread deployment of DANE will require more than raw technology standards, however. Workflow automation mechanisms will need to emerge in order to simplify the publishing and retrieval of cryptographic credentials that are applicable for general audiences. Security policy enforcement will also need to be addressed. This paper gives a descriptive tutorial of trusted email technologies, shows how DANE solves key distribution logistics, and then suggests desirable automation components that could accelerate deployment of DANE-based trusted email. Pilot deployments are briefly described
    corecore