13,881 research outputs found

    Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)

    Full text link
    Security protocols are often found to be flawed after their deployment. We present an approach that aims at the neutralization or mitigation of the attacks to flawed protocols: it avoids the complete dismissal of the interested protocol and allows honest agents to continue to use it until a corrected version is released. Our approach is based on the knowledge of the network topology, which we model as a graph, and on the consequent possibility of creating an interference to an ongoing attack of a Dolev-Yao attacker, by means of non-collaboration actuated by ad-hoc benign attackers that play the role of network guardians. Such guardians, positioned in strategical points of the network, have the task of monitoring the messages in transit and discovering at runtime, through particular types of inference, whether an attack is ongoing, interrupting the run of the protocol in the positive case. We study not only how but also where we can attempt to defend flawed security protocols: we investigate the different network topologies that make security protocol defense feasible and illustrate our approach by means of concrete examples.Comment: 29 page

    Security in Wireless Sensor Networks: Issues and Challenges

    Get PDF
    Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.Comment: 6 page

    A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT

    Get PDF
    ‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    The Emergent Logic of Health Law

    Get PDF
    The American health care system is on a glide path toward ruin. Health spending has become the fiscal equivalent of global warming, and the number of uninsured Americans is approaching fifty million. Can law help to divert our country from this path? There are reasons for deep skepticism. Law governs the provision and financing of medical care in fragmented and incoherent fashion. Commentators from diverse perspectives bemoan this chaos, casting it as an obstacle to change. I contend in this Article that pessimism about health law’s prospects is unjustified, but that a new understanding of health law’s disarray is urgently needed to guide reform. My core proposition is that the law of health care provision is best understood as an emergent system. Its contradictions and dysfunctions cannot be repaired by some master design. No one actor has a grand overview—or the power to impose a unifying vision. Countless market players, public planners, and legal and regulatory decisionmakers interact in oft-chaotic ways, clashing with, reinforcing, and adjusting to each other. Out of these interactions, a larger scheme emerges—one that incorporates the health sphere’s competing interests and values. Change in this system, for worse and for better, arises from the interplay between its myriad actors. By quitting the quest for a single, master design, we can better focus our efforts on possibilities for legal and policy change. We can and should continuously survey the landscape of stakeholders and expectations with an eye toward potential launching points for evolutionary processes—processes that leverage current institutions and incentives. What we cannot do is plan or predict these evolutionary pathways in precise detail; the complexity of interactions among market and government actors precludes fine-grained foresight of this sort. But we can determine the general direction of needed change, identify seemingly intractable obstacles, and envision ways to diminish or finesse them over time. Dysfunctional legal doctrines, interest group expectations, consumers’ anxieties, and embedded institutional and cultural barriers can all be dealt with in this way, in iterative fashion. This Article sets out a strategy for doing so. To illustrate this strategy, I suggest emergent approaches to the most urgent challenges in health care policy and law—the crises of access, value, and cost
    corecore