13,881 research outputs found
Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version)
Security protocols are often found to be flawed after their deployment. We
present an approach that aims at the neutralization or mitigation of the
attacks to flawed protocols: it avoids the complete dismissal of the interested
protocol and allows honest agents to continue to use it until a corrected
version is released. Our approach is based on the knowledge of the network
topology, which we model as a graph, and on the consequent possibility of
creating an interference to an ongoing attack of a Dolev-Yao attacker, by means
of non-collaboration actuated by ad-hoc benign attackers that play the role of
network guardians. Such guardians, positioned in strategical points of the
network, have the task of monitoring the messages in transit and discovering at
runtime, through particular types of inference, whether an attack is ongoing,
interrupting the run of the protocol in the positive case. We study not only
how but also where we can attempt to defend flawed security protocols: we
investigate the different network topologies that make security protocol
defense feasible and illustrate our approach by means of concrete examples.Comment: 29 page
Security in Wireless Sensor Networks: Issues and Challenges
Wireless Sensor Network (WSN) is an emerging technology that shows great
promise for various futuristic applications both for mass public and military.
The sensing technology combined with processing power and wireless
communication makes it lucrative for being exploited in abundance in future.
The inclusion of wireless communication technology also incurs various types of
security threats. The intent of this paper is to investigate the security
related issues and challenges in wireless sensor networks. We identify the
security threats, review proposed security mechanisms for wireless sensor
networks. We also discuss the holistic view of security for ensuring layered
and robust security in wireless sensor networks.Comment: 6 page
A Comprehensive Survey on Exiting Solution Approaches towards Security and Privacy Requirements of IoT
‘Internet of Things (IoT)’emerged as an intelligent collaborative computation and communication between a set of objects capable of providing on-demand services to other objects anytime anywhere. A large-scale deployment of data-driven cloud applications as well as automated physical things such as embed electronics, software, sensors and network connectivity enables a joint ubiquitous and pervasive internet-based computing systems well capable of interacting with each other in an IoT. IoT, a well-known term and a growing trend in IT arena certainly bring a highly connected global network structure providing a lot of beneficial aspects to a user regarding business productivity, lifestyle improvement, government efficiency, etc. It also generates enormous heterogeneous and homogeneous data needed to be analyzed properly to get insight into valuable information. However, adoption of this new reality (i.e., IoT) by integrating it with the internet invites a certain challenges from security and privacy perspective. At present, a much effort has been put towards strengthening the security system in IoT still not yet found optimal solutions towards current security flaws. Therefore, the prime aim of this study is to investigate the qualitative aspects of the conventional security solution approaches in IoT. It also extracts some open research problems that could affect the future research track of IoT arena
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Recommended from our members
Trident: What is it For? Challenging the Relevance of British Nuclear Weapons
YesThis briefing paper is the second in a series to be published during 2007 and 2008 as part of
the Bradford Disarmament Research Centre¿s programme on Nuclear-Armed Britain: A Critical
Examination of Trident Modernisation, Implications and Accountability
The Emergent Logic of Health Law
The American health care system is on a glide path toward ruin. Health spending has become the fiscal equivalent of global warming, and the number of uninsured Americans is approaching fifty million. Can law help to divert our country from this path? There are reasons for deep skepticism. Law governs the provision and financing of medical care in fragmented and incoherent fashion. Commentators from diverse perspectives bemoan this chaos, casting it as an obstacle to change. I contend in this Article that pessimism about health law’s prospects is unjustified, but that a new understanding of health law’s disarray is urgently needed to guide reform. My core proposition is that the law of health care provision is best understood as an emergent system. Its contradictions and dysfunctions cannot be repaired by some master design. No one actor has a grand overview—or the power to impose a unifying vision. Countless market players, public planners, and legal and regulatory decisionmakers interact in oft-chaotic ways, clashing with, reinforcing, and adjusting to each other. Out of these interactions, a larger scheme emerges—one that incorporates the health sphere’s competing interests and values. Change in this system, for worse and for better, arises from the interplay between its myriad actors. By quitting the quest for a single, master design, we can better focus our efforts on possibilities for legal and policy change. We can and should continuously survey the landscape of stakeholders and expectations with an eye toward potential launching points for evolutionary processes—processes that leverage current institutions and incentives. What we cannot do is plan or predict these evolutionary pathways in precise detail; the complexity of interactions among market and government actors precludes fine-grained foresight of this sort. But we can determine the general direction of needed change, identify seemingly intractable obstacles, and envision ways to diminish or finesse them over time. Dysfunctional legal doctrines, interest group expectations, consumers’ anxieties, and embedded institutional and cultural barriers can all be dealt with in this way, in iterative fashion. This Article sets out a strategy for doing so. To illustrate this strategy, I suggest emergent approaches to the most urgent challenges in health care policy and law—the crises of access, value, and cost
- …