11,125 research outputs found
Recommended from our members
A two‐step authentication framework for Mobile ad hoc networks
The lack of fixed infrastructure in ad hoc networks causes nodes to rely more heavily on peer nodes for communication. Nevertheless, establishing trust in such a distributed environment is very difficult, since it is not straightforward for a node to determine if its peer nodes can be trusted. An additional concern in such an environment is with whether a peer node is merely relaying a message or if it is the originator of the message. In this paper, we propose an authentication approach for protecting nodes in mobile ad hoc networks. The security requirements for protecting data link and network layers are identified and the design criteria for creating secure ad hoc networks using several authentication protocols are analyzed. Protocols based on zero knowledge and challenge response techniques are presented and their performance is evaluated through analysis and simulation
Toward Realism in Human Performance Simulation
This chapter focuses on challenges to improving the realism of socially intelligent agents and attempts to reflect the state of the art in human behavior modeling with particular attention to the impact of values, emotion, and physiology/stress upon individual and group decision-making. The goal is to help those interested in constructing more realistic software agents for use in human performance simulations in both training and analysis settings. The first two sections offer an assessment of the state of the practice and of the need to make better use of human performance moderator functions (PMFs) published in the behavioral literature. The third section pursues this goal by providing an illustrative framework for integrating existing PMF theories and models, such as those on physiology and stress, cognitive and emotive processes, individual differences, and group and crowd behavior, among others. The fourth section presents asymmetric warfare and civil unrest case studies to examine some of the concerns affecting implementation of PMFs such as verification, validation, and interoperability with existing simulators, artificial life emulators, and artificial intelligence components. The final section of this chapter concludes with lessons learned and with some challenges if the field is to reach a greater level of maturity
- …