1,609 research outputs found
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
Endeavouring to be in the good books : awarding DTN network use for acknowledging the reception of bundles
This paper describes an incentive scheme for promoting the cooperation, and, therefore, avoiding selfish behaviours, in Delay Tolerant Networks (DTN) by rewarding participant nodes with cryptographic keys that will be required for sending bundles. DTN are normally sparse, and there are few opportunistic contacts, so forwarding of other's bundles can be left out. Moreover, it is difficult to determine the responsible nodes in case of bundle loss. The mechanism proposed in this paper contributes to both problems at the same time. On one hand, cryptographic receipts are generated using time-limited Identity Based Cryptography (IBC) keys to keep track of bundle transmissions. On the other hand, these receipts are used to reward altruistic behaviour by providing newer IBC keys. Finally, these nodes need these IBC keys to send their own bundles. When all nodes behave in a cooperative way, this incentive scheme works as a virtuous circle and achieves a Nash equilibrium, improving very much the network performance in terms of latency. The scheme is not difficult to implement, and it can use an already existing IBC infrastructure used for other purposes in a DTN
Review layouts, flows, and movements of raw materials in the warehouse and production
Treball desenvolupat en el marc del programa "European Project Semester".Incorporation of new raw materials in the existing warehouse and elimination of intermediate buffers for production storage, to locate new machinery. By eliminating Kanban’s factory of raw materials of large consumption or use, ensure the efficiency of the factory during 3 production shifts and 2 warehouse shifts (ensure raw material for production during the night shift). AkzoNobel, a Dutch multinational with 30 manufacturing plants and 125 warehouses located across Europe, is the subject of this project. The focus will be on the Vilafranca del Pendès warehouse, which currently employs manual tools in certain manufacturing processes. The company has encountered limitations in its production line and requires significant changes to enhance its capacity. The project aims to improve the company through four fundamental concepts: efficiency, sustainability, competitiveness, and effectiveness. These concepts are closely associated with the main objective of this project, which can also be defined as: Increasing efficiency by automating production. Implementing automation can be a crucial step toward achieving better outcomes. By using automated multi-stations instead of relying on human resources only, labor costs and risks can be minimized and at the same time achieve much higher production outputs. This reduction in costs and human resource requirements also opens up new opportunities for future development within the company. To remain competitive in the industry, it is essential to make changes that will benefit the future of the company. As this famous naval saying by John Paul Jones, “Those Who Do Not Risk Cannot Win”. The purpose of this report is to showcase the AkzoNobel team’s work during the first part of the EPS on automating production. The report starts with an overview of the company’s background, their state of the art to see what they have achieved, benchmarking with other companies, the EPS program, our team, and the project roadmap. Followed by the project’s scope, including details on the company’s current situation, ongoing projects, their drawbacks, project objectives, and potential challenges. Additionally, the report provides a concise description of the paintfilling process and the characteristics of the barrels used. The report then presents four solutions, outlining their pros and cons, and compares one of our proposed solutions with AkzoNobel’s. After presenting these four solutions, the focus will be put on the chosen solution by AkzoNobel by presenting the final layout, detailing some safety protocols, environmental impact, and the forecasted budget. Finally, the report concludes with a summary of our future plans for the final report, conclusions, and appendices detailing the tools that were used to carry out this project.Incomin
Conceptual Model for Bomb Victims Information System (BVIS) In Iraq Using WAP Standard
Many Iraqis have died resulting from insurgent bombings, revenge killings and U.S. military intervention during the 2003 invasion. This situation led to the destabilization of the security in the country and increased the number of dead and missing, making the search for missing loved ones very complex. To find a missing person, many procedures needed to be satisfied, one of which is to search in the area of bomb explosion, in the casualties section of the hospitals and in the police stations. Moreover, the Iraqis who are killed by terrorists are published in the newspapers but they do not account for all the victims and their information are imprecise. Wireless Application Protocol (WAP) is a technology that may provide the solution to problem of looking for loved ones. WAP is characterized as easy, fast delivery of relevant information and services to mobile users. It is a secure technology allowing users to access instant information through wireless handheld devices like mobile phones, pagers, two-way radios, smart phones and communications. The goal of the present study is to develop a conceptual design model of Bomb Victims Information System (BVIS) through the use of WAP Standard to provide information regarding Iraqi bomb victims
From OPIMA to MPEG IPMP-X: A standard's history across R&D projects
This paper describes the work performed by a number of companies and universities who have been working as a consortium under the umbrella of the European Union Framework Programme 5 (FP5), Information Society Technologies (IST) research program, in order to provide a set of Digital Rights Management (DRM) technologies and architectures, aiming at helping to reduce the copyright circumvention risks, that have been threatening the music and film industries in their transition from the “analogue” to “digital” age. The paper starts by addressing some of the earlier standardization efforts in the DRM arena, namely, Open Platform Initiative for Multimedia Access (OPIMA). One of the described FP5 IST projects, Open Components for Controlled Access to Multimedia Material (OCCAMM), has developed the OPIMA vision. The paper addresses also the Motion Pictures Expert Group—MPEG DRM work, starting from the MPEG Intellectual Propriety Management and Protection—IPMP “Hooks”, towards the MPEG IPMP Extensions, which has originated the first DRM-related standard (MPEG-4 Part 13, called IPMP Extensions or IPMP-X) ever released by ISO up to the present days.2 The paper clarifies how the FP5 IST project MPEG Open Security for Embedded Systems (MOSES), has extended the OPIMA interfaces and architecture to achieve compliance with the MPEG IPMP-X standard, and how it has contributed to the achievement of “consensus” and to the specification, implementation (Reference Software) and validation (Conformance Testing) of the MPEG IPMP-X standard.info:eu-repo/semantics/acceptedVersio
VisTAS:Blockchain-based Visible and Trusted Remote Authentication System
The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. “Trust but verify” is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non-repudiation, which securely records administrators’ authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems’ security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, “VisTAS,” has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain
Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks
Wireless mesh networks (WMNs) have emerged as a promising concept to meet the
challenges in next-generation wireless networks such as providing flexible,
adaptive, and reconfigurable architecture while offering cost-effective
solutions to service providers. As WMNs become an increasingly popular
replacement technology for last-mile connectivity to the home networking,
community and neighborhood networking, it is imperative to design efficient and
secure communication protocols for these networks. However, several
vulnerabilities exist in currently existing protocols for WMNs. These security
loopholes can be exploited by potential attackers to launch attack on WMNs. The
absence of a central point of administration makes securing WMNs even more
challenging. The broadcast nature of transmission and the dependency on the
intermediate nodes for multi-hop communications lead to several security
vulnerabilities in WMNs. The attacks can be external as well as internal in
nature. External attacks are launched by intruders who are not authorized users
of the network. For example, an intruding node may eavesdrop on the packets and
replay those packets at a later point of time to gain access to the network
resources. On the other hand, the internal attacks are launched by the nodes
that are part of the WMN. On example of such attack is an intermediate node
dropping packets which it was supposed to forward. This chapter presents a
comprehensive discussion on the current authentication and privacy protection
schemes for WMN. In addition, it proposes a novel security protocol for node
authentication and message confidentiality and an anonymization scheme for
privacy protection of users in WMNs.Comment: 32 pages, 10 figures. The work is an extended version of the author's
previous works submitted in CoRR: arXiv:1107.5538v1 and arXiv:1102.1226v
Living tiny legally
Over the last 40 years, the average new United States house has increased in size by more than 1,000 square feet, from an average size of 1,660 square feet in 1973 (earliest year available from the Census Bureau) to 2,687 square feet last year (Perry, 2016). In that same time period, there was a 91% increase in home square footage per inhabitant and a decrease in average household size. According to the U.S. Census Bureau, the average home in the United States costs approximately 200,000 since 1998. Meanwhile, the average annual income in the U.S. has remained unchanged for the last several years, at approximately 72,000, whereas the cost of new construction for a 200 square foot tiny house can be as low as $35,000. Socially the tiny house lifestyle promotes a greater sense of community, more socio-economic accessibility, and the benefits of minimalism. This project takes all of these principles and applies them to examine the feasibility of implementing tiny homes within the Harrisonburg area
- …