1,609 research outputs found

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Endeavouring to be in the good books : awarding DTN network use for acknowledging the reception of bundles

    Get PDF
    This paper describes an incentive scheme for promoting the cooperation, and, therefore, avoiding selfish behaviours, in Delay Tolerant Networks (DTN) by rewarding participant nodes with cryptographic keys that will be required for sending bundles. DTN are normally sparse, and there are few opportunistic contacts, so forwarding of other's bundles can be left out. Moreover, it is difficult to determine the responsible nodes in case of bundle loss. The mechanism proposed in this paper contributes to both problems at the same time. On one hand, cryptographic receipts are generated using time-limited Identity Based Cryptography (IBC) keys to keep track of bundle transmissions. On the other hand, these receipts are used to reward altruistic behaviour by providing newer IBC keys. Finally, these nodes need these IBC keys to send their own bundles. When all nodes behave in a cooperative way, this incentive scheme works as a virtuous circle and achieves a Nash equilibrium, improving very much the network performance in terms of latency. The scheme is not difficult to implement, and it can use an already existing IBC infrastructure used for other purposes in a DTN

    Review layouts, flows, and movements of raw materials in the warehouse and production

    Get PDF
    Treball desenvolupat en el marc del programa "European Project Semester".Incorporation of new raw materials in the existing warehouse and elimination of intermediate buffers for production storage, to locate new machinery. By eliminating Kanban’s factory of raw materials of large consumption or use, ensure the efficiency of the factory during 3 production shifts and 2 warehouse shifts (ensure raw material for production during the night shift). AkzoNobel, a Dutch multinational with 30 manufacturing plants and 125 warehouses located across Europe, is the subject of this project. The focus will be on the Vilafranca del Pendès warehouse, which currently employs manual tools in certain manufacturing processes. The company has encountered limitations in its production line and requires significant changes to enhance its capacity. The project aims to improve the company through four fundamental concepts: efficiency, sustainability, competitiveness, and effectiveness. These concepts are closely associated with the main objective of this project, which can also be defined as: Increasing efficiency by automating production. Implementing automation can be a crucial step toward achieving better outcomes. By using automated multi-stations instead of relying on human resources only, labor costs and risks can be minimized and at the same time achieve much higher production outputs. This reduction in costs and human resource requirements also opens up new opportunities for future development within the company. To remain competitive in the industry, it is essential to make changes that will benefit the future of the company. As this famous naval saying by John Paul Jones, “Those Who Do Not Risk Cannot Win”. The purpose of this report is to showcase the AkzoNobel team’s work during the first part of the EPS on automating production. The report starts with an overview of the company’s background, their state of the art to see what they have achieved, benchmarking with other companies, the EPS program, our team, and the project roadmap. Followed by the project’s scope, including details on the company’s current situation, ongoing projects, their drawbacks, project objectives, and potential challenges. Additionally, the report provides a concise description of the paintfilling process and the characteristics of the barrels used. The report then presents four solutions, outlining their pros and cons, and compares one of our proposed solutions with AkzoNobel’s. After presenting these four solutions, the focus will be put on the chosen solution by AkzoNobel by presenting the final layout, detailing some safety protocols, environmental impact, and the forecasted budget. Finally, the report concludes with a summary of our future plans for the final report, conclusions, and appendices detailing the tools that were used to carry out this project.Incomin

    Conceptual Model for Bomb Victims Information System (BVIS) In Iraq Using WAP Standard

    Get PDF
    Many Iraqis have died resulting from insurgent bombings, revenge killings and U.S. military intervention during the 2003 invasion. This situation led to the destabilization of the security in the country and increased the number of dead and missing, making the search for missing loved ones very complex. To find a missing person, many procedures needed to be satisfied, one of which is to search in the area of bomb explosion, in the casualties section of the hospitals and in the police stations. Moreover, the Iraqis who are killed by terrorists are published in the newspapers but they do not account for all the victims and their information are imprecise. Wireless Application Protocol (WAP) is a technology that may provide the solution to problem of looking for loved ones. WAP is characterized as easy, fast delivery of relevant information and services to mobile users. It is a secure technology allowing users to access instant information through wireless handheld devices like mobile phones, pagers, two-way radios, smart phones and communications. The goal of the present study is to develop a conceptual design model of Bomb Victims Information System (BVIS) through the use of WAP Standard to provide information regarding Iraqi bomb victims

    SMART: A Secure Multi-Layer Credit Based Incentive Scheme for Delay-Tolerant Networks

    Get PDF

    From OPIMA to MPEG IPMP-X: A standard's history across R&D projects

    Get PDF
    This paper describes the work performed by a number of companies and universities who have been working as a consortium under the umbrella of the European Union Framework Programme 5 (FP5), Information Society Technologies (IST) research program, in order to provide a set of Digital Rights Management (DRM) technologies and architectures, aiming at helping to reduce the copyright circumvention risks, that have been threatening the music and film industries in their transition from the “analogue” to “digital” age. The paper starts by addressing some of the earlier standardization efforts in the DRM arena, namely, Open Platform Initiative for Multimedia Access (OPIMA). One of the described FP5 IST projects, Open Components for Controlled Access to Multimedia Material (OCCAMM), has developed the OPIMA vision. The paper addresses also the Motion Pictures Expert Group—MPEG DRM work, starting from the MPEG Intellectual Propriety Management and Protection—IPMP “Hooks”, towards the MPEG IPMP Extensions, which has originated the first DRM-related standard (MPEG-4 Part 13, called IPMP Extensions or IPMP-X) ever released by ISO up to the present days.2 The paper clarifies how the FP5 IST project MPEG Open Security for Embedded Systems (MOSES), has extended the OPIMA interfaces and architecture to achieve compliance with the MPEG IPMP-X standard, and how it has contributed to the achievement of “consensus” and to the specification, implementation (Reference Software) and validation (Conformance Testing) of the MPEG IPMP-X standard.info:eu-repo/semantics/acceptedVersio

    VisTAS:Blockchain-based Visible and Trusted Remote Authentication System

    Get PDF
    The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. “Trust but verify” is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non-repudiation, which securely records administrators’ authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems’ security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, “VisTAS,” has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain

    Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks

    Get PDF
    Wireless mesh networks (WMNs) have emerged as a promising concept to meet the challenges in next-generation wireless networks such as providing flexible, adaptive, and reconfigurable architecture while offering cost-effective solutions to service providers. As WMNs become an increasingly popular replacement technology for last-mile connectivity to the home networking, community and neighborhood networking, it is imperative to design efficient and secure communication protocols for these networks. However, several vulnerabilities exist in currently existing protocols for WMNs. These security loopholes can be exploited by potential attackers to launch attack on WMNs. The absence of a central point of administration makes securing WMNs even more challenging. The broadcast nature of transmission and the dependency on the intermediate nodes for multi-hop communications lead to several security vulnerabilities in WMNs. The attacks can be external as well as internal in nature. External attacks are launched by intruders who are not authorized users of the network. For example, an intruding node may eavesdrop on the packets and replay those packets at a later point of time to gain access to the network resources. On the other hand, the internal attacks are launched by the nodes that are part of the WMN. On example of such attack is an intermediate node dropping packets which it was supposed to forward. This chapter presents a comprehensive discussion on the current authentication and privacy protection schemes for WMN. In addition, it proposes a novel security protocol for node authentication and message confidentiality and an anonymization scheme for privacy protection of users in WMNs.Comment: 32 pages, 10 figures. The work is an extended version of the author's previous works submitted in CoRR: arXiv:1107.5538v1 and arXiv:1102.1226v

    Living tiny legally

    Get PDF
    Over the last 40 years, the average new United States house has increased in size by more than 1,000 square feet, from an average size of 1,660 square feet in 1973 (earliest year available from the Census Bureau) to 2,687 square feet last year (Perry, 2016). In that same time period, there was a 91% increase in home square footage per inhabitant and a decrease in average household size. According to the U.S. Census Bureau, the average home in the United States costs approximately 358,000tobuild,anincreaseofroughly358,000 to build, an increase of roughly 200,000 since 1998. Meanwhile, the average annual income in the U.S. has remained unchanged for the last several years, at approximately 52,000peryear.Ascostsincreased,theU.S.homeownershipratefelltoitslowestpointinover50years.Since1965,thehomeownershipratehasdecreasedto62.9Thesetrendshavecreatedadireneedforaffordablehousing.Thisprojectaddressesthisproblem,whileproposingtinyhousesasasolution,andfollowingthetriplebottomline.Thisisaneconomicmodelthatfocusesoneconomy,ecology,andequityasthedimensionsofsuccess.Tinyhomesaresustainableastheyaremoreenergyefficientandrequirelessmaterials,aswellaslessspace.Incongruencewithlessmaterialsandlesslandrequired,technologysuchaspassivesolardesign,highRvalueinsulation,orenergystarappliancescandrasticallyreduceenergycosts(Morrison,2015).Dependingonthesize,tinyhomesuseonly1052,000 per year. As costs increased, the U.S. homeownership rate fell to its lowest point in over 50 years. Since 1965, the homeownership rate has decreased to 62.9% as of the second quarter in 2016. These trends have created a dire need for affordable housing. This project addresses this problem, while proposing tiny houses as a solution, and following the triple bottom line. This is an economic model that focuses on economy, ecology, and equity as the dimensions of success. Tiny homes are sustainable as they are more energy efficient and require less materials, as well as less space. In congruence with less materials and less land required, technology such as passive solar design, high R-value insulation, or energy star appliances can drastically reduce energy costs (Morrison, 2015). Depending on the size, tiny homes use only 10% of the lumber as a traditional home. The cost of a tiny home is comparable to the down payment of a traditional single family home. A typical down payment on an average-sized house is 72,000, whereas the cost of new construction for a 200 square foot tiny house can be as low as $35,000. Socially the tiny house lifestyle promotes a greater sense of community, more socio-economic accessibility, and the benefits of minimalism. This project takes all of these principles and applies them to examine the feasibility of implementing tiny homes within the Harrisonburg area
    corecore