7,900 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    The Renewable Power of the Mine

    Get PDF
    Access to affordable and reliable energy is key for the mining sector and with rising demand for minerals and falling ore grades, energy demand is estimated to increase by 36% by 2035. Today, energy produced and procured by mining companies is mostly fossil fuel based. This will have to change if the sector is to contribute to the decarbonization of the world economy, needed for countries to meet the target adopted at the Paris Agreement of keeping global temperatures from rising more than 1.5-2 degrees Celsius. At the same time, the costs of solar, wind and battery storage systems have been falling at an unprecedented scale, which has encouraged an increasing number of mining companies to test these technologies at their mine sites. The Renewable Power of the Mine report, launched at the Energy and Mines World Congress in Toronto and prepared with the support from the German Cooperation, is the most comprehensive study to date on how the sector has been integrating renewables in their mining operations, the roadblocks that still exist, and the future trends that are likely to further drive the roll-out of renewables to supply electricity to mine sites. 38 case studies are included to highlight practical examples and lessons learned. Recommendations to address the outstanding roadblocks are included for governments, mining companies, independent power producers and donors

    A flexible architecture for privacy-aware trust management

    Get PDF
    In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different participants trust each other. As trust may depend on many different factors, in a flexible framework for Trust Management (TM) trust must be computed by combining different types of information. In this paper we describe the TAS3 TM framework which integrates independent TM systems into a single trust decision point. The TM framework supports intricate combinations whilst still remaining easily extensible. It also provides a unified trust evaluation interface to the (authorization framework of the) services. We demonstrate the flexibility of the approach by integrating three distinct TM paradigms: reputation-based TM, credential-based TM, and Key Performance Indicator TM. Finally, we discuss privacy concerns in TM systems and the directions to be taken for the definition of a privacy-friendly TM architecture.\u

    Simple Public Key Infrastructure Analysis Protocol Analysis and Design

    Get PDF
    Secure electronic communication is based on secrecy, authentication and authorization. One means of assuring a communication has these properties is to use Public Key Cryptography (PKC). The framework consisting of standards, protocols and instructions that make PKC usable in communication applications is called a Public Key Infrastructure (PKI). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis. A Diffie-Hellman strand space model is combined with mixed strand space proof methods for proving the correctness of multiple protocols operating in the same context. The result is the public key mixed strand space model. This model is ideal for the analysis of SPKI applications operating as sub-protocols of an implementing application. This thesis then models the popular Internet Transport Layer Security (TLS) protocol as a public key mixed strand space model. The model includes the integration of SPKI certificates. To accommodate the functionality of SPKI, a new protocol is designed for certificate validation, the Certificate Chain Validation Protocol (CCV). The CCV protocol operates as a sub-protocol to TLS and provides online certificate validation. The security of the TLS protocol integrated with SPKI certificates and subprotocols is then analyzed to prove its security properties

    Strategies for sustainable socio-economic development and mechanisms their implementation in the global dimension

    Get PDF
    The authors of the book have come to the conclusion that it is necessary to effectively use modern approaches to developing and implementation strategies of sustainable socio-economic development in order to increase efficiency and competitiveness of economic entities. Basic research focuses on economic diagnostics of socio-economic potential and financial results of economic entities, transition period in the economy of individual countries and ensuring their competitiveness, assessment of educational processes and knowledge management. The research results have been implemented in the different models and strategies of supply and logistics management, development of non-profit organizations, competitiveness of tourism and transport, financing strategies for small and medium-sized enterprises, cross-border cooperation. The results of the study can be used in decision-making at the level the economic entities in different areas of activity and organizational-legal forms of ownership, ministries and departments that promote of development the economic entities on the basis of models and strategies for sustainable socio-economic development. The results can also be used by students and young scientists in modern concepts and mechanisms for management of sustainable socio-economic development of economic entities in the condition of global economic transformations and challenges

    Security Threats Classification in Blockchains

    Get PDF
    Blockchain, the foundation of Bitcoin, has become one of the most popular technologies to create and manage digital transactions recently. It serves as an immutable ledger which allows transactions take place in a decentralized manner. This expeditiously evolving technology has the potential to lead to a shift in thinking about digital transactions in multiple sectors including, Internet of Things, healthcare, energy, supply chain, manufacturing, cybersecurity and principally financial services. However, this emerging technology is still in its infancy. Despite the huge opportunities blockchain offers, it suffers from challenges and limitation such as scalability, security, and privacy, compliance, and governance issues that have not yet been thoroughly explored and addressed. Although there are some studies on the security and privacy issues of the blockchain, they lack a systematic examination of the security of blockchain systems. This research conducted a systematic survey of the security threats to the blockchain systems and reviewed the existing vulnerabilities in the Blockchain. These vulnerabilities lead to the execution of the various security threats to the normal functionality of the Blockchain platforms. Moreover, the study provides a case-study for each attack by examining the popular blockchain systems and also reviews possible countermeasures which could be used in the development of various blockchain systems. Furthermore, this study developed taxonomies that classified the security threats and attacks based on the blockchain abstract layers, blockchain primary processes and primary business users. This would assist the developers and businesses to be attentive to the existing threats in different areas of the blockchain-based platforms and plan accordingly to mitigate risk. Finally, summarized the critical open challenges, and suggest future research directions
    corecore