38,399 research outputs found

    Wireless and Physical Security via Embedded Sensor Networks

    Full text link
    Wireless Intrusion Detection Systems (WIDS) monitor 802.11 wireless frames (Layer-2) in an attempt to detect misuse. What distinguishes a WIDS from a traditional Network IDS is the ability to utilize the broadcast nature of the medium to reconstruct the physical location of the offending party, as opposed to its possibly spoofed (MAC addresses) identity in cyber space. Traditional Wireless Network Security Systems are still heavily anchored in the digital plane of "cyber space" and hence cannot be used reliably or effectively to derive the physical identity of an intruder in order to prevent further malicious wireless broadcasts, for example by escorting an intruder off the premises based on physical evidence. In this paper, we argue that Embedded Sensor Networks could be used effectively to bridge the gap between digital and physical security planes, and thus could be leveraged to provide reciprocal benefit to surveillance and security tasks on both planes. Toward that end, we present our recent experience integrating wireless networking security services into the SNBENCH (Sensor Network workBench). The SNBENCH provides an extensible framework that enables the rapid development and automated deployment of Sensor Network applications on a shared, embedded sensing and actuation infrastructure. The SNBENCH's extensible architecture allows an engineer to quickly integrate new sensing and response capabilities into the SNBENCH framework, while high-level languages and compilers allow novice SN programmers to compose SN service logic, unaware of the lower-level implementation details of tools on which their services rely. In this paper we convey the simplicity of the service composition through concrete examples that illustrate the power and potential of Wireless Security Services that span both the physical and digital plane.National Science Foundation (CISE/CSR 0720604, ENG/EFRI 0735974, CIES/CNS 0520166, CNS/ITR 0205294, CISE/ERA RI 0202067

    Building National Forest and Land-Use Information Systems: Lessons from Cameroon, Indonesia, and Peru

    Get PDF
    This working paper examines the institutional, human resources, and financial capacities of three countries that have developed a forest and land-use information system, and highlights common enabling factors and challenges

    FADI: a fault-tolerant environment for open distributed computing

    Get PDF
    FADI is a complete programming environment that serves the reliable execution of distributed application programs. FADI encompasses all aspects of modern fault-tolerant distributed computing. The built-in user-transparent error detection mechanism covers processor node crashes and hardware transient failures. The mechanism also integrates user-assisted error checks into the system failure model. The nucleus non-blocking checkpointing mechanism combined with a novel selective message logging technique delivers an efficient, low-overhead backup and recovery mechanism for distributed processes. FADI also provides means for remote automatic process allocation on the distributed system nodes

    Global governance approaches to addressing illegal logging: Uptake and lessons learned

    Get PDF
    One of the most challenging tasks facing development agencies, trade ministries, environmental groups, social activists and forest-focused business interests seeking to ameliorate illegal logging and related timber trade is to identify and nurture promising global governance interventions capable of helping improve compliance to governmental policies and laws at national, subnational and local levels. This question is especially acute for developing countries constrained by capacity challenges and “weak states” (Risse, 2011). This chapter seeks to shed light on this task by asking four related questions: How do we understand the emergence of illegal logging as a matter of global interest? What are the types of global interventions designed to improve domestic legal compliance? How have individual states responded to these global efforts? What are the prospects for future impacts and evolution? We proceed in the following steps. Following this introduction, step two reviews how the problem of “illegal logging” emerged on the international agenda. Step three reviews leading policy interventions that resulted from this policy framing. Step four reviews developments in selected countries/regions around the world according to their place on the global forest products supply chain: consumers (United States, Europe and Australia); middle of supply chain manufacturers (China and South Korea) and producers (Russia; Indonesia; Brazil and Peru; Ghana, Cameroon and the Republic of Congo). We conclude by reflecting on key trends that emerge from this review relevant for understanding the conditions through which legality might make a difference in addressing critical challenges

    An overview of ADSL homed nepenthes honeypots in Western Australia

    Get PDF
    This paper outlines initial analysis from research in progress into ADSL homed Nepenthes honeypots. One of the Nepenthes honeypots prime objective in this research was the collection of malware for analysis and dissection. A further objective is the analysis of risks that are circulating within ISP networks in Western Australian. What differentiates Nepenthes from many traditional honeypot designs it that is has been engineered from a distributed network philosophy. The program allows distribution of results across a network of sensors and subsequent aggregation of malware statistics readily within a large network environment

    A modular software architecture for UAVs

    Get PDF
    There have been several attempts to create scalable and hardware independent software architectures for Unmanned Aerial Vehicles (UAV). In this work, we propose an onboard architecture for UAVs where hardware abstraction, data storage and communication between modules are efficiently maintained. All processing and software development is done on the UAV while state and mission status of the UAV is monitored from a ground station. The architecture also allows rapid development of mission-specific third party applications on the vehicle with the help of the core module
    • 

    corecore