21,155 research outputs found
UAS Service Supplier Specification
Within the Unmanned Aircraft Systems (UAS) Traffic Management (UTM) system, the UAS Service Supplier (USS) is a key component. The USS serves several functions. At a high level, those include the following: Bridging communication between UAS Operators and Flight Information Management System (FIMS) Supporting planning of UAS operations Assisting strategic deconfliction of the UTM airspace Providing information support to UAS Operators during operations Helping UAS Operators meet their formal requirements This document provides the minimum set of requirements for a USS. In order to be recognized as a USS within UTM, successful demonstration of satisfying the requirements described herein will be a prerequisite. To ensure various desired qualities (security, fairness, availability, efficiency, maintainability, etc.), this specification relies on references to existing public specifications whenever possible
Tracking Chart 2005 Reebok, Mexico 36025017D
This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.FLA_2005_Reebok_TC_Mexico_36025017D.pdf: 10 downloads, before Oct. 1, 2020
Cognitive Security Framework For Heterogeneous Sensor Network Using Swarm Intelligence
Rapid development of sensor technology has led to applications ranging from academic to military in a short time span. These tiny sensors are deployed in environments where security for data or hardware cannot be guaranteed. Due to resource constraints, traditional security schemes cannot be directly applied. Unfortunately, due to minimal or no communication security schemes, the data, link and the sensor node can be easily tampered by intruder attacks. This dissertation presents a security framework applied to a sensor network that can be managed by a cohesive sensor manager. A simple framework that can support security based on situation assessment is best suited for chaotic and harsh environments. The objective of this research is designing an evolutionary algorithm with controllable parameters to solve existing and new security threats in a heterogeneous communication network. An in-depth analysis of the different threats and the security measures applied considering the resource constrained network is explored. Any framework works best, if the correlated or orthogonal performance parameters are carefully considered based on system goals and functions. Hence, a trade-off between the different performance parameters based on weights from partially ordered sets is applied to satisfy application specific requirements and security measures. The proposed novel framework controls heterogeneous sensor network requirements,and balance the resources optimally and efficiently while communicating securely using a multi-objection function. In addition, the framework can measure the affect of single or combined denial of service attacks and also predict new attacks under both cooperative and non-cooperative sensor nodes. The cognitive intuition of the framework is evaluated under different simulated real time scenarios such as Health-care monitoring, Emergency Responder, VANET, Biometric security access system, and Battlefield monitoring. The proposed three-tiered Cognitive Security Framework is capable of performing situation assessment and performs the appropriate security measures to maintain reliability and security of the system. The first tier of the proposed framework, a crosslayer cognitive security protocol defends the communication link between nodes during denial-of-Service attacks by re-routing data through secure nodes. The cognitive nature of the protocol balances resources and security making optimal decisions to obtain reachable and reliable solutions. The versatility and robustness of the protocol is justified by the results obtained in simulating health-care and emergency responder applications under Sybil and Wormhole attacks. The protocol considers metrics from each layer of the network model to obtain an optimal and feasible resource efficient solution. In the second tier, the emergent behavior of the protocol is further extended to mine information from the nodes to defend the network against denial-of-service attack using Bayesian models. The jammer attack is considered the most vulnerable attack, and therefore simulated vehicular ad-hoc network is experimented with varied types of jammer. Classification of the jammer under various attack scenarios is formulated to predict the genuineness of the attacks on the sensor nodes using receiver operating characteristics. In addition to detecting the jammer attack, a simple technique of locating the jammer under cooperative nodes is implemented. This feature enables the network in isolating the jammer or the reputation of node is affected, thus removing the malicious node from participating in future routes. Finally, a intrusion detection system using `bait\u27 architecture is analyzed where resources is traded-off for the sake of security due to sensitivity of the application. The architecture strategically enables ant agents to detect and track the intruders threateningthe network. The proposed framework is evaluated based on accuracy and speed of intrusion detection before the network is compromised. This process of detecting the intrusion earlier helps learn future attacks, but also serves as a defense countermeasure. The simulated scenarios of this dissertation show that Cognitive Security Framework isbest suited for both homogeneous and heterogeneous sensor networks
Recommended from our members
Proposed Keystone XL Pipeline: Legal Issues
[Excerpt] In 2008, TransCanada Corp. applied for a presidential permit from the State Department to construct and operate an oil pipeline across the U.S.-Canada border in a project known as Keystone XL. The Keystone XL pipeline would transport oil produced from oil sands in Alberta,Canada, to Gulf Coast refineries. The permit application was subjected to review by the State Department pursuant to executive branch authority over cross-border pipeline facilities as articulated in Executive Order 13337.
After several phases of review, on November 10, 2011, the State Department announced that it would seek additional information about alternative pipeline routes before it could move forward with a national interest determination. In response, several pieces of legislation were introduced, including Title V of the Temporary Payroll Tax Cut Continuation Act of 2011. Title V dictated that President must grant the Keystone XL pipeline permit within 60 days of the law’s enactment, unless the President determined that the pipeline is not in the national interest. If the President did not make a national interest determination and took no action to grant the permit, then the law provided that the permit “shall be in effect by operation of law.” The Temporary Payroll Tax Cut Continuation Act of 2011 (P.L. 112-78), including Title V addressing the Keystone XL permit, was enacted on December 23, 2011.
Pursuant to the requirements of Title V, on January 18, 2012, the State Department recommended that “the presidential permit for the proposed Keystone XL pipeline be denied and, that at this time, the TransCanada Keystone XL Pipeline be determined not to serve the national interest. ”The same day, the President stated his determination that the Keystone XL pipeline project“ would not serve the national interest.
”New legislative activity with respect to the permitting of border-crossing facilities, a subject previously handled exclusively by the executive branch, has triggered inquiries as to whether this raises constitutional issues related to the jurisdiction of the two branches over such facilities. Additionally, as states have begun to contemplate taking action with respect to the pipeline siting, some have questioned whether state siting of a pipeline is preempted by federal law. Others argue that states dictating the route of the pipeline violates the dormant Commerce Clause of the Constitution which, among other things, prohibits one state from acting to protect its own interests to the detriment of other states.
This report reviews those legal issues. First, it suggests that legislation related to cross-border facility permitting is unlikely to raise significant constitutional questions, despite the fact that such permits have traditionally been handled by the executive branch alone pursuant to its constitutional “foreign affairs” authority. Next, it observes generally that state oversight of pipeline siting decisions does not appear to violate existing federal law or the Constitution. Finally, the report suggests that State Department’s implementation of the existing authority to issue presidential permits appears to allow for judicial review of its National Environmental Policy Act determinations
Upholding Citizens’ Privacy in the Use of Stingray Technology: Is New York Behind?
This Comment will argue that New York should follow the federal agencies’ and states’ leads by imposing a warrant requirement supported by probable cause on local and state agencies that wish to use Stingray technology in their investigations. The first section will explore Stingray technology and how it works. The second section will frame the issue and describe New York’s current standard. The third section will discuss the judicial response to the issue and how New York courts seem to place the burden of upholding privacy on the citizen, instead of the government. The third section will also discuss a possible shift in New York courts’ stance on privacy, examining a recent dispute in Erie County that involved unauthorized Stingray use. The fourth section will discuss the legislative response to the issue, which consists of two state bills and a federal bill that could change New York’s policy. The fifth and final section will argue why New York should adopt a warrant requirement supported by probable cause
Ubiquitous robust communications for emergency response using multi-operator heterogeneous networks
A number of disasters in various places of the planet have caused an extensive loss of lives, severe damages to properties and the environment, as well as a tremendous shock to the survivors. For relief and mitigation operations, emergency responders are immediately dispatched to the disaster areas. Ubiquitous and robust communications during the emergency response operations are of paramount importance. Nevertheless, various reports have highlighted that after many devastating events, the current technologies used, failed to support the mission critical communications, resulting in further loss of lives. Inefficiencies of the current communications used for emergency response include lack of technology inter-operability between different jurisdictions, and high vulnerability due to their centralized infrastructure. In this article, we propose a flexible network architecture that provides a common networking platform for heterogeneous multi-operator networks, for interoperation in case of emergencies. A wireless mesh network is the main part of the proposed architecture and this provides a back-up network in case of emergencies. We first describe the shortcomings and limitations of the current technologies, and then we address issues related to the applications and functionalities a future emergency response network should support. Furthermore, we describe the necessary requirements for a flexible, secure, robust, and QoS-aware emergency response multi-operator architecture, and then we suggest several schemes that can be adopted by our proposed architecture to meet those requirements. In addition, we suggest several methods for the re-tasking of communication means owned by independent individuals to provide support during emergencies. In order to investigate the feasibility of multimedia transmission over a wireless mesh network, we measured the performance of a video streaming application in a real wireless metropolitan multi-radio mesh network, showing that the mesh network can meet the requirements for high quality video transmissions
- …