4,256 research outputs found

    MetTeL: A Generic Tableau Prover.

    Get PDF

    An Authentication Protocol for Future Sensor Networks

    Full text link
    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis and simulated the SMSN and previously proposed schemes in an automated protocol verifier tool. Finally, we compared the computational complexity and communication cost against well-known authentication protocols.Comment: This article is accepted for the publication in "Sensors" journal. 29 pages, 15 figure

    An eco-friendly hybrid urban computing network combining community-based wireless LAN access and wireless sensor networking

    Get PDF
    Computer-enhanced smart environments, distributed environmental monitoring, wireless communication, energy conservation and sustainable technologies, ubiquitous access to Internet-located data and services, user mobility and innovation as a tool for service differentiation are all significant contemporary research subjects and societal developments. This position paper presents the design of a hybrid municipal network infrastructure that, to a lesser or greater degree, incorporates aspects from each of these topics by integrating a community-based Wi-Fi access network with Wireless Sensor Network (WSN) functionality. The former component provides free wireless Internet connectivity by harvesting the Internet subscriptions of city inhabitants. To minimize session interruptions for mobile clients, this subsystem incorporates technology that achieves (near-)seamless handover between Wi-Fi access points. The WSN component on the other hand renders it feasible to sense physical properties and to realize the Internet of Things (IoT) paradigm. This in turn scaffolds the development of value-added end-user applications that are consumable through the community-powered access network. The WSN subsystem invests substantially in ecological considerations by means of a green distributed reasoning framework and sensor middleware that collaboratively aim to minimize the network's global energy consumption. Via the discussion of two illustrative applications that are currently being developed as part of a concrete smart city deployment, we offer a taste of the myriad of innovative digital services in an extensive spectrum of application domains that is unlocked by the proposed platform

    Authentication Solutions in Industrial Internet of Things: A Survey

    Get PDF
    With the rapid growth of industry 4.0, the Industrial Internet of Things (IIoT) is considered to be a promising solution for converting normal operations to ‘smart’ operations in industrial sectors and systems. The well-known characteristics of IIoT has greatly improved the productivity and quality of many industrial sectors. IIoT allows the connectivity of many industrial smart devices such as, sensors, actuators and gateways. The connectivity feature makes this critical environment vulnerable to various cybersecurity attacks. Subsequently, maintaining the security of IIoT sys-tems remains a challenge to ensure their success. In particular, authenticating the connected IIoT devices is a must to ensure that they can be trusted and prevent any malicious attempts. Hence, the objective of this survey is to overview, discuss and analyze the different solutions related to de-vice authentication in the domain of IIoT. Also, we analyze the IIoT environment in terms of characteristics, architecture and security requirements. Similarly, we highlight the role of (machine-to-machine) M2M communication in IIoT. We further contribute to this survey by outlining several open issues that must be considered when designing authentication schemes for IIoT. Fi-nally, we highlight a number of research directions and open challenges

    Turbulences in the encampment archipelago: conflicting mobilities between migration, labour and logistics in Italian agri-food enclaves

    Get PDF
    The paper analyses the proliferation of different but intersecting regimes of mobility, and resistance against them, at the point of articulation of agricultural production with migration flows in contemporary Italy. The development of agri-food districts responds to a rationality of spatial zoning that in turn derives from the logistical re-organisation of supply chains. Such dynamics are shown to interact in complex ways with specific migration routes and their control, which also bear the effects of an encroaching logistical rationality. At times, these feed into the demand for cheap, just-in-time labour in agribusiness, whilst at others they clash with the needs of this sector. Racialisation represents a crucial tool of containment, together with a sexualised division of labour. The analysis is based on over eight years of participant, engaged research in several agro-industrial districts and migration hubs in Italy, among its migrant-worker populations, as well as in the countries of origins of some such workers (Nigeria, Romania and Bulgaria).info:eu-repo/semantics/publishedVersio

    Law for the Platform Economy

    Get PDF
    This Article: explores patterns of legal-institutional change in the emerging, platform-driven economy. Its starting premise is that the platform is not simply a new business model, a new social technology, or a new infrastructural formation (although it is also all of those things). Rather, it is the core organizational form of the emerging informational economy. Platforms do not enter or expand markets; they replace (and rematerialize) them. The article argues that legal institutions, including both entitlements and regulatory institutions, have systematically facilitated the platform economy\u27s emergence. It first describes the evolution of the platform as a mode of economic (re)organization and introduces the ways that platforms restructure both economic exchange and patterns of information flow more generally. It then explores some of the ways that actions and interventions by and on behalf of platform businesses are reshaping the landscape of legal entitlements and obligations. Finally, it describes challenges that platform-based intermediation of the information environment has posed for existing regulatory institutions and traces some of the emerging institutional responses

    Plastics in the Pandemic

    Get PDF
    Anti-plastic discourses have been gaining momentum in the last two decades, increasingly prompting plastic control policies and plastic avoidant behaviour. The COVID-19 pandemic, however, has brought a profusion of single-use plastics and plastic packaging. What can this change tell us about shifts in subjective experiences of risk in an environment of hypervigilance? The case of India reveals that the pandemic has shifted attention among the middle class from the uncertain, future risks of plastic toxicity toward the more immediate risks brought by COVID-19. It also illuminates how plastics are implicated in the logics of ritual pollution that inform frameworks of secular hygiene. For middle-class consumers, plastics function as a boundary between the outer world of the Other and the inner world of the Self, and the use of plastic packaging becomes a token gesture that provides a sense of protection in the face of a heightened awareness of vulnerability

    Vulnerability Analysis of CSP Based on Stochastic Game Theory

    Get PDF
    With the development of industrial informatization, the industrial control network has gradually become much accessible for attackers. A series of vulnerabilities will therefore be exposed, especially the vulnerability of exclusive industrial communication protocols (ICPs), which has not yet been attached with enough emphasis. In this paper, stochastic game theory is applied on the vulnerability analysis of clock synchronization protocol (CSP), one of the pivotal ICPs. The stochastic game model is built strictly according to the protocol with both Man-in-the-Middle (MIM) attack and dependability failures being taken into account. The situation of multiple attack routes is considered for depicting the practical attack scenarios, and the introduction of time aspect characterizes the success probabilities of attackers actions. The vulnerability analysis is then realized through determining the optimal strategies of attacker under different states of system, respectively

    Defining an approximation to formally verify cryptographic protocols

    Get PDF
    Electronic forms of communication are abundant in todays world, and much emphasis is placed on these methods of communication in every day life. In order to guarantee the secrecy and authenticity of information exchanged, it is vital to formally verify the cryptographic protocols used in these forms of communications. This verification does, however, present many challenges. The systems to verify are infinite, with an infinite number of sessions and of p articipants. As if this was not enough, there is also a reactive element to deal with: th e intruder. The intruder will attack the protocol to achieve his goal: usurping identity, stealing confidential information, etc. His behavior is unpredictable! This thesis describes a method of verification based 011 the verification of systems by approximation. Starting from an initial configuration of the network, an overapproximation of the set of messages exchanged is automatically computed. Secrecy and authentication properties can then be checked on the approximated system. Starting from an existing semi-automatic proof method developed by Genet and Klay, an automatic solution is developed. Starting from an existing semi-automatic proof method developed by Genet and Klay, an automatic solution is developed. This thesis defines a particular approximation function that can be generated automatically and that guarantees that the computation of the approximated system terminates. Th e verification by approximation only tells if properties are verified. When the verification fails no conclusion can be drawn on the property. Thus, this thesis also shows how the approximation technique can easily be combined with another verification technique to combine the strengths of both approaches. Finally, the tool developed to validate these developments and the results of cryptographic protocol verifications carried out in the course of this research are included

    Maintaining places of social inclusion : Ebola and the emergency department

    Get PDF
    We introduce the concept of places of social inclusion—institutions endowed by a society or a community with material resources, meaning, and values at geographic sites where citizens can access services for specific needs—as taken-for-granted, essential, and inherently precarious. Based on our study of an emergency department that was disrupted by the threat of the Ebola virus in 2014, we develop a process model to explain how a place of social inclusion can be maintained by custodians. We show how these custodians—in our fieldsite, doctors and nurses—experience and engage in institutional work to manage different levels of tension between the value of inclusion and the reality of finite resources, as well as tension between inclusion and the desire for safety. We also demonstrate how the interplay of custodians’ emotions is integral to maintaining the place of social inclusion. The primary contribution of our study is to shine light on places of social inclusion as important institutions in democratic society. We also reveal the theoretical and practical importance of places as institutions, deepen understanding of custodians and custodianship as a form of institutional work, and offer new insight into the dynamic processes that connect emotions and institutional work
    corecore