13,422 research outputs found

    Resilient networking in wireless sensor networks

    Get PDF
    This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we need more algorithmic solutions. In this report, we focus on the behavior of routing protocols to determine which properties make them more resilient to attacks. Our aim is to find some answers to the following questions. Are there any existing protocols, not designed initially for security, but which already contain some inherently resilient properties against attacks under which some portion of the network nodes is compromised? If yes, which specific behaviors are making these protocols more resilient? We propose in this report an overview of security strategies for WSNs in general, including existing attacks and defensive measures. In this report we focus at the network layer in particular, and an analysis of the behavior of four particular routing protocols is provided to determine their inherent resiliency to insider attacks. The protocols considered are: Dynamic Source Routing (DSR), Gradient-Based Routing (GBR), Greedy Forwarding (GF) and Random Walk Routing (RWR)

    The relationships between technology and open education in the development of a resilient higher education

    Get PDF
    The place of technology in the development of coherent educational responses to environmental and socio-economic disruption is here placed under scrutiny. One emerging area of interest is the role of technology in addressing more complex learning futures, and more especially in facilitating individual and social resilience, or the ability to manage and overcome disruption. However, the extent to which higher education practitioners can utilise technology to this end is framed by their approaches to the curriculum, and the socio-cultural practices within which they are located. This paper discusses how open education might enable learners to engage with uncertainty through social action within a form of higher education that is more resilient to economic, environmental and energy-related disruption. It asks whether open higher education can be (re)claimed by users and communities within specific contexts and curricula, in order to engage with an uncertain world

    Mobile integrated conditional access system

    Get PDF
    This paper presents design of a novel security architecture integrating mobile and broadcasting technologies in the Pay-TV system. The security architecture proposed herein is a state-of-the-art solution to tackle well-known problems challenging current Pay-TV systems including but not limited to interoperability amongst service providers, relatively high cost of the service deployment, the security compromise, limited interactivity and bespoken services offered to subscribers. It also proposes the Follow-me service that enables subscribers to access their entitlements via an arbitrary set-top box

    Feature selection in high-dimensional dataset using MapReduce

    Full text link
    This paper describes a distributed MapReduce implementation of the minimum Redundancy Maximum Relevance algorithm, a popular feature selection method in bioinformatics and network inference problems. The proposed approach handles both tall/narrow and wide/short datasets. We further provide an open source implementation based on Hadoop/Spark, and illustrate its scalability on datasets involving millions of observations or features
    • 

    corecore