24,312 research outputs found

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Vulnerability to Broker-Related Forced Labor Among Migrant Workers in Information Technology Manufacturing in Taiwan and Malaysia

    Get PDF
    This document is part of a digital collection provided by the Martin P. Catherwood Library, ILR School, Cornell University, pertaining to the effects of globalization on the workplace worldwide. Special emphasis is placed on labor rights, working conditions, labor market changes, and union organizing.V_HELP_WANTED_A_Verit%C3%A9_Report_Workers_in_Taiwan___Malaysia.pdf: 1735 downloads, before Oct. 1, 2020

    Platforms and Protocols for the Internet of Things

    Get PDF
    Building a general architecture for the Internet of Things (IoT) is a very complex task, exacerbated by the extremely large variety of devices, link layer technologies, and services that may be involved in such a system. In this paper, we identify the main blocks of a generic IoT architecture, describing their features and requirements, and analyze the most common approaches proposed in the literature for each block. In particular, we compare three of the most important communication technologies for IoT purposes, i.e., REST, MQTT, and AMQP, and we also analyze three IoT platforms: openHAB, Sentilo, and Parse. The analysis will prove the importance of adopting an integrated approach that jointly addresses several issues and is able to flexibly accommodate the requirements of the various elements of the system. We also discuss a use case which illustrates the design challenges and the choices to make when selecting which protocols and technologies to use

    Learning agreement pilots : process evaluation

    Get PDF

    Governing network evolution in the quest for identity

    Get PDF
    This paper provides a managerial account of network governance by exploring how initially non-powerful agents, driven by the quest for distinctive identity, shape the governance of their networks over time. The research design is that of a longitudinal comparative case study of the trajectories of three renowned, Oscar-winning Spanish filmmakers. It scrutinizes data coming from original interviews, as well as from multiple secondary data sources, in order to illustrate the propositions advanced. The paper's contribution is sought: 1) in proposing a micro-level framework for systematic thinking about network governance evolution, distinguishing four dimensions (co-governance, structure, strategy, and pace) and their respective sub-categories; 2) in advancing three peculiar identity profiles with different implications for the evolution of network governance (i.e., a maverick, an integrated professional, and a broker); 3) in bringing together two bodies of literature that have not conversed frequently (i.e., network governance and identity) in a largely overlooked cultural and historical context, that of Spain after the transition to democracy in 1975.Network governance; Management

    Why Use the Services of Alternative Staffing Organizations: Perspectives from Customer Businesses

    Get PDF
    Organizations that aim to improve the experiences and employment chances of job seekers who face barriers to employment have, over the years, had to contend directly with potential employers and their requirements. This is particularly true for community-based job brokers that use a temporary staffing model, offering job access and immediate work to their service population.Alternative staffing organizations (ASOs) are worker-centered, social purpose businesses that place job seekers in temporary and "temp-to-perm" assignments with customer businesses, and charge their customers a markup on the wage of the position. These fee-for-service organizations can help job seekers who face labor market barriers gain work experience and access potential employers. Created by community-based organizations and national nonprofits, ASOs are often embedded within larger organizations that provide other employment, training, and human services to their community. The parent organizations may also be operating other social enterprise ventures. Businesses that contract ASOs for staffing services are customers that expect a service, but also represent an opportunity for employment and work experience for job seekers. Thus ASOs must operate with a dual agenda to serve both sides of the equation. In related publications, we have explored how ASOs operate as social enterprises and how the model fits within the goals of the parent organization. With detailed information from five well-established ASOs, and as part of two waves of a demonstration initiated by the Charles Stewart Mott Foundation, we have documented the employment experiences of workers placed in assignments and their employment status after leaving the ASO. In this paper, we address engagement with businesses and their perspectives on ASO services. This is a major issue for ASOs as well as for other workforce development organizations. ASOs engage with businesses while selling staffing services and monitoring worker performance. By the very nature of temporary staffing, they receive rapid feedback on worker performance and their services from customer businesses. As such, ASOs provide a window into how to connect to potential employers in order to access opportunities. Also, activities of ASOs shed light on how hiring takes place for entry-level jobs, and how customer businesses use ASOs to solve their entry-level hiring problems.This paper demonstrates what can be learned from customers of established ASOs about their reasons for using these services. Specifically, it explores how customer businesses use temporary staffing by ASOs, and for what purposes. What business needs do they meet with ASO services? What are their reasons for using an ASO over conventional staffing agencies? And finally, what causes customer businesses to use an ASO and retain the service over time?These concerns are salient for those organizations considering the creation of an ASO. They also are important for workforce development programs that need to become more active in engaging potential employers and that seek solutions for job seekers who need to connect to employment and need immediate income
    • …
    corecore