418,577 research outputs found

    Security-Autonomy-Mobility Roadmaps: Passports To Security for Youth

    Get PDF
    Taking the highway along the California coast and swinging inland into one of the state\u27s agricultural belts, the hills appear golden in the distance, spotted with gnarled oak trees. Vineyards rise up on either side of the highway, and occasionally cowboys may be seen in the distance herding grazing cattle. Yet as clouds of dust rise from the fields in this agricultural community, the idyllic scene fades dramatically in the town of Rancho Benito, a community wearing the signs of the hard economic times. This once relatively prosperous community is now a place in which many families sit down to dinner in dramatically different circumstances than just a few years ago. After the 2008 recession hit this community, gaping holes appeared in all areas of the economy. Just driving through town, one sees evidence in the strip malls of the failure of one local business after another. Local industry has felt the ravages of the new economic landscape, from a partially empty mall to burgeoning bargain stores. While not all families have endured the same kind or degree of economic insecurity, nonetheless they dwell in a community strongly affected by the Great Recession. While not all have directly felt the effects on their immediate personal circles, all community members live in an environment indelibly stamped by the recession\u27s imprint

    Architecture for Mobile Heterogeneous Multi Domain Networks

    Get PDF
    Multi domain networks can be used in several scenarios including military, enterprize networks, emergency networks and many other cases. In such networks, each domain might be under its own administration. Therefore, the cooperation among domains is conditioned by individual domain policies regarding sharing information, such as network topology, connectivity, mobility, security, various service availability and so on. We propose a new architecture for Heterogeneous Multi Domain (HMD) networks, in which one the operations are subject to specific domain policies. We propose a hierarchical architecture, with an infrastructure of gateways at highest-control level that enables policy based interconnection, mobility and other services among domains. Gateways are responsible for translation among different communication protocols, including routing, signalling, and security. Besides the architecture, we discuss in more details the mobility and adaptive capacity of services in HMD. We discuss the HMD scalability and other advantages compared to existing architectural and mobility solutions. Furthermore, we analyze the dynamic availability at the control level of the hierarchy

    Human Security and the Governmentality of Neo-Liberal Mobility: A Feminist Perspective

    Get PDF
    Transnational migration and its implications for human security as a policy field constitute one of the most complex issues of our time. Current experiences of displacement and security spans between a cyber world characterized by hyper mobility of finance, technology, information and the ‘cosmopolitan’ values of a ‘flexible citizenship’ (Ong, 1999) to the world of human trafficking and smuggling of migrants and refugees as a mode of mobility adopted by people who cross borders on foot, by boat, trucks and planes who are often abandoned to die when arrangements break down (Eschbach/Hagan/Rodriguez, 2001; El-Cherkeh/Hella, 2004). The extant legal vacuum reflects unresolved conflicts of interest at different levels and poses a great challenge to the right to mobility as an expression of the liberal ideal of individual liberty.feminist perspective;human security;neo-liberal mobility

    BAN-GZKP: Optimal Zero Knowledge Proof based Scheme for Wireless Body Area Networks

    Get PDF
    BANZKP is the best to date Zero Knowledge Proof (ZKP) based secure lightweight and energy efficient authentication scheme designed for Wireless Area Network (WBAN). It is vulnerable to several security attacks such as the replay attack, Distributed Denial-of-Service (DDoS) attacks at sink and redundancy information crack. However, BANZKP needs an end-to-end authentication which is not compliant with the human body postural mobility. We propose a new scheme BAN-GZKP. Our scheme improves both the security and postural mobility resilience of BANZKP. Moreover, BAN-GZKP uses only a three-phase authentication which is optimal in the class of ZKP protocols. To fix the security vulnerabilities of BANZKP, BAN-GZKP uses a novel random key allocation and a Hop-by-Hop authentication definition. We further prove the reliability of our scheme to various attacks including those to which BANZKP is vulnerable. Furthermore, via extensive simulations we prove that our scheme, BAN-GZKP, outperforms BANZKP in terms of reliability to human body postural mobility for various network parameters (end-to-end delay, number of packets exchanged in the network, number of transmissions). We compared both schemes using representative convergecast strategies with various transmission rates and human postural mobility. Finally, it is important to mention that BAN-GZKP has no additional cost compared to BANZKP in terms memory, computational complexity or energy consumption

    Tax and Spending Policy and Economic Mobility

    Get PDF
    Surveys the literature on how economic mobility is affected by federal tax policies such as the Earned Income Tax Credit and deductions for home ownership; government spending on education and health care; and income supports such as Social Security

    Fast Authentication in Heterogeneous Wireless Networks

    Get PDF
    The growing diffusion of wireless devices is leading to an increasing demand for mobility and security. At the same time, most applications can only tolerate short breaks in the data flow, so that it is a challenge to find out mobility and authentication methods able to cope with these constraints. This paper aims to propose an authentication scheme which significantly shortens the authentication latency and that can be deployed in a variety of wireless environments ranging from common Wireless LANs (WLANs) to satellite-based access networks
    • …
    corecore