197,432 research outputs found

    Secure Position-Based Routing for VANETs

    Get PDF
    Vehicular communication (VC) systems have the potential to improve road safety and driving comfort. Nevertheless, securing the operation is a prerequisite for deployment. So far, the security of VC applications has mostly drawn the attention of research efforts, while comprehensive solutions to protect the network operation have not been developed. In this paper, we address this problem: we provide a scheme that secures geographic position-based routing, which has been widely accepted as the appropriate one for VC. Moreover, we focus on the scheme currently chosen and evaluated in the Car2Car Communication Consortium (C2C-CC). We integrate security mechanisms to protect the position-based routing functionality and services (beaconing, multi-hop forwarding, and geo-location discovery), and enhance the network robustness. We propose defense mechanisms, relying both on cryptographic primitives, and plausibility checks mitigating false position injection. Our implementation and initial measurements show that the security overhead is low and the proposed scheme deployable

    Parenting, temperament, and attachment security as antecedents of political orientation: Longitudinal evidence from early childhood to age 26.

    Get PDF
    This article examines early childhood antecedents of adults' political orientation. Using longitudinal data from the National Institute of Child Health and Human Development Study of Early Child Care and Youth Development, we investigate associations between parenting beliefs and behaviors, child temperament, and attachment security during early childhood in relation to adult political ideology and party affiliation at age 26 years (N = 1,364). Young children's fearful temperament and anxious attachment security, as well as mothers' authoritarian parenting beliefs in early childhood, predicted conservative political orientations at age 26. Children's abilities to focus attention and avoidant attachment security predicted liberal orientations. These findings provide evidence that multiple aspects of early developmental experience-temperament, parenting, and infant-mother attachment-are associated with later political orientations. (PsycInfo Database Record (c) 2020 APA, all rights reserved)

    Interoperability review

    Get PDF

    Giving Out Globally: A Resource Guide of Funding Mechanisms to Support Lesbian, Gay, Bisexual, and Transgender Rights in the Global South and East

    Get PDF
    Provides an overview of funding vehicles, such as Northern groups working in the global South and East, intermediaries, direct cross-border grantmaking, private foundations, and donor-advised funds. Includes lists of resources and grantee profiles

    A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks

    Full text link
    This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANETs). There are so many issues and solutions which witness the need of energy management and security in ad hoc wireless networks. The objective of a multicast routing protocol for MANETs is to support the propagation of data from a sender to all the receivers of a multicast group while trying to use the available bandwidth efficiently in the presence of frequent topology changes. Multicasting can improve the efficiency of the wireless link when sending multiple copies of messages by exploiting the inherent broadcast property of wireless transmission. Secure multicast routing plays a significant role in MANETs. However, offering energy efficient and secure multicast routing is a difficult and challenging task. In recent years, various multicast routing protocols have been proposed for MANETs. These protocols have distinguishing features and use different mechanismsComment: 15 page

    Predicting violence within genocides: meso-level evidence from Rwanda

    Get PDF
    Can we predict when and where violence will break out within cases of genocide? Given often weak political will to respond, knowing where to strategically prioritize limited resources is valuable information for international decision makers contemplating intervention. I develop a theoretical model to help identify areas vulnerable to violence during genocide. I argue vulnerability is a function of the state’s coercive power and the ruling elite’s control of this power from above, mediated by the strength of society’s cohesion below. Violence will be delayed in areas where political and military resistance to the center is high as it takes time for extremists to exert control at the periphery. Violence will also be delayed in well-integrated communities as it takes time to break existing social bonds and destroy social capital. I draw on the case of Rwanda’s 1994 genocide and examine sub-national variation in the onset of violence across the country’s 145 administrative communes using survival analysis and within-case analyses comparing early and late onset in two communes. The findings have implications for international policy makers responding to ongoing genocides

    Security in Wireless Sensor Networks: Issues and Challenges

    Get PDF
    Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.Comment: 6 page

    Water and Development Strategy: Implementation Field Guide

    Get PDF
    This document is intended to serve as a reference tool to help USAID Operating Units understand and apply the agency's 2013-2018 Water and Development Strategy. By publicly sharing the document, USAID aims to ensure coordination of their efforts with the wider water sector. The Field Guide will be periodically updated and comments from readers are welcome

    What do they know about me? Contents and Concerns of Online Behavioral Profiles

    Full text link
    Data aggregators collect large amount of information about individual users and create detailed online behavioral profiles of individuals. Behavioral profiles benefit users by improving products and services. However, they have also raised concerns regarding user privacy, transparency of collection practices and accuracy of data in the profiles. To improve transparency, some companies are allowing users to access their behavioral profiles. In this work, we investigated behavioral profiles of users by utilizing these access mechanisms. Using in-person interviews (n=8), we analyzed the data shown in the profiles, elicited user concerns, and estimated accuracy of profiles. We confirmed our interview findings via an online survey (n=100). To assess the claim of improving transparency, we compared data shown in profiles with the data that companies have about users. More than 70% of the participants expressed concerns about collection of sensitive data such as credit and health information, level of detail and how their data may be used. We found a large gap between the data shown in profiles and the data possessed by companies. A large number of profiles were inaccurate with as much as 80% inaccuracy. We discuss implications for public policy management.Comment: in Ashwini Rao, Florian Schaub, and Norman Sadeh What do they know about me? Contents and Concerns of Online Behavioral Profiles (2014) ASE BigData/SocialInformatics/PASSAT/BioMedCom Conferenc
    corecore