25,654 research outputs found

    A Survey on Wireless Sensor Network Security

    Full text link
    Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research community due their wide range of applications. Due to distributed nature of these networks and their deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their proper functioning. This problem is more critical if the network is deployed for some mission-critical applications such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Security in sensor networks is, therefore, a particularly challenging task. This paper discusses the current state of the art in security mechanisms for WSNs. Various types of attacks are discussed and their countermeasures presented. A brief discussion on the future direction of research in WSN security is also included.Comment: 24 pages, 4 figures, 2 table

    On the Duality of Probing and Fault Attacks

    Get PDF
    In this work we investigate the problem of simultaneous privacy and integrity protection in cryptographic circuits. We consider a white-box scenario with a powerful, yet limited attacker. A concise metric for the level of probing and fault security is introduced, which is directly related to the capabilities of a realistic attacker. In order to investigate the interrelation of probing and fault security we introduce a common mathematical framework based on the formalism of information and coding theory. The framework unifies the known linear masking schemes. We proof a central theorem about the properties of linear codes which leads to optimal secret sharing schemes. These schemes provide the lower bound for the number of masks needed to counteract an attacker with a given strength. The new formalism reveals an intriguing duality principle between the problems of probing and fault security, and provides a unified view on privacy and integrity protection using error detecting codes. Finally, we introduce a new class of linear tamper-resistant codes. These are eligible to preserve security against an attacker mounting simultaneous probing and fault attacks

    The State of America’s Tax Institutions

    Get PDF
    SLU Billikens vs UCLA for the NCAA Final in Miami, Florida. SLU's Bruce Hudson and John Roeslein attempt a shot on goal. SLU won this game 2-1 in overtime. (4 January 1974) [Photographer unknown, scan of original photo from SLU Sports Information Office

    On the Security of the Automatic Dependent Surveillance-Broadcast Protocol

    Full text link
    Automatic dependent surveillance-broadcast (ADS-B) is the communications protocol currently being rolled out as part of next generation air transportation systems. As the heart of modern air traffic control, it will play an essential role in the protection of two billion passengers per year, besides being crucial to many other interest groups in aviation. The inherent lack of security measures in the ADS-B protocol has long been a topic in both the aviation circles and in the academic community. Due to recently published proof-of-concept attacks, the topic is becoming ever more pressing, especially with the deadline for mandatory implementation in most airspaces fast approaching. This survey first summarizes the attacks and problems that have been reported in relation to ADS-B security. Thereafter, it surveys both the theoretical and practical efforts which have been previously conducted concerning these issues, including possible countermeasures. In addition, the survey seeks to go beyond the current state of the art and gives a detailed assessment of security measures which have been developed more generally for related wireless networks such as sensor networks and vehicular ad hoc networks, including a taxonomy of all considered approaches.Comment: Survey, 22 Pages, 21 Figure

    The State of America’s Tax Institutions

    Get PDF

    Reinvigorating Horizontal Merger Enforcement

    Get PDF
    The past forty years have witnessed a remarkable transformation in horizontal merger enforcement in the United States. With no change in the underlying statute, the Clayton Act, the weight given to market concentration by the federal courts and by the federal antitrust agencies has declined dramatically. Instead, increasing weight has been given to three arguments often made by merging firms in their defense: entry, expansion and efficiencies. We document this shift and provide examples where courts have approved highly concentrating mergers based on limited evidence of entry and expansion. We show using merger enforcement data and a survey we conducted of merger practitioners that the decline in antitrust enforcement is ongoing, especially at the current Justice Department. We then argue in favor of reinvigorating horizontal merger enforcement by partially restoring the structural presumption and by requiring strong evidence to overcome the government's prima facie case. We propose several routes by which the government can establish its prima facie case, distinguishing between cases involving coordinated vs. unilateral anti-competitive effects.
    • …
    corecore