32 research outputs found

    Securing Multi-Layer Communications: A Signal Processing Approach

    Get PDF
    Security is becoming a major concern in this information era. The development in wireless communications, networking technology, personal computing devices, and software engineering has led to numerous emerging applications whose security requirements are beyond the framework of conventional cryptography. The primary motivation of this dissertation research is to develop new approaches to the security problems in secure communication systems, without unduly increasing the complexity and cost of the entire system. Signal processing techniques have been widely applied in communication systems. In this dissertation, we investigate the potential, the mechanism, and the performance of incorporating signal processing techniques into various layers along the chain of secure information processing. For example, for application-layer data confidentiality, we have proposed atomic encryption operations for multimedia data that can preserve standard compliance and are friendly to communications and delegate processing. For multimedia authentication, we have discovered the potential key disclosure problem for popular image hashing schemes, and proposed mitigation solutions. In physical-layer wireless communications, we have discovered the threat of signal garbling attack from compromised relay nodes in the emerging cooperative communication paradigm, and proposed a countermeasure to trace and pinpoint the adversarial relay. For the design and deployment of secure sensor communications, we have proposed two sensor location adjustment algorithms for mobility-assisted sensor deployment that can jointly optimize sensing coverage and secure communication connectivity. Furthermore, for general scenarios of group key management, we have proposed a time-efficient key management scheme that can improve the scalability of contributory key management from O(log n) to O(log(log n)) using scheduling and optimization techniques. This dissertation demonstrates that signal processing techniques, along with optimization, scheduling, and beneficial techniques from other related fields of study, can be successfully integrated into security solutions in practical communication systems. The fusion of different technical disciplines can take place at every layer of a secure communication system to strengthen communication security and improve performance-security tradeoff

    Resilient and Scalable Forwarding for Software-Defined Networks with P4-Programmable Switches

    Get PDF
    Traditional networking devices support only fixed features and limited configurability. Network softwarization leverages programmable software and hardware platforms to remove those limitations. In this context the concept of programmable data planes allows directly to program the packet processing pipeline of networking devices and create custom control plane algorithms. This flexibility enables the design of novel networking mechanisms where the status quo struggles to meet high demands of next-generation networks like 5G, Internet of Things, cloud computing, and industry 4.0. P4 is the most popular technology to implement programmable data planes. However, programmable data planes, and in particular, the P4 technology, emerged only recently. Thus, P4 support for some well-established networking concepts is still lacking and several issues remain unsolved due to the different characteristics of programmable data planes in comparison to traditional networking. The research of this thesis focuses on two open issues of programmable data planes. First, it develops resilient and efficient forwarding mechanisms for the P4 data plane as there are no satisfying state of the art best practices yet. Second, it enables BIER in high-performance P4 data planes. BIER is a novel, scalable, and efficient transport mechanism for IP multicast traffic which has only very limited support of high-performance forwarding platforms yet. The main results of this thesis are published as 8 peer-reviewed and one post-publication peer-reviewed publication. The results cover the development of suitable resilience mechanisms for P4 data planes, the development and implementation of resilient BIER forwarding in P4, and the extensive evaluations of all developed and implemented mechanisms. Furthermore, the results contain a comprehensive P4 literature study. Two more peer-reviewed papers contain additional content that is not directly related to the main results. They implement congestion avoidance mechanisms in P4 and develop a scheduling concept to find cost-optimized load schedules based on day-ahead forecasts

    Hollywood and the myth of meritocracy

    Get PDF
    This thesis examines the unequal employment opportunity that women and people of color face in the American film and television industry and the rhetoric of meritocracy that justifies the marginalization of racial and gender minorities in Hollywood workplace. I argue that the sanitized language of meritocracy obscures racist and sexist practice with box office numbers and assessments of competency by White and male decision makers. Using historical records of Hollywood, I begin deconstructing the racist and sexist roots of the industry. Supplemented by quantitative research cross-referencing box office performance and worker diversity, this thesis debunks the myth of meritocracy which the industry still perpetuates today. In addition, the thesis explores brand image and award shows as forces of change to Hollywood’s inclusivity in a neoliberal ecopolitical landscape

    Working the News: Preserving Professional Identity Through Networked Journalism at Elite News Media

    Get PDF
    The concept of journalism as a profession has arguably been fraught and contested throughout its existence. Ideologically, it is founded on a claim to norms and a code of ethics, but in the past, news media also held material control over mass communication through broadcast and print which were largely inaccessible to most citizens. The Internet and social media has created a news environment where professional journalists and their work exist side-by-side with non-journalists. In this space, acts of journalism also can be and are carried out by non-journalists. Through the new news distribution channels offered by social media, non-journalists are potentially able to disseminate their texts to wide audiences. In practice this means that journalism is no longer exclusively the domain of the journalist, and has led to the adoption of collaboration as a journalistic convention that presents opportunities but also serious challenges and risks for the professional community. My research aims to contribute to the news discourse concerning emerging professional practices in networked journalism with a focus on how journalistic authority is reasserted within a collaborative news environment. Rather than looking at networked journalism as primarily participatory, this research explores collaborative newswork as a means to carry out professional boundary work and to articulate this to audiences. I argue that the act of collaboration in newswork at times becomes a quasi-ideological project to protect journalism as a profession that lays claim to ethics, norms and routines. The research comprises three case studies of news stories covered by the BBC World Service and the English-language services of France 24 and Al Jazeera. Using quantitative and qualitative analysis methods, they explore how social media was mobilised in the newswork. The aim was to explore how sourcing practices affected the power relationships between primary and secondary definers, and how journalists create and articulate professional boundaries in collaborative newswork. These research findings were triangulated with interviews with social media editors at the three news organisations

    Evaluation of on-demand routing in mobile ad hoc networks and proposal for a secure routing protocol

    Get PDF
    Secure routing Mobile Ad hoc Networks (MANETs) has emerged as an important MANET research area. Initial work in MANET focused mainly on the problem of providing efficient mechanisms for finding paths in very dynamic networks, without considering the security of the routing process. Because of this, a number of attacks exploit these routing vulnerabilities to manipulate MANETs. In this thesis, we performed an in-depth evaluation and performance analysis of existing MANET Routing protocols, identifying Dynamic Source Routing (DSR) as the most robust (based on throughput, latency and routing overhead) which can be secured with negligible routing efficiency trade-off. We describe security threats, specifically showing their effects on DSR. We proposed a new routing protocol, named Authenticated Source Routing for Ad hoc Networks (ASRAN) which is an out-of-band certification-based, authenticated source routing protocol with modifications to the route acquisition process of DSR to defeat all identified attacks. Simulation studies confirm that ASRAN has a good trade-off balance in reference to the addition of security and routing efficiency

    Use case scenarios and preliminary reference model

    Get PDF
    This document provides the starting point for the development of dependability solutions in the HIDENETS project with the following contents: (1) A conceptual framework is defined that contains the relevant terminology, threats and general requirements. This framework is a HIDENETS relevant subset of existing state-of-the-art views in the scientific dependability community. Furthermore, the dependability framework contains a first list of relevant functionalities in the communication and middleware level, which will act as input for the architectural discussions in HIDENETS work packages (WPs) 2 and 3. (2) A set of 17 applications with HIDENETS relevance is identified and their corresponding dependability requirements are derived. These applications belong mostly to the class of car-tocar and car-to-infrastructure services and have been selected due to their different types of dependability needs. (3) The applications have been grouped in six HIDENETS use cases, each consisting of a set of applications. The use cases will be the basis for the development of the dependability solutions in all other WPs. Together with a description of each use-case, application-specific architectural aspects are identified and corresponding failure modes and challenges are listed. (4) The business impact of dependability solutions for these use cases is analysed. (5) A preliminary definition of a HIDENETS reference model is provided, which contains highlevel architectural assumptions. This HIDENETS reference model will be further developed in the course of the HIDENETS projects in close cooperation with the other WPs, which is the reason why the preliminary version also contains a collection of potential contributions from other WPs that shall be developed and investigated in the course of the HIDENETS project. In summary, the identified use-cases and their requirements clearly show the large number of dependability related challenges. First steps towards technical solutions have been made in this report in the preliminary reference model, whereas the other work-packages have started in the meanwhile to develop such solutions further based on 'middleware technology' (WP2), 'communication protocols' (WP3), 'quantitative analysis methodology' (WP4), and 'design and testing methodology' (WP5

    Beyond Broadcasting? To What Extent are Digital Technologies Enabling Progressive Uses of Media in a Post-Broadcasting Television Landscape?

    Get PDF
    This study is an attempt to explore the changes digital technologies are having on the experience of watching television. When new technologies are introduced, revolutionary claims are often made for the new media they help form. A frequent claim is that new media are more ‘progressive’ than older media forms, and encourage more democratic participation in the production and circulation of media content. This study aims to compare this claim with evidence of how viewing experiences are actually changing in practice. A further aspect of my inquiry is to consider the implications of this for broadcasting as currently constituted

    Providing incentive to peer-to-peer applications

    Get PDF
    Cooperative peer-to-peer applications are designed to share the resources of participating computers for the common good of ail users. However, users do not necessarily have an incentive to donate resources to the system if they can use the system's resources for free. As commonly observed in deployed applications, this situation adversely affects the applications' performance and sometimes even their availability and usability. While traditional resource management is handled by a centralized enforcement entity, adopting similar solution raises new concerns for distributed peer-to-peer systems. This dissertation proposes to solve the incentive problem in peer-to-peer applications by designing fair sharing policies and enforcing these policies in a distributed manner. The feasibility and practicability of this approach is demonstrated through numerous applications, namely archival storage systems, streaming systems, content distribution systems, and anonymous communication systems
    corecore