16,160 research outputs found
Vulnerability Analysis of a Mutual Authentication Protocol Conforming to EPC Class-1 Generation-2 Standard
In this paper we scrutinize the security properties of an RFID authentication protocol conforming to the EPC Class-1 Generation-2 standard. The protocol is suitable for Gen-2 passive tags and requires simple computations. The authors claim that the scheme provides privacy protection and authentication and offers resistant against commonly assumed attacks. We propose a de-synchronization and an impersonation attack in which the disclosing of the secret information (i.e. secret key and static identifier) shared between the tag and the reader is unnecessary to success in these attacks
Vulnerability analysis of three remote voting methods
This article analyses three methods of remote voting in an uncontrolled
environment: postal voting, internet voting and hybrid voting. It breaks down
the voting process into different stages and compares their vulnerabilities
considering criteria that must be respected in any democratic vote:
confidentiality, anonymity, transparency, vote unicity and authenticity.
Whether for safety or reliability, each vulnerability is quantified by three
parameters: size, visibility and difficulty to achieve. The study concludes
that the automatisation of treatments combined with the dematerialisation of
the objects used during an election tends to substitute visible vulnerabilities
of a lesser magnitude by invisible and widespread vulnerabilities.Comment: 15 page
Structural Vulnerability Analysis of Electric Power Distribution Grids
Power grid outages cause huge economical and societal costs. Disruptions in
the power distribution grid are responsible for a significant fraction of
electric power unavailability to customers. The impact of extreme weather
conditions, continuously increasing demand, and the over-ageing of assets in
the grid, deteriorates the safety of electric power delivery in the near
future. It is this dependence on electric power that necessitates further
research in the power distribution grid security assessment. Thus measures to
analyze the robustness characteristics and to identify vulnerabilities as they
exist in the grid are of utmost importance. This research investigates exactly
those concepts- the vulnerability and robustness of power distribution grids
from a topological point of view, and proposes a metric to quantify them with
respect to assets in a distribution grid. Real-world data is used to
demonstrate the applicability of the proposed metric as a tool to assess the
criticality of assets in a distribution grid
Application of Fuzzy Cognitive Mapping in Livelihood Vulnerability Analysis
Feedback mechanisms are important in the analysis of vulnerability and resilience of social-ecological systems, as well as in the analysis of livelihoods, but how to evaluate systems with direct feedbacks has been a great challenge. We applied fuzzy cognitive mapping, a tool that allows analysis of both direct and indirect feedbacks and can be used to explore the vulnerabilities of livelihoods to identified hazards. We studied characteristics and drivers of rural livelihoods in the Great Limpopo Transfrontier Conservation Area in southern Africa to assess the vulnerability of inhabitants to the different hazards they face. The process involved four steps: (1) surveys and interviews to identify the major livelihood types; (2) description of specific livelihood types in a system format using fuzzy cognitive maps (FCMs), a semi-quantitative tool that models systems based on people’s knowledge; (3) linking variables and drivers in FCMs by attaching weights; and (4) defining and applying scenarios to visualize the effects of drought and changing park boundaries on cash and household food security. FCMs successfully gave information concerning the nature (increase or decrease) and magnitude by which a livelihood system changed under different scenarios. However, they did not explain the recovery path in relation to time and pattern (e.g., how long it takes for cattle to return to desired numbers after a drought). Using FCMs revealed that issues of policy, such as changing situations at borders, can strongly aggravate effects of climate change such as drought. FCMs revealed hidden knowledge and gave insights that improved the understanding of the complexity of livelihood systems in a way that is better appreciated by stakeholders
Seismic vulnerability analysis of steel buildings in Bogotá, Colombia
A number of mid-height steel buildings have been erected recently in Bogotá. Their seismic risk might be high, given the new microzonation of Bogotá and the lack of previous studies; remarkably, the response reduction factors were commonly obtained from general recommendations. The objective of this work is to investigate the
seismic performance of these buildings. This study is carried out on eighteen representative buildings. All these
edifices have plan symmetry and are uniform along their height. Span-length: 6 Âż 8 m; number of floors: 5, 10,
15. Earthquake-resistant systems: moment-resistant frames, concentrically-braced frames and eccentricallybraced
frames (using chevron braces). For each building, eight seismic zones have been considered. The vulnerability has been evaluated by “push-over” analyses. In the moment-resistant frames and in the eccentrically-braced frames the nonlinearities are concentrated in the plastic hinges near the connections; in the concentrically-braced frames the nonlinearities are allocated in the braces.Postprint (published version
Recommended from our members
Quantum Vulnerability Analysis to Guide Robust Quantum Computing System Design
While quantum computers provide exciting opportunities for information processing, they currently suffer from noise during computation that is not fully understood. Incomplete noise models have led to discrepancies between quantum program success rate (SR) estimates and actual machine outcomes. For example, the estimated probability of success (ESP) is the state-of-the-art metric used to gauge quantum program performance. The ESP suffers poor prediction since it fails to account for the unique combination of circuit structure, quantum state, and quantum computer properties specific to each program execution. Thus, an urgent need exists for a systematic approach that can elucidate various noise impacts and accurately and robustly predict quantum computer success rates, emphasizing application and device scaling. In this article, we propose quantum vulnerability analysis (QVA) to systematically quantify the error impact on quantum applications and address the gap between current success rate (SR) estimators and real quantum computer results. The QVA determines the cumulative quantum vulnerability (CQV) of the target quantum computation, which quantifies the quantum error impact based on the entire algorithm applied to the target quantum machine. By evaluating the CQV with well-known benchmarks on three 27-qubit quantum computers, the CQV success estimation outperforms the estimated probability of success state-of-the-art prediction technique by achieving on average six times less relative prediction error, with best cases at 30 times, for benchmarks with a real SR rate above 0.1%. Direct application of QVA has been provided that helps researchers choose a promising compiling strategy at compile time
- …