271 research outputs found

    IPv6: a new security challenge

    Get PDF
    Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2011O Protocolo de Internet versão 6 (IPv6) foi desenvolvido com o intuito de resolver alguns dos problemas não endereçados pelo seu antecessor, o Protocolo de Internet versão 4 (IPv4), nomeadamente questões relacionadas com segurança e com o espaço de endereçamento disponível. São muitos os que na última década têm desenvolvido estudos sobre os investimentos necessários à sua adoção e sobre qual o momento certo para que o mesmo seja adotado por todos os players no mercado. Recentemente, o problema da extinção de endereçamentos públicos a ser disponibilizado pelas diversas Region Internet registry – RIRs - despertou o conjunto de entidades envolvidas para que se agilizasse o processo de migração do IPv4 para o IPv6. Ao contrário do IPv4, esta nova versão considera a segurança como um objetivo fundamental na sua implementação, nesse sentido é recomendado o uso do protocolo IPsec ao nível da camada de rede. No entanto, e devido à imaturidade do protocolo e à complexidade que este período de transição comporta, existem inúmeras implicações de segurança que devem ser consideradas neste período de migração. O objetivo principal deste trabalho é definir um conjunto de boas práticas no âmbito da segurança na implementação do IPv6 que possa ser utilizado pelos administradores de redes de dados e pelas equipas de segurança dos diversos players no mercado. Nesta fase de transição, é de todo útil e conveniente contribuir de forma eficiente na interpretação dos pontos fortes deste novo protocolo assim como nas vulnerabilidades a ele associadas.IPv6 was developed to address the exhaustion of IPv4 addresses, but has not yet seen global deployment. Recent trends are now finally changing this picture and IPv6 is expected to take off soon. Contrary to the original, this new version of the Internet Protocol has security as a design goal, for example with its mandatory support for network layer security. However, due to the immaturity of the protocol and the complexity of the transition period, there are several security implications that have to be considered when deploying IPv6. In this project, our goal is to define a set of best practices for IPv6 Security that could be used by IT staff and network administrators within an Internet Service Provider. To this end, an assessment of some of the available security techniques for IPv6 will be made by means of a set of laboratory experiments using real equipment from an Internet Service Provider in Portugal. As the transition for IPv6 seems inevitable this work can help ISPs in understanding the threats that exist in IPv6 networks and some of the prophylactic measures available, by offering recommendations to protect internal as well as customers’ networks

    Time-domain optimization of amplifiers based on distributed genetic algorithms

    Get PDF
    Thesis presented in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the subject of Electrical and Computer EngineeringThe work presented in this thesis addresses the task of circuit optimization, helping the designer facing the high performance and high efficiency circuits demands of the market and technology evolution. A novel framework is introduced, based on time-domain analysis, genetic algorithm optimization, and distributed processing. The time-domain optimization methodology is based on the step response of the amplifier. The main advantage of this new time-domain methodology is that, when a given settling-error is reached within the desired settling-time, it is automatically guaranteed that the amplifier has enough open-loop gain, AOL, output-swing (OS), slew-rate (SR), closed loop bandwidth and closed loop stability. Thus, this simplification of the circuit‟s evaluation helps the optimization process to converge faster. The method used to calculate the step response expression of the circuit is based on the inverse Laplace transform applied to the transfer function, symbolically, multiplied by 1/s (which represents the unity input step). Furthermore, may be applied to transfer functions of circuits with unlimited number of zeros/poles, without approximation in order to keep accuracy. Thus, complex circuit, with several design/optimization degrees of freedom can also be considered. The expression of the step response, from the proposed methodology, is based on the DC bias operating point of the devices of the circuit. For this, complex and accurate device models (e.g. BSIM3v3) are integrated. During the optimization process, the time-domain evaluation of the amplifier is used by the genetic algorithm, in the classification of the genetic individuals. The time-domain evaluator is integrated into the developed optimization platform, as independent library, coded using C programming language. The genetic algorithms have demonstrated to be a good approach for optimization since they are flexible and independent from the optimization-objective. Different levels of abstraction can be optimized either system level or circuit level. Optimization of any new block is basically carried-out by simply providing additional configuration files, e.g. chromosome format, in text format; and the circuit library where the fitness value of each individual of the genetic algorithm is computed. Distributed processing is also employed to address the increasing processing time demanded by the complex circuit analysis, and the accurate models of the circuit devices. The communication by remote processing nodes is based on Message Passing interface (MPI). It is demonstrated that the distributed processing reduced the optimization run-time by more than one order of magnitude. Platform assessment is carried by several examples of two-stage amplifiers, which have been optimized and successfully used, embedded, in larger systems, such as data converters. A dedicated example of an inverter-based self-biased two-stage amplifier has been designed, laid-out and fabricated as a stand-alone circuit and experimentally evaluated. The measured results are a direct demonstration of the effectiveness of the proposed time-domain optimization methodology.Portuguese Foundation for the Science and Technology (FCT

    Performance assessment of mobility solutions for IPv6-based healthcare wireless sensor networks

    Get PDF
    This thesis focuses on the study of mobile wireless sensor networks applied to healthcare scenarios. The promotion of better quality-of-life for hospitalized patients is addressed in this research work with a solution that can help these patients to keep their mobility (if possible). The solution proposed allows remote monitoring and control of patients’ health in real-time and without interruptions. Small sensor nodes able to collect and send wirelessly the health parameters allow for the control of the patients' health condition. A network infrastructure, composed by several access points, allows the connection of the sensor nodes (carried by the patients) to remote healthcare providers. To ensure continuous access to sensor nodes special attention should be dedicated to manage the transition of these sensor nodes between different access points’ coverage areas. The process of changing an access point attachment of a sensor node is called handover. In that context, this thesis proposes a new handover mechanism that can ensure continuous connection to mobile sensor nodes in a healthcare wireless sensor network. Due to the limitations of sensor nodes’ resources, namely available energy (these sensor nodes are typically powered by small batteries), the proposed mechanism pays a special attention in the optimization of energy consumption. To achieve this optimization, part of this work is dedicated to the construction of a small sensor node. The handover mechanism proposed in this work is called Hand4MAC (handover mechanism for MAC layer). This mechanism is compared with other mechanisms commonly used in handover management. The Hand4MAC mechanism is deployed and validated through by simulation and in a real testbed. The scenarios used for the validation reproduces a hospital ward. The performance evaluation is focused in the percentage of time that senor nodes are accessible to the network while traveling across several access points’ coverage areas and the energy expenditures in handover processes. The experiments performed take into account various parameters that are the following: number of sent messages, number of received messages, multicast message usage, energy consumption, number of sensor nodes present in the scenario, velocity of sensor nodes, and time-to-live value. In both simulation and real testbed, the Hand4MAC mechanism is shown to perform better than all the other handover mechanisms tested. In this comparison it was only considered the most promising handover mechanisms proposed in the literature.Fundação para a Ciência e a Tecnologia (FCT

    Exploring the influential factors of continuance intention to use mobile apps : extending the expectation confirmation model

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business IntelligenceThe use of mobile applications (Apps) has been growing in the world of technology, a phenomenon related to the increasing number of smartphone users. With a huge mobile Apps market, few studies have been made on what makes individuals continue to use a mobile App or stop using it. This study aims to uncover the factors that underlie the continuance intention to use mobile Apps, addressing two theoretical models: Expectation confirmation model (ECM) and the extended unified theory of acceptance and use of technology (UTAUT2). A total of 304 valid questionnaires were collected by survey to test the theoretical framework proposal, using structural equation modelling (SEM). Our findings indicate that the most important drivers of continuance intention of mobile Apps are respectively; satisfaction, habit, performance expectancy, and effort expectancy

    Explaining the Ergonomic Assessment of Human Movement in Industrial Contexts

    Get PDF
    Manufacturing processes are based on human labour and the symbiosis between human operators and machines. The operators are required to follow predefined sequences of movements. The operations carried out at assembly lines are repetitive, being identified as a risk factor for the onset of musculoskeletal disorders. Ergonomics plays a big role in preventing occupational diseases. Ergonomic risk scores measure the overall risk exposure of operators however these methods still present challenges: the scores are often associated to a given workstation, being agnostic to the variability among operators. Observation methods are most often employed yet require a significant amount of effort, preventing an accurate and continuous ergonomic evaluation to the entire population of operators. Finally, the risk’s results are rendered as index scores, hindering a more comprehensive interpretation by occupational physicians. This dissertation developed a solution for automatic operator risk exposure in assembly lines. Three main contributions were presented: (1) an upper limb and torso motion tracking algorithm which relies on inertial sensors to estimate the orientation of anatomical joints; (2) an adjusted ergonomic risk score; (3) an ergonomic risk explanation approach based on the analysis of the angular risk factors. Throughout the research, two experimental assessments were conducted: laboratory validation and field evaluation. The laboratory tests enabled the creation of a movements’ dataset and used an optical motion capture system as reference. The field evaluation dataset was acquired on an automotive assembly line and serve as the basis for an ergonomic risk evaluation study. The experimental results revealed that the proposed solution has the potential to be applied in a real environment. Through direct measures, the ergonomic feedback is fastened, and consequently, the evaluation can be extended to more operators, ultimately preventing, in long-term, work-related injuries

    Introduction to the special issue “Robotica 2016”

    Get PDF
    Autonomous robotics has seen its popularity and application in distinct fields, namely in services and industry, increase significantly in the last two decades. Several areas related with robotics have been addressed by the academic community and thus journals and conferences emerged to broadly disseminate the developed knowledge. The IEEE International Conference on Autonomous Robot Systems and Competitions (ICARSC) gathers participants from academia and industry, working in the field of autonomous robot systems and related areas. It is organized since 2001 in parallel to the Portuguese Robotics Open, and aims at exploring and discussing the latest trends in research and technology in the fields of robotics and related areas. The authors of the best papers presented at ICARSC 2016 were invited to submit extended and improved versions of their manuscripts to this “Robotica 2016” special issue.info:eu-repo/semantics/publishedVersio

    Nota acerca de uma conta-amuleto encontrada no "Tholos" da Tituaria (Mafra)

    Get PDF
    Estuda-se uma conta-amuleto de mineral verde, encontrada na escavação de uma sepultura do tipo " (tholos", situada perto de Tituaria (Mafra) e escavada em 1977. Discute-se o conceito de pingentes e amuletos. Estabelecem-se comparações com os ídolos do tipo El Garcel de Almeria - Los Millares e com os ídolos de Tróia. Admite-se que a ocorrência, agora registada, possa ser expressão das influências, embora indirectas, havidas no decurso do terceiro milénio a.c. entre o Mediterrâneo oriental e a Península Ibérica. Trata-se, com efeito, de peça de adorno e de prestigio. A bead-amulet found at a "tholos" excavated in 1977 near Tituaria (Mafra) is studied. The concept of pendant and amulet is discussed. A comparison is made between this arlifact and idols of El Garcel type (from Almeria - Los Millares region) and idols found in Tróia. Fina1ly a possibility is raised of this artifact to be one of the expressions of contacts, although indirectly, between oriental mediterranean sea and lhe Iberian Peninsula, along 3. rd millenium B. c., thal would be al lhe origin of lhe copper metallurgy .A bead-amulet found at a "lholos" exeavated in 1977 near Tituaria (Mafra) is studied. The concept of pendam and amulet is discussed. A comparison is made between this arlifaet and idols of EI Careel type (from Almeria - Los Mil/ares region) and idols found in Tróia. Fina1ly a possibility is raised of this artlfact to be one of the expressions of contacts, although indirectly, belween oriental mediteTYanean sea and lhe Iberian Peninsula, along 3. rd miller/ium B. c., lhal would be al lhe origin of lhe copper metallurgy
    corecore