327 resultados para Network Security System
Resumo:
The operation of Autonomous Underwater Vehicles (AUVs) within underwater sensor network fields provides an opportunity to reuse the network infrastructure for long baseline localisation of the AUV. Computationally efficient localisation can be accomplished using off-the-shelf hardware that is comparatively inexpensive and which could already be deployed in the environment for monitoring purposes. This paper describes the development of a particle filter based localisation system which is implemented onboard an AUV in real-time using ranging information obtained from an ad-hoc underwater sensor network. An experimental demonstration of this approach was conducted in a lake with results presented illustrating network communication and localisation performance.
Resumo:
Safety concerns in the operation of autonomous aerial systems require safe-landing protocols be followed during situations where the mission should be aborted due to mechanical or other failure. This article presents a pulse-coupled neural network (PCNN) to assist in the vegetation classification in a vision-based landing site detection system for an unmanned aircraft. We propose a heterogeneous computing architecture and an OpenCL implementation of a PCNN feature generator. Its performance is compared across OpenCL kernels designed for CPU, GPU, and FPGA platforms. This comparison examines the compute times required for network convergence under a variety of images to determine the plausibility for real-time feature detection.
Resumo:
Integration of rooftop PVs and increasing peak demand in the residential distribution networks has resulted in unacceptable voltage profile. Curtailing PV generation to alleviate overvoltage problem and making regular network investment to cater peak demand is not always feasible. Reactive capability of the PV inverter can be a solution to address voltage dip and over voltage problems to some extent. This paper proposes an algorithm to utilize reactive capability of PV inverters and investigate their effectiveness on feeder length and R/X ratio of the line. Feeder loading level for a particular R/X ratio to have acceptable voltage profile is also investigated. Furthermore, the need of appropriate feeder distances and R/X ratio for acceptable voltage profile, which can be useful for suburban design and distribution planning, is explored.
Resumo:
Network coding is a method for achieving channel capacity in networks. The key idea is to allow network routers to linearly mix packets as they traverse the network so that recipients receive linear combinations of packets. Network coded systems are vulnerable to pollution attacks where a single malicious node floods the network with bad packets and prevents the receiver from decoding correctly. Cryptographic defenses to these problems are based on homomorphic signatures and MACs. These proposals, however, cannot handle mixing of packets from multiple sources, which is needed to achieve the full benefits of network coding. In this paper we address integrity of multi-source mixing. We propose a security model for this setting and provide a generic construction.
Resumo:
Organizational learning has been studied as a key factor in firm performance and internationalization. Moving beyond the past emphasis on market learning, we develop a more complete explanation of learning, its relationship to innovation, and their joint effect on early internationalization. We theorize that, driven by the founders’ international vision, early internationalizing firms employ a dual subsystem of dynamic capabilities: a market subsystem consisting of market-focused learning capability and marketing capability, and a socio-technical subsystem comprised of network learning capability and internally focused learning capability. We argue that innovation mediates the proposed relationship between the dynamic capability structure and early internationalization. We conduct case studies to develop the conceptual framework and test it in a field survey of early internationalizing firms from Australia and the United States. Our findings indicate a complex interplay of capabilities driving innovation and early internationalization. We provide theoretical and practical implications and offer insights for future research.
Resumo:
The increasing growth in the use of Hardware Security Modules (HSMs) towards identification and authentication of a security endpoint have raised numerous privacy and security concerns. HSMs have the ability to tie a system or an object, along with its users to the physical world. However, this enables tracking of the user and/or an object associated with the HSM. Current systems do not adequately address the privacy needs and as such are susceptible to various attacks. In this work, we analyse various security and privacy concerns that arise when deploying such hardware security modules and propose a system that allow users to create pseudonyms from a trusted master public-secret key pair. The proposed system is based on the intractability of factoring and finding square roots of a quadratic residue modulo a composite number, where the composite number is a product of two large primes. Along with the standard notion of protecting privacy of an user, the proposed system offers colligation between seemingly independent pseudonyms. This new property when combined with HSMs that store the master secret key is extremely beneficial to a user, as it offers a convenient way to generate a large number of pseudonyms using relatively small storage requirements.
Resumo:
This special issue of Networking Science focuses on Next Generation Network (NGN) that enables the deployment of access independent services over converged fixed and mobile networks. NGN is a packet-based network and uses the Internet protocol (IP) to transport the various types of traffic (voice, video, data and signalling). NGN facilitates easy adoption of distributed computing applications by providing high speed connectivity in a converged networked environment. It also makes end user devices and applications highly intelligent and efficient by empowering them with programmability and remote configuration options. However, there are a number of important challenges in provisioning next generation network technologies in a converged communication environment. Some preliminary challenges include those that relate to QoS, switching and routing, management and control, and security which must be addressed on an urgent or emergency basis. The consideration of architectural issues in the design and pro- vision of secure services for NGN deserves special attention and hence is the main theme of this special issue.
Resumo:
Recently a new human authentication scheme called PAS (predicate-based authentication service) was proposed, which does not require the assistance of any supplementary device. The main security claim of PAS is to resist passive adversaries who can observe the whole authentication session between the human user and the remote server. In this paper we show that PAS is insecure against both brute force attack and a probabilistic attack. In particular, we show that its security against brute force attack was strongly overestimated. Furthermore, we introduce a probabilistic attack, which can break part of the password even with a very small number of observed authentication sessions. Although the proposed attack cannot completely break the password, it can downgrade the PAS system to a much weaker system similar to common OTP (one-time password) systems.
Resumo:
This paper provides a detailed description of the current Australian e-passport implementation and makes a formal verification using model checking tools CASPER/CSP/FDR. We highlight security issues present in the current e-passport implementation and identify new threats when an e-passport system is integrated with an automated processing systems like SmartGate. Because the current e-passport specification does not provide adequate security goals, to perform a rational security analysis we identify and describe a set of security goals for evaluation of e-passport protocols. Our analysis confirms existing security issues that were previously informally identified and presents weaknesses that exists in the current e-passport implementation.
Resumo:
The Mekong is the most productive river fishery in the world, and such as, the Mekong River Basin (MRB) is very important to very large human populations across the region as a source of revenue (through fishing and marketing of aquatic resources products) and as the major source for local animal protein. Threats to biodiversity in the MRB, either to the fishery sector itself or to other sectors are a major concern, even though currently, fisheries across this region are still very productive. If not managed properly however, fish population declines will cause significant economic impact and affect livelihoods of local people and will have a major impact on food security and nutrition. Biodiversity declines will undoubtedly affect food security, income and socio-economic status of people in the MRB that depend on aquatic resources. This is an indicator of unsustainable development and hence should be avoided. Genetic diversity (biodiversity) that can be measured using techniques based on DNA markers; refers to variation within and among populations within the same species or reproductive units. In a population, new genetic variation is generated by sexual recombination contributed by individuals with mutations in genes and chromosomes. Over time, populations of a species that are not reproducing together will diverge as differential impacts of selection and genetic drift change their genetic attributes. For mud carp (Henicorhynchus spp.), understanding the status of breeding units in the MRB will be important for their long term persistence, sustainability and for implementing effective management strategies. Earlier analysis of stock structure in two economically important mud carp species (Henicorhynchus siamensis and H. lobatus) in the MRB completed with mtDNA markers identified a number of populations of both species where gene flow had apparently been interrupted or reduced but applying these data directly to management unit identification is potentially compromised because information was only available about female dispersal patterns. The current study aimed to address this problem and to fully assess the extent of current gene flow (nDNA) and reproductive exchange among selected wild populations of two species of carp (Henicorhynchus spp.) of high economic importance in the MRB using combined mtDNA and nDNA markers. In combination, the data can be used to define effective management units for each species. In general, nDNA diversity for H. lobatus (with average allelic richness (A) 7.56 and average heterozygosity (Ho) 0.61) was very similar to that identified for H. siamensis (A = 6.81 and Ho = 0.75). Both mud carp species show significant but low FST estimates among populations as a result of lower genetic diversity among sampled populations compared with genetic diversity within populations that may potentially mask any 'real' population structure. Overall, population genetic structure patterns from mtDNA and nDNA in both Henicorhynchus species were largely congruent. Different population structures however, were identified for the two Henicorhynchus species across the same geographical area. Apparent co-similarity in morphology and co-distribution of these two relatively closely related species does not apparently imply parallel evolutionary histories. Differences in each species population structure likely reflect historical drainage rearrangement of the Mekong River. The data indicate that H. siamensis is likely to have occupied the Mekong system for much longer than has H. lobatus in the past. Two divergent stocks were identified for H. lobatus in the MRB below the Khone Falls while a single stock had been evident in the earlier mtDNA study. This suggests that the two Henicorhynchus species may possess different life history traits and that different patterns of gene flow has likely influenced modern genetic structure in these close congeners. In combination, results of the earlier mtDNA and the current study have implications for effective management of both Henicorhynchus species across the MRB. Currently, both species are essentially treated as a single management unit in this region. This strategy may be appropriate for H. lobatus as a single stock was evident in the main stream of the MRB, but may not be appropriate for H. siamensis as more than a single stock was identified across the same range for this species. Management strategies should consider this difference to conserve overall biodiversity (local discrete populations) and this will include maintaining natural habitat and migration pathways, provision of fish sanctuaries (refuges) and may also require close monitoring of any stock declines, a signal that may require effective recovery strategies.
Resumo:
INTRODUCTION Globally, one-third of food production is lost annually due to negligent authorities. India alone loses some 21 million tonnes of wheat per year even while it has 200 million food-insecure people in the nation. Disturbingly provocative as it may sound, it is amazing how national and international institutions and governments make use of human hunger for their own survival (Raghib 2013). The global food system is increasingly insecure. Challenges to long-term global food security are encapsulated by resource scarcity, environmental degradation, biodiversity loss, climate change, reductions of farm labour and a growing world population. These issues are caused and aggravated by the spread of corporatised and monopolised food systems, dietary change, and urbanisation. These factors have rapidly brought food insecurity under the umbrella of unconventional security threats (Heukelom 2011). For some, humanitarian crises associated with food insecurity, or what has been dubbed ‘the silent tsunami’, is a pending peril, notably for the world’s poorest and most vulnerable people. For others, the food production industry is an emerging market with unprecedented profits. Despite this problem of food scarcity we are witnessing extraordinary ‘food wastage’, notably in North America and Europe, on a scale that would reportedly be capable of feeding the world’s hungry six times over (Stuart 2012). As the opening quotation to this chapter suggests, governments and corporations are deeply involved in the contexts, politics, and resources associated with food related issues. As many economically developed and advanced industrial nations are reporting a rise out of recession, announcements are made by the world’s richest countries that they are to cut $US2 billion per year from food aid. The head of the World Food Aid Programme, Rosette Sheeran, warns that such cuts could result in ‘the loss of a generation’ (Walters 2011). The global food crisis has also reinvigorated debates about agricultural development and genetically modified (GM) food; as well as fuelling debates about poverty, debt and security. This chapter provides a discussion of the political economy of global food debates and explores the threats and opportunities surrounding food production and future food security.
Resumo:
A robust and reliable grid power interface system for wind turbines using a permanent-magnet synchronous generator (PMSG) is proposed in this paper, where an integration of a generator-side three-switch buck-type rectifier and a grid-side Z-source inverter is employed as a bridge between the generator and the grid. The modulation strategy for the proposed topology is developed from space-vector modulation and Z-source network operation principles. Two PMSG control methods, namely, unity-power-factor control and rotor-flux-orientation control (Id = 0), are studied to establish an optimized control scheme for the generator-side three-switch buck-type rectifier. The system control scheme decouples active- and reactive-power control through voltage-oriented control and optimizes PMSG control for the grid- and generator-side converters independently. Maximum power point tracking is implemented by adjusting the shoot-through duty cycles of the Z-source network. The design considerations of the passive components are also provided. The performances and practicalities of the designed architecture have been verified by simulations and experiments.
Resumo:
The use of Wireless Sensor Networks (WSNs) for vibration-based Structural Health Monitoring (SHM) has become a promising approach due to many advantages such as low cost, fast and flexible deployment. However, inherent technical issues such as data asynchronicity and data loss have prevented these distinct systems from being extensively used. Recently, several SHM-oriented WSNs have been proposed and believed to be able to overcome a large number of technical uncertainties. Nevertheless, there is limited research verifying the applicability of those WSNs with respect to demanding SHM applications like modal analysis and damage identification. Based on a brief review, this paper first reveals that Data Synchronization Error (DSE) is the most inherent factor amongst uncertainties of SHM-oriented WSNs. Effects of this factor are then investigated on outcomes and performance of the most robust Output-only Modal Analysis (OMA) techniques when merging data from multiple sensor setups. The two OMA families selected for this investigation are Frequency Domain Decomposition (FDD) and data-driven Stochastic Subspace Identification (SSI-data) due to the fact that they both have been widely applied in the past decade. Accelerations collected by a wired sensory system on a large-scale laboratory bridge model are initially used as benchmark data after being added with a certain level of noise to account for the higher presence of this factor in SHM-oriented WSNs. From this source, a large number of simulations have been made to generate multiple DSE-corrupted datasets to facilitate statistical analyses. The results of this study show the robustness of FDD and the precautions needed for SSI-data family when dealing with DSE at a relaxed level. Finally, the combination of preferred OMA techniques and the use of the channel projection for the time-domain OMA technique to cope with DSE are recommended.
Resumo:
To harness safe operation of Web-based systems in Web environments, we propose an SSPA (Server-based SHA-1 Page-digest Algorithm) to verify the integrity of Web contents before the server issues an HTTP response to a user request. In addition to standard security measures, our Java implementation of the SSPA, which is called the Dynamic Security Surveillance Agent (DSSA), provides further security in terms of content integrity to Web-based systems. Its function is to prevent the display of Web contents that have been altered through the malicious acts of attackers and intruders on client machines. This is to protect the reputation of organisations from cyber-attacks and to ensure the safe operation of Web systems by dynamically monitoring the integrity of a Web site's content on demand. We discuss our findings in terms of the applicability and practicality of the proposed system. We also discuss its time metrics, specifically in relation to its computational overhead at the Web server, as well as the overall latency from the clients' point of view, using different Internet access methods. The SSPA, our DSSA implementation, some experimental results and related work are all discussed
SWIRLnet : portable anemometer network for wind speed measurements of land-falling tropical cyclones
Resumo:
Wind speed measurement systems are sparse in the tropical regions of Australia. Tropical cyclone wind speeds impacting communities are often ‘guestimated’ from analyzing damaged structures. A re-locatable anemometer system is required to enable measurements of wind speeds. This paper discusses design criteria of the tripods and tie down system, proposed deployment of the anemometers, instrumentation, and data logging. Preliminary assessment of the anemometer response indicates a reliable system for 1 second response, however, it is noted that the Australian building code and wind loading standard uses a moving average time of approximately 0.2 seconds for its wind speed design criteria.