5 resultados para Security protocol

em Greenwich Academic Literature Archive - UK


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Analysis of the generic attacks and countermeasures for block cipher based message authentication code algorithms (MAC) in sensor applications is undertaken; the conclusions are used in the design of two new MAC constructs Quicker Block Chaining MAC1 (QBC-MAC1) and Quicker Block Chaining MAC2 (QBC-MAC2). Using software simulation we show that our new constructs point to improvements in usage of CPU instruction clock cycle and energy requirement when benchmarked against the de facto Cipher Block Chaining MAC (CBC-MAC) based construct used in the TinySec security protocol for wireless sensor networks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A zone based systems design framework is described and utilised in the implementation of a message authentication code (MAC) algorithm based on symmetric key block ciphers. The resulting block cipher based MAC algorithm may be used to provide assurance of the authenticity and, hence, the integrity of binary data. Using software simulation to benchmark against the de facto cipher block chaining MAC (CBC-MAC) variant used in the TinySec security protocol for wireless sensor networks and the NIST cipher block chaining MAC standard, CMAC; we show that our zone based systems design framework can lead to block cipher based MAC constructs that point to improvements in message processing efficiency, processing throughput and processing latency.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The performance of the register insertion protocol for mixed voice-data traffic is investigated by simulation. The simulation model incorporates a common insertion buffer for station and ring packets. Bandwidth allocation is achieved by imposing a queue limit at each node. A simple priority scheme is introduced by allowing the queue limit to vary from node to node. This enables voice traffic to be given priority over data. The effect on performance of various operational and design parameters such as ratio of voice to data traffic, queue limit and voice packet size is investigated. Comparisons are made where possible with related work on other protocols proposed for voice-data integration. The main conclusions are: (a) there is a general degradation of performance as the ratio of voice traffic to data traffic increases, (b) substantial improvement in performance can be achieved by restricting the queue length at data nodes and (c) for a given ring utilisation, smaller voice packets result in lower delays for both voice and data traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Heidegger famously identified Modernity with a technological leveling of being to a single order of a “standing reserve.” In a radically different tone, Gilles Deleuze articulated a single “plane of immanence” within which ontological distinctions between mind and body, God and world, interiority and exteriority become indiscernible. Taking such philosophical declarations as points of departure, this panel will consider how a collapse of ontological distinction emerged as a thematic and structural trope in literary and cinematic modernisms. We hope to consider how writers and film-makers of the 20th c. utilize the resources of their media to ask “the question of being” that troubled their philosophical contemporaries and heirs. In this vein, we will examine how these modernist ontologies of immanence describe the crisis of a subject saturated and eclipsed by a world which comprises her while also remaining strange or opaque. Papers will ask what is lost with the departure of a distinctly human sense of “being” and how the historical arrival of an alternative ontological order may be evident in the lived experience of modernity. In this sense, the relationship to departures and arrivals becomes the modern subject’s suspicion that he is unable to do either vis á vis the world.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

We evaluated the impacts of wildlife on household food security and income in three semi-arid villages adjacent to Lake Manyara National Park (LMNP) and Mkomazi Game Reserve (MGR) in Northeastern Tanzania. Survey data were collected using both household interviews and human-wildlife conflict related archive information from the village government offices. Crop destruction by wildlife influenced both household food security and cash income. Crop damage to households was, on average, 0.08 ton/annum, equivalent to two months household loss of food and reduced household cash income by 1.3%. A combination of measures is proposed as incentives for conservation. These include provision of economic incentives, soft loans to initiate non-farm (e.g., ecotourism, business enterprises) projects to ease dependency on natural resources, increasing of reserves buffer zones and fencing of reserves.