6 resultados para Dynamic security assessment
em Consorci de Serveis Universitaris de Catalunya (CSUC), Spain
Resumo:
Sensor networks have many applications in monitoring and controlling of environmental properties such as sound, acceleration, vibration and temperature. Due to limitedresources in computation capability, memory and energy, they are vulnerable to many kinds of attacks. The ZigBee specification based on the 802.15.4 standard, defines a set of layers specifically suited to sensor networks. These layers support secure messaging using symmetric cryptographic. This paper presents two different ways for grabbing the cryptographic key in ZigBee: remote attack and physical attack. It also surveys and categorizes some additional attacks which can be performed on ZigBee networks: eavesdropping, spoofing, replay and DoS attacks at different layers. From this analysis, it is shown that some vulnerabilities still in the existing security schema in ZigBee technology.
Resumo:
Since the independence processes in the African continent, armed conflicts, peace and security have raised concern and attention both at the domestic level and at the international scale. In recent years, all aspects have undergone significant changes which have given rise to intense debate. The end of some historical conflicts has taken place in a context of slight decrease in the number of armed conflicts and the consolidation of post-conflict reconstruction processes. Moreover, African regional organizations have staged an increasingly more active internal shift in matters related to peace and security, encouraged by the idea of promoting “African solutions to African problems”. This new scenario, has been accompanied by new uncertainties at the security level and major challenges at the operational level, especially for the African Union. This article aims to ascertain the state of affairs on all these issues and raise some key questions to consider.
Resumo:
In this project I have carried out a vulnerability assessment of a component of the Condor Middleware. In this assessment I have sought and found the more dangerous software vulnerabilities of this system, I have reported them to the development team such that they may be fixed, and thus improve the security of this distributed system, and the networks that use it.
Resumo:
The aim of this book is to survey on different Land Use Planning and safety approaches in vicinity of industrial plants. As this research is associated with three broad fields of Land Use Planning, safety and security, the set principle is to avoid unnecessary and over detailed information, but including the useful ones to provide a comprehensive resource which can be applicable for several purposes. Besides, the proposed method, which is explained in Chapter 7, can initiate a new field for future of Land Use Planning in vicinity of industrial plants.
Resumo:
In this paper we present a novel mechanism for the protection of dynamic itineraries for mobile agent applications. Itineraries that are decided as the agent goes are essential in complex applications based on mobile agents, but no approach has been presented until now to protect them. We have conceived a cryptographic scheme for shielding dynamic itineraries from tampering, impersonation and disclosure. By using trust strategically, our scheme provides a balanced trade-off between flexibility and security. Our protection scheme has been thought always bearing in mind a feasible implementation, and thus facilitates the development of applications that make use of it. An example application based on a real healthcare scenario is also presented to show its operation.
Resumo:
This paper describes the state of the art of secure ad hoc routing protocols and presents SEDYMO, a mechanism to secure a dynamic multihop ad hoc routing protocol. The proposed solution defeats internal and external attacks usinga trustworthiness model based on a distributed certification authority. Digital signatures and hash chains are used to ensure the correctness of the protocol. The protocol is compared with other alternatives in terms of security strength, energy efficiency and time delay. Both computational and transmission costs are considered and it is shown that the secure protocol overhead is not a critical factor compared to the high network interface cost.