5 resultados para broadcast encryption

em Dalarna University College Electronic Archive


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Uppdragsgivare för detta examensarbete är Länsstyrelsen Dalarna. Målet är att undersöka hur lämplig tekniken med CBS (Cell Broadcast Service) baserade textmeddelande är vid viktigt meddelande till allmänheten (VMA-larm). En tjänst som utnyttjar CBS-tekniken kan rädda liv om allmänheten i ett tidigt skede får reda på vad som hänt och vart de ska bege sig.Rapporten visar på hur man kan använda SMS då en krissituation uppstår. Med hjälp av CBS-tekniken skickas meddelandet till specifikt valda basstationer och alla mobiltelefoner som är uppkopplade mot den. Det positiva är att bara de som behöver få veta vad som hänt får meddelandet.Enligt specifikationerna (ETSI) på GSM och 3G-näten i Sverige finns det stöd för utskick av CBS-meddelanden inbyggt i de befintliga näten. Det finns dock vissa problem vid införandet av CBS-tekniken i operatörsnäten. Operatörerna måste implementera en Cell Broadcast Center (CBC) i näten, denna del av infrastrukturen kommunicerar med basstationerna och sköter utskicken av CBS-meddelanden. Ett ytterligare problem med CBS-tekniken är att användarna måste aktivera mobiltelefonen för att ta emot CBS-meddelanden.Enligt Telia och Vodafone används CBS inte i Sverige idag men vi bedömer att tjänsten för att varna allmänheten kan använda sig av CBS-tekniken om den implementeras i operatörsnäten. Vi har i detta arbete använt oss av en generell kvalitativ metod kompletterat med Siegels metod. Med den kvalitativa metoden har vi intervjuat Telia och Vodafone på ingående fakta om CBS-tekniken. Vid design av teknisk lösning har vi använt oss av Siegels två första faser.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches.  The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

IPTV is now offered by several operators in Europe, US and Asia using broadcast video over private IP networks that are isolated from Internet. IPTV services rely ontransmission of live (real-time) video and/or stored video. Video on Demand (VoD)and Time-shifted TV are implemented by IP unicast and Broadcast TV (BTV) and Near video on demand are implemented by IP multicast. IPTV services require QoS guarantees and can tolerate no more than 10-6 packet loss probability, 200 ms delay, and 50 ms jitter. Low delay is essential for satisfactory trick mode performance(pause, resume,fast forward) for VoD, and fast channel change time for BTV. Internet Traffic Engineering (TE) is defined in RFC 3272 and involves both capacity management and traffic management. Capacity management includes capacityplanning, routing control, and resource management. Traffic management includes (1)nodal traffic control functions such as traffic conditioning, queue management, scheduling, and (2) other functions that regulate traffic flow through the network orthat arbitrate access to network resources. An IPTV network architecture includes multiple networks (core network, metronetwork, access network and home network) that connects devices (super head-end, video hub office, video serving office, home gateway, set-top box). Each IP router in the core and metro networks implements some queueing and packet scheduling mechanism at the output link controller. Popular schedulers in IP networks include Priority Queueing (PQ), Class-Based Weighted Fair Queueing (CBWFQ), and Low Latency Queueing (LLQ) which combines PQ and CBWFQ.The thesis analyzes several Packet Scheduling algorithms that can optimize the tradeoff between system capacity and end user performance for the traffic classes. Before in the simulator FIFO,PQ,GPS queueing methods were implemented inside. This thesis aims to implement the LLQ scheduler inside the simulator and to evaluate the performance of these packet schedulers. The simulator is provided by ErnstNordström and Simulator was built in Visual C++ 2008 environmentand tested and analyzed in MatLab 7.0 under windows VISTA.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This Master’s Thesis examines transnational conflicts and Christian-Muslim relations in Nigeria between the years 2001 and 2006. It focuses on two major transnational conflicts: The September 11, 2001 attacks in the United States and the Danish cartoon controversy of 2005/2006. It discusses the impact of these transnational conflicts on Christian-Muslim relations in Nigeria in the light of the implementation of the Sharia Law in some northern Nigerian states and the improved access to the broadcast media and mobile telephone communication in Nigeria. By underscoring the relationship between transnational conflicts and the local context, this study provides a new perspective for understanding Christian-Muslim relations in Nigeria

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network. Vulnerability tests were conducted sequentially, when data from the survey was needed to continue the scan.A survey of the network was done and data in the form of operating system, among other things, were collected in the tables. A number of systems were selected from the tables and were scanned with Nessus. The result was a table across the network and a table of found vulnerabilities. The table of vulnerabilities has helped the organization to prevent these vulnerabilities by updating the affected computers. Also a wireless network with WEP encryption, which is insecure, has been detected and decrypted.