154 resultados para Key management

em Deakin Research Online - Australia


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Wireless mesh networks (WMNs) have the ability to integrate with other networks while providing a fast and cost-saving deployment. The network security is one of important challenge problems in this kind of networks. This paper is focused on key management between mesh and sensor networks. We propose an efficient key pre-distribution scheme based on two polynomials in wireless mesh networks by employing the nature of heterogeneity. Our scheme realizes the property of bloom filters, i.e., neighbor nodes can discover their shared keys but have no knowledge on the different keys possessed by the other node, without the probability of false positive. The analysis presented in this paper shows that our scheme has the ability to establish three different security level keys and achieves the property of self adaptive security for sensor networks with acceptable computation and communication consumption.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In this paper, I examine some of the key management literature of the neoliberal 1990s to make a series of wider observations about contemporary ideology. Post-structuralist or post-modernist theory is often presented as the arch-enemy of neoliberal capitalism, as the orthodoxy of late capitalism. However, adding to work by Frederic Jameson, Thomas Frank and others, this paper examines uncanny proximity between neoliberal ideas about disaggregating, outsourcing, networking, etc. and the learning motifs of postmodernist theory. Its guiding hypothesis is that postmodernism in the academy, despite its own self-misrecognition as "racial", is a further ideological expression of the samr neoliberal drive to overcome "Fordist", "authoritarian" ways of organising producation and social regulation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Through extensive laboratory and field based analysis of soil chemical and physical processes, this research identified and addressed key management issues associated with the sustainable irrigation of municipal wastewater onto sandy water repellent soils, overlaying a shallow aquifer, in an environmentally significant coastal system.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Across time, companies are increasingly making public commitments to sustainable development and to reducing their impacts on climate change. Management remuneration plans (MRPs) are a key mechanism to motivate managers to achieve corporate goals. We review the MRPs negotiated with key management personnel in a sample of large Australian carbon-intensive companies. Our results show that, as in past decades, the companies in our sample have MRPs in place that continue to fixate on financial performance. We argue that this provides evidence of a disconnection between the sustainability-related rhetoric of the sample companies, and their ‘real’ organisational priorities.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

In dynamic peer to peer (P2P) e-commerce, it is an important and difficult problem to promote online businesses without sacrificing the desired trust to secure transactions. In this paper, we address malicious threats in order to guarantee secrecy and integrity of recommendations exchanged among peers in P2P e-commerce. In addition to trust, secret keys are required to be established between each peer and its neighbors. Further, we propose a key management approach gkeying to generate six types of keys. Our work mainly focuses on key generation for securing recommendations, and ensuring the integrity of recommendations. The proposed approach presented with a security and performance analysis, is more secure and more efficient in terms of communication cost, computation cost, storage cost, and feasibility. © 2012 IEEE.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Identity-based encryption (IBE) allows one party to send ciphered messages to another using an arbitrary identity string as an encryption key. Since IBE does not require prior generation and distribution of keys, it greatly simplifies key management in public-key cryptography. According to the Menezes-Okamoto-Vanstone (MOV) reduction theory, the IBE scheme based on bilinear map loses the high efficiency of elliptic curve because of the requirement of large security parameters. Therefore, it is important to build a provably secure IBE scheme without bilinear map. To this end, this paper proposes an improved IBE scheme that is different from the previous schemes because this new scheme does not use symmetric encryption algorithm. Furthermore, it can be proven to be secure against adaptively chosen identity and chosen plaintext attacks in the standard model. Elaborated security and performance analysis demonstrate that this new scheme outperforms the previous ones in terms of the time complexity for encryption and decryption.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the details of the geographical location of the nodes. However, to the best authors’ knowledge, none of the existing works exploit the constraints faced by the adversary, specifically, tracing a particular frequency from a large range of unknown frequency channels. The current work uses positional details of the individual nodes. Then the aim is to exploit this weakness of tracing frequencies by assigning a wide range of frequency channels to each node. Experiments using Magneto Optic Sensors reveal that any change of the parametric Faraday’s rotational angle affects the frequency of the Optical waves. This idea can perhaps be generalized for practically deployable sensors (having respective parameters) along with a suitable key management scheme.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Protecting essential habitats through the implementation of area closures has been recognized as a useful management tool for rebuilding overfished populations and minimizing habitat degradation. School shark (Galeorhinus galeus) have suffered significant stock declines in Australia; however, recent stock assessments suggest the population may have stabilized and the protection of closed nursery areas has been identified as a key management strategy to rebuilding their numbers. Young-of-The-year (YOY) and juvenile G. galeus were acoustically tagged and monitored to determine ontogenetic differences in residency and seasonal use of an important protected nursery area (Shark Refuge Area or SRA) in southeastern Tasmania. BothYOYand juvenile G. galeus showed a distinct seasonal pattern of occurrence in the SRAwith most departing the area during winter and only a small proportion of YOY (33%) and no juveniles returning the following spring, suggesting areas outside the SRA may also be important during these early life-history stages. While these behaviors confirm SRAs continue to function as essential habitat during G. galeus early life history, evidence of YOY and juveniles emigrating from these areas within their first 1-2 years and the fact that few YOY return suggest that these areas may only afford protection for a more limited amount of time than previously thought. Determining the importance of neighbouring coastal waters and maintaining the use of traditional fisheries management tools are therefore required to ensure effective conservation of G. galeus during early life history.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The demand for data storage and processing is increasing at a rapid speed in the big data era. The management of such tremendous volume of data is a critical challenge to the data storage systems. Firstly, since 60% of the stored data is claimed to be redundant, data deduplication technology becomes an attractive solution to save storage space and traffic in a big data environment. Secondly, the security issues, such as confidentiality, integrity and privacy of the big data should also be considered for big data storage. To address these problems, convergent encryption is widely used to secure data deduplication for big data storage. Nonetheless, there still exist some other security issues, such as proof of ownership, key management and so on. In this chapter, we first introduce some major cyber attacks for big data storage. Then, we describe the existing fundamental security techniques, whose integration is essential for preventing data from existing and future security attacks. By discussing some interesting open problems, we finally expect to trigger more research efforts in this new research field.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Access control is an indispensable security component of cloud computing, and hierarchical access control is of particular interest since in practice one is entitled to different access privileges. This paper presents a hierarchical key assignment scheme based on linear-geometry as the solution of flexible and fine-grained hierarchical access control in cloud computing. In our scheme, the encryption key of each class in the hierarchy is associated with a private vector and a public vector, and the inner product of the private vector of an ancestor class and the public vector of its descendant class can be used to derive the encryption key of that descendant class. The proposed scheme belongs to direct access schemes on hierarchical access control, namely each class at a higher level in the hierarchy can directly derive the encryption key of its descendant class without the need of iterative computation. In addition to this basic hierarchical key derivation, we also give a dynamic key management mechanism to efficiently address potential changes in the hierarchy. Our scheme only needs light computations over finite field and provides strong key indistinguishability under the assumption of pseudorandom functions. Furthermore, the simulation shows that our scheme has an optimized trade-off between computation consumption and storage space.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Knowing how species respond to fire regimes is essential for ecologically sustainable management. This axiom raises two important questions: (1) what knowledge is the most important to develop and (2) to what extent can current research methods deliver that knowledge? We identify three areas of required knowledge: (i) a mechanistic understanding of species’ responses to fire regimes; (ii) knowledge of how the spatial and temporal arrangement of fires influences the biota; and (iii) an understanding of interactions of fire regimes with other processes. We review the capacity of empirical research to address these knowledge gaps, and reveal many limitations. Manipulative experiments are limited by the number and scope of treatments that can be applied, natural experiments are limited by treatment availability and confounding factors, and longitudinal studies are difficult to maintain, particularly due to unplanned disturbance events. Simulation modelling is limited by the quality of the underlying empirical data and by uncertainty in how well model structure represents reality. Due to the constraints on large-scale, long-term research, the potential for management experiments to inform adaptive management is limited. Rather than simply recommending adaptive management, we define a research agenda to maximise the rate of learning in this difficult field. This includes measuring responses at a species level, building capacity to implement natural experiments, undertaking simulation modelling, and judicious application of experimental approaches. Developing ecologically sustainable fire management practices will require sustained research effort and a sophisticated research agenda based on carefully targeting appropriate methods to address critical management questions.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Feral cats (Felis catus) have a wide global distribution and cause significant damage to native fauna. Reducing their impacts requires an understanding of how they use habitat and which parts of the landscape should be the focus of management. We reviewed 27 experimental and observational studies conducted around the world over the last 35 years that aimed to examine habitat use by feral and unowned cats. Our aims were to: (1) summarise the current body of literature on habitat use by feral and unowned cats in the context of applicable ecological theory (i.e. habitat selection, foraging theory); (2) develop testable hypotheses to help fill important knowledge gaps in the current body of knowledge on this topic; and (3) build a conceptual framework that will guide the activities of researchers and managers in reducing feral cat impacts. We found that feral cats exploit a diverse range of habitats including arid deserts, shrublands and grasslands, fragmented agricultural landscapes, urban areas, glacial valleys, equatorial to sub-Antarctic islands and a range of forest and woodland types. Factors invoked to explain habitat use by cats included prey availability, predation/competition, shelter availability and human resource subsidies, but the strength of evidence used to support these assertions was low, with most studies being observational or correlative.Wetherefore provide a list of key directions that will assist conservation managers and researchers in better understanding and ameliorating the impact of feral cats at a scale appropriate for useful management and research. Future studies will benefit from employing an experimental approach and collecting data on the relative abundance and activity of prey and other predators. This might include landscape-scale experiments where the densities of predators, prey or competitors are manipulated and then the response in cat habitat use is measured. Effective management of feral cat populations could target high-use areas, such as linear features and structurally complex habitat. Since our review shows often-divergent outcomes in the use of the same habitat components and vegetation types worldwide, local knowledge and active monitoring of management actions is essential when deciding on control programs.