3 resultados para key replacement attack

em Digital Commons at Florida International University


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Eyewall replacement cycle (ERC) is frequently observed during the evolution of intensifying Tropical Cyclones (TCs). Although intensely studied in recent years, the underlying mechanisms of ERC are still poorly understood, and the forecast of ERC remains a great challenge. To advance our understanding of ERC and provide insights in improvement of numerical forecast of ERC, a series of numerical simulations is performed to investigate ERCs in TC-like vortices on a f-plane. The simulated ERCs possess key features similar to those observed in real TCs including the formation of a secondary tangential wind maximum associated with the outer eyewall. The Sawyer-Eliassen equation and tangential momentum budget analyses are performed to diagnose the mechanisms underlying the secondary eyewall formation (SEF) and ERC. Our diagnoses reveal crucial roles of outer rainband heating in governing the formation and development of the secondary tangential wind maximum and demonstrate that the outer rainband convection must reach a critical strength relative to the eyewall before SEF and the subsequent ERC can occur. A positive feedback among low-level convection, acceleration of tangential winds in the boundary layer, and surface evaporation that leads to the development of ERC and a mechanism for the demise of inner eyewall that involves interaction between the transverse circulations induced by eyewall and outer rainband convection are proposed. The tangential momentum budget indicates that the net tendency of tangential wind is a small residual resultant from a large cancellation between tendencies induced by the resolved and sub-grid scale (SGS) processes. The large SGS contribution to the tangential wind budget explains different characteristics of ERC shown in previous numerical studies and poses a great challenge for a timely correct forecast of ERC. The sensitivity experiments show that ERCs are strongly subjected to model physics, vortex radial structure and background wind. The impact of model physics on ERC can be well understood with the interaction among eyewall/outer rainband heating, radilal inflow in the boundary layer, surface layer turbulent processes, and shallow convection in the moat. However, further investigations are needed to fully understand the exhibited sensitivities of ERC to vortex radial structure and background wind.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Eyewall replacement cycle (ERC) is frequently observed during the evolution of intensifying Tropical Cyclones (TCs). Although intensely studied in recent years, the underlying mechanisms of ERC are still poorly understood, and the forecast of ERC remains a great challenge. To advance our understanding of ERC and provide insights in improvement of numerical forecast of ERC, a series of numerical simulations is performed to investigate ERCs in TC-like vortices on a f-plane. The simulated ERCs possess key features similar to those observed in real TCs including the formation of a secondary tangential wind maximum associated with the outer eyewall. The Sawyer-Eliassen equation and tangential momentum budget analyses are performed to diagnose the mechanisms underlying the secondary eyewall formation (SEF) and ERC. Our diagnoses reveal crucial roles of outer rainband heating in governing the formation and development of the secondary tangential wind maximum and demonstrate that the outer rainband convection must reach a critical strength relative to the eyewall before SEF and the subsequent ERC can occur. A positive feedback among low-level convection, acceleration of tangential winds in the boundary layer, and surface evaporation that leads to the development of ERC and a mechanism for the demise of inner eyewall that involves interaction between the transverse circulations induced by eyewall and outer rainband convection are proposed. The tangential momentum budget indicates that the net tendency of tangential wind is a small residual resultant from a large cancellation between tendencies induced by the resolved and sub-grid scale (SGS) processes. The large SGS contribution to the tangential wind budget explains different characteristics of ERC shown in previous numerical studies and poses a great challenge for a timely correct forecast of ERC. The sensitivity experiments show that ERCs are strongly subjected to model physics, vortex radial structure and background wind. The impact of model physics on ERC can be well understood with the interaction among eyewall/outer rainband heating, radilal inflow in the boundary layer, surface layer turbulent processes, and shallow convection in the moat. However, further investigations are needed to fully understand the exhibited sensitivities of ERC to vortex radial structure and background wind.