952 resultados para user-driven security adaptation
Resumo:
Wireless sensor networks are emerging as effective tools in the gathering and dissemination of data. They can be applied in many fields including health, environmental monitoring, home automation and the military. Like all other computing systems it is necessary to include security features, so that security sensitive data traversing the network is protected. However, traditional security techniques cannot be applied to wireless sensor networks. This is due to the constraints of battery power, memory, and the computational capacities of the miniature wireless sensor nodes. Therefore, to address this need, it becomes necessary to develop new lightweight security protocols. This dissertation focuses on designing a suite of lightweight trust-based security mechanisms and a cooperation enforcement protocol for wireless sensor networks. This dissertation presents a trust-based cluster head election mechanism used to elect new cluster heads. This solution prevents a major security breach against the routing protocol, namely, the election of malicious or compromised cluster heads. This dissertation also describes a location-aware, trust-based, compromise node detection, and isolation mechanism. Both of these mechanisms rely on the ability of a node to monitor its neighbors. Using neighbor monitoring techniques, the nodes are able to determine their neighbors’ reputation and trust level through probabilistic modeling. The mechanisms were designed to mitigate internal attacks within wireless sensor networks. The feasibility of the approach is demonstrated through extensive simulations. The dissertation also addresses non-cooperation problems in multi-user wireless sensor networks. A scalable lightweight enforcement algorithm using evolutionary game theory is also designed. The effectiveness of this cooperation enforcement algorithm is validated through mathematical analysis and simulation. This research has advanced the knowledge of wireless sensor network security and cooperation by developing new techniques based on mathematical models. By doing this, we have enabled others to build on our work towards the creation of highly trusted wireless sensor networks. This would facilitate its full utilization in many fields ranging from civilian to military applications.
Resumo:
The currently main development model on global society is driven by an economic rationality that endangers the environment and social justice. More and more, attention to this way of production and consumption is increasing, boosting research for sustainable development, with an environmental rationality that can harmonize nature preservation and welfare of all socioeconomic classes. One of the efforts on this sense is changing the sources supplying the energy demand, replacing fossil fuels for renewable and cleaner sources, such as biofuels. Carthamus tinctorius (safflower) is an oilseed crop with potential for biodiesel production, with good oil yield and chemical profile, allied to good adaptation to climates such like the northeastern semiarid lands of Brazil. With public policies fomentation, the use of this species may be an interesting alternative for family farming. In farming in general, the use of pesticides to prevent and combat diseases and plagues is common, which is not a sustainable practice. Thus, there are researched alternative, less dangerous substances. In this study, it was aimed to assess if neem (Azadirachta indica) leaf extract (20% m/v) and Bordeaux mixture (copper sulfate) have effects on safflower. It was also aimed to verify acceptance of farmers on safflower crop in Apodi, a municipality in Rio Grande do Norte state, Brazil, in view of it being localized in the aimed region for this crop cultivation. Besides that, understanding that the farmers’ knowledge and inclination to adopt the crop is fundamental for the introduction of this species and socioeconomic growth due to its exploration. In addition, a booklet with basic information on safflower was produced. In the field experiment, the fungicides were pulverized on plants cultivated in field experimental plots, with collection of leaf samples for analysis on anatomy, cuticle, and epicuticular wax morphology, the protective layer that interfaces with the surrounding ambient. In Apodi, forty-five farmers from Potiguar Cooperative of Apiculture and Sustainable Rural Development (COOPAPI) underwent semi-structured interviews, which also addressed their assessment on currently cultivated crops and perception of pesticide uses and sustainable alternatives. After comparing using analysis of variance, it was found that there was no difference between treatments in the experiment, as well as no anatomical or morphological modifications. Safflower acceptation among farmers was wide, with 84% of interviewees believing in a perspective of good incomes. The current scenario, comprised of low crop diversity, fragile in face of droughts and plagues, can partially explain this opinion. The booklet was effective in catching people attention for the species potential. There was wide acknowledgement on the importance of alternative pesticides, justified by health security. Based on the assessed parameter in the results of this research, the treatments here utilized may be recommended as fungicides for safflower. Given the crop susceptibility to fungi in heavy rainy period, it is advised that its potential introduction on the region shall be focused on semiarid areas.
Resumo:
Acknowledgements: We thank Iain Malcolm of Marine Scotland Science for access to data from the Girnock and the Scottish Environment Protection Agency for historical stage-discharge relationships. CS contributions on this paper were in part supported by the NERC/JPI SIWA project (NE/M019896/1).
Resumo:
This article is protected by copyright. All rights reserved. Acknowledgements This study was funded by a BBSRC studentship (MAW) and NERC grants NE/H00775X/1 and NE/D000602/1 (SBP). The authors are grateful to Mario Röder and Keliya Bai for fieldwork assistance, and all estate owners, factors and keepers for access to field sites, most particularly MJ Taylor and Mike Nisbet (Airlie), Neil Brown (Allargue), RR Gledson and David Scrimgeour (Delnadamph), Andrew Salvesen and John Hay (Dinnet), Stuart Young and Derek Calder (Edinglassie), Kirsty Donald and David Busfield (Glen Dye), Neil Hogbin and Ab Taylor (Glen Muick), Alistair Mitchell (Glenlivet), Simon Blackett, Jim Davidson and Liam Donald (Invercauld), Richard Cooke and Fred Taylor† (Invermark), Shaila Rao and Christopher Murphy (Mar Lodge), and Ralph Peters and Philip Astor (Tillypronie). Data accessibility • Genotype data (DataDryad: doi:10.5061/dryad.4t7jk) • Metadata (information on sampling sites, phenotypes and medication regimen) (DataDryad: doi:10.5061/dryad.4t7jk)
Resumo:
This research examines three potential mechanisms by which bacteria can adapt to different temperatures: changes in strain-level population structure, gene regulation and particle colonization. For the first two mechanisms, I utilize bacterial strains from the Vibrionaceae family due to their ease of culturability, ubiquity in coastal environments and status as a model system for marine bacteria. I first examine vibrio seasonal dynamics in temperate, coastal water and compare the thermal performance of strains that occupy different thermal environments. Our results suggest that there are tradeoffs in adaptation to specific temperatures and that thermal specialization can occur at a very fine phylogenetic scale. The observed thermal specialization over relatively short evolutionary time-scales indicates that few genes or cellular processes may limit expansion to a different thermal niche. I then compare the genomic and transcriptional changes associated with thermal adaptation in closely-related vibrio strains under heat and cold stress. The two vibrio strains have very similar genomes and overall exhibit similar transcriptional profiles in response to temperature stress but their temperature preferences are determined by differential transcriptional responses in shared genes as well as temperature-dependent regulation of unique genes. Finally, I investigate the temporal dynamics of particle-attached and free-living bacterial community in coastal seawater and find that microhabitats exert a stronger forcing on microbial communities than environmental variability, suggesting that particle-attachment could buffer the impacts of environmental changes and particle-associated communities likely respond to the presence of distinct eukaryotes rather than commonly-measured environmental parameters. Integrating these results will offer new perspectives on the mechanisms by which bacteria respond to seasonal temperature changes as well as potential adaptations to climate change-driven warming of the surface oceans.
Resumo:
Regulating intracellular pH (pHi) is critical for optimising the metabolic activity of corals, yet mechanisms involved in pH regulation and the buffering capacity within coral cells are not well understood. Our study investigated how the presence of symbiotic dinoflagellates affects the response of pHi to pCO2-driven seawater acidification in cells isolated from Pocillopora damicornis. Using the fluorescent dye BCECF-AM, in conjunction with confocal microscopy, we simultaneously characterised the response of pHi in host coral cells and their dinoflagellate symbionts, in symbiotic and non-symbiotic states under saturating light, with and without the photosynthetic inhibitor DCMU. Each treatment was run under control (pH 7.8) and CO2 acidified seawater conditions (decreasing pH from 7.8 - 6.8). After two hours of CO2 addition, by which time the external pH (pHe) had declined to 6.8, the dinoflagellate symbionts had increased their pHi by 0.5 pH units above control levels. In contrast, in both symbiotic and non-symbiotic host coral cells, 15 min of CO2 addition (0.2 pH unit drop in pHe) led to cytoplasmic acidosis equivalent to 0.4 pH units. Despite further seawater acidification over the duration of the experiment, the pHi of non-symbiotic coral cells did not change, though in host cells containing a symbiont cell the pHi recovered to control levels. This recovery was negated when cells were incubated with DCMU. Our results reveal that photosynthetic activity of the endosymbiont is tightly coupled with the ability of the host cell to recover from cellular acidosis after exposure to high CO2 / low pH.
Physical Layer Security with Threshold-Based Multiuser Scheduling in Multi-antenna Wireless Networks
Resumo:
In this paper, we consider a multiuser downlink wiretap network consisting of one base station (BS) equipped with AA antennas, NB single-antenna legitimate users, and NE single-antenna eavesdroppers over Nakagami-m fading channels. In particular, we introduce a joint secure transmission scheme that adopts transmit antenna selection (TAS) at the BS and explores threshold-based selection diversity (tSD) scheduling over legitimate users to achieve a good secrecy performance while maintaining low implementation complexity. More specifically, in an effort to quantify the secrecy performance of the considered system, two practical scenarios are investigated, i.e., Scenario I: the eavesdropper’s channel state information (CSI) is unavailable at the BS, and Scenario II: the eavesdropper’s CSI is available at the BS. For Scenario I, novel exact closed-form expressions of the secrecy outage probability are derived, which are valid for general networks with an arbitrary number of legitimate users, antenna configurations, number of eavesdroppers, and the switched threshold. For Scenario II, we take into account the ergodic secrecy rate as the principle performance metric, and derive novel closed-form expressions of the exact ergodic secrecy rate. Additionally, we also provide simple and asymptotic expressions for secrecy outage probability and ergodic secrecy rate under two distinct cases, i.e., Case I: the legitimate user is located close to the BS, and Case II: both the legitimate user and eavesdropper are located close to the BS. Our important findings reveal that the secrecy diversity order is AAmA and the slope of secrecy rate is one under Case I, while the secrecy diversity order and the slope of secrecy rate collapse to zero under Case II, where the secrecy performance floor occurs. Finally, when the switched threshold is carefully selected, the considered scheduling scheme outperforms other well known existing schemes in terms of the secrecy performance and complexity tradeoff
Resumo:
The subtle and complex nature of Northern Ireland's transitional landscape presents acute difficulties for the community policing concept. As the core to the police reforms in the country, its implementation has faltered in the face of institutional inertia within the Police Service of Northern Ireland (PSNI). This has been further exacerbated by a failure of the police to adequately increase the co-production of security through improved engagement and utilization of Northern Ireland's diverse community infrastructures. This paper will assess the delivery of community policing by the PSNI, while exploring their engagement with Northern Ireland's grass-roots community organizations, and specifically those involved with the governance of security at the local level. Thus, through a framework of adaptation, engagement and delivery of community policing by the PSNI within the unique context of Northern Ireland's security ‘otherness’, the paper will explore the key issues to police–community interaction associated with the broader vision of the Independent Commission on Policing (ICP) on community policing.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
La prévalence importante des troubles d’adaptation au sein de la population d’enfants et d’adolescents du Québec appuient l’importance d’accorder une attention particulière aux piliers développementaux influençant leur trajectoire (Ministère de la Santé et des Services sociaux du Québec, 2002). Dans ce sens, des données longitudinales ont permis de statuer sur la nature de l’impact de la relation d’attachement entre le parent et l’enfant sur son adaptation ultérieure (Sroufe, Egeland, Carlson, & Collins, 2005). La sécurité d’attachement aurait un rôle protecteur, mais cette relation a aussi été identifiée comme le système le plus influent dans la compromission du développement de l’enfant (Cicchetti & Valentino, 2006). Parmi les interventions disponibles, le programme d’intervention Circle of Security Parenting (COS-P) (Powell, Cooper, Hoffman, & Marvin, 2009) s’avère particulièrement prometteur étant donnée la qualité de l’intégration théorique et clinique qui le sous-tend. Cependant, aucune donnée n’est encore disponible pour appuyer son efficacité au sein de la population québécoise dans un contexte de soins de première ligne. La présente étude vise ainsi à amorcer cette démarche avec un devis pré/post tests en explorant les effets du protocole d’intervention COS-P auprès de quatre mères et leur enfant d’âge préscolaire. À ces fins, des mesures cernant la fonction réflexive parentale et les dimensions des représentations de l’expérience affective du parent (Parent Development Interview – PDI; Aber, Slade, Berger, Bresgi & Kaplan, 1985) sont recueillies avant et après l’intervention. Les retombées de l’intervention sont aussi examinées chez les parents au niveau du stress parental (Parental Stress Index — PSI; Abidin, 1995; Bigras, LaFrenière, & Abidin, 1996) et au niveau des problèmes comportementaux et émotionnels chez les enfants (Child Behavior Checklist – CBCL; Achenbach & Rescorla, 2000). L’ensemble de ces données est analysé dans un premier temps avec perspective groupale et dans un deuxième temps, avec une perspective individuelle descriptive détaillant les résultats pour chaque participante. Les analyses ne permettent pas de démontrer une amélioration des représentations parentales et une augmentation de la fonction réflexive parentale, tel qu’attendu. Toutefois, le stress parental et les problèmes intériorisés des enfants diminuent, bien que de façon non significative. Il est proposé que l’effet de l’intervention soit compris en considérant le parent à l’intérieur d’un système dynamique, lui permettant de s’approprier l’intervention à travers un ensemble de facteurs qui lui sont propres. Des suggestions pour les études futures sont formulées en regard des constats méthodologiques et cliniques qui se dégagent de la présente étude notamment quant à la pertinence de mesures de relance (Navarro, manuscrit en préparation) et à la poursuite de la démonstration de l’efficacité du protocole avec un devis expérimental (Lemieux, manuscrit en préparation).
Resumo:
The last two decades have seen a proliferation of research frameworks that emphasise the importance of understanding adaptive processes that happen at different levels. We contribute to this growing body of literature by exploring how cultural (mal)adaptive dynamics relate to multilevel social-ecological processes occurring at different scales, where the lower levels combine into new units with new organizations, functions, and emergent properties or collective behaviors. After a brief review of the concept of “cultural adaptation” from the perspective of cultural evolutionary theory, the core of the paper is constructed around the exploration of multilevel processes occurring at the temporal, spatial, social, and political scales. We do so by using insights from cultural evolutionary theory and by examining small-scale societies as case studies. In each section, we discuss the importance of the selected scale for understanding cultural adaptation and then present an example that illustrates how multilevel processes in the selected scale help explain observed patterns in the cultural adaptive process. The last section of the paper discusses the potential of modeling and computer simulation for studying multilevel processes in cultural adaptation. We conclude by highlighting how elements from cultural evolutionary theory might enrich the multilevel process discussion in resilience theory.
Resumo:
Contemporary integrated circuits are designed and manufactured in a globalized environment leading to concerns of piracy, overproduction and counterfeiting. One class of techniques to combat these threats is circuit obfuscation which seeks to modify the gate-level (or structural) description of a circuit without affecting its functionality in order to increase the complexity and cost of reverse engineering. Most of the existing circuit obfuscation methods are based on the insertion of additional logic (called “key gates”) or camouflaging existing gates in order to make it difficult for a malicious user to get the complete layout information without extensive computations to determine key-gate values. However, when the netlist or the circuit layout, although camouflaged, is available to the attacker, he/she can use advanced logic analysis and circuit simulation tools and Boolean SAT solvers to reveal the unknown gate-level information without exhaustively trying all the input vectors, thus bringing down the complexity of reverse engineering. To counter this problem, some ‘provably secure’ logic encryption algorithms that emphasize methodical selection of camouflaged gates have been proposed previously in literature [1,2,3]. The contribution of this paper is the creation and simulation of a new layout obfuscation method that uses don't care conditions. We also present proof-of-concept of a new functional or logic obfuscation technique that not only conceals, but modifies the circuit functionality in addition to the gate-level description, and can be implemented automatically during the design process. Our layout obfuscation technique utilizes don’t care conditions (namely, Observability and Satisfiability Don’t Cares) inherent in the circuit to camouflage selected gates and modify sub-circuit functionality while meeting the overall circuit specification. Here, camouflaging or obfuscating a gate means replacing the candidate gate by a 4X1 Multiplexer which can be configured to perform all possible 2-input/ 1-output functions as proposed by Bao et al. [4]. It is important to emphasize that our approach not only obfuscates but alters sub-circuit level functionality in an attempt to make IP piracy difficult. The choice of gates to obfuscate determines the effort required to reverse engineer or brute force the design. As such, we propose a method of camouflaged gate selection based on the intersection of output logic cones. By choosing these candidate gates methodically, the complexity of reverse engineering can be made exponential, thus making it computationally very expensive to determine the true circuit functionality. We propose several heuristic algorithms to maximize the RE complexity based on don’t care based obfuscation and methodical gate selection. Thus, the goal of protecting the design IP from malicious end-users is achieved. It also makes it significantly harder for rogue elements in the supply chain to use, copy or replicate the same design with a different logic. We analyze the reverse engineering complexity by applying our obfuscation algorithm on ISCAS-85 benchmarks. Our experimental results indicate that significant reverse engineering complexity can be achieved at minimal design overhead (average area overhead for the proposed layout obfuscation methods is 5.51% and average delay overhead is about 7.732%). We discuss the strengths and limitations of our approach and suggest directions that may lead to improved logic encryption algorithms in the future. References: [1] R. Chakraborty and S. Bhunia, “HARPOON: An Obfuscation-Based SoC Design Methodology for Hardware Protection,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 28, no. 10, pp. 1493–1502, 2009. [2] J. A. Roy, F. Koushanfar, and I. L. Markov, “EPIC: Ending Piracy of Integrated Circuits,” in 2008 Design, Automation and Test in Europe, 2008, pp. 1069–1074. [3] J. Rajendran, M. Sam, O. Sinanoglu, and R. Karri, “Security Analysis of Integrated Circuit Camouflaging,” ACM Conference on Computer Communications and Security, 2013. [4] Bao Liu, Wang, B., "Embedded reconfigurable logic for ASIC design obfuscation against supply chain attacks,"Design, Automation and Test in Europe Conference and Exhibition (DATE), 2014 , vol., no., pp.1,6, 24-28 March 2014.
Resumo:
Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.