996 resultados para distributed hash table


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation's critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a 'distance metric'. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there are few research works which combine RFID ownership transfer schemes with Cloud computing. Subsequently, this paper points out the weaknesses in two protocols proposed by Xie et al. (2013) [3] and Doss et al. (2013) [9]. To solve the security issues of these protocols, we present a provably secure RFID ownership transfer protocol which achieves the security and privacy requirements for cloud-based applications. To be more specific, the communication channels among the tags, mobile readers and the cloud database are insecure. Besides, an encrypted hash table is used in the cloud database. Next, the presented protocol not only meets backward untraceability and the proposed strong forward untraceability, but also resists against replay attacks, tracing attacks, inner reader malicious impersonation attacks, tag impersonation attacks and desynchronization attacks. The comparisons of security and performance properties show that the proposed protocol has more security, higher efficiency and better scalability compared with other schemes.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Cover title.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Background Failure to convey time-critical information to team members during surgery diminishes members’ perception of the dynamic information relevant to their task, and compromises shared situational awareness. This research reports the dialog around clinical decisions made by team members in the time-pressured and high-risk context of surgery, and the impact of these communications on shared situational awareness. Methods Fieldwork methods were used to capture the dynamic integration of individual and situational elements in surgery that provided the backdrop for clinical decisions. Nineteen semi structured interviews were performed with 24 participants from anaesthesia, surgery, and nursing in the operating rooms of a large metropolitan hospital in Queensland, Australia. Thematic analysis was used. Results: The domain “coordinating decisions in surgery” was generated from textual data. Within this domain, three themes illustrated the dialog of clinical decisions, i.e., synchronizing and strategizing actions, sharing local knowledge, and planning contingency decisions based on priority. Conclusion Strategies used to convey decisions that enhanced shared situational awareness included the use of “self-talk”, closed-loop communications, and “overhearing” conversations that occurred at the operating table. Behaviours’ that compromised a team’s shared situational awareness included tunnelling and fixating on one aspect of the situation.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

In this paper, we propose and evaluate an implementation of a prototype scalable web server. The prototype consists of a load-balanced cluster of hosts that collectively accept and service TCP connections. The host IP addresses are advertised using the Round Robin DNS technique, allowing any host to receive requests from any client. Once a client attempts to establish a TCP connection with one of the hosts, a decision is made as to whether or not the connection should be redirected to a different host---namely, the host with the lowest number of established connections. We use the low-overhead Distributed Packet Rewriting (DPR) technique to redirect TCP connections. In our prototype, each host keeps information about connections in hash tables and linked lists. Every time a packet arrives, it is examined to see if it has to be redirected or not. Load information is maintained using periodic broadcasts amongst the cluster hosts.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The results of the analysis of samples of the Northern Dvina River's suspended particulate matter obtained by the sedimentation method from large water volumes in the periods of the spring high water and summer low water are presented. By the method of sequential leaching using different reagents, four fractions have been separated: the F1 is the sorbed complex and carbonates, the F2 is the amorphous hydroxides of Fe and Mn, the F3 is the form connected with the organic matter, and the F4 is the residual or silicate-detrital (inert) form. The data have shown that all ten elements determined were grouped with respect to the ratio of the distinguished forms: F4 is the predominant form for Al and Fe (73-88% of all the forms; however, the summer sample contains only 38% of this form of iron, and F2 is the predominant form for this period with 46.6%). As to Mn, the F1, F2, and F4 are nearly equally distributed in the spring high water samples, and only the F3 form is less important (5.4%). In the summer sample, the manganese sorbed complex is predominant (53.5%); for Cu, Ni, Cr, and Co, the inert F4 form is predominant (60-70%) in the sample of the spring suspended matter. The summer low water suspended matter has a lower F4 contribution (25-45%); for Zn, Pb, and Cd, the equal distribution of the forms in the spring samples is typical, while the summer suspended matter differs by the F2 form's predominance (53-61% for Zn and Pb). The main conclusion from the acquired data is that the geochemical mobility of all the studied elements, except for cadmium, in the summer low water suspended matter is higher than in the spring suspended matter. The more intensive biogeochemical processes in August, the high level of organic matter, and the higher contribution of phytoplankton lead to the intensification of the metals' geochemical activity in the Northern Dvina suspended matter in the end of the summer compared to the spring high water period when the physical processes are predominant over the biogeochemical ones due to the high speeds of the freshened waters flow.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Phosphorus content in the surface layer of bottom sediments varies from 0.07% to 0.73%. Clayey radiolarian and radiolarian clayey oozes contain 0.12% P, miopelagic clays 0.21% P, and sediments with high iron and manganese concentrations 0.46% P (average contents). Phosphorus content of iron-manganese nodules varies from 0.14% to 0.39%, average 0.19%. Correlation between phosphorus contents in nodules and surrounding sediments is indicated indirectly by P/Fe ratio. Phosphorus is non-uniformly distributed in some nodules and sometimes correlates with iron. Accumulation of phosphorus in iron-manganese nodules is governed by a degree of manganese predominance in ore components.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A six-fold increase in the rate of accumulation of Al in north and central Atlantic and Pacific Ocean sediments indicates vastly increased denudation of the continents during the past 15 Ma. The increase is more apparent in hemipelagic than pelagic sites, demonstrating widely distributed local controls. Similarities in the rate of increase in the Atlantic and Pacific show that tectonic elevation is not responsible for the difference in sedimentation rate. Also, similarities in the difference at sites of low and high latitude suggest that glaciation is not the most significant source. A lack of correspondence between sedimentation rates and Vail's sea-level curve similarly rule out that effect. The conclusion drawn here is that worldwide climatic deterioration during the late Tertiary is the explanation for the striking increase in detrital sedimentation in the World ocean.