804 resultados para key management


Relevância:

60.00% 60.00%

Publicador:

Resumo:

We consider the problem of how to maximize secure connectivity of multi-hop wireless ad hoc networks after deployment. Two approaches, based on graph augmentation problems with nonlinear edge costs, are formulated. The first one is based on establishing a secret key using only the links that are already secured by secret keys. This problem is in NP-hard and does not accept polynomial time approximation scheme PTAS since minimum cutsets to be augmented do not admit constant costs. The second one is based of increasing the power level between a pair of nodes that has a secret key to enable them physically connect. This problem can be formulated as the optimal key establishment problem with interference constraints with bi-objectives: (i) maximizing the concurrent key establishment flow, (ii) minimizing the cost. We show that both problems are NP-hard and MAX-SNP (i.e., it is NP-hard to approximate them within a factor of 1 + e for e > 0 ) with a reduction to MAX3SAT problem. Thus, we design and implement a fully distributed algorithm for authenticated key establishment in wireless sensor networks where each sensor knows only its one- hop neighborhood. Our witness based approaches find witnesses in multi-hop neighborhood to authenticate the key establishment between two sensor nodes which do not share a key and which are not connected through a secure path.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Across time, companies have increasingly made public commitments to sustainable development and to reducing their impacts on climate change. Management remuneration plans (MRPs) are a key mechanism to motivate managers to achieve corporate goals. We review the MRPs negotiated with key management personnel in a sample of large Australian carbon-intensive companies. Our results show that, as in past decades, the companies in our sample have MRPs in place that continue to fixate on financial performance. We argue that this provides evidence of a disconnection, or ‘decoupling’, between the sustainability-related rhetoric of the sample companies, and their ‘real’ organisational practices and priorities.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Vehicular Ad-hoc Networks (VANETs) can make roads safer, cleaner, and smarter. It can offer a wide range of services, which can be safety and non-safety related. Many safety-related VANETs applications are real-time and mission critical, which would require strict guarantee of security and reliability. Even non-safety related multimedia applications, which will play an important role in the future, will require security support. Lack of such security and privacy in VANETs is one of the key hindrances to the wide spread implementations of it. An insecure and unreliable VANET can be more dangerous than the system without VANET support. So it is essential to make sure that “life-critical safety” information is secure enough to rely on. Securing the VANETs along with appropriate protection of the privacy drivers or vehicle owners is a very challenging task. In this work we summarize the attacks, corresponding security requirements and challenges in VANETs. We also present the most popular generic security policies which are based on prevention as well detection methods. Many VANETs applications require system-wide security support rather than individual layer from the VANETs’ protocol stack. In this work we will review the existing works in the perspective of holistic approach of security. Finally, we will provide some possible future directions to achieve system-wide security as well as privacy-friendly security in VANETs.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

This report presents the final deliverable from the project titled Conceptual and statistical framework for a water quality component of an integrated report card’ funded by the Marine and Tropical Sciences Research Facility (MTSRF; Project 3.7.7). The key management driver of this, and a number of other MTSRF projects concerned with indicator development, is the requirement for state and federal government authorities and other stakeholders to provide robust assessments of the present ‘state’ or ‘health’ of regional ecosystems in the Great Barrier Reef (GBR) catchments and adjacent marine waters. An integrated report card format, that encompasses both biophysical and socioeconomic factors, is an appropriate framework through which to deliver these assessments and meet a variety of reporting requirements. It is now well recognised that a ‘report card’ format for environmental reporting is very effective for community and stakeholder communication and engagement, and can be a key driver in galvanising community and political commitment and action. Although a report card it needs to be understandable by all levels of the community, it also needs to be underpinned by sound, quality-assured science. In this regard this project was to develop approaches to address the statistical issues that arise from amalgamation or integration of sets of discrete indicators into a final score or assessment of the state of the system. In brief, the two main issues are (1) selecting, measuring and interpreting specific indicators that vary both in space and time, and (2) integrating a range of indicators in such a way as to provide a succinct but robust overview of the state of the system. Although there is considerable research and knowledge of the use of indicators to inform the management of ecological, social and economic systems, methods on how to best to integrate multiple disparate indicators remain poorly developed. Therefore the objective of this project was to (i) focus on statistical approaches aimed at ensuring that estimates of individual indicators are as robust as possible, and (ii) present methods that can be used to report on the overall state of the system by integrating estimates of individual indicators. It was agreed at the outset, that this project was to focus on developing methods for a water quality report card. This was driven largely by the requirements of Reef Water Quality Protection Plan (RWQPP) and led to strong partner engagement with the Reef Water Quality Partnership.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Beef cattle grazing is the dominant land use in the extensive tropical and sub-tropical rangelands of northern Australia. Despite the considerable knowledge on land and herd management gained from both research and practical experience, the adoption of improved management is limited by an inability to predict how changes in practices and combinations of practices will affect cattle production, economic returns and resource condition. To address these issues, past Australian and international research relating to four management factors that affect productivity and resource condition was reviewed in order to identify key management principles. The four management factors considered were stocking rates, pasture resting, prescribed fire, and fencing and water point development for managing grazing distribution. Four management principles for sound grazing management in northern Australia were formulated as follows: (1) manage stocking rates to meet goals for livestock production and land condition; (2) rest pastures to maintain them in good condition or to restore them from poor condition to increase pasture productivity; (3) devise and apply fire regimes that enhance the condition of grazing land and livestock productivity while minimising undesirable impacts; and (4) use fencing and water points to manipulate grazing distribution. Each principle is supported by several more specific guidelines. These principles and guidelines, and the supporting research on which they are based, are presented.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Semi-natural grasslands are the most important agricultural areas for biodiversity. The present study investigates the effects of traditional livestock grazing and mowing on plant species richness, the main emphasis being on cattle grazing in mesic semi-natural grasslands. The two reviews provide a thorough assessment of the multifaceted impacts and importance of grazing and mowing management to plant species richness. It is emphasized that livestock grazing and mowing have partially compensated the suppression of major natural disturbances by humans and mitigated the negative effects of eutrophication. This hypothesis has important consequences for nature conservation: A large proportion of European species originally adapted to natural disturbances may be at present dependent on livestock grazing and / or mowing. Furthermore, grazing and mowing are key management methods to mitigate effects of nutrient-enrichment. The species composition and richness in old (continuously grazed), new (grazing restarting 3-8 years ago) and abandoned (over 10 years) pastures differed consistently across a range of spatial scales, and was intermediate in new pastures compared to old and abandoned pastures. In mesic grasslands most plant species were shown to benefit from cattle grazing. Indicator species of biologically valuable grasslands and rare species were more abundant in grazed than in abandoned grasslands. Steep S-SW-facing slopes are the most suitable sites for many grassland plants and should be prioritized in grassland restoration. The proportion of species trait groups benefiting from grazing was higher in mesic semi-natural grasslands than in dry and wet grasslands. Consequently, species trait responses to grazing and the effectiveness of the natural factors limiting plant growth may be intimately linked High plant species richness of traditionally mowed and grazed areas is explained by numerous factors which operate on different spatial scales. Particularly important for maintaining large scale plant species richness are evolutionary and mitigation factors. Grazing and mowing cause a shift towards the conditions that have occurred during the evolutionary history of European plant species by modifying key ecological factors (nutrients, pH and light). The results of this Dissertation suggest that restoration of semi-natural grasslands by private farmers is potentially a useful method to manage biodiversity in the agricultural landscape. However, the quality of management is commonly improper, particularly due to financial constraints. For enhanced success of restoration, management regulations in the agri-environment scheme need to be defined more explicitly and the scheme should be revised to encourage management of biodiversity.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A Delay Tolerant Network (DTN) is a dynamic, fragmented, and ephemeral network formed by a large number of highly mobile nodes. DTNs are ephemeral networks with highly mobile autonomous nodes. This requires distributed and self-organised approaches to trust management. Revocation and replacement of security credentials under adversarial influence by preserving the trust on the entity is still an open problem. Existing methods are mostly limited to detection and removal of malicious nodes. This paper makes use of the mobility property to provide a distributed, self-organising, and scalable revocation and replacement scheme. The proposed scheme effectively utilises the Leverage of Common Friends (LCF) trust system concepts to revoke compromised security credentials, replace them with new ones, whilst preserving the trust on them. The level of achieved entity confidence is thereby preserved. Security and performance of the proposed scheme is evaluated using an experimental data set in comparison with other schemes based around the LCF concept. Our extensive experimental results show that the proposed scheme distributes replacement credentials up to 35% faster and spreads spoofed credentials of strong collaborating adversaries up to 50% slower without causing any significant increase on the communication and storage overheads, when compared to other LCF based schemes.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Mobile ad hoc networks (MANETs) is one of the successful wireless network paradigms which offers unrestricted mobility without depending on any underlying infrastructure. MANETs have become an exciting and im- portant technology in recent years because of the rapid proliferation of variety of wireless devices, and increased use of ad hoc networks in various applications. Like any other networks, MANETs are also prone to variety of attacks majorly in routing side, most of the proposed secured routing solutions based on cryptography and authentication methods have greater overhead, which results in latency problems and resource crunch problems, especially in energy side. The successful working of these mechanisms also depends on secured key management involving a trusted third authority, which is generally difficult to implement in MANET environ-ment due to volatile topology. Designing a secured routing algorithm for MANETs which incorporates the notion of trust without maintaining any trusted third entity is an interesting research problem in recent years. This paper propose a new trust model based on cognitive reasoning,which associates the notion of trust with all the member nodes of MANETs using a novel Behaviors-Observations- Beliefs(BOB) model. These trust values are used for detec- tion and prevention of malicious and dishonest nodes while routing the data. The proposed trust model works with the DTM-DSR protocol, which involves computation of direct trust between any two nodes using cognitive knowledge. We have taken care of trust fading over time, rewards, and penalties while computing the trustworthiness of a node and also route. A simulator is developed for testing the proposed algorithm, the results of experiments shows incorporation of cognitive reasoning for computation of trust in routing effectively detects intrusions in MANET environment, and generates more reliable routes for secured routing of data.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The commercial bottom trawl fishery for Pacific ocean shrimp, Pandalus jordani, or pink shrimp, operates mostly off the west coast of the contiguous United States. The California portion of the fishery has not been thoroughly documented or reviewed since the 1991 fishing season, despite its fluctuating more during the last 16 years (1992–2007) than at any other period in its 56-year history. We used fishery-dependent data, California Department of Fish and Game commercial landing receipts and logbook data, to analyze trends and review the California pink shrimp trawl fishery from 1992 to 2007. In particular, we focus on the most recent years of the fishery (2001–07) to highlight the gear developments and key management measures implemented in the fishery. The fishery is primarily driven by market conditions and is highly regulated by both state and Federal management agencies. Several key regulatory measures implemented during this decade have had significant effects on the fishery. For example, the requirement of a Bycatch Reduction Device on trawl nets targeting pink shrimp was approved in 2001 and has greatly reduced levels of finfish bycatch. Fishery production has declined, particularly in recent years, and may be attributed to decreased market prices, followed by reduced fishermen participation; both of which are related to changes in the processing sector and demand for the product.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The National Oceanic and Atmospheric Administration (NOAA), in cooperation with the New Jersey Marine Sciences Consortium (NJMSC), hosted a workshop at Rutgers University on 19-21 September 2005 to explore ways to link the U.S. Integrated Ocean Observing System (IOOS) to the emerging infrastructure of the National Water Quality Monitoring Network (NWQMN). Participating partners included the Mid-Atlantic Coastal Ocean Observing Regional Association, U.S. Geological Survey, Rutgers University Coastal Ocean Observing Laboratory, and the New Jersey Sea Grant College. The workshop was designed to highlight the importance of ecological and human health linkages in the movement of materials, nutrients, organisms and contaminants along the Delaware Bay watershed-estuary-coastal waters gradient (hereinafter, the “Delaware Bay Ecosystem [DBE]”), and to address specific water quality issues in the mid-Atlantic region, especially the area comprising the Delaware River drainage and near-shore waters. Attendees included federal, state and municipal officials, coastal managers, members of academic and research institutions, and industry representatives. The primary goal of the effort was to identify key management issues and related scientific questions that could be addressed by a comprehensive IOOS-NWQMN infrastructure (US Commission on Ocean Policy 2004; U.S. Ocean Action Plan 2004). At a minimum, cooperative efforts among the three federal agencies (NOAA, USGS and EPA) involved in water quality monitoring were required. Further and recommended by the U.S. Commission on Ocean Policy, outreach to states, regional organizations, and tribes was necessary to develop an efficient system of data gathering, quality assurance and quality control protocols, product development, and information dissemination.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Experiences from smart grid cyber-security incidents in the past decade have raised questions on the applicability and effectiveness of security measures and protection mechanisms applied to the grid. In this chapter we focus on the security measures applied under real circumstances in today’s smart grid systems. Beginning from real world example implementations, we first review cyber-security facts that affected the electrical grid, from US blackout incidents, to the Dragonfly cyber-espionage campaign currently focusing on US and European energy firms. Provided a real world setting, we give information related to energy management of a smart grid looking also in the optimization techniques that power control engineers perform into the grid components. We examine the application of various security tools in smart grid systems, such as intrusion detection systems, smart meter authentication and key management using Physical Unclonable Functions, security analytics and resilient control algorithms. Furthermore we present evaluation use cases of security tools applied on smart grid infrastructure test-beds that could be proved important prior to their application in the real grid, describing a smart grid intrusion detection system application and security analytics results. Anticipated experimental results from the use-cases and conclusions about the successful transitions of security measures to real world smart grid operations will be presented at the end of this chapter.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Secure group communication is a paradigm that primarily designates one-to-many communication security. The proposed works relevant to secure group communication have predominantly considered the whole network as being a single group managed by a central powerful node capable of supporting heavy communication, computation and storage cost. However, a typical Wireless Sensor Network (WSN) may contain several groups, and each one is maintained by a sensor node (the group controller) with constrained resources. Moreover, the previously proposed schemes require a multicast routing support to deliver the rekeying messages. Nevertheless, multicast routing can incur heavy storage and communication overheads in the case of a wireless sensor network. Due to these two major limitations, we have reckoned it necessary to propose a new secure group communication with a lightweight rekeying process. Our proposal overcomes the two limitations mentioned above, and can be applied to a homogeneous WSN with resource-constrained nodes with no need for a multicast routing support. Actually, the analysis and simulation results have clearly demonstrated that our scheme outperforms the previous well-known solutions.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Grasslands restoration is a key management tool contributing to the long-term maintenance of insect populations, providing functional connectivity and mitigating against extinction debt across landscapes. As knowledge of grassland insect communities is limited, the lag between the initiation of restoration and the ability of these new habitats to contribute to such processes is unclear. Using ten data sets, ranging from 3 to 14 years, we investigate the lag between restoration and the establishment of phytophagous beetle assemblages typical of species rich grasslands. We used traits and ecological characteristics to determine factors limiting beetle colonisation, and also considered how food-web structure changed during restoration. For sites where seed addition of host-plants occurred the success in replicating beetle assemblages increased over time following a negative exponential function. Extrapolation beyond the existing data set tentatively suggested that success would plateau after 20 years, representing a c. 60% increase in assemblage similarity to target grasslands. In the absence of seed addition, similarity to the target grasslands showed no increase over time. Where seed addition was used the connectance of plant-herbivore food webs decreased over time, approaching values typical of species rich grasslands after c. 7 years. This trend was, however, dependent on the inclusion of a single site containing data in excess of 6 years of restoration management. Beetles not capable of flight, those showing high degrees of host-plant specialisation and species feeding on nationally rare host plants take between 1 and 3 years longer to colonise. Successful grassland restoration is underpinned by the establishment of host-plants, although individual species traits compound the effects of poor host-plant establishment to slow colonisation. The use of pro-active grassland restoration to mitigate against future environmental change should account for lag periods in excess of 10 years if the value of these habitats is to be fully realised.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Grasslands restoration is a key management tool contributing to the long-term maintenance of insect populations, providing functional connectivity and mitigating against extinction debt across landscapes. As knowledge of grassland insect communities is limited, the lag between the initiation of restoration and the ability of these new habitats to contribute to the successful enhancement of native biodiversity is unclear. Using two long term data sets, we investigate differences in successional trajectories during the establishment of butterfly (11 years) and phytophagous beetle (13 years) communities during the recreation of calcareous grassland. Overall restoration success was higher for the butterflies than the beetles. However, both shared a general pattern of rapidly increasing restoration success over the first five years, awhich approached an asymptote after c. 10 years. The use of pro-active grassland restoration to mitigate against future environmental change therefore needs to account for such time lag if the value of these habitats is to be fully realised.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

RFID (Radio Frequency Identification) identifies object by using the radio frequency which is a non-contact automatic identification technique. This technology has shown its powerful practical value and potential in the field of manufacturing, retailing, logistics and hospital automation. Unfortunately, the key problem that impacts the application of RFID system is the security of the information. Recently, researchers have demonstrated solutions to security threats in RFID technology. Among these solutions are several key management protocols. This master dissertations presents a performance evaluation of Neural Cryptography and Diffie-Hellman protocols in RFID systems. For this, we measure the processing time inherent in these protocols. The tests was developed on FPGA (Field-Programmable Gate Array) platform with Nios IIr embedded processor. The research methodology is based on the aggregation of knowledge to development of new RFID systems through a comparative analysis between these two protocols. The main contributions of this work are: performance evaluation of protocols (Diffie-Hellman encryption and Neural) on embedded platform and a survey on RFID security threats. According to the results the Diffie-Hellman key agreement protocol is more suitable for RFID systems