973 resultados para Host Identity Protocol (HIP)
Resumo:
[ES]Este Trabajo de Fin de Grado consiste en diseñar y desarrollar una solución de resilient communications para su uso en entornos de movilidad, en concreto, en entornos vehiculares. Se diseñara una solución que consiste en añadir soporte de múltiples vías de comunicación entre dos extremos para el protocolo de movilidad HIP. Este trabajo consiste en buscar una solución de resilient communications, ya que buscamos como objetivo principal aumentar la disponibilidad del sistema de comunicaciones, es decir, aumentar aspectos tales como la tolerancia a fallos y contra ataques de seguridad, concretamente contra ataques contra la disponibilidad.
Resumo:
Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.
Resumo:
[ES]Este proyecto tiene como objetivo analizar el rendimiento de diferentes técnicas criptográficas que el protocolo de movilidad HIP puede utilizar para proporcionar los servicios de seguridad que se determinen. Lo primero que se hará será seleccionar los diferentes algoritmos criptográficos que HIP podría utilizar para cubrir los servicios de seguridad considerados más relevantes, estos son autenticación, confidencialidad e integridad de datos. A continuación se identificarán los parámetros más significativos en relación al rendimiento y se definirá un escenario y un plan de pruebas para realizar las mediciones. Posteriormente se realizarán las mediciones con los algoritmos criptográficos previamente seleccionados, y por último se analizarán y valorarán los resultados obtenidos para así determinar la eficiencia de cada algoritmo criptográfico.
Resumo:
In this work, we examine unbalanced computation between an initiator and a responder that leads to resource exhaustion attacks in key exchange protocols. We construct models for two cryp-tographic protocols; one is the well-known Internet protocol named Secure Socket Layer (SSL) protocol, and the other one is the Host Identity Protocol (HIP) which has built-in DoS-resistant mechanisms. To examine such protocols, we develop a formal framework based on Timed Coloured Petri Nets (Timed CPNs) and use a simulation approach provided in CPN Tools to achieve a formal analysis. By adopting the key idea of Meadows' cost-based framework and re¯ning the de¯nition of operational costs during the protocol execution, our simulation provides an accurate cost estimate of protocol execution compar- ing among principals, as well as the percentage of successful connections from legitimate users, under four di®erent strategies of DoS attack.
Resumo:
One of the major concerns in an Intelligent Transportation System (ITS) scenario, such as that which may be found on a long-distance train service, is the provision of efficient communication services, satisfying users' expectations, and fulfilling even highly demanding application requirements, such as safety-oriented services. In an ITS scenario, it is common to have a significant amount of onboard devices that comprise a cluster of nodes (a mobile network) that demand connectivity to the outside networks. This demand has to be satisfied without service disruption. Consequently, the mobility of the mobile network has to be managed. Due to the nature of mobile networks, efficient and lightweight protocols are desired in the ITS context to ensure adequate service performance. However, the security is also a key factor in this scenario. Since the management of the mobility is essential for providing communications, the protocol for managing this mobility has to be protected. Furthermore, there are safety-oriented services in this scenario, so user application data should also be protected. Nevertheless, providing security is expensive in terms of efficiency. Based on this considerations, we have developed a solution for managing the network mobility for ITS scenarios: the NeMHIP protocol. This approach provides a secure management of network mobility in an efficient manner. In this article, we present this protocol and the strategy developed to maintain its security and efficiency in satisfactory levels. We also present the developed analytical models to analyze quantitatively the efficiency of the protocol. More specifically, we have developed models for assessing it in terms of signaling cost, which demonstrates that NeMHIP generates up to 73.47% less signaling compared to other relevant approaches. Therefore, the results obtained demonstrate that NeMHIP is the most efficient and secure solution for providing communications in mobile network scenarios such as in an ITS context.
Resumo:
A presente dissertação aborda as tensões vivenciadas no universo do hip-hop provenientes das relações de seus integrantes com a idéia de uma essência que definiria tal grupo cultural. Para tanto, trazemos uma breve problematização do conceito de identidade, como pano de fundo desta discussão, acreditando na sua relação com essa identidade essencializada do hip-hop. Portanto, tal contexto será analisado trabalhando com a hipótese de que essa relação ocorre de forma diferente, no discurso e nas práticas deste movimento. São priorizados os eixos temáticos política e mídia para o estudo destas problemáticas
Resumo:
Introduction: Spinal cord injury occurs due to interuption in nerve stimuli and could caused from traumatic and non-traumatic illnes. After spinal cord, there are problems in personal life activities affecting ou modifying personal life and provoking impacts in his own life. International Classification of Functioning, Disability and Healthy (ICF) consider and analyse more than the illness ou injury and include informations about functionality in differents domains as activities, participation and enviroment. Objective: The aim of this study is to evaluate functionality wheelchair athlets with spinal cord injury using ICF. Metodology: For this research, it was evaluated 60 athlets with spinal cord injury who were practicing wheelchair basqketball, using the Checklist corresponding to the main ICF categories and othes Identity Protocol with personal datas, lesion time, lesion level and functional classification from bwheelchair basketball. Results: In analyses, we identify in quartis data, that in Body Fucntion, median was 56,67% from all athlets with light and moderate qualifications; In Body Strutucture, the median was 60% for light qualifications; in Activities and Participation, this median corresponded to 91% and in Enviroment Factors, 51,67% feel that this enviroment was facilitator... (Complete abstract click electronic access below)
Resumo:
A Internet está inserida no cotidiano do indivíduo, e torna-se cada vez mais acessível por meio de diferentes tipos de dispositivos. Com isto, diversos estudos foram realizados com o intuito de avaliar os reflexos do seu uso excessivo na vida pessoal, acadêmica e profissional. Esta dissertação buscou identificar se a perda de concentração e o isolamento social são alguns dos reflexos individuais que o uso pessoal e excessivo de aplicativos de comunicação instantânea podem resultar no ambiente de trabalho. Entre as variáveis selecionadas para avaliar os aspectos do uso excessivo de comunicadores instantâneos tem-se a distração digital, o controle reduzido de impulso, o conforto social e a solidão. Através de uma abordagem de investigação quantitativa, utilizaram-se escalas aplicadas a uma amostra de 283 pessoas. Os dados foram analisados por meio de técnicas estatísticas multivariadas como a Análise Fatorial Exploratória e para auferir a relação entre as variáveis, a Regressão Linear Múltipla. Os resultados deste estudo confirmam que o uso excessivo de comunicadores instantâneos está positivamente relacionado com a perda de concentração, e a variável distração digital exerce uma influência maior do que o controle reduzido de impulso. De acordo com os resultados, não se podem afirmar que a solidão e o conforto social exercem relações com aumento do isolamento social, devido à ausência do relacionamento entre os construtos.
Resumo:
An investigation is carried out into the design of a small local computer network for eventual implementation on the University of Aston campus. Microprocessors are investigated as a possible choice for use as a node controller for reasons of cost and reliability. Since the network will be local, high speed lines of megabit order are proposed. After an introduction to several well known networks, various aspects of networks are discussed including packet switching, functions of a node and host-node protocol. Chapter three develops the network philosophy with an introduction to microprocessors. Various organisations of microprocessors into multicomputer and multiprocessor systems are discussed, together with methods of achieving reliabls computing. Chapter four presents the simulation model and its implentation as a computer program. The major modelling effort is to study the behaviour of messages queueing for access to the network and the message delay experienced on the network. Use is made of spectral analysis to determine the sampling frequency while Sxponentially Weighted Noving Averages are used for data smoothing.
Resumo:
Context: Very few authors have investigated the relationship between hip-abductor muscle strength and frontal-plane knee mechanics during running. Objective: To investigate this relationship using a 3-week hip-abductor muscle-strengthening program to identify changes in strength, pain, and biomechanics in runners with patellofemoral pain syndrome (PFPS). Design: Cohort study. Setting: University-based clinical research laboratory. Patients or Other Participants: Fifteen individuals (5 men, 10 women) with PFPS and 10 individuals without PFPS (4 men, 6 women) participated. Intervention(s): The patients with PFPS completed a 3-week hip-abductor strengthening protocol; control participants did not. Main Outcome Measure(s): The dependent variables of interest were maximal isometric hip-abductor muscle strength, 2-dimensional peak knee genu valgum angle, and stride-to-stride knee-joint variability. All measures were recorded at baseline and 3 weeks later. Between-groups differences were compared using repeated-measures analyses of variance. Results: At baseline, the PFPS group exhibited reduced strength, no difference in peak genu valgum angle, and increased stride-to-stride knee-joint variability compared with the control group. After the 3-week protocol, the PFPS group demonstrated increased strength, less pain, no change in peak genu valgum angle, and reduced stride-to-stride knee-joint variability compared with baseline. Conclusions: A 3-week hip-abductor muscle-strengthening protocol was effective in increasing muscle strength and decreasing pain and stride-to-stride knee-joint variability in individuals with PFPS. However, concomitant changes in peak knee genu valgum angle were not observed.
Resumo:
Purpose: To examine the relationship between hip abductor muscle (HABD) strength and the magnitude of pelvic drop (MPD) for patients with non-specific low back pain (NSLBP) and controls (CON) prior to and following a 3-week HABD strengthening protocol. At baseline, we hypothesized that NSLBP patients would exhibit reduced HABD strength and greater MPD compared to CON. Following the protocol, we hypothesized that strength would increase and MPD would decrease. Relevance: The Trendelenburg test (TT) is a common clinical test used to examine the ability of the HABD to maintain horizontal pelvic position during single limb stance. However, no study has specifically tested this theory. Moreover, no study has investigated the relationship between HABD strength and pelvic motion during walking or tested whether increased HABD strength would reduce the MPD. Methods: Quasi-experimental with 3-week exercise intervention. Fifteen NSLBP patients (32.5yrs,range 21-51yrs; VAS baseline: 5.3cm) and 10 CON (29.5yrs,range 22-47yrs) were recruited. Isometric HABD strength was measured using a force dynamometer and the average of three maximal voluntary contractions were normalized to body mass (N/kg). Two-dimensional MPD (degrees) was measured using a 60 Hz camera and was derived from two retroreflective-markers placed on the posterior superior iliac spines. MPD was measured while performing the static TT and while walking and averaged over 10 consecutive footfalls. NSLBP patients completed a 3-week HABD strengthening protocol consisting of 2 open-kinetic-chain exercises then all measures were repeated. Non-parametric analysis was used for group comparisons and correlation analysis. Results: At baseline, the NSLBP patients demonstrated 31% reduced HABD strength (mean=6.6 N/kg) compared to CON (mean=9.5 N/kg: p=0.03) and no significant differences in maximal pelvic frontal plane excursion while walking (NSLBP:mean=8.1°, CON:mean=7.1°: p=0.72). No significant correlations were measured between left HABD strength and right MPD (r=-0.37, p=0.11), or between right HABD strength and left MPD (r=-0.04, p=0.84) while performing the static TT. Following the 3-week strengthening protocol, NSLBP patients demonstrated a 12% improvement in strength (Post:mean=7.4 N/kg: p=0.02), a reduction in pain (VAS followup: 2.8cm), but no significant decreases in MPD while walking (p=0.92). Conclusions: NSLBP patients demonstrated reduced HABD strength at baseline and were able to increase strength and reduce pain in a 3-week period. However, despite increases in HABD strength, the NSLBP group exhibited similar MPD motion during the static TT and while walking compared to baseline and controls. Implications: The results suggest that the HABD alone may not be primarily responsible for controlling a horizontal pelvic position during static and dynamic conditions. Increasing the strength of the hip abductors resulted in a reduction of pain in NSLBP patients providing evidence for further research to identify specific musculature responsible for controlling pelvic motion.
Resumo:
This chapter is an analysis of a 100,000-word corpus consisting of message-board postings on hip-hop websites. A discourse analysis of this corpus reveals three strategies employed by the posters to identify themselves as members of the hip-hop community in the otherwise anonymous setting of the internet: (1) defined openings and closings, (2) repeated use of slang and taboo terms, and (3) performance of verbal art. Each strategy is characterized by the codification of non-standard grammar and pronunciations characteristic of speech, as well as by the use of non-standard orthography. The purpose of the discourse is shown to be a performance of identity, whereby language is used and recognized as the discursive construction of one’s hip-hop identity.
Resumo:
The human buccal micronucleus cytome assay (BMCyt) is one of the most widely used techniques to measure genetic damage in human population studies. Reducing protocol variability, assessing the role of confounders, and estimating a range of reference values are research priorities that will be addressed by the HUMNXL, collaborative study. The HUMNXL, project evaluates the impact of host factors, occupation, life-style, disease status, and protocol features on the occurrence of MN in exfoliated buccal cells. In addition, the study will provide a range of reference values for all cytome endpoints. A database of 5424 subjects with buccal MN values obtained from 30 laboratories worldwide was compiled and analyzed to investigate the influence of several conditions affecting MN frequency. Random effects models were mostly used to investigate MN predictors. The estimated spontaneous MN frequency was 0.74 parts per thousand (95% CI 0.52-1.05). Only staining among technical features influenced MN frequency, with an abnormal increase for non-DNA-specific stains. No effect of gender was evident, while the trend for age was highly significant (p < 0.001). Most occupational exposures and a diagnosis of cancer significantly increased MN and other endpoints frequencies. MN frequency increased in heavy smoking (>= 40 cig/day. FR = 1.37:95% CI 1.03-.82) and decreased with daily fruit consumption (FR = 0.68; 95% CI 0.50-0.91). The results of the HUMNXL, project identified priorities for validation studies, increased the basic knowledge of the assay, and contributed to the creation of a laboratory network which in perspective may allow the evaluation of disease risk associated with MN frequency. (C) 2011 Elsevier B.V. All rights reserved.