Analyzing Security Protocols in Hierarchical Networks

Author(s):  
Ye Zhang ◽  
Hanne Riis Nielson
Author(s):  
Manas Kumar Yogi ◽  
◽  
L. Yamuna ◽  
P. Surayanka ◽  
◽  
...  

Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Author(s):  
Topher L. McDougal

In some cases of insurgency, the combat frontier is contested and erratic, as rebels target cities as their economic prey. In other cases, it is tidy and stable, seemingly representing an equilibrium in which cities are effectively protected from violent non-state actors. What factors account for these differences in the interface urban-based states and rural-based challengers? To explore this question, this book examines two regions representing two dramatically different outcomes. In West Africa (Liberia and Sierra Leone), capital cities became economic targets for rebels, who posed dire threats to the survival of the state. In Maoist India, despite an insurgent ideology aiming to overthrow the state via a strategy of progressive city capture, the combat frontier effectively firewalls cities from Maoist violence. This book argues that trade networks underpinning the economic relationship between rural and urban areas—termed “interstitial economies”—may differ dramatically in their impact on (and response to) the combat frontier. It explains rebel predatory tendencies toward cities as a function of transport networks allowing monopoly profits to be made by urban-based traders. It explains combat frontier delineation as a function of the social structure of the trade networks: hierarchical networks permit elite–elite bargains that cohere the frontier. These factors represent what might be termed respectively the “hardware” and “software” of the rural–urban economic relationship. Of interest to any student of political economy and violence, this book presents new arguments and insights about the relationships between violence and the economy, predation and production, core and periphery.


Author(s):  
Segundo Moises Toapanta Toapanta ◽  
Luis Enrique Mafla Gallegos ◽  
Alex Enrique Aranda Alvarado ◽  
Maximo Prado Solis

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Arslan Shafique ◽  
Abid Mehmood ◽  
Mourad Elhadef

2015 ◽  
Vol 17 (1) ◽  
pp. 1-45 ◽  
Author(s):  
Rémy Chrétien ◽  
Véronique Cortier ◽  
Stéphanie Delaune

Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Author(s):  
Chao Feng ◽  
Yuebing Chen ◽  
Quan Zhang ◽  
Chaojing Tang
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document