scholarly journals The geopolitics behind the routes data travel: a case study of Iran

2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Loqman Salamatian ◽  
Frédérick Douzet ◽  
Kavé Salamatian ◽  
Kévin Limonier

Abstract In November 2019, in the wake of political demonstrations against the regime, Iran managed to selectively cut off most traffic from the global Internet while fully operating its own domestic network. It seemingly confirmed the main hypothesis our research had led us to, based on prior observation of data routing: Iran’s architecture of connectivity enables selective censorship of international traffic. This paper examines, through the case of Iran, how states can leverage the Border Gateway Protocol (BGP) as a tool of geopolitical control and what are the trade-offs they face. This question raises a methodological question that we also address: how the analysis of BGP can infer and document these strategies of territorialization of cyberspace. The Internet is a network of networks where each network is an autonomous system. Autonomous systems (ASes) are independent administrative entities controlled by a variety of actors such as governments, companies and universities. Their administrators have to agree and communicate on the path followed by packets travelling across the Internet, which is made possible by BGP. Agreements between ASes are often confidential but BGP requires neighbouring ASes to interact with each other in order to coordinate routing through the constant release of connectivity update messages. These messages announce the availability (or withdrawal) of a sequence of ASes that can be followed to reach an IP address prefix. In our study, we inferred the structure of Iran's connectivity through the capture and analysis of these BGP announcements. We show how the particularities of Iran's BGP and connectivity structure can enable active measures, such as censorship, both internally and externally throughout the network. We argue that Iran has found a way to reconcile a priori conflicting strategic goals: developing a self-sustaining and resilient domestic Internet, but with tight control at its borders. It thus enables the regime to leverage connectivity as a tool of censorship in the face of social instability and as a tool of regional influence in the context of strategic competition.

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Yichuan Wang ◽  
Han Yu ◽  
Xinhong Hei ◽  
Binbin Bai ◽  
Wenjiang Ji

Internet of Things (IoT) is the development and extension of computer, Internet, and mobile communication network and other related technologies, and in the new era of development, it increasingly shows its important role. To play the role of the Internet of Things, it is especially important to strengthen the network communication information security system construction, which is an important foundation for the Internet of Things business relying on Internet technology. Therefore, the communication protocol between IoT devices is a point that cannot be ignored, especially in recent years; the emergence of a large number of botnet and malicious communication has seriously threatened the communication security between connected devices. Therefore, it is necessary to identify these unknown protocols by reverse analysis. Although the development of protocol analysis technology has been quite mature, it is impossible to identify and analyze the unknown protocols of pure bitstreams with zero a priori knowledge using existing protocol analysis tools. In this paper, we make improvements to the existing protocol analysis algorithm, summarize and learn from the experience and knowledge of our predecessors, improve the algorithm ideas based on the Apriori algorithm idea, and perform feature string finding under the idea of composite features of CFI (Combined Frequent Items) algorithm. The advantages of existing algorithm ideas are combined together to finally propose a more efficient OFS (Optimal Feature Strings) algorithm with better performance in the face of bitstream protocol feature extraction problems.


2019 ◽  
Vol 6 (1) ◽  
pp. 47-63 ◽  
Author(s):  
Bettina Nissen ◽  
Ella Tallyn ◽  
Kate Symons

Abstract New digital technologies such as Blockchain and smart contracting are rapidly changing the face of value exchange, and present new opportunities and challenges for designers. Designers and data specialists are at the forefront of exploring new ways of exchanging value, using Blockchain, cryptocurrencies, smart contracting and the direct exchanges between things made possible by the Internet of Things (Tallyn et al. 2018; Pschetz et al. 2019). For researchers and designers in areas of Human Computer Interaction (HCI) and Interaction Design to better understand and explore the implications of these emerging and future technologies as Distributed Autonomous Organisations (DAOs) we delivered a workshop at the ACM conference Designing Interactive Systems (DIS) in Edinburgh in 2017 (Nissen et al. 2017). The workshop aimed to use the lens of DAOs to introduce the principle that products and services may soon be owned and managed collectively and not by one person or authority, thus challenging traditional concepts of ownership and power. This workshop builds on established HCI research exploring the role of technology in financial interactions and designing for the rapidly changing world of technology and value exchange (Kaye et al. 2014; Malmborg et al. 2015; Millen et al. 2015; Vines et al. 2014). Beyond this, the HCI community has started to explore these technologies beyond issues of finance, money and collaborative practice, focusing on the implications of these emerging but rapidly ascending distributed systems in more applied contexts (Elsden et al. 2018a). By bringing together designers and researchers with different experiences and knowledge of distributed systems, the aim of this workshop was two-fold. First, to further understand, develop and critique these new forms of distributed power and ownership and second, to practically explore how to design interactive products and services that enable, challenge or disrupt existing and emerging models.


Daedalus ◽  
2011 ◽  
Vol 140 (4) ◽  
pp. 108-120 ◽  
Author(s):  
R. Kelly Garrett ◽  
Paul Resnick

Must the Internet promote political fragmentation? Although this is a possible outcome of personalized online news, we argue that other futures are possible and that thoughtful design could promote more socially desirable behavior. Research has shown that individuals crave opinion reinforcement more than they avoid exposure to diverse viewpoints and that, in many situations, hearing the other side is desirable. We suggest that, equipped with this knowledge, software designers ought to create tools that encourage and facilitate consumption of diverse news streams, making users, and society, better off. We propose several techniques to help achieve this goal. One approach focuses on making useful or intriguing opinion-challenges more accessible. The other centers on nudging people toward diversity by creating environments that accentuate its benefits. Advancing research in this area is critical in the face of increasingly partisan news media, and we believe these strategies can help.


2022 ◽  
Vol 18 (1) ◽  
pp. 1-34
Author(s):  
Fan Yang ◽  
Ashok Samraj Thangarajan ◽  
Gowri Sankar Ramachandran ◽  
Wouter Joosen ◽  
Danny Hughes

Battery-free Internet-of-Things devices equipped with energy harvesting hold the promise of extended operational lifetime, reduced maintenance costs, and lower environmental impact. Despite this clear potential, it remains complex to develop applications that deliver sustainable operation in the face of variable energy availability and dynamic energy demands. This article aims to reduce this complexity by introducing AsTAR, an energy-aware task scheduler that automatically adapts task execution rates to match available environmental energy. AsTAR enables the developer to prioritize tasks based upon their importance, energy consumption, or a weighted combination thereof. In contrast to prior approaches, AsTAR is autonomous and self-adaptive, requiring no a priori modeling of the environment or hardware platforms. We evaluate AsTAR based on its capability to efficiently deliver sustainable operation for multiple tasks on heterogeneous platforms under dynamic environmental conditions. Our evaluation shows that (1) comparing to conventional approaches, AsTAR guarantees Sustainability by maintaining a user-defined optimum level of charge, and (2) AsTAR reacts quickly to environmental and platform changes, and achieves Efficiency by allocating all the surplus resources following the developer-specified task priorities. (3) Last, the benefits of AsTAR are achieved with minimal performance overhead in terms of memory, computation, and energy.


Author(s):  
Mark W. Mueller ◽  
Seung Jae Lee ◽  
Raffaello D’Andrea

The design and control of drones remain areas of active research, and here we review recent progress in this field. In this article, we discuss the design objectives and related physical scaling laws, focusing on energy consumption, agility and speed, and survivability and robustness. We divide the control of such vehicles into low-level stabilization and higher-level planning such as motion planning, and we argue that a highly relevant problem is the integration of sensing with control and planning. Lastly, we describe some vehicle morphologies and the trade-offs that they represent. We specifically compare multicopters with winged designs and consider the effects of multivehicle teams. Expected final online publication date for the Annual Review of Control, Robotics, and Autonomous Systems, Volume 5 is May 2022. Please see http://www.annualreviews.org/page/journal/pubdates for revised estimates.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rhoydah Nyambane

Purpose The purpose of this paper is to establish the place of the printed book in the era of technological advancement with the assumption that the print media is facing imminent death in the face of readily available and convenient online information. Also the paper aims to assess how the development of new technologies have affected the production, circulation and readership of the printed book, especially among the young generation. Design/methodology/approach Explanatory study was used with closed-ended approach to collect data from 50 students of the Technical University of Kenya and 5 key informant interviews with selected book publishers in Nairobi. The uses and gratification theory was used to explore the knowledge-seeking behavior among the respondents. Findings Findings showed that more than 80% of the respondents preferred the internet to the printed book, which, according to them, has no future in the face of technological advancement. Book publishers, on the other hand, felt that the printed book has a bright future among specific audiences who are committed to it, and especially those in the rural areas who have no access to the internet. While they agreed that the internet has posed a major challenge to the sales and readership of the printed book significantly, it is helping in marketing the printed book as opposed to killing it. New bookshops in Nairobi and modern libraries in high schools, tertiary institutions and universities demonstrate that the printed book is not dying soon. Research limitations/implications The researcher experienced challenges in data collection as the respondents were busy preparing for final examinations and hence many of them were not willing to spare time to fill the questionnaire. To solve this, the researcher had to spend more time to collect data as opposed to if the students were free and ready to participate in the study without any pressure. Practical implications The findings can be used as a basis for further research to widen the scope that can help bring a wider perspective to the topic. The results can also inform policy guidelines on the topic and also contribute to the body of knowledge. Social implications The topic touches on social phenomena that are affecting a number of young people and their information-seeking habits in the era of digital revolution. The way the young generation seek and use information should be of interest not only to academic staff but also to policymakers. Originality/value The paper is original based on primary data that was collected by the researcher from the respondents. It is backed by secondary data to bridge the gap between theory and practice.


2014 ◽  
Vol 13 (3) ◽  
pp. 376-387
Author(s):  
Tim Hwang ◽  
Christina Xu

Editor’s Note What follows is an interview between the co-editors of this issue, Laine Nooney and Laura Portwood-Stacer, and two of the founders of ROFLCon, Tim Hwang and Christina Xu. Many of this issue’s themes are echoed in Xu and Hwang’s account of the emergence of ROFLCon: people with shared sensibilities just wanting to hang out in shared space; amateur content creation giving way to commercialism; ambivalence in the face of ‘mainstreamed’ internet culture; and ongoing negotiations with anonymity, pseudonymity, and fame. Additionally, Hwang and Xu were adamant in pointing out the heterogeneity of ‘internet culture’ and the impossibility of defining such a phenomenon. Their words caution academics and other chroniclers about the difficulties of understanding and faithfully representing all the constituencies involved in cultural phenomena on the internet. Additionally, we were struck by the sense of humor running through Tim and Christina’s stories – as you read, please imagine the words accompanied by an ironic tone and copious laughter from all parties. If there is a significant takeaway from our conversation, and indeed from ROFLCon at large, it would be that behind every meme there stand many, many people in all their complexity – creating, consuming, sharing, and bringing the LOLs.


2017 ◽  
Author(s):  
Etienne P. LeBel ◽  
Derek Michael Berger ◽  
Lorne Campbell ◽  
Timothy Loving

Finkel, Eastwick, and Reis (2016; FER2016) argued the post-2011 methodological reform movement has focused narrowly on replicability, neglecting other essential goals of research. We agree multiple scientific goals are essential, but argue, however, a more fine-grained language, conceptualization, and approach to replication is needed to accomplish these goals. Replication is the general empirical mechanism for testing and falsifying theory. Sufficiently methodologically similar replications, also known as direct replications, test the basic existence of phenomena and ensure cumulative progress is possible a priori. In contrast, increasingly methodologically dissimilar replications, also known as conceptual replications, test the relevance of auxiliary hypotheses (e.g., manipulation and measurement issues, contextual factors) required to productively investigate validity and generalizability. Without prioritizing replicability, a field is not empirically falsifiable. We also disagree with FER2016’s position that “bigger samples are generally better, but … that very large samples could have the downside of commandeering resources that would have been better invested in other studies” (abstract). We identify problematic assumptions involved in FER2016’s modifications of our original research-economic model, and present an improved model that quantifies when (and whether) it is reasonable to worry that increasing statistical power will engender potential trade-offs. Sufficiently-powering studies (i.e., >80%) maximizes both research efficiency and confidence in the literature (research quality). Given we are in agreement with FER2016 on all key open science points, we are eager to start seeing the accelerated rate of cumulative knowledge development of social psychological phenomena such a sufficiently transparent, powered, and falsifiable approach will generate.


2021 ◽  
Vol 4 (1) ◽  
pp. 67-77
Author(s):  
Fransiska Sisilia Mukti ◽  
Lia Farokhah ◽  
Nur Lailatul Aqromi

Bus is one of public transportation and as the most preferable by Indonesian to support their mobility. The high number of bus traffics then demands the bus management to provide the maximum service for their passenger, in order to gain public trust. Unfortunately, in the reality passenger list’s fraud is often faced by the bus management, there is a mismatch list between the amount of deposits made by bus driver and the number of passengers carried by the bus, and as the result it caused big loss for the Bus management. Automatic Passenger Counting (APC) then as an artificial intelligence program that is considered to cope with the bus management problems. This research carried out an APC technology based on passenger face detection using the Viola-Jones method, which is integrated with an embedded system based on the Internet of Things in the processing and data transmission. To detect passenger images, a webcam is provided that is connected to the Raspberry pi which is then sent to the server via the Internet to be displayed on the website provided. The system database will be updated within a certain period of time, or according to the stop of the bus (the system can be adjusted according to management needs). The system will calculate the number of passengers automatically; the bus management can export passenger data whenever as they want. There are 3 main points in the architecture of modeling system, they are information system design, device architecture design, and face detection mechanism design to calculate the number of passengers. A system design test is carried out to assess the suitability of the system being built with company needs. Then, based on the questionnaire distributed to the respondent, averagely 85.12 % claim that the Face detection system is suitability. The score attained from 4 main aspects including interactivity, aesthetics, layout and personalization


Sign in / Sign up

Export Citation Format

Share Document