Necessary Standard for Providing Privacy and Security in IPv6 Networks

Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

Security and privacy have become important issues when dealing with Internet Protocol version 6 (IPv6) networks. On one hand, anonymity, which is related to privacy, makes it hard for current security systems to differentiate between legitimate users and illegitimate users, especially when the users need to be authenticated by those systems whose services they require. On the other hand, a lack of privacy exposes legitimate users to abuse, which can result from the information gained from privacy-related attacks. The current problems inherent within IPv6-enabled networks are due, in part, to the fact that there is no standard available telling companies about the current deficiencies that exist within IPv6 networks. The purpose of this chapter is to show a balance between the use of privacy and security, and to describe a framework that can offer the minimum standard requirement needed for providing security and privacy to IPv6 networks.

Author(s):  
Hosnieh Rafiee ◽  
Christoph Meinel

Security and privacy have become important issues when dealing with Internet Protocol version 6 (IPv6) networks. On one hand, anonymity, which is related to privacy, makes it hard for current security systems to differentiate between legitimate users and illegitimate users, especially when the users need to be authenticated by those systems whose services they require. On the other hand, a lack of privacy exposes legitimate users to abuse, which can result from the information gained from privacy-related attacks. The current problems inherent within IPv6-enabled networks are due, in part, to the fact that there is no standard available telling companies about the current deficiencies that exist within IPv6 networks. The purpose of this chapter is to show a balance between the use of privacy and security, and to describe a framework that can offer the minimum standard requirement needed for providing security and privacy to IPv6 networks.


2021 ◽  
Vol 9 (3) ◽  
pp. 266
Author(s):  
Ziaul Haque Munim ◽  
Okan Duru ◽  
Enna Hirata

Blockchain technology, since its introduction, has been expected to be implemented in many areas. Cryptocurrency is one unique example that established a functioning application. On the other hand, blockchain technology is not immune to various challenges related to the nature of itself, privacy management, and antitrust laws, among others. This study lays out the nature of blockchain and applications in the maritime industry, while highlighting the bottlenecks. Potential resolutions and anticipated developments are proposed. To do this, we adopt a systematic approach and present an overview of blockchain in maritime literature. In addition, the fundamental problems with blockchain are investigated, beginning from their essentials to the pain points that are claimed to need improvement. For establishing a legitimate and practically meaningful blockchain platform, stakeholders need to achieve pluralism (consensus validation), privacy, and security of the system.


2014 ◽  
Vol 971-973 ◽  
pp. 1667-1672
Author(s):  
Gang Zeng

Anonymous multi-receiver encryption (AME) achieves the security properties of confidentiality and anonymity. Thus, it can be used in VoIP (Voice over Internet Protocol), pay-TV systems, et al. In 2012, Zhang et al. proposed an efficient anonymous multi-receiver encryption protocol. They claimed that their protocol can protect the receiver identity privacy and keep message confidential. In this paper, we point out the weaknesses of Zhang et al.'s protocol. Their protocol cannot satisfy the anonymity against the inner attackers. On the other hand, their AME protocol cannot satisfy the indistinguishability of encryptions under selective multi-identity, chosen ciphertext attacks (IND-AME-CCA). Thus, Zhang et al.'s protocol is insecure. The analysis is important for the engineer to mitigate the security risks.


Author(s):  
Pallavi Chavan ◽  
Dipti Jadhav ◽  
Gautam M. Borkar

With the rise in usage of social media, large quantities of data like pictures, videos, audio, and computer graphics are created. As the data is shared over the network, security and privacy become important concerns. Social networks are most popular and have become a medium for instant information sharing. Facebook, Instagram, WhatsApp are the most popular social networks. There has been extreme increase in the usage of audiovisual data over the social network. When multimedia data are stored in a networked environment, billions of users get connected to it for different purposes. The privacy challenges are personification, harassment, password sharing, location-oriented services, and privacy vs. marketing. The other challenges are data semantics, content management rights, and false information. There has been significant contribution by the researchers in development of security systems against these threats; still, the problems of clickjacking, short URL, phishing remain unresolved for some network architectures.


Author(s):  
László Bokor ◽  
Gábor Jeney

Nowadays, the Internet Protocol is facing the version change; IPv4 (the old version of IP) will be replaced by IPv6 (the new version of IP) in the long run. Although they are based on the very same concept, the two protocols are not compatible with each other. This chapter deals with the coexistence issues, which might arise due to the simultaneous existence of IPv4 and IPv6. On the other hand, this chapter also covers transition concepts: how IPv6 only hosts can communicate either over IPv4 only networks, or with IPv4 only hosts in the Internet of the future.


1999 ◽  
Vol 173 ◽  
pp. 249-254
Author(s):  
A.M. Silva ◽  
R.D. Miró

AbstractWe have developed a model for theH2OandOHevolution in a comet outburst, assuming that together with the gas, a distribution of icy grains is ejected. With an initial mass of icy grains of 108kg released, theH2OandOHproductions are increased up to a factor two, and the growth curves change drastically in the first two days. The model is applied to eruptions detected in theOHradio monitorings and fits well with the slow variations in the flux. On the other hand, several events of short duration appear, consisting of a sudden rise ofOHflux, followed by a sudden decay on the second day. These apparent short bursts are frequently found as precursors of a more durable eruption. We suggest that both of them are part of a unique eruption, and that the sudden decay is due to collisions that de-excite theOHmaser, when it reaches the Cometopause region located at 1.35 × 105kmfrom the nucleus.


Author(s):  
A. V. Crewe

We have become accustomed to differentiating between the scanning microscope and the conventional transmission microscope according to the resolving power which the two instruments offer. The conventional microscope is capable of a point resolution of a few angstroms and line resolutions of periodic objects of about 1Å. On the other hand, the scanning microscope, in its normal form, is not ordinarily capable of a point resolution better than 100Å. Upon examining reasons for the 100Å limitation, it becomes clear that this is based more on tradition than reason, and in particular, it is a condition imposed upon the microscope by adherence to thermal sources of electrons.


Author(s):  
K.H. Westmacott

Life beyond 1MeV – like life after 40 – is not too different unless one takes advantage of past experience and is receptive to new opportunities. At first glance, the returns on performing electron microscopy at voltages greater than 1MeV diminish rather rapidly as the curves which describe the well-known advantages of HVEM often tend towards saturation. However, in a country with a significant HVEM capability, a good case can be made for investing in instruments with a range of maximum accelerating voltages. In this regard, the 1.5MeV KRATOS HVEM being installed in Berkeley will complement the other 650KeV, 1MeV, and 1.2MeV instruments currently operating in the U.S. One other consideration suggests that 1.5MeV is an optimum voltage machine – Its additional advantages may be purchased for not much more than a 1MeV instrument. On the other hand, the 3MeV HVEM's which seem to be operated at 2MeV maximum, are much more expensive.


2005 ◽  
Vol 19 (3) ◽  
pp. 129-132 ◽  
Author(s):  
Reimer Kornmann

Summary: My comment is basically restricted to the situation in which less-able students find themselves and refers only to literature in German. From this point of view I am basically able to confirm Marsh's results. It must, however, be said that with less-able pupils the opposite effect can be found: Levels of self-esteem in these pupils are raised, at least temporarily, by separate instruction, academic performance however drops; combined instruction, on the other hand, leads to improved academic performance, while levels of self-esteem drop. Apparently, the positive self-image of less-able pupils who receive separate instruction does not bring about the potential enhancement of academic performance one might expect from high-ability pupils receiving separate instruction. To resolve the dilemma, it is proposed that individual progress in learning be accentuated, and that comparisons with others be dispensed with. This fosters a self-image that can in equal measure be realistic and optimistic.


Author(s):  
Stefan Krause ◽  
Markus Appel

Abstract. Two experiments examined the influence of stories on recipients’ self-perceptions. Extending prior theory and research, our focus was on assimilation effects (i.e., changes in self-perception in line with a protagonist’s traits) as well as on contrast effects (i.e., changes in self-perception in contrast to a protagonist’s traits). In Experiment 1 ( N = 113), implicit and explicit conscientiousness were assessed after participants read a story about either a diligent or a negligent student. Moderation analyses showed that highly transported participants and participants with lower counterarguing scores assimilate the depicted traits of a story protagonist, as indicated by explicit, self-reported conscientiousness ratings. Participants, who were more critical toward a story (i.e., higher counterarguing) and with a lower degree of transportation, showed contrast effects. In Experiment 2 ( N = 103), we manipulated transportation and counterarguing, but we could not identify an effect on participants’ self-ascribed level of conscientiousness. A mini meta-analysis across both experiments revealed significant positive overall associations between transportation and counterarguing on the one hand and story-consistent self-reported conscientiousness on the other hand.


Sign in / Sign up

Export Citation Format

Share Document