Monday, January 27, 2020
The Security Requirements And Challenges Of Manets Information Technology Essay
The Security Requirements And Challenges Of Manets Information Technology Essay The major security requirements of MANETs are secure linking, secure routing and secure data transmission or secure data packet forwarding. Both proactive and reactive approaches are needed. The disadvantages of the mobile design, like: limited cpu, memory and battery, may let MANETs face more security chanllegnes, which include both active and passive attacks, the problems of dynamic topology, routing protocol and mobile environment, specially the packets missing, data changed and node failures will make users lose trust of it, most of the secure routing protocols are designed with certain known attacks in mind. When an unknown attack is encountered, these protocols may collapse, but achieving higher security usually requires more computation on each mobile node. 2. Explain à ¿Ã ½-TESLA and compare it with TESLA? TESLA means Time Efficient Stream Loss-tolerant Authentication, à ¿Ã ½-TESLA is a micro version of TESLA, or we can consider it as an adoption of TESLA for WSNs. Althugh TESLA and à ¿Ã ½-TESLA are multicast stream authenticaiton protocols, both have different ways in key discloure and authentication. à ¿Ã ½-TESLA is used in authentication of message broadcasts from Base Station(BS), from nodes (through BS), and also to authenticate route update broadcasts. BS works as the key distribution center. ( Taken From Chapter 3, Course slides.) This means à ¿Ã ½-TESLA allows the receivers broadcast authenticated data due to node to node key agreement. Receiver do not share a key with other receivers. But TESLA sender uses digital signature for the intial packet authenticaiton and broadcasts it over the whole WSN, the receiver knows the key disclosing schedule, when the key is disclosed, receiver will check its correctness and authenticates the buffered packets. 3. Gather information about the key Management protocols in MANETs. And explain it briefly. In MANETs, Key management is actually considered as the base for every cryptographic system, its a combination of cryptographic algorithms and on-demand dynamic routing protocols, because the networking security in many cases dependent on proper key management, the tranditional centralized approach in key management does not work out here, therefore, several methods are usually applied in the key management system in MANETs, such as: Secret Sharing Methods, Distributed CA Method, Error-code based methods and Byzantine Resilient Method. Even so, KM system still faces the many Challenges like: Dynamic topology and environment, Lack of trust, Node failures, Bounded computational and operational power, Connectivity problems and Node autonomity, etc because you dont know if any one entity is dishonest, that entity may be exposed. 4. Explain SEAD, SAR and SPAAR routing protocols in more details. SEAD is a secure table- driven routing protocol based on the existing DSDV(Destination-Sequenced Distance-Vector) routing protocol. It uses a one-way-hash function and asymmetric cryptography operations. Although SEAD defends against several types of DoS ( Denial-of-Service attacks), it cannot prevent the wormhole attack.To avoid long time running routing loops and to defend against the replay attack, SEAD uses destination numbers to to ensure that the information originates from the correct node. Authentication is also used in SEAD. Each node uses a specific authentic element from its one-way hash chain in each routing update that it sends about itself. The source must be authenticated using some kind of broadcast authentication mechanism, such as: TESLA. Apart from the hash functions used, SEAD doesnt use average settling time for sending triggered updates.This disadvantage makes SEAD face the chanellege of clock synchronization in order to function properly. SAR stands for Security-Aware Ad Hoc Routing, which applied for on-demand secure routing protocols. When a packet is sent, it need be assigned a trust value and certain security attributes, like: time stamp, sequence number, authentication, integrity, SAR introduces a negociable metrics to discover secure routes that are embedded into RREQ packets. And this packet can be processed or forwarded only if the node can provide the required security. The problem of SAR is you dont know whether or not the value assigned is true and the invisible node attack can not detected and treated in SAR. SPAAR (Secure Position Aided Ad hoc Routing) is a position based system and uses the location information to increase the security and performance. All nodes in SPAAR are required to know their own locations, for eaxmple, GPS system tells you where you are. SPAAR is also designed to provide authentication, non-repudiation, confidentiality and integrity for the security environment. 5. Explain Secure Message Transmission Protocol ( SMT) in MANETs. The major job of SMT (Secure Message Transmission) protocol is to secure the data transmission or data forwarding on already discovered routes no matter whether or not these routes have malicious nodes. SMT protocol does not deal with route discovery. It only demands a secure relationship between the source and destination by allowing one node know the public key of the other node. No cryptographic operation is needed between the nodes because the communication is usually done over the node disjoint paths, every piece of message is authenticated and verified through a Message Authentication Code. The destination doesnà ¿Ã ½t need all the pieces of a message to understand it. It can reconstruct the message when enough pieces have been received. This implies that even if there are malicious nodes in a few paths that drop the message or if there are unavailable routes, the message can still be received. If the destination didnà ¿Ã ½t receive enough pieces to construct the message, the source will send out the remaining pieces over a different set of paths. Otherwise the source continues with the next message transmission. 6. Give numberical examples for EL Gamal-TC (4,6) and RSA-TC(4,6). An investigate whether Elliptic Curve Crypto(ECC) could be used for TC? Elliptic Curve Crypto(ECC) could be used for TC, I got this idea from the article ECC Based Threshold Cryptography for Secure Data Forwarding and Secure Key Exchange in MANET written by Levent Ertaul and Weimin Lu, 2005, The two authors say in this way: We combine Elliptic Curve Cryptography and Threshold Cryptosystem to securely deliver messages in n shares. As long as the destination receives at least k shares, it can recover the original message. We explore seven ECC mechanisms, El-Gamal, Massey-Omura, Diffie-Hellman, Menezes-Vanstone, Koyama-Maurer -Okamoto-Vanstone, Ertaul, and Demytko. For secure data forwarding, we consider both splitting plaintext before encryption, and splitting ciphertext after encryption. Also we suggest to exchange keys between a pair of mobile nodes using Elliptic Curve Cryptography Diffie-Hellman. We did performance comparison of ECC and RSA to show ECC is more efficient than RSA. 7. Hacking technique and counter Measures Please find the usage and the required counter measures to avoid effects of the below commands. This commands fall into a catergory called Discovering Wireless Networks. a. INSSIDER Actually inSSIDer is a replacement for NetStumbler, it is a free Wi-Fi network scanner for Windows Vista and windows XP, it can inspect your WLAN and surrounding networks to troubleshoot competing access points, it works with internal Wi-Fi radio, Wi-Fi network information, such as: SSID, MAC, Access point vendor, data rate, signal strength, security, etc. Graph signal strength over time, is also can show how Wifi networks overlap and provides an open source code service since the Apache License, Version 2.0, it also can support GPS and export to Netstumbler(*.ns1) files, because of the open source service, the intruders may take advantages of it to attack your personal information. The best way to avoid inssider command is to give it no permission to access WLAN. I consider IEEE802.1x and IEEE802.11i protocols should be applied, and the specific mechanisms, like: WEP, TKIP, CCMP, MIC, Counter-MOde-CBC-MAC Mode, WPA and WPA2 should be got involved. b. Visit following web site: http://renderlab.net/projects/WPA-tables And give me the brief desription of this site. After visiting this website, a Church of Wifi WPA-PSK Rainbow Tables displays, this page is to give a little more insight into the methodology and logic behind concieving and building the CoWF WPA-PSK Rainbow Tables, actually they are lookup tables. From my point of view, this website tries to show you the result of the project that is done at renderlab, this project is testing how much possibilities the password will be cracked. On WPA-tables, WPA-PSK was vulnerable to brute force attack, cryptographists use the tools like Aircrack and coWPAtty to take advantage of this weakness and provided a way to test keys against dictionaries. They found that in fact the cracking process is very slow . Each passphrase is hashed 4096 times with SHA-1 and 256 bits of the output is the resulting hash. This is then compared to the hash generated in the initial key exchange. A lot of computing power is required for this. If the SSID and the SSID length is seeded into the passphrase hash, the passphrase of password will be hashed differently on a network with the SSID of linksys than it will on a network with the SSID of default. For the War driving, attacking a series of access points to connect to a server behind it, each ones security was stronger than the previous. They also found the application of the Time-Memory trade-off is particularly useful in password cracking and cryptography. How to prevent it from attack? They think its impossible to create a lookup table for all possible keys. Because the seeding of the algorithm with the SSID and SSID length, they have to compute all possible keys against all possible SSIDs, the limlited storage space doesnt allow them to do calculation. Instead they quickly check WPA-PSK networks against known english words and known passwords quickly, while still leaving the option open for brute forcing the rest of the keyspace. Selecting the most effecient dictionary and SSIDs computed became the focus.Size was also a concern. Even if they want to break the password, they still do not want the key size beyond the storage capacity of most users. They list some common passwords from Websters dictionary and compute them by sorting all passphrases in the range 8 bits and 64 bits, both max and min passphrases are taken off. The result shows 52% of SSID are at Wigle database of 5 million access points and on the top 1000 lists. This means at least 2.7 million access points are known. This renderlab project found a way to speed up WPA-PSK cracking, but it does not mean that it has been broken. Those experts also use coWPAtty and other similar tools to test the other dumb passphrases. The test result shows the minimum number of characters for a WPA-PSK passphrase is 8 and the maximum is 63. In reality, very few users actually use more than about 20 characters, in most cases, people choose known words and phrases, likely to be in a dictionary. So, to get decent protection from WPA-PSK, you should use a very long, very random, alphanumeric string longer than 20 characters, or to protect yourself further, particularly against the WPA-PSK hashtables, you should use a SSID not on the top 1000 list because this will force the attacker to compute thier own list, rather than use one of the CoWF tables.
Sunday, January 19, 2020
Eilis character notes
Ellis ââ¬Å"never made mistakes when she did her additionâ⬠; Devout Catholic ââ¬â she attended mass every Sunday in Insincerity ;Ellis immigrating to America was entirely Rose's initiative -as Rose and her mother collude with Father Flood, Ellis feels ââ¬Å"like a childâ⬠whose fate is being decided for her. ; Ellis is, by nature, reserved and emotionally guarded. She is selective in her relationships and shies away from physical intimacy.It is not easy for her to express her true feelings, even those closest to her. This particularly evident in her relationship with Tonyâ⬠¦.. ;When Ellis does not have the confidences to act on her instincts, she makes mistakes. The foremost is her impulsive marriage to Tony, but her resentment to Jim Farrell is another. ; Throughout the text, her actions are generally informed by the twin values of connection to family and a clearly defined sense of duty. ; Her generosity is constant, and Tony calls her a ââ¬Å"good personâ⬠. Yet the internal conflict generated by her return home causes her to lie by omission and to behave with great cruelty towards the unsuspecting Jim. ; Approximately twenty years old Young women from Insincerity Immigrates to America for work Works in Barstool's department store in Brooklyn Studies bookkeeping; ; During the course of the novel she becomes romantically involved with Tony Fiercely and Jim Farrell. ; She matures over the course of the novel, ââ¬Å"you seem more grown up and serious. And in your American clothes you look different.You have an air about youâ⬠(Nancy, p. 230) ; Her independence and resilience are revealed gradually. She has to exercise her Judgment and make critical choices with little guidance or support. Her initial naivety is balanced by natural curiously and a determination to learn. ; She takes the opportunities provided to educate herself, and as the word opens up before her, embraces new ideas with less diffidence than before. Living in New York encourages assertiveness, and Ellis becomes more inclined to trust herself.At work, she learns to be ââ¬Å"brave and decisiveâ⬠. ; Returning to Insincerity, Ellis slips back into the rhythm of the town easily and finds comfort in its familiar faces and rituals. Yet the changes produced by her experiences in America are obvious to all, ââ¬Å"Everything about you is differentâ⬠, her friend Nancy insist: ââ¬Å"you seem more grown up and serious. And in our American clothes you look different. You have an air about you. â⬠;Her poise and self-assurance intimidated her mother, however attracted Jim Farrell.
Friday, January 10, 2020
Epicurus’ Philosophy on a Good Life
Epicurus was a Greek philosopher. He was born, in the year 341 BCE, on the island of Samos, which is located a mile off of the western coast of Turkey. In 306 he moved to Athens for the required two years of military training that every Athenian did. When he finished the training he stayed in Athens absorbing the philosophies of Plato, Aristotle, and Democritus. He eventually returned to his home in Samos where he started his own school, The Garden. The reason the school was called The Garden is because its location was, believe it or not, his own garden.It is there where he taught philosophy to his disciples who were known as ââ¬Å"the philosophers of the garden. â⬠But unlike Platoââ¬â¢s Academy and the Lyceum of Aristotle, ââ¬Å"The Gardenâ⬠allowed women to join and philosophize, which was unheard of at that time. One of the biggest things Epicurus tried to achieve was tranquility. His definition of pleasure was that was ââ¬Å"freedom from pain and fear. â⬠E picurus valued the mind more so than the body. He said that we should enjoy intellectual pleasure more than sensual pleasure because the intellectual would last much longer and cause less suffering.Epicurus is not saying that having sex or other physical pleasures is bad or evil, because the sensations felt during the act is always good. He is saying that when you have too much of it or pursue it too often, it ends up bringing pain and lasts only a short while. It is in this sense that Epicurus is a hedonist. A hedonist is one who believes that pleasure is the greatest good for people. This developed Epicureanism, a hedonistic philosophy that stressed science, serenity, and friendship as the keys to pleasure, happiness, and the good life.Some of the greatest producers of pain and fear are religion and death. Epicurus believed that if we conquered the fear of death, the afterlife, and the gods we would be able to reach genuine happiness. One of the major differences between Epicurus and other Greeks is that he claimed that gods did not interfere with the affairs of the human world. Epicurus overcame his fear of death through his logical thought process such as ââ¬Å"Why should I fear death? If I am, death is not. If death is, I am not. Why should I fear that which can only exist when I do not? What he is basically saying is that it is not worth the suffering of fearing death when you are alive. When you are alive you are not dead, and when you are dead you canââ¬â¢t feel anything meaning that you canââ¬â¢t feel death. Epicurus is considered a major figure in the history of science as well as philosophy. He argued that we should weigh belief to factual evidence and logic, and he proposed the scientific view of atomism, where all facts in the macroscopic world are caused by the configuration of atoms or indivisible elements in the microscopic world and emptiness for the atoms to move in.Nearing his untimely death of prostatitis he wrote many letters to fri ends, one asking that the children of one of his first followers Metrodorus be taken care of. Epicurus made provisions in his will for the care of the children. Even in all this pain, he was still thinking about the kids he would be leaving. He also left ââ¬Å"The Gardenâ⬠and some funds to trustees of the school and the remaining money was to be used to honor his family and to celebrate his birthday yearly. So how do we live a good life? According to Epicurus, you choose the intellectual pleasure over the physical pleasure.The intellectual pleasure will last a lifetime while a physical pleasure will last for but a short while. But this alone is not enough, for even if you have the right pleasure, there is still fear which counteracts said pleasure. So how do we get rid of the pain? We realize that when we are alive we can feel and when we are dead we have lost the sensation to feel, and how can you be afraid of that which you canââ¬â¢t feel, you canââ¬â¢t. The only thin g that I think Epicurus is missing is a balance between overindulgence, and starvation of pleasures.As well as the buddhists Tathata, which basicly means living in the moment. There is joy and happiness surrounding us in every moment, you just have to open your eyes and find it. Bibliography 1) ââ¬Å"Epicurus and Pursuing Happiness. â⬠Atheist Foundation of Australia Inc. N. p. , n. d. Web. 28 Feb. 2013. . 2)â⬠Epicurus. â⬠Pursuit of Happiness. Pursuit of Happiness, Inc. , 2013. Web. 28 Feb. 2013. . 3) Zeuschner, Robert B. ââ¬Å"Chapter 3: Epicurus: Pleasure Is the Foundation of Ethical Judgments. ââ¬Å"Classical Ethics, East and West: Ethics from a Comparative Perspective. Boston: McGraw-Hill, 2000. 51-67. Print.
Thursday, January 2, 2020
The Great Depression - 1964 Words
The Great Depression was a worldwide economic drop that lasted from 1929 to 1939. It was both the longest and most severe depression to be experienced in the Western world. Although the Depression first started in America, it spread to other country in the globe and resulted in a decline in net output, a severe unemployment rate, and a deflation in almost every country of the globe. But this didnââ¬â¢t just affect the economy of the world but it also affected the social and cultural aspects of the country especially the United States, where the Great Depression ranks only second to the Civil War as the gravest crisis in American history. The timing and severity of the Great Depression varied among the different countries. The Depression was particularly long and severe in the United States and Europe; it was milder in Japan and much of Latin America. Perhaps not surprisingly, the worst depression ever experienced stemmed from a multitude of causes. Declines in consumer demand, fin ancial panics, and misguided government policies caused economic output to fall in the United States (Christina D. Romer). During this time the gold standard (which was a monetary system in which the standard economic unit was a fixed amount of gold) was linked to nearly all the countries of the world in a network of fixed currency exchange rates, this played a key role in the fall of America and other countries. The recovery from the Great Depression was urged by the abandonment of the goldShow MoreRelatedThe Depression Of The Great Depression1223 Words à |à 5 Pagesfar-reaching consequences as the Great Depression. This experience was the most extended and severe depression of the Western world. It was an economic downturn that began in 1929 and lasted until 1939. A large amount of Americaââ¬â¢s labor force lost their jobs and suffered during this crisis. During the nationââ¬â¢s financial disaster, Franklin Delano Roosevelt became president and made extensive changes to A mericaââ¬â¢s political structure. The effects of the Great Depression had lasting consequences that areRead MoreThe Depression Of The Great Depression1232 Words à |à 5 Pagespeople think that the stock crash was to blame for the Great Depression but that is not correct. Both the crash and depression were the result of problems with the economy that were still underneath society s minds. The depression affected people in a series of ways: poverty is spreading causing farm distress, unemployment, health, family stresses and unfortunately, discrimination increases. America tended to blame Hoover for the depression and all the problems. When the 1932 election came peopleRead MoreThe Great Depression Essay1390 Words à |à 6 PagesIntroduction: The world had faced two main economic problems. The first one was the Great Depression in the early of 20th Century. The second was the recent international financial crisis in 2008. The United States and Europe suffered severely for a long time from the great depression. The great depression was a great step and changed completely the economic policy making and the economic thoughts. It was not only an economic situation bit it was also miserable making, made people more attentionRead MoreThe Great Depression1292 Words à |à 6 PagesBefore the crash Before the start of the great depression the United States was a country of great economic wealth, with new technology being invented and a boom in industry. Due to a boom in Americaââ¬â¢s Industry because of World War One the economy was at an all-time high with a tremendous amount of prosperity. Following the end of world war one the industrial might that America had was being used for peaceful, domestic purposes instead of being used for violence and war. New technologies like carsRead MoreThe Depression Of The Great Depression2071 Words à |à 9 PagesPaul Von Hindenburg appointed Adolf Hitler Chancellor on the 30th January 1933. The Depression did play a vital role in this, however other factors such as the Nazis propaganda, the resentment of the Weimar republic and the political situation of 1932-1933 also contributed to his success. Before the Great Depression, the Nazis gained 12 seats and 2.6% of the vote in the May election of 1928. Despite this, by July 1932, Hitler gained 230 seats and 37.3% of the vote in the Reichstag. This is a dramaticRead MoreThe Great Depression1731 Words à |à 7 PagesThe 1920ââ¬â¢s was a decade of discovery for America. As mentioned in ââ¬Å"who was roaring in the twenties? ââ¬âOrigins of the great depression,â⬠by Robert S. McElvaine America suffered with the great depression due to several factors but it managed to stay prosperous at the end. In ââ¬Å"America society and culture in the 1920ââ¬â¢s,â⬠by David A. Shannon there was much more to the great depression. It was a time of prosperity an economic change. Women and men were discovering who they were and their value to societyRead MoreThe Great Depression1551 Words à |à 6 PagesThe Great Depression was one of the most devastating events recorded in history. The nation as a whole plummeted in one econ omic downfall. Few individuals escaped the effects of the depression. The hardship of unemployment and the loss of homes and farms were a large portion of the pain caused by the economic crisis. Through all of these sufferings, women had a large impact on society. Women faced heavy discrimination and social criticism during the Depression Even though through research it is provenRead MoreThe Great Depression1186 Words à |à 5 Pagesfriends is the true definition of of what the Great Depression really was. It was a time that most people want to never remember or ever happen again. You would think the United States would have learned from their mistakes but it seems we are going down the same road once again without even taking a step back and realizing it. When people talk about the Great Depression not a single person will have anything good to say about it. It caused families a great deal of pain that they will never forget. WithRead MoreThe Great Depression1368 Words à |à 6 PagesAfter WW1 the Great Depression had a very late impact on the major film companies in France, when it did, it unfortunately caused several film studios to go bankrupt, then in the late 1920ââ¬â¢s to 1930ââ¬â¢s many small film companies and groups emerged giving birth to the tendency called poetic realism. Because the large companies who made films with a focus on making money were gone the filmmakers and artists were able to concern themselves with the art of film, they often took poetic innovations thatRead MoreThe Great Depression1133 Words à |à 5 Pagesââ¬Å"The only thing we have to fear is fear itself,â⬠is a famous quote once said during the Great Depression by Franklin D. Roosevelt. After one world war, great financial fallout, and another world war to follow, the twentieth century was already shaping out to be a handful. When the Great Depression was coming to an end and the economy was trying to turn around, jobs started opening up and a new wave of imm igrants came into New York, the Puerto Ricans. For some the American dream was to come to
Subscribe to:
Posts (Atom)