{"title":"Security Threats in Wireless Sensor Networks","authors":"H. Sarma, A. Kar","doi":"10.1109/MAES.2008.4558008","DOIUrl":"https://doi.org/10.1109/MAES.2008.4558008","url":null,"abstract":"Wireless sensor network (WSN) is an emerging field. Theses are normally designed to perform a set of high level information processing tasks, for example detection, tracking or classification. Different application areas of WSNs are environmental monitoring, industrial sensing and diagnostics, infrastructure protection, battle field awareness, context aware computing etc. From application areas of WSN, it has been observed that ensuring security and privacy is one of the highest priorities for wireless sensor network systems. Information in the network must be protected from the attackers. Attackers may device different types of security threats to make the WSN system unstable. Here in this paper we have identified different types of security threats possible for a sensor net setting. Effort has been made to model the threats mathematically. Future scope of the work has also been outlined","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122245063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Liu-Jimenez, Sanchez-Reillo R, A. Lindoso, J. Daugman
{"title":"Architecture of a Search Engine for Massive Comparison in an Iris Biometric System","authors":"J. Liu-Jimenez, Sanchez-Reillo R, A. Lindoso, J. Daugman","doi":"10.1109/CCST.2006.313437","DOIUrl":"https://doi.org/10.1109/CCST.2006.313437","url":null,"abstract":"Biometrics is becoming one of the techniques most used for identification. Although these techniques are quite suitable for this purpose, when massive identification is required no for all of them there are dedicated devices. In this paper, the authors propose three different architectures for a search engine based on iris biometrics. These architectures relays on hardware-software codesign, reducing the expected time of comparison and the equipment cost","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132238795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Risk from Acts of Terrorism with Belief and Fuzzy Sets","authors":"J. Darby","doi":"10.1109/CCST.2006.313462","DOIUrl":"https://doi.org/10.1109/CCST.2006.313462","url":null,"abstract":"Risk consists of the likelihood of an event combined with the consequence of that event. There is uncertainty associated with an estimate of risk for an event that may happen in the future. For random, \"dumb\" events, such as an earthquake, this uncertainty is aleatory (stochastic) in nature and can be addressed with the probability measure of uncertainty. A terrorist act is not a random event; it is an intentional act by a thinking malevolent adversary. Much of the uncertainty in estimating the risk of a terrorist act is epistemic (state of knowledge); the adversary knows what acts will be attempted, but we as a defender have incomplete knowledge to know those acts with certainty. To capture the epistemic uncertainty in evaluating the risk from acts of terrorism, we have applied the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. Also, to address how we as a defender evaluate the selection of scenarios by an adversary, we have applied approximate reasoning with fuzzy sets. We have developed software to perform these evaluations","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126114472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Options for Wireless Sensor Networks","authors":"B. Norman","doi":"10.1109/MAES.2007.351726","DOIUrl":"https://doi.org/10.1109/MAES.2007.351726","url":null,"abstract":"To combat the security threats of the 21st century it has become increasingly necessary to protect ever-remote terrain with wireless sensor surveillance. These systems must be self-sustaining to ensure they are constantly operational. Sandia developed a software simulation tool to validate a variety of renewable energy sources for commercial needs. While this software is heavily used in industry it has yet to be fully applied to wireless sensor networks. Based on simulated solar energy yields two different solar energy systems were designed, built and deployed to the field. In the time since the solar energy power supplies were deployed zero hours have been spent on maintenance and it was not necessary to replace a single battery","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Considerations for Implementing an IP-Based, Video Assessment and Surveillance System","authors":"C. Shaw, J. Connell, R. Riley","doi":"10.1109/CCST.2006.313429","DOIUrl":"https://doi.org/10.1109/CCST.2006.313429","url":null,"abstract":"The flexibility gained in moving from an analog video system to a digital video system is immeasurable, and the onslaught of new IP-addressable cameras and recording solutions has given security system designers an endless set of options for migrating to a digital video system. Video can be brought up and viewed by any authorized user on the security network, and adding new devices is as easy as plugging them into the security network. However, the change to an IP-based framework also leads to a completely different set of considerations - what kind of bandwidth does the network infrastructure need in order to handle all the video streaming across it? How do you integrate an IP video system into the rest of a physical security system (including entry control, command, control, and communication)? This paper will address these considerations, among others, to help guide security system designers in determining the type of video system best suited for their applications","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"345 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115969658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Simulation for Vulnerability Assessment","authors":"B. Hennessey, B. Norman, R. Wesson","doi":"10.1117/12.665741","DOIUrl":"https://doi.org/10.1117/12.665741","url":null,"abstract":"This paper discusses simulation technologies developed to \"stimulate\" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128866974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biographical Sketch","authors":"Robert E. eRA","doi":"10.7591/9781501718984-002","DOIUrl":"https://doi.org/10.7591/9781501718984-002","url":null,"abstract":"A. Personal Statement Dr. Khatri is an Assistant Professor at the Institute for Immunity, Transplantation, and Infection and the Center for Biomedical Informatics Research, Department of Medicine at Stanford University. Dr. Khatri has more than 15 years of professional experience in the areas of bioinformatics, computational biology, and translational medicine. He actively collaborates with many investigators on the Stanford campus, and at other institutes, with a goal to disseminate and implemented newly-invented diagnostic markers and therapeutic targets. He develops methods for the integration and analysis of high throughput genomics and proteomics data. He is well known for work on the development of ontological and pathway analysis of high throughput molecular data, and leveraging publicly available data for integrated, multi-cohort analyses for identification of diagnostic and therapeutic biomarkers. Dr. Khatri developed the first tool, Onto-Express, for analysis of microarray data using Gene Ontology. He expanded his work in ontological analysis to develop a suite of web-based open access tools, Onto-Tools. Currently, more than 15,000 people around the world are registered as Onto-Tools users. His recent work is focused on developing computational methods for integrated, multi-cohort analysis of publically available data to increase the sample size as well as better account for heterogeneity observed in real world patient population. Using these methods, he has integrated data sets from multiple centers consisting of distinct patient cohorts with different biological and technical confounders (i) to identify highly specific and sensitive biomarkers for acute rejection across all transplanted organs, cancers (pancreatic cancer, small cell and non-small cell lung cancer), and infectious diseases (sepsis, respiratory viral infections, tuberculosis) (ii) to suggest repositioning of FDA-approved drugs for treating transplant patients, and (iii) to identify novel gene involved in non small cell lung cancer and pancreatic cancer carcinogenesis that may be a potential drug target.","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132244700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On-Board Encryption in Earth Observation Small Satellites","authors":"R. Banu, T. Vladimirova","doi":"10.1109/CCST.2006.313451","DOIUrl":"https://doi.org/10.1109/CCST.2006.313451","url":null,"abstract":"As satellite imaging payloads are providing more and more valuable and sensitive data the threat of unauthorized access to this data is also increasing. Therefore the demand to protect the data transmitted from satellites to ground is increasing and hence the need to use encryption on-board. The advanced encryption standard, which is a very popular choice in terrestrial communications, is slowly emerging as the preferred option in the aerospace industry including satellites. Satellites operate in harsh radiation environment and therefore any electronic systems used onboard satellites such as processors, memories etc. are very susceptible to faults induced by radiation. So the encryption processor should be robust enough to faults in order to avoid corruption of valuable data and subsequent transmission to ground. This paper presents a novel model to detect and correct single event upsets in on-board implementations of the AES algorithm, which is based on Hamming error correcting code. An FPGA implementation of the proposed model is carried out and measurements of the power and throughput overhead are presented","PeriodicalId":169978,"journal":{"name":"Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131136575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}