-
43181.交通系统的性能测量:国际会议总结(4)
[交通运输、仓储和邮政业,信息传输、软件和信息技术服务业] [2013-12-13]
A Transportation Research Board (TRB) conference on U.S. and international approaches to performance measurement for transportation systems was conducted May 18 through 20, 2011, at the Arnold and Mabel Beckman Center of the National Academies in Irvine, California. The theme for the fourth in a series of international conferences, driving change and being driven by change, captured the changing environment in which transportation services are delivered as well as the role of performance measurement in delivering these services.
关键词:电子信息;系统;交通;测量
-
43182.无线可重构网络安全的网络编码
[信息传输、软件和信息技术服务业] [2013-12-13]
Wireless Reconfigurable Networks (WRN) adapt rapidly and flexibly to network variations, providing advantages to establish efficient communication for emergency operations, disaster relief efforts, and military networks. Security is a necessity where data integrity and confidentiality are exposed to attacks. Security schemes are based on cryptography, providing an expensive and partial defense, since high processing needs are inconvenient for WRN. Hence, the design of a distributed, low cost detection and defense mechanism is important. In this chapter, we present the fundamentals of network coding in WRN, its advantages and how particular problems in wireless networks limit those. We provide an algebraic representation of a distributed, low cost Detection and Defense Mechanism (DDM) that responds to the WRN demands. We evaluate quality of routes involved in the security mechanism, as well as make a selection of the best route for the DDM. The DDM uses network coding to distribute information, and to detect and defend from sink holes and selective forwarding attacks. For performance, we include the number of successful packets, overhead and accuracy in terms of detected attacks and false detections.
关键词:电子信息;信息安全;网络安全;编码
-
43183.安全MANET路由协议的安全性验证
[信息传输、软件和信息技术服务业] [2013-12-13]
Secure mobile ad hoc network (MANET) routing protocols are not tested thoroughly against their security properties. Previous research focuses on verifying secure, reactive, accumulation-based routing protocols. An improved methodology and framework for secure MANET routing protocol verification is proposed which includes table-based and proactive protocols. The model checker, SPIN, is selected as the core of the secure MANET verification framework. Security is defined by both accuracy and availability: a protocol forms accurate routes and these routes are always accurate. The framework enables exhaustive verification of protocols and results in a counter-example if the protocol is deemed insecure.The framework is applied to models of the Optimized Link-State Routing (OLSR) and Secure OLSR protocol against five attack vectors. These vectors are based on known attacks against each protocol. Vulnerabilities consistent with published findings are automatically revealed. No unknown attacks were found; however, future attack vectors may lead to new attacks.
The new framework for verifying secure MANET protocols extends verification capabilities to table-based and proactive protocols. More work is needed to create attack vectors that reveal unknown attacks against secure protocols, but the framework makes construction of such vectors easy.
关键词:电子信息;信息安全;网络安全;路由协议;验证
-
43184.交通事故管理系统——2012年3月
[交通运输、仓储和邮政业,信息传输、软件和信息技术服务业] [2013-12-13]
In 2003, the U.S. Fire Administration (USFA) announced a goal to reduce firefighter fatalities by 25 perent within 5 years and 50 percent within 10 years. It also committed to doing research that would support that goal. The consistently high annual percentage of fatalities related to fire department response and roadway scene operations prompted the USFA to look at several aspects related to these collisions in an effort to improve responder safety.
关键词:电子信息;系统;交通事故管理
-
43185.免费交通系统的执行和结果:综合交通实践
[信息传输、软件和信息技术服务业,交通运输、仓储和邮政业] [2013-12-13]
Providing public transit on a fare-free basis for all passengers has tantalized public policymakers for decades. Proponents claim that if other public services such as schools, libraries, and parks (as well as most roads) are considered important enough to provide at no charge to the user, then providing everyone in the community with at least a basic means of mobility should also be a public good. The purpose of this synthesis is to document the past and current experiences of public transit agencies that have planned, implemented, and operated fare-free systems.
关键词:电子信息;系统;交通实践
-
43186.网格基础设施的静态安全控制系统和SARA库存系统
[信息传输、软件和信息技术服务业] [2013-12-13]
IT security, even if once achieved, is not a permanent state but rather a process. One of the main factors that impact this process is the ability to identify security vulnerabilities in the software. Disclosing such a flaw is usually followed by issuing a patch. However, for main-tainers of a heterogeneous and compound environment, being up to date with all necessary fixes, may be an unexpectedly difficult task. Developing custom software in a grid project introduces another dimension to this problem. The SARA system for static security control has been developed to help the administrators with that issue.
关键词:电子信息;信息安全;网络安全;网格设施;静态控制
-
43187.无线M2M系统的安全问题和解决方法
[信息传输、软件和信息技术服务业] [2013-12-13]
Wireless communications will be fundamental in future Machine-to-Machine (M2M) pervasive environments where new applications are expected to employ sensing and actuating devices that are able to autonomously communicate without human intervention. M2M devices using wireless communications are expected to represent fundamental components of a future Internet where applications will allow users to transparently interact with its physical surroundings. The heterogeneity of the characteristics envisioned for M2M devices and applications calls for new approaches regarding how devices communicate wirelessly at the various protocol layers and how security should be designed for such communications. As such devices and communications are expected to support security-critical applications, the security of M2M wireless communications is particularly important. Since most M2M wireless devices will be seriously constrained in terms of computational capability and energy, security for M2M wireless communications must consider such limitations. This implies that existing security mechanisms may not be appropriate for M2M communications. The particular characteristics and the heterogeneity of the characteristics of M2M devices is currently motivating the design of a plethora of new communication protocols at the various communication layers. As M2M is a fundamentally recent research area, we currently verify a lack of research contributions that are clearly able to identify the main issues and approaches in targeting security on M2M environments. In this chapter we analyze security for wireless communications considering also protocols in the process of standardization, as such technologies are likely to contribute to future standard communications architecture for wireless M2M systems. We start by addressing the security issues and vulnerabilities related with the usage of wireless M2M communication technologies on applications in various application environments. Such threats to wireless communications are present not only due to the usage of wireless communication in security-threatening environments but also to the inherent constraints of M2M sensing devices. We also discuss ways for strengthening security for wireless communications at the various layers of the communications stack. We also verify that most of the current proposals for M2M wireless communications technologies lack fundamental security assurances and discuss how this major challenge may be targeted by research and standardization work. The goal of this chapter is twofold, as on the one side we perform a survey on the main security issues of the usage of currently available M2M wireless communication technologies and also discuss the main approaches to introduce security for such communications, while on the other side we discuss future approaches to security in wireless M2M environments. Various characteristics of such environments will pose challenges and motivate new approaches for security. In fact, many aspects of M2M applications will require a paradigm shift in how security is designed for M2M applications, devices and wireless communications technologies.
关键词:电子信息;信息安全;网络安全;无线;M2M系统
-
43188.多因素身份验证的密钥交换协议的安全分析
[信息传输、软件和信息技术服务业] [2013-12-13]
This paper shows several security weaknesses of a Multi-Factor Authenticated Key Exchange (MK-AKE) protocol, proposed by Pointcheval and Zimmer at ACNS'08. The Pointcheval-Zimmer scheme was designed to combine three authentication factors in one system, including a password, a secure token (that stores a private key) and biometrics. In a formal model, Pointcheval and Zimmer formally proved that an attacker had to break all three factors to win. However, the formal model only considers the threat that an attacker may impersonate the client; it however does not discuss what will happen if the attacker impersonates the server. We fill the gap by analyzing the case of the server impersonation, which is a realistic threat in practice. We assume that an attacker has already compromised the password, and we then present two further attacks: in the first attack, an attacker is able to steal a fresh biometric sample from the victim without being noticed; in the second attack, he can discover the victim's private key based on the Chinese Remainder theorem. Both attacks have been experimentally verified. In summary, an attacker actually only needs to compromise a single password factor in order to break the entire system. We also discuss the deficiencies in the Pointcheval-Zimmer formal model and countermeasures to our attacks.
关键词:电子信息;信息安全;网络安全;密钥交换协议;身份验证
-
43189.2012-2013年中国小家电网络购物用户行为研究报告
[信息传输、软件和信息技术服务业,电气机械和器材制造业,批发和零售业] [2013-12-13]
随着我国网络购物行业的稳定发展,小家电网络购物也发展迅速。2012年,小家电网络购物跻身于中国网购用户消费支出最高的品类Top10,成为继服装鞋帽品类、IT产品类、通讯产品类等之后第八大品类。此外,小家电成为2012年中国女性网购用户常购商品之一。本研究的目的是基于iUserTracker的网民网购行为精准数据,呈现小家电网购用户的触媒习惯、广告态度、购物态度和购物行为,力图为小家电商家在广告投放、营销推广等战略决策提供数据支持。
关键词:小家电;网络购物;媒体接触;属性研究;行为研究
-
43190.物理层安全
[信息传输、软件和信息技术服务业] [2013-12-13]
So far, we have introduced protections of communication systems placed at the upper layers of networked communication systems. Those mechanisms utilize modern cryptographic methods, together with network administration policies. The important characteristics of modern cryptographic algorithms and protocols are that they are independent of physical-layer transmission technologies and assume that the physical-layer transmission has already been established and is error free.
关键词:电子信息;信息安全;物理层;通信系统