Extras din referat
Abstract - This paper presents protocols and methods for
ensuring the confidentiality, security, data integrity and
freshness of the data that circulate between command and
control systems units that can be arranged in a Romanian
national anti-hail system.
Keywords - anti-hail, hail fighting, hail, data security, hail
combat units.
I. INTRODUCTION
The distribution process means a process that takes place
over a large geographical area, adjustment and control
parameters are interdependent and distributed over the same
geographic area. If the process is critical (security, fire
protection, banks, chemical plants, high hazard , nuclear
reactors, weather command and control etc) one might
question the confidentiality, security, data integrity and
freshness so that an intruder can not intercept them, interpret
or alter the production of major events or catastrophes.
Given the current technological development, the question
of control and influence of the meteorological phenomena’s
in both military purpose and useful purposes such as anti-hail
protection, provoking rain for a peaceful purpose. In his
paper Geophysical War [1] col. dr (r) Emil Streinu presents
some of the systems and research centers in the
meteorological domain. One is located in the northern U.S. at
400 km distance from Anchorage, at the Gakhona military
base. A huge field of tundra is planted with a forest of
antennas of 25 m height generically called HAARP (High
Frequency Active Aurora Research Program). The base is
surrounded by barbed wire, the perimeter is guarded by
armed patrols of Marines and air space above the research
base is closed to all civilian and military aircraft. In response,
in Russia there is a similar complex "Sura" which is
comparable, in terms of capacity with the current HAARP
and is within the central area, in places hidden at a distance
of 150 km from Nizhnii Novgorod. "Sura" belongs in the
Radiophysics Research Institute where, among other things,
once worked the former scientist and current politician, Boris
Nemtov. "Today, in the world, there are only three such
objectives," says institute director Sergei Sneghiriov. "One in
Alaska, second, in Norway at Tromso, and the third - in
Russia".
In the field of civil concerns fall on the anti-hail
protection, starting with sonic cannons, weather balloons and
finishing with anti-hail rockets and with rain provoking
rockets.
From historical point of view the first artificial rain was
provoked in Bucharest in 1931 by researcher Stefania
Maracineanu. Thanks to the data obtained by Stefania
Maracineanu, she obtained support from the French
government and she repeated these experiments in 1934 in
Algeria, being crowned in succes. The next research in this
area did not continued until after the Second World War,
when in 1946, Vincent J. Shaefer American engineer did an
experiment on Mount Washington. Here, in this day heavy
clouds where forming over the mountain. He scattered from
plane at the base of the cloud, carbonic ice, which gave rise
to a heavy rain. The first artificial rain for military purposes
was caused in 1963 by the U.S. Army in Vietnam, and in
1966 the Americans provoked torrential rains with disastrous
consequences for the provinces of northern Laos. Comparing
the effects of the known weapons with those of the
Geophysical War especially over the living force, it appears
that huge damage can be done; this can be use in a secret
war, are stronger than the known weapons and is due to
human capacity to know, manage and control the natural
phenomena of our planet. Now Geophysical War presents
perspectives as possible, but with the mention that such a
conflict in the notion of winners and losers might be
mistaken, but are able to distinguish between military and
civilian victims, between aggression and attack, which
emphasizes the fact that scientists can be used in this domain.
A try with unexpected effects occurred in China in spring of
2000. Chinese researchers, launched in the atmosphere in a
arid region, several rockets with silver iodide in order to
obtain rain. Independently from into account all
environmental factors of the area, Chinese scientists found
themselves in a very short period of time in that area with
heavy snow. Research to date have been made by small
isolated groups which had a short life due to economic
conditions or market demand for equipment, unable to
benefit from experiences and previous research. Except are
perhaps the military research, where in the same time with
the climate disasters there should exists methods and means
to combat this effects, but obviously this are not available to
the public.
All the achievements to date have been and are built to
protect limited objectives (car parks, solar collectors and
wind turbines fields, farms) without taking into account
global protection through a unique system-wide coordination
unit, at local area at least. The beneficiaries are very satisfied
by the investment they made.
Bibliografie
[1] Col.dr.(r) Emil Strainu, Geophysical War -
environmental modification techniques for military
purposes, 10.1.2007;
[2] Denning D., Denning P.J., "Data Security", Comm.
of ACM, sep., 1979;
[3] Denning D.E., Cryptography and Data Security",
Addison Wesley, 1982;
[4] Denning D.E., "Protecting Public Keys and
Signature Keys", Computer, feb., 1983;
[5] Denning D.E., Digital Signatures With RSA and
Other Public-Key Cryptosystems", Comm. of ACM.
apr., 1984;
[6] Desmedt Y., Vanderwalle J., Govaerts R., "A
Critical Analysis Of The Security Of Knapsack
Public-Key Algorithms", IEEE Trans. on Inform.
Theory, iul., 1984;
[7] Desmedt Y., Odlyzko A.M., "A Chosen Text Attack
on The RSA", Proceedings of CRYPTO '85,
California, 1985;
[8] Diffie W., Hellman M., "Privacy and
Authentication: An Introduction to Cryptography",
Proc IEEE, mar., 1975;
[9] Diffie W., Hellman M.E., "Multiuser
Cryptography", National Computer Conference,
New York, iun., 1976;
[10] Diffie W., Hellman M., "New Directions in
Cryptography", IEEE Trans. on Inform. Theory.,
noi., 1976;
[11] Diffie W., Hellman M., "Exhaustive Cryptoanalysis
of the NBS DES", Computer, iun., 1977;
[12] Diffie W., Hellman M., Privacy and Authentication",
Proceedings of IEEE, 1979;
[13] Patriciu VV, "The possibility of integration of
cryptographic features OSI networks", The Military
Technical Academy, No. 2, 1991;
[14] Patriciu V.V., "Digital signature system
identification procedures," ATM Magazine, No. 1,
1991;
[15] Patriciu V.V., "Computer aided design software and
data security", Computer Aided Design Symposium,
ATM, 1991; [16] Patriciu V.V., "Operating systems
for mini and microcomputers," Ed.Militară,
Bucharest, 1992;
[17] Patriciu V.V., "Aspects of cryptographic protection
of software", The Military Technical Academy, No.
3, 1992;
[18] Patriciu V.V., "Concerns and achievements in
computational cryptography", The Military
Technical Academy, No. 2, 1992;
[19] Patriciu V.V., "The integration of protocols in
computer networks protection," referring PhD, IPB,
1992;
[20] Patriciu V.V., "Possibilities of using cryptographic
methods teleinformatice networks," in volume
"Cybernetics and scientific-technical revolution"
Ed.Academiei RSR, 1988;
[21] Ioan Porumb , "Techniques for ensuring privacy in
data acquisition", diploma project, Technical
University of Cluj-Napoca,1997;
[22] Doswell, C.A. III (2000): Severe convective storms
- An overview. Meteor. Monogr., [in press].
(Posted: 23 May 2000).
[23] Petersen, W.A. and Rutledge, S. A., 2000:
Reagional variability in tropical convection:
Observations from TRMM. J. of Climate (en
prensa);
[24] Kitzmiller, D. H., and J. P. Breidenbach, 1995b:
Detection of severe local storm phenomena by
automated interpretation of radar and storm
environment data. NOAA Technical Memorandum
NWS TDL 82, National Weather Service, NOAA,
U.S. Department of Commerce, 33 pp. [Available
from Techniques Development Laboratory
W/OSD2, National Weather Service, 1325 East
West Highway, Silver Spring, MD 20910, USA].
Preview document
Conținut arhivă zip
- Privacy, security, integrity and freshness data in stabilization-tracking and control systems of weather phenomena.pdf