Privacy, security, integrity and freshness data in stabilization-tracking and control systems of weather phenomena

Referat
7/10 (1 vot)
Domeniu: Automatică
Conține 1 fișier: pdf
Pagini : 4 în total
Cuvinte : 6454
Mărime: 161.49KB (arhivat)
Publicat de: Ioan Porumb
Puncte necesare: 0
Profesor îndrumător / Prezentat Profesorului: Prof.dr.ing. Liviu Miclea
Facultatea de Automatica si Calculatoare
Universitatea Tehnica, Cluj-Napoca
Conferința AQTR 2012 , UTCN Cluj-Napoca , sesion/ID P1/89

Extras din referat

Abstract - This paper presents protocols and methods for

ensuring the confidentiality, security, data integrity and

freshness of the data that circulate between command and

control systems units that can be arranged in a Romanian

national anti-hail system.

Keywords - anti-hail, hail fighting, hail, data security, hail

combat units.

I. INTRODUCTION

The distribution process means a process that takes place

over a large geographical area, adjustment and control

parameters are interdependent and distributed over the same

geographic area. If the process is critical (security, fire

protection, banks, chemical plants, high hazard , nuclear

reactors, weather command and control etc) one might

question the confidentiality, security, data integrity and

freshness so that an intruder can not intercept them, interpret

or alter the production of major events or catastrophes.

Given the current technological development, the question

of control and influence of the meteorological phenomena’s

in both military purpose and useful purposes such as anti-hail

protection, provoking rain for a peaceful purpose. In his

paper Geophysical War [1] col. dr (r) Emil Streinu presents

some of the systems and research centers in the

meteorological domain. One is located in the northern U.S. at

400 km distance from Anchorage, at the Gakhona military

base. A huge field of tundra is planted with a forest of

antennas of 25 m height generically called HAARP (High

Frequency Active Aurora Research Program). The base is

surrounded by barbed wire, the perimeter is guarded by

armed patrols of Marines and air space above the research

base is closed to all civilian and military aircraft. In response,

in Russia there is a similar complex "Sura" which is

comparable, in terms of capacity with the current HAARP

and is within the central area, in places hidden at a distance

of 150 km from Nizhnii Novgorod. "Sura" belongs in the

Radiophysics Research Institute where, among other things,

once worked the former scientist and current politician, Boris

Nemtov. "Today, in the world, there are only three such

objectives," says institute director Sergei Sneghiriov. "One in

Alaska, second, in Norway at Tromso, and the third - in

Russia".

In the field of civil concerns fall on the anti-hail

protection, starting with sonic cannons, weather balloons and

finishing with anti-hail rockets and with rain provoking

rockets.

From historical point of view the first artificial rain was

provoked in Bucharest in 1931 by researcher Stefania

Maracineanu. Thanks to the data obtained by Stefania

Maracineanu, she obtained support from the French

government and she repeated these experiments in 1934 in

Algeria, being crowned in succes. The next research in this

area did not continued until after the Second World War,

when in 1946, Vincent J. Shaefer American engineer did an

experiment on Mount Washington. Here, in this day heavy

clouds where forming over the mountain. He scattered from

plane at the base of the cloud, carbonic ice, which gave rise

to a heavy rain. The first artificial rain for military purposes

was caused in 1963 by the U.S. Army in Vietnam, and in

1966 the Americans provoked torrential rains with disastrous

consequences for the provinces of northern Laos. Comparing

the effects of the known weapons with those of the

Geophysical War especially over the living force, it appears

that huge damage can be done; this can be use in a secret

war, are stronger than the known weapons and is due to

human capacity to know, manage and control the natural

phenomena of our planet. Now Geophysical War presents

perspectives as possible, but with the mention that such a

conflict in the notion of winners and losers might be

mistaken, but are able to distinguish between military and

civilian victims, between aggression and attack, which

emphasizes the fact that scientists can be used in this domain.

A try with unexpected effects occurred in China in spring of

2000. Chinese researchers, launched in the atmosphere in a

arid region, several rockets with silver iodide in order to

obtain rain. Independently from into account all

environmental factors of the area, Chinese scientists found

themselves in a very short period of time in that area with

heavy snow. Research to date have been made by small

isolated groups which had a short life due to economic

conditions or market demand for equipment, unable to

benefit from experiences and previous research. Except are

perhaps the military research, where in the same time with

the climate disasters there should exists methods and means

to combat this effects, but obviously this are not available to

the public.

All the achievements to date have been and are built to

protect limited objectives (car parks, solar collectors and

wind turbines fields, farms) without taking into account

global protection through a unique system-wide coordination

unit, at local area at least. The beneficiaries are very satisfied

by the investment they made.

Bibliografie

[1] Col.dr.(r) Emil Strainu, Geophysical War -

environmental modification techniques for military

purposes, 10.1.2007;

[2] Denning D., Denning P.J., "Data Security", Comm.

of ACM, sep., 1979;

[3] Denning D.E., Cryptography and Data Security",

Addison Wesley, 1982;

[4] Denning D.E., "Protecting Public Keys and

Signature Keys", Computer, feb., 1983;

[5] Denning D.E., Digital Signatures With RSA and

Other Public-Key Cryptosystems", Comm. of ACM.

apr., 1984;

[6] Desmedt Y., Vanderwalle J., Govaerts R., "A

Critical Analysis Of The Security Of Knapsack

Public-Key Algorithms", IEEE Trans. on Inform.

Theory, iul., 1984;

[7] Desmedt Y., Odlyzko A.M., "A Chosen Text Attack

on The RSA", Proceedings of CRYPTO '85,

California, 1985;

[8] Diffie W., Hellman M., "Privacy and

Authentication: An Introduction to Cryptography",

Proc IEEE, mar., 1975;

[9] Diffie W., Hellman M.E., "Multiuser

Cryptography", National Computer Conference,

New York, iun., 1976;

[10] Diffie W., Hellman M., "New Directions in

Cryptography", IEEE Trans. on Inform. Theory.,

noi., 1976;

[11] Diffie W., Hellman M., "Exhaustive Cryptoanalysis

of the NBS DES", Computer, iun., 1977;

[12] Diffie W., Hellman M., Privacy and Authentication",

Proceedings of IEEE, 1979;

[13] Patriciu VV, "The possibility of integration of

cryptographic features OSI networks", The Military

Technical Academy, No. 2, 1991;

[14] Patriciu V.V., "Digital signature system

identification procedures," ATM Magazine, No. 1,

1991;

[15] Patriciu V.V., "Computer aided design software and

data security", Computer Aided Design Symposium,

ATM, 1991; [16] Patriciu V.V., "Operating systems

for mini and microcomputers," Ed.Militară,

Bucharest, 1992;

[17] Patriciu V.V., "Aspects of cryptographic protection

of software", The Military Technical Academy, No.

3, 1992;

[18] Patriciu V.V., "Concerns and achievements in

computational cryptography", The Military

Technical Academy, No. 2, 1992;

[19] Patriciu V.V., "The integration of protocols in

computer networks protection," referring PhD, IPB,

1992;

[20] Patriciu V.V., "Possibilities of using cryptographic

methods teleinformatice networks," in volume

"Cybernetics and scientific-technical revolution"

Ed.Academiei RSR, 1988;

[21] Ioan Porumb , "Techniques for ensuring privacy in

data acquisition", diploma project, Technical

University of Cluj-Napoca,1997;

[22] Doswell, C.A. III (2000): Severe convective storms

- An overview. Meteor. Monogr., [in press].

(Posted: 23 May 2000).

[23] Petersen, W.A. and Rutledge, S. A., 2000:

Reagional variability in tropical convection:

Observations from TRMM. J. of Climate (en

prensa);

[24] Kitzmiller, D. H., and J. P. Breidenbach, 1995b:

Detection of severe local storm phenomena by

automated interpretation of radar and storm

environment data. NOAA Technical Memorandum

NWS TDL 82, National Weather Service, NOAA,

U.S. Department of Commerce, 33 pp. [Available

from Techniques Development Laboratory

W/OSD2, National Weather Service, 1325 East

West Highway, Silver Spring, MD 20910, USA].

Preview document

Privacy, security, integrity and freshness data in stabilization-tracking and control systems of weather phenomena - Pagina 1
Privacy, security, integrity and freshness data in stabilization-tracking and control systems of weather phenomena - Pagina 2
Privacy, security, integrity and freshness data in stabilization-tracking and control systems of weather phenomena - Pagina 3
Privacy, security, integrity and freshness data in stabilization-tracking and control systems of weather phenomena - Pagina 4

Conținut arhivă zip

  • Privacy, security, integrity and freshness data in stabilization-tracking and control systems of weather phenomena.pdf

Te-ar putea interesa și

Strategii de control al sistemelor de combatere a grindinei

INTRODUCERE Teza de doctorat conține o introducere și este structurată pe 6 capitole în care am prezentat modelele fenomenelor meteorologice care...

Ai nevoie de altceva?