Background and Related Works Sample Clauses

Background and Related Works. Chapter two will offer all the background and prerequisite information necessary for understanding the work in this thesis. We will also have a review of works related to the ones we investigate and propose in this thesis.
Background and Related Works. Traditionally, key agreement is achieved through the use of symmetric or public key cryptographic protocols (Menezes et al., 2018). For example, using elliptic curve cryptogra- phy, in (Xxxx et al., 2021), the authors proposed a mutual authentication and key agreement scheme between cloud- based robots (i.e., robots that access cloud resources) and cloud servers. However, such solutions might not always be usable for robotic systems. Public key protocols are computationally demanding and require a public key in- frastructure (Xxxxxxx et al., 2018) and the support of a key revocation mechanism (e.g., see (Shi et al., 2021)). These requirements make public key protocol impractical for robots with limited computational capabilities (Yaa- coub et al., 2021). On the other hand, symmetric key- based solutions assume the existence of a pre-shared key. However, the compromise of such long-term keys usually leads to compromising the security of the whole system. Alternative key-establishing solutions leverage the semi- nal concept of wiretap channel introduced by Xxxxx in the underlying physical system dynamics to design the key agreement protocol. A first tentative to design a key agreement leveraging the physical properties of control systems can be found in (Xx et al., 2011), where the authors exploited common information about the plant’s state to establish a key between the sensor and the controller. However, the authors only consider the case where the eavesdropper cannot observe the plant’s state. More recently, in (Xxxxx and Xxxxxxx, 2020, 2022), control theoretical approaches have been proposed to design key- agreement scheme leveraging the asymmetry in the CPS model knowledge available to the defender and adversary.
Background and Related Works. Xxxxx [12] introduced the wiretap channel model, which provides an approach to secure communications without relying on classical cryptographic approaches. Xxxxx showed that if the channel between the sender and intended legitimate receiver is statistically better, i.e., less noisy, than the channel from the sender to the adversary, then perfect secrecy is possible. Xxxxxx [11], and Ahlswede and Csisza´r [13] considered the problem of secret-key generation using public discussion. In this setting, the two communicating parties observe correlated versions of a common random source. Based on these observations both parties want to agree on the same secret key. The key agreement problem in CPSs has traditionally been con- sidered to be an issue to be addressed separately from the control- theoretic/physical aspects of the underlying control systems. For example, Xxxx-Xxxx et al. [14] presented three cryptographic key- establishment protocols for resource constrained CPSs, including one constructed using isogeny-based cryptography, which makes it well- suited for the post-quantum computing scenario. Sutrala et al. [15] proposed a three-factor user authenticated key agreement protocol which achieves user anonymity and untraceability for 5G-enabled softwarized industrial CPSs. Xxxxx et al. [16] proposed a cross-layer key establishment model for wireless devices in CPSs, where wireless devices extract master keys at the physical layer using ambient wireless signals. Following an information-theoretic approach, Xxxxx et al. [17] studied the outage probability for secrecy rate in multiple- input multiple-output (MIMO) systems for CPSs. Although the above reviewed key-agreement solutions target CPSs’ applications, such approaches do not explicitly take any advantage of the peculiar underlying physical dynamics of these systems. In recent years, there has been an increased interest towards the use of the physical properties of the underling control systems to provide security. Similar to the role of information theory in physical layer security [18], control theory provides a framework for the study of this issue in CPSs. Xx et al. [19] presented a key establishment scheme for networked control systems, where they exploited the common information of the physical system state for the key establishment between the sensor and the controller. Since the sensors can observe changes in the system state which are caused by the controller actions, hence, the controller and th...
Background and Related Works. After Internet Protocol (IP) and Transmission Control Protocol (TCP) were in- troduced in the 1970s, they were investigated in the literature due to their major functionality of exchanging data packets and providing a reliable byte stream service in [119] [120]. However, as discussed in Chapter 1, single-path transport protocols such as TCP, suffer from several efficiency-related issues, e.g. failure to support multihoming and bandwidth aggregation [121]. Due to this motivation, MPTCP was proposed to provide efficient data transmission in such environments [122]. Also, Stream Control Transport Protocol (SCTP) was developed to adapt multipath transmission [25]. Multipath protocols adapt fault tolerance, i.e differ- ent paths can be assigned for different tasks. For instance, the fast paths can be used for data transmission while the slow paths could be utilised for a backup process [14]. Moreover, it has been shown that the connection-level throughput region of multi-path routing/congestion control algorithms can be larger than that of a single-path congestion control scheme [123] [124]. Various studies have been proposed to develop multi-path routing/congestion control problem including the Host Identity Protocol and Mobile IP [125]. How- ever, these solutions usually have negative impacts on the congestion price, scheduling and the possible conflict with regular TCP for existing applications. The approaches to address the multipath congestion control issues can be divided into two major categories. First, the application-based approach, where software is developed and tested on an applied benchmark while neglecting the mathe- matical formulation, convergence and stability analysis of the algorithm. For instance, a Linux based software was developed in [122]. As another example, in [126], Xxx et al. proposed a fountain code based MPTCP algorithm and they report the validation of the algorithm through simulations. The main idea behind this algorithm is to use the random nature of fountain code in transmitting data through different subflows. Further, Xxxxx et al. introduce a cross layer design which benefits from the exchange information between MAC and transport layer [127]. This scheme takes into account path condition before data transfer. The paths are evaluated according to the Frame Error Rate (FER) method and the best path is considered first for transmission. This algorithm is verified over some simulation scenarios. In [128], a Reward and Penalize ...

Related to Background and Related Works

  • BACKGROUND Purchaser wishes to purchase a Revenue Sharing Note issued by the Company through xxx.Xxxxxxxx.xxx (the “Site”).

  • Background Intellectual Property It is possible that one or both Parties may possess rights in background intellectual property, that is, intellectual property not otherwise subject to this Agreement, which would be useful or essential to the practice or commercialization of the results of this Agreement. For example, the RI might own a patent which would be infringed by the SBC when it attempted to commercialize the results of this Agreement unless a license was obtained from the RI. Where the Parties determine that background technology may exist, consideration should be given to negotiating license rights which will allow the practice and commercialization of the results of this Agreement.

  • Background Screening VENDOR shall comply with all requirements of Sections 1012.32 and 1012.465, Florida Statutes, and all of its personnel who (1) are to be permitted access to school grounds when students are present, (2) will have direct contact with students, or (3) have access or control of school funds, will successfully complete the background screening required by the referenced statutes and meet the standards established by the statutes. This background screening will be conducted by SBBC in advance of VENDOR or its personnel providing any services under the conditions described in the previous sentence. VENDOR shall bear the cost of acquiring the background screening required by Section 1012.32, Florida Statutes, and any fee imposed by the Florida Department of Law Enforcement to maintain the fingerprints provided with respect to VENDOR and its personnel. The parties agree that the failure of VENDOR to perform any of the duties described in this section shall constitute a material breach of this Agreement entitling SBBC to terminate immediately with no further responsibilities or duties to perform under this Agreement. VENDOR agrees to indemnify and hold harmless SBBC, its officers and employees from any liability in the form of physical or mental injury, death or property damage resulting from VENDOR’s failure to comply with the requirements of this section or with Sections 1012.32 and 1012.465, Florida Statutes.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you.

  • Background Check The Department or Customer may require the Contractor to conduct background checks of its employees, agents, representatives, and subcontractors as directed by the Department or Customer. The cost of the background checks will be borne by the Contractor. The Department or Customer may require the Contractor to exclude the Contractor’s employees, agents, representatives, or subcontractors based on the background check results. In addition, the Contractor must ensure that all persons have a responsibility to self-report to the Contractor within three (3) calendar days any arrest for any disqualifying offense. The Contractor must notify the Contract Manager within twenty-four (24) hours of all details concerning any reported arrest. Upon the request of the Department or Customer, the Contractor will re-screen any of its employees, agents, representatives, and subcontractors during the term of the Contract.

  • Background Data The Disclosing Party's Background Data, if any, will be identified in a separate technical document.

  • Background Checks The State may require that the Contractor and Contractor Parties undergo criminal background checks as provided for in the State of Connecticut Department of Emergency Services and Public Protection Administration and Operations Manual or such other State document as governs procedures for background checks. The Contractor and Contractor Parties shall cooperate fully as necessary or reasonably requested with the State and its agents in connection with such background checks.

  • Background and Purpose Executive was employed by the Company. Executive's employment is ending effective ____________ under the conditions described in Section 3.1 of the Executive Severance Agreement ("Agreement") by and between Executive and the Company dated ____________, 2012. The purpose of this Release is to settle, and the parties hereby settle, fully and finally, any and all claims the Releasing Parties may have against the Released Parties, whether asserted or not, known or unknown, including, but not limited to, claims arising out of or related to Executive's employment, any claim for reemployment, or any other claims whether asserted or not, known or unknown, past or future, that relate to Executive's employment, reemployment, or application for reemployment.

  • Background Investigation The BOARD is prohibited from knowingly employing a person who has been convicted of committing or attempting to commit certain criminal offenses. If the required criminal background investigation is not completed at the time this Contract is signed, and the subsequent investigation report reveals that there has been a prohibited conviction, this Contract shall immediately become null and void.

  • Background IP As between the Parties, each Party will retain all right, title and interest in and to all of its Background IP.