Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1558607.1558629acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

JigDFS in container communities for international cargo security

Published: 13 April 2009 Publication History

Abstract

The globalized economy has caused an unavoidable increase in the number of shipping containers. The gigantic number of shipping containers entering the USA on a regular basis poses a significant security risk and inspecting every container is impractical. We proposed a design of a comprehensive solution that would monitor containers' integrity from the originating port to the destination port and report any intrusion event if it has taken place; the intruded container can then be handled in an appropriate way. More important, the system itself is designed to be secure and intrusion resistant. In this paper we discuss an implementation of tamper resistance, which necessitates the design of smart containers and implementation of additional measures to ensure smart containers be tamper resistant. Moreover, this paper discusses an implementation of Jigsaw Distributed File System (JigDFS) to further protect the container communities.

References

[1]
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. Wireless sensor networks: a survey. Comput. Netw., 38(4):393--422, 2002.
[2]
J. Bian and R. Seker. Jigdfs: A secure distributed file system. In Proceedings of 2009 IEEE Symposium on Computational Intelligence in Cyber Security. IEEE, 2009.
[3]
J. BlŽmer, M. Kalfane, M. Karpinski, R. Karp, M. Luby, and D. Zuckerman. An xor-based erasure-resilient coding scheme. Technical report, International Computer Science Institute, August 1995.
[4]
D. Brookshier, D. Govoni, N. Krishnan, and J. C. Soto. JXTA: Java P2P Programming. Sams, Indianapolis, IN, USA, 2002.
[5]
K. Chakrabarty, S. S. Iyengar, H. Qi, and E. Cho. Grid coverage for surveillance and target location in distributed sensor networks. IEEE Trans. Comput., 51(12):1448--1453, 2002.
[6]
C. Gui and P. Mohapatra. Power conservation and quality of surveillance in target tracking sensor networks. In MobiCom '04: Proceedings of the 10th annual international conference on Mobile computing and networking, pages 129--143, New York, NY, USA, 2004. ACM.
[7]
D. Kato. Gisp: Global information sharing protocol" a distributed index for peer-to-peer systems. In P2P '02: Proceedings of the Second International Conference on Peer-to-Peer Computing, page 65, Washington, DC, USA, 2002. IEEE Computer Society.
[8]
S. Oaks and L. Gong. Jxta in a Nutshell. O'Reilly&Associates, Inc., Sebastopol, CA, USA, 2002.
[9]
G. J. Pottie and W. J. Kaiser. Wireless integrated network sensors. Commun. ACM, 43(5):51--58, 2000.
[10]
M. O. Rabin. Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM, 36(2):335--348, 1989.
[11]
I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics, 8(2):300--304, 1960.
[12]
B. Traversat, M. Abdelaziz, and E. Pouyoul. Project jxta: A loosely-consistent dht rendezvous walker. jxta-dht.pdf, 2007.
[13]
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59--64, New York, NY, USA, 2004. ACM.

Cited By

View all
  • (2009)JigDFS for implementing secure container communities2009 IEEE International Conference on Systems, Man and Cybernetics10.1109/ICSMC.2009.5346865(3651-3656)Online publication date: Oct-2009

Index Terms

  1. JigDFS in container communities for international cargo security

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '09: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
    April 2009
    952 pages
    ISBN:9781605585185
    DOI:10.1145/1558607
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 13 April 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSIIRW '09

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2009)JigDFS for implementing secure container communities2009 IEEE International Conference on Systems, Man and Cybernetics10.1109/ICSMC.2009.5346865(3651-3656)Online publication date: Oct-2009

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media