Free Essay

Survey on Leach Protocols

In: Computers and Technology

Submitted By Bhavya9
Words 2569
Pages 11
A Survey on LEACH and its Variant in Wireless Sensor Network 1st Bhavya R Patel, 2nd Jignesh patel 1st PG Student, 2nd Asst.Prof. 1st Computer Engineering, 2nd Computer Engineering S.R.Patel Engineering College, Unjha, Mehsana,India 1bhavyapatel9@gmail.com, 2 jigneshpatel.er@gmail.com __________________________________________________________________________________________________________
Abstract-Sensor webs consisting of nodes with limited battery power and wireless communications are deployed to collect useful information from the field. Gathering sensed information in an energy efficient manner is critical to operate the sensor network for a long period of time. A data collection problem is defined where, in a round of communication, each sensor node has a packet to be sent to the distant base station. If each node transmits its sensed data directly to the base station then it will deplete its power quickly. Since wireless communications consume significant amounts of battery power, sensor nodes should spend as little energy as possible receiving and transmitting data. It is necessary for communication protocols to maximize nodes' lifetimes, reduce bandwidth consumption by using local collaboration among the nodes, and tolerate node failures. Most of the work in energy efficient data gathering application is motivated by LEACH by allowing rotation of cluster head for load distribution. In this paper, we have presented several existing methods for energy efficient cluster head selection in wireless sensor network.
I. INTRODUCTION
Modern wireless sensor networks are made up of a large number of inexpensive devices that are networked via low power wireless communications. It is the networking capability that fundamentally differentiates a sensor network from a mere collection of sensors, by enabling cooperation, coordination, and collaboration among sensor assets. Harvesting advances in the past decade in microelectronics, sensing, analog and digital signal processing, wireless communications, and networking, wireless sensor network technology is expected to have a significant impact on our lives in the twenty-first century. Proposed applications of sensor networks include environmental monitoring, natural disaster prediction and relief, homeland security, healthcare, manufacturing, transportation, and home appliances and entertainment. Sensor networks are expected to be a crucial part in future military missions, for example, as embodied in the concepts of network centric warfare and network-enabled capability. Wireless sensor networks differ fundamentally from general data networks such as the internet, and as such they require the adoption of a different design paradigm. Often sensor networks are application specific; they are designed and deployed for special purposes. Thus the network design must take into account the specific intended applications. More fundamentally, in the context of wireless sensor networks, the broadcast nature of the medium must be taken into account. For battery-operated sensors, energy conservation is one of the most important design parameters, since replacing batteries may be difficult or impossible in many applications. Thus sensor network designs must be optimized to extend the network lifetime. The energy and bandwidth constraints and the potential large-scale deployment pose challenges to efficient resource allocation and sensor management. The constraint most often associated with sensor network design is that sensor nodes operate with limited energy budgets.
Typically, they are powered through batteries, which must be either replaced or recharged (e.g., using solar power) when depleted. For some nodes, neither option is appropriate, that is, they will simply be discarded once their energy source is depleted. Whether the battery can be recharged or not significantly affects the strategy applied to energy consumption. For non-rechargeable batteries, a sensor node should be able to operate until either its mission time has passed or the battery can be replaced. The length of the mission time depends on the type of application, for example, scientists monitoring glacial movements may need sensors that can operate for several years while a sensor in a battlefield scenario may only be needed for a few hours or days. As a consequence, the first and often most important design challenge for a WSN is energy efficiency. The rest of the paper is organized as follows: Section II describes unique constraints and challenges in wireless sensor networks. Section III describes LEACH and its variations. Finally conclusion is presented in last section.
II. UNIQUE CONSTRAINTS AND CHALLENGES The challenges we face in designing sensor network systems and applications include the following: • Limited hardware: Each node has limited processing, storage, and communication capabilities, and limited energy supply and bandwidth. • Limited support for networking: The network is peer-to-peer, with a mesh topology and dynamic, mobile, and unreliable connectivity. There are no universal routing protocols or central registry services. Each node acts both as a router and as an application host. • Limited support for software development: The tasks are typically real-time and massively distributed, involve dynamic collaboration among nodes, and must handle multiple competing events. Global properties can be specified only via local instructions. Because of the coupling between applications and system layers, the software architecture must be co-designed with the information processing architecture.
III. EXISTING METHODS FOR CLUSTER HEAD SELECTION
LEACH Protocol[1][2]
Low Energy Adaptive Clustering Hierarchy (LEACH) protocol has attracted intensive attention because of its energy efficient, simplicity and load balancing properties. LEACH is a cluster based protocol. The numbers of cluster heads and cluster members generated by LEACH are important parameters for achieving better performance. LEACH organizes nodes into clusters with one node from each cluster serving as a cluster-head (CH). It randomly selects some predetermined number of nodes as cluster heads. CHs then advertise themselves and other nodes join one of those cluster heads whose signal they found strongest (i.e. the CH which is nearest to them). In this way a cluster is formed. The CH then makes a Time Divison Multiple Access (TDMA) schedule for the nodes under its cluster. The communication between different clusters is done through CHs in a Code Divison Multiple Access (CDMA) manner. The CHs collect the data from their clusters and aggregate it before sending it to the other CHs or base station (BS). After a predetermined time lapse, the cluster formation step is repeated so that different nodes are given a chance to become CHs and energy consumption is thus uniformly distributed. LEACH protocol Operation can be divided into two phases: Setup phase and Steady phase.In the setup phase, the clusters are formed and a cluster-head (CH) is chosen for each cluster. While in the steady phase, data is sensed and sent to the central base station. The steady phase is longer than the setup phase. This is done in order to minimize the overhead cost. Drawbacks in LEACH:  It is not applicable to networks that are deployed in large region as it uses single hop routing where each node can transmit directly to the cluster head and the sink  The cluster heads used in the LEACH will consume a large amount of energy if they are located farther away from the sink.  It does not guarantee good cluster head distribution and it involves the assumption of uniform energy consumption for the cluster heads. So sometimes possible one cluster has many member node and in other very few member node.  It uses dynamic clustering which results in extra overhead .  The time duration of the setup phase is nondeterministic and the collisions will cause the time duration too long and hence the sensing services are interrupted. Due to that LEACH may be unstable during the setup phase that depends on the density of sensors.  LEACH does not support mobility nodes.
LEACH-C: (Centralized)[2] However, using a central control algorithm to form the clusters may produce better clusters by dispersing the cluster-head nodes throughout the network. This is the basis for LEACH-C (LEACH-Centralized), a protocol that uses a centralized clustering algorithm and the same steady-state protocol as LEACH (e.g., nodes send their data to the cluster-head, and the cluster-head aggregates the data and sends the aggregate signal to the base station).During the set-up phase of LEACH-C, each node sends information about its current location and energy level to the base station. While LEACH-C produces superior clusters to LEACH, there is a cost to using a centralized cluster formation algorithm compared to a distributed algorithm. This protocol requires a GPS or other location-tracking device on the nodes, and the start-up phase is more energy-intensive than the distributed approach since information from each node must be transmitted to the base station at the beginning of each round. LEACH-F (Fixed Cluster, Rotating Cluster-Head)
Adapting the clusters depending on which nodes are cluster-heads for a particular round is advantageous because it ensures that nodes communicate with the cluster-head node that requires the lowest amount of transmit power. In addition to reducing energy dissipation, this ensures minimum inter-cluster interference, as the power of an interfering message will be less than (or, at most, equal to) the power of the message the cluster-head is receiving. If, on the other hand, the clusters were fixed and only the clusterhead nodes were rotated, a node may have to use a large amount of power to communicate with its cluster-head when there is another cluster's cluster-head close by [3]. The advantage of fixed clusters is that once the clusters are formed, there is no set-up overhead at the beginning of each round. Depending on the cost for forming adaptive clusters, an approach where the clusters are formed once and fixed and the cluster-head position rotates among the nodes in the cluster may be more energy-efficient than LEACH. This is the basis for LEACH-F (LEACH with Fixed clusters). In LEACH-F, clusters are created using the centralized cluster formation algorithm developed for LEACH-C. The base station determines optimal clusters and broadcasts the cluster information to the nodes. This broadcast message includes the cluster ID for each node, from which the nodes can determine the TDMA schedule and the order to rotate the cluster-head position. Drawbacks:  New node can not be added.  Does not support mobilty  Do not adjust behavior on node dying.
Multi hop LEACH[4] The distance between the cluster head and the base station is increased enormously when the network diameter is increased beyond a certain level in which the scenario is not suitable for Leach routing protocol The energy efficiency of the protocol can be increased by using multi-hop communication within the cluster. It is a complete distributed clustering based routing protocol. Drawbacks:  Significant overhead to maintain network topology and medium access control.
LEACH-B [5] LEACH-B (Balanced) which proposes an enhanced version of LEACH by finding the number of CHs which are near optimal. In LEACH-B, there is a second stage for selecting CHs through considering the residual energy of candidate nodes to become CHs, which modifies the number of CH sat the set up phase considering the node’s residual energy. This protocol can save energy consumption by ensuring that the clusters are balanced. The optimal number of CHs is between 3 and 5 from total 100 nodes (3% - 5%). Drawbacks:  Extra overhead of electing cluster head
LEACH-V (VICE CH) The Vice-LEACH protocol in which the cluster contains a CH (which is responsible only for sending data that is received from the cluster members to the BS), a viceCH (the node that will become a CH in case the old CH dies), and cluster nodes (for gathering data from environment and send it to the CH). In the original leach, the CH is always on to receive data from cluster members, aggregate these data, and then send it to the BS that might be located far away from it[10]. The CH will die earlier than the other nodes in the cluster because of its operation of receiving, Sending and overhearing. When the CH dies, the cluster will become isolated because the data gathered by cluster nodes will never reach the base station. In V-LEACH protocol, besides having a CH in the cluster, there is a vice-CH that takes the role of the CH when the original CH dies. By doing that, data collected by the cluster nodes will always reach the BS. Therefore, no need to elect a new CH each time the CH dies. This will extend the overall network lifetime. Drawback:  Extra processing for selecting vice-CH. PEGASIS: Power-Efficient Gathering in Sensor Information System [7] The main idea in PEGASIS is for each node to receive from and transmit to close neighbors and take sums being the leader for transmission to the BS. This approach distributes the energy load evenly among the sensor nodes in the network. The author initially places the nodes randomly in the play field, and therefore, the i-th node is at a random location. The node will be organized to form a chain, which can either be accomplished by the sensor nodes themselves using a greedy algorithm starting from some node. Alternatively, the BS can compute this chain and broadcast it to all the sensor nodes. PEGASIS improves on LEACH by saving energy in several stages. First, in the local gathering, the distances that most of the nodes transmit are much less compared to transmitting to a cluster-head in LEACH. Second, the amount of data for the leader to receive is at most two messages instead of 20 (20 nodes per cluster in LEACH for a 100-node network). Finally, only one node transmits to the BS in each round of communication.
Energy Efficient Chain Based Routing [8] In the proposed protocol, the network is divided to a set of strips. It is assumed that “h” is height of each strip and there are “k” strips in the sensor network, computed by “k=L/h”, where “L” is length of wireless sensor network. In each strip, a chain is formed among the sensor nodes and a chain head is selected. In order to balance energy consumption among all sensor nodes in the network, the chain head’s role should be rotated among the sensor nodes to prevent their exhaustion.
CONCLUSION Sensor nodes are resource limited devices. Energy is very crucial for sensor networks. LEACH is completely distributed, requiring no control information from the base station. We have presented several existing energy efficient cluster head selection methods. Still it is an active research area. REFERENCES
[1] W. Heinzelman, A. Chandrakasan and H. Balakrishnan,”Energy-Efficient Communication Protocol for Wireless Micro sensor Networks,” Proceedings of the 33rd Hawaii International Conference on System Sciences (HICSS ’00), January 2000. [2] Wendi B. Heinzelman, Anantha P. Chandrakasan, Hari Balakrishnan; “An Application-Specific Protocol Architecture for Wireless Microsensor Networks”; IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 1, NO. 4, OCTOBER 2002 [3] Wendi B. Heinzelman “Application-Specific Protocol Architectures For WSN “Submitted To The Department Of Electrical Engineering And Computer Science In Partial Fulfilment Of The Requirements For The Degree Of Doctor Of Philosophy At The MASSACHUSETTS INSTITUTE OF TECHNOLOGY June 2000 [4] K.Ramesh, Dr.K.Somasundaram “A COMPARATIVE STUDY OF CLUSTERHEAD SELECTION ALGORITHMS IN WIRELESS SENSOR NETWORKS ” International Journal Of Computer Science & Engineering Survey (IJCSES) Vol.2, No.4, November 2011 [5] Mu Tong, Minghao Tang “LEACH-B:An Improved LEACH Protocol for Wireless Sensor Network” In IEEE International conference on Wireless Communications, 2010 [6] J.Gnanambigai, Dr.N.Rengarajan, K.Anbukkarasi “ Leach AND Its Descendant Protocols: A Survey” International Journal Of Communication AND Computer TECHNOLOGIES September 2012
[

Similar Documents

Free Essay

Survey

...A Survey on Energy Efficient Routing Protocols for Wireless Sensor Networks Muhammad Asad Department of Computer Science COMSATS INSTITUTE OF INFORMATION TECHNOLOGY, WAH CANT Abstract: To tackle the limited life-time issue of Wireless Sensor Networks (WSNs) is a very key research domain in order to design, development and implementation of energy effective algorithms. So, the major concern of researcher is energy efficiency in wireless sensor networks. WSNs acknowledged magnificent consideration from both industry and academic because of assure numerous latent applications in military and civilian areas. WSN consists of sensor nodes sensing the data, communication capabilities and data processing. Network can be deployed in the area of interest and collaborate to complete a task. WSN has multiple exclusive characteristics, such as memory constraints, computation, stern power, asymmetric data transmission, higher unreliability of sensor nodes and denser node deployment and presents several new challenges for the ultimate application and development of WSNs. In exacting, sensor nodes are operates without attendance and battery powered for a long period of time. In order to recharge or change these batteries of sensor nodes are quite difficult or impossible in most of the cases. In this regard, energy efficient routing protocols in wireless sensor networks are essential for exceeding the network lifetime of sensors. In this paper I present a comparatively survey of few prominent...

Words: 3472 - Pages: 14

Free Essay

Windows vs Linux

...A Comparison of the Security of Windows NT and UNIX† Hans Hedbom1,2, Stefan Lindskog1,2, Stefan Axelsson1 and Erland Jonsson1 1Dept of Computer Engineering 2Dept of Computer Science Chalmers University of Technology S-412 96 Göteborg, SWEDEN {sax, Erland.Jonsson}@ce.chalmers.se University of Karlstad S-651 88 Karlstad, SWEDEN {Hans.Hedbom, Stefan.Lindskog}@hks.se Abstract This paper presents a brief comparison of two operating systems, Windows NT and UNIX. The comparison covers two different aspects. First, we compare the main security features of the two operating systems and then we make a comparison of a selection of vulnerabilities most of which we know have been used for making real intrusions. We found that Windows NT has slightly more rigorous security features than “standard” UNIX but the two systems display similar vulnerabilities. The conclusion is that there are no significant differences in the “real” level of security between these systems. †Presented at the Third Nordic Workshop on Secure IT Systems, NORDSEC’ 5-6 November, 1998, Trondheim, Norway. 98, 1. Introduction It has been claimed that the security of Windows NT is far better than that of previous commercial operating systems. In order to verify (or refute) this statement we have made a brief comparison of the security of Windows NT to that of UNIX. UNIX was selected as a reference since it is well-known and widely spread. Thus, the target systems were (1) a networked Windows NT 4.0 and...

Words: 6676 - Pages: 27

Premium Essay

Mobile

...Mobile Banking “Making Cash, Checks, Credit Cards Obsolete” Abstract With the growing and widespread use of smartphones applications for both the iPhone and Android there is very little you can’t do virtually. From banking to shopping, in-person visits to Skype and face time, putting a key in your car to start it to remotely starting your car and setting the temperature, being at home turning on lights and adjusting your thermostat to doing the same functions remotely using a smartphone. Smartphone applications have offered instantaneous, real-time efficiencies in our day-to-day life. Two generations ago you had to physically get up to change the channel on your television. Now you can talk into the remote control for channel changes and special programming. The same goes for banking. Everything is about speed of transaction and efficiency. Cash and credit card transactions are becoming obsolete with the advent of smartphone applications. Today you can shop, make purchases, and make bank deposits and transfers without leaving the comfort of your home. This paper explores how new technology and smartphone applications are used for mobile banking rendering cash, checking and credit card transactions obsolete. Keywords: Mobile Banking, Security, Cost and Benefits, Future Technology Mobile Banking “Making Cash, Checks, Credit Cards Obsolete” Mobile banking is becoming increasingly popular with over a billion mobile devices in use today. If you are a smartphone user...

Words: 5012 - Pages: 21

Premium Essay

Beanos Ice Cream Shoppe

...Production Management, Journal of Operations Management, Management Science, and Production and Operations Management. The qualitative case studies chosen were published between 1992 and 2007. With an increasing trend toward using more qualitative case studies, there have been meaningful and significant contributions to the field of operations management, especially in the area of theory building. However, in many of the qualitative case studies we reviewed, sufficient details in research design, data collection, and data analysis were missing. For instance, there are studies that do not offer sampling logic or a description of the analysis through which research outcomes are drawn. Further, research protocols for doing inductive case studies are much better developed compared to the research protocols for doing deductive case studies. Consequently, there is a lack of consistency in the way the case method has been applied. As qualitative researchers, we offer suggestions on how we can improve on what we have done and elevate the level of rigor and consistency. Published by Elsevier B.V. Article history:...

Words: 13548 - Pages: 55

Premium Essay

Integrated Distributors Incorporated (Idi), a Publically Traded Company, Has Its Home Office Located in Billings, Montana. Idi Has More Than 4000 Employees in the Following Locations:

... Definitions of a Security Breach Requirements Data Owner Responsibilities Location Manager Responsibilities When Notification Is Required Incident Response – Breach of Personal Information Information Technology Operations Center Chief Information Security Officer Customer Database Owners Online Sales Department Credit Payment Systems Legal Human Resources Network Architecture Public Relations Location Manager Appendix A MasterCard Specific Steps Visa U.S.A. Specific Steps Discover Card Specific Steps American Express Specific Steps Appendix B California Civil Code 1798.82 (Senate Bill 1386) Health Insurance Portability and Accountability Act of 1996 (HIPAA) Gramm-Leach-Bliley Act (GLBA) Appendix C Escalation Members (VP Level of Management) Auxiliary Members (as needed) External Contacts (as needed) Notification Order Escalation Member Notification List Notice to Readers Incident Response Plan – Template for Breach of Personal Information does not represent an official position of the American Institute of Certified Public Accountants, and it is distributed with the understanding that the author and the publisher are not rendering accounting, or other professional services in the publication. If legal advice or other expert assistance is required, the services of a competent professional should be sought. Copyright © 2004 by American...

Words: 8476 - Pages: 34

Free Essay

Antiphishing

...A Structured Analysis of PHISHING By Prasath Manimaran ID: 20038303 Table of Contents Chapter One – Introduction 1. Research Questions and Objectives……………….…………………………………………….5 Chapter Two – Literature Review & Definition of Phishing 2.1. Literature Review…………………………………………………………………………………………..8 2.1.2. Definitions of Phishing……………………………………………………………………..8 2.1.3. Outcomes of this Study…………………………………………………………………….16 2.2. Research Details 2.2.1. Scope of the Research……………………………………………………………………….17 2.2.2. Research Methodology……………………………………………………………………..17 2.2.3Inductive versus Deductive Study……..………………………………………………..20 2.2.4. Qualitative versus Quantative……………………………………………………..20 Chapter Three – Phishing in a Banking Context 3.1. Confidence in Internet Banking……………………………………………………………………22 3.1.1. Security Requirements………………………………………………………………………23 3.2. Threat Models……………………………………………………………………………………………….25 3.2.1. The Internet Threat Model……………………………………………………..25 3.2.2. Thompson Threat Model……………………………………………………….26 3.2.3. Viral Threaet Model………………………………………………………………26 3.3. The Phishing Threat Model…………………………………………………………………………..26 3.3.1. Identification of Internet Banking Components………………………………..27 3.3.2. Identification of Phishing Threats………………………………………………29 Chapter 4 – Analysis of Current Phishing Techniques 4.1. Modus Operandi………………………………………………………………………………………….…36 4.2. Roles of Adversary in Phishing………………………………………………………………………...

Words: 15039 - Pages: 61

Premium Essay

Introduction To Research Methodology

...qualitative method that was initiated in this research was the cognitive interviewing, in order to cross examine the answers that the respondents’ provides. In other words, this method was used to study "the operation of survey response errors across a wide range of survey questions" (O, 2005), to get both the sides of the stories that includes the positive and negative response of the respondents towards awareness and risk perceptions of HIV/AIDS. This method was also resorted to determine what they actually meant to convey regarding awareness and risk perceptions of HIV/AIDS instead of misinterpreting their response, thus in a way cross-surveying their response for quality analysis (Madans, Miller, Maitland, & Willis, 2011). Through this method, this research was able to obtain the much needed answer in a refined quality with regard to the awareness and risk perceptions of HIV/AIDS among women in coastal areas of Kerala. Quantitative method involved using the scientific method to collected statistical data. This would mean, the quantitative method followed the procedure of forming question, investigating previous literatures for framing the hypothesis, collecting the statistics and verifying the findings in order to form conclusions. 1.4. Data Collection Means and Protocol 1.4.1. Types of Data (Primary/Secondary) Data was collected from both primary and secondary sources which have been elaborated as under: 1. Primary Research Data The primary data is generally collected with the aid...

Words: 5109 - Pages: 21

Premium Essay

Sem3

...Second Year - Third Semester 3.0.1 International Business - University Assessment 100 Marks Course Content 1. Overview of the International Business Process 2. PEST factors affecting International Business 3. Government influence on trade 4. International Trade Theories 5. FDI 6. Country Evaluation and Selection 7. Collaborative Strategies 8. International Marketing 9. International Trade Agreements 10. International Trade Organizations 11. Forex 12. International HR Strategies 13. International Diplomacy Reference Text 1. International Business – Daniels and Radebough 2. International Business – Sundaram and Black 3. International Business – Roebuck and Simon 4. International Business – Charles Hill 5. International Business – Subba Rao 3.0.2 Strategic management 100 Marks Course Content 1. Strategic Management Process: Vision, Mission, Goal, Philosophy, Policies of an Organization. 2. Strategy, Strategy as planned action, Its importance, Process and advantages of planning Strategic v/s Operational Planning. 3. Decision making and problem solving, Categories of problems, Problem solving skill, Group decision making, Phases indecision making. 4. Communication, Commitment and performance, Role of the leader, Manager v/s Leader, Leadership styles. 5. Conventional Strategic Management v/s Unconventional Strategic Management, The differences, Changed Circumstance 6. Growth Accelerators: Business Web, Market Power, Learning based. 7. Management Control, Elements,...

Words: 13742 - Pages: 55

Premium Essay

Empowerment

...Organization Management Journal Linking Theory & Practice: EAM White Papers Series 2006 Vol. 3, No. 3, 210-231 © 2006 Eastern Academy of Management ISSN 1541-6518 www.omj-online.org Effective Empowerment in Organizations GARY A. YUKL University at Albany WENDY S. BECKER University at Albany Psychological empowerment is the perception that workers can help determine their own work roles, accomplish meaningful work, and influence important decisions. Empowerment has been studied from different perspectives, including employee perceptions, leadership behaviors, and management programs. Despite positive rhetoric, programs designed to increase empowerment seldom achieve the benefits promised. Inconclusive and seemingly contradictory outcomes stem from the fact that few companies give employees significant control and access to management information. A half century of research suggests that empowerment strategies can offer real benefits. We outline facilitating conditions for effective empowerment, including characteristics of organizations, leaders, employees, and the work itself. Keywords: Empowerment, Leadership, Teams, Power Sharing Effective Empowerment in Organizations Psychological empowerment in organizations is the perception by members that they have the opportunity to help determine work roles, accomplish meaningful work, and influence important decisions. Over the past several decades an interest in empowerment can be seen in many subject areas within psychology...

Words: 9742 - Pages: 39

Premium Essay

Environment Management

...Environment Management Topic : Hazardous Waste Management Group Members : Rohan Shanbhag (146) Amit Sharma (147) Nandita Sharma (148) Priya Shegoankar (149) Hazardous waste management is the collection, treatment, and disposal of waste material that, when improperly handled, can cause substantial harm to human health and safety or to the environment. Hazardous wastes can take the form of solids, liquids, sludges, or contained gases, and they are generated primarily by chemical production, manufacturing, and other industrial activities. They may cause damage during inadequate storage, transportation, treatment, or disposal operations. Improper hazardous-waste storage or disposal frequently contaminates surface and groundwater supplies. People living in homes built near old and abandoned waste disposal sites may be in a particularly vulnerable position. In an effort to remedy existing problems and to prevent future harm from hazardous wastes, governments closely regulate the practice of hazardous-waste management. Hazardous Materials Regulations Hazardous materials are regulated by three primary government agencies: ...

Words: 8581 - Pages: 35

Premium Essay

Vulnerability in Information

...CHAPTER 1 Vulnerabilities, Threats, and Attacks Upon completion of this chapter, you should be able to answer the following questions: ■ ■ What are the basics concepts of network security? What are some common network security vulnerabilities and threats? ■ ■ What are security attacks? What is the process of vulnerability analysis? Key Terms This chapter uses the following key terms. You can find the definitions in the glossary at the end of the book. Unstructured threats Structured threats External threats Internal threats Hacker Cracker Phreaker Spammer Phisher page 21 page 21 page 21 page 21 page 21 page 20 page 20 page 20 page 21 White hat Black hat page 21 page 21 page 28 page 28 Dictionary cracking Brute-force computation Trust exploitation Port redirection page 28 page 29 page 30 Man-in-the-middle attack Social engineering Phishing page 30 page 30 2 Network Security 1 and 2 Companion Guide The Internet continues to grow exponentially. Personal, government, and business applications continue to multiply on the Internet, with immediate benefits to end users. However, these network-based applications and services can pose security risks to individuals and to the information resources of companies and governments. Information is an asset that must be protected. Without adequate network security, many individuals, businesses, and governments risk losing that asset. Network security is the process by which digital information assets...

Words: 13317 - Pages: 54

Free Essay

Ewaste

...Assessment and Remediation of the Environment, Mawson Lakes Campus, Adelaide, SA 5095, Australia c Croucher Institute for Environmental Sciences, Department of Biology, Hong Kong Baptist University, Kowloon Tong, China b a r t i c l e i n f o Article history: Received 27 July 2012 Accepted 8 January 2013 Available online 10 February 2013 Keywords: Electronic waste Life Cycle Assessment (LCA) Material Flow Analysis (MFA) Multi Criteria Analysis (MCA) Extended Producer Responsibility (EPR) a b s t r a c t Electronic waste (e-waste) is one of the fastest-growing pollution problems worldwide given the presence if a variety of toxic substances which can contaminate the environment and threaten human health, if disposal protocols are not meticulously managed. This paper presents an overview of toxic substances present in e-waste, their potential environmental and human health impacts together with management strategies currently being used in certain countries. Several tools including Life Cycle Assessment (LCA), Material Flow Analysis (MFA), Multi Criteria Analysis (MCA) and Extended Producer Responsibility (EPR) have been developed to manage e-wastes especially in developed countries. The key to success in terms of e-waste management is to develop eco-design devices, properly collect e-waste, recover and recycle material by safe methods, dispose of e-waste by suitable...

Words: 4693 - Pages: 19

Premium Essay

Kayworth and Whitten 2010 Misqe

...Effective Information Security Requires a Balance of Social and Technology Factors EffEctivE information SEcurity rEquirES MIS Uarterly a BalancE of Social and tEchnology xecutive factorS1,2 Q E Tim Kayworth Baylor University (U.S.) Dwayne Whitten Texas A&M University (U.S.) Executive Summary 2 Industry experts have called for organizations to be more strategic in their approach to information security, yet it has not been clear what such an approach looks like in practice or how firms actually achieve this. To address this issue, we interviewed 21 information security executives from 11 organizations. Our results suggest that a strategically focused information security strategy encompasses not only IT products and solutions but also organizational integration and social alignment mechanisms. Together, these form a framework for a socio-technical approach to information security that achieves three objectives: balancing the need to secure information assets against the need to enable the business, maintaining compliance, and ensuring cultural fit. The article describes these objectives and the security alignment mechanisms needed to achieve them and concludes with guidelines that can be applied to ensure effective information security management in different organizational settings. INFORMATION SECURITY HAS BECOME A STRATEGIC ISSUE Information security continues to be a major concern among corporate executives. The threat of terrorism,...

Words: 7959 - Pages: 32

Premium Essay

Whaling

...Introduction Since the indefinite commercial whaling moratorium was introduced in 1986, the whaling nations have killed around 15,000 whales between them. At the time of writing, the Japanese whaling fleet has just returned from Antarctic waters where a further 300 or so minke whales have been killed for so called ‘research’, in open defiance of world public opinion and the IWC which has never validated the Japanese programme. The meat from those dead whales will end up on sale in Japanese restaurants and on supermarket shelves. Japan is not only defying the global moratorium on commercial whaling, it is killing whales in a sanctuary agreed by the IWC in 1994. Japan has ‘recruited’ many countries to the IWC to support the resumption of commercial whaling using foreign aid packages. If the ban is lost it will be a disaster for whale conservation efforts. This report presents the many reasons why the ban on commercial whaling must be maintained and properly enforced. We cannot wipe away the tragic history of commercial whaling, but we can, and must, prevent its repetition. The Natural History of Whales Whales belong to the order of mammals known as Cetacea. There are about 80 species of cetaceans, including all the dolphins and porpoises, as well as the ten so-called ‘great’ whale species, which have borne the brunt of commercial whaling. Cetaceans are believed to have evolved from land mammals, which adapted to an aquatic existence about 50 million years ago. They are superbly...

Words: 8170 - Pages: 33

Premium Essay

Annual Report

...PURE GOLD TO BE THE LEADING MINING COMPANY To create value for our shareholders, our employees and our business and social partners through safely and responsibly exploring, mining and marketing our products. Our primary focus is gold and we will pursue value creating opportunities in other minerals where we can leverage our existing assets, skills and experience to enhance the delivery of value. Safety is our first value. We place people first and correspondingly put the highest priority on safe and healthy practices and systems of work. We are responsible for seeking out new and innovative ways to ensure that our workplaces are free of occupational injury and illness. We live each day for each other and use our collective commitment, talents, resources and systems to deliver on our most important commitment ... to care. We are accountable for our actions and undertake to deliver on our commitments. We are focused on delivering results and we do what we say we will do. We accept responsibility and hold ourselves accountable for our work, our behaviour, our ethics and our actions. We aim to deliver high performance outcomes and undertake to deliver on our commitments to our colleagues, business and social partners, and our investors. We treat each other with dignity and respect. We believe that individuals who are treated with respect and who are entrusted to take responsibility respond by giving their best. We seek to preserve people's dignity, their sense...

Words: 149499 - Pages: 598