Abstract - This paper presents protocols and methods for ensuring the confidentiality, security, data integrity and freshness of the data that circulate between command and control systems units that can be arranged in a Romanian national anti-hail system. Keywords - anti-hail, hail fighting, hail, data security, hail combat units. I. INTRODUCTION The distribution process means a process that takes place over a large geographical area, adjustment and control parameters are interdependent and distributed over the same geographic area. If the process is critical (security, fire protection, banks, chemical plants, high hazard , nuclear reactors, weather command and control etc) one might question the confidentiality, security, data integrity and freshness so that an intruder can not intercept them, interpret or alter the production of major events or catastrophes. Given the current technological development, the question of control and influence of the meteorological phenomena’s in both military purpose and useful purposes such as anti-hail protection, provoking rain for a peaceful purpose. In his paper Geophysical War [1] col. dr (r) Emil Streinu presents some of the systems and research centers in the meteorological domain. One is located in the northern U.S. at 400 km distance from Anchorage, at the Gakhona military base. A huge field of tundra is planted with a forest of antennas of 25 m height generically called HAARP (High Frequency Active Aurora Research Program). The base is surrounded by barbed wire, the perimeter is guarded by armed patrols of Marines and air space above the research base is closed to all civilian and military aircraft. In response, in Russia there is a similar complex "Sura" which is comparable, in terms of capacity with the current HAARP and is within the central area, in places hidden at a distance of 150 km from Nizhnii Novgorod. "Sura" belongs in the Radiophysics Research Institute where, among other things, once worked the former scientist and current politician, Boris Nemtov. "Today, in the world, there are only three such objectives," says institute director Sergei Sneghiriov. "One in Alaska, second, in Norway at Tromso, and the third - in Russia". In the field of civil concerns fall on the anti-hail protection, starting with sonic cannons, weather balloons and finishing with anti-hail rockets and with rain provoking rockets. From historical point of view the first artificial rain was provoked in Bucharest in 1931 by researcher Stefania Maracineanu. Thanks to the data obtained by Stefania Maracineanu, she obtained support from the French government and she repeated these experiments in 1934 in Algeria, being crowned in succes. The next research in this area did not continued until after the Second World War, when in 1946, Vincent J. Shaefer American engineer did an experiment on Mount Washington. Here, in this day heavy clouds where forming over the mountain. He scattered from plane at the base of the cloud, carbonic ice, which gave rise to a heavy rain. The first artificial rain for military purposes was caused in 1963 by the U.S. Army in Vietnam, and in 1966 the Americans provoked torrential rains with disastrous consequences for the provinces of northern Laos. Comparing the effects of the known weapons with those of the Geophysical War especially over the living force, it appears that huge damage can be done; this can be use in a secret war, are stronger than the known weapons and is due to human capacity to know, manage and control the natural phenomena of our planet. Now Geophysical War presents perspectives as possible, but with the mention that such a conflict in the notion of winners and losers might be mistaken, but are able to distinguish between military and civilian victims, between aggression and attack, which emphasizes the fact that scientists can be used in this domain. A try with unexpected effects occurred in China in spring of 2000. Chinese researchers, launched in the atmosphere in a arid region, several rockets with silver iodide in order to obtain rain. Independently from into account all environmental factors of the area, Chinese scientists found themselves in a very short period of time in that area with heavy snow. Research to date have been made by small isolated groups which had a short life due to economic conditions or market demand for equipment, unable to benefit from experiences and previous research. Except are perhaps the military research, where in the same time with the climate disasters there should exists methods and means to combat this effects, but obviously this are not available to the public. All the achievements to date have been and are built to protect limited objectives (car parks, solar collectors and wind turbines fields, farms) without taking into account global protection through a unique system-wide coordination unit, at local area at least. The beneficiaries are very satisfied by the investment they made.
[1] Col.dr.(r) Emil Strainu, Geophysical War - environmental modification techniques for military purposes, 10.1.2007; [2] Denning D., Denning P.J., "Data Security", Comm. of ACM, sep., 1979; [3] Denning D.E., Cryptography and Data Security", Addison Wesley, 1982; [4] Denning D.E., "Protecting Public Keys and Signature Keys", Computer, feb., 1983; [5] Denning D.E., Digital Signatures With RSA and Other Public-Key Cryptosystems", Comm. of ACM. apr., 1984; [6] Desmedt Y., Vanderwalle J., Govaerts R., "A Critical Analysis Of The Security Of Knapsack Public-Key Algorithms", IEEE Trans. on Inform. Theory, iul., 1984; [7] Desmedt Y., Odlyzko A.M., "A Chosen Text Attack on The RSA", Proceedings of CRYPTO '85, California, 1985; [8] Diffie W., Hellman M., "Privacy and Authentication: An Introduction to Cryptography", Proc IEEE, mar., 1975; [9] Diffie W., Hellman M.E., "Multiuser Cryptography", National Computer Conference, New York, iun., 1976; [10] Diffie W., Hellman M., "New Directions in Cryptography", IEEE Trans. on Inform. Theory., noi., 1976; [11] Diffie W., Hellman M., "Exhaustive Cryptoanalysis of the NBS DES", Computer, iun., 1977; [12] Diffie W., Hellman M., Privacy and Authentication", Proceedings of IEEE, 1979; [13] Patriciu VV, "The possibility of integration of cryptographic features OSI networks", The Military Technical Academy, No. 2, 1991; [14] Patriciu V.V., "Digital signature system identification procedures," ATM Magazine, No. 1, 1991; [15] Patriciu V.V., "Computer aided design software and data security", Computer Aided Design Symposium, ATM, 1991; [16] Patriciu V.V., "Operating systems for mini and microcomputers," Ed.Militară, Bucharest, 1992; [17] Patriciu V.V., "Aspects of cryptographic protection of software", The Military Technical Academy, No. 3, 1992; [18] Patriciu V.V., "Concerns and achievements in computational cryptography", The Military Technical Academy, No. 2, 1992; [19] Patriciu V.V., "The integration of protocols in computer networks protection," referring PhD, IPB, 1992; [20] Patriciu V.V., "Possibilities of using cryptographic methods teleinformatice networks," in volume "Cybernetics and scientific-technical revolution" Ed.Academiei RSR, 1988; [21] Ioan Porumb , "Techniques for ensuring privacy in data acquisition", diploma project, Technical University of Cluj-Napoca,1997; [22] Doswell, C.A. III (2000): Severe convective storms - An overview. Meteor. Monogr., [in press]. (Posted: 23 May 2000). [23] Petersen, W.A. and Rutledge, S. A., 2000: Reagional variability in tropical convection: Observations from TRMM. J. of Climate (en prensa); [24] Kitzmiller, D. H., and J. P. Breidenbach, 1995b: Detection of severe local storm phenomena by automated interpretation of radar and storm environment data. NOAA Technical Memorandum NWS TDL 82, National Weather Service, NOAA, U.S. Department of Commerce, 33 pp. [Available from Techniques Development Laboratory W/OSD2, National Weather Service, 1325 East West Highway, Silver Spring, MD 20910, USA].
După plată vei primi prin email un cod de download pentru a descărca gratis oricare alt referat de pe site (vezi detalii).