29,971 results on '"SECURITY systems"'
Search Results
2. The LHCb ultra-fast simulation option, Lamarr design and validation.
- Author
-
Anderlini, Lucio, Barbetti, Matteo, Capelli, Simone, Corti, Gloria, Davis, Adam, Derkach, Denis, Kazeev, Nikita, Maevskiy, Artem, Martinelli, Maurizio, Mokonenko, Sergei, Siddi, Benedetto G., and Xu, Zehua
- Subjects
- *
MOTHERBOARDS , *CONSUMERS , *GENERATIVE grammar , *DETECTORS , *SECURITY systems - Abstract
Detailed detector simulation is the major consumer of CPU resources at LHCb, having used more than 90% of the total computing budget during Run 2 of the Large Hadron Collider at CERN. As data is collected by the upgraded LHCb detector during Run 3 of the LHC, larger requests for simulated data samples are necessary, and will far exceed the pledged resources of the experiment, even with existing fast simulation options. The evolution of technologies and techniques for simulation production is then mandatory to meet the upcoming needs for the analysis of most of the data collected by the LHCb experiment. In this context, we propose Lamarr, a Gaudi-based framework designed to offer the fastest solution for the simulation of the LHCb detector. Lamarr consists of a pipeline of modules parameterizing both the detector response and the reconstruction algorithms of the LHCb experiment. Most of the parameterizations are made of Deep Generative Models and Gradient Boosted Decision Trees trained on simulated samples or alternatively, where possible, on real data. Embedding Lamarr in the general LHCb Gauss Simulation framework allows combining its execution with any of the available generators in a seamless way. Lamarr has been validated by comparing key reconstructed quantities with Detailed Simulation. Good agreement of the simulated distributions is obtained with two order of magnitude speed-up of the simulation phase. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Computationally intelligent real-time security surveillance system in the education sector using deep learning.
- Author
-
Abid, Muhammad Mobeen, Mahmood, Toqeer, Ashraf, Rahan, Faisal, C. M. Nadeem, Ahmad, Haseeb, and Niaz, Awais Amir
- Subjects
- *
INTELLIGENT tutoring systems , *DEEP learning , *SECURITY systems , *COMPUTER vision , *SECURITY sector - Abstract
Real-time security surveillance and identity matching using face detection and recognition are central research areas within computer vision. The classical facial detection techniques include Haar-like, MTCNN, AdaBoost, and others. These techniques employ template matching and geometric facial features for detecting faces, striving for a balance between detection time and accuracy. To address this issue, the current research presents an enhanced FaceNet network. The RetinaFace is employed to perform expeditious face detection and alignment. Subsequently, FaceNet, with an improved loss function is used to achieve face verification and recognition with high accuracy. The presented work involves a comparative evaluation of the proposed network framework against both traditional and deep learning techniques in terms of face detection and recognition performance. The experimental findings demonstrate that an enhanced FaceNet can successfully meet the real-time facial recognition requirements, and the accuracy of face recognition is 99.86% which fulfills the actual requirement. Consequently, the proposed solution holds significant potential for applications in face detection and recognition within the education sector for real-time security surveillance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Securing IoT Networks from DDoS Attacks Using a Temporary Dynamic IP Strategy.
- Author
-
El Fawal, Ahmad Hani, Mansour, Ali, Ammad Uddin, Mohammad, and Nasser, Abbass
- Subjects
- *
DENIAL of service attacks , *ARTIFICIAL intelligence , *INTERNET of things , *SECURITY systems , *INTERNET protocols , *DATA analysis - Abstract
The progression of the Internet of Things (IoT) has brought about a complete transformation in the way we interact with the physical world. However, this transformation has brought with it a slew of challenges. The advent of intelligent machines that can not only gather data for analysis and decision-making, but also learn and make independent decisions has been a breakthrough. However, the low-cost requirement of IoT devices requires the use of limited resources in processing and storage, which typically leads to a lack of security measures. Consequently, most IoT devices are susceptible to security breaches, turning them into "Bots" that are used in Distributed Denial of Service (DDoS) attacks. In this paper, we propose a new strategy labeled "Temporary Dynamic IP" (TDIP), which offers effective protection against DDoS attacks. The TDIP solution rotates Internet Protocol (IP) addresses frequently, creating a significant deterrent to potential attackers. By maintaining an "IP lease-time" that is short enough to prevent unauthorized access, TDIP enhances overall system security. Our testing, conducted via OMNET++, demonstrated that TDIP was highly effective in preventing DDoS attacks and, at the same time, improving network efficiency and IoT network protection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Robust Detection of Critical Events in the Context of Railway Security Based on Multimodal Sensor Data Fusion.
- Author
-
Hubner, Michael, Wohlleben, Kilian, Litzenberger, Martin, Veigl, Stephan, Opitz, Andreas, Grebien, Stefan, Graf, Franz, Haderer, Andreas, Rechbauer, Susanne, and Poltschak, Sebastian
- Subjects
- *
MULTISENSOR data fusion , *CONSCIOUSNESS raising , *INFRASTRUCTURE (Economics) , *FALSE alarms , *SECURITY systems - Abstract
Effective security surveillance is crucial in the railway sector to prevent security incidents, including vandalism, trespassing, and sabotage. This paper discusses the challenges of maintaining seamless surveillance over extensive railway infrastructure, considering both technological advances and the growing risks posed by terrorist attacks. Based on previous research, this paper discusses the limitations of current surveillance methods, particularly in managing information overload and false alarms that result from integrating multiple sensor technologies. To address these issues, we propose a new fusion model that utilises Probabilistic Occupancy Maps (POMs) and Bayesian fusion techniques. The fusion model is evaluated on a comprehensive dataset comprising three use cases with a total of eight real life critical scenarios. We show that, with this model, the detection accuracy can be increased while simultaneously reducing the false alarms in railway security surveillance systems. This way, our approach aims to enhance situational awareness and reduce false alarms, thereby improving the effectiveness of railway security measures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Improving VulRepair's Perfect Prediction by Leveraging the LION Optimizer.
- Author
-
Kishiyama, Brian, Lee, Young, and Yang, Jeong
- Subjects
ARTIFICIAL neural networks ,TRANSFORMER models ,COMPUTER security vulnerabilities ,PROGRAMMING languages ,SECURITY systems - Abstract
In current software applications, numerous vulnerabilities may be present. Attackers attempt to exploit these vulnerabilities, leading to security breaches, unauthorized entry, data theft, or the incapacitation of computer systems. Instead of addressing software or hardware vulnerabilities at a later stage, it is better to address them immediately or during the development phase. Tools such as AIBugHunter provide solutions designed to tackle software issues by predicting, categorizing, and fixing coding vulnerabilities. Essentially, developers can see where their code is susceptible to attacks and obtain details about the nature and severity of these vulnerabilities. AIBugHunter incorporates VulRepair to detect and repair vulnerabilities. VulRepair currently predicts patches for vulnerable functions at 44%. To be truly effective, this number needs to be increased. This study examines VulRepair to see whether the 44% perfect prediction can be increased. VulRepair is based on T5 and uses both natural language and programming languages during its pretraining phase, along with byte pair encoding. T5 is a text-to-text transfer transformer model with an encoder and decoder as part of its neural network. It outperforms other models such as VRepair and CodeBERT. However, the hyperparameters may not be optimized due to the development of new optimizers. We reviewed a deep neural network (DNN) optimizer developed by Google in 2023. This optimizer, the Evolved Sign Momentum (LION), is available in PyTorch. We applied LION to VulRepair and tested its influence on the hyperparameters. After adjusting the hyperparameters, we obtained a 56% perfect prediction, which exceeds the value of the VulRepair report of 44%. This means that VulRepair can repair more vulnerabilities and avoid more attacks. As far as we know, our approach utilizing an alternative to AdamW, the standard optimizer, has not been previously applied to enhance VulRepair and similar models. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. SignEEG v1.0: Multimodal Dataset with Electroencephalography and Hand-written Signature for Biometric Systems.
- Author
-
Mishra, Ashish Ranjan, Kumar, Rakesh, Gupta, Vibha, Prabhu, Sameer, Upadhyay, Richa, Chhipa, Prakash Chandra, Rakesh, Sumit, Mokayed, Hamam, Das Chakladar, Debashis, De, Kanjar, Liwicki, Marcus, Simistira Liwicki, Foteini, and Saini, Rajkumar
- Subjects
MULTIMODAL user interfaces ,HUMAN fingerprints ,ELECTROENCEPHALOGRAPHY ,BIOMETRY ,BIOMETRIC identification ,MOTOR imagery (Cognition) ,SECURITY systems - Abstract
Handwritten signatures in biometric authentication leverage unique individual characteristics for identification, offering high specificity through dynamic and static properties. However, this modality faces significant challenges from sophisticated forgery attempts, underscoring the need for enhanced security measures in common applications. To address forgery in signature-based biometric systems, integrating a forgery-resistant modality, namely, noninvasive electroencephalography (EEG), which captures unique brain activity patterns, can significantly enhance system robustness by leveraging multimodality's strengths. By combining EEG, a physiological modality, with handwritten signatures, a behavioral modality, our approach capitalizes on the strengths of both, significantly fortifying the robustness of biometric systems through this multimodal integration. In addition, EEG's resistance to replication offers a high-security level, making it a robust addition to user identification and verification. This study presents a new multimodal SignEEG v1.0 dataset based on EEG and hand-drawn signatures from 70 subjects. EEG signals and hand-drawn signatures have been collected with Emotiv Insight and Wacom One sensors, respectively. The multimodal data consists of three paradigms based on mental, & motor imagery, and physical execution: i) thinking of the signature's image, (ii) drawing the signature mentally, and (iii) drawing a signature physically. Extensive experiments have been conducted to establish a baseline with machine learning classifiers. The results demonstrate that multimodality in biometric systems significantly enhances robustness, achieving high reliability even with limited sample sizes. We release the raw, pre-processed data and easy-to-follow implementation details. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. CONSTRUCTION OF POWER SYSTEM NETWORK SECURITY DEFENSE BEHAVIOR DECISION-MAKING MODEL BASED ON ARTIFICIAL INTELLIGENCE TECHNOLOGY.
- Author
-
FEILU HANG, LINJIANG XIE, ZHENHONG ZHANG, and JIAN HU
- Subjects
ARTIFICIAL intelligence ,INFORMATION technology security ,SECURITY systems ,COMPUTER network security ,ELECTRIC power distribution grids ,CONSTRUCTION projects - Abstract
According to the needs of power grid monitoring architecture and information security cooperation protection, this project builds a multi-level, deeply distributed active security cooperation defense mode. A complete implementation method is proposed from the perspective of model architecture and function mechanism. The optimal defense strategy based on grey correlation is studied according to the characteristics of cooperation between regions. In this way, the coordination between the equipment is realized to achieve multi-level protection from the host layer to the security equipment layer and then to the network layer. Multiple detection mechanisms are used to realize the comprehensive detection and integrated judgment of abnormal documents in the cloud environment. This provides maximum protection for cloud users. Experiments show that this method can effectively suppress the malicious attacks of malicious users and reduce the damage caused by viruses. In this way, both the cloud and the customer are protected. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. VERIFICATION AND OPTIMIZATION OF NETWORK SECURITY DEFENSE SYSTEM FROM THE PERSPECTIVE OF BLUE ARMY IN ACTUAL OFFENSIVE AND DEFENSIVE EXERCISES.
- Author
-
ZHOUYUAN LIAO, ZHENHONG ZHANG, and YING YAN
- Subjects
OPTIMIZATION algorithms ,SECURITY systems ,MILITARY supplies ,INFORMATION networks ,CHINESE military ,COMPUTER network security - Abstract
From the point of view of signal camouflage, this paper proposes an active network defense system. Then, the optimal camouflage target selection scheme is proposed. Its goal is to solve the problems existing in the information construction of Chinese military equipment support. This method establishes a multistage game model based on weapon support information network attack and defense. The attack and defense benefits are quantitatively calculated based on the cost of signal concealment. The solution to the refined Bayesian balance problem is given. Then, a multistage optimization algorithm for camouflage signal selection is proposed. Finally, experimental research proves the proposed algorithm to be reasonable and practical. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. A review of intrusion detection system and security threat in internet of things enabled environment.
- Author
-
Nisha, Gill, Nasib Singh, and Gulia, Preeti
- Subjects
INTERNET of things ,INTERNET security ,SECURITY systems ,INTRUSION detection systems (Computer security) ,TELECOMMUNICATION systems ,SENSOR networks - Abstract
Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the "internet of things (IoT)". The actions hurting the communication system are known as intrusions. Security features such as (integrity, and confidentiality) within IoT networks are compromised when any kind of intrusion occurs. To identify multiple infiltration types in an environment where IoT is enabled, an intrusion detection system (IDS) is required. In environments where IoT is enabled, security vulnerabilities are now more prevalent than ever. In this study, the IoT architecture is reviewed, and potential security risks at each tier are investigated. It is also hoped that this research will stimulate thought about the expanding risks posed by unprotected IoT devices. The paper also intends to provide an in-depth analysis of intrusion detection systems for identifying and classifying security threats in an IoT-enabled environment. Furthermore, this study investigates a variety of efficient machine learning-based methods for detecting cyberattacks on IoT devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Secure Cooperative Routing in Wireless Sensor Networks.
- Author
-
Batool, Rida, Bibi, Nargis, Alhazmi, Samah, and Muhammad, Nazeer
- Subjects
WIRELESS sensor networks ,DATA packeting ,SECURITY systems ,SINKHOLES ,ENERGY consumption - Abstract
In wireless sensor networks (WSNs), sensor nodes are randomly distributed to transmit sensed data packets to the base station periodically. These sensor nodes, because of constrained battery power and storage space, cannot utilize conventional security measures. The widely held challenging issues for the network layer of WSNs are the packet-dropping attacks, mainly sinkhole and wormhole attacks, which focus on the routing pattern of the protocol. This thesis presents an improved version of the second level of the guard to the system, intrusion detection systems (IDSs), to limit the hostile impact of these attacks in a Low Energy Adaptive Clustering Hierarchy (LEACH) environment. The proposed system named multipath intrusion detection system (MIDS) integrates an IDs with ad hoc on-demand Multipath Distance Vector (AOMDV) protocol. The IDS agent uses the number of packets transmitted and received to calculate intrusion ratio (IR), which helps to mitigate sinkhole attacks and from AOMDV protocol round trip time (RTT) is computed by taking the difference between route request and route reply time to mitigate wormhole attack. MATLAB simulation results show that this cooperative model is an effective technique due to the higher packet delivery ratio (PDR), throughput, and detection accuracy. The proposed MIDS algorithm is proven to be more efficient when compared with an existing LEACH-based IDS system and MS-LEACH in terms of overall energy consumption, lifetime, and throughput of the network. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. CoreTemp: Coreset Sampled Templates for Multimodal Mobile Biometrics.
- Author
-
Yoon, Jaeho, Park, Jaewoo, Kim, Jungyun, and Teoh, Andrew Beng Jin
- Subjects
BIOMETRIC identification ,SECURITY systems ,BIOMETRY ,SMART devices ,TELECOMMUNICATION ,MOBILE learning ,IDENTIFICATION - Abstract
Smart devices have become the core ingredient in maintaining human society, where their applications span basic telecommunication, entertainment, education, and even critical security tasks. However, smartphone security measures have not kept pace with their ubiquitousness and convenience, exposing users to potential security breaches. Shading light on shortcomings of traditional security measures such as PINs gives rise to biometrics-based security measures. Open-set authentication with pretrained Transformers especially shows competitive performance in this context. Bringing this closer to practice, we propose CoreTemp, a greedy coreset sampled template, which offers substantially faster authentication speeds. In parallel with CoreTemp, we design a fast match algorithm where the combination shows robust performance in open-set mobile biometrics authentication. Designed to resemble the effects of ensembles with marginal increment in computation, we propose PIEformer+, where its application with CoreTemp has state-of-the-art performance. Benefiting from much more efficient authentication speeds to the best of our knowledge, we are the first to attempt identification in this context. Our proposed methodology achieves state-of-the-art results on HMOG and BBMAS datasets, particularly with much lower computational costs. In summary, this research introduces a novel integration of greedy coreset sampling with an advanced form of pretrained, implicitly ensembled Transformers (PIEformer+), greatly enhancing the speed and efficiency of mobile biometrics authentication, and also enabling identification, which sets a new benchmark in the relevant field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments.
- Author
-
Li, Jun, Luo, Xinman, and Lei, Hong
- Subjects
BLOCKCHAINS ,TELEMEDICINE ,INFORMATION sharing ,DATA management ,NEAR field communication ,DATA integrity ,SECURITY systems - Abstract
The rapid growth of electronic health (eHealth) systems has led to serious security and privacy challenges, highlighting the critical importance of protecting sensitive healthcare data. Although researchers have employed blockchain to tackle data management and sharing within eHealth systems, substantial privacy concerns persist as a primary challenge. In this paper, we introduce TrustHealth, a secure data sharing system that leverages trusted execution environment (TEE) and blockchain technology. TrustHealth leverages blockchain to design smart contracts to offer robust hashing protection for patients' healthcare data. We provide a secure execution environment for SQLCipher, isolating all sensitive operations of healthcare data from the untrusted environment to ensure the confidentiality and integrity of the data. Additionally, we design a TEE-empowered session key generation protocol that enables secure authentication and key sharing for both parties involved in data sharing. Finally, we implement TrustHealth using Hyperledger Fabric and ARM TrustZone. Through security and performance evaluation, TrustHealth is shown to securely process massive encrypted data flows at a rate of 5000 records per second, affirming the feasibility of our proposed scheme. We believe that TrustHealth offers valuable guidelines for the design and implementation of similar systems, providing a valuable contribution to ensuring the privacy and security of eHealth systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Construction and system evolution analysis of China's food security indicator system.
- Author
-
Zhao Yuting and Qu Meng
- Subjects
FOOD security ,SECURITY systems ,MONTE Carlo method ,FOOD supply ,SOCIAL stability ,EPISTEMIC uncertainty ,FOOD consumption ,ACHIEVEMENT - Abstract
In recent years, the number of countries experiencing a deterioration in food security has been increasing to the detriment of the healthy development of their people. China has made significant achievements in safeguarding food security, but only some studies have comprehensively summarized China's important initiatives and successful experiences in protecting food security since the 1960s. In this paper, we use qualitative and quantitative methods to determine the food security indicator system and observe the development of China's food security from 1961 to 2019 to provide a reference for countries threatened by hunger and malnutrition to get out of the predicament. First, 199 pieces of literature were subjected to three-level coding and saturation test using Nvivo software to preliminarily establish an indicator system for measuring China's food security, which consists of two categories: food chain and external environment, five subsystems: food supply, food circulation, food consumption, international factors, and domestic factors, as well as 12 specific indicators. Subsequently, the entropy weight coefficient and hierarchical analysis methods are used to calculate two different indicator weights. Monte Carlo simulation compares the uncertainty of the indicator weights calculated by the two methods. We found that the uncertainty of the indicator weights determined by the hierarchical analysis method is much higher than that of the entropy coefficient method, so the indicator weights determined by the entropy coefficient method are chosen. Based on the formation of the food security indicator system, the obstacle degree test was carried out for each indicator. We found that the average wage of urban employees before 2015 was the main obstacle to China's food security. However, the population kept growing after 2015, which became the main obstacle to China's food security. Secondly, the evolution characteristics of the overall level of China's food security and the subsystems from 1961 to 2019 were analyzed individually. We found that the overall level of China's food security has been continuously improving. However, the subsystems still have hidden dangers, and the most prominent one is the food consumption subsystem, whose composite index has been continuously decreasing and has become the main factor undermining China's food security. The scientific construction of China's food security indicator system will help to identify and warn of hidden food security problems promptly and, at the same time, will help to summarize and promote China's successful experience in safeguarding food security. Food security is the foundation of agricultural development, and ensuring food security significantly impacts national security, social stability, people's livelihoods, and health. A scientifically constructed indicator system for China's food security can help identify and alert potential food security risks. Based on accurate indicator data and analysis results, more effective food security policies and measures can be formulated, ultimately promoting the sustainable development of the gain industry. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.
- Author
-
El-Hajj, Mohammed and Beune, Pim
- Subjects
- *
INTERNET of things , *ELLIPTIC curve cryptography , *DATA integrity , *SECURITY systems - Abstract
The advent of Internet of Things (IoT) devices has revolutionized our daily routines, fostering interconnectedness and convenience. However, this interconnected network also presents significant security challenges concerning authentication and data integrity. Traditional security measures, such as Public Key Infrastructure (PKI), encounter limitations when applied to resource-constrained IoT devices. This paper proposes a novel decentralized PKI system tailored specifically for IoT environments to address these challenges. Our approach introduces a unique "zone" architecture overseen by zone masters, facilitating efficient certificate management within IoT clusters while reducing the risk of single points of failure. Furthermore, we prioritize the use of lightweight cryptographic techniques, including Elliptic Curve Cryptography (ECC), to optimize performance without compromising security. Through comprehensive evaluation and benchmarking, we demonstrate the effectiveness of our proposed solution in bolstering the security and efficiency of IoT ecosystems. This contribution underlines the critical need for innovative security solutions in IoT deployments and presents a scalable framework to meet the evolving demands of IoT environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Design Procedure for Real-Time Cyber–Physical Systems Tolerant to Cyberattacks.
- Author
-
Paredes, Carlos M., Martínez Castro, Diego, González Potes, Apolinar, Rey Piedrahita, Andrés, and Ibarra Junquera, Vrani
- Subjects
- *
INDUSTRIAL robots , *CYBERTERRORISM , *INDUSTRIALISM , *CYBER physical systems , *SECURITY systems , *SYMMETRY - Abstract
Modern industrial automation supported by Cyber–Physical Systems (CPSs) requires high flexibility, which is achieved through increased interconnection between modules. This interconnection introduces a layer of symmetry into the design and operation of CPSs, balancing the distribution of tasks and resources across the system and streamlining the flow of information. However, this adaptability also exposes control systems to security threats, particularly through novel communication links that are vulnerable to cyberattacks. Traditional strategies may have limitations in these applications. This research proposes a design approach for control applications supported by CPSs that incorporates cyberattack detection and tolerance strategies. Using a modular and adaptive approach, the system is partitioned into microservices for scalability and resilience, allowing structural symmetry to be maintained. Schedulability assessments ensure that critical timing constraints are met, improving overall system symmetry and performance. Advanced cyberattack detection and isolation systems generate alarms and facilitate rapid response with replicas of affected components. These replicas enable the system to recover from and tolerate cyberattacks, maintaining uninterrupted operation and preserving the balanced structure of the system. In conclusion, the proposed approach addresses the security challenges in CPS-based control applications and provides an integrated and robust approach to protect industrial automation systems from cyber threats. A case study conducted at a juice production facility in Colima, México, demonstrated how the architecture can be applied to complex processes such as pH control, from simulation to industrial implementation. The study highlighted a plug-and-play approach, starting with component definitions and relationships, and extending to technology integration, thereby reinforcing symmetry and efficiency within the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Power Transformer On-Load Capacity-Regulating Control and Optimization Based on Load Forecasting and Hesitant Fuzzy Control.
- Author
-
Zou, Dexu, Sun, Xinyu, Quan, Hao, Yin, Jianhua, Peng, Qingjun, Wang, Shan, Dai, Weiju, and Hong, Zhihu
- Subjects
- *
POWER transformers , *DUNG beetles , *ELECTRIC transformers , *FORECASTING , *OPERATING costs , *SECURITY systems - Abstract
The operational stability of a power transformer exerts an extremely important impact on the power symmetry, balance, and security of power systems. When the grid load fluctuates greatly, if the load factor of the transformer cannot be maintained within a reasonable range, it leads to increased instability in grid operation. Adjusting the transformer capacity based on load changes is of great significance. The existing control methods for on-load capacity-regulating (OLCR) transformers have low timeliness, and the daily switching frequency of the capacity-regulating switch is not controlled. To ensure the safe and stable operation of transformers, this paper proposes a control method for OLCR transformers based on load prediction and fuzzy control. Firstly, the operating principle of OLCR transformers is analyzed, and a multi-strategy enhanced dung beetle optimizer (MSDBO) combined with a CNN−LSTM model is proposed for load forecasting. On this basis, the daily switching frequency of the capacity-regulating transformer is introduced, and hesitant fuzzy control is used to select the optimal capacity-regulating strategy relying on three factors: loss, economy, and switching frequency. Finally, simulation models are constructed using the MATLAB/SIMULINK platform and simulation analysis is conducted to verify the effectiveness and superiority of the proposed control method. For the three scenarios in this paper, the method reduces daily power loss by 28.5% to 56.3% and daily operating costs by 25.4% to 50.8%. The method used in this paper can sacrifice 3.5% to 9.2% of the loss reduction capability in exchange for reducing the number of switch operations by 28.6% to 57.1%, significantly extending the lifespan of the switches and thereby increasing the operational lifespan of the transformer. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Analysis of Biometric-Based Cryptographic Key Exchange Protocols—BAKE and BRAKE.
- Author
-
Gorski, Maksymilian and Wodo, Wojciech
- Subjects
- *
BIOMETRIC identification , *ACCESS control , *ONLINE banking , *SECURITY systems , *ONLINE identities , *BRAKE systems , *BIOMETRY - Abstract
Biometric authentication methods offer high-quality mechanisms to confirm the identity of individuals in security systems commonly used in the modern world, such as physical access control, online banking, or mobile device unlocking. They also find their application in cryptographic solutions, which allow the biometrically authenticated exchange of cryptographic keys between users and services on the internet, despite the fuzziness of biometric data. Such solutions are BAKE (biometrics-authenticated key exchange) and BRAKE (biometric-resilient authenticated key exchange) protocols, upon which our work is based. However, the direct application of fuzzy biometrics in cryptography, which relies heavily on the accuracy of single-bit secret values, is not trivial. Therefore, this paper is devoted to analyzing the security of this idea and the feasibility of implementing biometric AKE (authenticated key exchange) protocols, with an emphasis on the BRAKE protocol. As the results of our analysis, we discuss BRAKE's limitations and vulnerabilities, which need to be appropriately addressed to implement the protocol in modern systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. The Role of Rescue Services in the Structures of the Maritime Transport Safety Systems in Poland.
- Author
-
Mielniczek, K., Rutkowski, G., Ratajczak, J., and Wieczorek, M.
- Subjects
- *
MARITIME safety , *SYSTEM safety , *SECURITY systems , *ORGANIZATIONAL structure , *RESCUES , *RESCUE work - Abstract
The paper is based on the activities of the Maritime Search and Rescue Service units in Poland. The information and data contained in the article were obtained through an interview with the rescuers of the Maritime Rescue Coordination Centre in Gdynia. The analysis aims to illustrate the impact of the activities of SAR units in the structures of maritime transport security systems in the Polish SAR zone of responsibility. In addition, the organizational structures and equipment of the rescue units were neatly described. The results of the analysed accidents at sea in terms of presenting similar events in the future are also included in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. CIAMS—Checkpoint‐intrigued adversary mitigation scheme for industrial internet of things.
- Author
-
Donald, Jose Patris and Joseph, Linda
- Subjects
- *
INTERNET of things , *DENIAL of service attacks , *SECURITY systems , *RECOMMENDER systems , *MANUFACTURING processes , *SMART devices - Abstract
The industrial internet of things (IIoT) encompasses smart devices, manufacturing systems, humans, and networks for automated productive outcomes. The placement of devices and networks is vulnerable to distributed denial of service (DDOS) attacks that degrade the productivity and efficiency of IIoT. In this article, we propose a checkpoint‐intrigued adversary mitigation scheme (CIAMS) for improving the security features and recommendations of the detection systems. Features that use the recommendation to provide relevant information maintain their security level. A DDoS attack is dealt with at the outset, resulting in increased productivity. The IIoT's smart devices are less productive and efficient because of this DDoS attack. This CIAMS method is designed to address vulnerability and the ability to survive the features checkpoints. The proposed scheme substantiates the security breach and lag in the checkpoint systems against DDOS attacks. The checkpoints' vulnerability level and surviving features are assessed using a classified learning approach. In this assessment, the degrading features are reimbursed by improving the security functions, control, and access methods. Periodic checkpoint replacement and mutual security measures are used for mitigating the prolonging DDOS impact in the network. The proposed scheme's performance is verified using false positives, service distribution, lag, an efficiency score. Improvements have been made to the industrial environment's service delivery and efficiency. By reducing false positives by 10.35%, the proposed scheme improves service distribution ratio and efficiency score by 11.68% and 12.55% for different devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Internet of Things Security Early Warning Model Based on Deep Learning in Edge Computing Environment.
- Author
-
Zhong, Jiayong, Lv, Xiaohong, Hu, Ke, Chen, Yongtao, and He, Yingchun
- Subjects
- *
DEEP learning , *EDGE computing , *INTERNET of things , *INTERNET security , *ANOMALY detection (Computer security) , *SECURITY systems - Abstract
Aiming at the problems of poor real-time processing and low security performance caused by the massive information of the Internet of things, a security early warning model of the Internet of things based on deep learning in edge computing environment is proposed. Firstly, the system architecture of the Internet of things is designed by using the edge computing technology, in which the intelligent router is used to obtain the network stub and send it to the nearest edge computing node for anomaly detection. Then, the attention mechanism is used to improve the long short-term memory network (LSTM), and the multidimensional LSTM model is constructed. At the same time, it is used to analyze the combined network data. Finally, according to the set threshold value, judge whether there is abnormal behavior in the network, and give early warning in time to take security defense measures. The experimental analysis of the proposed model based on NS2 simulation platform shows that its early warning success rate and time are 95.2% and 20.6 ms, respectively, and it can detect and defend various network attacks well, with high security performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. IoT Ecosystem Security via Distributed Ledger Technology (Blockchain versus IOTA): A Bibliometric Analysis Research.
- Author
-
Singh, Jaspreet, Singh, Gurpreet, Gupta, Deepali, Rani, Shalli, and Srivastava, Gautam
- Subjects
- *
BLOCKCHAINS , *EMAIL security , *BIBLIOMETRICS , *INTERNET of things , *SECURITY systems , *COMPUTER network security , *MARKETPLACES - Abstract
The increasing popularity and adoption of the Internet of Things (IoT) ecosystem in various domains has brought attention to the security breaches linked with this paradigm. As the number of IoT devices continues to grow, it is essential to ensure that they are secured to protect against potential threats and attacks. IoT network proliferation of interconnected devices has significantly raised security concerns making them attractive targets for cyber attackers seeking to gain unauthorized access to systems and cause disruptions. As IoT networks collect and transmit sensitive data using centralized architecture, ensuring security and integrity of these networks becomes paramount. Distributed Ledger Technology (DLT) has emerged as a promising solution for enhancing IoT security. Two prominent DLT platforms: Blockchain and Internet of Things Application (IOTA) technologies can provide a more secure and resilient foundation for IoT ecosystems, and also help to mitigate risks associated with central node vulnerabilities. DLT-based IoT systems can also enable the creation of decentralized marketplaces and autonomous agents that can operate without human intervention. The objective of this research is to offer a comprehensive as well as fundamental study of IoT ecosystems and its associated security risks. Moreover, this paper provides a holistic study of the DLT platform and bibliometric inspection using VoS viewer tool on generic DLT platform technologies i.e., Blockchain and IOTA for securing data in IoT ecosystem. By leveraging bibliometric insights resulting from both DLT technologies, this study identities the most promising areas for further investigation and contribute to advancing security in IoT ecosystems. This survey contributes to the ongoing discourse on IoT security by providing a thorough comprehensive comparison of DLT solutions i.e., Blockchain and IOTA technologies on various key metrics, revealing that IOTA technology is projected to offer significant improvements over blockchain in securing sustainable IoT ecosystems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Accelerated Stochastic Variance Reduction Gradient Algorithms for Robust Subspace Clustering.
- Author
-
Liu, Hongying, Yang, Linlin, Zhang, Longge, Shang, Fanhua, Liu, Yuanyuan, and Wang, Lijun
- Subjects
- *
PIXELS , *ALGORITHMS , *COMPUTATIONAL complexity , *SECURITY systems - Abstract
Robust face clustering enjoys a wide range of applications for gate passes, surveillance systems and security analysis in embedded sensors. Nevertheless, existing algorithms have limitations in finding accurate clusters when data contain noise (e.g., occluded face clustering and recognition). It is known that in subspace clustering, the ℓ 1 - and ℓ 2 -norm regularizers can improve subspace preservation and connectivity, respectively, and the elastic net regularizer (i.e., the mixture of the ℓ 1 - and ℓ 2 -norms) provides a balance between the two properties. However, existing deterministic methods have high per iteration computational complexities, making them inapplicable to large-scale problems. To address this issue, this paper proposes the first accelerated stochastic variance reduction gradient (RASVRG) algorithm for robust subspace clustering. We also introduce a new momentum acceleration technique for the RASVRG algorithm. As a result of the involvement of this momentum, the RASVRG algorithm achieves both the best oracle complexity and the fastest convergence rate, and it reaches higher efficiency in practice for both strongly convex and not strongly convex models. Various experimental results show that the RASVRG algorithm outperformed existing state-of-the-art methods with elastic net and ℓ 1 -norm regularizers in terms of accuracy in most cases. As demonstrated on real-world face datasets with different manually added levels of pixel corruption and occlusion situations, the RASVRG algorithm achieved much better performance in terms of accuracy and robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.
- Author
-
Gao, Fei, Liu, Jinshuo, Liu, Yingqi, Gao, Zhenhai, and Zhao, Rui
- Subjects
- *
INFORMATION technology security , *ANOMALY detection (Computer security) , *SECURITY systems , *COMPUTER hacking , *INFORMATION measurement - Abstract
As an enhanced version of standard CAN, the Controller Area Network with Flexible Data (CAN-FD) rate is vulnerable to attacks due to its lack of information security measures. However, although anomaly detection is an effective method to prevent attacks, the accuracy of detection needs further improvement. In this paper, we propose a novel intrusion detection model for the CAN-FD bus, comprising two sub-models: Anomaly Data Detection Model (ADDM) for spotting anomalies and Anomaly Classification Detection Model (ACDM) for identifying and classifying anomaly types. ADDM employs Long Short-Term Memory (LSTM) layers to capture the long-range dependencies and temporal patterns within CAN-FD frame data, thus identifying frames that deviate from established norms. ACDM is enhanced with the attention mechanism that weights LSTM outputs, further improving the identification of sequence-based relationships and facilitating multi-attack classification. The method is evaluated on two datasets: a real-vehicle dataset including frames designed by us based on known attack patterns, and the CAN-FD Intrusion Dataset, developed by the Hacking and Countermeasure Research Lab. Our method offers broader applicability and more refined classification in anomaly detection. Compared with existing advanced LSTM-based and CNN-LSTM-based methods, our method exhibits superior performance in detection, achieving an improvement in accuracy of 1.44% and 1.01%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. The Legal Situation of Operators of Essential Services and Digital Service Providers in the Provisions of the Act of 5 July 2018 on the National Cybersecurity System.
- Author
-
Etel, Maciej
- Subjects
INFORMATION networks ,INTERNET security ,SECURITY systems ,COMPUTER network security ,COMPETENT authority ,PERSONALLY identifiable information ,DATA security - Abstract
The Act of 5 July 2018 on the National Cybersecurity System and its accompanying executive regulations have introduced into Polish law the provisions of the Directive of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union (UE) 2016/1148. The fundamental reason for these regulations was to establish a coherent system to ensure the cyber security of the Republic of Poland with accordance to standards adopted for European Union Member States. This paper presents the legal situation of operators of essential services and digital service providers that was created by the provisions of the ANCS. The ANCS not only identifies operators of essential services, digital service providers, and their assigned obligations, but also addresses the competent authorities' tasks of supervising, inspecting and imposing penalties within the cyber security system. The findings, assessments and conclusions presented here are based on the interpretation of the provisions of the ANCS and are supported by prominent claims of academic representatives. The analyses contained within this paper aim to show that despite the comprehensible and contemporary ratio legis -- which falls within the framework of pursuing the state of digital safety -- the provisions of the ANCS require adjustments that acknowledge the legal situation of operators of essential services and digital service providers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. How Digital Health is Revolutionizing Healthcare and Contributing to Positive Health Outcomes.
- Author
-
Dave, Pallav
- Subjects
DIGITAL health ,PATIENT satisfaction ,MEDICAL care ,SECURITY systems ,CONTINUUM of care - Abstract
Digital health has been instrumental in revolutionizing healthcare by ensuring continuity of care, personalizing care, reducing errors and wastage, improving diagnostic accuracy, providing clinicians with decision-making support, and facilitating treatment and care beyond the clinical setting. All these benefits improve the quality of care and lead to positive health outcomes. It also improves patient satisfaction with care. Digital health can also be used to address the challenges that are currently facing healthcare systems. For instance, digital health can help to address the challenge of limited access. Digital health can also help to address the increasing patient needs and demands. However, the integration of digital health in healthcare systems still remains a challenge. Privacy and confidentiality concerns are major issues. Because of the nature of data stored in these systems, security breaches can have negative outcomes on care. Accuracy and reliability of data are also issues of concern. Addressing these challenges can make healthcare systems realize the benefits of digital technologies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Technical Support System for High Concurrent Power Trading Platforms Based on Microservice Load Balancing.
- Author
-
Shao, Ping, Huang, Longda, Weng, Liguo, and Liu, Ziheng
- Subjects
EXCLUSIVE & concurrent legislative powers ,ELECTRICITY markets ,PROBLEM solving ,SECURITY systems - Abstract
With the booming development of the electricity market, market factors such as electricity trading varieties are growing rapidly. The frequency of transactions has become increasingly real-time, and transaction clearing and settlement tasks have become more complex. The increasing demands for concurrent access and carrying capacity in trading systems have made it increasingly difficult for existing systems to support business. This article proposes a transaction support system for large-scale electricity trading market entities, which solves the problems of high concurrency access and massive access data calculation while ensuring system security through business isolation measures. The system uses microservices to treat various functional modules as independent service modules, thus making service segmentation and composition more flexible. By using read–write separation, caching mechanisms, and several data reliability assurance measures, data can be stored and accessed quickly and securely. The use of a three-layer load balancing module consisting of an OpenResty access entry layer, a gateway routing gateway layer, and a WebClient service inter-resource invocation layer can effectively improve the system's ability to handle concurrent access. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Performance Evaluation of Mobile RPL-Based IoT Networks under Hello Flood Attack.
- Author
-
Hkiri, Amal, Alqurashi, Sami, Ben Bahri, Omar, Karmani, Mouna, Faraj, Hamzah, and Machhout, Mohsen
- Subjects
DENIAL of service attacks ,END-to-end delay ,INTERNET of things ,DATA transmission systems ,ENERGY consumption ,SECURITY systems - Abstract
The RPL protocol is essential for efficient communication within the Internet of Things (IoT) ecosystem, yet it remains vulnerable to various attacks, particularly in dense and mobile environments where it shows certain limitations and susceptibilities. This paper presents a comprehensive simulation-based analysis of the RPL protocol's vulnerability to the Hello Flood attack in mobile environments. Using four different group mobility models—the Column Mobility Model (CMM), Reference Point Group Mobility Model (RPGM), Nomadic Community Mobility Model (NCM), and Pursue Mobility Model (PMM)—within the Cooja simulator, this study uniquely investigates the Hello Flood attack in mobile settings, an area previously overlooked. Our systematic evaluation focuses on critical performance metrics, including the Packet Delivery Ratio (PDR), End-to-End Delay (E2ED), throughput, Expected Transmission Count (ETX), and Average Power Consumption (APC). The findings reveal several key insights: PDR decreases significantly, indicating increased packet loss or delivery failures; ETX values rise, necessitating more packet retransmissions and routing hops; E2ED increases, introducing delays in routing decisions and data transmission times; throughput declines as the attack disrupts data flow; and APC escalates due to higher energy usage on packet transmissions, especially over extended paths. These results underscore the urgent need for robust security measures to protect RPL-based IoT networks in mobile environments. Furthermore, our work emphasizes the exacerbated impact of the attack in mobile scenarios, highlighting the evolving security requirements of IoT networks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Research on Active-standby Switch of Double 2--vote--2 Safety Computer Platform Based on Status Judgment of Communication Object.
- Author
-
GUO Liang, WANG Tuo, and LU Hong
- Subjects
JUDGMENT (Psychology) ,SYSTEMS availability ,COMPUTER security ,COMMUNICATION policy ,SECURITY systems ,AUTOMATIC train control - Abstract
The railway signal control system usually adopts a special double 2--vote--2 safety computer platform for information transmission, logic operation, object control and other functions. With the increasing varieties and numbers of external communication objects, the existing active-standby switch methods for security computer platforms may have problems such as not switching when a failure occurs or unnecessary switching when the same external failure occurs. This paper presents an active-standby switch method of double 2--vote--2 safety computer platform based on communication state judgment of communication objects. This method first defines the quantitative indicators such as switching value and priority, and designs the calculation formula of switching value. Then, from the aspects of establishing communication, judging communication interruption, and calculating the number of normal communication, the method formulates different judgment criteria for the active and the standby system. Finally, the method compares the switching values, and decides whether to switch between the active and the standby system. The method is verified in practical applications in typical scenarios. The results show that the active-standby switch method based on the communication object state judgment improves the system availability and reduces the unnecessary switching phenomena that affect the system security compared with the active-standby switch method based on the board level and the number of calculations; the designed active-standby switch method can improve the reliability and security of the system by classifying and analyzing different communication modes, different redundant structures and different control devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Safety Perceptions and Micro-Segregation: Exploring Gated- and Non-Gated-Community Dynamics in Quetta, Pakistan.
- Author
-
Iqbal, Asifa, Shaukat, Tahira, and Nazir, Humaira
- Subjects
NEIGHBORHOODS ,FEAR of crime ,PRIVATE communities ,RESIDENTIAL areas ,CRIME victims ,SECURITY systems - Abstract
Crime impacts residential neighborhoods not only through the loss of life and property but also by instilling a widespread fear among residents. To combat this fear, physical security measures like safety locks, gates, and high perimeter walls have proven effective in both developed and developing nations. This trend has led to the increased popularity of gated communities in Pakistan as a preferred housing choice. In addition to encouraging micro-segregation, these developments also attract a large number of residents. In order to better understand the differences in residents' fear of crime in relation to their health and socio-economic status, this paper compares residential housing schemes in Quetta, Pakistan (gated and non-gated). Surveys and on-site observations in four different residential areas of the city underpin the methodology. The results suggest that past experiences of crime victimization strongly affect feelings of safety in both gated and non-gated communities. The study highlights the complex relationship between the perception of safety, health and well-being, socio-economic status, and the type of community, highlighting how these factors collectively influence respondents' experiences and create micro-segregation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. ResNet1D-Based Personal Identification with Multi-Session Surface Electromyography for Electronic Health Record Integration.
- Author
-
Ganiga, Raghavendra, S. N., Muralikrishna, Choi, Wooyeol, and Pan, Sungbum
- Subjects
- *
ELECTRONIC health records , *IDENTIFICATION , *DEEP learning , *ELECTROMYOGRAPHY , *SECURITY systems , *DATABASES , *IDENTITY theft - Abstract
Personal identification is an important aspect of managing electronic health records (EHRs), ensuring secure access to patient information, and maintaining patient privacy. Traditionally, biometric, signature, username/password, photo identity, etc., are employed for user authentication. However, these methods can be prone to security breaches, identity theft, and user inconvenience. The security of personal information is of paramount importance, particularly in the context of EHR. To address this, our study leverages ResNet1D, a deep learning architecture, to analyze surface electromyography (sEMG) signals for robust identification purposes. The proposed ResNet1D-based personal identification approach using the sEMG signal can offer an alternative and potentially more secure method for personal identification in EHR systems. We collected a multi-session sEMG signal database from individuals, focusing on hand gestures. The ResNet1D model was trained using this database to learn discriminative features for both gesture and personal identification tasks. For personal identification, the model validated an individual's identity by comparing captured features with their own stored templates in the healthcare EHR system, allowing secure access to sensitive medical information. Data were obtained in two channels when each of the 200 subjects performed 12 motions. There were three sessions, and each motion was repeated 10 times with time intervals of a day or longer between each session. Experiments were conducted on a dataset of 20 randomly sampled subjects out of 200 subjects in the database, achieving exceptional identification accuracy. The experiment was conducted separately for 5, 10, 15, and 20 subjects using the ResNet1D model of a deep neural network, achieving accuracy rates of 97%, 96%, 87%, and 82%, respectively. The proposed model can be integrated with healthcare EHR systems to enable secure and reliable personal identification and the safeguarding of patient information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Testing of Permeability of RFID Access Control System for the Needs of Security Management.
- Author
-
Veľas, Andrej, Boroš, Martin, Kuffa, Radoslav, and Lenko, Filip
- Subjects
ACCESS control ,SHIFT systems ,SECURITY systems - Abstract
Access control systems are part of the overall protection of objects. It is often the first system with which it is necessary to start the contact system; therefore, it is necessary to ensure its proper functioning. In the event of a malfunction, it can cause downtime in production, and it is triggered by a bad replacement of workers. Access control systems have their own specificities that need to be considered when designing security. Poor selection of access control devices can cause inefficient system functionality, resulting in downtime and loss. Based on experimental testing and related work in access control systems, this paper discusses the possibilities of testing the throughput of access control systems. The manuscript presents the design of a unique test device that can be used in the assessment of the reliability and throughput of access control systems. With the help of tests, we were able to determine the probability of downtime due to inappropriately set time intervals for changing employees on a work shift. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Drone Safety and Security Surveillance System (D4S).
- Author
-
AL-Dosari, Khalifa, Hunaiti, Ziad, and Balachandran, Wamadeva
- Subjects
SECURITY systems ,VIDEO surveillance ,CONSCIOUSNESS raising ,SITUATIONAL awareness ,DECISION making - Abstract
Drones offer significant safety and security advantages by enhancing situational awareness across various fields. However, realizing these benefits hinges on well-designed drone systems. This study builds upon previous research on drone deployment challenges and proposes the Drone Safety and Security Surveillance System (D4S). D4S aims to standardize similar drone-based systems, enhancing situational awareness and supporting decision-making processes. While initially tailored for safety and security, D4S holds potential for broader applications. Two system architectures have been proposed and evaluated with positive feedback from safety and security professionals. D4S has the potential to revolutionize safety practices, improve situational awareness, and facilitate timely decision making in critical scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. A bizarre synthesized cascaded optimized predictor (BizSCOP) model for enhancing security in cloud systems.
- Author
-
Menezes, R. Julian, Jayarin, P. Jesu, and Sekar, A. Chandra
- Subjects
INTRUSION detection systems (Computer security) ,SECURITY systems ,DEEP learning ,FEATURE selection ,CLOUD computing ,MATHEMATICAL optimization - Abstract
Due to growing network data dissemination in cloud, the elasticity, pay as you go options, globally accessible facilities, and security of networks have become increasingly important in today's world. Cloud service providers, including AWS, Azure, GCP, and others, facilitate worldwide expansion within minutes by offering decentralized communication network functions, hence providing security to cloud is still remains a challenging task. This paper aims to introduce and evaluate the Biz-SCOP model, a novel intrusion detection system developed for cloud security. The research addresses the pressing need for effective intrusion detection in cloud environments by combining hybrid optimization techniques and advanced deep learning methodologies. The study employs prominent intrusion datasets, including CSE-CIC-IDS 2018, CIC-IDS 2017, and a cloud intrusion dataset, to assess the proposed model's performance. The study's design involves implementing the Biz-SCOP model using Matlab 2019 software on a Windows 10 OS platform, utilizing 8 GB RAM and an Intel core i3 processor. The hybrid optimization approach, termed HyPSM, is employed for feature selection, enhancing the model's efficiency. Additionally, an intelligent deep learning model, C2AE, is introduced to discern friendly and hostile communication, contributing to accurate intrusion detection. Key findings indicate that the Biz-SCOP model outperforms existing intrusion detection systems, achieving notable accuracy (99.8%), precision (99.7%), F1-score (99.8%), and GEO (99.9%). The model excels in identifying various attack types, as demonstrated by robust ROC analysis. Interpretations and conclusions emphasize the significance of hybrid optimization and advanced deep learning techniques in enhancing intrusion detection system performance. The proposed model exhibits lower computational load, reduced false positives, ease of implementation, and improved accuracy, positioning it as a promising solution for cloud security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Dual Spectral Attention Model for Iris Presentation Attack Detection.
- Author
-
Al-Rajeh, Noura S. and Al-Shargabi, Amal A.
- Subjects
IRIS recognition ,VISIBLE spectra ,SECURITY systems ,SYNTHETIC apertures ,ERROR rates ,CORNEA ,MULTISPECTRAL imaging - Abstract
The widespread use of iris recognition systems has led to a growing demand for enhanced security measures to counter potential iris presentation attacks, also known as anti-spoofing. To enhance the security and reliability of iris recognition systems, researchers have developed numerous methods for detecting presentation attacks. Most of these methods lack precision in detecting unknown attacks compared to known attacks. In addition, most literature on iris presentation attack detection (PAD) systems utilizes near-infrared (NIR) samples as inputs. These samples produce superior-quality and robust images with less reflection in the cornea of the eye. Despite this, due to the widespread use of smartphones and the necessity for unsupervised identity verification, visible-light samples play a crucial role in detecting presentation attacks. These samples can be easily captured using smartphone cameras. In this paper, a dual-spectral attention model has been developed to train a unified model for multiple real-world attack scenarios. Two different scenarios were tested. In the first scenario, the model was trained as a one-class anomaly detection (AD) approach, while in the second scenario, it was trained as a normal two-class detection approach. This model achieved the best result for the attack presentation classification error rate (APCER) of 4.87% in a one-class AD scenario when tested on the attack dataset, outperforming most studies on the same test dataset. These experimental results suggest that future research opportunities in areas such as working with visible light images, using an AD approach, and focusing on uncontrolled environment samples and synthetic iris images may improve iris detection accuracy [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. A mobile edge computing-focused transferable sensitive data identification method based on product quantization.
- Author
-
Zhao, Xinjian, Yuan, Guoquan, Qiu, Shuhan, Xu, Chenwei, and Wei, Shanming
- Subjects
NATURAL language processing ,DEEP learning ,ELECTRIC utilities ,MOBILE computing ,EDGE computing ,DATA protection ,SECURITY systems - Abstract
Sensitive data identification represents the initial and crucial step in safeguarding sensitive information. With the ongoing evolution of the industrial internet, including its interconnectivity across various sectors like the electric power industry, the potential for sensitive data to traverse different domains increases, thereby altering the composition of sensitive data. Consequently, traditional approaches reliant on sensitive vocabularies struggle to adequately address the challenges posed by identifying sensitive data in the era of information abundance. Drawing inspiration from advancements in natural language processing within the realm of deep learning, we propose a transferable Sensitive Data Identification method based on Product Quantization, named PQ-SDI. This innovative approach harnesses both the composition and contextual cues within textual data to accurately pinpoint sensitive information within the context of Mobile Edge Computing (MEC). Notably, PQ-SDI exhibits proficiency not only within a singular domain but also demonstrates adaptability to new domains following training on heterogeneous datasets. Moreover, the method autonomously identifies sensitive data throughout the entire process, eliminating the necessity for human upkeep of sensitive vocabularies. Extensive experimentation with the PQ-SDI model across four real-world datasets, resulting in performance improvements ranging from 2% to 5% over the baseline model and achieves an accuracy of up to 94.41%. In cross-domain trials, PQ-SDI achieved comparable accuracy to training and identification within the same domain. Furthermore, our experiments showcased the product quantization technique significantly reduces the parameter size by tens of times for the subsequent sensitive data identification phase, particularly beneficial for resource-constrained environments characteristic of MEC scenarios. This inherent advantage not only bolsters sensitive data protection but also mitigates the risk of data leakage during transmission, thus enhancing overall security measures in MEC environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Built and natural environment correlates of physical activity of adults living in rural areas: a systematic review.
- Author
-
Müller, Christina, Paulsen, Lisa, Bucksch, Jens, and Wallmann-Sperlich, Birgit
- Subjects
- *
SELF-evaluation , *SAFETY , *LIGHTING , *NATURE , *EXERCISE , *RECREATION , *AESTHETICS , *ACCESSIBLE design , *ACCESSIBLE design of public spaces , *EXERCISE intensity , *SYSTEMATIC reviews , *LEISURE , *CYCLING , *WALKING , *SECURITY systems , *MEDLINE , *HEALTH behavior , *RURAL conditions , *ONLINE information services , *BUILT environment , *PHYSICAL activity , *PEDESTRIANS , *PSYCHOLOGY information storage & retrieval systems , *EVALUATION , *ADULTS - Abstract
Background: According to social-ecological models, the built and natural environment has the potential to facilitate or hinder physical activity (PA). While this potential is well researched in urban areas, a current systematic review of how the built and natural environment is related to PA in rural areas is lacking. Methods: We searched five databases and included studies for adults (18–65 years) living in rural areas. We included quantitative studies investigating the association between any self-reported or objectively measured characteristic of the built or natural environment and any type of self-reported or objectively measured PA, and qualitative studies that reported on features of the built or natural environment perceived as barriers to or facilitators of PA by the participants. Screening for eligibility and quality assessment (using the Standard Quality Assessment Criteria for Evaluating Primary Research Papers from a Variety of Fields) were done in duplicate. We used a narrative approach to synthesize the results. Results: Of 2432 non-duplicate records, 51 quantitative and 19 qualitative studies were included. Convincing positive relationships were found between the availability and accessibility of places for exercise and recreation and leisure-time PA as well as between the overall environment and leisure-time PA. Possible positive associations were found between the overall environment and total and transport-related PA, between greenness/natural environment and total PA, between cycling infrastructure and aesthetics and MVPA, and between pedestrian infrastructure and total walking. A possible negative relationship was found between safety and security and total walking. Qualitative studies complemented several environmental facilitators (facilities for exercise and recreation, sidewalks or streets with low traffic, attractive natural environment) and barriers (lack of facilities and destinations, lack of sidewalks, speeding traffic and high traffic volumes, lack of street lighting). Conclusions: Research investigating the relationship between the built and natural environment and PA behaviors of adults living in rural areas is still limited and there is a need for more high-quality and longitudinal studies. However, our most positive findings indicate that investing in places for exercise and recreation, a safe infrastructure for active transport, and nature-based activities are possible strategies that should be considered to address low levels of PA in rural adults. Trial registration: PROSPERO: CRD42021283508. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Navigating Privacy and Security in Telemedicine for Primary Care.
- Author
-
Andreadis, Katerina, Muellers, Kimberly A., Lin, Jenny J., Mkuu, Rahma, Horowitz, Carol R., Kaushal, Rainu, and Ancker, Jessica S.
- Subjects
- *
QUALITATIVE research , *COMPUTERS , *RESEARCH funding , *PRIVACY , *PRIMARY health care , *MEDICAL care , *INTERVIEWING , *HEALTH Insurance Portability & Accountability Act , *DESCRIPTIVE statistics , *PATIENT-centered care , *SECURITY systems , *TELEMEDICINE , *THEMATIC analysis , *RESEARCH methodology , *TECHNOLOGY , *MANAGEMENT of medical records , *MEDICAL ethics , *PATIENTS' attitudes , *COVID-19 pandemic - Abstract
OBJECTIVE: To examine patient and provider perspectives on privacy and security considerations in telemedicine during the COVID-19 pandemic. STUDY DESIGN: Qualitative study with patients and providers from primary care practices in 3 National Patient- Centered Clinical Research Network sites in New York, New York; North Carolina; and Florida. METHODS: Semistructured interviews were conducted, audio recorded, transcribed verbatim, and coded using an inductive process. Data related to privacy and information security were analyzed. RESULTS: Sixty-five patients and 21 providers participated. Patients and providers faced technology-related security concerns as well as difficulties ensuring privacy in the transformed shared space of telemedicine. Patients expressed increased comfort doing telemedicine from home but often did not like their providers to offer virtual visits from outside an office setting. Providers initially struggled to find secure and Health Insurance Portability and Accountability Act--compliant platforms and devices to host the software. Whereas some patients preferred familiar platforms such as FaceTime, others recognized potential security concerns. Audio-only encounters sometimes raised patient concerns that they would not be able to confirm the identity of the provider. CONCLUSIONS: Telemedicine led to novel concerns about privacy because patients and providers were often at home or in public spaces, and they shared concerns about software and hardware security. In addition to technological safeguards, our study emphasizes the critical role of physical infrastructure in ensuring privacy and security. As telemedicine continues to evolve, it is important to address and mitigate concerns around privacy and security to ensure high-quality and safe delivery of care to patients in remote settings. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Chaos Synchronization of Integrated Five-Section Semiconductor Lasers.
- Author
-
Guo, Yuanyuan, Du, Yao, Gao, Hua, Tan, Min, Zhao, Tong, Jia, Zhiwei, Chang, Pengfa, and Wang, Longsheng
- Subjects
- *
CHAOS synchronization , *CHAOTIC communication , *OPTICAL communications , *SEMICONDUCTOR lasers , *SYNCHRONIZATION , *SECURITY systems - Abstract
We proposed and verified a scheme of chaos synchronization for integrated five-section semiconductor lasers with matching parameters. The simulation results demonstrated that the integrated five-section semiconductor laser could generate a chaotic signal within a large parameter range of the driving currents of five sections. Subsequently, chaos synchronization between two integrated five-section semiconductor lasers with matched parameters was realized by using a common noise signal as a driver. Moreover, it was found that the synchronization was sensitive to the current mismatch in all five sections, indicating that the driving currents of the five sections could be used as keys of chaotic optical communication. Therefore, this synchronization scheme provides a candidate to increase the dimension of key space and enhances the security of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel.
- Author
-
Xu, Shengzhe, Zhou, Zicheng, and Guo, Ying
- Subjects
- *
FREQUENCY modulation transmitters , *SECURITY systems , *TRANSMITTERS (Communication) - Abstract
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system. The high-frequency modulation of the actual transmitter usually results in the high rate of the system. However, an imperfect amplitude modulator (AM) can give birth to a potential information leakage from the modulation of the transmitter. To reveal a potential security loophole from the high-frequency AM embedded in the transmitter, we demonstrate an influence on the practical security of the system in terms of the secret key rate and maximal transmission distance. The results indicate the risk of this security loophole in the imperfect AM-embedded transmitter. Fortunately, the legal participants can trace back the potential information leakage that has been produced from the imperfect transmitter at high frequencies, which can be used for defeating the leakage attack in CVQKD. We find the limitations of the imperfect AM-embedded transmitter of the high-frequency quantum system, and hence, we have to trade off the practical security and the modulation frequency of the AM-embedded transmitter while considering its implementation in a practical environment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. NDNOTA: NDN One-Time Authentication.
- Author
-
Aldaoud, Manar, Al-Abri, Dawood, Kausar, Firdous, and Awadalla, Medhat
- Subjects
- *
IP networks , *SECURITY systems , *CONSUMERS - Abstract
Named Data Networking (NDN) stands out as a prominent architectural framework for the future Internet, aiming to address deficiencies present in IP networks, specifically in the domain of security. Although NDN packets containing requested content are signed with the publisher's signature which establishes data provenance for content, the NDN domain still requires more holistic frameworks that address consumers' identity verification while accessing protected contents or services using producer/publisher-preapproved authentication servers. In response, this paper introduces the NDN One-Time Authentication (NDNOTA) framework, designed to authenticate NDN online services, applications, and data in real time. NDNOTA comprises three fundamental elements: the consumer, producer, and authentication server. Employing a variety of security measures such as single sign-on (SSO), token credentials, certified asymmetric keys, and signed NDN packets, NDNOTA aims to reinforce the security of NDN-based interactions. To assess the effectiveness of the proposed framework, we validate and evaluate its impact on the three core elements in terms of time performance. For example, when accessing authenticated content through the entire NDNOTA process, consumers experience an additional time overhead of 70 milliseconds, making the total process take 83 milliseconds. In contrast, accessing normal content that does not require authentication does not incur this delay. The additional NDNOTA delay is mitigated once the authentication token is generated and stored, resulting in a comparable time frame to unauthenticated content requests. Additionally, obtaining private content through the authentication process requires 10 messages, whereas acquiring public data only requires two messages. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. A Survey on Satellite Communication System Security.
- Author
-
Kang, Minjae, Park, Sungbin, and Lee, Yeonjoon
- Subjects
- *
TELECOMMUNICATION satellites , *SECURITY systems , *QUANTUM communication , *ARTIFICIAL intelligence - Abstract
In recent years, satellite communication systems (SCSs) have rapidly developed in terms of their role and capabilities, promoted by advancements in space launch technologies. However, this rapid development has also led to the emergence of significant security vulnerabilities, demonstrated through real-world targeted attacks such as AcidRain and AcidPour that demand immediate attention from the security community. In response, various countermeasures, encompassing both technological and policy-based approaches, have been proposed to mitigate these threats. However, the multitude and diversity of these proposals make their comparison complex, requiring a systemized view of the landscape. In this paper, we systematically categorize and analyze both attacks and defenses within the framework of confidentiality, integrity, and availability, focusing on specific threats that pose substantial risks to SCSs. Furthermore, we evaluate existing countermeasures against potential threats in SCS environments and offer insights into the security policies of different nations, recognizing the strategic importance of satellite communications as a national asset. Finally, we present prospective security challenges and solutions for future SCSs, including full quantum communication, AI-integrated SCSs, and standardized protocols for the next generation of terrestrial–space communication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Evaluating Trust Management Frameworks for Wireless Sensor Networks.
- Author
-
Gangwani, Pranav, Perez-Pons, Alexander, and Upadhyay, Himanshu
- Subjects
- *
WIRELESS sensor networks , *TRUST , *SECURITY systems - Abstract
Wireless Sensor Networks (WSNs) are crucial in various fields including Health Care Monitoring, Battlefield Surveillance, and Smart Agriculture. However, WSNs are susceptible to malicious attacks due to the massive quantity of sensors within them. Hence, there is a demand for a trust evaluation framework within WSNs to function as a secure system, to identify and isolate malicious or faulty sensor nodes. This information can be leveraged by neighboring nodes, to prevent collaboration in tasks like data aggregation and forwarding. While numerous trust frameworks have been suggested in the literature to assess trust scores and examine the reliability of sensors through direct and indirect communications, implementing these trust evaluation criteria is challenging due to the intricate nature of the trust evaluation process and the limited availability of datasets. This research conducts a novel comparative analysis of three trust management models: "Lightweight Trust Management based on Bayesian and Entropy (LTMBE)", "Beta-based Trust and Reputation Evaluation System (BTRES)", and "Lightweight and Dependable Trust System (LDTS)". To assess the practicality of these trust management models, we compare and examine their performance in multiple scenarios. Additionally, we assess and compare how well the trust management approaches perform in response to two significant cyber-attacks. Based on the experimental comparative analysis, it can be inferred that the LTMBE model is optimal for WSN applications emphasizing high energy efficiency, while the BTRES model is most suitable for WSN applications prioritizing critical security measures. The conducted empirical comparative analysis can act as a benchmark for upcoming research on trust evaluation frameworks for WSNs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. An equilibrium optimizer with deep recurrent neural networks enabled intrusion detection in secure cyber-physical systems.
- Author
-
Lydia, E. Laxmi, Santhaiah, Chukka, Ahmed, Mohammed Altaf, Kumar, K. Vijaya, Joshi, Gyanendra Prasad, and Woong Cho
- Subjects
CYBER physical systems ,RECURRENT neural networks ,INTRUSION detection systems (Computer security) ,OPTIMIZATION algorithms ,DEEP learning ,FEATURE selection ,SECURITY systems - Abstract
Cyber-physical systems (CPSs) are characterized by their integration of physical processes with computational and communication components. These systems are utilized in various critical infrastructure sectors, including energy, healthcare, transportation, and manufacturing, making them attractive targets for cyberattacks. Intrusion detection system (IDS) has played a pivotal role in identifying and mitigating cyber threats in CPS environments. Intrusion detection in secure CPSs is a critical component of ensuring the integrity, availability, and safety of these systems. The deep learning (DL) algorithm is extremely applicable for detecting cyberattacks on IDS in CPS systems. As a core element of network security defense, cyberattacks can change and breach the security of network systems, and then an objective of IDS is to identify anomalous behaviors and act properly to defend the network from outside attacks. Deep learning (DL) and Machine learning (ML) algorithms are crucial for the present IDS. We introduced an Equilibrium Optimizer with a Deep Recurrent Neural Networks Enabled Intrusion Detection (EODRNN-ID) technique in the Secure CPS platform. The main objective of the EODRNN-ID method concentrates mostly on the detection and classification of intrusive actions from the platform of CPS. During the proposed EODRNN-ID method, a min-max normalization algorithm takes place to scale the input dataset. Besides, the EODRNN-ID method involves EO-based feature selection approach to choose the feature and lessen high dimensionality problem. For intrusion detection, the EODRNN-ID technique exploits the DRNN model. Finally, the hyperparameter related to the DRNN model can be tuned by the chimp optimization algorithm (COA). The simulation study of the EODRNN-ID methodology is verified on a benchmark data. Extensive results display the significant performance of the EODRNN-ID algorithm when compared to existing techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. A Survey of MPSoC Management toward Self-Awareness.
- Author
-
Gonzalez-Martinez, Guillermo, Sandoval-Arechiga, Remberto, Solis-Sanchez, Luis Octavio, Garcia-Luciano, Laura, Ibarra-Delgado, Salvador, Solis-Escobedo, Juan Ramon, Gomez-Rodriguez, Jose Ricardo, and Rodriguez-Abdala, Viktor Ivan
- Subjects
SELF-consciousness (Awareness) ,COMMUNICATION infrastructure ,FAULT tolerance (Engineering) ,SECURITY systems - Abstract
Managing Multi-Processor Systems-on-Chip (MPSoCs) is becoming increasingly complex as demands for advanced capabilities rise. This complexity is due to the involvement of more processing elements and resources, leading to a higher degree of heterogeneity throughout the system. Over time, management schemes have evolved from simple to autonomous systems with continuous control and monitoring of various parameters such as power distribution, thermal events, fault tolerance, and system security. Autonomous management integrates self-awareness into the system, making it aware of its environment, behavior, and objectives. Self-Aware Cyber-Physical Systems-on-Chip (SA-CPSoCs) have emerged as a concept to achieve highly autonomous management. Communication infrastructure is also vital to SoCs, and Software-Defined Networks-on-Chip (SDNoCs) can serve as a base structure for self-aware systems-on-chip. This paper presents a survey of the evolution of MPSoC management over the last two decades, categorizing research works according to their objectives and improvements. It also discusses the characteristics and properties of SA-CPSoCs and explains why SDNoCs are crucial for these systems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. A Lightweight Secure Scheme for Underwater Wireless Acoustic Network.
- Author
-
Shi, Jia, Wu, Jinqiu, Zhao, Zhiwei, Qi, Xiaofei, Zhang, Wenbo, Qiao, Gang, and Zuo, Dahong
- Subjects
QUANTUM computers ,QUANTUM computing ,ELLIPTIC curves ,BURGLARY protection ,DATA protection ,SECURITY systems - Abstract
Due to the open underwater channels and untransparent network deployment environments, underwater acoustic networks (UANs) are more vulnerable to hostile environments. Security research is also being conducted in cryptography, including authentication based on asymmetric algorithms and key distribution based on symmetric algorithms. In recent years, the advancement of quantum computing has made anti-quantum attacks an important issue in the field of security. Algorithms such as lattice and SPHINCS+ have become a research topic of interest in the field of security. However, within the past five years, few papers have discussed security algorithms for UANs to resist quantum attacks, especially through classical algorithms. Some existing classical asymmetric and symmetric algorithms are considered to have no prospects. From the perspective of easy deployment in engineering and anti-quantum attacks, our research focuses on a comprehensive lightweight security framework for data protection, authentication, and malicious node detection through the Elliptic Curve and Hash algorithms. Our mechanism is suitable for ad hoc scenarios with limited underwater resources. Meanwhile, we have designed a multi-party bit commitment to build a security framework for the system. A management scheme is designed by combining self-certifying with the threshold sharing algorithm. All schemes are designed based on certificate-less and ad hoc features. The proposed scheme ensures that the confidentiality, integrity, and authentication of the system are well considered. Moreover, the scheme is proven to be of unconditional security and immune to channel eavesdropping. The resource and delay issues are also taken into consideration. The simulations considered multiple variables like number of nodes, attackers, and message length to calculate proper values that can increase the efficiency of this scheme. The results in terms of delay, delivery ratio, and consumption demonstrate the suitability of the proposal in terms of security, especially for malicious node detection. Meanwhile, the computational cost has also been controlled at the millisecond level. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Subjective Job Insecurity and the Rise of the Precariat: Evidence from the United Kingdom, Germany, and the United States.
- Author
-
Manning, Alan and Mazeine, Graham
- Subjects
JOB security ,LABOR supply ,ROBUST control ,SECURITY systems - Abstract
There is a widespread belief that work is less secure than in the past, that an increasing share of workers are part of the "precariat." It is hard to find much evidence for this in objective measures of job security, but perhaps subjective measures show different trends. This paper shows that in the United States, the United Kingdom, and Germany, workers feel as secure as they ever have in the past 30 years. This is partly because job insecurity is very cyclical and (pre-COVID) unemployment rates very low, but there is also no clear underlying trend towards increased subjective measures of job insecurity. This conclusion seems robust to controlling for the changing mix of the labor force, and it is true for specific subsets of workers. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Realization of Authenticated One-Pass Key Establishment on RISC-V Micro-Controller for IoT Applications.
- Author
-
Dang, Tuan-Kiet, Nguyen, Khai-Duy, Kieu-Do-Nguyen, Binh, Hoang, Trong-Thuc, and Pham, Cong-Kha
- Subjects
MICROCONTROLLERS ,ELLIPTIC curve cryptography ,INTERNET of things ,COMPUTER systems ,SECURITY systems ,DATA integrity - Abstract
Internet-of-things networks consist of multiple sensor devices spread over a wide area. In order to protect the data from unauthorized access and tampering, it is essential to ensure secure communication between the sensor devices and the central server. This security measure aims to guarantee authenticity, confidentiality, and data integrity. Unlike traditional computing systems, sensor node devices are often limited regarding memory and computing power. Lightweight communication protocols, such as LoRaWAN, were introduced to overcome these limitations. However, despite the lightweight feature, the protocol is vulnerable to different types of attacks. This proposal presents a highly secure key establishment protocol that combines two cryptography schemes: Elliptic Curve Qu–Vanstone and signcryption key encapsulation. The protocol provides a method to establish a secure channel that inherits the security properties of the two schemes. Also, it allows for fast rekeying with only one exchange message, significantly reducing the handshake complexity in low-bandwidth communication. In addition, the selected schemes complement each other and share the same mathematical operations in elliptic curve cryptography. Moreover, with the rise of a community-friendly platform like RISC-V, we implemented the protocol on a RISC-V system to evaluate its overheads regarding the cycle count and execution time. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. APPLYING NUMERICAL CONTROL TO ANALYZE THE PULL-IN STABILITY OF MEMS SYSTEMS.
- Author
-
Yanni ZHANG, Yiman HAN, Xin ZHAO, Zhen ZHAO, and Jing PANG
- Subjects
- *
MICROELECTROMECHANICAL systems , *PERIODIC motion , *ENERGY harvesting , *ENERGY consumption , *SECURITY systems , *NUMERICAL control of machine tools - Abstract
The micro-electro-mechanical system is widely used for energy harvesting and thermal wind sensor, its efficiency and reliability depend upon the pull-in instability. This paper studies a micro-electro-mechanical system using He-Liu [34] formulation for finding its frequency-amplitude relationship. The system periodic motion, pull-in instability and pseudo-periodic motion are discussed. This paper offers a new window for security monitoring of the system reliable operation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Can Windows 11 Stop Well-Known Ransomware Variants? An Examination of Its Built-in Security Features.
- Author
-
Al-Awadi, Yousef Mahmoud, Baydoun, Ali, and Ur Rehman, Hafeez
- Subjects
RANSOMWARE ,DIGITAL technology ,CYBERTERRORISM ,SECURITY systems ,INTERNET security - Abstract
The ever-evolving landscape of cyber threats, with ransomware at its forefront, poses significant challenges to the digital world. Windows 11 Pro, Microsoft's latest operating system, claims to offer enhanced security features designed to tackle such threats. This paper aims to comprehensively evaluate the effectiveness of these Windows 11 Pro, built-in security measures against prevalent ransomware strains, with a particular emphasis on crypto-ransomware. Utilizing a meticulously crafted experimental environment, the research adopted a two-phased testing approach, examining both the default and a hardened configuration of Windows 11 Pro. This dual examination offered insights into the system's inherent and potential defenses against ransomware threats. The study's findings revealed that Windows 11 Pro does present formidable defenses. This paper not only contributes valuable insights into cybersecurity, but also furnishes practical recommendations for both technology developers and end-users in the ongoing battle against ransomware. The significance of these findings extends beyond the immediate evaluation of Windows 11 Pro, serving as a reference point for the broader discourse on enhancing digital security measures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.