14,542 results on '"SECURITY systems"'
Search Results
2. A protection gambit for a double-line transmission system employing a wavelet transient protection strategy.
- Author
-
Sudhakar, A. V. V. and Manjusree, Y.
- Subjects
- *
ELECTRIC lines , *POLITICAL succession , *SECURITY systems - Abstract
Recently, failures on the transmission network have made the electrical system's dependability and stability unpredictable. As the transmission network grows larger, the traditional method of safeguarding lines by increasing their distance or impedance is no longer effective. This suggests that a more robust security system may be required. In this study, a reliable algorithm for defect detection and classification based on the wavelet method is determined. Shunt compensating devices, such as a UFC, are used to improve the transmission line's ability to transfer power. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. A security alert system for women with location tracking and calling features.
- Author
-
Shilpa, N., Malathy, V., Shiva, G., Anand, M., Kamali, S. M., and Vimala, S.
- Subjects
- *
SECURITY systems - Abstract
As we all know, women are being abused, molested, and raped in this day and age. Women are unable to leave their homes for these reasons. Only if women feel safe and protected can they come out and move freely, even at strange hours. If they have a computer, this is possible. They have a safety device with them. We suggest a gadget that ensures women's safety. There are push buttons on this device. A assist the woman in quickly contacting her family ones and sharing her present situation location. The device also includes a self-defence program that aids her in escaping. Situations that are critical. All of her information is updated in the cloud, and the cloud informs her family regarding the situation. This device enables a woman to quickly notify her family of her situation so that appropriate action can be taken to save herself. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Securing the cloud: An in-depth review of security threats in cloud computing.
- Author
-
Reddy, Palnati Neha
- Subjects
- *
CLOUD computing security measures , *CLOUD computing , *SECURITY systems , *COST control , *RESTRAINING orders - Abstract
These days, cloud computing is an essential component of contemporary technology, providing advantages including cost reduction, scalability, and flexibility. But as more businesses use cloud computing, worries about security risks have also grown. Because a security breach might jeopardise sensitive data and information, cloud computing security is an important concern. Organisations need to be vigilant and aware of the many security risks related to cloud computing in order to guarantee the protection and security of their data on the cloud. This analysis will examine the many security issues that cloud computing encounters and provide solutions to reduce the associated risks. Organizations may protect their data in the cloud by being aware of possible security risks and putting in place strong security procedures. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Cloud computing security challenges and related mitigation strategies.
- Author
-
Jha, Smitha and Gupta, Harshika
- Subjects
- *
CLOUD computing security measures , *MOSQUITO nets , *SECURITY systems , *CLOUD computing - Abstract
Cloud Computing (CC) is regarded as among the most trending technologies to reserve, control, and distribute data with the support of the Net. It has supported the latest strategies to reduce costs and offer improved resource utilization. Nevertheless, there are numerous challenges that take place along with many advantages of CC. Along with these consist of security facets. The key purpose of this research is to recognize, categorize, systematize, and measure the major security requirements and solutions related to CC, supporting within the assignment of investigating the requirements that stay unresolved. During this research, the study concentrated over several objectives to find out the security issues, the suitable security techniques and recognize the challenges for which no mitigating methods have been established. Conclusively, the research suggests feasible solutions and enhancement in technological issues and reflects additional advancement within future. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. The LHCb ultra-fast simulation option, Lamarr design and validation.
- Author
-
Anderlini, Lucio, Barbetti, Matteo, Capelli, Simone, Corti, Gloria, Davis, Adam, Derkach, Denis, Kazeev, Nikita, Maevskiy, Artem, Martinelli, Maurizio, Mokonenko, Sergei, Siddi, Benedetto G., and Xu, Zehua
- Subjects
- *
MOTHERBOARDS , *CONSUMERS , *GENERATIVE grammar , *DETECTORS , *SECURITY systems - Abstract
Detailed detector simulation is the major consumer of CPU resources at LHCb, having used more than 90% of the total computing budget during Run 2 of the Large Hadron Collider at CERN. As data is collected by the upgraded LHCb detector during Run 3 of the LHC, larger requests for simulated data samples are necessary, and will far exceed the pledged resources of the experiment, even with existing fast simulation options. The evolution of technologies and techniques for simulation production is then mandatory to meet the upcoming needs for the analysis of most of the data collected by the LHCb experiment. In this context, we propose Lamarr, a Gaudi-based framework designed to offer the fastest solution for the simulation of the LHCb detector. Lamarr consists of a pipeline of modules parameterizing both the detector response and the reconstruction algorithms of the LHCb experiment. Most of the parameterizations are made of Deep Generative Models and Gradient Boosted Decision Trees trained on simulated samples or alternatively, where possible, on real data. Embedding Lamarr in the general LHCb Gauss Simulation framework allows combining its execution with any of the available generators in a seamless way. Lamarr has been validated by comparing key reconstructed quantities with Detailed Simulation. Good agreement of the simulated distributions is obtained with two order of magnitude speed-up of the simulation phase. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Adversarial waypoint injection attacks on Maritime Autonomous Surface Ships (MASS) collision avoidance systems.
- Author
-
Longo, G., Martelli, M., Russo, E., Merlo, A., and Zaccone, R.
- Subjects
- *
SECURITY systems , *SHIPS , *SITUATIONAL awareness , *ROBUST control , *CYBERTERRORISM , *PROPORTIONAL navigation - Abstract
Autonomous navigation is currently subject to particular interest for naval and commercial vessels. In addition to the regulatory effort, several pieces of research tackled the development of new guidance laws, stable and robust control algorithms, methodologies to increase situational awareness, and collision avoidance algorithms. However, most of these systems blindly trust information from navigation sensors, which can malfunction or, even worse, have their data altered by cyber-attacks. This last scenario will be increasingly common shortly and represents a dangerous threat that future highly computerised ships must face. The proposed work shows an approach capable of hijacking a state-of-the-art collision avoidance algorithm route by feeding it with rogue data. The effects of such a cyber-attack are shown via an extensive simulation campaign, testing the methodology on three different COLREG scenarios: head-on, crossing, and overtaking. The study additionally highlights the susceptibility of forthcoming navigation systems to security breaches, which still needs to be addressed in the existing literature. According to the experimental findings, attackers can attract the autonomous ship guidance toward their objective at a mean distance of $ 133\,{\rm m} $ 133 m . Finally, suggestions on how to harden these systems against this family of attacks are provided in the conclusion. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Optimizing Security Systems with an Optimum Design of a Hybrid Renewable Energy System.
- Author
-
Kiyak, Mahmut Hudayi, Purlu, Mikail, Emre Turkay, Belgin, and Akinci, Tahir Cetin
- Subjects
- *
RENEWABLE energy sources , *SECURITY systems , *POWER resources , *HYBRID power systems , *WIND turbines - Abstract
Security systems play a crucial role in protecting individuals and assets within diverse infrastructures, including seaports. The uninterrupted operation of these systems heavily relies on a continuous power supply, as any disruptions can lead to severe consequences. Therefore, security systems are classified as critical loads requiring uninterrupted power availability. This study focuses on the investigation of an optimal hybrid energy system (HES) to ensure a reliable power supply for security systems in two seaports located in Turkiye. Through the utilization of the HOMER software, optimization analyses were conducted, considering both conventional sources such as grid-generator or grid-generator-battery configurations, as well as off-grid and on-grid HES solutions integrating photovoltaic (PV) and wind turbine technologies. The findings reveal that on-grid HES solutions incorporating PV and wind technologies offer a more cost-effective and dependable energy supply for security systems in seaports, surpassing traditional alternatives. This study represents a significant contribution to the existing literature, as it presents the first comprehensive optimization study on the design of HES for security systems. The outcomes serve as a valuable reference for future research endeavors in this field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Older Adults' Preferences Regarding Firearm Locking Device Use: Results of a National Survey.
- Author
-
Villarreal, Ricardo I., Stanley, Ian H., Anestis, Michael D., Buck-Atkinson, Jessica, and Betz, Marian E.
- Subjects
- *
SUICIDE prevention , *VIOLENCE prevention , *PREVENTION of injury , *SAFETY , *PRODUCT safety , *SECONDARY analysis , *RESEARCH funding , *CONSUMER attitudes , *FIREARMS , *SECURITY systems , *COMPARATIVE studies - Abstract
Use of firearm locking devices may reduce the risk of suicide and injury among older adults. This study describes older adults' preferences when choosing a firearm locking device. We conducted a secondary analysis of a nationally representative survey of US adult firearm owners (N = 2,152). We compared older adults (≥65y) with relatively younger adults (<65y), stratified by self-reported gender. The top three factors cited as impacting firearm locking device selection included speed (53.6%) and ease of firearm access from device (52.4%), and cost of the device (28.7%). These top factors were comparable for all adults across genders. A larger proportion of older vs younger males reported that a primary preference was whether the device allows the firearm to remain loaded with ammunition; smaller proportions of older vs younger males reported strength of device (device durability) and costs. Preference among older adults, particularly older males, for locking devices that maintain the firearms easy to access – especially, loaded with ammunition – might impact firearm injury prevention efforts for this high-risk group. For harm reduction, use of any firearm locking device may reduce the risk of firearm injury or death. Clinicians are encouraged to explore reasons for locking device selection within motivational interviewing frameworks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. The role of science in resilience planning for military-civilian domains in the U.S. and NATO.
- Author
-
Keenan, Jesse M., Trump, Benjamin, Kytömaa, Eero, Adlakha-Hutcheon, Gitanjali, and Linkov, Igor
- Subjects
- *
NATIONAL security , *DEFENSIVE (Military science) , *SECURITY systems - Abstract
In recent years, the NATO member nations have committed to a coordinated approach to strengthening resilience among the Allies, including the development of National Resilience Plans (NRPs). The Allies outlined the extent to which the robustness of their respective military capacities requires the designed resilience of systems that bridge civilian and military domains. This article outlines the role that resilience plays in supporting tactical and strategic measures of national security and defense within military and civilian domains. This exploration provides an outline of how resilience is currently applied in practice by the U.S. Department of Defense (DOD) and NATO. Building on this diversity of applications, various categorical forms of resilience drawn from the empirical science of resilience are positioned within NATO’s emerging frame for ‘layered’ resilience. This article reinforces the scientific debate that an optimal orientation to resilience leaves open the door for the transformative adaptation of function and identity when the single-equilibrium processes of resilience reach their limits. This article concludes with a normative perspective on how military and civilian resilience planning could support the development of NRPs that would amplify the Allies’ collective capacity to face shared security threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems.
- Author
-
El-Hajj, Mohammed and Beune, Pim
- Subjects
- *
INTERNET of things , *ELLIPTIC curve cryptography , *DATA integrity , *SECURITY systems - Abstract
The advent of Internet of Things (IoT) devices has revolutionized our daily routines, fostering interconnectedness and convenience. However, this interconnected network also presents significant security challenges concerning authentication and data integrity. Traditional security measures, such as Public Key Infrastructure (PKI), encounter limitations when applied to resource-constrained IoT devices. This paper proposes a novel decentralized PKI system tailored specifically for IoT environments to address these challenges. Our approach introduces a unique "zone" architecture overseen by zone masters, facilitating efficient certificate management within IoT clusters while reducing the risk of single points of failure. Furthermore, we prioritize the use of lightweight cryptographic techniques, including Elliptic Curve Cryptography (ECC), to optimize performance without compromising security. Through comprehensive evaluation and benchmarking, we demonstrate the effectiveness of our proposed solution in bolstering the security and efficiency of IoT ecosystems. This contribution underlines the critical need for innovative security solutions in IoT deployments and presents a scalable framework to meet the evolving demands of IoT environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. The Role of Rescue Services in the Structures of the Maritime Transport Safety Systems in Poland.
- Author
-
Mielniczek, K., Rutkowski, G., Ratajczak, J., and Wieczorek, M.
- Subjects
- *
MARITIME safety , *SYSTEM safety , *SECURITY systems , *ORGANIZATIONAL structure , *RESCUES , *RESCUE work - Abstract
The paper is based on the activities of the Maritime Search and Rescue Service units in Poland. The information and data contained in the article were obtained through an interview with the rescuers of the Maritime Rescue Coordination Centre in Gdynia. The analysis aims to illustrate the impact of the activities of SAR units in the structures of maritime transport security systems in the Polish SAR zone of responsibility. In addition, the organizational structures and equipment of the rescue units were neatly described. The results of the analysed accidents at sea in terms of presenting similar events in the future are also included in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Personal and Contextual Predictors of Information Security Policy Compliance: Evidence from a Low-Fidelity Simulation.
- Author
-
Brooks, Ricardo R., Williams, Kevin J., and Lee, So-Yun
- Subjects
- *
INFORMATION technology security , *INFORMATION policy , *PLANNED behavior theory , *SECURITY systems , *COMPLIANT behavior - Abstract
The objective of this study was to examine the roles that organizational security climate and perceived costs and rewards of compliance play in predicting the extent to which people endorse compliance or violation of specific information security policies (ISP). A low-fidelity simulation placed participants in either a strong or weak information security climate and presented them with four cybersecurity scenarios that assessed their judgments of complying with or violating security policies in those situations. Results indicated that information security climate relates to intent to comply with a company's security policies via attitudes, subjective norms, and perceived behavioral control, in line with the predictions of the theory of planned behavior (Ajzen, 1991). Strong intentions to comply with policies, in turn, were associated with greater endorsement of compliant behaviors and decreased endorsement of policy violations in the specific scenarios. However, whether or not individuals chose to endorse compliance with or violation of specific policies, after initial intentions were formed, was also influenced by their perceived costs and rewards of compliance. The effects of costs were particularly strong: as perceived costs increased, participants were more likely to endorse ISP violations. Our findings suggest that establishing a strong information security climate may reduce the chances of security breaches, but that organizations should also intervene to reduce the perceived burden and inconvenience of security tasks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. A decentralized blockchain-based authentication scheme for cross-communication in IoT networks.
- Author
-
Chaira, Mahmoud, Aouag, Sofiane, Cherroun, Hadda, Brik, Bouziane, and Rezgui, Abdelmounaam
- Subjects
- *
INTERNET of things , *SMART cities , *BLOCKCHAINS , *ENERGY consumption , *SECURITY systems , *INFORMATION sharing - Abstract
The Internet of Things (IoT) is revolutionising our everyday life by connecting a massive number of smart objects. IoT is considered a key enabler of multiple emerging applications in several areas such as manufacturing, agriculture, healthcare, automotive, smart city, etc. However, as it becomes increasingly prevalent in our life, IoT brings a number of challenging new security risks. The first issue is related to device authentication, especially with the massive number of connected devices with different types (sensors, vehicles, drones, etc.). This issue can be exploited by attackers to break into IoT networks. In addition, IoT devices generate a huge amount of confidential data that must be processed and transmitted independently without human intervention, which cannot be performed by traditional centralized security systems. Besides, the isolation imposed between different networks and the number of messages used for device's association are considered the main limitations in the two recent works. To overcome these limits, we design a novel decentralized scheme leveraging a hybridization of two main types of blockchain, local and public, which ensures authentication of things before establishing communication and exchanging information between devices. Our solution removes the isolation between different networks, contributes in reducing the number of messages required for the association phase, and solves the time delay problem imposed by the PoW consensus mechanism that is used in public blockchain as well. We adopt the Ethereum blockchain in its two versions local and public to implement our solution, and evaluate its performance as compared to the existing literature. The obtained results proved its effectiveness in terms of execution time and energy consumption which are the same metrics used in the most recent works. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Identifying points for therapeutic intervention from the lived experiences of people seeking help for retroactive jealousy.
- Author
-
Blayney, Robert and Burgess, Mark
- Subjects
- *
MEDICAL history taking , *FEAR , *SELF-evaluation , *JEALOUSY , *PSYCHOLOGICAL distress , *CONTROL (Psychology) , *HUMAN sexuality , *INTERVIEWING , *HELP-seeking behavior , *EMOTIONS , *PSYCHOEDUCATION , *EXPERIENCE , *SEX customs , *THEMATIC analysis , *SECURITY systems , *LOVE , *INTERPERSONAL relations , *INDIVIDUAL development , *HOPE , *THOUGHT & thinking - Abstract
Background and Aims: Retroactive jealousy is an unhealthy interest in a partner's romantic/sexual history that has a detrimental effect on sufferers and relationships. Significant numbers of people seek therapeutic help for retroactive jealousy each year, but no research has used their lived experiences to identify potential therapeutic interventions. That was the aim of this research. Methods: Seven adults (21–43 years) who had sought help for retroactive jealousy were interviewed about their experiences. Participants' accounts were analysed with reflexive thematic analysis, and findings were used to identify potential therapeutic interventions. Findings: Three main themes represented participants' experiences. Fears threaten hope and security involved negative self‐comparisons with past rivals, a sense of one's partner and the relationship losing value and of feeling wronged. Feeling compelled to know about the past involved one's mind as a creative generator of distress and feeling compelled to seek reassurance but making things worse. Feeling split and out of control involved feeling like a devil was on one's shoulder and having retroactive jealousy as a constant background to relational life. Implications: Therapeutic guidance for change and growth can be directed at participants' desires to forge a special romantic relationship, to achieve a more stable sense of self, and to act consistently with their underlying values and not in response to their visceral fears. We offer suggestions for psychoeducation regarding characteristics of healthy relationships, for working to move from insecure to secure responses, and for integrating cognitive defusion and implementation intentions to enhance agency. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Computational Imaging Encryption with a Steganographic and Holographic Authentication Strategy.
- Author
-
Wang, Xiaogang, Zhou, Qingming, Zhang, Lin, Xue, Jidong, Xu, Bijun, Yu, Xinning, Wang, Sheng, and Zhang, Zhenyu
- Subjects
- *
DATA security , *SECURITY classification (Government documents) , *SECURITY systems , *IMAGE reconstruction , *HOLOGRAPHY , *IMAGE encryption , *ACCESS control - Abstract
Robust data security is of paramount importance, particularly for highly classified information. To achieve this, advanced encryption and decryption methods, along with stringent access control and physical security measures, are essential to mitigate the risk of unauthorized access and data exposure. Ghost imaging (GI), a computational imaging technique that operates indirectly, offers a distinct approach compared to traditional spatially resolved imaging techniques. By utilizing computational algorithms, GI enables indirect image reconstruction, making it well‐suited for encryption applications. This proposal introduces a new computational imaging encryption scheme that combines Fourier ghost imaging (FGI) and computational holography. The scheme utilizes an untrained‐tree‐network to generate two camouflaged computer‐generated holograms (CGHs). Integration of CGH‐based steganography and holographic authentication enhances the encoding and decoding processes of FGI encryption. The effectiveness and security of the proposed scheme are rigorously validated through numerical simulations and optical experiments. The results demonstrate promising potential for effectively merging direct and indirect imaging methods in security applications. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. International journal of information security: a bibliometric study, 2007–2023.
- Author
-
Dwivedi, Rahul
- Subjects
- *
BIBLIOMETRICS , *INTERNET security , *COMPUTER science , *SECURITY systems , *REGRESSION analysis , *COMPUTER network security - Abstract
This study employs various bibliometric analysis techniques to examine the intellectual structure of the International Journal of Information Security from 2007 to 2023. The aim is to identify the most cited journals, underlying research themes within the article corpus, and gradual changes in the research themes over time. "Lecture Notes on Computer Science" is the most referenced knowledge source. Underlying research themes were identified based on mapping the bibliographically coupled articles on to the knowledge areas from the Cyber Security Body of Knowledge using template analysis. Applied Cryptography is the most prominent knowledge area, followed by Privacy, and Network Security. Additionally, research on distributed systems security and Web & Mobile Security were emerging topics of interest. Qualitative and quantitative comparisons between open-access and regular articles suggested a few notable differences in author keywords but no differences in the number of citations received. Furthermore, regression analysis found a negative correlation between citation counts with the length of the article abstract and article title and a positive correlation with page count, being published in a special issue, and if at least the affiliation of one of the authors is different from others. Finally, prominent authors, articles, institutions, and countries published in this journal were also identified. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. BLISS: blockchain-based integrated security system for internet of things (IoT) applications.
- Author
-
Vishwakarma, Lokendra and Das, Debasis
- Subjects
- *
BLOCKCHAINS , *INTERNET of things , *INTERNET security , *SECURITY systems , *RASPBERRY Pi , *DATA integrity - Abstract
Cybersecurity is an essential part of IoT device functionality. Malicious acts cause the disclosure of private data, putting device performance at risk. As a result, creating efficient security solutions for authentication and confidentiality of both IoT devices and data exchange and integrity of data exchange networks has become a significant challenge. Furthermore, the traditional security mechanisms' high computation demands are not suitable for resource-constrained specific IoT devices. Therefore, we have proposed a security system for IoT applications using blockchain called BLISS, which ensures robust identification, authentication, confidentiality, and integrity of IoT devices and data exchange. Using smart contracts, the BLISS creates trustful clusters of IoT devices through an authentication process for data exchange. The BLISS is implemented on the Raspberry Pi 4 and the desktop PC, considering the Raspberry Pi 4 as an IoT device and the desktop as a cluster head. The performance analysis of the BLISS demonstrates the enhanced performance in the context of computation and energy consumption, which is 62–65% reduced. The storage and communication overhead is reduced by up to 70% compared with state-of-the-art schemes. The security analysis showed that the proposed scheme withstands many IoT-specific cyber threads. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Advanced biometric system security: a novel hybrid approach integrating optical asymmetric PTFT and symmetric cipher techniques.
- Author
-
Hossam Eldein Mohamed, Fatma A., El-Shafai, Walid, Alnakhli, M., Mohamed, Ehab Mahmoud, and Aly, Moustafa H.
- Subjects
- *
BIOMETRIC identification , *BLOCK ciphers , *HYBRID securities , *DERIVATIVES (Mathematics) , *RECEIVER operating characteristic curves , *SECURITY systems , *BIOMETRY - Abstract
The rapidly evolving field of biometric recognition and verification technologies has seen substantial progress recently. However, the storage of biometric data in cloud environments presents significant security challenges, including data theft and unauthorized modifications. Cancelable biometrics emerge as a strategic solution to these issues. This study examines the efficacy of diverse cancelable biometric methods, classified into transformation, encryption, and hybrid approaches. We introduce a novel cancelable biometric system that combines a hybrid optical asymmetric phase truncated Fourier transform (PTFT) with a symmetric cipher scheme, enhanced by a two-level block-based shuffling technique. This innovation improves security through a streamlined shuffling process that divides the PTFT output into four sections for shuffling and an exclusive OR operations with a unique key, enhancing security and computational efficiency. Our empirical evaluation on three distinct datasets (Faces, Iris, and Fingerprints) from FERET, UPOL and CASIA, and FVC2002 DB1 and DB2, respectively, demonstrates superior performance of our system compared to traditional PTFT-based systems. Notable performance metrics include an Area under the receiver operating characteristic curve of 0.9998. Significant improvements were also observed in false acceptance and false rejection ratios, along with more uniform histogram distributions, thereby enhancing randomness in the resultant deformed patterns. From a security standpoint, our system exhibits a high entropy of 7.95 and achieves near-optimal results in the number of pixels change rate and unified average changing intensity, with values of 98.9115 and 23.9755%, indicating robust resilience against potential differential attacks. The research findings, supported by detailed tables and graphical illustrations, underscore the additional security benefits offered by the two-level encryption mechanism. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. CIAMS—Checkpoint‐intrigued adversary mitigation scheme for industrial internet of things.
- Author
-
Donald, Jose Patris and Joseph, Linda
- Subjects
- *
INTERNET of things , *DENIAL of service attacks , *SECURITY systems , *RECOMMENDER systems , *MANUFACTURING processes , *SMART devices - Abstract
The industrial internet of things (IIoT) encompasses smart devices, manufacturing systems, humans, and networks for automated productive outcomes. The placement of devices and networks is vulnerable to distributed denial of service (DDOS) attacks that degrade the productivity and efficiency of IIoT. In this article, we propose a checkpoint‐intrigued adversary mitigation scheme (CIAMS) for improving the security features and recommendations of the detection systems. Features that use the recommendation to provide relevant information maintain their security level. A DDoS attack is dealt with at the outset, resulting in increased productivity. The IIoT's smart devices are less productive and efficient because of this DDoS attack. This CIAMS method is designed to address vulnerability and the ability to survive the features checkpoints. The proposed scheme substantiates the security breach and lag in the checkpoint systems against DDOS attacks. The checkpoints' vulnerability level and surviving features are assessed using a classified learning approach. In this assessment, the degrading features are reimbursed by improving the security functions, control, and access methods. Periodic checkpoint replacement and mutual security measures are used for mitigating the prolonging DDOS impact in the network. The proposed scheme's performance is verified using false positives, service distribution, lag, an efficiency score. Improvements have been made to the industrial environment's service delivery and efficiency. By reducing false positives by 10.35%, the proposed scheme improves service distribution ratio and efficiency score by 11.68% and 12.55% for different devices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Internet of Things Security Early Warning Model Based on Deep Learning in Edge Computing Environment.
- Author
-
Zhong, Jiayong, Lv, Xiaohong, Hu, Ke, Chen, Yongtao, and He, Yingchun
- Subjects
- *
DEEP learning , *EDGE computing , *INTERNET of things , *INTERNET security , *ANOMALY detection (Computer security) , *SECURITY systems - Abstract
Aiming at the problems of poor real-time processing and low security performance caused by the massive information of the Internet of things, a security early warning model of the Internet of things based on deep learning in edge computing environment is proposed. Firstly, the system architecture of the Internet of things is designed by using the edge computing technology, in which the intelligent router is used to obtain the network stub and send it to the nearest edge computing node for anomaly detection. Then, the attention mechanism is used to improve the long short-term memory network (LSTM), and the multidimensional LSTM model is constructed. At the same time, it is used to analyze the combined network data. Finally, according to the set threshold value, judge whether there is abnormal behavior in the network, and give early warning in time to take security defense measures. The experimental analysis of the proposed model based on NS2 simulation platform shows that its early warning success rate and time are 95.2% and 20.6 ms, respectively, and it can detect and defend various network attacks well, with high security performance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. IoT Ecosystem Security via Distributed Ledger Technology (Blockchain versus IOTA): A Bibliometric Analysis Research.
- Author
-
Singh, Jaspreet, Singh, Gurpreet, Gupta, Deepali, Rani, Shalli, and Srivastava, Gautam
- Subjects
- *
BLOCKCHAINS , *EMAIL security , *BIBLIOMETRICS , *INTERNET of things , *SECURITY systems , *COMPUTER network security , *MARKETPLACES - Abstract
The increasing popularity and adoption of the Internet of Things (IoT) ecosystem in various domains has brought attention to the security breaches linked with this paradigm. As the number of IoT devices continues to grow, it is essential to ensure that they are secured to protect against potential threats and attacks. IoT network proliferation of interconnected devices has significantly raised security concerns making them attractive targets for cyber attackers seeking to gain unauthorized access to systems and cause disruptions. As IoT networks collect and transmit sensitive data using centralized architecture, ensuring security and integrity of these networks becomes paramount. Distributed Ledger Technology (DLT) has emerged as a promising solution for enhancing IoT security. Two prominent DLT platforms: Blockchain and Internet of Things Application (IOTA) technologies can provide a more secure and resilient foundation for IoT ecosystems, and also help to mitigate risks associated with central node vulnerabilities. DLT-based IoT systems can also enable the creation of decentralized marketplaces and autonomous agents that can operate without human intervention. The objective of this research is to offer a comprehensive as well as fundamental study of IoT ecosystems and its associated security risks. Moreover, this paper provides a holistic study of the DLT platform and bibliometric inspection using VoS viewer tool on generic DLT platform technologies i.e., Blockchain and IOTA for securing data in IoT ecosystem. By leveraging bibliometric insights resulting from both DLT technologies, this study identities the most promising areas for further investigation and contribute to advancing security in IoT ecosystems. This survey contributes to the ongoing discourse on IoT security by providing a thorough comprehensive comparison of DLT solutions i.e., Blockchain and IOTA technologies on various key metrics, revealing that IOTA technology is projected to offer significant improvements over blockchain in securing sustainable IoT ecosystems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Accelerated Stochastic Variance Reduction Gradient Algorithms for Robust Subspace Clustering.
- Author
-
Liu, Hongying, Yang, Linlin, Zhang, Longge, Shang, Fanhua, Liu, Yuanyuan, and Wang, Lijun
- Subjects
- *
PIXELS , *ALGORITHMS , *COMPUTATIONAL complexity , *SECURITY systems - Abstract
Robust face clustering enjoys a wide range of applications for gate passes, surveillance systems and security analysis in embedded sensors. Nevertheless, existing algorithms have limitations in finding accurate clusters when data contain noise (e.g., occluded face clustering and recognition). It is known that in subspace clustering, the ℓ 1 - and ℓ 2 -norm regularizers can improve subspace preservation and connectivity, respectively, and the elastic net regularizer (i.e., the mixture of the ℓ 1 - and ℓ 2 -norms) provides a balance between the two properties. However, existing deterministic methods have high per iteration computational complexities, making them inapplicable to large-scale problems. To address this issue, this paper proposes the first accelerated stochastic variance reduction gradient (RASVRG) algorithm for robust subspace clustering. We also introduce a new momentum acceleration technique for the RASVRG algorithm. As a result of the involvement of this momentum, the RASVRG algorithm achieves both the best oracle complexity and the fastest convergence rate, and it reaches higher efficiency in practice for both strongly convex and not strongly convex models. Various experimental results show that the RASVRG algorithm outperformed existing state-of-the-art methods with elastic net and ℓ 1 -norm regularizers in terms of accuracy in most cases. As demonstrated on real-world face datasets with different manually added levels of pixel corruption and occlusion situations, the RASVRG algorithm achieved much better performance in terms of accuracy and robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Multi-Attack Intrusion Detection for In-Vehicle CAN-FD Messages.
- Author
-
Gao, Fei, Liu, Jinshuo, Liu, Yingqi, Gao, Zhenhai, and Zhao, Rui
- Subjects
- *
INFORMATION technology security , *ANOMALY detection (Computer security) , *SECURITY systems , *COMPUTER hacking , *INFORMATION measurement - Abstract
As an enhanced version of standard CAN, the Controller Area Network with Flexible Data (CAN-FD) rate is vulnerable to attacks due to its lack of information security measures. However, although anomaly detection is an effective method to prevent attacks, the accuracy of detection needs further improvement. In this paper, we propose a novel intrusion detection model for the CAN-FD bus, comprising two sub-models: Anomaly Data Detection Model (ADDM) for spotting anomalies and Anomaly Classification Detection Model (ACDM) for identifying and classifying anomaly types. ADDM employs Long Short-Term Memory (LSTM) layers to capture the long-range dependencies and temporal patterns within CAN-FD frame data, thus identifying frames that deviate from established norms. ACDM is enhanced with the attention mechanism that weights LSTM outputs, further improving the identification of sequence-based relationships and facilitating multi-attack classification. The method is evaluated on two datasets: a real-vehicle dataset including frames designed by us based on known attack patterns, and the CAN-FD Intrusion Dataset, developed by the Hacking and Countermeasure Research Lab. Our method offers broader applicability and more refined classification in anomaly detection. Compared with existing advanced LSTM-based and CNN-LSTM-based methods, our method exhibits superior performance in detection, achieving an improvement in accuracy of 1.44% and 1.01%, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. ResNet1D-Based Personal Identification with Multi-Session Surface Electromyography for Electronic Health Record Integration.
- Author
-
Ganiga, Raghavendra, S. N., Muralikrishna, Choi, Wooyeol, and Pan, Sungbum
- Subjects
- *
ELECTRONIC health records , *IDENTIFICATION , *DEEP learning , *ELECTROMYOGRAPHY , *SECURITY systems , *DATABASES , *IDENTITY theft - Abstract
Personal identification is an important aspect of managing electronic health records (EHRs), ensuring secure access to patient information, and maintaining patient privacy. Traditionally, biometric, signature, username/password, photo identity, etc., are employed for user authentication. However, these methods can be prone to security breaches, identity theft, and user inconvenience. The security of personal information is of paramount importance, particularly in the context of EHR. To address this, our study leverages ResNet1D, a deep learning architecture, to analyze surface electromyography (sEMG) signals for robust identification purposes. The proposed ResNet1D-based personal identification approach using the sEMG signal can offer an alternative and potentially more secure method for personal identification in EHR systems. We collected a multi-session sEMG signal database from individuals, focusing on hand gestures. The ResNet1D model was trained using this database to learn discriminative features for both gesture and personal identification tasks. For personal identification, the model validated an individual's identity by comparing captured features with their own stored templates in the healthcare EHR system, allowing secure access to sensitive medical information. Data were obtained in two channels when each of the 200 subjects performed 12 motions. There were three sessions, and each motion was repeated 10 times with time intervals of a day or longer between each session. Experiments were conducted on a dataset of 20 randomly sampled subjects out of 200 subjects in the database, achieving exceptional identification accuracy. The experiment was conducted separately for 5, 10, 15, and 20 subjects using the ResNet1D model of a deep neural network, achieving accuracy rates of 97%, 96%, 87%, and 82%, respectively. The proposed model can be integrated with healthcare EHR systems to enable secure and reliable personal identification and the safeguarding of patient information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Built and natural environment correlates of physical activity of adults living in rural areas: a systematic review.
- Author
-
Müller, Christina, Paulsen, Lisa, Bucksch, Jens, and Wallmann-Sperlich, Birgit
- Subjects
- *
SELF-evaluation , *SAFETY , *LIGHTING , *NATURE , *EXERCISE , *RECREATION , *AESTHETICS , *ACCESSIBLE design , *ACCESSIBLE design of public spaces , *EXERCISE intensity , *SYSTEMATIC reviews , *LEISURE , *CYCLING , *WALKING , *SECURITY systems , *MEDLINE , *HEALTH behavior , *RURAL conditions , *ONLINE information services , *BUILT environment , *PHYSICAL activity , *PEDESTRIANS , *PSYCHOLOGY information storage & retrieval systems , *EVALUATION , *ADULTS - Abstract
Background: According to social-ecological models, the built and natural environment has the potential to facilitate or hinder physical activity (PA). While this potential is well researched in urban areas, a current systematic review of how the built and natural environment is related to PA in rural areas is lacking. Methods: We searched five databases and included studies for adults (18–65 years) living in rural areas. We included quantitative studies investigating the association between any self-reported or objectively measured characteristic of the built or natural environment and any type of self-reported or objectively measured PA, and qualitative studies that reported on features of the built or natural environment perceived as barriers to or facilitators of PA by the participants. Screening for eligibility and quality assessment (using the Standard Quality Assessment Criteria for Evaluating Primary Research Papers from a Variety of Fields) were done in duplicate. We used a narrative approach to synthesize the results. Results: Of 2432 non-duplicate records, 51 quantitative and 19 qualitative studies were included. Convincing positive relationships were found between the availability and accessibility of places for exercise and recreation and leisure-time PA as well as between the overall environment and leisure-time PA. Possible positive associations were found between the overall environment and total and transport-related PA, between greenness/natural environment and total PA, between cycling infrastructure and aesthetics and MVPA, and between pedestrian infrastructure and total walking. A possible negative relationship was found between safety and security and total walking. Qualitative studies complemented several environmental facilitators (facilities for exercise and recreation, sidewalks or streets with low traffic, attractive natural environment) and barriers (lack of facilities and destinations, lack of sidewalks, speeding traffic and high traffic volumes, lack of street lighting). Conclusions: Research investigating the relationship between the built and natural environment and PA behaviors of adults living in rural areas is still limited and there is a need for more high-quality and longitudinal studies. However, our most positive findings indicate that investing in places for exercise and recreation, a safe infrastructure for active transport, and nature-based activities are possible strategies that should be considered to address low levels of PA in rural adults. Trial registration: PROSPERO: CRD42021283508. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Navigating Privacy and Security in Telemedicine for Primary Care.
- Author
-
Andreadis, Katerina, Muellers, Kimberly A., Lin, Jenny J., Mkuu, Rahma, Horowitz, Carol R., Kaushal, Rainu, and Ancker, Jessica S.
- Subjects
- *
QUALITATIVE research , *COMPUTERS , *RESEARCH funding , *PRIVACY , *PRIMARY health care , *MEDICAL care , *INTERVIEWING , *HEALTH Insurance Portability & Accountability Act , *DESCRIPTIVE statistics , *PATIENT-centered care , *SECURITY systems , *TELEMEDICINE , *THEMATIC analysis , *RESEARCH methodology , *TECHNOLOGY , *MANAGEMENT of medical records , *MEDICAL ethics , *PATIENTS' attitudes , *COVID-19 pandemic - Abstract
OBJECTIVE: To examine patient and provider perspectives on privacy and security considerations in telemedicine during the COVID-19 pandemic. STUDY DESIGN: Qualitative study with patients and providers from primary care practices in 3 National Patient- Centered Clinical Research Network sites in New York, New York; North Carolina; and Florida. METHODS: Semistructured interviews were conducted, audio recorded, transcribed verbatim, and coded using an inductive process. Data related to privacy and information security were analyzed. RESULTS: Sixty-five patients and 21 providers participated. Patients and providers faced technology-related security concerns as well as difficulties ensuring privacy in the transformed shared space of telemedicine. Patients expressed increased comfort doing telemedicine from home but often did not like their providers to offer virtual visits from outside an office setting. Providers initially struggled to find secure and Health Insurance Portability and Accountability Act--compliant platforms and devices to host the software. Whereas some patients preferred familiar platforms such as FaceTime, others recognized potential security concerns. Audio-only encounters sometimes raised patient concerns that they would not be able to confirm the identity of the provider. CONCLUSIONS: Telemedicine led to novel concerns about privacy because patients and providers were often at home or in public spaces, and they shared concerns about software and hardware security. In addition to technological safeguards, our study emphasizes the critical role of physical infrastructure in ensuring privacy and security. As telemedicine continues to evolve, it is important to address and mitigate concerns around privacy and security to ensure high-quality and safe delivery of care to patients in remote settings. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Chaos Synchronization of Integrated Five-Section Semiconductor Lasers.
- Author
-
Guo, Yuanyuan, Du, Yao, Gao, Hua, Tan, Min, Zhao, Tong, Jia, Zhiwei, Chang, Pengfa, and Wang, Longsheng
- Subjects
- *
CHAOS synchronization , *CHAOTIC communication , *OPTICAL communications , *SEMICONDUCTOR lasers , *SYNCHRONIZATION , *SECURITY systems - Abstract
We proposed and verified a scheme of chaos synchronization for integrated five-section semiconductor lasers with matching parameters. The simulation results demonstrated that the integrated five-section semiconductor laser could generate a chaotic signal within a large parameter range of the driving currents of five sections. Subsequently, chaos synchronization between two integrated five-section semiconductor lasers with matched parameters was realized by using a common noise signal as a driver. Moreover, it was found that the synchronization was sensitive to the current mismatch in all five sections, indicating that the driving currents of the five sections could be used as keys of chaotic optical communication. Therefore, this synchronization scheme provides a candidate to increase the dimension of key space and enhances the security of the system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Understanding Shadow IT usage intention: a view of the dual-factor model.
- Author
-
Nguyen, Trang
- Subjects
- *
INFORMATION technology security , *SECURITY systems , *GENERALIZABILITY theory , *INTENTION , *PERCEIVED control (Psychology) , *CLIMATOLOGY - Abstract
Purpose: Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of acceptance and use of technology (UTAUT) and social control theory, this research aims to examine facilitating and deterring factors of Shadow IT usage intention. Design/methodology/approach: An online survey was performed to obtain data. As this study aims at investigating the behavior of organizational insiders, LinkedIn, an employment-oriented network site, was chosen as the main site to reach the potential respondents. Findings: The results show that while performance expectancy, effort expectancy and subjective norms considerably impact intention to use Shadow IT, personal norms and sanctions-related factors exert no influence. Besides, an organizational factor of ethical work climate is found to significantly increase individual perceptions of informal controls and formal controls. Originality/value: This work is the first attempt to extend the generalizability of the dual-factor theory and UTAUT model, which primarily has been utilized in the context of system usage, to the new context of information security. This study is also one of few studies that simultaneously take both organizational and individual factors into consideration and identify its impacts on user's behaviors in the information security context. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Überlegungen zum Täterkreis von § 75a Abs. 1 IfSG — Zugleich Besprechung von BGH v. 18.10.2023 – 1 StR 146/23, GesR 2024, 325 (in diesem Heft).
- Author
-
Krüger, Matthias and Sy, Yero
- Subjects
- *
INFORMATION technology , *HEALTH insurance companies , *SECURITY systems , *ELECTRONIC data processing , *SECURITIES industry laws - Abstract
The article discusses the challenges of digitization in the German healthcare system. It emphasizes that coordinating information technology between doctors, hospitals, healthcare professions, health insurance companies, and IT service providers is difficult. It also points out that companies from the USA and China have had little influence on the communication and protection of health data on the internet so far. The article warns of the risk of commercializing health data processing and emphasizes the need for security measures and law enforcement. It notes that the protection of confidentiality in healthcare is not yet in line with automation and that the human should be at the center of health protection. [Extracted from the article]
- Published
- 2024
- Full Text
- View/download PDF
31. Security enhancement of amplitude-shift keying-type asymmetric quantum communication systems.
- Author
-
Wang, Tiancheng and Usuda, Tsuyoshi Sasaki
- Subjects
- *
QUANTUM communication , *TELECOMMUNICATION systems , *LIGHT sources , *SECURITY systems , *MOBILE communication systems - Abstract
Recently, we proposed an amplitude-shift keying asymmetric quantum communication system and evaluated its reliability when using the quasi-Bell state and two-mode squeezed vacuum state (TSVS) as an entangled light source. In this paper, we evaluate the security of the system and find that either security or reliability can be enhanced depending on the entangled light sources. We also consider an approach to enhance the security of the system as well as its reliability by increasing the number of signal modes. Interestingly, we find that the quasi-Bell state always performs better than the TSVS under certain conditions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Device-independent quantum secure direct communication under non-Markovian quantum channels.
- Author
-
Roy, Pritam, Bera, Subhankar, Gupta, Shashank, and Majumdar, A. S.
- Subjects
- *
QUANTUM cryptography , *QUANTUM communication , *SECURITY systems , *ERROR rates , *DECOHERENCE (Quantum mechanics) , *IMPERFECTION - Abstract
Device-independent quantum secure direct communication (DI-QSDC) is a promising primitive in quantum cryptography aimed towards addressing the problems of device imperfections and key management. However, significant effort is required to tackle practical challenges such as the distance limitation due to the decohering effects of quantum channels. Here, we explore the constructive effect of non-Markovian noise to improve the performance of DI-QSDC. Considering two different environmental dynamics modelled by the amplitude damping and the dephasing channels, we show that for both cases non-Markovianty leads to a considerable improvement over Markovian dynamics in terms of three benchmark performance criteria of the DI-QSDC task. Specifically, we find that non-Markovian noise (i) enhances the protocol security measured by Bell violation, (ii) leads to a lower quantum bit error rate, and (iii) enables larger communication distances by increasing the capacity of secret communication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Practical Security of Continuous Variable Quantum Key Distribution Ascribable to Imperfect Modulator for Fiber Channel.
- Author
-
Xu, Shengzhe, Zhou, Zicheng, and Guo, Ying
- Subjects
- *
FREQUENCY modulation transmitters , *SECURITY systems , *TRANSMITTERS (Communication) - Abstract
An amplitude modulator plays an essential role in the implementation of continuous-variable quantum key distribution (CVQKD), whereas it may bring about a potential security loophole in the practical system. The high-frequency modulation of the actual transmitter usually results in the high rate of the system. However, an imperfect amplitude modulator (AM) can give birth to a potential information leakage from the modulation of the transmitter. To reveal a potential security loophole from the high-frequency AM embedded in the transmitter, we demonstrate an influence on the practical security of the system in terms of the secret key rate and maximal transmission distance. The results indicate the risk of this security loophole in the imperfect AM-embedded transmitter. Fortunately, the legal participants can trace back the potential information leakage that has been produced from the imperfect transmitter at high frequencies, which can be used for defeating the leakage attack in CVQKD. We find the limitations of the imperfect AM-embedded transmitter of the high-frequency quantum system, and hence, we have to trade off the practical security and the modulation frequency of the AM-embedded transmitter while considering its implementation in a practical environment. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. NDNOTA: NDN One-Time Authentication.
- Author
-
Aldaoud, Manar, Al-Abri, Dawood, Kausar, Firdous, and Awadalla, Medhat
- Subjects
- *
IP networks , *SECURITY systems , *CONSUMERS - Abstract
Named Data Networking (NDN) stands out as a prominent architectural framework for the future Internet, aiming to address deficiencies present in IP networks, specifically in the domain of security. Although NDN packets containing requested content are signed with the publisher's signature which establishes data provenance for content, the NDN domain still requires more holistic frameworks that address consumers' identity verification while accessing protected contents or services using producer/publisher-preapproved authentication servers. In response, this paper introduces the NDN One-Time Authentication (NDNOTA) framework, designed to authenticate NDN online services, applications, and data in real time. NDNOTA comprises three fundamental elements: the consumer, producer, and authentication server. Employing a variety of security measures such as single sign-on (SSO), token credentials, certified asymmetric keys, and signed NDN packets, NDNOTA aims to reinforce the security of NDN-based interactions. To assess the effectiveness of the proposed framework, we validate and evaluate its impact on the three core elements in terms of time performance. For example, when accessing authenticated content through the entire NDNOTA process, consumers experience an additional time overhead of 70 milliseconds, making the total process take 83 milliseconds. In contrast, accessing normal content that does not require authentication does not incur this delay. The additional NDNOTA delay is mitigated once the authentication token is generated and stored, resulting in a comparable time frame to unauthenticated content requests. Additionally, obtaining private content through the authentication process requires 10 messages, whereas acquiring public data only requires two messages. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Cloud data access governance and data security using distributed infrastructure with hybrid machine learning architectures.
- Author
-
Tamizshelvan, C. and Vijayalakshmi, V.
- Subjects
- *
ELECTRONIC data processing , *DATA security , *MACHINE learning , *COMPUTER network security , *SECURITY systems , *NETWORK governance , *DATA privacy - Abstract
To address the concerns about security and privacy in cloud-based data storage, this study proposes a unique approach to secure cloud-based data governance using hybrid machine learning architectures. With the increasing reliance on cloud resources and the need for improved security measures, this research aims to provide a solution that enhances data access governance while ensuring data privacy. To achieve this, the study introduces a Distributed Data Service (DDS) specifically designed for collecting and analyzing data in Internet of Things (IoT) contexts. The DDS enables various IoT middleware methods to exchange common data services from a loosely coupled provider. The functional specifications of the DDS are revised to facilitate effective data gathering, filtering, and storage in this environment. The proposed approach leverages distributed cloud architecture and hybrid machine learning techniques to establish cloud data access governance with enhanced security. A privacy-aware architecture is built upon distributed middleware services and supply chain quantum neural networks to ensure data privacy and protection. Additionally, multi-agent federated Bayes vector-based blockchain and partial homomorphic encryption techniques are employed to enhance network security. Throughout the experimental investigation, several performance metrics are considered. Scalability, latency, quality of service, data integrity, and time consumption are analyzed to assess the efficiency of the proposed approach. By addressing security and privacy concerns in cloud-based data storage through the utilization of hybrid machine learning architectures and distributed cloud infrastructure, this research provides a novel approach to cloud data access governance. Overall, the study offers a comprehensive solution to secure and privacy-aware data management in the cloud, paving the way for further advancements in this field. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. A Survey on Satellite Communication System Security.
- Author
-
Kang, Minjae, Park, Sungbin, and Lee, Yeonjoon
- Subjects
- *
TELECOMMUNICATION satellites , *SECURITY systems , *QUANTUM communication , *ARTIFICIAL intelligence - Abstract
In recent years, satellite communication systems (SCSs) have rapidly developed in terms of their role and capabilities, promoted by advancements in space launch technologies. However, this rapid development has also led to the emergence of significant security vulnerabilities, demonstrated through real-world targeted attacks such as AcidRain and AcidPour that demand immediate attention from the security community. In response, various countermeasures, encompassing both technological and policy-based approaches, have been proposed to mitigate these threats. However, the multitude and diversity of these proposals make their comparison complex, requiring a systemized view of the landscape. In this paper, we systematically categorize and analyze both attacks and defenses within the framework of confidentiality, integrity, and availability, focusing on specific threats that pose substantial risks to SCSs. Furthermore, we evaluate existing countermeasures against potential threats in SCS environments and offer insights into the security policies of different nations, recognizing the strategic importance of satellite communications as a national asset. Finally, we present prospective security challenges and solutions for future SCSs, including full quantum communication, AI-integrated SCSs, and standardized protocols for the next generation of terrestrial–space communication. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. Evaluating Trust Management Frameworks for Wireless Sensor Networks.
- Author
-
Gangwani, Pranav, Perez-Pons, Alexander, and Upadhyay, Himanshu
- Subjects
- *
WIRELESS sensor networks , *TRUST , *SECURITY systems - Abstract
Wireless Sensor Networks (WSNs) are crucial in various fields including Health Care Monitoring, Battlefield Surveillance, and Smart Agriculture. However, WSNs are susceptible to malicious attacks due to the massive quantity of sensors within them. Hence, there is a demand for a trust evaluation framework within WSNs to function as a secure system, to identify and isolate malicious or faulty sensor nodes. This information can be leveraged by neighboring nodes, to prevent collaboration in tasks like data aggregation and forwarding. While numerous trust frameworks have been suggested in the literature to assess trust scores and examine the reliability of sensors through direct and indirect communications, implementing these trust evaluation criteria is challenging due to the intricate nature of the trust evaluation process and the limited availability of datasets. This research conducts a novel comparative analysis of three trust management models: "Lightweight Trust Management based on Bayesian and Entropy (LTMBE)", "Beta-based Trust and Reputation Evaluation System (BTRES)", and "Lightweight and Dependable Trust System (LDTS)". To assess the practicality of these trust management models, we compare and examine their performance in multiple scenarios. Additionally, we assess and compare how well the trust management approaches perform in response to two significant cyber-attacks. Based on the experimental comparative analysis, it can be inferred that the LTMBE model is optimal for WSN applications emphasizing high energy efficiency, while the BTRES model is most suitable for WSN applications prioritizing critical security measures. The conducted empirical comparative analysis can act as a benchmark for upcoming research on trust evaluation frameworks for WSNs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Security measures and intrusion detection systems for preventing and mitigating SSL renegotiation denial of service attacks.
- Author
-
Nurain, Amalia, Mantoro, Teddy, Gultom, Rudy A. G., and Indrajit, Richardus E.
- Subjects
- *
DENIAL of service attacks , *INTRUSION detection systems (Computer security) , *SECURITY systems , *RENEGOTIATION , *COMPUTER network security - Abstract
Inundating a system, network, or application with traffic is the goal of Denial of Service (DoS) attacks, a disruptive form of attack. SSL DoS attacks, particularly those involving renegotiation, are of particular concern. In order to address these types of attacks, the study proposes several security measures, including rate restriction, session caching, SSL acceleration, and integrating Intrusion Detection Systems (IDS) with a systematic technique method to reduce the risks associated with SSL renegotiation DoS attacks. This study investigates the security measures for preventing and mitigating SSL DoS attacks, with a focus on renegotiation attacks. It offers advice and insights for protecting systems to SSL server administrators and network security professionals by doing rate restriction, session caching, and SSL acceleration to avoid SSL DoS attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Investigation of intrusion detection systems in vehicular ad hoc networks.
- Author
-
Azath, M. and Singh, Vaishali
- Subjects
- *
VEHICULAR ad hoc networks , *INTRUSION detection systems (Computer security) , *DATA privacy , *SECURITY systems - Abstract
Among the most key aspects in cybersecurity is the intrusion detection system (IDS). IDS aid in detecting and preventing intrusions in our network, allowing us to maintain user privacy. IDS are also used to detect and correct various network intrusions. It is a program with software capabilities that allows us to control and conceal various intruding activities on our network. To communicate with one another, we must always be alert because there is always the possibility that our data will be spied on. Hackers utilize a number of methods to break into our systems and interrupt our communication. Because of the involvement of various attackers, the user's privacy and data are now in jeopardy. We are attempting to reduce various attacks in our network by utilizing IDS. The protection of VANETs (vehicular ad hoc networks) has piqued the interest of many investigators. In the case of VANETs, a minor security breach can have far-reaching consequences because human lives are at stake. IDS are used in VANETs to spot and analyze the malicious network activity. In order for prompt action to be taken to stop damage from such activities, it is tried or performed in the network. The purpose of this investigation is to examine the determination, classification, methods, tools, strategies, and dangers in order to identify and mitigate current risks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Military base smart security system.
- Author
-
Suryavanshi, Ranjeet Singh, Gawade, Sarvesh, Karemore, Ghanshyam, Ghule, Sandesh, Gaikwad, Nandini, and Gaikwad, Pratiksha
- Subjects
- *
HUMAN capital , *BOUNDARY disputes , *HUMAN resources departments , *AIRPORT security measures , *SECURITY systems , *WARNINGS - Abstract
The country has suffered through the loss ofsoldiers at many warfronts recently. Humanrisks being at maximum risks to be sufferedat different war conditions. Border issues had proved into the losses of human assets as well as ammunition. Soldiers' life is always at risk fighting with the last chance of success. With loss in resources always affects the situations at warfronts. Sometimes lack of ammunition let the conditions to suffer. Border frontiers often needs ammunition and human resources in long running fights. Distant ammunitionbases lead the assets to be transported leading to halting in vulnerable places specially in north and north-east jungle areas. Halting leading to portable bases forspecific period of time during transportation. With less human assets and soldiers there is always high risks of assetsmanipulation in portable camps or bases with less security. These manipulations canlead to delayed supports at warfronts. Improving camp and base security is ofsignificance in increasing soldier's life security as well as avoiding manipulation ofnonhuman assets. Low cost, less time consuming, easily executable form of security is needed to beneficial at times. Many incidents of BSF camps attacks havebeen reported recently in the regions ofnortheast and Kashmir borders in India. Here militants had attempted to enter the camps with suspected intension at nights. Having thoughts of how would have this been avoided leads to the conclusion ofhaving improving security with more no oftechnologically assisted layers in security. Surrounding the camps with increased levelof security with different security layersgiving associated alerts, detecting the suspected actions in nearby region, intrusion alarms and improved self-defenceattacks can be profitable. Implementation and management of layers and dealing withthe capacity of these layers to transmit information can be easily exploited not letting any soldiers dealing with risk in anycondition of intrusion by adding attacks in a way such that it minimises human intervention. Optimizing the installation criteria in respective to the process which involves reducing the installation cost and execution of military security helps in making these security systems smart and more volatile. The projects focussing on developments of such security layers has todeal with minimizing loss to human assets and also the appropriate attacks to reduce the intrusions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Design and build Kindergarten student security devices using RFID and based on IoT.
- Author
-
Yesputra, Rolly, Manurung, Nuriadi, Risnawati, Maghfira, Annisa Desya, and Siregar, Sutan Hirmansyah
- Subjects
- *
KINDERGARTEN children , *JUVENILE offenders , *INTERNET of things , *DATABASES , *SECURITY systems , *RADIO frequency identification systems - Abstract
Currently, there are still very many Kindergartens whose security in checking the identity of the introduction or pick-up is still manual, some even do not do identity checks. This is felt to be less able to overcome parental concerns about child crime which is increasingly happening. We need a computer-based tool to increase child safety when in delivery and pick-up by knowing who the delivery person and pick-up are. If the child is delivered or picked up, then the delivery person or pick-up only needs to scan the Student Card by waiting for the successful display on the LCD and also the web display so that the delivery or pick-up data is stored in the database, then the child will be called automatically at the time of pick-up and the parents receive an SMS notification when the child is picked up. Based on the results of the overall design of a student security system using RFID that has been carried out, the results of the design that has been tested overall have been running and active as expected by the author with a success percentage of 94%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Reinventing sustainable food security: A problem structuring method.
- Author
-
Hasyimi, Valid, Putro, Utomo Sarjono, Novani, Santi, and Hendriadi, Agung
- Subjects
- *
FOOD security , *BIBLIOGRAPHIC databases , *SOCIOECONOMIC factors , *VALUE chains , *SYSTEMS theory , *SECURITY systems - Abstract
The perceived roles of agriculture and food security have changed over the last few decades. Agriculture is perceived as an integral part of interconnected value chains not only of our economies but also social and environmental issue. In response, most governments around the world are now actively developing policies to support food security and add more value to food industry. This increases the expectations that society and governments have in terms of agriculture's services and performance: agriculture is not only expected to generate food to feed our growing populations, but also maintain socio-economic aspect, promote healthy society and sustainable environment. The author perceives that analyzing food security within sustainability framework will enhance a wider perspective to investigate other related sectors or aspects that inter-connected with it, for instance future supply-demand model, impact of agriculture activities to environment, general welfare, economy development, participation of society, and so on. Sustainability framework also addresses institution, regulation and stakeholders' involvement in order to ensure their capacity and participation align with target achievement. Therefore, this research aims to create a framework to pursue sustainable food security goal by employing system thinking approach to address the whole big picture of food security system thus understanding root cause of the problems. By employing VOSviewer software, the author conducts a bibliographic analysis to visualize network data in the form of maps from bibliographic database files. Then using Soft System Methodology, we ask set of questions that consist of problem expressed, self-opinion towards their own role and the involved stakeholders in food security development, and important issues to solve immediately. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Data protection in digital learning space: An overview.
- Author
-
Djeki, Essohanam, Dégila, Jules, Bondiombouy, Carlyna, and Alhassan, Muhtar Hanif
- Subjects
- *
DIGITAL learning , *DIGITAL technology , *DATA protection , *ONLINE education , *SECURITY systems - Abstract
COVID-19 has a considerable impact on the adoption of Digital Learning platforms by schools and universities. These platforms allow teachers to deliver courses remotely, and students take courses at a distance. E-learning platforms collect, process, and store personal and metadata about participants. These data, in the right hands, help to improve educational facilities. But in the wrong hands, it can ruin the reputation of those involved. This paper has shown that it is necessary to identify which personal data is involved in Digital Learning, look at the security risks associated with Digital Learning, and formulate the required security measures required to mitigate them. Our research has highlighted that, for reliable and effective security, e-learning platform providers must comply with the legislation in force in their country and implement the existing security mechanisms. In addition, teachers and students should be aware of the regulations and privacy policies. The best practice is to protect ourselves before, during and after Online Learning. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. A review on cloud computing security challenges, attacks and its countermeasures.
- Author
-
Arunkumar, M. and Ashokkumar, K.
- Subjects
- *
CLOUD computing security measures , *CLOUD computing , *INDUSTRIALIZATION , *COMPUTING platforms , *SOFTWARE as a service , *SECURITY systems - Abstract
The security challenges are more in the area of Cloud computing platform. The On-demand service of Cloud Computing secures a vital role in the industrial development and other IT sectors. This paper will try to provide the information based on the current threats and attacks on Cloud Computing and the solution to those attacks. Cloud Computing provides various set of service models like Platform-as-a-Service (PaaS), Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) respectively. The cloud security measures are still a challenging task for organizations and other IT Sectors to handle the external attacks. Concluding that this survey will leads to give an overview of threats, attacks and vulnerabilities in the era of Cloud platform as well as some of the countermeasures to protect the cloud. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Influence of cyber-physical power system elements on each other.
- Author
-
Rysin, Aleksandr, Solenaya, Oksana, and Kuzmenko, Vladimir
- Subjects
- *
CYBER physical systems , *SHORT circuits , *INTERNET security , *MECHANICAL models , *SECURITY systems - Abstract
Modeling a cyber-physical system involves modeling the physical and cyber domains. To analyze a practical scenario of combining physical and cyber systems requires an integrated framework. This paper discusses a comprehensive overview of various modeling, simulation, and analysis techniques, as well as various types of cyber-attacks and cyber security measures for modern cyber-physical systems. When modeling cyber-physical systems, it is worth considering the effects of elements within the system on each other as well as attacks from outside. For this purpose, 4 types of models of intra-system interactions are used: graphical model, mechanical model, probabilistic model and simulation model. Each of them is also divided into several types of implementations, designed for different tasks, such as simulation of cyber-attacks and protection against them, simulation of switch operation, simulation of short circuits and calculation on faulty data. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Facial recognition with IoT based alert system using OpenCV.
- Author
-
Sujatha, C. N., Kashyap, Shubham, Samant, Taijas, Gudipalli, Abhishek, and Prabha, N. Amutha
- Subjects
- *
HUMAN facial recognition software , *SECURITY systems , *CORPORATE headquarters , *DESIGN software , *INTERNET of things , *DATABASES - Abstract
With the growing number of security breaches, the necessity for better security procedures and protocols has grown as well. According to a reports, lakhs of robberies are occurring in the United States of America each year. Though India is a developing country, these types of robberies are considerably more common. The primary purpose of this work is to develop a security solution that can help combat this. This paper primarily aims to design a software that is built from the ground up for detection of face, leading to facial recognition and finally, providing information to the user or the owner of the software if any unfamiliar face is there which is not a part of the database. The aim is to notify the owner about any unfamiliar person that is present and unrecognized by the camera. In case if the face is not recognized, alerts will be sent via SMS and Email. Some software has limited forward compatibility and can be difficult to run on weak hardware, thus it is necessary to have a software which is more powerful and easily run on the weak hardware. The proposed work has a great scope in the future applications ranging from simple automatic locking systems in households to an attendance system in corporate offices and even for an antiterrorism system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. High performance packet classification algorithm for network security systems using modified grid-of-tries.
- Author
-
Muthumanikandan, V., Sannasi, Ganapathy, Perumal, T. Sudarson Rama, and Sushmitha, J.
- Subjects
- *
CLASSIFICATION algorithms , *COMPUTER network security , *SECURITY systems , *INTRUSION detection systems (Computer security) , *MULTICORE processors , *TRAFFIC engineering - Abstract
In order to enhance the functionality of network applications including traffic engineering and intrusion detection, the packet classification problem has received extensive research during the past decade. Software-based packet classification algorithms are gaining significant attention due to their extremely high flexibility in satisfying various industrial requirements for security and network systems, which has coincided with the general improvement of hardware architectures and the rising popularity of multi-core multi-threaded processors over the past few years. These methods require extremely big tables internally to achieve fast classification, and the size of the tables could possibly grow along with the size of the rule set. They cannot be utilised with a big rule set as a result. To solve this issue, we present a novel software-based packet classification algorithm dubbed the grid-of-tries approach that combines the partition decision trees in a search table to support both high scalability and quick classification performance. Our proposed algorithm exhibits a very high categorization speed, regardless of the quantity of rules, with smaller tables and shorter table building time, while the majority of generic partitioning-based packet classification algorithms demonstrate acceptable scalability at the expense of reduced classification speed. In this study, we suggest the Grid-of-tries approach, a novel packet classification algorithm to bridge the theoretical and practical gap. In terms of classification speed, memory utilisation, and preprocessing time, our technique outperforms other well-known algorithms. The results of our tests demonstrate how the proposed method facilitates network systems to handle significant traffic in the most efficient way. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. A low-cost multi-agent system for physical security in smart buildings.
- Author
-
Fonseca, Tiago, Dias, Tiago, Vitorino, João, Ferreira, Luís Lino, and Praça, Isabel
- Subjects
- *
MULTIAGENT systems , *SECURITY systems , *BURGLARY protection , *INTELLIGENT buildings , *INTELLIGENT sensors , *TELECOMMUNICATION , *COMPUTER vision , *INTRUSION detection systems (Computer security) - Abstract
Modern organizations face numerous physical security threats, from fire hazards to more intricate concerns regarding surveillance and unauthorized personnel. Conventional standalone fire and intrusion detection solutions must be installed and maintained independently, which leads to high capital and operational costs. Nonetheless, due to recent developments in smart sensors, computer vision techniques, and wireless communication technologies, these solutions can be integrated in a modular and low-cost manner. This work introduces Integrated Physical Security System (IP2S), a multi-agent system capable of coordinating diverse Internet of Things (IoT) sensors and actuators for an efficient mitigation of multiple physical security events. The proposed system was tested in a live case study that combined fire and intrusion detection in an industrial shop floor environment with four different sectors, two surveillance cameras, and a firefighting robot. The experimental results demonstrate that the integration of several events in a single automated system can be advantageous for the security of smart buildings, reducing false alarms and delays. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
49. A deep learning framework to identify abnormal activity in closed space.
- Author
-
Chaudhary, Rashmi and Kumar, Manoj
- Subjects
- *
CONVOLUTIONAL neural networks , *DEEP learning , *SECURITY systems , *AUTOMATED teller machines - Abstract
In today's world its getting common to have security breaches in closed and restricted activity areas like ATM's and banks. this framework has been proposed to get over with these problems. with this proposed framework the system will be able to identify the face as well as the full body parts of such intruder or abnormal actor to say. we have used open cv and other 3 models to work on our framework. we have used MTCNN (multi-task cascade convolutional neural network) as one of our models instead of the basic CNN. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Data security and data transmission delay trade-offs inhealthcare blockchain techniques.
- Author
-
Sodhi, Navdeep Singh and Singla, Sofia
- Subjects
- *
DATA security , *DATA transmission systems , *BLOCKCHAINS , *DATABASE security , *SECURITY systems , *SECONDARY research , *EVIDENCE gaps , *EMAIL security - Abstract
With the advancement of technology, data security has become a great issue across the entire world. Every day new vulnerabilities and security breaches are introduced over the communication channel, despite better data security policies. It has been noticed that data security issue is more drastically faced by the healthcare sector only. In regard to major issues related to data security, blockchain technology has acquired great attention. Blockchain technology is a technique for the secure processing of transactions using a decentralized network. In this study, multiple data security techniques based on blockchain technology implemented on healthcare records are analyzed. Among all these existing techniques, some of the techniques are graphically compared and analyzed to figure out the tradeoff between data security and data transmission delay. A theoretical research methodology is used to present an analysis and consider a valid research gap. It shows that how study has come to a conclusion after performing a graphical analysis using secondary research method. It is concluded that considered methodology is completely able to achieve respective goals of study. Finally, graphical result analysis shows that the Diabetes blockchain consortium framework has relatable data transmission delay even though after considering highly advanced blockchain-based data security systems over healthcare records. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.