Journal articles on the topic 'Computer networks Security measures Australia'

To see the other types of publications on this topic, follow the link: Computer networks Security measures Australia.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Computer networks Security measures Australia.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Asre, Shashank, and Adnan Anwar. "Synthetic Energy Data Generation Using Time Variant Generative Adversarial Network." Electronics 11, no. 3 (January 24, 2022): 355. http://dx.doi.org/10.3390/electronics11030355.

Full text
Abstract:
Energy consumption data is being used for improving the energy efficiency and minimizing the cost. However, obtaining energy consumption data has two major challenges: (i) data collection is very expensive, time-consuming, and (ii) security and privacy concern of the users which can be revealed from the actual data. In this research, we have addressed these challenges by using generative adversarial networks for generating energy consumption profile. We have successfully generated synthetic data which is similar to the real energy consumption data. On the basis of the recent research conducted on TimeGAN, we have implemented a framework for synthetic energy consumption data generation that could be useful in research, data analysis and create business solutions. The framework is implemented using the real-world energy dataset, consisting of energy consumption data of the year 2020 for the Australian states of Victoria, New South Wales, South Australia, Queensland and Tasmania. The results of implementation is evaluated using various performance measures and the results are showcased using visualizations along with Principal Component Analysis (PCA) and t-distributed stochastic neighbor embedding (TSNE) plots. Overall, experimental results show that Synthetic data generated using the proposed implementation possess very similar characteristics to the real dataset with high comparison accuracy.
APA, Harvard, Vancouver, ISO, and other styles
2

Slay, J., and B. Turnbull. "Computer Security Education and Research in Australia." IEEE Security & Privacy Magazine 4, no. 5 (September 2006): 60–63. http://dx.doi.org/10.1109/msp.2006.115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, Peter Mellor, Stella Page, David Wright, John Dobson, John McDermid, and Dieter Gollmann. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (April 1, 1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabilities, sufficiency of applied measures for ensuring I&C computer security (assessment of cyber threats and the risks of I&C computer security are discussed in detail in other publications from the series “Computer Security of NPP Instrumentation and Control Systems”). Approaches to assessing the computer security vulnerabilities of I&C systems and software at each stage of I&C life cycle are considered. The recommendations for assessing vulnerabilities regarding technical and software protection against unauthorized access or connection to I&C, protection of local networks, implementation of organizational measures and procedures for computer security are provided. The paper describes the scope and procedures for the initial assessment and periodic reassessment of NPP I&C computer security. Recommendations for the formation of an appropriate evaluation team are provided. Methods of assessing I&C computer security are considered, namely: analysis of documents (computer security policy, program, plan, reports, etc.), survey of staff (administrative, operational, service and computer security experts), direct review of I&C systems, their components and local networks. The evaluation stages (collection of information, detailed analysis, reporting) and the scope of work at each stage are described. General information about the possibility and necessity of assessing the computer security risks of I&C systems in the case of using risk-informed approaches is provided. The need to document the results of the assessment is noted separately and specific proposals about the procedure for developing relevant reports are made.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
6

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (March 1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Guo, Wen Zhan. "Research on Computer Wireless Network and Information Security." Applied Mechanics and Materials 416-417 (September 2013): 1450–53. http://dx.doi.org/10.4028/www.scientific.net/amm.416-417.1450.

Full text
Abstract:
with the rapid development and wide application of wireless networking technology, Information security issues are increasingly prominent manifested by more and more attention. The article describes the schema of the data monitoring platform separate from the data layer, network layer and presentation layer three levels,focuses on platform of intelligent back-end database structure, and proposed specific measures to ensure platform security,to ensure the information security of computer networks, so as to give full play role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Kuprashvili, Henri. "Cyberspace and Terms: “kiberushishroeba” (Cyber Security) and “kiberusaprtkhoeba” (Computer Security)." Works of Georgian Technical University, no. 2(524) (June 6, 2022): 167–77. http://dx.doi.org/10.36073/1512-0996-2022-2-167-177.

Full text
Abstract:
The terms “kiberushishroeba” (cyber security) and “kiberusaprtkhoeba” (computer security) are often used in inappropriate contexts. The term “kiberushishroeba” is used when the avoidance of an imminent threat requires the formulation and implementation of socio-political measures (development and adoption of doctrines, laws, legal acts, improvement of the “kiberushishroeba” and “kiberusaprtkhoeba” assurance management process), because the state of protection of national interests in cyberspace is achieved through the establishment of an effective Computer Security system, cyberspace sustainability, protection from unwanted internal and external influences – as a result of qualified cyber policy. The starting-point in “kiberushishroeba” providing is political aim and the result – to achieve them. “Kiberusaprtkhoeba” is an integral component of “kiberushishroeba”, a carrier of different content and weight. “Kiberusaprtkhoeba” is a combination of technologies, methods and processes of technical protection against cyberattacks of components (networks, computers, programs, data, devices) within the field of computer and information-telecommunication. It is more associated with protection from "technical" threats (to be taken organizational-technical measures: to identify those responsible for the operation safety of the computerinformation-telecommunication field and to introduce appropriate technical infrastructure and security system) or rather to “protection of labor safety” than formulation and implementation of socio-political goals. The goal of “kiberusaprtkhoeba” is to protect them, and to achieve this protection as a whole is ensuring of the result that meets the requirements of the political goal of “kiberushishroeba”.
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Martin. "Part 2 Personnel security measures within a computer installation." Computer Law & Security Review 6, no. 2 (July 1990): 23–26. http://dx.doi.org/10.1016/0267-3649(90)90109-o.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mo, Xin Ju. "Study on Information Security of Network-Based Manufacturing Environment." Applied Mechanics and Materials 484-485 (January 2014): 493–96. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.493.

Full text
Abstract:
with the rapid development and wide application of networking technology, information security increasingly prominent problems are evident, more and more attention. The article introduced the current situation of network information security, explored the meaning of network information security, major threat analysis network information security, and finally gives the implementation technology of network information security and preventive measures, to ensure the information security of computer networks, so as to give full play to role of computer networks.
APA, Harvard, Vancouver, ISO, and other styles
11

Alfonsi, B. J. "Hacker study: aiding security measures development?" IEEE Security & Privacy 1, no. 6 (November 2003): 11. http://dx.doi.org/10.1109/msecp.2003.1253562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Zhang, Kai, Liang Zhao, and Hai Qing Cao. "Research on the Computer Network Crime and Information Security." Applied Mechanics and Materials 687-691 (November 2014): 1806–9. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1806.

Full text
Abstract:
Network not only brings people convenience, but also becomes a hotbed for breeding crime. And it not only brings people efficiency, but also opens a new criminal platform for the computer network criminals. This paper analyzes the performance form and main features of computer networks crime and proposes several control measures based on their form and features.
APA, Harvard, Vancouver, ISO, and other styles
13

Kounavis, Michael, David Durham, Sergej Deutsch, and Ken Grewal. "Security definitions, entropy measures and constructions for implicitly detecting data corruption." Computer Communications 160 (July 2020): 815–46. http://dx.doi.org/10.1016/j.comcom.2020.05.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Heinrich, Markus, Tsvetoslava Vateva-Gurova, Tolga Arul, Stefan Katzenbeisser, Neeraj Suri, Henk Birkholz, Andreas Fuchs, et al. "Security Requirements Engineering in Safety-Critical Railway Signalling Networks." Security and Communication Networks 2019 (July 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/8348925.

Full text
Abstract:
Securing a safety-critical system is a challenging task, because safety requirements have to be considered alongside security controls. We report on our experience to develop a security architecture for railway signalling systems starting from the bare safety-critical system that requires protection. We use a threat-based approach to determine security risk acceptance criteria and derive security requirements. We discuss the executed process and make suggestions for improvements. Based on the security requirements, we develop a security architecture. The architecture is based on a hardware platform that provides the resources required for safety as well as security applications and is able to run these applications of mixed-criticality (safety-critical applications and other applications run on the same device). To achieve this, we apply the MILS approach, a separation-based high-assurance security architecture to simplify the safety case and security case of our approach. We describe the assurance requirements of the separation kernel subcomponent, which represents the key component of the MILS architecture. We further discuss the security measures of our architecture that are included to protect the safety-critical application from cyberattacks.
APA, Harvard, Vancouver, ISO, and other styles
15

Hewitt, Barbara, and Garry White. "Factors Influencing Security Incidents on Personal Computing Devices." Journal of Organizational and End User Computing 33, no. 4 (July 2021): 185–208. http://dx.doi.org/10.4018/joeuc.20210701.oa9.

Full text
Abstract:
Organizations expect their employees to connect securely to the organization's computer systems. Often these employees use their personal computers to access the organization's networks. This research explores whether these same employees apply protective security measures to their personal computers. Perhaps these employees behave riskily based on their optimistic bias. Results indicate that while cyber optimistic bias and perceived vulnerability influence individuals to apply more protective security measures, the users still experienced security incidents. Thus, organization are vulnerable to cyber-attacks if they are allowing employees to use personal computers to access these databases.
APA, Harvard, Vancouver, ISO, and other styles
16

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (July 2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
17

Peng, Yu, Xinrong Liu, Ming Li, Zheng Li, Tao Hu, Yangjun Xiao, Sheng Zhang, et al. "Sensing network security prevention measures of BIM smart operation and maintenance system." Computer Communications 161 (September 2020): 360–67. http://dx.doi.org/10.1016/j.comcom.2020.07.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (January 2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
19

Sheela, D., and G. Mahadevan. "Mobile Agent Based Enhanced Security for Wireless Sensor Networks." International Journal of Business Data Communications and Networking 10, no. 2 (April 2014): 15–29. http://dx.doi.org/10.4018/ijbdcn.2014040102.

Full text
Abstract:
Wireless sensor networks (WSNs) have attracted a lot of researchers due to their high potential in critical applications. WSNs are currently being employed in a variety of applications ranging from medical to military, and from home to industry. WSNs have unique constraints as compared to traditional networks making the implementation of existing security measures not practicable. These constraints are the result of limitations regarding the sensor nodes' memory, energy and transmission and processing power. So, traditional security mechanisms with large overhead of computation and communication are infeasible in WSNs. Thus, design and implementation of secure WSNs is challenging task. Recently mobile agents have been proved as an enabled technology for programming WSN. This research work fundamentally focuses on producing a combined security solution which uses mobile agents. The proposed security solution using mobile agents is to provide basic security services and to defend against seven attacks such as Denial of Service attack, Hello flooding attack, Traffic analysis, Cloning attack, Sink hole attack, Black hole attack and Selective forwarding attack with the energy overhead of addressing a single attack.
APA, Harvard, Vancouver, ISO, and other styles
20

Wang, Xi, and Lei Shi. "Design of computer network security storage system based on cloud computing technology." Journal of Physics: Conference Series 2083, no. 4 (November 1, 2021): 042084. http://dx.doi.org/10.1088/1742-6596/2083/4/042084.

Full text
Abstract:
Abstract Nowadays, computer networks are widely used. Besides the convenience, people also feel the pressure of network viruses and hackers. At present, in the process of fighting against network security threats, traditional defense measures have been difficult to meet. Therefore, in order to meet the needs of computer network security under cloud computing technology, and for the future of cloud computing high-quality network storage system can be gradually optimized. In this paper, from the cloud computing and network security storage system two aspects of the computer network security storage performance analysis and design; Then from the design framework, through careful design, to ensure the reliability and security of data upload, storage.
APA, Harvard, Vancouver, ISO, and other styles
21

Zhu, Qingyi, and Chen Cen. "A Novel Computer Virus Propagation Model under Security Classification." Discrete Dynamics in Nature and Society 2017 (2017): 1–11. http://dx.doi.org/10.1155/2017/8609082.

Full text
Abstract:
In reality, some computers have specific security classification. For the sake of safety and cost, the security level of computers will be upgraded with increasing of threats in networks. Here we assume that there exists a threshold value which determines when countermeasures should be taken to level up the security of a fraction of computers with low security level. And in some specific realistic environments the propagation network can be regarded as fully interconnected. Inspired by these facts, this paper presents a novel computer virus dynamics model considering the impact brought by security classification in full interconnection network. By using the theory of dynamic stability, the existence of equilibria and stability conditions is analysed and proved. And the above optimal threshold value is given analytically. Then, some numerical experiments are made to justify the model. Besides, some discussions and antivirus measures are given.
APA, Harvard, Vancouver, ISO, and other styles
22

Ouyang, Chun-Juan, Ming Leng, Jie-Wu Xia, and Huan Liu. "Vague Sets Security Measure for Steganographic System Based on High-Order Markov Model." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/1790268.

Full text
Abstract:
Security measure is of great importance in both steganography and steganalysis. Considering that statistical feature perturbations caused by steganography in an image are always nondeterministic and that an image is considered nonstationary, in this paper, the steganography is regarded as a fuzzy process. Here a steganographic security measure is proposed. This security measure evaluates the similarity between two vague sets of cover images and stego images in terms of n-order Markov chain to capture the interpixel correlation. The new security measure has proven to have the properties of boundedness, commutativity, and unity. Furthermore, the security measures of zero order, first order, second order, third order, and so forth are obtained by adjusting the order value of n-order Markov chain. Experimental results indicate that the larger n is, the better the measuring ability of the proposed security measure will be. The proposed security measure is more sensitive than other security measures defined under a deterministic distribution model, when the embedding is low. It is expected to provide a helpful guidance for designing secure steganographic algorithms or reliable steganalytic methods.
APA, Harvard, Vancouver, ISO, and other styles
23

Yuan, Bingxia. "Sensor Network Security Risk Prediction and Control Method Based on Big Data Analysis." Security and Communication Networks 2022 (May 19, 2022): 1–7. http://dx.doi.org/10.1155/2022/7116013.

Full text
Abstract:
The security prediction and control program of sensor network based on big data analysis is studied. First of all, in view of the shortcomings of existing security measures, this paper regards security standards as a challenge. Based on the changes of network security before and after the attack, the concept of “network security line” is proposed to select and simplify the security measures that can meet the needs and affect the real security and monitor the counting process of the network. Then, for counterattack, several models of topology security measurement based on stochastic process are developed to check the topology security. Finally, the experimental design of the risk assessment method is found by creating a risk receiving data model, deleting data features, and recreating distributed data. Experimental results show that the efficiency of this method is above 90% when the estimated distance is 10–40 m. The working power is 196∼461 Hz, lower than the normal standard. The time delay is less than 0.3 s, and the real-time performance is better than ordinary models. The relative error is less than 3%, and the accuracy is higher.
APA, Harvard, Vancouver, ISO, and other styles
24

Nazir, Sajid, Shushma Patel, and Dilip Patel. "Autonomic Computing Architecture for SCADA Cyber Security." International Journal of Cognitive Informatics and Natural Intelligence 11, no. 4 (October 2017): 66–79. http://dx.doi.org/10.4018/ijcini.2017100104.

Full text
Abstract:
Autonomic computing paradigm is based on intelligent computing systems that can autonomously take actions under given conditions. These technologies have been successfully applied to many problem domains requiring autonomous operation. One such area of national interest is SCADA systems that monitor critical infrastructures such as transportation networks, large manufacturing, business and health facilities, power generation, and distribution networks. The SCADA systems have evolved into a complex, highly connected system requiring high availability. On the other hand, cyber threats to these infrastructures have increasingly become more sophisticated, extensive and numerous. This highlights the need for newer measures that can proactively and autonomously react to an impending threat. This article proposes a SCADA system framework to leverage autonomic computing elements in the architecture for coping with the current challenges and threats of cyber security.
APA, Harvard, Vancouver, ISO, and other styles
25

Feng, Liping, Ruifeng Han, Hongbin Wang, Qingshan Zhao, Chengli Fu, and Qi Han. "A Virus Propagation Model and Optimal Control Strategy in the Point-to-Group Network to Information Security Investment." Complexity 2021 (June 3, 2021): 1–7. http://dx.doi.org/10.1155/2021/6612451.

Full text
Abstract:
Epidemiological dynamics is a vital method in studying the spread of computer network viruses. In this paper, an optimal control measure is proposed based on the SEIR virus propagation model in point-to-group information networks. First, considering the need for antivirus measures in reality, an optimal control problem is introduced, and then a controlled computer virus spread model in point-to-group information networks is established. Second, the optimal control measure is formulated by making a tradeoff between control cost and network loss caused by virus intrusion. Third, optimal control strategies are theoretically investigated by Pontryagin’s maximum principle and the Hamiltonian function. Finally, through numerical simulations, effective measures for controlling virus spread in point-to-group information networks are proposed.
APA, Harvard, Vancouver, ISO, and other styles
26

Wang, Xiaoli, Bharadwaj Veeravalli, Yulong Tan, and Zhihao Tong. "Security and Makespan Trade-Off Strategy in Fog-Enabled IoT Networks." Security and Communication Networks 2022 (May 23, 2022): 1–13. http://dx.doi.org/10.1155/2022/5184453.

Full text
Abstract:
Fog computing relieves the Internet of Things (IoT) from a heavy burden of workload computation, consequently minimizes workload makespan, and reduces the considerable energy consumption of IoT devices. However, the fog-enabled IoT poses a risk to data security due to the intrinsic open and distributed structure of the fog. Hence, it is imperative to search for an optimal scheduling strategy on fog nodes to minimize workload makespan, while guaranteeing high data security. In this study, we investigate the trade-off between security and makespan and propose a multiobjective optimization model to optimize them simultaneously. To achieve this goal, we design an evolutionary algorithm together with two effective measures to handle large-scale partitionable workloads: a conflict-free multi-installment scheduling (ConfMIS) strategy as well as a security criterion based on Eigenvector centrality measure. Experimental results show that the proposed algorithm can generate a set of widely spread and uniformly distributed solutions in the decision space. Among these representative solutions, system designers/decision-makers can choose their favorite one based on specific IoT application demands.
APA, Harvard, Vancouver, ISO, and other styles
27

Liu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (September 1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

A. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (February 15, 2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.

Full text
Abstract:
So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied to combating common crime. The article presents innovative technologies in combating cyber crime and an ever-increasing significance of information security as a system of protecting private, public and state interests. Keywords: cyber crime, cyber security, Internet, information security, innovative technologies, computer systems, information technologies (IT), cyber threats, cyber space.
APA, Harvard, Vancouver, ISO, and other styles
29

Liang, Jiaqi, Yibei Wu, Jun’e Li, Xiong Chen, Heqin Tong, and Ming Ni. "Security Risk Analysis of Active Distribution Networks with Large-Scale Controllable Loads under Malicious Attacks." Complexity 2021 (February 19, 2021): 1–12. http://dx.doi.org/10.1155/2021/6659879.

Full text
Abstract:
With the development of distributed networks, the remote controllability of the distributed energy objects and the vulnerability of user-side information security protection measures make distributed energy objects extremely vulnerable to malicious control by attackers. Hence, the large-scale loads may produce abnormal operation performance, such as load casting/dropping synchronously or frequent and synchronous casting and dropping, and hence, it can threaten the security and stable operation of the distribution networks. First, we analyze the security threats faced by industrial controllable load, civil controllable load, and the gains and losses of attacks on the distribution networks. Considering the factors of cyber attacks, we propose a control model and cyber attack model in active distribution networks (ADNs). And, three types of attacks that the target suffered are defined on the basis of “on” and “off” modes for control. Then, the controllable load was maliciously controlled as the research object, and a suitable scenario is selected. The impact of malicious control of the controllable load on the power supply reliability and power quality of the distribution networks are simulated and analyzed, and risk consequences for different types of attacks are provided.
APA, Harvard, Vancouver, ISO, and other styles
30

Safavi-Naini, Reihaneh, Alireza Poostindouz, and Viliam Lisy. "Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication." Security and Communication Networks 2018 (May 7, 2018): 1–15. http://dx.doi.org/10.1155/2018/8475818.

Full text
Abstract:
Moving target defense (MTD) strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research.
APA, Harvard, Vancouver, ISO, and other styles
31

Nawaz, Naeem A., Kashif Ishaq, Uzma Farooq, Amna Khalil, Saim Rasheed, Adnan Abid, and Fadhilah Rosdi. "A comprehensive review of security threats and solutions for the online social networks industry." PeerJ Computer Science 9 (January 16, 2023): e1143. http://dx.doi.org/10.7717/peerj-cs.1143.

Full text
Abstract:
The term “cyber threats” refers to the new category of hazards that have emerged with the rapid development and widespread use of computing technologies, as well as our growing reliance on them. This article presents an in-depth study of a variety of security and privacy threats directed at different types of users of social media sites. Furthermore, it focuses on different risks while sharing multimedia content across social networking platforms, and discusses relevant prevention measures and techniques. It also shares methods, tools, and mechanisms for safer usage of online social media platforms, which have been categorized based on their providers including commercial, open source, and academic solutions.
APA, Harvard, Vancouver, ISO, and other styles
32

Samreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (July 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.

Full text
Abstract:
The applications of a mobile ad hoc network (MANET) range from military and disaster response to commercial and civilian environments. The intrinsic characteristics like lack of infrastructure, self-organizing nature and deployment flexibility contributes to its usefulness but few other features like open media for communication and topological changes on-the-fly makes it vulnerable to security attacks. The focus of the current work is security mechanisms for a MANET against the various insider attacks targeting the data forwarding operations. It is accomplished through a trust management framework and a secure routing protocol relying upon the TMF to form the routes with most trusted nodes. The protocol computes a novel reliability metric termed as Path Allegiance metric (PAM) which acts as a selection criteria for route selection. The performance evaluation involves simulation results which prove the robustness of the proposed TMF and the effectiveness of the PAM routing protocol in reliable data delivery in the presence of packet droppers which disrupt the data transmission.
APA, Harvard, Vancouver, ISO, and other styles
33

Das, Amit, and Habib Ullah Khan. "Security behaviors of smartphone users." Information & Computer Security 24, no. 1 (March 14, 2016): 116–34. http://dx.doi.org/10.1108/ics-04-2015-0018.

Full text
Abstract:
Purpose – This paper aims to report on the information security behaviors of smartphone users in an affluent economy of the Middle East. Design/methodology/approach – A model based on prior research, synthesized from a thorough literature review, is tested using survey data from 500 smartphone users representing three major mobile operating systems. Findings – The overall level of security behaviors is low. Regression coefficients indicate that the efficacy of security measures and the cost of adopting them are the main factors influencing smartphone security behaviors. At present, smartphone users are more worried about malware and data leakage than targeted information theft. Research limitations/implications – Threats and counter-measures co-evolve over time, and our findings, which describe the state of smartphone security at the current time, will need to be updated in the future. Practical implications – Measures to improve security practices of smartphone users are needed urgently. The findings indicate that such measures should be broadly effective and relatively costless for users to implement. Social implications – Personal smartphones are joining enterprise networks through the acceptance of Bring-Your-Own-Device computing. Users’ laxity about smartphone security thus puts organizations at risk. Originality/value – The paper highlights the key factors influencing smartphone security and compares the situation for the three leading operating systems in the smartphone market.
APA, Harvard, Vancouver, ISO, and other styles
34

Khan, Burhan Ul Islam, Farhat Anwar, Farah Diyana Bt Abdul Rahman, Rashidah Funke Olanrewaju, Miss Laiha B. Mat Kiah, Md Arafatur Rahman, and Zuriati Janin. "EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES." Malaysian Journal of Computer Science 35, no. 4 (October 30, 2022): 307–38. http://dx.doi.org/10.22452/mjcs.vol35no4.2.

Full text
Abstract:
Mobile ad hoc networks are susceptible to various security threats due to their open media nature and mobility, making them a top priority for security measures. This paper provides an in-depth examination of MANET security issues. Some of the most critical aspects of mobile ad hoc networks, including their applications, have been discussed. This is followed by a discussion of MANETs' design vulnerability to external and internal security threats caused by inherent network characteristics such as limited battery power, mobility, dynamic topology, open media, and so on. Numerous MANET-related attacks have been classified based on their sources, behaviour, participating nodes, processing capability, and layering. The many different types of misbehaviour a node can exhibit and the various ways a node can behave were investigated. Two major types of MANETs misbehaviour have been evaluated, classified and analysed. Notably, mitigating node misbehaviour in MANET is a critical issue that must be addressed to ensure network node functionality and availability. Strategies for detecting network nodes that misroute packets are also examined. Finally, the paper emphasises the need for effective solutions to secure MANETs.
APA, Harvard, Vancouver, ISO, and other styles
35

Ahmad, Bilal, Wang Jian, and Zain Anwar Ali. "Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions." Journal of Computer Networks and Communications 2018 (July 2, 2018): 1–10. http://dx.doi.org/10.1155/2018/6383145.

Full text
Abstract:
As time progresses with vast development of information technology, a large number of industries are more dependent on network connections for sensitive business trading and security matters. Communications and networks are highly vulnerable to threats because of increase in hacking. Personnel, governments, and armed classified networks are more exposed to difficulties, so the need of the hour is to install safety measures for network to prevent illegal modification, damage, or leakage of serious information. Intrusion detection, an important entity towards network security, has the ability to observe network activity as well as detect intrusions/attacks. This study highlights the developing research about the application of machine learning and data mining in Internet security. We provide background, enthusiasm, discussion of challenges, and recommendations for the application of ML/DM in the field of intrusion detection.
APA, Harvard, Vancouver, ISO, and other styles
36

Al-Otaibi, Yasser D. "A Shared Two-way Cybersecurity Model for Enhancing Cloud Service Sharing for Distributed User Applications." ACM Transactions on Internet Technology 22, no. 2 (May 31, 2022): 1–17. http://dx.doi.org/10.1145/3430508.

Full text
Abstract:
Cloud services provide decentralized and pervasive access for resources to reduce the complex infrastructure requirements of the user. In decentralized service access, the implication of security is tedious to match the user requirements. Therefore, cloud services incorporate cybersecurity measures for administering standard resource access to users. In this paper, a shared two-way security model (STSM) is proposed to provide adaptable service security for the end-users. In this security model, a cooperative closed access session for information sharing between the cloud and end-user is designed with the help of cybersecurity features. This closed access provides less complex authentication for users and data that is capable of matching the verifications of the cloud services. A deep belief learning algorithm is used to differentiate the cooperative and non-cooperative secure sessions between the users and the cloud to ensure closed access throughout the data sharing time. The output of the belief network decides the actual session time between the user and the cloud, improving the span of the sharing session. Besides, the proposed model reduces false alarm, communication failures, under controlled complexity.
APA, Harvard, Vancouver, ISO, and other styles
37

Safi, Roozmehr, Glenn J. Browne, and Azadeh Jalali Naini. "Mis-spending on information security measures: Theory and experimental evidence." International Journal of Information Management 57 (April 2021): 102291. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Shabbir, Aysha, Maryam Shabbir, Muhammad Rizwan, and Fahad Ahmad. "Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard." Security and Communication Networks 2019 (December 18, 2019): 1–16. http://dx.doi.org/10.1155/2019/2509898.

Full text
Abstract:
Lifeblood of every organization is its confidential information. The accentuation on cybersecurity has expanded considerably in the course of the last few years because of the expanded number in attacks at the individual and organization and even at the state level. One specific zone of consideration is the assurance of the security of nuclear information. This may relate to both Instrumentation and Control (I&C) and Information Technology (IT). The present security measures are insufficient for nuclear information because of their lack of identification, classification, and securing measures (because of their multifaceted nature). With the increasing trends of data storage and management with the assistance of cloud, data confidentiality threats are immensely increasing. As there is no such safeguard that can make our systems a hundred percent secure, the best approach is to provide security at distinct layers. The basic purpose of layered security is to have the benefit that if one layer fails or compromised, the other layer compensates or maintains that confidentiality with the access control in the owner’s hand. In this paper, we have proposed a multilevel approach with protection-based computing by using Modular Encryption Standard (MES). We proposed a cloud framework as well to further enhance its security by utilizing a multicloud and modular approach. By performing simulations, the obtained results depicted that our proposed scheme works efficiently than other commonly used schemes.
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Keyong, Xiaoyue Guo, and Dequan Yang. "Research on the Effectiveness of Cyber Security Awareness in ICS Risk Assessment Frameworks." Electronics 11, no. 10 (May 23, 2022): 1659. http://dx.doi.org/10.3390/electronics11101659.

Full text
Abstract:
Assessing security awareness among users is essential for protecting industrial control systems (ICSs) from social engineering attacks. This research aimed to determine the effect of cyber security awareness on the emergency response to cyber security incidents in the ICS. Additionally, this study has adopted a variety of cyber security emergency response process measures and frameworks and comprehensively proposes a new organizational model of cyber security incident response. The corresponding measures are evaluated based on the MP2DR2 risk control matrix model to assess their practical value in the evaluation stage. This study found that after adding security awareness measures to response control measures, the influential value ranking of other control measures changed. The practical value of security awareness control measures was given a higher priority than that of other control measures. The research results highlight the importance of cyber security awareness and aim to inspire ICSs to place a higher priority on staff cyber security awareness in relation to cyber security incidents, which can effectively prevent the occurrence of cyber security incidents and make the field of industrial control application agency respond to incidents faster to restore the regular progress of all works.
APA, Harvard, Vancouver, ISO, and other styles
40

Sharma, Tanusree, Hunter A. Dyer, and Masooda Bashir. "Enabling User-centered Privacy Controls for Mobile Applications." ACM Transactions on Internet Technology 21, no. 1 (February 2021): 1–24. http://dx.doi.org/10.1145/3434777.

Full text
Abstract:
Mobile apps have transformed many aspects of clinical practice and are becoming a commonplace in healthcare settings. The recent COVID-19 pandemic has provided the opportunity for such apps to play an important role in reducing the spread of the virus. Several types of COVID-19 apps have enabled healthcare professionals and governments to communicate with the public regarding the pandemic spread, coronavirus awareness, and self-quarantine measures. While these apps provide immense benefits for the containment of the spread, privacy and security of these digital tracing apps are at the center of public debate. To address this gap, we conducted an online survey of a midwestern region in the United State to assess people’s attitudes toward such apps and to examine their privacy and security concerns and preferences. Survey results from 1,550 participants indicate that privacy/security protections and trust play a vital role in people’s adoption of such apps. Furthermore, results reflect users’ preferences wanting to have control over their personal information and transparency on how their data is handled. In addition, personal data protection priorities selected by the participants were surprising and yet revealing of the disconnect between technologists and users. In this article, we present our detailed survey results as well as design guidelines for app developers to develop innovative human-centered technologies that are not only functional but also respectful of social norms and protections of civil liberties. Our study examines users’ preferences for COVID-19 apps and integrates important factors of trust, willingness, and preferences in the context of app development. Through our research findings, we suggest mechanisms for designing inclusive apps’ privacy and security measures that can be put into practice for healthcare-related apps, so that timely adoption is made possible.
APA, Harvard, Vancouver, ISO, and other styles
41

Bhatia, Deepshikha. "A Comprehensive Review on the Cyber Security Methods in Indian Organisation." International Journal of Advances in Soft Computing and its Applications 14, no. 1 (March 28, 2022): 103–24. http://dx.doi.org/10.15849/ijasca.220328.08.

Full text
Abstract:
Abstract Cyber security, an application that protects and controls the systems, programs, networks, data and devices from cyber-attacks. This cyber security practice used by individuals and small or large organizations for protecting against unusual data access. A powerful cyber security system provides a great security against malware attacks, viruses, ransom ware, cloud attacks, IoT attacks etc. and it designed for accessing, destroying, deleting and altering these attacks and secure the retrieving data from the server and user’s systems. This paper discuss about the importance of cyber security in organizations of India. Surveys of Indian organization’s cyber security measures are taken for the evaluation of the methods and challenges of cyber security. This comprehensive review provides insights about securing the data by employing cyber security frame works, risk assessment models and educating cyber security knowledge among public with help of government public programs. With these information this paper helps for overcoming the cyber threats and attacks and created a pre cautionary thought and also made a pre vision for diminishing theft of data among employees and tracking hacker’s activities before attacking the organizations. Keywords: cyber security, Indian organization, cyber-attacks, cyber security methods, DDoS attack.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhu, Qingyi, Yuhang Liu, Xuhang Luo, and Kefei Cheng. "A Malware Propagation Model Considering Conformity Psychology in Social Networks." Axioms 11, no. 11 (November 10, 2022): 632. http://dx.doi.org/10.3390/axioms11110632.

Full text
Abstract:
At present, malware is still a major security threat to computer networks. However, only a fraction of users with some security consciousness take security measures to protect computers on their own initiative, and others who know the current situation through social networks usually follow suit. This phenomenon is referred to as conformity psychology. It is obvious that more users will take countermeasures to prevent computers from being infected if the malware spreads to a certain extent. This paper proposes a deterministic nonlinear SEIQR propagation model to investigate the impact of conformity psychology on malware propagation. Both the local and global stabilities of malware-free equilibrium are proven while the existence and local stability of endemic equilibrium is proven by using the central manifold theory. Additionally, some numerical examples and simulation experiments based on two network datasets are performed to verify the theoretical analysis results. Finally, the sensitivity analysis of system parameters is carried out.
APA, Harvard, Vancouver, ISO, and other styles
43

Aziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (June 20, 2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.

Full text
Abstract:
Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagrams, and codes has been done as applicable.
APA, Harvard, Vancouver, ISO, and other styles
44

Rietz, René, Radoslaw Cwalinski, Hartmut König, and Andreas Brinner. "An SDN-Based Approach to Ward Off LAN Attacks." Journal of Computer Networks and Communications 2018 (November 21, 2018): 1–12. http://dx.doi.org/10.1155/2018/4127487.

Full text
Abstract:
The detection of attacks on large administrative network domains is nowadays generally accomplished centrally by analyzing the data traffic on the uplink to the Internet. The first phase of an infection is usually difficult to observe. Often attackers use e-mail attachments or external media, such as USB sticks, hardware with preinstalled malware, or contaminated mobile devices to infect target systems. In such scenarios, the initial infection cannot be blocked at the network level. The lateral movement of attack programs (exploits) through internal networks and the exfiltration of data, however, which are the main purpose of targeted attacks, run always over the network. Security measures against such internal network attacks require a comprehensive monitoring concept that spans the entire network to its edge. Especially for preventive measures, this means providing a security concept for local area networks (LANs). In this paper, we propose based on an analysis of typical LAN-based attacks an approach for preventing these attacks for both IPv4 and IPv6 networks. It applies the software-defined networking (SDN) paradigm for centralizing the related network decisions in a central authority—the SDN controller—that manages all network connections and hence the associated data flows.
APA, Harvard, Vancouver, ISO, and other styles
45

Niveditha, V. R., D. Usha, P. S. Rajakumar, B. Dwarakanath, and Magesh S. "Emerging 5G IoT Smart System Based on Edge-to-Cloud Computing Platform." International Journal of e-Collaboration 17, no. 4 (October 2021): 122–31. http://dx.doi.org/10.4018/ijec.2021100109.

Full text
Abstract:
Security over internet communication has now become difficult as technology is increasingly more effective and faster, particularly in resource limited devices such as wireless sensors, embedded devices, internet of things (IoT), radio frequency identification (RFID) tags, etc. However, IoT is expected to connect billions of computers as a hopeful technology for the future. Hence, security, privacy, and authentication services must protect the communication in IoT. There are several recent considerations, such as restricted computing capacity, register width, RAM size, specific operating environment, ROM size, etc. that have compelled IoT to utilize conventional measures of security. These technologies require greater data speeds, high throughput, expanded power, lower bandwidth, and high efficiency. In addition, IoT has transformed the world in light of these new ideas by offering smooth communication between heterogeneous networks (HetNets).
APA, Harvard, Vancouver, ISO, and other styles
46

Tian, Zhenghao. "Embedded Real-Time Detection of Vehicles and Pedestrians Based on Minimal Networks." Mobile Information Systems 2022 (August 5, 2022): 1–9. http://dx.doi.org/10.1155/2022/3055282.

Full text
Abstract:
The safety and security of vehicles and pedestrians have always been a topic of high social concern. Since the safety awareness of vehicles and pedestrians is generally low nowadays, there is no relatively perfect and systematic method to guarantee that they can share information among themselves efficiently. As the number of vehicles and pedestrians continues to increase, ensuring their safe operation has become an important and real issue in today’s society. To ensure traffic order in unsupervised areas, it is necessary not only to be intelligent in management but also to have a comprehensive safety system to ensure that pedestrians and vehicles can share information and ensure traffic order. At present, the road management department has taken relatively effective measures to deal with these accidents, first of all, it is necessary to strengthen the construction of road safety facilities and also to improve the road transport vehicle detection capacity, to be able to timely detect the existence of safety hazards between vehicles and pedestrians, then reduce the possibility of accidents through technical means. Second, improve the ability to detect road safety facilities so that when accidents occur, it can detect the accident in time and take effective measures. Finally, improve the safety measures between vehicles and pedestrians in the road enforcement department, to effectively ensure that information can be shared between pedestrians and vehicles, thus reducing the possibility of traffic accidents.
APA, Harvard, Vancouver, ISO, and other styles
47

Jain, Jaishree, Arpit Jain, Saurabh Kumar Srivastava, Chaman Verma, Maria Simona Raboaca, and Zoltán Illés. "Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA." Mathematics 10, no. 7 (March 26, 2022): 1071. http://dx.doi.org/10.3390/math10071071.

Full text
Abstract:
With the rapid advancements of the internet of things (IoT), several applications have evolved with completely dissimilar structures and requirements. However, the fifth generation of mobile cellular networks (5G) is unable to successfully support the dissimilar structures and requirements. The sixth generation of mobile cellular networks (6G) is likely to enable new and unidentified applications with varying requirements. Therefore, 6G not only provides 10 to 100 times the speed of 5G, but 6G can also provide dynamic services for advanced IoT applications. However, providing security to 6G networks is still a significant problem. Therefore, in this paper, a hybrid image encryption technique is proposed to secure multimedia data communication over 6G networks. Initially, multimedia data are encrypted by using the proposed model. Thereafter, the encrypted data are then transferred over the 6G networks. Extensive experiments are conducted by using various attacks and security measures. A comparative analysis reveals that the proposed model achieves remarkably good performance as compared to the existing encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
48

Liang, Yingchang, Yue Gao, Liang Xiao, Yulong Zou, and Guoru Ding. "Guest editorial: Wireless security challenges and counter measures for dynamic spectrum sharing." China Communications 18, no. 12 (December 2021): iii—vi. http://dx.doi.org/10.23919/jcc.2021.9665362.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Badzeliuk, P. "On the issue of cybersecurity of advocacy activity." Analytical and Comparative Jurisprudence, no. 2 (July 24, 2022): 302–5. http://dx.doi.org/10.24144/2788-6018.2022.02.56.

Full text
Abstract:
During the 20th century, technological progress rewarded the convergence of telecommunications and computer technology. This marked the beginning of an era known as the information age. The information age is characterized by the growth of digitalization, which mainly performs the technological transition from analog and electromechanical technologies to digital technologies. A very characteristic feature of the information age is the continuous integration of computer and digital communication technologies into virtually every aspect of life. This has led to the emergence of the information society, which has fundamentally changed traditional perceptions of security. The security of digital data, computers, digital communications technologies and information networks now has a predominant impact on all aspects of life and society. Thus, with the advent of the information society, malicious actions against information systems, such as computer systems and networks, can now affect individuals, the country and the global economy in a way that was previously unheard of. Measures to address these information security issues have given rise to a new concept known as «cybersecurity». Cybersecurity of information is aimed at promoting and ensuring the overall security of digital and information systems with the security of the information society. Thus, the concept of a wide range of social, legal, regulatory and technological measures that ensure the integrity, confidentiality, accessibility and overall security of digital information and information systems to achieve the high level of trust and security necessary for the development of a sustainable information society. Advocacy is inextricably linked to confidential information. Providing protection and security of information about one of the best tasks of advocacy. The age of digitization of advocacy is transforming the usual procedural agenda. This creates a new mystery for lawyers. In a profession where trust and confidentiality are as sacred as keeping clients secret, is the amount of information that comes to your attention increasingly beyond your control?
APA, Harvard, Vancouver, ISO, and other styles
50

Sheikh, Muhammad Sameer, and Jun Liang. "A Comprehensive Survey on VANET Security Services in Traffic Management System." Wireless Communications and Mobile Computing 2019 (September 15, 2019): 1–23. http://dx.doi.org/10.1155/2019/2423915.

Full text
Abstract:
Recently, vehicular ad hoc networks (VANETs) embark a great deal of attention in the area of wireless and communication technology and are becoming one of the prominent research areas in the intelligent transportation system (ITS) because they provide safety and precautionary measures to the drivers and passengers, respectively. VANETs are quite different from the mobile ad hoc networks (MANETs) in terms of characteristics, challenges, system architecture, and their application. In this paper, we summarize the recent state-of-the-art methods of VANETs by discussing their architecture, security, and challenges. Secondly, we discuss the detailed analysis of security schemes and the possible measures to provide secure communication in VANETs. Then, we comprehensively cover the authentication schemes, which is able to protect the vehicular network from malicious nodes and fake messages. Thus, it provides security in VANETs. Thirdly, we cover the mobility and network simulators, as well as other simulation tools, followed by the performance of authentication schemes. Finally, we discuss the comfort and safety applications of VANETs. In sum, this paper comprehensively covers the entire VANET system and its applications by filling the gaps of existing surveys and incorporating the latest trends in VANETs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography