To see the other types of publications on this topic, follow the link: Secured ubiquitous services.

Journal articles on the topic 'Secured ubiquitous services'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Secured ubiquitous services.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Ogbodo, Emmanuel Utochukwu, Adnan M. Abu-Mahfouz, and Anish M. Kurien. "A Survey on 5G and LPWAN-IoT for Improved Smart Cities and Remote Area Applications: From the Aspect of Architecture and Security." Sensors 22, no. 16 (August 22, 2022): 6313. http://dx.doi.org/10.3390/s22166313.

Full text
Abstract:
Addressing the recent trend of the massive demand for resources and ubiquitous use for all citizens has led to the conceptualization of technologies such as the Internet of Things (IoT) and smart cities. Ubiquitous IoT connectivity can be achieved to serve both urban and underserved remote areas such as rural communities by deploying 5G mobile networks with Low Power Wide Area Network (LPWAN). The current architectures will not offer flexible connectivity to many IoT applications due to high service demand, data exchange, emerging technologies, and security challenges. Hence, this paper explores various architectures that consider a hybrid 5G-LPWAN-IoT and Smart Cities. This includes security challenges as well as endogenous security and solutions in 5G and LPWAN-IoT. The slicing of virtual networks using software-defined network (SDN)/network function virtualization (NFV) based on the different quality of service (QoS) to satisfy different services and quality of experience (QoE) is presented. Also, a strategy that considers the implementation of 5G jointly with Weightless-N (TVWS) technologies to reduce the cell edge interference is considered. Discussions on the need for ubiquity connectivity leveraging 5G and LPWAN-IoT are presented. In addition, future research directions are presented, including a unified 5G network and LPWAN-IoT architecture that will holistically support integration with emerging technologies and endogenous security for improved/secured smart cities and remote areas IoT applications. Finally, the use of LPWAN jointly with low earth orbit (LEO) satellites for ubiquitous IoT connectivity is advocated in this paper.
APA, Harvard, Vancouver, ISO, and other styles
2

Bouchemal, Nardjes, Ramdane Maamri, and Mohammed Chihoub. "Securing Ambient Agents Groups by Using Verification, Judgment and Surveillance." International Journal of Ambient Computing and Intelligence 5, no. 3 (July 2013): 44–60. http://dx.doi.org/10.4018/ijaci.2013070104.

Full text
Abstract:
Ubiquitous computing and ambient intelligence (or AmI) models raise the need for secured systems, due to increased heterogeneity, intelligence and dynamism. Information in such environments is managed by systems formed mostly of devices with limited capabilities. Indeed, AmI characteristics, difficult to handle by traditional computing concepts, are making the agent paradigm to gain impetus and increasing the interest of researchers and industry in this concept. However, the inherent complexity of information security is bigger in agent-based AmI systems built by gathering distributed information and services that are not under the control of a single entity, and introduce new security and privacy concerns. In fact, securing these systems requires protecting any element from every other. This paper proposes a mechanism for enhancing security and privacy while using agents in AmI environments, based on three main building blocks: verification, judgment and surveillance. Furthermore, the key idea is based on cooperation and collective decision.
APA, Harvard, Vancouver, ISO, and other styles
3

Hsu, Ching-Hsien, Jong Hyuk Park, Laurence T. Yang, and Mario Freire. "Secure communications and data management in ubiquitous services." International Journal of Communication Systems 22, no. 9 (September 2009): 1065–68. http://dx.doi.org/10.1002/dac.1057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Sung-Ki, Jin-Chul Jung, Kyung-No Park, and Byoung-Joon Min. "Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States." KIPS Transactions:PartC 15C, no. 3 (June 30, 2008): 157–66. http://dx.doi.org/10.3745/kipstc.2008.15-c.3.157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hsu, Robert C., Jong Hyuk Park, Laurence T. Yang, and Mario Freire. "Call for Papers: ‘Secure Communications and Data Management in Ubiquitous Services’." International Journal of Communication Systems 21, no. 5 (2008): 569–70. http://dx.doi.org/10.1002/dac.940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhou, Yousheng, and Longan Wang. "A Lattice-Based Authentication Scheme for Roaming Service in Ubiquitous Networks with Anonymity." Security and Communication Networks 2020 (June 28, 2020): 1–19. http://dx.doi.org/10.1155/2020/2637916.

Full text
Abstract:
In the ubiquitous networks, mobile nodes can obtain roaming service that enables them to get access to the services extended by their home networks in the field of foreign network. To provide secure and anonymous communication for legal mobile users in roaming services, there should be a mutual authentication between mobile user and foreign agent with the help of home agent. There are many roaming authentication schemes which have been proposed; however, with the progress of quantum computation, quantum attack poses security threats to many traditional public key cryptography-based authentication schemes; thus, antiquantum attack roaming authentication schemes need to be investigated. On account of the limitation of computational resources for mobile nodes, a lightweight anonymous and antiquantum authentication schemes need to be developed to enable mobile nodes to roam across multiple service domains securely and seamlessly. In consideration of the advantages of lattice in antiquantum, an NTRU-based authentication scheme with provable security and conditional privacy preservation is proposed to remedy these security weaknesses. Compared with the existing scheme, the proposed scheme not only improves efficiency but also can resist the quantum attack.
APA, Harvard, Vancouver, ISO, and other styles
7

Abumarshoud, Hanaa, Cheng Chen, Mohamed Sufyan Islim, and Harald Haas. "Optical wireless communications for cyber-secure ubiquitous wireless networks." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 476, no. 2242 (October 2020): 20200162. http://dx.doi.org/10.1098/rspa.2020.0162.

Full text
Abstract:
Wireless connectivity is no longer limited to facilitating communications between individuals, but is also required to support diverse and heterogeneous applications, services and infrastructures. Internet of things (IoT) systems will dominate future technologies, allowing any and all devices to create, share and process data. If artificial intelligence resembles the brain of IoT, then high-speed connectivity forms the nervous system that connects the devices. For IoT to safely operate autonomously, it requires highly secure and reliable wireless links. In this article, we shed light on the potential of optical wireless communications to provide high-speed secure and reliable ubiquitous access as an enabler for fifth generation and beyond wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Bahl, P., W. Russell, Yi-Min Wang, A. Balachandran, G. M. Voelker, and A. Miu. "PAWNs: Satisfying the need for ubiquitos secure connectivity and location services." IEEE Wireless Communications 9, no. 1 (February 2002): 40–48. http://dx.doi.org/10.1109/mwc.2002.986457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mahmood, Zahid, Huansheng Ning, Ata Ullah, and Xuanxia Yao. "Secure Authentication and Prescription Safety Protocol for Telecare Health Services Using Ubiquitous IoT." Applied Sciences 7, no. 10 (October 16, 2017): 1069. http://dx.doi.org/10.3390/app7101069.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jagadamba, G., and B. Sathish Babu. "Context and Trust Based Adaptive Security for Accessing Services in Ubiquitous Computing Environment." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (October 2016): 1–21. http://dx.doi.org/10.4018/ijssoe.2016100101.

Full text
Abstract:
The smart spaces built on the ubiquitous network make the services available for every entity in a seamless way using the most suitable resource provider. However, all services are not equally sensitive; hence do not require the same levels of security. In this paper, the authors propose an adaptive security scheme which handles service requests originating from heterogeneous contexts and belonging to different trust levels. The adaptive security scheme includes user classification, situational analysis and dynamic generation of appropriate security policies. The proposed security scheme can be made use to secure application built on the Ubiquitous Computing Environment (UCE) such as health care, smart office, smart ubiquitous home, etc.
APA, Harvard, Vancouver, ISO, and other styles
11

Le, Tuan-Vinh. "Securing Group Patient Communication in 6G-Aided Dynamic Ubiquitous Healthcare with Real-Time Mobile DNA Sequencing." Bioengineering 10, no. 7 (July 15, 2023): 839. http://dx.doi.org/10.3390/bioengineering10070839.

Full text
Abstract:
(1) Background: With an advanced technique, third-generation sequencing (TGS) provides services with long deoxyribonucleic acid (DNA) reads and super short sequencing time. It enables onsite mobile DNA sequencing solutions for enabling ubiquitous healthcare (U-healthcare) services with modern mobile technology and smart entities in the internet of living things (IoLT). Due to some strict requirements, 6G technology can efficiently facilitate communications in a truly intelligent U-healthcare IoLT system. (2) Research problems: conventional single user–server architecture is not able to enable group conversations where “multiple patients–server” communication or “patient–patient” communication in the group is required. The communications are carried out via the open Internet, which is not a trusted channel. Since heath data and medical information are very sensitive, security and privacy concerns in the communication systems have become extremely important. (3) Purpose: the author aims to propose a dynamic group-based patient-authenticated key distribution protocol for 6G-aided U-healthcare services enabled by mobile DNA sequencing. In the protocol, an authenticated common session key is distributed by the server to the patients. Using the key, patients in a healthcare group are allowed to securely connect with the service provider or with each other for specific purposes of communication. (4) Results: the group key distribution process is protected by a secure three-factor authentication mechanism along with an efficient sequencing-device-based single sign-on (SD-SSO) solution. Based on traceable information stored in the server database, the proposed approach can provide patient-centered services which are available on multiple mobile devices. Security robustness of the proposed protocol is proven by well-known verification tools and a detailed semantic discussion. Performance evaluation shows that the protocol provides more functionality and incurs a reasonable overhead in comparison with the existing works.
APA, Harvard, Vancouver, ISO, and other styles
12

Adithya, B., and B. Sathish Babu. "Capacity and Service (CapServ) Adaptive Trust Computation by Territory Formation in Ubiquitous Environment." International Journal of Advanced Pervasive and Ubiquitous Computing 4, no. 4 (October 2012): 7–18. http://dx.doi.org/10.4018/japuc.2012100102.

Full text
Abstract:
Ubiquitous computing has been studied extensively as a post desktop model. Secure communication among various heterogeneous networks is been a challenge in service environment with location dynamism of the nodes. In this paper the authors proposed model for trust worthy communications among devices of various networks in a ubiquitous environment with varied service needs, security needs and computational-storage capacities. The model uses a novel approach for computing trust - adaptive to capacity and services.
APA, Harvard, Vancouver, ISO, and other styles
13

Aloisio, Giovanni, Massimo Cafaro, Euro Blasi, and Italo Epicoco. "The Grid Resource Broker, A Ubiquitous Grid Computing Framework." Scientific Programming 10, no. 2 (2002): 113–19. http://dx.doi.org/10.1155/2002/969307.

Full text
Abstract:
Portals to computational/data grids provide the scientific community with a friendly environment in order to solve large-scale computational problems. The Grid Resource Broker (GRB) is a grid portal that allows trusted users to create and handle computational/data grids on the fly exploiting a simple and friendly web-based GUI. GRB provides location-transparent secure access to Globus services, automatic discovery of resources matching the user's criteria, selection and scheduling on behalf of the user. Moreover, users are not required to learn Globus and they do not need to write specialized code or to rewrite their existing legacy codes. We describe GRB architecture, its components and current GRB features addressing the main differences between our approach and related work in the area.
APA, Harvard, Vancouver, ISO, and other styles
14

Ahmad, Muhammad, Mohammed A. Alqarni, Asad Khan, Adil Khan, Sajjad Hussain Chauhdary, Manuel Mazzara, Tariq Umer, and Salvatore Distefano. "Smartwatch-Based Legitimate User Identification for Cloud-Based Secure Services." Mobile Information Systems 2018 (August 14, 2018): 1–14. http://dx.doi.org/10.1155/2018/5107024.

Full text
Abstract:
Smartphones are ubiquitously integrated into our home and work environment and users frequently use them as the portal to cloud-based secure services. Since smartphones can easily be stolen or coopted, the advent of smartwatches provides an intriguing platform legitimate user identification for applications like online banking and many other cloud-based services. However, to access security-critical online services, it is highly desirable to accurately identifying the legitimate user accessing such services and data whether coming from the cloud or any other source. Such identification must be done in an automatic and non-bypassable way. For such applications, this work proposes a two-fold feasibility study; (1) activity recognition and (2) gait-based legitimate user identification based on individual activity. To achieve the above-said goals, the first aim of this work was to propose a semicontrolled environment system which overcomes the limitations of users’ age, gender, and smartwatch wearing style. The second aim of this work was to investigate the ambulatory activity performed by any user. Thus, this paper proposes a novel system for implicit and continuous legitimate user identification based on their behavioral characteristics by leveraging the sensors already ubiquitously built into smartwatches. The design system gives legitimate user identification using machine learning techniques and multiple sensory data with 98.68% accuracy.
APA, Harvard, Vancouver, ISO, and other styles
15

Yu, Weider D., Jatin Patel, Vishal Mehta, and Ashish Joshi. "An Approach to Design a SOA Services Governance Architecture for an u-Healthcare System with Mobility." International Journal of E-Health and Medical Communications 3, no. 2 (April 2012): 36–65. http://dx.doi.org/10.4018/jehmc.2012040103.

Full text
Abstract:
Ubiquitous health (u-Health) system is focused on the concept of providing medical service and assistance to the patients “anywhere and anytime” regardless of their locations. Existing mobile u-Healthcare systems have problems in lacking one or the other S.C.A.L.E. (Scalability, Connectivity, Adaptability, Liability, and Ease-of-use) criterion that any ubiquitous system must support. They become expensive during set up, reconfiguration, and modification as no proper and efficient solution is available. Also, they lack security, privacy, and wireless accessibility features so all these problems can prevent the system from being expanded widely. The objective of this paper is to implement a u-Healthcare system based on wireless mobile technology using Service Oriented Architecture (SOA). Applying Service Governance of Service Oriented Architecture helps make all services more secure, reusable, interoperable, available, and imposes all the features a ubiquitous system should have. A prototype system uSG-Health was developed using the approach for demonstrating the functionality and ability of the proposed u-Healthcare system.
APA, Harvard, Vancouver, ISO, and other styles
16

Luis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo, et al. "Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030." ITU Journal on Future and Evolving Technologies 3, no. 3 (December 8, 2022): 693–709. http://dx.doi.org/10.52953/samo3073.

Full text
Abstract:
The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment.
APA, Harvard, Vancouver, ISO, and other styles
17

Chang, Chin-Chen, Iuon-Chang Lin, and Chia-Chi Wu. "A Multipurpose Key Agreement Scheme in Ubiquitous Computing Environments." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/934716.

Full text
Abstract:
Due to the rapid advancement of cryptographic techniques, the smart card has recently become a popular device because it is capable of storing and computing essential information with such properties as tamper resistance. However, many service providers must satisfy the user’s desire to be able to access services anytime and anywhere with the smart card computing devices. Therefore, multipurpose smart cards have become very popular identification tokens. In 2011, Wang et al. proposed an authentication and key agreement scheme for smart card use. Even so, two drawbacks still exist; that is, (1) the security requirement of mutual authentication has not been satisfied and (2) the authentication scheme cannot be used for multipurpose smart cards. In this paper, we propose an efficient and secure multipurpose, authenticated, key agreement scheme in which the user is required to register only once and can be authenticated without any registration center. Furthermore, the proposed scheme can be used in ubiquitous environments because of its low computation and communication overhead.
APA, Harvard, Vancouver, ISO, and other styles
18

Sánchez, Daniel, Andrés López, Florina Mendoza, and Patricia Arias Cabarcos. "DNS-Based Dynamic Authentication for Microservices in IoT." Proceedings 2, no. 19 (October 25, 2018): 1233. http://dx.doi.org/10.3390/proceedings2191233.

Full text
Abstract:
IoT devices provide with real-time data to a rich ecosystems of services and applications that will be of uttermost importance for ubiquitous computing. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core netkworks. Designers may opt for microservice architectures and fog computing to address this challenge while offering the required flexibility for the main players of ubiquitous computing: nomadic users. Microservices require strong security support for Fog computing, to rely on nodes in the boundary of the network for secure data collection and processing. IoT low cost devices face outdated certificates and security support, due to the elapsed time from manufacture to deployment. In this paper we propose a solution based on microservice architectures and DNSSEC, DANE and chameleon signatures to overcome these difficulties. We will show how trap doors included in the certificates allow a secure and flexible delegation for off-loading data collection and processing to the fog. The main result is showing this requires minimal manufacture device configuration, thanks to DNSSEC support.
APA, Harvard, Vancouver, ISO, and other styles
19

Xiong, Jinbo, Rong Ma, Lei Chen, Youliang Tian, Li Lin, and Biao Jin. "Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services." Wireless Communications and Mobile Computing 2018 (August 12, 2018): 1–12. http://dx.doi.org/10.1155/2018/8959635.

Full text
Abstract:
Mobile crowdsensing as a novel service schema of the Internet of Things (IoT) provides an innovative way to implement ubiquitous social sensing. How to establish an effective mechanism to improve the participation of sensing users and the authenticity of sensing data, protect the users’ data privacy, and prevent malicious users from providing false data are among the urgent problems in mobile crowdsensing services in IoT. These issues raise a gargantuan challenge hindering the further development of mobile crowdsensing. In order to tackle the above issues, in this paper, we propose a reliable hybrid incentive mechanism for enhancing crowdsensing participations by encouraging and stimulating sensing users with both reputation and service returns in mobile crowdsensing tasks. Moreover, we propose a privacy preserving data aggregation scheme, where the mediator and/or sensing users may not be fully trusted. In this scheme, differential privacy mechanism is utilized through allowing different sensing users to add noise data, then employing homomorphic encryption for protecting the sensing data, and finally uploading ciphertext to the mediator, who is able to obtain the collection of ciphertext of the sensing data without actual decryption. Even in the case of partial sensing data leakage, differential privacy mechanism can still ensure the security of the sensing user’s privacy. Finally, we introduce a novel secure multiparty auction mechanism based on the auction game theory and secure multiparty computation, which effectively solves the problem of prisoners’ dilemma incurred in the sensing data transaction between the service provider and mediator. Security analysis and performance evaluation demonstrate that the proposed scheme is secure and efficient.
APA, Harvard, Vancouver, ISO, and other styles
20

Tariq, Muhammad Atiq Ur Rehman, Cheuk Yin Wai, and Nitin Muttil. "Vulnerability Assessment of Ubiquitous Cities Using the Analytic Hierarchy Process." Future Internet 12, no. 12 (December 21, 2020): 235. http://dx.doi.org/10.3390/fi12120235.

Full text
Abstract:
Urbanization is a challenge faced by most countries worldwide and leads to several problems. Due to rapid communication capabilities, conforming the megacities into Ubiquitous cities (U-cities) seems to be a potential solution to mitigate the problems caused by urbanization. Extensive reliance and dependencies of U-cities on information and communication technologies (ICTs) bring forth a new set of risks and vulnerabilities to these megacities. This research investigates the vulnerabilities of ICTs against man-made and natural hazards in a systematic way using the Analytic Hierarchy Process. The study identifies the vulnerabilities of different ICTs in U-cities and helps in improving the system’s resistivity against various hazards. The task is performed by evaluating the level of disruption on the different technologies and areas under the identified man-made and natural hazards. The research provides an insight into the working mechanisms of involved ICTs. It also helps to manage U-cities with more secure and sustainable services. The research identified that the new ICTs-based hazards have emerged and have become among the most influential hazards. The research has concluded that the vulnerabilities of U-cities are significantly different from that of conventional cities and need further studies to develop further understandings. The research recommends similar vulnerability studies for regional areas as well.
APA, Harvard, Vancouver, ISO, and other styles
21

Butpheng, Chanapha, Kuo-Hui Yeh, and Jia-Li Hou. "A Secure IoT and Cloud Computing-Enabled e-Health Management System." Security and Communication Networks 2022 (June 2, 2022): 1–14. http://dx.doi.org/10.1155/2022/5300253.

Full text
Abstract:
Utilization of the Internet of Things (IoT) technology is virtually ubiquitous across various life disciplines. When the IoT is integrated into e-health system to enable more real-time on-demand services, it brings significant convenience to the physicians and patients. However, the risk of encountering unreliable information and potential security threat is promptly raised at the same time. Therefore, in this research, we establish a secure IoT and cloud computing-enabled e-health management system in which a distinctive authentication scheme is adopted. The proposed system ensures all major security requirements, such as confidentiality, entity anonymity, repudiation tracking, data integrity, and innate resistance to man-in-the-middle, location spoofing, and replay attacks. Moreover, our system can effectively be executed on low-powered processing units and simultaneously guarantees greater security than historically available alternatives.
APA, Harvard, Vancouver, ISO, and other styles
22

Woon Lee, Sung, and Hyunsung Kim. "Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks." International journal of Computer Networks & Communications 13, no. 5 (September 30, 2021): 111–28. http://dx.doi.org/10.5121/ijcnc.2021.13507.

Full text
Abstract:
With the rapid development of mobile intelligent technologies and services, users can freely experience ubiquitous services in global mobility networks. It is necessary to provide authentications and protection to the privacy of mobile users. Until now, many authentication and privacy schemes were proposed. However, most of the schemes have been exposed to some security problems. Recently, Madhusudhan and Shashidhara (M&S) proposed a lightweight authentication scheme, denoted as the M&S scheme, for roaming services in global mobility networks. This paper shows that the M&S scheme has security flaws including two masquerading attacks and a mobile user trace attack. After that, we propose a privacypreserving authentication scheme for global mobility networks. The proposed scheme not only focused on the required security but also added privacy concerns focused on anonymity based on a dynamic pseudonym, which is based on exclusive-or operation, hash operation and symmetric key cryptography. Formal security analysis is performed based on Burrow-Abadi-Needdham (BAN) logic and the ProVerif tool, which concludes that the proposed scheme is secure. The analysis shows that the proposed authentication scheme is secure and provides privacy with a reasonable performance.
APA, Harvard, Vancouver, ISO, and other styles
23

Kwofie, A., and A. A. Barik. "Cloud Security: Using Advance Encryption Standard Algorithm to Secure Cloud Data at Client Side and Taking Measures to Protect its Secrecy." International Journal of Advance Research and Innovation 8, no. 3 (2020): 11–14. http://dx.doi.org/10.51976/ijari.832003.

Full text
Abstract:
Cloud computing brings a lot of advantages especially in ubiquitous services where everyone can access computer services through the internet. In spite of this, there are key security loop holes that is making users anxious about the safety of migrating to the cloud. This project uses the Advance Standard Encryption Standard Algorithm to encrypt user data at client side before transferring the data to the cloud thereby making encryption key available to only owners of the data. The project also uses Message Digest Algorithm to check for data integrity at client side to know if client’s data has been tempered. The project also employs key management technique and backup design to keep encryption keys safety at client side.
APA, Harvard, Vancouver, ISO, and other styles
24

Ejaz, Muneeb, Tanesh Kumar, Ivana Kovacevic, Mika Ylianttila, and Erkki Harjula. "Health-BlockEdge: Blockchain-Edge Framework for Reliable Low-Latency Digital Healthcare Applications." Sensors 21, no. 7 (April 3, 2021): 2502. http://dx.doi.org/10.3390/s21072502.

Full text
Abstract:
The rapid evolution of technology allows the healthcare sector to adopt intelligent, context-aware, secure, and ubiquitous healthcare services. Together with the global trend of an aging population, it has become highly important to propose value-creating, yet cost-efficient digital solutions for healthcare systems. These solutions should provide effective means of healthcare services in both the hospital and home care scenarios. In this paper, we focused on the latter case, where the goal was to provide easy-to-use, reliable, and secure remote monitoring and aid for elderly persons at their home. We proposed a framework to integrate the capabilities of edge computing and blockchain technology to address some of the key requirements of smart remote healthcare systems, such as long operating times, low cost, resilience to network problems, security, and trust in highly dynamic network conditions. In order to assess the feasibility of our approach, we evaluated the performance of our framework in terms of latency, power consumption, network utilization, and computational load, compared to a scenario where no blockchain was used.
APA, Harvard, Vancouver, ISO, and other styles
25

Basha.H, Anwar, S. Amrit Sai, Sanjnah A, and Srimathi M. "Cloud Computing: Secure Transmission of High Definition Videos Using Cryptographic Approach." International Journal of Engineering & Technology 7, no. 2.19 (April 17, 2018): 94. http://dx.doi.org/10.14419/ijet.v7i2.19.15057.

Full text
Abstract:
Cloud computing facilitates ubiquitous access to shared pool of configurable system resources and services over the Internet. Often due to shared access to this massive amount of data there is equal chances of risk. Transferring sensitive information in the form of text, audio or video, over the cloud one cannot guarantee the safety of the file. This paper assesses the effect of transmission of High Definition videos with the help of cloud-based servers that will improve the security of data being transmitted as well as enhance the quality of experience for end-users. We propose to share video contents to a selective group of people using the Time Domain Attribute based Access Control(TAAC) schema and generate keys using cryptographic method which gives the much needed protection to access these videos. Further stegnographic approaches are practised to maintain the data confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
26

Koppula, Sumanth, and Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.9420.

Full text
Abstract:
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.
APA, Harvard, Vancouver, ISO, and other styles
27

Koppula, Sumanth, and Jayabhaskar Muthukuru. "Secure Digital Signature Scheme Based on Elliptic Curves for Internet of Things." International Journal of Electrical and Computer Engineering (IJECE) 6, no. 3 (June 1, 2016): 1002. http://dx.doi.org/10.11591/ijece.v6i3.pp1002-1010.

Full text
Abstract:
Advances in the info and communication knowledge have led to the emergence of Internet of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing that it generates a broad range of services by interconnecting numerous devices and information objects. Throughout the interactions among the many ubiquitous things, security problems emerge as noteworthy, and it is significant to set up more suitable solution for security protection. Nonetheless, as loT devices have limited resource constraints to appoint strong protection mechanisms, they are vulnerable to sophisticated security attacks. For this reason, a sensible authentication mechanism that considers each useful resource constraints and safety is required. Our proposed scheme uses the standards of Elliptic Curve digital signature scheme and evaluates systematically the efficiency of our scheme and observes that our scheme with a smaller key size and lesser infrastructure performs on par with the prevailing schemes without compromising the security level.
APA, Harvard, Vancouver, ISO, and other styles
28

FITCH, DANIEL, and HAIPING XU. "A RAID-BASED SECURE AND FAULT-TOLERANT MODEL FOR CLOUD INFORMATION STORAGE." International Journal of Software Engineering and Knowledge Engineering 23, no. 05 (June 2013): 627–54. http://dx.doi.org/10.1142/s0218194013400111.

Full text
Abstract:
Cloud computing allows for access to ubiquitous data storage and powerful computing resources through the use of web services. There are major concerns, however, with data security, reliability, and availability in the cloud. In this paper, we address these concerns by introducing a novel security mechanism for secure and fault-tolerant cloud information storage. The information storage model follows the RAID (Redundant Array of Independent Disks) concept by considering cloud service providers as independent virtual disk drives. As such, the model utilizes multiple cloud service providers as a cloud cluster for information storage, and a service directory for management of the cloud clusters including service query, key management, and cluster restoration. Our approach not only supports maintaining the confidentiality of the stored data, but also ensures that the failure or compromise of an individual cloud provider in a cloud cluster will not result in a compromise of the overall data set. To ensure a correct design, we present a formal model of the security mechanism using hierarchical colored Petri nets (HCPN), and verify some key properties of the model using model checking techniques.
APA, Harvard, Vancouver, ISO, and other styles
29

Ullah, Insaf, Muhammad Asghar Khan, Ali Alkhalifah, Rosdiadee Nordin, Mohammed H. Alsharif, Abdulaziz H. Alghtani, and Ayman A. Aly. "A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications." Sustainability 13, no. 23 (November 28, 2021): 13184. http://dx.doi.org/10.3390/su132313184.

Full text
Abstract:
Thanks to recent advancements in biomedical sensors, wireless networking technologies, and information networks, traditional healthcare methods are evolving into a new healthcare infrastructure known as the Internet of Medical Things (IoMT). It enables patients in remote areas to obtain preventative or proactive healthcare services at a cheaper cost through the ease of time-independent interaction. Despite the many benefits of IoMT, the ubiquitously linked devices offer significant security and privacy concerns for patient data. In the literature, several multi-message and multi-receiver signcryption schemes have been proposed that use traditional public-key cryptography, identity-based cryptography, or certificateless cryptography methods to securely transfer patient health-related data from a variety of biomedical sensors to healthcare professionals. However, certificate management, key escrow, and key distribution are all complications with these methods. Furthermore, in terms of IoMT performance and privacy requirements, they are impractical. This article aims to include edge computing into an IoMT with secure deployment employing a multi-message and multi-receiver signcryption scheme to address these issues. In the proposed method, certificate-based signcryption and hyperelliptic curve cryptography (HECC) have been coupled for excellent performance and security. The cost study confirms that the proposed scheme is better than the existing schemes in terms of computational and communication costs.
APA, Harvard, Vancouver, ISO, and other styles
30

Mao, Jian, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, and Jianhong Zhang. "Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment." Security and Communication Networks 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/2948025.

Full text
Abstract:
With the increasing demand for ubiquitous connectivity, wireless technology has significantly improved our daily lives. Meanwhile, together with cloud-computing technology (e.g., cloud storage services and big data processing), new wireless networking technology becomes the foundation infrastructure of emerging communication networks. Particularly, cloud storage has been widely used in services, such as data outsourcing and resource sharing, among the heterogeneous wireless environments because of its convenience, low cost, and flexibility. However, users/clients lose the physical control of their data after outsourcing. Consequently, ensuring the integrity of the outsourced data becomes an important security requirement of cloud storage applications. In this paper, we present Co-Check, a collaborative multicloud data integrity audition scheme, which is based on BLS (Boneh-Lynn-Shacham) signature and homomorphic tags. According to the proposed scheme, clients can audit their outsourced data in a one-round challenge-response interaction with low performance overhead. Our scheme also supports dynamic data maintenance. The theoretical analysis and experiment results illustrate that our scheme is provably secure and efficient.
APA, Harvard, Vancouver, ISO, and other styles
31

Jeong, Young-Sik, Jae Dong Lee, Jeong-Bae Lee, Jai-Jin Jung, and Jong Hyuk Park. "An Efficient and Securem-IPS Scheme of Mobile Devices for Human-Centric Computing." Journal of Applied Mathematics 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/198580.

Full text
Abstract:
Recent rapid developments in wireless and mobile IT technologies have led to their application in many real-life areas, such as disasters, home networks, mobile social networks, medical services, industry, schools, and the military. Business/work environments have become wire/wireless, integrated with wireless networks. Although the increase in the use of mobile devices that can use wireless networks increases work efficiency and provides greater convenience, wireless access to networks represents a security threat. Currently, wireless intrusion prevention systems (IPSs) are used to prevent wireless security threats. However, these are not an ideal security measure for businesses that utilize mobile devices because they do not take account of temporal-spatial and role information factors. Therefore, in this paper, an efficient and secure mobile-IPS (m-IPS) is proposed for businesses utilizing mobile devices in mobile environments for human-centric computing. Them-IPS system incorporates temporal-spatial awareness in human-centric computing with various mobile devices and checks users’ temporal spatial information, profiles, and role information to provide precise access control. And it also can extend application ofm-IPS to the Internet of things (IoT), which is one of the important advanced technologies for supporting human-centric computing environment completely, for real ubiquitous field with mobile devices.
APA, Harvard, Vancouver, ISO, and other styles
32

Kim, Semin, Hyung-Jin Mun, and Sunghyuck Hong. "Multi-Factor Authentication with Randomly Selected Authentication Methods with DID on a Random Terminal." Applied Sciences 12, no. 5 (February 22, 2022): 2301. http://dx.doi.org/10.3390/app12052301.

Full text
Abstract:
Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user authentication by entering an ID and password is likely to leak sensitive information if the server is attacked or keylogged. Therefore, multi-level authentication is needed to prevent server attacks or keylogging. Methods: Biometric authentication technology has been utilized by smartphones, but it is challenging to apply in the case of a lost device because the central server does not manage biometric data. Encrypting transactions through blockchain technology makes data management more secure because blockchain technology is distributed, and there is no primary target for hackers. Results: The method proposed in this study can become a basis for an authentication method that guarantees both security and integrity due to the synergetic use of biometric and blockchain technologies. Conclusions: The information stored in the service provider does not include sensitive information such as the user’s biometric data but is only a means of verifying the user’s information in the blockchain transaction with guaranteed anonymity. Therefore, users can receive services with confidence and safety.
APA, Harvard, Vancouver, ISO, and other styles
33

Le, Tuan-Vinh. "Cross-Server End-to-End Patient Key Agreement Protocol for DNA-Based U-Healthcare in the Internet of Living Things." Mathematics 11, no. 7 (March 28, 2023): 1638. http://dx.doi.org/10.3390/math11071638.

Full text
Abstract:
(1) Background: Third-generation sequencing (TGS) technique directly sequences single deoxyribonucleic acid (DNA) molecules, enabling real-time sequencing and reducing sequencing time from a few days to a few hours. Sequencing devices can be miniaturized and DNA-reading sensors placed on the body to monitor human health and vital signs, building an “internet of living things” (IoLT) facilitating ubiquitous healthcare services. In many cases, patients may wish to directly connect to each other for purposes of sharing real-time sequencing data, medical status or trading genomic data, etc. (2) Problems: User registration for a specific service may be limited due to some reason. Registering for multiple redundant services would also result in wasted money and possible wasteful communication overhead. In addition, since medical data and health information are very sensitive, security and privacy issues in the network are of paramount importance. (3) Methods: In this article, I propose a cross-server end-to-end (CS-E2E) patient authenticated key agreement protocol for DNA-based healthcare services in IoLT networks. My work allows two patients to mutually authenticate each other through assistance of respective servers, so that they can establish a reliable shared session key for securing E2E communications. The design employs multiple cost-saving solutions and robust cryptographic primitives, including smart-card-based single sign-on, elliptic curve cryptography, biohash function, etc. (4) Results: My proposed protocol is proven to be secure against various attacks and to incur reasonable communication cost compared to its predecessor works. The protocol also provides the support for more security properties and better functionalities. (5) Conclusions: The E2E communications between the patients are properly protected using the proposed approach. This assures a secure and efficient cross-server patient conversation for multiple purposes of healthcare communication.
APA, Harvard, Vancouver, ISO, and other styles
34

Yu, Binbin, and Hongtu Li. "Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things." International Journal of Distributed Sensor Networks 15, no. 9 (September 2019): 155014771987937. http://dx.doi.org/10.1177/1550147719879379.

Full text
Abstract:
Home-based multi-sensor Internet of Things, as a typical application of Internet of Things, interconnects a variety of intelligent sensor devices and appliances to provide intelligent services to individuals in a ubiquitous way. As families become more and more intelligent, complex, and technology-dependent, there is less and less need for human intervention. Recently, many security attacks have shown that Internet home-based Internet of Things have become a vulnerable target, leading to personal privacy problems. For example, eavesdroppers can acquire the identity of specific devices or sensors through public channels, which is not secure, to infer individual public life in the home area network. Authentication is the essential portion of many secure systems processing of verifying and declaring identity. Before providing confidential information, home-based-Internet of Things service authenticates users and devices. The communication and processing capabilities of intelligent devices are limited. Therefore, in home-based Internet of Things, lightweight authentication and key agreement technology are very important to resist known attacks. This article proposes an anonymous authenticated key agreement protocol using pairing-based cryptography. The protocol proposed in this article provides lightweight computation and ensures the security of communication between home-based multi-sensor Internet of Things network and Internet network.
APA, Harvard, Vancouver, ISO, and other styles
35

Shuai, Mengxia, Bin Liu, Nenghai Yu, and Ling Xiong. "Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks." Security and Communication Networks 2019 (June 2, 2019): 1–14. http://dx.doi.org/10.1155/2019/8145087.

Full text
Abstract:
On-body wireless networks (oBWNs) play a crucial role in improving the ubiquitous healthcare services. Using oBWNs, the vital physiological information of the patient can be gathered from the wearable sensor nodes and accessed by the authorized user like the health professional or the doctor. Since the open nature of wireless communication and the sensitivity of physiological information, secure communication has always been the vital issue in oBWNs-based systems. In recent years, several authentication schemes have been proposed for remote patient monitoring. However, most of these schemes are so susceptible to security threats and not suitable for practical use. Specifically, all these schemes using lightweight cryptographic primitives fail to provide forward secrecy and suffer from the desynchronization attack. To overcome the historical security problems, in this paper, we present a lightweight and secure three-factor authentication scheme for remote patient monitoring using oBWNs. The proposed scheme adopts one-time hash chain technique to ensure forward secrecy, and the pseudonym identity method is employed to provide user anonymity and resist against desynchronization attack. The formal and informal security analyses demonstrate that the proposed scheme not only overcomes the security weaknesses in previous schemes but also provides more excellent security and functional features. The comparisons with six state-of-the-art schemes indicate that the proposed scheme is practical with acceptable computational and communication efficiency.
APA, Harvard, Vancouver, ISO, and other styles
36

Dootio, Mazhar Ali, Abdullah Lakhan, Ali Hassan Sodhro, Tor Morten Groenli, Narmeen Zakaria Bawany, and Samrat Kumar. "Secure and failure hybrid delay enabled a lightweight RPC and SHDS schemes in Industry 4.0 aware IIoHT enabled fog computing." Mathematical Biosciences and Engineering 19, no. 1 (2021): 513–36. http://dx.doi.org/10.3934/mbe.2022024.

Full text
Abstract:
<abstract><p>These days, the Industrial Internet of Healthcare Things (IIT) enabled applications have been growing progressively in practice. These applications are ubiquitous and run onto the different computing nodes for healthcare goals. The applications have these tasks such as online healthcare monitoring, live heartbeat streaming, and blood pressure monitoring and need a lot of resources for execution. In IIoHT, remote procedure call (RPC) mechanism-based applications have been widely designed with the network and computational delay constraints to run healthcare applications. However, there are many requirements of IIoHT applications such as security, network and computation, and failure efficient RPC with optimizing the quality of services of applications. In this study, the work devised the lightweight RPC mechanism for IIoHT applications and considered the hybrid constraints in the system. The study suggests the secure hybrid delay scheme (SHDS), which schedules all healthcare workloads under their deadlines. For the scheduling problem, the study formulated this problem based on linear integer programming, where all constraints are integer, as shown in the mathematical model. Simulation results show that the proposed SHDS scheme and lightweight RPC outperformed the hybrid for IIoHT applications and minimized 50% delays compared to existing RPC and their schemes.</p></abstract>
APA, Harvard, Vancouver, ISO, and other styles
37

Sazu, Mesbaul, and Sakila Jahan. "How Big Data Analytics is transforming the finance industry." Bankarstvo 51, no. 2 (2022): 147–72. http://dx.doi.org/10.5937/bankarstvo2202147h.

Full text
Abstract:
The data revolution happening throughout the world has brought transformation in the financial services sector. This vast information has opened doors to understanding the needs of the customers, finding insights, and lowering risks. In addition, it helps the financial services industry to take actions to improve clients' satisfaction at a faster rate than it was previously possible. Financial firms can develop new insights using BD because they can now collect a large volume of data about their customers, their spending pattern, and provide services that are beneficial, convenient, and quick for the customers. They can expand the use of those insights not only for their consumers but also for their internal process optimization, benefiting everyone in the process. While the impact of BDA on financial service companies is ubiquitous, not so many studies have been published to understand which aspects of the financial services industry could greatly benefit from the rise of technology and BDA. Few published studies address the challenges faced by banks in this technology era if they do not have BD tools implemented. This research covers data from banks from January 2019 to January 2022 to address that gap of a several banks from America and Europe that faced declining customer satisfaction. It uncovers the best methods used by financial firms globally to implement BDA to improve the services. This paper will also look at how BDA has been successfully used in the banking industry, regarding the following elements: consumer behavior, channels use, consumer spending pattern and profile creation, product cross-selling based upon user-profiling, analysis of feedback and sentiment, management of secure transactions, and fraud etc. This study helps find out and makes contributions on how the financial services industry, such as banks, could leverage BDA and provide superior services. Further research could be conducted across other players in the finance industry to learn about how they are impacted by the BDA.
APA, Harvard, Vancouver, ISO, and other styles
38

Nawaz, Anum, Jorge Peña Queralta, Jixin Guan, Muhammad Awais, Tuan Nguyen Gia, Ali Kashif Bashir, Haibin Kan, and Tomi Westerlund. "Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain." Sensors 20, no. 14 (July 16, 2020): 3965. http://dx.doi.org/10.3390/s20143965.

Full text
Abstract:
With an increasing penetration of ubiquitous connectivity, the amount of data describing the actions of end-users has been increasing dramatically, both within the domain of the Internet of Things (IoT) and other smart devices. This has led to more awareness of users in terms of protecting personal data. Within the IoT, there is a growing number of peer-to-peer (P2P) transactions, increasing the exposure to security vulnerabilities, and the risk of cyberattacks. Blockchain technology has been explored as middleware in P2P transactions, but existing solutions have mainly focused on providing a safe environment for data trade without considering potential changes in interaction topologies. we present EdgeBoT, a proof-of-concept smart contracts based platform for the IoT built on top of the ethereum blockchain. With the Blockchain of Things (BoT) at the edge of the network, EdgeBoT enables a wider variety of interaction topologies between nodes in the network and external services while guaranteeing ownership of data and end users’ privacy. in EdgeBoT, edge devices trade their data directly with third parties and without the need of intermediaries. This opens the door to new interaction modalities, in which data producers at the edge grant access to batches of their data to different third parties. Leveraging the immutability properties of blockchains, together with the distributed nature of smart contracts, data owners can audit and are aware of all transactions that have occurred with their data. we report initial results demonstrating the potential of EdgeBoT within the IoT. we show that integrating our solutions on top of existing IoT systems has a relatively small footprint in terms of computational resource usage, but a significant impact on the protection of data ownership and management of data trade.
APA, Harvard, Vancouver, ISO, and other styles
39

Khalfaoui, Sameh, Jean Leneutre, Arthur Villard, Jingxuan Ma, and Pascal Urien. "Security Analysis of Out-of-Band Device Pairing Protocols: A Survey." Wireless Communications and Mobile Computing 2021 (January 28, 2021): 1–30. http://dx.doi.org/10.1155/2021/8887472.

Full text
Abstract:
Numerous secure device pairing (SDP) protocols have been proposed to establish a secure communication between unidentified IoT devices that have no preshared security parameters due to the scalability requirements imposed by the ubiquitous nature of the IoT devices. In order to provide the most user-friendly IoT services, the usability assessment has become the main requirement. Thus, the complete security analysis has been replaced by a sketch of a proof to partially validate the robustness of the proposal. The few existing formal or computational security verifications on the SDP schemes have been conducted based on the assessment of a wide variety of uniquely defined security properties. Therefore, the security comparison between these protocols is not feasible and there is a lack of a unified security analysis framework to assess these pairing techniques. In this paper, we survey a selection of secure device pairing proposals that have been formally or computationally verified. We present a systematic description of the protocol assumptions, the adopted verification model, and an assessment of the verification results. In addition, we normalize the used taxonomy in order to enhance the understanding of these security validations. Furthermore, we refine the adversary capabilities on the out-of-band channel by redefining the replay capability and by introducing a new notion of delay that is dependent on the protocol structure that is more adequate for the ad hoc pairing context. Also, we propose a classification of a number of out-of-band channels based on their security properties and under our refined adversary model. Our work motivates the future SDP protocol designer to conduct a formal or a computational security assessment to allow the comparability between these pairing techniques. Furthermore, it provides a realistic abstraction of the adversary capabilities on the out-of-band channel which improves the modeling of their security characteristics in the protocol verification tools.
APA, Harvard, Vancouver, ISO, and other styles
40

Zomignani Barboza, Júlia, and Paul De Hert. "Data Protection Impact Assessment: A Protection Tool for Migrants Using ICT Solutions." Social Sciences 10, no. 12 (December 6, 2021): 466. http://dx.doi.org/10.3390/socsci10120466.

Full text
Abstract:
Smart devices have become ubiquitous in everyday life, and it is commonplace that migrants are among the users of connected tools. With the realization that migrants rely on connectivity for multiple purposes, including to access information and services, many initiatives started working on developing ICT tools to assist migrants to integrate into their new society. Technological tools, however, come with inherent risks, many of which are linked to the processing of personal data of their users. This is especially true for migrants, who are often vulnerable due to their migration status, which is not always secure in the host country. To mitigate these risks, we argue that an expanded data protection impact assessment, analyzing not only the impacts related to data protection, but also to the specific situation of migrants, should be conducted at the outset of any technology development project to influence the development of safe and reliable ICT tools for this target population. A practical example of the application of such an assessment is provided, based on the authors’ experience as legal advisors in the REBUILD project, which is one of the current initiatives in the EU aiming to develop ICT tools for migrant integration.
APA, Harvard, Vancouver, ISO, and other styles
41

Rathod, Tejal, Nilesh Kumar Jadav, Sudeep Tanwar, Ravi Sharma, Amr Tolba, Maria Simona Raboaca, Verdes Marina, and Wael Said. "Blockchain-Driven Intelligent Scheme for IoT-Based Public Safety System beyond 5G Networks." Sensors 23, no. 2 (January 14, 2023): 969. http://dx.doi.org/10.3390/s23020969.

Full text
Abstract:
Mobile applications have rapidly grown over the past few decades to offer futuristic applications, such as autonomous vehicles, smart farming, and smart city. Such applications require ubiquitous, real-time, and secure communications to deliver services quickly. Toward this aim, sixth-generation (6G) wireless technology offers superior performance with high reliability, enhanced transmission rate, and low latency. However, managing the resources of the aforementioned applications is highly complex in the precarious network. An adversary can perform various network-related attacks (i.e., data injection or modification) to jeopardize the regular operation of the smart applications. Therefore, incorporating blockchain technology in the smart application can be a prominent solution to tackle security, reliability, and data-sharing privacy concerns. Motivated by the same, we presented a case study on public safety applications that utilizes the essential characteristics of artificial intelligence (AI), blockchain, and a 6G network to handle data integrity attacks on the crime data. The case study is assessed using various performance parameters by considering blockchain scalability, packet drop ratio, and training accuracy. Lastly, we explored different research challenges of adopting blockchain in the 6G wireless network.
APA, Harvard, Vancouver, ISO, and other styles
42

Dr. Pasumponpandian. "Development of Secure Cloud Based Storage Using the Elgamal Hyper Elliptic Curve Cryptography with Fuzzy Logic Based Integer Selection." Journal of Soft Computing Paradigm 2, no. 1 (March 15, 2020): 24–35. http://dx.doi.org/10.36548/jscp.2020.1.003.

Full text
Abstract:
The technological advancements in the field of the information and communication technology led to the development of more promising cloud paradigm that allows online provision of services such as platform, software and infrastructure. The infrastructure services provided by the cloud allows the user data to be stored and accessed ubiquitously unlike the arrays that are available on the premises. However the security of the data that are being stored in the internet are still under research. This remains as major inhibitor for the adoption of cloud service in spite of its reliability, elasticity, high computational capabilities and the pay as you go possibilities. So the paper puts forth the construction of a secure storage as service in the cloud computing by utilizing the cryptography system based on Elgamal. The proposed method encrypts the data to be stored using the Elgamal that incorporates the hyper elliptic curve cryptography for twofold encryption and further utilizes the fuzzy logic to perform the integer selection that serves as the significant attribute in defining the cloud storage security. The point addition and the double based ECC is used for generating the keys for the hyper elliptic curve cryptography. The twofold security model put forth is validated using the MATLAB on the terms of efficiency observed on securing the data stored in cloud as well as the cost and the execution time endured by the proposed twofold security. The results shows that the protection offered by the twofold security is much better compared to the prevailing.
APA, Harvard, Vancouver, ISO, and other styles
43

Díaz-Sánchez, Daniel, Andrés Marín-Lopez, Florina Almenárez Mendoza, and Patricia Arias Cabarcos. "DNS/DANE Collision-Based Distributed and Dynamic Authentication for Microservices in IoT †." Sensors 19, no. 15 (July 26, 2019): 3292. http://dx.doi.org/10.3390/s19153292.

Full text
Abstract:
IoT devices provide real-time data to a rich ecosystem of services and applications. The volume of data and the involved subscribe/notify signaling will likely become a challenge also for access and core networks. To alleviate the core of the network, other technologies like fog computing can be used. On the security side, designers of IoT low-cost devices and applications often reuse old versions of development frameworks and software components that contain vulnerabilities. Many server applications today are designed using microservice architectures where components are easier to update. Thus, IoT can benefit from deploying microservices in the fog as it offers the required flexibility for the main players of ubiquitous computing: nomadic users. In such deployments, IoT devices need the dynamic instantiation of microservices. IoT microservices require certificates so they can be accessed securely. Thus, every microservice instance may require a newly-created domain name and a certificate. The DNS-based Authentication of Named Entities (DANE) extension to Domain Name System Security Extensions (DNSSEC) allows linking a certificate to a given domain name. Thus, the combination of DNSSEC and DANE provides microservices’ clients with secure information regarding the domain name, IP address, and server certificate of a given microservice. However, IoT microservices may be short-lived since devices can move from one local fog to another, forcing DNSSEC servers to sign zones whenever new changes occur. Considering DNSSEC and DANE were designed to cope with static services, coping with IoT dynamic microservice instantiation can throttle the scalability in the fog. To overcome this limitation, this article proposes a solution that modifies the DNSSEC/DANE signature mechanism using chameleon signatures and defining a new soft delegation scheme. Chameleon signatures are signatures computed over a chameleon hash, which have a property: a secret trapdoor function can be used to compute collisions to the hash. Since the hash is maintained, the signature does not have to be computed again. In the soft delegation schema, DNS servers obtain a trapdoor that allows performing changes in a constrained zone without affecting normal DNS operation. In this way, a server can receive this soft delegation and modify the DNS zone to cope with frequent changes such as microservice dynamic instantiation. Changes in the soft delegated zone are much faster and do not require the intervention of the DNS primary servers of the zone.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhao, Dawei, Haipeng Peng, Lixiang Li, Yixian Yang, and Shudong Li. "An Efficient Patch Dissemination Strategy for Mobile Networks." Mathematical Problems in Engineering 2013 (2013): 1–13. http://dx.doi.org/10.1155/2013/896187.

Full text
Abstract:
Mobile phones and personal digital assistants are becoming increasingly important in our daily life since they enable us to access a large variety of ubiquitous services. Mobile networks, formed by the connection of mobile devices following some relationships among mobile users, provide good platforms for mobile virus spread. Quick and efficient security patch dissemination strategy is necessary for the update of antivirus software so that it can detect mobile virus, especially the new virus under the wireless mobile network environment with limited bandwidth which is also large scale, decentralized, dynamically evolving, and of unknown network topology. In this paper, we propose an efficient semi autonomy-oriented computing (SAOC) based patch dissemination strategy to restrain the mobile virus. In this strategy, some entities are deployed in a mobile network to search for mobile devices according to some specific rules and with the assistance of a center. Through experiments involving both real-world networks and dynamically evolving networks, we demonstrate that the proposed strategy can effectively send security patches to as many mobile devices as possible at a considerable speed and lower cost in the mobile network. It is a reasonable, effective, and secure method to reduce the damages mobile viruses may cause.
APA, Harvard, Vancouver, ISO, and other styles
45

Farooq, Muhammad Shoaib, Shamyla Riaz, Rabia Tehseen, Uzma Farooq, and Khalid Saleem. "Role of Internet of things in diabetes healthcare: Network infrastructure, taxonomy, challenges, and security model." DIGITAL HEALTH 9 (January 2023): 205520762311790. http://dx.doi.org/10.1177/20552076231179056.

Full text
Abstract:
The Internet of things (IoT) is an emerging technology that enables ubiquitous devices to connect with the Internet. IoT technology has revolutionized the medical and healthcare industry by interconnecting smart devices and sensors. IoT-based devices and biosensors are ideal to detect diabetes disease by collecting the accurate value of glucose continuously. Diabetes is one of the well-known and major chronic diseases that has a worldwide social impact on community life. Blood glucose monitoring is a challenging task, and there is a need to propose a proper architecture of the noninvasive glucose sensing and monitoring mechanism, which could make diabetic people aware of self-management techniques. This survey presents a rigorous discussion of diabetes types and presents detection techniques based on IoT technology. In this research, an IoT-based healthcare network infrastructure has been proposed for monitoring diabetes disease based on big data analytics, cloud computing, and machine learning. The proposed infrastructure could handle the symptoms of diabetes, collect data, analyze it, and then transmit the results to the server for the next action. Besides, presented an inclusive survey on IoT-based diabetes monitoring applications, services, and proposed solutions. Furthermore, based on IoT technology the diabetes disease management taxonomy has also been presented. Finally, presented the attacks taxonomy as well as discussed challenges, and proposed a lightweight security model in order to secure the patient's health data.
APA, Harvard, Vancouver, ISO, and other styles
46

Orucho, Daniel Okari, Fredrick Mzee Awuor, Ratemo Makiya, and Collins Oduor. "An Enhanced Data Transmission in Mobile Banking Using LSB-AES Algorithm." Asian Journal of Research in Computer Science 16, no. 1 (June 3, 2023): 43–56. http://dx.doi.org/10.9734/ajrcos/2023/v16i1334.

Full text
Abstract:
The advent of mobile banking applications has transformed the way customers’ access banking services from brick-and-mortar to remote banking. The ubiquitous nature of this innovation has encouraged its adoption. This is because of improved banking services and accessibility to the services on a 24/7 basis using the internet. However, mobile banking applications are susceptible to numerous security threats and vulnerabilities that adversaries take advantage of to siphon money from bank customers. The aim of this study is to design and evaluate least significant bit and advanced encryption standard cryptography (LSB-AES) hybrid algorithm to protect data on transmission in mobile banking. This study employs data science research design, and performance evaluations demonstrated through simulations using MATLAB. Findings of this study can be applied to banks offering mobile banking across the world. This study utilized six color images from University of Southern California’s Signal and Image Processing Institute (USC-SIPI) dataset which were stored in Tagged Image File Format (TIFF). Contemporary steganographic systems utilize a minimum of 2 to 10 images for test simulations. Visual quality analysis of cover images and stego images was done using the following evaluation metrics: Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), and histogram analysis. Security of the proposed algorithm was done using entropy analysis. MSE values of cover and stego images should be closer to zero and indicate that cover image is of good quality for embedding data. On the other hand, PSNR values should be more than 40 decibel (dB) which indicates good imperceptibility. Histogram analysis should demonstrate no visible distortions between the cover and stego image for it to be free from statistical attacks. Entropy analysis should yield values close to 8 for the algorithm to be robust. Results from the proposed LSB-AES hybrid algorithm evaluation metrics reveals that Mean Squared Error (MSE) values ranges from 0.0001297 to 0.0005646 while Peak Signal-to-Noise Ratio (PSNR) values ranges from 80.65 to 87.71 and entropy values ranges from 6.295 to 7.762. Histogram analysis reveals that the cover and stego images are almost similar. These results infer that the proposed algorithm has good quality images with good imperceptibility and that the proposed algorithm is reliable, robust and secure for mobile banking. Entropy and histogram analysis results show that the proposed algorithm is resistant to Man-in-the-Middle attacks. This study recommends that legislation evaluates and amends security of mobile banking policies so that the proposed LSB-AES hybrid algorithm can be adopted as a secure solution for mobile banking.
APA, Harvard, Vancouver, ISO, and other styles
47

Shetty, Sharan, and Sarala Mary. "Cloud Drops Technology Application in Cloud Computing." Research & Review: Machine Learning and Cloud Computing 1, no. 2 (July 1, 2022): 34–38. http://dx.doi.org/10.46610/rrmlcc.2022.v01i02.006.

Full text
Abstract:
The phrase "cloud computing" refers to any activities connected with the delivery of hosted services through the Internet. The term "cloud computing" is frequently used to describe data centers that are accessible to many people online. Drops for efficient and secure data dissemination and duplication in the cloud. Technology called Cloud Drop is about cloud data protection, e.g., users have concerns about security when extracting their external sources data on external administrative management. Loss of data can be caused by attacks on other users and nodes in the cloud. Cloud Drops is a ubiquitous awareness platform that closely integrates visual information from Webs have entered the visual contexts that we live in and work. Cloud Drops has a variety of interactive features, including stamp-like advertisements that each displays a small amount of digital data. Numerous screens and their little size enable the user to use the flexible tool, rearrange it reset their information status. We show different forms of forms on stamped screens, bring up the idea of ​​the device and the original use. We suggest light strategies and consultation familiar with small phone form. We to provide ways for tying these parts to the information the user wants to maintain, such as contacts, locations, and websites. To show platform functionality, we present a specific program example. User research provides initial information on the usage of cloud removal by users to give a customized one-information environment advertisements stored throughout the site location of buildings.
APA, Harvard, Vancouver, ISO, and other styles
48

Lee, Kyuin, Yucheng Yang, Omkar Prabhune, Aishwarya Lekshmi Chithra, Jack West, Kassem Fawaz, Neil Klingensmith, Suman Banerjee, and Younghyun Kim. "AEROKEY." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 1 (March 29, 2022): 1–29. http://dx.doi.org/10.1145/3517254.

Full text
Abstract:
Wireless connectivity is becoming common in increasingly diverse personal devices, enabling various interoperation- and Internet-based applications and services. More and more interconnected devices are simultaneously operated by a single user with short-lived connections, making usable device authentication methods imperative to ensure both high security and seamless user experience. Unfortunately, current authentication methods that heavily require human involvement, in addition to form factor and mobility constraints, make this balance hard to achieve, often forcing users to choose between security and convenience. In this work, we present a novel over-the-air device authentication scheme named AEROKEY that achieves both high security and high usability. With virtually no hardware overhead, AEROKEY leverages ubiquitously observable ambient electromagnetic radiation to autonomously generate spatiotemporally unique secret that can be derived only by devices that are closely located to each other. Devices can make use of this unique secret to form the basis of a symmetric key, making the authentication procedure more practical, secure and usable with no active human involvement. We propose and implement essential techniques to overcome challenges in realizing AEROKEY on low-cost microcontroller units, such as poor time synchronization, lack of precision analog front-end, and inconsistent sampling rates. Our real-world experiments demonstrate reliable authentication as well as its robustness against various realistic adversaries with low equal-error rates of 3.4% or less and usable authentication time of as low as 24 s.
APA, Harvard, Vancouver, ISO, and other styles
49

Stukalenko, Elena. "Risks of the Digitalization of Life of the Population and Ways of Decreasing Them." Ideas and Ideals 13, no. 4-1 (December 27, 2021): 180–203. http://dx.doi.org/10.17212/2075-0862-2021-13.4.1-180-203.

Full text
Abstract:
Digital technologies, ubiquitous in our daily life, have radically changed the way we work, communicate, and consume in a short period of time. They affect all components of quality of life: well-being, work, health, education, social connections, environmental quality, the ability to participate and govern civil society, and so on. Digital transformation creates both opportunities and serious risks to the well-being of people. Researchers and statistical agencies around the world are facing a major challenge to develop new tools to analyze the impact of digital transformation on the well-being of the population. The risks are very diverse in nature and it is very difficult to identify the key factor. All researchers conclude that secure digital technologies significantly improve the lives of those who have the skills to use them and pose a serious risk of inequality for society, as they introduce a digital divide between those who have the skills to use them and those who do not. In the article, the author examines the risks created by digital technologies for some components of the quality of life (digital component of the quality of life), which are six main components: the digital quality of the population, providing the population with digital benefits, the labor market in the digital economy, the impact of digitalization on the social sphere, state electronic services for the population and the security of information activities. The study was carried out on the basis of the available statistical base and the results of research by scientists from different countries of the world. The risks of the digital economy cannot be ignored when pursuing state social policy. Attention is paid to government regulation aimed at reducing the negative consequences of digitalization through the prism of national, federal projects and other events.
APA, Harvard, Vancouver, ISO, and other styles
50

He, Changyang, Lu He, Zhicong Lu, and Bo Li. ""I Have to Use My Son's QR Code to Run the Business": Unpacking Senior Street Vendors' Challenges in Mobile Money Collection in China." Proceedings of the ACM on Human-Computer Interaction 7, CSCW1 (April 14, 2023): 1–28. http://dx.doi.org/10.1145/3579493.

Full text
Abstract:
Mobile payment systems have become an infrastructural component in citizens' socio-economic life in China. The rapid shift to a cashless society demands vendors of all ages to quickly adapt themselves to the ubiquitous mobile payment era. However, how this trend may impact senior vendors, a group that typically uses less technology, remains unknown despite its significance in inclusive mobile payment design. This work aims to address this gap by investigating the challenges and strategies of senior vendors in mobile payment adoption. Particularly, we focus on a traditional low-resource setting with a large volume of senior vendors: street vending. We conduct a qualitative study incorporating field observations on 33 senior street vendors and semi-structured interviews with 15 of them (aged 53-78), and take Moneywork as an analytical lens to unpack their challenges in physical and social interactions. We find that senior street vendors are a group passively adopting mobile payments due to business requirements instead of recognizing their advantages. Vendors with relatively low digital literacy have to take an alternative method - using family members' QR codes - to run the business as family-dependent money receivers. With limited considerations for senior vendors' situational vulnerabilities, unexpected difficulties of payment confirmation emerge during transactions, such as reduced confirmation efficacy under noisy surroundings and degraded hearing. Transaction security issues also appear when mobile payment-based frauds target both confirmation interfaces (e.g., fake sounds of successful payment) and trust systems (e.g., showing half-done proof to flee without paying) in street vending. Finally, we raise a less visible yet critical concern of family-dependent vendors on the lost money freedom when their income flows into their families' wallets. We propose design implications for mobile payment systems to support more secure, efficient and accessible money collection services to underrepresented groups.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography