Journal articles on the topic 'Trust enhanced security architecture for the MANET'

To see the other types of publications on this topic, follow the link: Trust enhanced security architecture for the MANET.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 38 journal articles for your research on the topic 'Trust enhanced security architecture for the MANET.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Yamparala, Rajesh, and Sankara Narayanan Selvaraj Pandian. "A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS." Ingénierie des systèmes d information 27, no. 5 (October 31, 2022): 757–65. http://dx.doi.org/10.18280/isi.270508.

Full text
Abstract:
A Mobile Ad-Hoc Network (MANET) is a self-configuring network that provides temporary connections to several wireless nodes. Trust mechanisms are employed in routing protocols to quickly locate a safe path. Because of its openness and complexity, MANET can be attacked in a number of ways. To begin mitigating potential security risks, a number of different cryptographic key generation strategies are explored. A key management system for MANET security is available with different encryption techniques. Identity with Trust Level based Cryptography Model (ITLCM) is used to generate multiple keys and distribute these to particular targets. At this stage, key management protocols are essential to any secure group architecture of communication. Because of its dynamic topology which extensively affects its application, the multi key management is an essential task. When compared to more conventional methods of protecting a network, MANET security is entirely novel. Security routing protocol implementation is difficult since it requires the production and distribution of multiple keys. To provide both connection and message protection without relying on third parties, the Neighbor Trust Weight based Routing Model (NTWRM) is designed. In the proposed model, a trusted node is selected to monitor all of the nodes in the routing process to create a stable multi-key distribution environment that enhances MANET performance. In comparison with traditional methods, the proposed model shows that its findings are better than the existing ones.
APA, Harvard, Vancouver, ISO, and other styles
2

Filipek, Jozef, and Ladislav Hudec. "Security architecture for the mobile ad hoc networks." Journal of Electrical Engineering 69, no. 3 (June 1, 2018): 198–204. http://dx.doi.org/10.2478/jee-2018-0026.

Full text
Abstract:
Abstract Security in mobile ad hoc networks (MANETs) has been an actively researched topic for the several years. As opposed to wired networks, MANETs have dynamic topology, limited resources, limited bandwidth and are usually deployed in emergency scenarios outside, where landscape plays important role. MANETs are susceptible to insider and outsider attacks and bring new security challenges which were not present in the wired networks. The most important difference is that every node in MANET acts as a router and routes traffic throughout the network. Compromising one node can hugely affect network performance. In this paper, we present our security architecture for MANETs which secures important aspects of the network. We bring trust model into the network and nodes are secured by different mechanisms tailored specifically for the use in distributed environment. We use Omnet++for network simulations. Simulations use delays measured on the real hardware and we analyze performance of the network during different data plane and control plane loads
APA, Harvard, Vancouver, ISO, and other styles
3

Lin, Ching, and Vijay Varadharajan. "MobileTrust: a trust enhanced security architecture for mobile agent systems." International Journal of Information Security 9, no. 3 (December 11, 2009): 153–78. http://dx.doi.org/10.1007/s10207-009-0098-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumar, R. Sathish, A. Akthar unissa, S. Koperundevi, and S. Suganthi. "Enhanced Trust Based Architecture in MANET using AODV Protocol to Eliminate Packet Dropping Attacks." International Journal of Engineering Trends and Technology 34, no. 1 (April 25, 2016): 21–27. http://dx.doi.org/10.14445/22315381/ijett-v34p204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Musthafa, Mohamed. "AN ENHANCED LID ROUTING SECURITY SCHEME FOR MOBILE AD-HOC NETWORKS." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 11 (June 16, 2016): 4549–56. http://dx.doi.org/10.24297/jac.v12i11.821.

Full text
Abstract:
In this work we present novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the cluster heads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network. We also proposing a special security routing architecture called Local Intrusion Detection (LID) to detect Black Hole Attack (BHA) over Ad hoc On Demand Distance Vector (AODV) MANET routing protocol. In LID security routing mechanism, the intrusion detection is performed locally using the previous node of the attacker node instead of performing the intrusion detection via the source node as in Source Intrusion Detection (SID) security routing mechanism. By performing LID security routing mechanism, the security mechanism overhead would be decreased.
APA, Harvard, Vancouver, ISO, and other styles
6

Begum, Shifana, Megha M. Gamskar, and Prakrithi Mogasale. "Security of Data with Enhanced Technique of AASR Protocol for Secure Crosslayer Routing in MANET." International Journal for Modern Trends in Science and Technology 6, no. 6 (May 30, 2020): 17–21. http://dx.doi.org/10.46501/ijmtst060605.

Full text
Abstract:
MANET supports communication without any wired medium and with layered architecture. It does not uses any infrastructure support. Present alternative to the layered architecture is cross layer design approaches and the interaction between the layers is supported. The security of CLPC (Cross Layer Design Approach for Power control) routing protocol will be discussed in this paper. The transmission power and finding the effective route between source and destination can be improved by CLPC. The reliable path between the source and destination can be determined by RSS from the physical layer, but it is vulnerable to the DOS attacks. Here we propose a Secure cross layer power control protocol SCLPC to placate the attacks on CLPC. The SCLPC protocol provides better results and performance.
APA, Harvard, Vancouver, ISO, and other styles
7

Maheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.

Full text
Abstract:
In an ad hoc network, the routing protocol takes into account a variety of activities, including maintaining network connection, transmission scheduling, channel evaluation, and preserving network connectivity. Additionally, it determines network architecture. In addition, a number of different elements determines the performance of a routing protocol. These include node mobility, which is responsible for multiple link failures, support for quality of service (QoS), network size, the amount of traffic, and the level of security. The performance may occasionally also be affected by the manner in which the network is behaving in addition to the kinds of apps that are running in that environment. Selecting an appropriate protocol that is based on security is highly crucial in order to set up an effective network. A significant amount of effort has been put into improving the safety mechanisms that are built into routing protocols, most prominently in WSNs, MANETs, VANETs, and WMNs. Only MANET will be the topic of discussion here. Mobile Ad-Hoc Network is a wireless network that does not need infrastructure and is composed of mobile nodes. Mobile ad-hoc network, also known as MANET, is one of the most promising forms of next-generation wireless networking technology. It has garnered a significant amount of interest because it is self-organized and can be deployed at a cheap cost. In comparison to a traditional network, a MANET presents a number of challenges that are especially difficult to overcome when it comes to the duty of routing. The many difficulties that are inherent with MANET have made it an excellent subject for academic investigation. This provides a concise overview of security in MANETs as well as the issues that relate to maintaining them. Understanding the different routing mechanisms and the potential attacks that might be mounted against them is the first step in designing a reliable security mechanism. Within the scope of this study effort, we have provided specifics on the detection and prevention of various routing attacks, with the primary emphasis being placed on the network layer assaults that are unique to MANET. When compared to other study fields, MANET presents the greatest challenge in terms of maintaining network security. In recent years, a significant amount of research has been carried out to investigate several forms of assault; nevertheless, most of the surveys have been carried out without any kind of performance analysis. There is a paucity of research that seeks to find an all-encompassing study of the impact of the many different attacks that bring the overall performance of the Adhoc network down. On the other hand, secure routing in the face of a black hole attack can be difficult because preferences are often incomplete. The in-degree centrality and importance degree measurement applied to the collected consensus-based trust from decision-makers solves the issue of incomplete preferences and improves the accuracy of trust at the same time. Utilizing Network Simulator, we examine how well the suggested approach works. Based on the findings of the simulations, it has been demonstrated that the detection accuracy and throughput of the proposed CREDIT are both significantly higher than those of existing work, making the proposed CREDIT scheme superior.
APA, Harvard, Vancouver, ISO, and other styles
8

Nagarajan, Aarthi, and Vijay Varadharajan. "Dynamic trust enhanced security model for trusted platform based services." Future Generation Computer Systems 27, no. 5 (May 2011): 564–73. http://dx.doi.org/10.1016/j.future.2010.10.008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Devi, Vallala Sowmya, and Nagaratna P. Hegde. "Multipath Security Aware Routing Protocol for MANET Based on Trust Enhanced Cluster Mechanism for Lossless Multimedia Data Transfer." Wireless Personal Communications 100, no. 3 (February 8, 2018): 923–40. http://dx.doi.org/10.1007/s11277-018-5358-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mao, Ming, Peng Yi, Tao Hu, Zhen Zhang, Xiangyu Lu, and Jingwei Lei. "Hierarchical Hybrid Trust Management Scheme in SDN-Enabled VANETs." Mobile Information Systems 2021 (August 16, 2021): 1–16. http://dx.doi.org/10.1155/2021/7611619.

Full text
Abstract:
One of the principal missions of security in the Internet of Vehicles (IoV) is to establish credible social relationships. The trust management system has been proved to be an effective security solution in a connected vehicle environment. The use of trust management can play a significant role in achieving reliable data collection and dissemination and enhanced user security in the Internet of Vehicles. However, due to a large number of vehicles, the limited computing power of individuals, and the highly dynamic nature of the network, a universal and flexible architecture is required to realize the trust of vehicles in a dynamic environment. The existing solutions for trust management cannot be directly applied to the Internet of Vehicles. To ensure the safe transmission of data between vehicles and overcome the problems of high communication delay and low recognition rate of malicious nodes in the current trust management scheme, an efficient flow forwarding mechanism of the RSU close to the controller in the Software-Defined Vehicular Network is used to establish a hierarchical hybrid trust management architecture. This method evaluates the dynamic trust change of vehicle behavior based on the trust between vehicles and the auxiliary trust management of the infrastructure to the vehicle, combined with static and dynamic information and other indicators. The proposed trust management scheme is superior to the comparative schemes in resisting simple attacks, selective misbehavior attacks, and time-dependent attacks under the condition of ensuring superior real-time performance. Its overall accuracy is higher than that of the baseline scheme.
APA, Harvard, Vancouver, ISO, and other styles
11

NARGUNAM, A. SHAJIN, and M. P. SEBASTIAN. "SECURITY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS." International Journal of Information Acquisition 03, no. 03 (September 2006): 233–45. http://dx.doi.org/10.1142/s0219878906000988.

Full text
Abstract:
Secured communication in mobile ad hoc network is a crucial issue due to dynamic nature of the network topology. Due to lack of centralized control, issuing certificates from a centralized certification agent is not possible in ad hoc network. The major problem in providing security services in such infrastructure-less networks is how to manage the cryptographic keys that are needed. In MANET any node may compromise the packet routing functionality by disrupting the route discovery process. These unique characteristics of mobile ad hoc networks such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic topology cause a number of nontrivial challenges to security design. These challenges make a cause for building multi-fence security solution that achieves both extensive protection and desirable network performance. In particular, the absence of a central authorization facility in an open and distributed communication environment is a major challenge, especially due to the need for cooperative network operation. We propose a novel cluster based security scheme to protect mobile ad hoc network link layer and network layer operations of delivering packet over the multihop wireless channel. The dynamic network topology can be managed efficiently by the proposed cluster based architecture. A well-behaving node becomes a cluster member after the initial trust verification process. The membership validity period of a node depends on how long it has stayed and behaved well. Non-overlapping clusters are created using the dynamic cluster creation algorithm. The cluster construction is fully distributed so efficiency is not degraded by node mobility.
APA, Harvard, Vancouver, ISO, and other styles
12

Bhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (May 30, 2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.

Full text
Abstract:
Mobile Ad-hoc Network is a wireless mobile nodes network, which forms a network without any pre existing fixed network infrastructure support. MANET permits versatile communication between hosts that are moving around. MANETs have numerous advantages compared to traditional wireless networks. In MANET, each mobile node needs the cooperation of other nodes in the network for forwarding data packets from source to destination node. Mobile Ad-hoc Network includes different routing protocols for communication and in MANET each mobile node can act as host as well as sender or receiver at the same time. MANET is design to smartly react to network changes and operates without human interference to support nodes mobility. Mobile Ad-hoc Networks are designed to sustain its survivability in unfriendly and hostile conditions such as natural disasters and other emergency conditions. However unique characteristics of MANETs topology such as open peer-to-peer architecture, dynamic network topology, shared wireless medium and limited resource (battery, memory and computation power) pose a number of non-trivial challenges to security design. These challenges and characteristics require MANETs to provide broad protection and desirable network performance. Due to dynamic nature of MANET it is very challenging work to employ a secure route. The routing protocols play important role in transferring data. Mobile Ad Hoc Networks (MANETs) pose challenges in terms of energy control, due to their fixed transmission power, the mobility of nodes and a constantly changing topology. High levels of energy are needed in wireless networks, particularly for routing. In order to address this problem, energy enhancement is analyzed with the proposed dynamic AODV cluster base trust protocol, with the aim of maximizing the lifetime of the network. We have performed simulation of our approach to justify our research work on network simulator-2 (NS-2). Simulation result presents that our proposed approach result is improved the performance of network than the existing Mobile Ad hoc Network protocol.
APA, Harvard, Vancouver, ISO, and other styles
13

Moulad, L., R. Chaabita, and K. Balar. "WIRELESS SENSOR NETWORK: TOWARDS AN IMPROVEMENT OF SECURITY POLICY." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVI-4/W5-2021 (December 23, 2021): 379–83. http://dx.doi.org/10.5194/isprs-archives-xlvi-4-w5-2021-379-2021.

Full text
Abstract:
Abstract. The ad hoc network (or MANET, for Mobile Ad hoc NETwork) is a system containing a set of devices that organize themselves, thus forming an autonomous and dynamic network, communicating via radio interface. These devices can be fixed or mobile, no wired infrastructure is available, and so these objects have to dynamically discover their environment.The design of these applications is based on trust between the nodes constituting the network. Unfortunately, when deploying randomly in difficult hostile areas, seeing impossible to monitor, not to mention the uncertainty of the communication channel, the sensor nodes are exposed to all types of attacks and intrusions, which can hinder and prevent the diffusion of the information between the sensor nodes of the network, and influencing its performance.Many approaches have been proposed to solve security problems in wireless networks. The solutions can be mainly classified into two categories: symmetric and asymmetric key management schemes. Indeed it is clear, that the optimal solution in this case is to use symmetric shared key systems.In this paper, the idea of LEAP improved is to apply the same Mechanisms used in LEAP Enhanced to overcome a compromised node and also prevent a compromised base station node while using a multiple base station network, this will, on the one hand, minimize power consumption, and secondly, to replace a base station in the event of a compromise, to ensure the continuity and proper functioning of the network. The evaluation of the proposed solution was carried out using the TOSSIM simulation tool.
APA, Harvard, Vancouver, ISO, and other styles
14

Selvaraj, Prabha, Vijay Kumar Burugari, S. Gopikrishnan, Abdullah Alourani , Gautam Srivastava, and Mohamed Baza. "An Enhanced and Secure Trust-Aware Improved GSO for Encrypted Data Sharing in the Internet of Things." Applied Sciences 13, no. 2 (January 7, 2023): 831. http://dx.doi.org/10.3390/app13020831.

Full text
Abstract:
Wireless sensors and actuator networks (WSNs) are the physical layer implementation used for many smart applications in this decade in the form of the Internet of Things (IoT) and cyber-physical systems (CPS). Even though many research concerns in WSNs have been answered, the evolution of the WSN into an IoT network has exposed it to many new technical issues, including data security, multi-sensory multi-communication capabilities, energy utilization, and the age of information. Cluster-based data collecting in the Internet of Things has the potential to address concerns with data freshness and energy efficiency. However, it may not offer reliable network data security. This research presents an improved method for data sharing and cluster head (CH) selection using the hybrid Vlsekriterijumska Optimizacija I Kompromisno Resenje (VIKOR) method in conjunction with glowworm swarm optimization (GSO) strategies based on the energy, trust value, bandwidth, and memory to address this security-enabled, cluster-based data aggregation in the IoT. Next, we aggregate the data after the cluster has been built using a genetic algorithm (GA). After aggregation, the data are encrypted and delivered securely using the TIGSO-EDS architecture. Cuckoo search is used to analyze the data and choose the best route for sending them. The proposed model’s analysis of the results is analyzed, and its uniqueness has been demonstrated via comparison with existing models. TIGSO-EDS reduces energy consumption each round by 12.71–19.96% and increases the percentage of successfully delivered data packets from 2.50% to 5.66%.
APA, Harvard, Vancouver, ISO, and other styles
15

Yuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan, and Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data." Electronics 10, no. 13 (June 25, 2021): 1546. http://dx.doi.org/10.3390/electronics10131546.

Full text
Abstract:
Three-dimensional (3D) data are easily collected in an unconscious way and are sensitive to lead biological characteristics exposure. Privacy and ownership have become important disputed issues for the 3D data application field. In this paper, we design a privacy-preserving computation system (SPPCS) for sensitive data protection, based on distributed storage, trusted execution environment (TEE) and blockchain technology. The SPPCS separates a storage and analysis calculation from consensus to build a hierarchical computation architecture. Based on a similarity computation of graph structures, the SPPCS finds data requirement matching lists to avoid invalid transactions. With TEE technology, the SPPCS implements a dual hybrid isolation model to restrict access to raw data and obscure the connections among transaction parties. To validate confidential performance, we implement a prototype of SPPCS with Ethereum and Intel Software Guard Extensions (SGX). The evaluation results derived from test datasets show that (1) the enhanced security and increased time consumption (490 ms in this paper) of multiple SGX nodes need to be balanced; (2) for a single SGX node to enhance data security and preserve privacy, an increased time consumption of about 260 ms is acceptable; (3) the transaction relationship cannot be inferred from records on-chain. The proposed SPPCS implements data privacy and security protection with high performance.
APA, Harvard, Vancouver, ISO, and other styles
16

Barka, Ezedin, Chaker Kerrache, Rasheed Hussain, Nasreddine Lagraa, Abderrahmane Lakas, and Safdar Bouk. "A Trusted Lightweight Communication Strategy for Flying Named Data Networking." Sensors 18, no. 8 (August 15, 2018): 2683. http://dx.doi.org/10.3390/s18082683.

Full text
Abstract:
Flying Ad hoc Network (FANET) is a new resource-constrained breed and instantiation of Mobile Ad hoc Network (MANET) employing Unmanned Aerial Vehicles (UAVs) as communicating nodes. These latter follow a predefined path called ’mission’ to provide a wide range of applications/services. Without loss of generality, the services and applications offered by the FANET are based on data/content delivery in various forms such as, but not limited to, pictures, video, status, warnings, and so on. Therefore, a content-centric communication mechanism such as Information Centric Networking (ICN) is essential for FANET. ICN addresses the problems of classical TCP/IP-based Internet. To this end, Content-centric networking (CCN), and Named Data Networking (NDN) are two of the most famous and widely-adapted implementations of ICN due to their intrinsic security mechanism and Interest/Data-based communication. To ensure data security, a signature on the contents is appended to each response/data packet in transit. However, trusted communication is of paramount importance and currently lacks in NDN-driven communication. To fill the gaps, in this paper, we propose a novel trust-aware Monitor-based communication architecture for Flying Named Data Networking (FNDN). We first select the monitors based on their trust and stability, which then become responsible for the interest packets dissemination to avoid broadcast storm problem. Once the interest reaches data producer, the data comes back to the requester through the shortest and most trusted path (which is also the same path through which the interest packet arrived at the producer). Simultaneously, the intermediate UAVs choose whether to check the data authenticity or not, following their subjective belief on its producer’s behavior and thus-forth reducing the computation complexity and delay. Simulation results show that our proposal can sustain the vanilla NDN security levels exceeding the 80% dishonesty detection ratio while reducing the generated end-to-end delay to less than 1 s in the worst case and reducing the average consumed energy by more than two times.
APA, Harvard, Vancouver, ISO, and other styles
17

Kancharakuntla, Deepika, and Hosam El-Ocla. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks." Electronics 11, no. 21 (October 26, 2022): 3480. http://dx.doi.org/10.3390/electronics11213480.

Full text
Abstract:
The presence of malevolent nodes in mobile ad hoc networks (MANETs) would lead to genuine security concerns. These nodes may disturb the routing process or deform the pattern of the data packets passing through the network. The MANET is extremely liable to attacks, owing to its characteristics of the network framework, such as the absence of infrastructure, moveable topology, and a centralized control unit. One of the most common attacks in MANETs is the blackhole attack. MANET nodes are susceptible to spectacular degradation of network performance in the presence of such attacks. In this regard, detecting or preventing deceitful nodes that will launch blackhole attacks is a challenge in MANETs. In this paper, we propose an Enhanced Blackhole Resistance (EBR) protocol to identify and resist nodes that are responsible for blackhole attacks. EBR can avoid congested traffic by passing the data packets through a safe route with the minimum RTT. The EBR protocol uses a combination of time to live (TTL) and round trip time (RTT), which is also called a TR mechanism, to detect the blackhole attacks. Our algorithm does not require any cryptographic or authentication mechanisms. Simulation results prove that EBR behaves better than other protocols in terms of throughput, end-to-end delay, packet delivery ratio, energy, and routing overhead.
APA, Harvard, Vancouver, ISO, and other styles
18

Firdaus, Muhammad, and Kyung-Hyune Rhee. "On Blockchain-Enhanced Secure Data Storage and Sharing in Vehicular Edge Computing Networks." Applied Sciences 11, no. 1 (January 4, 2021): 414. http://dx.doi.org/10.3390/app11010414.

Full text
Abstract:
The conventional architecture of vehicular ad hoc networks (VANETs) with a centralized approach has difficulty overcoming the increasing complexity of intelligent transportation system (ITS) applications as well as challenges in providing large amounts of data storage, trust management, and information security. Therefore, vehicular edge computing networks (VECNets) have emerged to provide massive storage resources with powerful computing on network edges. However, a centralized server in VECNets is insufficient due to potential data leakage and security risks as it can still allow a single point of failure (SPoF). We propose consortium blockchain and smart contracts to ensure a trustworthy environment for secure data storage and sharing in the system to address these challenges. Practical byzantine fault tolerance (PBFT) is utilized because it is suitable for consortium blockchain to audit publicly, store data sharing, and records the whole consensus process. It can defend against system failures with or without symptoms to reach an agreement among consensus participants. Furthermore, we use an incentive mechanism to motivate the vehicle to contribute and honestly share their data. The simulation results satisfy the proposed model’s design goals by increasing vehicular networks’ performance in general.
APA, Harvard, Vancouver, ISO, and other styles
19

Abdel Hakeem, Shimaa A., Hanan H. Hussein, and HyungWon Kim. "Security Requirements and Challenges of 6G Technologies and Applications." Sensors 22, no. 5 (March 2, 2022): 1969. http://dx.doi.org/10.3390/s22051969.

Full text
Abstract:
After implementing 5G technology, academia and industry started researching 6th generation wireless network technology (6G). 6G is expected to be implemented around the year 2030. It will offer a significant experience for everyone by enabling hyper-connectivity between people and everything. In addition, it is expected to extend mobile communication possibilities where earlier generations could not have developed. Several potential technologies are predicted to serve as the foundation of 6G networks. These include upcoming and current technologies such as post-quantum cryptography, artificial intelligence (AI), machine learning (ML), enhanced edge computing, molecular communication, THz, visible light communication (VLC), and distributed ledger (DL) technologies such as blockchain. From a security and privacy perspective, these developments need a reconsideration of prior security traditional methods. New novel authentication, encryption, access control, communication, and malicious activity detection must satisfy the higher significant requirements of future networks. In addition, new security approaches are necessary to ensure trustworthiness and privacy. This paper provides insights into the critical problems and difficulties related to the security, privacy, and trust issues of 6G networks. Moreover, the standard technologies and security challenges per each technology are clarified. This paper introduces the 6G security architecture and improvements over the 5G architecture. We also introduce the security issues and challenges of the 6G physical layer. In addition, the AI/ML layers and the proposed security solution in each layer are studied. The paper summarizes the security evolution in legacy mobile networks and concludes with their security problems and the most essential 6G application services and their security requirements. Finally, this paper provides a complete discussion of 6G networks’ trustworthiness and solutions.
APA, Harvard, Vancouver, ISO, and other styles
20

Han, Wenjing, and Yilin Yin. "Influence of Project Governance on Opportunistic Behavior: Taking a Dynamic Perspective." Buildings 12, no. 10 (October 11, 2022): 1659. http://dx.doi.org/10.3390/buildings12101659.

Full text
Abstract:
The importance of project governance in curbing opportunistic behavior (OB) has been clearly established in the project literature. Although contract governance and trust are considered critical factors that explain project governance, there is a lack of understanding regarding their interplay at various stages of project development. The current study takes a dynamic perspective and breaks down contract governance into contract completeness (CC) and contract enforcement (CE), while differentiating ex-ante trust from ex-post trust. As such, the current study takes a dynamic perspective and the Grossman-Hart-Moore (GHM) model, which aims to investigate how each of the two facets of contract governance and trust intertwine during the management of construction projects as well as their effects on OB. We undertook a questionnaire survey of individuals involved in 342 construction projects in China, and our research results show that, first of all, governance mechanisms at different stages have different inhibitory effects on OB. Taking contract-signing as the boundary, the governance effect of a contract is gradually enhanced, while the governance effect of trust is gradually reduced. Second, ex-ante trust is more important than ex-post trust: the former moderates not only the relationship between CE and OB, but also the influence of CC on OB. Finally, a contract that is overly complete is not conducive to precluding OB, as such completeness can give the contract parties a sense of security that is guaranteed. The current study not only garners insights into project governance research but also provides implications for architectural practitioners in deploying resources that relate to governance mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
21

Amit Vijay, Kore, and Mishra Manoj Ranjan. "Trust-based secure routing in IoT network based on rider foraging optimization algorithm." Journal of High Speed Networks 28, no. 1 (February 11, 2022): 75–94. http://dx.doi.org/10.3233/jhs-220680.

Full text
Abstract:
Due to the mobility and frequent topology changes, routing the data poses a challenging issue in the Internet of Things (IoT). Security poses a fundamental requirement factor in most IoT applications particularly, secure routing among the IoT nodes. The aim of this paper is to develop secure routing in IoT with minimal delay, minimal energy consumption and high throughput. Thus, a new algorithm, named Rider Foraging Optimization algorithm (RFO) is designed by the incorporation of standard Rider Optimization algorithm (ROA) and Bacterial Foraging optimization algorithm (BFO) that render an optimal solution, which is the optimal path for transmitting the information. Initially, the trust of the nodes is evaluated and the cluster head (CH) is chosen based on Low-Energy Adaptive Clustering Hierarchy (LEACH) protocol to securely transmit the data. Then, the proposed RFO algorithm selects the optimal path using the fitness factors, such as trust, energy, and delay constraints. The results revealed that the energy consumption of the nodes is reduced and the lifetime of the network is enhanced through the implementation of the proposed RFO, which attained a maximal throughput of 1, and minimal delay and energy consumption of 0.1169 and 0.0002, respectively.
APA, Harvard, Vancouver, ISO, and other styles
22

Bhat, Showkat Ahmad, Nen-Fu Huang, Ishfaq Bashir Sofi, and Muhammad Sultan. "Agriculture-Food Supply Chain Management Based on Blockchain and IoT: A Narrative on Enterprise Blockchain Interoperability." Agriculture 12, no. 1 (December 30, 2021): 40. http://dx.doi.org/10.3390/agriculture12010040.

Full text
Abstract:
Modern-day agriculture supply chains have evolved from sovereign and autonomous local stakeholders to a worldwide interconnected system of multiple participants linked by complicated interactions, impacting the production, processing, transportation, and delivery of food to end consumers. Regular instances of fraudulent acts reveal a lack of openness in agriculture supply chains, raising worries about financial losses, eroding customer trust, and lowering corporate brand value. To develop an efficient and reliable trading environment, several fundamental modifications in the present supply chain architecture are required. There is broad consensus that blockchain can improve transparency in agriculture-food supply chains (agri-food SCs). Consumers now demand safe, sustainable, and equitable food production processes, and businesses are using blockchains and the internet of things to meet these needs. For enhanced responsiveness in agri-food SCs, new concepts have evolved that combine blockchains with various Industry 5.0 technologies (e.g., blockchain technology, big data, internet of things (IoT), radio frequency identification (RFID), near field communication (NFC), etc.). It is critical to cut through the hype and examine the technology’s limits, which might stymie its acceptance, implementation, and scalability in agri-food supply chains. This study presents Agri-SCM-BIoT (Agriculture Supply Chain Management using Blockchain and Internet of things) architecture to address the storage and scalability optimization, interoperability, security and privacy issues security, and privacy of personal data along with storage concerns with present single-chain agriculture supply chain systems. We also discussed the classification of security threats with IoT infrastructure and possible available blockchain-based defense mechanisms. Finally, we discussed the features of the proposed supply chain architecture, followed by a conclusion and future work.
APA, Harvard, Vancouver, ISO, and other styles
23

Schneider, J., A. Klein, C. Mannweiler, and H. D. Schotten. "A context management system for a cost-efficient smart home platform." Advances in Radio Science 10 (September 18, 2012): 135–39. http://dx.doi.org/10.5194/ars-10-135-2012.

Full text
Abstract:
Abstract. This paper presents an overview of state-of-the-art architectures for integrating wireless sensor and actuators networks into the Future Internet. Furthermore, we will address advantages and disadvantages of the different architectures. With respect to these criteria, we develop a new architecture overcoming these weaknesses. Our system, called Smart Home Context Management System, will be used for intelligent home utilities, appliances, and electronics and includes physical, logical as well as network context sources within one concept. It considers important aspects and requirements of modern context management systems for smart X applications: plug and play as well as plug and trust capabilities, scalability, extensibility, security, and adaptability. As such, it is able to control roller blinds, heating systems as well as learn, for example, the user's taste w.r.t. to home entertainment (music, videos, etc.). Moreover, Smart Grid applications and Ambient Assisted Living (AAL) functions are applicable. With respect to AAL, we included an Emergency Handling function. It assures that emergency calls (police, ambulance or fire department) are processed appropriately. Our concept is based on a centralized Context Broker architecture, enhanced by a distributed Context Broker system. The goal of this concept is to develop a simple, low-priced, multi-functional, and save architecture affordable for everybody. Individual components of the architecture are well tested. Implementation and testing of the architecture as a whole is in progress.
APA, Harvard, Vancouver, ISO, and other styles
24

Han, Daoqi, Xiaofeng Du, and Yueming Lu. "Trustworthiness and a Zero Leakage OTMP-P2L Scheme Based on NP Problems for Edge Security Access." Sensors 20, no. 8 (April 15, 2020): 2231. http://dx.doi.org/10.3390/s20082231.

Full text
Abstract:
Resource constraints have prevented comprehensive cryptography and multifactor authentication in numerous Internet of Things (IoT) connectivity scenarios. Existing IoT systems generally adopt lightweight security protocols that lead to compromise and privacy leakage. Edge computing enables better access control and privacy protection, furthermore, blockchain architecture has achieved a trusted store of value by open-source and distributed consensus mechanisms. To embrace these new paradigms, we propose a scheme that employs one-time association multitasking proofs for peer to local authentication (OTMP-P2L). The scheme chooses relevant nondeterministic polynomial (NP) problem tasks, and manages localized trust and anonymity by using smart devices such as phones and pads, thereby enabling IoT devices to autonomously perform consensus validation with an enhanced message authentication code. This nested code is a one-time zero-knowledge proof that comprises multiple logic verification arguments. To increase diversity and reduce the workload of each one, these arguments are chained by a method that establishes some of the inputs of the following task from the output of previous tasks. We implemented a smart lock system and confirmed that the scheme outperforms IoT authentication methods. The result demonstrates superior flexibility through dynamic difficulty strategies and succinct non-interactive peer-to-peer (P2P) verification.
APA, Harvard, Vancouver, ISO, and other styles
25

Aslam, Muhammad Muzamil, Liping Du, Xiaoyan Zhang, Yueyun Chen, Zahoor Ahmed, and Bushra Qureshi. "Sixth Generation (6G) Cognitive Radio Network (CRN) Application, Requirements, Security Issues, and Key Challenges." Wireless Communications and Mobile Computing 2021 (October 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/1331428.

Full text
Abstract:
Recently, 5G installation has been started globally. Different capabilities are in the consistent procedure, like ultrareliability, mass connectivity, and specific low latency. Though, 5G is insufficient to meet all the necessities of the future technology in 2030 and so on. Next generation information and communication technology is playing an important role in attraction of researchers, industries, and technical people. With respect to 5G networks, sixth-generation (6G) CR networks are anticipated to familiarize innovative use cases and performance metrics, such as to offer worldwide coverage, cost efficiency, enhanced spectral, energy improved intelligence, and safety. To reach such requirements, upcoming 6G CRNs will trust novel empowering technologies. Innovative network architecture and transmission technologies and air interface are of excessive position, like multiple accesses, waveform design, multiantenna technologies, and channel coding schemes. (1) To content, the condition should be of worldwide coverage, there will be no limit on 6G to global CR communication networks that may require to be completed with broadcast networks, like satellite communication networks, therefore, attaining a sea integrated communication network. (2) The spectrums overall will be entirely travelled to the supplementary rise connection density data rates in optical frequency bands, millimeter wave (mmWave), sub-6 GHz, and terahertz (THz). (3) To see big datasets created because of tremendously varied CR communication networks, antenna rush, diverse communication scenarios, new provision necessities, wide bandwidth, and 6G CRNs will allow an innovative variety of intelligent applications with the assistance of big data and AI technologies. (4) Need to improve network security when deploying 6G technology in CR networks. 6G is decentralized, intended, intelligent innovative, and distributed network. In this article, we studied a survey of current developments and upcoming trends. We studied the predicted applications, possible technologies, and security issues for 6G CR network communication. We also discussed predicted future key challenges in 6G.
APA, Harvard, Vancouver, ISO, and other styles
26

Das, Moumita, Jack C. P. Cheng, and Kincho H. Law. "An ontology-based web service framework for construction supply chain collaboration and management." Engineering, Construction and Architectural Management 22, no. 5 (September 21, 2015): 551–72. http://dx.doi.org/10.1108/ecam-07-2014-0089.

Full text
Abstract:
Purpose – The purpose of this paper is to present a framework for integrating construction supply chain in order to resolve the data heterogeneity and data sharing problems in the construction industry. Design/methodology/approach – Standardized web service technology is used in the proposed framework for data specification, transfer, and integration. Open standard SAWSDL is used to annotate web service descriptions with pointers to concepts defined in ontologies. NoSQL database Cassandra is used for distributed data storage among construction supply chain stakeholders. Findings – Ontology can be used to support heterogeneous data transfer and integration through web services. Distributed data storage facilitates data sharing and enhances data control. Practical implications – This paper presents examples of two ontologies for expressing construction supply chain information – ontology for material and ontology for purchase order. An example scenario is presented to demonstrate the proposed web service framework for material procurement process involving three parties, namely, project manager, contractor, and material supplier. Originality/value – The use of web services is not new to construction supply chains (CSCs). However, it still faces problems in channelizing information along CSCs due to data heterogeneity. Trust issue is also a barrier to information sharing for integrating supply chains in a centralized collaboration system. In this paper, the authors present a web service framework, which facilitates storage and sharing of information on a distributed manner mediated through ontology-based web services. Security is enhanced with access control. A data model for the distributed databases is also presented for data storage and retrieval.
APA, Harvard, Vancouver, ISO, and other styles
27

"Fuzzy based Combined Trust Scheme for Secure Routing in MANET (FCTRS)." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (February 10, 2020): 1469–74. http://dx.doi.org/10.35940/ijitee.d1527.029420.

Full text
Abstract:
Mobile Ad Hoc network (MANET) is a self-configuring network consisting of mobile nodes without any fixed infrastructure. However due to the nodes has not any fixed infrastructure in MANET, it is susceptible to various security attacks like data modification, information sniff, due to low energy, computing ability and bandwidth. In MANET Black hole is also an attack and it is difficult to detect and prevent. The lack of quality in security aspects of ad-hoc routing protocols won’t provide reliability in the data packets movement between source and destination nodes. Implementing the routing decision with trust is an important one in the MANNET security. Hence, this research work propose an enhanced Fuzzy based combined trust scheme (FCTRS) based on public trust and Quality of Service (QoS) trust to detect black hole attack. It provides secure routing based on certificate authority (CA) to improve the performance of Ad-hoc On-demand Distance Vector (AODV). The results will show the performance improvement of proposed protocol over Enhanced Trusted Routing Scheme with Pattern Discovery (ETRS-PD) and the protocol AODV. The metrics in the performance of network examined with different conditions of mobility and the presence of black hole node positions.
APA, Harvard, Vancouver, ISO, and other styles
28

Joshi, Anuj, Pallavi Srivastava, and Poonam Singh. "Security Threats in Mobile Ad Hoc Network." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 1, no. 2 (June 11, 2015). http://dx.doi.org/10.18090/samriddhi.v1i2.1588.

Full text
Abstract:
Mobile Ad Hoc Network (MANET) is a collection of communication devices or nodes that wish to communicate without any fixed infrastructure and pre-determined organization of available links. The nodes in MANET themselves are responsible for dynamically discovering other nodes to communicate. Although the ongoing trend is to adopt ad hoc networks for commercial uses due to the property of its capability in forming temporary network without the aid of any established infrastructure or centralized administration. Due to this unique property, the main challenge is the vulnerability to security attacks. A number of challenges like open peer-to-peer network architecture, stringent resource constraints, shared wireless medium, dynamic network topology etc. are posed in MANET. As MANET is quickly spreading for, security challenges has become a primary concern to provide secure communication. In this paper, we identify the existent security threats an ad hoc network faces, the security services required to be achieved and the countermeasures for attacks in each layer. To accomplish our goal, we have done literature survey in gathering information related to various types of attacks and solutions, as well as we have identified the challenges and proposed solutions to overcome them. In conclusion, we focus on the findings and future works which may be interesting for the researchers like robust key management, trust based systems, data security in different layer etc. However, in short, we can say that the complete security solution requires the prevention, detection and reaction mechanisms applied in MANET.
APA, Harvard, Vancouver, ISO, and other styles
29

Lal, P. k. Venkateswar. "An Enhanced and Reliable Cloud Trust Protection Model for Privacy Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 06, no. 05 (June 13, 2022). http://dx.doi.org/10.55041/ijsrem15950.

Full text
Abstract:
The vulnerability of Cloud Computing Systems (CCSs) to Advanced Persistent Threats (APTs) is a significant concern to government and industry. We present a cloud architecture reference model that incorporates a wide range of security controls and best practices,and a cloud security assessment model – Cloud-Trust – that estimates high level security metrics to quantify the degree of confidentiality and integrity offered by a CCS or cloud service provider (CSP). Cloud-Trust is used to assess the security level of four multi- tenant IaaS cloud rchitectures equipped with alternative cloud security controls and to show the probability of CCS penetration (high value data compromise) is high if a minimal set of security controls are implemented. CCS penetration probability drops substantially if a cloud defense in depth security architecture is adopted that protects virtual machine (VM) images at rest, strengthens CSP an cloud tenantsystem administrator access controls, and which employs other network security controls to minimize cloud network surveillance and discovery of live VMs. Keywords: - Cloud Computing, Trust, Trust Management, Trust Models, Privacy, Trust metric, enables CSPs to start, stop, move, and restart
APA, Harvard, Vancouver, ISO, and other styles
30

Sadayan, Geetha, and Karthiyayini Ramaiah. "Enhanced data security in MANET using trust‐based Bayesian statistical model with RSSI by AOMDV." Concurrency and Computation: Practice and Experience, June 27, 2019. http://dx.doi.org/10.1002/cpe.5397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Al-Asadi, Hamid Ali Abed, Huda A. Ahmed, Abdul-Hadi Al-Hassani, and N. A. M. Ahmad Hambali. "A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks." International Journal of Computing, September 30, 2022, 325–32. http://dx.doi.org/10.47839/ijc.21.3.2688.

Full text
Abstract:
Because of the lack of fixed infrastructures, the existence of open media and diverse network topologies, internetworking networks and mobile ad hoc networks (MANET’s), the design of MANET protocols is complicated. In this paper, we propose an evolutionary trust mechanism imitating cognitive processes that uses sensitive information to avoid routing. Moreover, we propose an Enhanced Self-organizing Cooperation and Trust based (ESCT) Protocol, where the mobile nodes share self-reliance and interpret information from a cognitive point of view. Each node develops its information dynamically to eradicate malicious entities. The most attractive attribute of the proposed ESCT protocol, even if domestic attackers know how it operates, is to prevent infringements. In this paper, the efficiency of the proposed ESCT protocol is assessed for different routing disturbances and varying number of attackers. The results of a simulation show that, the proposed ESCT protocol supports diverse network platforms and provides an efficient routing method for MANET routers. The proposed ESCT protocol displays increased throughput, reduction in end-to-end delay and increase in packet delivery ratio when compared to the peers that were taken for comparison.
APA, Harvard, Vancouver, ISO, and other styles
32

"Detection and Prevention of Manet using Hybrid SVM with Ann." International Journal of Engineering and Advanced Technology 9, no. 2 (December 30, 2019): 4463–69. http://dx.doi.org/10.35940/ijeat.b3537.129219.

Full text
Abstract:
Mobile Ad hoc Networks (MANET) have been exceptionally vulnerable against attacks because of the dynamic and self-configurable nature of its system foundation. This kind of wireless network is appropriate for temporary communication linked due to its nature of less-foundation and there is no any control of centralized manner. Design a routing mechanism that are security aware with higher QoS parameter is very competetive and the major tasks involved in ad hoc types of network as per the limited power resources and their dynamic routing topology. This paper mainly focused on the design of a secure and trusts based on-demand routing mechanism using Ad-hoc on demand distance vector (AODV) protocol to compute trust-based produces path initialed from source up to destination that will fulfill minimum two end-to-end QoS parameters of network. So here, the generalized AODV routing protocol has been extended from traditional routing mechanism to analyze the performance of this model with combination of artificial intelligence concept. The proposed ad hoc based routing mechanism is used to found possible routes that are prevented through trust adjacent position of security validation protocols and enhanced link optimized route computes on the basis of Artificial Neural Network (ANN) as an artificial intelligence algorithm for well-organized communication in MANET. In addition, this research demonstrates the effectiveness of bio inspired Firefly Algorithm (FFA) as an optimization approach with the consideration of several performance QoS metrics of network. The results have been measured in terms of throughput and PDR with SVM and ANN approach. It has been observed that the throughput and PDR measured using ANN approach is better compared to SVM approach an average of 0.755 PDR value has been obtained using ANN approach.
APA, Harvard, Vancouver, ISO, and other styles
33

G., Madhu. "Design of Intrusion Detection and Prevention Model Using COOT Optimization and Hybrid LSTM-KNN Classifier for MANET." ICST Transactions on Scalable Information Systems, December 27, 2022, e2. http://dx.doi.org/10.4108/eetsis.v10i3.2574.

Full text
Abstract:
INTRODUCTION: MANET is an emerging technology that has gained traction in a variety of applications due to its ability to analyze large amounts of data in a short period of time. Thus, these systems are facing a variety of security vulnerabilities and malware assaults. Therefore, it is essential to design an effective, proactive and accurate Intrusion Detection System (IDS) to mitigate these attacks present in the network. Most previous IDS faced challenges such as low detection accuracy, decreased efficiency in sensing novel forms of attacks, and a high false alarm rate. OBJECTIVES: To mitigate these concerns, the proposed model designed an efficient intrusion detection and prevention model using COOT optimization and a hybrid LSTM-KNN classifier for MANET to improve network security. METHODS: The proposed intrusion detection and prevention approach consist of four phases such as classifying normal node from attack node, predicting different types of attacks, finding the frequency of attack, and intrusion prevention mechanism. The initial phases are done through COOT optimization to find the optimal trust value for identifying attack nodes from normal nodes. In the second stage, a hybrid LSTM-KNN model is introduced for the detection of different kinds of attacks in the network. The third stage performs to classify the occurrence of attacks. RESULTS: The final stage is intended to limit the number of attack nodes present in the system. The proposed method's effectiveness is validated by some metrics, which achieved 96 per cent accuracy, 98 per cent specificity, and 35 seconds of execution time. CONCLUSION: This experimental analysis reveals that the proposed security approach effectively mitigates the malicious attack in MANET.
APA, Harvard, Vancouver, ISO, and other styles
34

"Trust and Privacy Based Authentication Method for Vertical Handoff Decision in Heterogeneous Network." International Journal of Engineering and Advanced Technology 9, no. 1 (October 30, 2019): 5328–34. http://dx.doi.org/10.35940/ijeat.a2968.109119.

Full text
Abstract:
Next generation wireless networks involve diverse wireless access technologies to support multimedia services to the roaming users with different Quality of Service constraints at anytime and anywhere. The increased number of users and service providers in the integrated network architecture requires authentication mechanism between communication entities to ensure secured handover. The existing security standards of each network are not able to provide most favorable security requirements of the heterogeneous networks because of independent and incompatibility of various wireless networks. Therefore, Trust and Privacy based Multi-attribute Vertical Handoff (TPMVHO) decision algorithm along with Hybrid Genetic Cuckoo Search algorithm to optimize the attributes weight is proposed to select an optimal network for secure handoff mechanism. Simulation results show the reduction in handoff rate, blocking rate and enhanced throughput against Improved Particle swarm optimization based Multi-attribute Vertical Handoff (IPMVHO).
APA, Harvard, Vancouver, ISO, and other styles
35

Chetan Gedam. "A Blockchain Based Decentralized Authentication System for Management of IoT Traffic." International Journal of Advanced Research in Science, Communication and Technology, January 26, 2022, 322–32. http://dx.doi.org/10.48175/ijarsct-2294.

Full text
Abstract:
Blockchain technology has been related to the Internet of Things for a long time. Many obstacles stand in the way of widespread adoption of IoT applications. Security dangers and data privacy remain the top concerns, according to many studies and research. These issues are well-known, and solutions are available in the IT sector. Standard IT Security solutions, on the other hand, cannot be applied to IoT for a variety of reasons, ranging from device kinds to sheer device quantities. Unfortunately, security is typically overlooked in the IoT area, as it is in any other business, and most resources are given to application development and device hardware.This research technique featured decentralised blockchain-based authentication as well as an enhanced traffic management architecture. The benefits of blockchain security may be used to create secure virtual zones where objects can identify and trust one another, thanks to our technique. We may use our method in a wide range of IoT applications without requiring any specific hardware. Compared to centralised networks, our decentralised networks are much more well-organized. In terms of how it connects with other systems, each node in the network acts as an autonomous decision maker. Additionally, a secured layered architecture is proposed where the distributed directory is a convention of reproduced, shared and synced digital data dispersed throughout the whole blockchain network so that all network members would have a version of the directory themselves. It also ensures secure data storage for the device setup, which includes data from physical sensors.
APA, Harvard, Vancouver, ISO, and other styles
36

"Identifying and Improving the Malicious Behavior of Rushing and Blackhole Attacks using Proposed IDSAODV Protocol." International Journal of Recent Technology and Engineering 8, no. 3 (September 30, 2019): 6554–62. http://dx.doi.org/10.35940/ijrte.c5317.098319.

Full text
Abstract:
Wireless Ad hoc Network is established by a collection of mobile nodes without any fixed infrastructure, where each node plays a role of the router. There are not any centralize control to handle the routing process of network, due to the dynamic tropology and infrastructure less network the network is vulnerable to various kinds of attacks. Therefore, numerous proactive, reactive and hybrid routing protocols have been recommended, among which one of the well-known a protocol is AODV due to its high-performance gain. This research work contributes towards mitigating network layer attacks on routing protocols in Wireless Ad hoc Networks. Problem and it's security issues because its consequences and existing mechanisms for detection and prevention with the context of AODV protocol is a challenge in Wireless Ad hoc Network, particularly in MANET and Sensor network. We present an AODV based secure routing algorithm for detection and prevention of different network layer attacks such as blackhole and rushing attacks. We use different types of security parameters like node sequence numbers, hop count, trust value, path value, acknowledge time, the threshold value and ALERT packet message to design a secure algorithm for AODV routing protocol. It shows enactment evaluation of AODV with the enhanced secure routing algorithm and existing routing algorithm through simulations which will confirm the effectiveness and accuracy of the algorithm by considering performance metrics like throughput, packet delivery ratio and end to end delay. Using network simulator NS-2.35 the experimental results have been shown an improvement in throughput, packet delivery ratio (PDR), and end to end delay using IDSAODV and results are compared with normal AODV routing protocol for blackhole and rushing attacks. The comparative results have been also shown with proposed IDSAODV and existing method
APA, Harvard, Vancouver, ISO, and other styles
37

Lee, Ashlin. "In the Shadow of Platforms." M/C Journal 24, no. 2 (April 27, 2021). http://dx.doi.org/10.5204/mcj.2750.

Full text
Abstract:
Introduction This article explores the changing relational quality of “the shadow of hierarchy”, in the context of the merging of platforms with infrastructure as the source of the shadow of hierarchy. In governance and regulatory studies, the shadow of hierarchy (or variations thereof), describes the space of influence that hierarchal organisations and infrastructures have (Héritier and Lehmkuhl; Lance et al.). A shift in who/what casts the shadow of hierarchy will necessarily result in changes to the attendant relational values, logics, and (techno)socialities that constitute the shadow, and a new arrangement of shadow that presents new challenges and opportunities. This article reflects on relevant literature to consider two different ways the shadow of hierarchy has qualitatively changed as platforms, rather than infrastructures, come to cast the shadow of hierarchy – an increase in scalability; and new socio-technical arrangements of (non)participation – and the opportunities and challenges therein. The article concludes that more concerted efforts are needed to design the shadow, given a seemingly directionless desire to enact data-driven solutions. The Shadow of Hierarchy, Infrastructures, and Platforms The shadow of hierarchy refers to how institutional, infrastructural, and organisational hierarchies create a relational zone of influence over a particular space. This commonly refers to executive decisions and legislation created by nation states, which are cast over private and non-governmental actors (Héritier and Lehmkuhl, 2). Lance et al. (252–53) argue that the shadow of hierarchy is a productive and desirable thing. Exploring the shadow of hierarchy in the context of how geospatial data agencies govern their data, Lance et al. find that the shadow of hierarchy enables the networked governance approaches that agencies adopt. This is because operating in the shadow of institutions provides authority, confers bureaucratic legitimacy and top-down power, and offers financial support. The darkness of the shadow is thus less a moral or ethicopolitical statement (such as that suggested by Fisher and Bolter, who use the idea of darkness to unpack the morality of tourism involving death and human suffering), and instead a relationality; an expression of differing values, logics, and (techno)socialities internal and external to those infrastructures and institutions that cast it (Gehl and McKelvey). The shadow of hierarchy might therefore be thought of as a field of relational influences and power that a social body casts over society, by virtue of a privileged position vis-a-vis society. It modulates society’s “light”; the resources (Bourdieu) and power relationships (Foucault) that run through social life, as parsed through a certain institutional and infrastructural worldview (the thing that blocks the light to create the shadow). In this way the shadow of hierarchy is not a field of absolute blackness that obscures, but instead a gradient of light and dark that creates certain effects. The shadow of hierarchy is now, however, also being cast by decentralised, privately held, and non-hierarchal platforms that are replacing or merging with public infrastructure, creating new social effects. Platforms are digital, socio-technical systems that create relationships between different entities. They are most commonly built around a relatively fixed core function (such as a social media service like Facebook), that then interacts with a peripheral set of complementors (advertising companies and app developers in the case of social media; Baldwin and Woodard), to create new relationships, forms of value, and other interactions (van Dijck, The Culture of Connectivity). In creating these relationships, platforms become inherently political (Gillespie), shaping relationships and content on the platform (Suzor) and in embodied life (Ajunwa; Eubanks). While platforms are often associated with optional consumer platforms (such as streaming services like Spotify), they have increasingly come to occupy the place of public infrastructure, and act as a powerful enabler to different socio-technical, economic, and political relationships (van Dijck, Governing Digital Societies). For instance, Plantin et al. argue that platforms have merged with infrastructures, and that once publicly held and funded institutions and essential services now share many characteristics with for-profit, privately held platforms. For example, Australia has had a long history of outsourcing employment services (Webster and Harding), and nearly privatised its entire visa processing data infrastructure (Jenkins). Platforms therefore have a greater role in casting the shadow of hierarchy than before. In doing so, they cast a shadow that is qualitatively different, modulated through a different set of relational values and (techno)socialities. Scalability A key difference and selling point of platforms is their scalability; since they can rapidly and easily up- and down-scale their functionalities in a way that traditional infrastructure cannot (Plantin et al.). The ability to respond “on-demand” to infrastructural requirements has made platforms the go-to service delivery option in the neo-liberalised public infrastructure environment (van Dijck, Governing Digital Societies). For instance, services providers like Amazon Web Services or Microsoft Azure provide on demand computing capacity for many nations’ most valuable services, including their intelligence and security capabilities (Amoore, Cloud Ethics; Konkel). The value of such platforms to government lies in the reduced cost and risk that comes with using rented capabilities, and the enhanced flexibility to increase or decrease their usage as required, without any of the economic sunk costs attached to owning the infrastructure. Scalability is, however, not just about on-demand technical capability, but about how platforms can change the scale of socio-technical relationships and services that are mediated through the platform. This changes the relational quality of the shadow of hierarchy, as activities and services occurring within the shadow are now connected into a larger and rapidly modulating scale. Scalability allows the shadow of hierarchy to extend from those in proximity to institutions to the broader population in general. For example, individual citizens can more easily “reach up” into governmental services and agencies as a part of completing their everyday business through platform such as MyGov in Australia (Services Australia). Using a smartphone application, citizens are afforded a more personalised and adaptive experience of the welfare state, as engaging with welfare services is no-longer tied to specific “brick-and-mortar” locations, but constantly available through a smartphone app and web portal. Multiple government services including healthcare and taxation are also connected to this platform, allowing users to reach across multiple government service domains to complete their personal business, seeking information and services that would have once required separate communications with different branches of government. The individual’s capacities to engage with the state have therefore upscaled with this change in the shadow, retaining a productivity and capacity enhancing quality that is reminiscent of older infrastructures and institutions, as the individual and their lived context is brought closer to the institutions themselves. Scale, however, comes with complications. The fundamental driver for scalability and its adaptive qualities is datafication. This means individuals and organisations are inflecting their operational and relational logics with the logic of datafication: a need to capture all data, at all times (van Dijck, Datafication; Fourcade and Healy). Platforms, especially privately held platforms, benefit significantly from this, as they rely on data to drive and refine their algorithmic tools, and ultimately create actionable intelligence that benefits their operations. Thus, scalability allows platforms to better “reach down” into individual lives and different social domains to fuel their operations. For example, as public transport services become increasingly datafied into mobility-as-a-service (MAAS) systems, ride sharing and on-demand transportation platforms like Uber and Lyft become incorporated into the public transport ecosystem (Lyons et al.). These platforms capture geospatial, behavioural, and reputational data from users and drivers during their interactions with the platform (Rosenblat and Stark; Attoh et al.). This generates additional value, and profits, for the platform itself with limited value returned to the user or the broader public it supports, outside of the transport service. It also places the platform in a position to gain wider access to the population and their data, by virtue of operating as a part of a public service. In this way the shadow of hierarchy may exacerbate inequity. The (dis)benefits of the shadow of hierarchy become unevenly spread amongst actors within its field, a function of an increased scalability that connects individuals into much broader assemblages of datafication. For Eubank, this can entrench existing economic and social inequalities by forcing those in need to engage with digitally mediated welfare systems that rely on distant and opaque computational judgements. Local services are subject to increased digital surveillance, a removal of agency from frontline advocates, and algorithmic judgement at scale. More fortunate citizens are also still at risk, with Nardi and Ekbia arguing that many digitally scaled relationships are examples of “heteromation”, whereby platforms convince actors in the platform to labour for free, such as through providing ratings which establish a platform’s reputational economy. Such labour fuels the operation of the platform through exploiting users, who become both a product/resource (as a source of data for third party advertisers) and a performer of unrewarded digital labour, such as through providing user reviews that help guide a platform’s algorithm(s). Both these examples represent a particularly disconcerting outcome for the shadow of hierarchy, which has its roots in public sector institutions who operate for a common good through shared and publicly held infrastructure. In shifting towards platforms, especially privately held platforms, value is transmitted to private corporations and not the public or the commons, as was the case with traditional infrastructure. The public also comes to own the risks attached to platforms if they become tied to public services, placing a further burden on the public if the platform fails, while reaping none of the profit and value generated through datafication. This is a poor bargain at best. (Non)Participation Scalability forms the basis for a further predicament: a changing socio-technical dynamic of (non)participation between individuals and services. According to Star (118), infrastructures are defined through their relationships to a given context. These relationships, which often exist as boundary objects between different communities, are “loosely structured in common use, and become tightly bound in particular locations” (Star, 118). While platforms are certainly boundary objects and relationally defined, the affordances of cloud computing have enabled a decoupling from physical location, and the operation of platforms across time and space through distributed digital nodes (smartphones, computers, and other localised hardware) and powerful algorithms that sort and process requests for service. This does not mean location is not important for the cloud (see Amoore, Cloud Geographies), but platforms are less likely to have a physically co-located presence in the same way traditional infrastructures had. Without the same institutional and infrastructural footprint, the modality for participating in and with the shadow of hierarchy that platforms cast becomes qualitatively different and predicated on digital intermediaries. Replacing a physical and human footprint with algorithmically supported and decentralised computing power allows scalability and some efficiency improvements, but it also removes taken-for-granted touchpoints for contestation and recourse. For example, ride-sharing platform Uber operates globally, and has expressed interest in operating in complement to (and perhaps in competition with) public transport services in some cities (Hall et al.; Conger). Given that Uber would come to operate as a part of the shadow of hierarchy that transport authorities cast over said cities, it would not be unreasonable to expect Uber to be subject to comparable advocacy, adjudication, transparency, and complaint-handling requirements. Unfortunately, it is unclear if this would be the case, with examples suggesting that Uber would use the scalability of its platform to avoid these mechanisms. This is revealed by ongoing legal action launched by concerned Uber drivers in the United Kingdom, who have sought access to the profiling data that Uber uses to manage and monitor its drivers (Sawers). The challenge has relied on transnational law (the European Union’s General Data Protection Regulation), with UK-based drivers lodging claims in Amsterdam to initiate the challenge. Such costly and complex actions are beyond the means of many, but demonstrate how reasonable participation in socio-technical and governance relationships (like contestations) might become limited, depending on how the shadow of hierarchy changes with the incorporation of platforms. Even if legal challenges for transparency are successful, they may not produce meaningful change. For instance, O’Neil links algorithmic bias to mathematical shortcomings in the variables used to measure the world; in the creation of irritational feedback loops based on incorrect data; and in the use of unsound data analysis techniques. These three factors contribute to inequitable digital metrics like predictive policing algorithms that disproportionately target racial minorities. Large amounts of selective data on minorities create myopic algorithms that direct police to target minorities, creating more selective data that reinforces the spurious model. These biases, however, are persistently inaccessible, and even when visible are often unintelligible to experts (Ananny and Crawford). The visibility of the technical “installed base” that support institutions and public services is therefore not a panacea, especially when the installed base (un)intentionally obfuscates participation in meaningful engagement like complaints handling. A negative outcome is, however, also not an inevitable thing. It is entirely possible to design platforms to allow individual users to scale up and have opportunities for enhanced participation. For instance, eGovernance and mobile governance literature have explored how citizens engage with state services at scale (Thomas and Streib; Foth et al.), and the open government movement has demonstrated the effectiveness of open data in understanding government operations (Barns; Janssen et al.), although these both have their challenges (Chadwick; Dawes). It is not a fantasy to imagine alternative configurations of the shadow of hierarchy that allow more participatory relationships. Open data could facilitate the governance of platforms at scale (Box et al.), where users are enfranchised into a platform by some form of membership right and given access to financial and governance records, in the same way that corporate shareholders are enfranchised, facilitated by the same app that provides a service. This could also be extended to decision making through voting and polling functions. Such a governance form would require radically different legal, business, and institutional structures to create and enforce this arrangement. Delacoix and Lawrence, for instance, suggest that data trusts, where a trustee is assigned legal and fiduciary responsibility to achieve maximum benefit for a specific group’s data, can be used to negotiate legal and governance relationships that meaningfully benefit the users of the trust. Trustees can be instructed to only share data to services whose algorithms are regularly audited for bias and provide datasets that are accurate representations of their users, for instance, avoiding erroneous proxies that disrupt algorithmic models. While these developments are in their infancy, it is not unreasonable to reflect on such endeavours now, as the technologies to achieve these are already in use. Conclusions There is a persistent myth that data will yield better, faster, more complete results in whatever field it is applied (Lee and Cook; Fourcade and Healy; Mayer-Schönberger and Cukier; Kitchin). This myth has led to data-driven assemblages, including artificial intelligence, platforms, surveillance, and other data-technologies, being deployed throughout social life. The public sector is no exception to this, but the deployment of any technological solution within the traditional institutions of the shadow of hierarchy is fraught with challenges, and often results in failure or unintended consequences (Henman). The complexity of these systems combined with time, budgetary, and political pressures can create a contested environment. It is this environment that moulds societies' light and resources to cast the shadow of hierarchy. Relationality within a shadow of hierarchy that reflects the complicated and competing interests of platforms is likely to present a range of unintended social consequences that are inherently emergent because they are entering into a complex system – society – that is extremely hard to model. The relational qualities of the shadow of hierarchy are therefore now more multidimensional and emergent, and experiences relating to socio-technical features like scale, and as a follow-on (non)participation, are evidence of this. Yet by being emergent, they are also directionless, a product of complex systems rather than designed and strategic intent. This is not an inherently bad thing, but given the potential for data-system and platforms to have negative or unintended consequences, it is worth considering whether remaining directionless is the best outcome. There are many examples of data-driven systems in healthcare (Obermeyer et al.), welfare (Eubanks; Henman and Marston), and economics (MacKenzie), having unintended and negative social consequences. Appropriately guiding the design and deployment of theses system also represents a growing body of knowledge and practical endeavour (Jirotka et al.; Stilgoe et al.). Armed with the knowledge of these social implications, constructing an appropriate social architecture (Box and Lemon; Box et al.) around the platforms and data systems that form the shadow of hierarchy should be encouraged. This social architecture should account for the affordances and emergent potentials of a complex social, institutional, economic, political, and technical environment, and should assist in guiding the shadow of hierarchy away from egregious challenges and towards meaningful opportunities. To be directionless is an opportunity to take a new direction. The intersection of platforms with public institutions and infrastructures has moulded society’s light into an evolving and emergent shadow of hierarchy over many domains. With the scale of the shadow changing, and shaping participation, who benefits and who loses out in the shadow of hierarchy is also changing. Equipped with insights into this change, we should not hesitate to shape this change, creating or preserving relationalities that offer the best outcomes. Defining, understanding, and practically implementing what the “best” outcome(s) are would be a valuable next step in this endeavour, and should prompt considerable discussion. If we wish the shadow of hierarchy to continue to be productive, then finding a social architecture to shape the emergence and directionlessness of socio-technical systems like platforms is an important step in the continued evolution of the shadow of hierarchy. References Ajunwa, Ifeoma. “Age Discrimination by Platforms.” Berkeley J. Emp. & Lab. L. 40 (2019): 1-30. Amoore, Louise. Cloud Ethics: Algorithms and the Attributes of Ourselves and Others. Durham: Duke University Press, 2020. ———. “Cloud Geographies: Computing, Data, Sovereignty.” Progress in Human Geography 42.1 (2018): 4-24. Ananny, Mike, and Kate Crawford. “Seeing without Knowing: Limitations of the Transparency Ideal and Its Application to Algorithmic Accountability.” New Media & Society 20.3 (2018): 973–89. Attoh, Kafui, et al. “‘We’re Building Their Data’: Labor, Alienation, and Idiocy in the Smart City.” Environment and Planning D: Society and Space 37.6 (2019): 1007-24. Baldwin, Carliss Y., and C. Jason Woodard. “The Architecture of Platforms: A Unified View.” Platforms, Markets and Innovation. Ed. Annabelle Gawer. Cheltenham: Edward Elgar, 2009. 19–44. Barns, Sarah. “Mine Your Data: Open Data, Digital Strategies and Entrepreneurial Governance by Code.” Urban Geography 37.4 (2016): 554–71. Bourdieu, Pierre. Distinction: A Social Critique of the Judgement of Taste. Cambridge, MA: Harvard University Press, 1984. Box, Paul, et al. Data Platforms for Smart Cities – A Landscape Scan and Recommendations for Smart City Practice. Canberra: CSIRO, 2020. Box, Paul, and David Lemon. The Role of Social Architecture in Information Infrastructure: A Report for the National Environmental Information Infrastructure (NEII). Canberra: CSIRO, 2015. Chadwick, Andrew. “Explaining the Failure of an Online Citizen Engagement Initiative: The Role of Internal Institutional Variables.” Journal of Information Technology & Politics 8.1 (2011): 21–40. Conger, Kate. “Uber Wants to Sell You Train Tickets. And Be Your Bus Service, Too.” The New York Times, 7 Aug. 2019. 19 Jan. 2021. <https://www.nytimes.com/2019/08/07/technology/uber-train-bus-public-transit.html>. Dawes, Sharon S. “The Evolution and Continuing Challenges of E‐Governance.” Public Administration Review 68 (2008): 86–102. Delacroix, Sylvie, and Neil D. Lawrence. “Bottom-Up Data Trusts: Disturbing the ‘One Size Fits All’ Approach to Data Governance.” International Data Privacy Law 9.4 (2019): 236-252. Eubanks, Virginia. Automating Inequality: How High-Tech Tools Profile, Police, and Punish the Poor. New York: St. Martin’s Press, 2018. Fisher, Joshua A., and Jay David Bolter. “Ethical Considerations for AR Experiences at Dark Tourism Sites”. IEEE Explore 29 April. 2019. 13 Apr. 2021 <https://ieeexplore.ieee.org/document/8699186>. Foth, Marcus, et al. From Social Butterfly to Engaged Citizen: Urban Informatics, Social Media, Ubiquitous Computing, and Mobile Technology to Support Citizen Engagement. Cambridge MA: MIT Press, 2011. Fourcade, Marion, and Kieran Healy. “Seeing like a Market.” Socio-Economic Review, 15.1 (2017): 9–29. Gehl, Robert, and Fenwick McKelvey. “Bugging Out: Darknets as Parasites of Large-Scale Media Objects.” Media, Culture & Society 41.2 (2019): 219–35. Gillespie, Tarleton. “The Politics of ‘Platforms.’” New Media & Society 12.3 (2010): 347–64. Hall, Jonathan D., et al. “Is Uber a Substitute or Complement for Public Transit?” Journal of Urban Economics 108 (2018): 36–50. Henman, Paul. “Improving Public Services Using Artificial Intelligence: Possibilities, Pitfalls, Governance.” Asia Pacific Journal of Public Administration 42.4 (2020): 209–21. Henman, Paul, and Greg Marston. “The Social Division of Welfare Surveillance.” Journal of Social Policy 37.2 (2008): 187–205. Héritier, Adrienne, and Dirk Lehmkuhl. “Introduction: The Shadow of Hierarchy and New Modes of Governance.” Journal of Public Policy 28.1 (2008): 1–17. Janssen, Marijn, et al. “Benefits, Adoption Barriers and Myths of Open Data and Open Government.” Information Systems Management 29.4 (2012): 258–68. Jenkins, Shannon. “Visa Privatisation Plan Scrapped, with New Approach to Tackle ’Emerging Global Threats’.” The Mandarin. 23 Mar. 2020. 19 Jan. 2021 <https://www.themandarin.com.au/128244-visa-privatisation-plan-scrapped-with-new-approach-to-tackle-emerging-global-threats/>. Jirotka, Marina, et al. “Responsible Research and Innovation in the Digital Age.” Communications of the ACM 60.6 (2016): 62–68. Kitchin, Rob. The Data Revolution: Big Data, Open Data, Data Infrastructures and Their Consequences. Thousand Oaks, CA: Sage, 2014. Konkel, Frank. “CIA Awards Secret Multibillion-Dollar Cloud Contract.” Nextgov 20 Nov. 2020. 19 Jan. 2021 <https://www.nextgov.com/it-modernization/2020/11/exclusive-cia-awards-secret-multibillion-dollar-cloud-contract/170227/>. Lance, Kate T., et al. “Cross‐Agency Coordination in the Shadow of Hierarchy: ‘Joining up’Government Geospatial Information Systems.” International Journal of Geographical Information Science, 23.2 (2009): 249–69. Lee, Ashlin J., and Peta S. Cook. “The Myth of the ‘Data‐Driven’ Society: Exploring the Interactions of Data Interfaces, Circulations, and Abstractions.” Sociology Compass 14.1 (2020): 1–14. Lyons, Glenn, et al. “The Importance of User Perspective in the Evolution of MaaS.” Transportation Research Part A: Policy and Practice 121(2019): 22-36. MacKenzie, Donald. “‘Making’, ‘Taking’ and the Material Political Economy of Algorithmic Trading.” Economy and Society 47.4 (2018): 501-23. Mayer-Schönberger, V., and K. Cukier. Big Data: A Revolution That Will Change How We Live, Work and Think. London: John Murray, 2013. Michel Foucault. Discipline and Punish. London: Penguin, 1977. Nardi, Bonnie, and Hamid Ekbia. Heteromation, and Other Stories of Computing and Capitalism. Cambridge, MA: MIT Press, 2017. O’Neil, Cathy. Weapons of Math Destruction – How Big Data Increases Inequality and Threatens Democracy. London: Penguin, 2017. Obermeyer, Ziad, et al. “Dissecting Racial Bias in an Algorithm Used to Manage the Health of Populations.” Science 366.6464 (2019): 447-53. Plantin, Jean-Christophe, et al. “Infrastructure Studies Meet Platform Studies in the Age of Google and Facebook.” New Media & Society 20.1 (2018): 293–310. Rosenblat, Alex, and Luke Stark. “Algorithmic Labor and Information Asymmetries: A Case Study of Uber’s Drivers.” International Journal of Communication 10 (2016): 3758–3784. Sawers, Paul. “Uber Drivers Sue for Data on Secret Profiling and Automated Decision-Making.” VentureBeat 20 July. 2020. 19 Jan. 2021 <https://venturebeat.com/2020/07/20/uber-drivers-sue-for-data-on-secret-profiling-and-automated-decision-making/>. Services Australia. About MyGov. Services Australia 19 Jan. 2021. 19 Jan. 2021 <https://www.servicesaustralia.gov.au/individuals/subjects/about-mygov>. Star, Susan Leigh. “Infrastructure and Ethnographic Practice: Working on the Fringes.” Scandinavian Journal of Information Systems 14.2 (2002):107-122. Stilgoe, Jack, et al. “Developing a Framework for Responsible Innovation.” Research Policy 42.9 (2013):1568-80. Suzor, Nicolas. Lawless: The Secret Rules That Govern Our Digital Lives. Cambridge: Cambridge University Press, 2019. Thomas, John Clayton, and Gregory Streib. “The New Face of Government: Citizen‐initiated Contacts in the Era of E‐Government.” Journal of Public Administration Research and Theory 13.1 (2003): 83-102. Van Dijck, José. “Datafication, Dataism and Dataveillance: Big Data between Scientific Paradigm and Ideology.” Surveillance & Society 12.2 (2014): 197–208. ———. “Governing Digital Societies: Private Platforms, Public Values.” Computer Law & Security Review 36 (2020) 13 Apr. 2021 <https://www.sciencedirect.com/science/article/abs/pii/S0267364919303887>. ———. The Culture of Connectivity: A Critical History of Social Media. Oxford: Oxford University Press, 2013. Webster, Elizabeth, and Glenys Harding. “Outsourcing Public Employment Services: The Australian Experience.” Australian Economic Review 34.2 (2001): 231-42.
APA, Harvard, Vancouver, ISO, and other styles
38

Sarı, Simay, and Onur Mengi. "The Role of Creative Placemaking." M/C Journal 25, no. 3 (June 27, 2022). http://dx.doi.org/10.5204/mcj.2899.

Full text
Abstract:
Introduction The evolution of creative city paradigm in the last three decades has dramatically changed the notion of placemaking and the meaning of art and design for urban development in the creative and cultural economy context. Very recently, a spontaneously emerging art district has been exploited by policy actions in many cities, resulting in its presence on the global stage at the UNESCO Creative City Network. The two most common approaches that drive art and design-based development policies are seen in the creative city approach and community development approach (Evans; Murdoch III et al.). The creative city approach aims to contribute to economic development by focussing on the economic role of art and design (Florida; Murdoch III et al.). The community development approach, on the other hand, is seen as an important factor for social benefit and democratic development (Murdoch III et al.; Grodach; Markusen and Gadwa). Grassroots arts movements and community arts organisations, in the community development approach, support the arts as a low-income community involvement and development initiative (Murdoch III et al.). According to Grodach, public spaces and art and design spaces have three main roles in community development, and are built on local assets to increase community engagement, interaction, and participation. Despite the vast range of economic considerations in the current literature, it remains unclear how creative placemaking through arts, crafts, and design operates in the context of creative cities. Particularly, there is a need for a more comprehensive perspective of how creative placemaking contributes to art district development. Economic competition among creative cities has increased, especially since neoliberal policies diffused to the urban agenda. The city of Izmir, located in the Aegean coast of Turkey, being one of the world's top 130 cities (Tekeli), contributes to globalisation of the region and occupies a unique position in Turkey’s democratic history. Regarding the global arena, Izmir has reformulated its governmental structure in the making of places, with particular neighbourhoods seeking to increase their attractiveness to the creative class, support the creative industries, and to become a ‘Creative City’. Since the Culture and Art Workshop in 2009, when the Izmir Metropolitan Municipality established a creative city vision to serve as a high point in a democratic era, in particular involving elements of culture and creativity of importance for local and global actors, there has been a series of programs with different design strategies and governance mechanisms, such as the design projects (e.g. Izmir Sea Project and Izmir History Project, and History Design Workshop), formations (e.g. establishment of Izmir Mediterranean Academy with branches of history, design, ecology, culture, and arts in 2013), events and organisations (e.g. Good Design Izmir in 2016, 5th World Design Talks by the World Design Organization [WDO] in 2018), and applications for candidacy (e.g. for the World Design Capital title 2020, and UNESCO Creative Cities Network in 2019). The purpose of this article is to explore the drivers for art and design-based development in the urban environment through the lens of creative placemaking, and how this is practiced by creative class grassroots initiatives in cities such as Izmir, Turkey, which was shortlisted in the Creative City Network competition in 2019. The methodology is built on 1) a framework analysis through the research on art and design districts and the utilisation of creative placemaking, and 2) a field study exploring the creative placemaking drivers in an emerging art district, Darağaç, in Izmir. The field study is composed of site visits, visual mappings, the use of snowball sampling to reach the creative class, and structured interviews. The framework analysis findings suggest a set of creative placemaking drivers for art and design-based developments, and the case study findings present implications for future policies for integration of localised initiatives into the creative city framework. Framework Analysis The practice of creative cities applies one-size-fits-all strategies based on tangible and intangible characteristics to attract talent and support economic growth, whereas creative placemaking offers some crucial approaches to contribute to a locale's success and involvement in larger-scale plans. Therefore, placemaking appears as a phenomenological process that explains a sense of place, attachments, and, more broadly, the interaction between a region and its inhabitants (Mengi and Guaralda). The term ‘creative placemaking’ was first used by economist Ann Markusen and art consultant Anne Gadwa in the 2010 White Paper of the National Endowment for the Arts, as a solution when cities, suburbs, and small towns are faced with structural changes and displacement. Creative placemaking aims to revitalise space and economic development with creative initiatives. Markusen and Gadwa argue that creative placemaking provides gains in areas such as innovative products and services, livability, diversity, jobs, and income opportunities. Creative placemaking is also defined as a community-participatory tool to strengthen and enrich the identity of a place as well as development of a place. Community identity enables local assets to build trust and relationships (Kelkar et al.) while exploiting social and civic fabric that brings out the local character and narratives (Borrup). Moreover, Redaelli formulates creative placemaking as an innovative way of thinking for solving community problems that utilises the creative power of art and artists. From an economic perspective, Gallagher et al. point out that creative placemaking can happen in communities of any size and uses art and cross-sector collaboration to benefit the space. Creative placemaking through cross-sector collaboration is directly related to political ideology, social division, community size, resource limitations, and capacity of arts organisations. The theoretical discussion derived from the literature enables us to reconsider the use of creative placemaking approaches for creative city strategies and provides a framework that brings the most significant drivers of creative placemaking, especially for art and design-based strategies in urban environments (Table 1). Drivers Indicators Creative Practices Products Artworks Events Festivals Cultural Production Local Assets Local Knowledge Context Listening & Gathering Stories Knowledge & Skill Exchange Creativity Exchange Experiential Learning Community Involvement Co-Creation Collaboration Creative Placemakers Artists Designers Craftspeople Resident of the Community Local Audience Virtual Platform Archive/Publications Creativity Productivity Collectivity Spatial Environment Neighbourhood Streets Place Identity Digital Hub Atelier Digital Studio/Maker Space Art Galleries Exhibition Spaces Art Equipment Maker/Supplier Meeting Place/Third Place Institutional Support Networking Platform for Dialogue Space for Exhibition Publicity Public Fund Private Fund Philanthropists Sponsorship Education Institutions Art Institutions Art Organisations Non-Government Organisations Government Table 1: Major drivers of creative placemaking. Creative Practices, as the first driver, aim to describe tangible outputs such as products, works of art, events, and festivals. Wyckoff defines projects and activities involving art, culture, and creative thinking as the driving forces of creative placemaking to create collective memory. In this regard, Mutero et al. emphasise the importance of listening and gathering stories, in which it associates definitions such as community, local knowledge, and context. Describing community participation as a tool to improve the development of a place, Kelkar et al. mention that it helps to change the perception of the community. In this context, it creates trust and relationships while building community identity and sense of belonging. Creative Placemakers, as the second driver, represent actors in creative placemaking. One of the six drivers suggested by Markusen and Gadwa for creating a successful place are the creative initiators. Borrup, on the other hand, underlines the role of crucial actors, named as creative placemakers, such as city planners, developers, artists, local policy makers. neighbourhood residents, and local audiences, who also take part in creative practices guided by artists, designers, and craftspeople. According to Gaumer et al. and Schupbach, local actors must be involved as partners to realise more effective successful creative placemaking practices. Similarly, Kelkar et al. argue that the relationships that are built on the collaborative nature of involving actors transform productivity and create social capital. Spatial Environment, as the third driver, focusses on the spaces of creative practices. Spatial environments can be referred to at different scales, such as the digital hubs, ateliers, maker spaces, and event areas such as art galleries and exhibition areas that bring creative placemakers together and enable them to produce together. According to Ellery et al., such spaces enhance the use of public spaces while providing a sense of aesthetics, security, and community. Wyckoff lists drivers of creative placemaking as art spaces where artistic, cultural, and creative projects take place, work and living spaces for the creative class, art, culture, and entertainment activities. Institutional Support, as the fourth driver, underlines the expectations of creative placemakers from institutions. The institutional support through networking provides a platform for creative placemakers to establish dialogue as well as opportunities for exhibition areas and performances. The importance of the support of institutions and organisations such as the public sector, private sector, NGOs, and sponsors are essential to creative placemaking practices. Particularly, cross-sector partnership between institutions such as education institutions, art institutions, art organisations, non-government organisations, and government plays an important role in art and design-based development (Markusen and Gadwa; Borrup). Emergence of Darağaç as an Art District Creative places are found at various scales, such as regions, districts, hubs, and studios, and constitute the very integral part of the creative city formation. They represent a high culture ground on which artists and designers can design, make, and exhibit art. The secret of the successful transformation of creative places lies in the spontaneity of their development. The spontaneously emerging creative places are found as the result of a bottom-up approach where the resident involvement in this transformation strengthens the bond between local people and the place. Spontaneous developments are visible where cultural producers come together to attract like-minded producers (Zukin & Braslow). Examples of this phenomenon include New York City's SoHo neighbourhood, Beijing's 798 Arts District, Kreuzberg in Berlin, and the Temple Bar district in Dublin (Goldenberg-Miller et al.). The development of a spontaneous art and design district starts with the coming together of artists, designers, and cultural workers to form a network. Factors strengthening the network and contributing to the success of the region include community perception, information exchange within the community, and working and living together (Kumer). Darağaç has very recently emerged as an art district in Umurbey neighbourhood in Izmir. Known formerly as an industrial zone, it now hosts small industries and artists. Darağaç Art District, home to pre-Republican era factories operated by non-Muslim minorities and nineteenth-century two-storey workers' residences, was developed in the twentieth century as an industrial zone hosting Şark Sanayi Electric Factory, İzmir Cotton Fabric Factory, and Sümerbank Basma Industry (Kayın qtd. in Pasin et al.). A small group of artists from Izmir settled in the region in 2013, in rented former workers' residences serving as studios and residences, and shortly afterwards the district started to attract more artists and designers (Darağaç Collective). Surrounded by inert and functionless industrial buildings, Darağaç Art District still maintains its industrial identity as well as hosting those on low incomes and providing artists with opportunity to live and produce (Kocaer). There has been an increasing dialogue established between the original inhabitants, mostly craftspeople, and the artists, especially after 2 craftspeople and 13 artists opened their first exhibitions in June 2016 (Darağaç Collective). Since then, Darağaç has evolved to an “art district”, home to many projects and national and international artists. This has greatly shaped the physical environment and neighbourhood identity in the Darağaç Art District (fig. 1). Fig. 1: The integration of artworks or installations with the physical environment and neighbourhood identity in the Darağaç Art District. (Source: Kanal.) For Yavuzcezzar, the main purpose of Darağaç is to provide a space or a common discourse for young artists to exhibit their works. Darağaç Art District hosts interdisciplinary art works covering painting, photography, sculpture, installation, video, and performance (Yavuzcezzar). Also, Children's Meetings held in Darağaç Art District aim to increase the engagement of children in the neighbourhood through culture and arts (Darağaç Collective). Kılınç et al. explain the three main factors contributing to the development of the Darağaç Art District: site specificity; collaborative art practice; and close personal relationships established between neighbours. The site specificity factor is defined as the expansion of production towards the street and the inert lots in the district, replacing the existing spatial configurations in the neighbourhood, which do not meet the needs of the artists. Collaborative art practice is defined as the exchange between local people and artists. Kılınç et al. argue that the productive roles of artists and craftspeople have enabled them to establish a cooperation. The third factor is the close relationship established between neighbours through the Darağaç Collective Association in 2020 (Kılınç et al.). This has been visible in one of the most influential projects, ‘Darağaç Bostan’, in Darağaç (fig. 2). Fig. 2: Co-creation efforts in the Darağaç Art District. (Source: Culture Civic.) The case of Darağaç illustrates a unique case of a spontaneously emerged art district and underlines the importance of creative placemaking drivers for bottom-up creative city strategies. The area has been a democratic space via meetings, exhibitions, and workshops (fig. 3). Fig. 3: Knowledge-sharing practices in the Darağaç Art District. (Source: Darağaç.) The Case of Darağaç The case study consists of site visits, visual mappings, use of snowball sampling for reaching the artists and craftspeople, and structured interviews, and discusses the major drivers of creative placemaking and how they are practiced in Darağaç in Izmir. First Studies The first site visit to the Darağaç Art District was conducted in November 2020. At the time, there were a total of 13 artists and over 30 craftspeople located in the area (fig. 4). Following this, the pilot survey was conducted in February 2021, with a total of six participants, four artists, and two craftspeople from Darağaç Art District. All six participants were interviewed face-to-face, and each survey took approximately 15-20 minutes. After feedback from the pilot study participants, several changes were made in the final version of the survey. The following image illustrates the spatial clustering of craftspeople and artists residing in the neighbourhood who participated in the study (fig. 4). Fig. 4: Darağaç Survey Map. The Survey and Findings The four above-mentioned main drivers of creative placemaking, namely creative practices, creative placemakers, spatial environment, and institutional support, were addressed by Likert-scale questions. In the framework of the previously identified creative placemaking drivers, the survey was carried out to collect the opinions of the art district residents and draw conclusions. The participants were classified into three categories: artists, designers, and craftspeople. The first part of the survey is composed of general questions (age, gender, field of study, etc.) to give an overall idea of the participants. In the following four sections, it was aimed to measure the major drivers of creative placemaking, categorised as creative practices, creative placemakers, spatial environment, and institutional support. The fifth part examined the spatiality of art and design-based development in Darağaç in terms of economic, environmental, cultural, and social aspects. The survey was conducted between February and March 2021 in Darağaç Art District. All the art district residents were contacted and the rate of return of surveys was approximately 50%. 58% of the participants were resident in the neighbourhood, 42% were non-resident. 42% of participants reported that they used shared workspaces; 58% used individual workspaces. According to the survey results, the driving forces that most contribute to the development of the region are creative practices (art and craft works), creative placemakers (artists, designers, and craftspeople), and spatial environment (place identity), followed by institutional support from public, private, and non-governmental organisations, respectively (fig. 5). Fig. 5: Contributions of drivers to creative placemaking in Darağaç. It seems that the interaction and collaboration grouped under creative practice contribute significantly to the development of Darağaç, closely followed by knowledge and skill exchange and the presence of art and design events, and, lastly, by the final products. Considering the role of placemakers in the spontaneous development of Darağaç, an art district, the findings reveal that artists make the greatest contribution, followed by designers and craftspeople, while the impact of the residents as placemakers is relatively low. The results for the place-based inspirations for creative placemakers show that the spatiality of placemaking has a considerable effect on the texture of the neighbourhood. For the placemakers in the district, the pre-existence of artists, designers, and craftspeople in Darağaç was one of the main reasons for locating there. The neighbourhood’s cultural and historical value and the communication with the local community have equal importance in terms of their contribution to the spontaneous development. Finally, we examine institutional support as the final driver, which falls behind the other three, as seen in fig. 5. Only 38% of the participants reported that they were able to collaborate with an institution before, while only 38% managed to receive financial support. According to the results, the main three actors supporting the grassroots activities through collaborations are art organisations, universities, and municipalities. The results also show that the financial support through funding comes mainly from the existing associations and public authorities. Evaluation The results obtained from the case study show that cultural exchange has been the most influential factor in art and design-based development. Regarding the creative placemaking drivers, dialogue between the residents of the neighborhood has considerably increased as they share and exchange knowledge and skills since the art district development spontaneously started. Changing perceptions of the neighborhood residents through time and their growing relationship with art, design, and crafts have greatly contributed to the emergence of an art district. When we examine the art and design-based development, it is visible that the neighbourhood has evolved to a more attractive and atmospheric space for art and design practices. The results underline the role of solidarity and sense of belonging for strengthening the community engagement. We can also argue that the adaptive reuse of vacant spaces and the design of possible exhibition spaces have dramatically changed the identity of the space. However, the economic impacts of spontaneous art and design-based development have remained moderate with regard to the creation of auxiliary sectors to the production process, creating new jobs and income opportunities and having a self-sufficient economy. Conclusion Since 2010, the placemaking process has been more sensitive, with the help of increased human input and indication of co-creation tactics through creative placemaking. Creative placemaking has been reshaped along the creative city policies and strategies. Before the conceptualisation of creative placemaking, many authors (see Jones; Weitz; Wositzsky), had referred to the link between art and community development, and highlighted how artists, art societies and local communities are positively affected by using art as a tool for the community. Within this context, this article provides a relatively more comprehensive approach to art and design-based development within the framework of creative placemaking for the creative cities of today. It examines and categorises the creative placemaking components, and explores how these components work and how they contribute to spontaneous art district development through the case of Darağaç, Izmir, in Turkey, a place where artists, designers, and craftspeople live and produce together. Culture and creativity as significant tools for economic development and urban renewal are found in many of the recent planning strategies (Codignola). The creative economy, cultural tourism, and creative placemaking have encouraged communities to use art for economic benefit (Gallagher et al.). According to Grodach, art and design spaces can contribute to tourism by attracting visitors from the immediate environment while providing employment opportunities to local artists and thus contributing to individual well-being and local economic development. Although this does not have the power to eliminate problems such as displacement, unemployment, and social exclusion, it makes a great contribution to urban inequality (Grodach). The four main drivers, creative practices, creative placemakers, spatial environment, and institutional support, all play a significant role in the emergence of Darağaç as an art district. The most influential driver, that of creative practices, highlights the importance of art and design production and events and festivals as creative practices, indicating a high concentration of local assets and tacit knowledge. Secondly, placemakers have a considerable importance in the spontaneous transformation from an industrial zone to an art district with regard to craftspeople’s and designers’ living and work environments. Also, their collective attitude towards the local residents in the area seems to have significantly contributed to this development through skill exchange, community involvement, and co-creation. Thirdly, the spatial environment, originating in the 1930s, and the available amenities have a great influence on the identity formation of the district. Lastly, the available institutional support underlines the strong role of art and design in economic development. However, Darağaç Art District has yet to receive sufficient support from the institutions, and tries to sustain its organic structure by operating as a self-sufficient entity. In further studies, additional drivers must be examined on an individual basis to arrive at policy suggestions, due to the strategic importance of building a feeling of place in the attraction and retention of creative talent. For the policy recommendations, it is important that the current urban agenda should present a combination of characteristics derived from the framework of creative placemaking for building better and more habitable creative places, rather than focussing solely on the more visible economic and physical urban goals. It is crucial to understand the strategic balance of the various drivers that enable the growth of creative places for future urban development. For the practical implications, the use of creative placemaking drivers for spontaneous art and design-based development enables the collaboration between different actors and engagement of grassroots activities in policymaking. References Borrup, Tom. "Creative Placemaking: Arts and Culture as a Partner in Community Revitalization." 2016. Codignola, Federica. "Culture and Creativity Management: Milan as a Global Capital for Value Creation." Symphonya: Emerging Issues in Management 2 (2016): 108-124. Culture Civic. "REENKARNE darağaç." 2022. 29 May 2022 <https://www.culture-civic.org/projeler/reenkarne-daragac>. Darağaç. "Neighborhood and Culture-Art Relationship." 2021. 22 May 2022 <https://www.daragac.com/en/neighborhood-and-culture-art-relationship/>. Darağaç Collective. “About Darağaç.” Darağaç_Kitap (2019): 136-139 Ellery, Jane, et al. "Placemaking: An Engaged Approach to Community Well-Being." Journal of Family & Consumer Sciences 109.2 (2017): 7-13. Evans, Graeme. "Creative Cities, Creative Spaces and Urban Policy." Urban Studies 46.5-6 (2009): 1003-1040. Gallagher, B. Kathleen, and Matthew P. Ehlman. "Arts at the Intersection: Cross-Sector Collaboration and Creative Placemaking in Rapid City, SD." Public Performance & Management Review 42.6 (2019): 1333-1350. Gaumer, Carol J., Kathie J. Shaffer, and Corey A. Knipple. "Creative Placemaking: Marketing Communities and Success Metrics." Journal of International Business Disciplines 14.1 (2019). Grodach, Carl. "Art Spaces, Public Space, and the Link to Community Development." Community Development Journal 45.4 (2010): 474-493. ———. "Art Spaces in Community and Economic Development: Connections to Neighborhoods, Artists, and the Cultural Economy." Journal of Planning Education and Research 31.1 (2011): 74-85. ———. "Urban Cultural Policy and Creative City Making." Cities 68 (2017): 82-91. Goldberg-Miller, Shoshanah B.D., and Joe E. Heimlich. "Creatives' Expectations: The Role of Supercreatives in Cultural District Development." Cities 62 (2017): 120-130. Jones, Bernie. "The Community Artist as Community Development Catalyst: An Evaluation of a Pilot Project." Community Development 19.1 (1988): 37-50. Kanal, Ali. "Gift." See: Darağaç. 2017. 27 Mar. 2022 <https://www.daragac.com/en/see-daragac/>. Kelkar, Nikita Prakash, and Gabriella Spinelli. "Building Social Capital through Creative Placemaking." Strategic Design Research Journal 9.2 (2016): 54-66. Kayın, Emel. “The Architecture of Industrial Buildings.” Izmir City Encyclopedia, Architecture 1 (2013). Kilinc, Kivanc, Burkay Pasin, and Guzden Varinlioglu. "Becoming One with the Neighborhood: Collaborative Art, Space-Making, and Urban Change in Izmir Daragac." 2021. Kocaer, Onur. “Darağaç III.” Platform Journal (2018): 51-52. Kumer, Peter. "Self-Governance and Social Inclusion in a Post-Socialist City: Contradictions between City-Designated and Naturally-Occurring Arts Districts." Družboslovna Revija 57.1 (2020): 28-48. Markusen, Ann, and Anne Gadwa. "Creative Placemaking." Washington, DC: National Endowment for the Arts, 2010. Mengi, Onur, and Mirko Guaralda. "Multidimensional Management Framework for Creative Places." Journal of Place Management and Development 13.3 (2020): 297–317. Murdoch III, James, Carl Grodach, and Nicole Foster. "The Importance of Neighborhood Context in Arts-Led Development: Community Anchor or Creative Class Magnet?" Journal of Planning Education and Research 36.1 (2016): 32-48. Mutero, Innocent Tinashe, and Ivan Gunass Govender. "Advancing the Exploration of Engaged Creative-Placemaking amongst Universities and Communities for Social Cohesion in South Africa." Journal of Asian and African Studies 55.3 (2020): 429-445. Nowak, Jeremy. "Creativity and Neighborhood Development: Strategies for Community Investment." 2007. Pasin, Burkay, Güzden Varinlioğlu, and Kıvanç Kılınç. "Alternatif Bir Kentsel Tamirat Pratiği Olarak Darağaç [Darağaç as an Alternative Urban Repair Practice]." Ege Mimarlık 4.108 (2020): 78-85. Redaelli, Eleonora. "Creative Placemaking and the NEA: Unpacking a Multi-Level Governance." Policy Studies 37.4 (2016): 387-402. Schupbach, Jason. "Creative Placemaking." Economic Development Journal 14.4 (2015): 28-33. Tekeli, İlhan. “İzmir Modeli: İzmir İçin Demokratik Bir Belediyecilik Modeli Önerisi.” İzmir Büyükşehir Belediyesi (2018): 64. Weitz, Judith. Coming Up Taller: Arts and Humanities Programs for Children and Youth at Risk. Diane Publishing, 1996. Wositzky, Helen. "Out of the Ashes, a Community Responds: The Dandenong Ranges Bushfires, January 1997." The Australian Journal of Emergency Management 13.2 (1998): 17-20. Wyckoff, Mark A. "Definition of Dlacemaking: Four Different Types." Planning & Zoning News 32.3 (2014): 1. Yavuzcezzar, Zeynep. “Preface.” Darağaç_Kitap (2019): 6-7. Zukin, Sharon, and Laura Braslow. "The Life Cycle of New York’s Creative Districts: Reflections on the Unanticipated Consequences of Unplanned Cultural Zones." City, Culture and Society 2.3 (2011): 131-140.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography