Novel Protocols to Mitigate Network Slice Topology Learning Attacks and Protect Privacy of Users' Service Access Behavior in Softwarized 5G Networks

Author(s):  
Vipin N. Sathi ◽  
Manikantan Srinivasan ◽  
Prabhu Kaliyammal Thiruvasagam ◽  
Siva Ram Murthy
Keyword(s):  
Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 882 ◽  
Author(s):  
Jesus Sanchez-Gomez ◽  
Dan Garcia-Carrillo ◽  
Rafael Marin-Perez ◽  
Antonio Skarmeta

Security is critical in the deployment and maintenance of novel IoT and 5G networks. The process of bootstrapping is required to establish a secure data exchange between IoT devices and data-driven platforms. It entails, among other steps, authentication, authorization, and credential management. Nevertheless, there are few efforts dedicated to providing service access authentication in the area of constrained IoT devices connected to recent wireless networks such as narrowband IoT (NB-IoT) and 5G. Therefore, this paper presents the adaptation of bootstrapping protocols to be compliant with the 3GPP specifications in order to enable the 5G feature of secondary authentication for constrained IoT devices. To allow the secondary authentication and key establishment in NB-IoT and 4G/5G environments, we have adapted two Extensible Authentication Protocol (EAP) lower layers, i.e., PANATIKI and LO-CoAP-EAP. In fact, this approach presents the evaluation of both aforementioned EAP lower layers, showing the contrast between a current EAP lower layer standard, i.e., PANA, and one specifically designed with the constraints of IoT, thus providing high flexibility and scalability in the bootstrapping process in 5G networks. The proposed solution is evaluated to prove its efficiency and feasibility, being one of the first efforts to support secure service authentication and key establishment for constrained IoT devices in 5G environments.


Crisis ◽  
2012 ◽  
Vol 33 (2) ◽  
pp. 113-119 ◽  
Author(s):  
Michael S. Rodi ◽  
Lucas Godoy Garraza ◽  
Christine Walrath ◽  
Robert L. Stephens ◽  
D. Susanne Condron ◽  
...  

Background: In order to better understand the posttraining suicide prevention behavior of gatekeeper trainees, the present article examines the referral and service receipt patterns among gatekeeper-identified youths. Methods: Data for this study were drawn from 26 Garrett Lee Smith grantees funded between October 2005 and October 2009 who submitted data about the number, characteristics, and service access of identified youths. Results: The demographic characteristics of identified youths are not related to referral type or receipt. Furthermore, referral setting does not seem to be predictive of the type of referral. Demographic as well as other (nonrisk) characteristics of the youths are not key variables in determining identification or service receipt. Limitations: These data are not necessarily representative of all youths identified by gatekeepers represented in the dataset. The prevalence of risk among all members of the communities from which these data are drawn is unknown. Furthermore, these data likely disproportionately represent gatekeepers associated with systems that effectively track gatekeepers and youths. Conclusions: Gatekeepers appear to be identifying youth across settings, and those youths are being referred for services without regard for race and gender or the settings in which they are identified. Furthermore, youths that may be at highest risk may be more likely to receive those services.


2004 ◽  
Author(s):  
J. E. Farmer ◽  
W. E. Marien ◽  
M. J. Clark ◽  
A. Sherman ◽  
T. J. Selva
Keyword(s):  

Mousaion ◽  
2019 ◽  
Vol 37 (1) ◽  
Author(s):  
Tshepho Lydia Mosweu

Social media as a communication tool has enabled governments around the world to interact with citizens for customer service, access to information and to direct community involvement needs. The trends around the world show recognition by governments that social media content may constitute records and should be managed accordingly. The literature shows that governments and organisations in other countries, particularly in Europe, have social media policies and strategies to guide the management of social media content, but there is less evidence among African countries. Thus the purpose of this paper is to examine the extent of usage of social media by the Botswana government in order to determine the necessity for the governance of liquid communication. Liquid communication here refers to the type of communication that goes easily back and forth between participants involved through social media. The ARMA principle of availability requires that where there is information governance, an organisation shall maintain its information assets in a manner that ensures their timely, efficient and accurate retrieval. The study adopted a qualitative case study approach where data were collected through documentary reviews and interviews among purposively selected employees of the Botswana government. This study revealed that the Botswana government has been actively using social media platforms to interact with its citizens since 2011 for increased access, usage and awareness of services offered by the government. Nonetheless, the study revealed that the government had no official documentation on the use of social media, and policies and strategies that dealt with the governance of liquid communication. This study recommends the governance of liquid communication to ensure timely, efficient and accurate retrieval when needed for business purposes.


Author(s):  
Aiman Kassir ◽  
◽  
Rudzidatul Akmam Dziyauddin ◽  
Hazilah Mad Kaidi ◽  
Mohd Azri Mohd Izhar ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document