scholarly journals A Rhythm-Based Authentication Scheme for Smart Media Devices

2014 ◽  
Vol 2014 ◽  
pp. 1-9 ◽  
Author(s):  
Jae Dong Lee ◽  
Young-Sik Jeong ◽  
Jong Hyuk Park

In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users’ convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.

2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Xin Su ◽  
Ziyu Wang ◽  
Xiaofeng Liu ◽  
Chang Choi ◽  
Dongmin Choi

Including mobile environment, conventional security mechanisms have been adapted to satisfy the needs of users. However, the device environment-IoT-based number of connected devices is quite different to the previous traditional desktop PC- or mobile-based environment. Based on the IoT, different kinds of smart and mobile devices are fully connected automatically via device controller, such as smartphone. Therefore, controller must be secure compared to conventional security mechanism. According to the existing security threats, these are quite different from the previous ones. Thus, the countermeasures applied should be changed. However, the smart device-based authentication techniques that have been proposed to date are not adequate in terms of usability and security. From the viewpoint of usability, the environment is based on mobility, and thus devices are designed and developed to enhance their owners’ efficiency. Thus, in all applications, there is a need to consider usability, even when the application is a security mechanism. Typically, mobility is emphasized over security. However, considering that the major characteristic of a device controller is deeply related to its owner’s private information, a security technique that is robust to all kinds of attacks is mandatory. In this paper, we focus on security. First, in terms of security achievement, we investigate and categorize conventional attacks and emerging issues and then analyze conventional and existing countermeasures, respectively. Finally, as countermeasure concepts, we propose several representative methods.


Sensors ◽  
2020 ◽  
Vol 20 (24) ◽  
pp. 7182 ◽  
Author(s):  
Muhammad Asad ◽  
Ahmed Moustafa ◽  
Chao Yu

With the advent of smart devices, smartphones, and smart everything, the Internet of Things (IoT) has emerged with an incredible impact on the industries and human life. The IoT consists of millions of clients that exchange massive amounts of critical data, which results in high privacy risks when processed by a centralized cloud server. Motivated by this privacy concern, a new machine learning paradigm has emerged, namely Federated Learning (FL). Specifically, FL allows for each client to train a learning model locally and performs global model aggregation at the centralized cloud server in order to avoid the direct data leakage from clients. However, despite this efficient distributed training technique, an individual’s private information can still be compromised. To this end, in this paper, we investigate the privacy and security threats that can harm the whole execution process of FL. Additionally, we provide practical solutions to overcome those attacks and protect the individual’s privacy. We also present experimental results in order to highlight the discussed issues and possible solutions. We expect that this work will open exciting perspectives for future research in FL.


2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Ruijin Zhu ◽  
Baofeng Zhang ◽  
Yu-an Tan ◽  
Jinmiao Wang ◽  
Yueliang Wan

The authorization mechanism of smart devices is mainly implemented by firmware, yet many smart devices have security issues about their firmware. Limited research has focused on securing the firmware of smart devices, although increasingly more smart devices are used to deal with the very sensitive applications, activities, and data of users. Thus, research on smart device firmware security is of growing importance. Disassembly is a common method for evaluating the security of authorization mechanisms. When disassembling firmware, the processor type of the running environment and the image base of the firmware should first be determined. In general, the processor type can be obtained by tearing down the device or consulting the product manual. However, it is not easy to determine the image base of firmware. Since the processors of many smart devices are ARM architectures, in this paper, we focus on firmware under the ARM architecture and propose an automated method for determining the image base. By studying the storage law of the jump table in the firmware of ARM-based smart devices, we propose an algorithm, named determining the image base by searching jump tables (DBJT), to determine the image base. The experimental results indicate that the proposed method can successfully determine the image base of firmware, which stores the absolute address in the jump table.


2006 ◽  
Vol 10 (2) ◽  
pp. 287-301
Author(s):  
Anush Begoyan

AbstractThe article examines security issues of the Transcaucasian region with the focus on nonmilitary and trans-border security threats and a regional security community that also includes non-state security actors of the region, such as not-recognised autonomous entities, nations, ethnic groups, minorities, etc.This approach to regional security shifts the focus of policies from balance of power to closer regional integration and cooperation, as well as joint provision of regional security. Despite many objectives and existing obstacles to this scenario of regional development, the author sees it to be the only way toward a stable and long-term security in the region. The article argues that closer regional cooperation and integration would allow to accommodate interests and security concerns of non-state actors of the region and would bring the fate of regional issues back in the hands of the regional powers and create bases for sustainable and lasting peace in the region.


Sensors ◽  
2021 ◽  
Vol 21 (7) ◽  
pp. 2347
Author(s):  
Yanyan Wang ◽  
Lin Wang ◽  
Ruijuan Zheng ◽  
Xuhui Zhao ◽  
Muhua Liu

In smart homes, the computational offloading technology of edge cloud computing (ECC) can effectively deal with the large amount of computation generated by smart devices. In this paper, we propose a computational offloading strategy for minimizing delay based on the back-pressure algorithm (BMDCO) to get the offloading decision and the number of tasks that can be offloaded. Specifically, we first construct a system with multiple local smart device task queues and multiple edge processor task queues. Then, we formulate an offloading strategy to minimize the queue length of tasks in each time slot by minimizing the Lyapunov drift optimization problem, so as to realize the stability of queues and improve the offloading performance. In addition, we give a theoretical analysis on the stability of the BMDCO algorithm by deducing the upper bound of all queues in this system. The simulation results show the stability of the proposed algorithm, and demonstrate that the BMDCO algorithm is superior to other alternatives. Compared with other algorithms, this algorithm can effectively reduce the computation delay.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 253
Author(s):  
N. Srinivasu ◽  
O. Sree Priyanka ◽  
M. Prudhvi ◽  
G. Meghana

Cloud Security was provided for the services such as storage, network, applications and software through internet. The Security was given at each layer (Saas, Paas, and Iaas), in each layer, there are some security threats which became the major problem in cloud computing. In Saas, the security issues are mainly present in Web Application services and this issue can be overcome by web application scanners and service level agreement(SLA). In Paas, the major problem is Data Transmission. During transmission of data, some data may be lost or modified. The PaaS environment accomplishes proficiency to some extent through duplication of information. The duplication of information makes high accessibility of information for engineers and clients. However, data is never fully deleted instead the pointers to the data are deleted. In order to overcome this problem the techniques that used are encryption[12], data backup. In Iaas the security threat that occurs in is virtualization and the techniques that are used to overcome the threats are Dynamic Security Provisioning(DSC), operational security procedure, for which Cloud Software is available in the market, for e.g. Eucalyptus, Nimbus 6.


2021 ◽  
Vol 9 (1) ◽  
pp. 80-91
Author(s):  
Adi Widiatmoko Wastumirad ◽  
Moh Irzam Darmawan

Today, the internet has become the most used tool for delivering information. Through the internet, people can search for information by freely accessing a web page. This freedom of access often raises security issues in the website provider's internal network. These security issues can be in the form of misuse of information, threats, and other attacks on the provider's internal network. Based on these conditions, a technique is needed to protect important data on the website owner's server from various attacks. In this research, a Honeypot security system has been implemented using Dionaea and Kippo in the Demilitarized Zone to increase the security of a network. The methodology of this research is Waterfall Model for software engineering. The system that has been built is able to detect, take action, record attack logs and display them in the form of a website in real time.


Repositor ◽  
2020 ◽  
Vol 2 (4) ◽  
pp. 475
Author(s):  
Ilfan Arif Romadhan ◽  
Syaifudin Syaifudin ◽  
Denar Regata Akbi

ABSTRAKPerlindungan terhadap keamanan jaringan merupakan hal yang sangat penting untuk dilakukan. Mengingat kemudahan dalam mengakses jaringan memungkinkan adanya gangguan dari pihak yang ingin menyerang, merusak, bahkan mengambil data penting. Honeypot memang tidak menyelesaikan masalah pada keamanan jaringan, namun honeypot membuat penelitian tentang serangan menjadi lebih sederhana dengan konsep yang mudah untuk dimengerti dan dimplementasikan. Penelitian ini menerapkan beberapa honeypot menggunakan Raspberry pi dan ELK stack untuk monitoring hasil yang didapatkan oleh honeypot. Tujuan dari penelitian ini untuk merancang sistem yang mampu mendeteksi serangan pada jaringan menggunakan honeypot. Raspberry pi digunakan sebagai sensor honeypot untuk pemantauan ancaman keamanan terbukti hemat biaya dan efektif menggantikan komputer desktop. ELK stack memudahkan pemusatan data dari berbagai sumber dan membuat analisis log yang awalnya rumit untuk dianalisis menjadi lebih menarik.ABSTRACTProtection of network security is very important to do. Given the ease in accessing the network allows for interference from parties who want to attack, destroy, and even retrieve important data. Honeypot does not solve the problem on network security, but the honeypot makes research about attacks become simpler with concepts that are easy to understand and implement. This research applies some honeypot using Raspberry pi and ELK stack for monitoring result obtained by honeypot. The purpose of this research is to design a system capable of detecting attacks on a network using a honeypot. Raspberry pi is used as a honeypot sensor for monitoring proven cost-effective and cost-effective security threats to replace desktop computers. The ELK stack facilitates the convergence of data from multiple sources and makes log analysis initially complex for analysis to be more interesting.


Author(s):  
Mohamad Alameddine ◽  
Hussein Soueidan ◽  
Maha Makki ◽  
Hani Tamim ◽  
Eveline Hitti

BACKGROUND The use of smart devices (SD) by healthcare providers in care settings is a common practice nowadays. Such use is not restricted to applications related to the care of patients but often extends to personal calls and applications with frequent prompts and interruptions. This enhances the risk of distractions caused by SD in the hospital settings and raises concerns on service quality and patient safety. Such concerns are exacerbated in complex care settings like the Emergency Department (ED). OBJECTIVE This study measured the frequency and patterns of SD use among healthcare providers in the ED of a large academic health center in Lebanon. The perceived consequences of care providers on using SDs on the provider-provider communication and the care quality of patients in ED were further assessed. The study further examined the factors associated with the use of smart devices and measured the approval for regulating such use. METHODS The study was carried at the ED of an academic health center in Lebanon. The ED received the highest volume of patient visits in the country. Data was collected using a cross-sectional electronic survey sent to all ED healthcare providers (n=236). The target population included core ED faculty members, attending physicians, residents, medical students, and the nursing care providers. RESULTS Half of the target population responded to the questionnaire. A total of 85.6% of the respondents use one or more medical applications on their smart devices. The respondents believed that using the SD in the ED improved the coordination among the care team (81.6%) and that it was beneficial to patient care (78.9%). In addition, 41.1% of the respondents acknowledged they were distracted when using their SD for non-work purposes. Furthermore, 54.8% of the respondents acknowledged having witnessed their colleagues committed a near miss or an error due to the smart device-caused distractions. Regression analysis revealed that age and missing information due to using the SD are major predictors of committing an error at the ED (p<0.05). Interestingly, more than 40% of the respondents were significantly addicted to using SD and more than third of them felt the need to cut down on such use. CONCLUSIONS The findings of this study make it imperative to safeguard the safety and wellbeing of patients, particularly in high intensity, high volume department such as the ED. Irrespective of the positive role the SD play in the healthcare process, the negative effects of its use mandate proper regulation. This is an ethical mandate taking into consideration the important consequences such use may have on care processes and outcomes.


Author(s):  
Nuha Iter

The study aimed to explore the negative effects of using smart devices on the physical and psychological health of children aged (13-16) years from their perspective. The study was applied to a random sample of children aged (13-16), consisting of (102) male and female students. The descriptive method was used to answer the study questions, and a questionnaire was developed to collect data, which contains (3) sections, first section asked about the most used and preferred devices by children aged (13-16) years, and the number of hours the child used the smart device, the second one asked about the negative effects of using the smart devices on the physical and psychological health of children aged (13-16) years from their perspective, and the third section is an open question to know other negative effects of using the smart devices on the physical and psychological health of children aged (13-16) years. The study achieved a set of results, such as the smartphones are the most used and preferred devices by children aged (13-16) years, where (57%) of the study sample preferred to use, and there is  (86.3%) of children aged (13-16) use these devices at average from 4 up to 6 hours daily.  The responders highly agreed upon the negative effects of the use of smart devices on the physical health with average (4.2); which is a high degree, also the responders highly agreed upon the negative effects of  the use of smart devices on the physiological health with average  is  (3.73) which is also high,  added there are other effects caused by the use of smart devices for long hours on  children aged (13-16); the low rate of family discussions, and causes the low writing skills for child.   Depending on the results of the study, the researcher recommends that:  researchers should conduct a correlative study to know the relationship between the effects and the number of hours of daily use of devices; families should rationalize the use of smart devices.


Sign in / Sign up

Export Citation Format

Share Document