scholarly journals The solution to improve information security for IoT networks by combining lightweight encryption protocols

Author(s):  
Nguyen Van Tanh ◽  
Ngo Quang Tri ◽  
Mai Manh Trung

With the strong development of Internet platforms today, many new technologies are applied in most areas of human social life. The development of the internet of things (IoT) has brought to the networking world many innovations with new protocols. Along with that is the complexity of security issues that greatly affect personal data, and limited resources in information technology development and applications. Many security solutions have been researched but none of them is completely effective for the IoT network because of the characteristics of energy, limited resources, processing capacity as well as operating costs. Therefore, we propose an effective solution for comprehensive protection of IoT systems against attacks to network security with improved security protocols. By combining security solutions on the layers of the IoT and code improvement, algorithmic enhancement positively contributes to this important task. In the article, we propose to improve and combine the DTLS Protocol and the overhearing mechanism and then have some experiments to prove the effectiveness, feasibility, economical and appropriate on popular IoT network models.

2021 ◽  
Author(s):  
ChS Pavlov ◽  
DL Varganova ◽  
AA Svistunov ◽  
C Gluud

In the age of information technology development, healthcare professionals around the world have the opportunity to simultaneously access advanced scientific developments, modern achievements, and the results of new clinical trials. The clinical guidelines of the international medical communities are based on the results of meta-analyses of clinical trial data. As new medical challenges emerge, clinical trial data are reviewed and re-analyzed. Unfortunately, to date, the results of not all studies are made public, or are presented selectively, indicating the positive effects of a particular technology (intervention), which makes it difficult to critically evaluate the results of work and makes the task of assessing the true effectiveness of the intervention more difficult. The problem of transparency of research data with the preservation of personal data of participants remains relevant for decades. This article is focused on possible ways of solving this problem and the analysis of the current situation in the world.


Author(s):  
Fjodor Ruzic

The new digital technologies open the space for changing the way that business works creating new demands on information processing in organizations. Organization response to technological changes was enabled by information technology improvements and digital organizations should develop new capabilities that anticipate and respond to new opportunities in their business ecosystems. In the context of transformative trends driving with the information technology development, ubiquitous computing creates an environment where embedded processors, computers, sensors, and digital communication technologies are available everywhere. Further, the Internet-of-things creates a new form of networked computing where advanced applications intelligently monitor and control remote sensors, mobile devices, and smart machines. Along with the information technology development digital organizations need to develop operational technology in the same way. Thus, the process of convergence is needed, and it strongly depends on harmonization of information and operational technologies strategies.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

The rise of the Internet of Things (IoT) has driven mobile applications development. As a result, in the consumer IoT (CIoT) space, any product usually comes with a smartphone application to either control, programme, or just view what is happening with the product. The IoT brings with it opportunities and challenges to consumers. For example, IoT technology makes it possible to connect all of a person’s devices to create a smart eco-system or assemblage. However, the biggest threat in CIoT is personal data security. This study utilized a qualitative narrative inquiry and Delphi technique to explore data security issues that come with CIoT assemblages and associated mobile applications in South Africa. The study established that consumers enjoy the convenience and benefits that IoT technology brings. It is concluded that for CIoT to thrive, safety is crucial, and all the stakeholders in the IoT assemblage need to ensure the protection of consumers.


2017 ◽  
Vol 16 (4) ◽  
pp. 367-391
Author(s):  
Martin David ◽  
Magdalena Wallkamm ◽  
Alena Bleicher

Technologies impact societies in manifold and often unforeseen ways. In several fields of technology (e.g. nanotechnology, biotechnology) it has been argued that reflexive modes of technology development are appropriate to deal with this challenge. A central aim of reflexive modes is the integration of broader societal perspectives early in technology development processes in order to achieve a more (societal) responsible way of technology development. Whereas social scientific accounts on mining and resource extraction emphasize topics like corporate social responsibility, occupational safety, or distributive justice, little light is shed on the possibility of more reflexive modes that integrate societal perspectives early on in the development of resource extraction technologies. These technologies decisively influence social life worlds. Within this article we will shed light on mining technologies, and discuss the relevance of early integration of societal concerns into their development. We argue that an early integration of these concerns can help to shape new technologies in societally responsible ways, and by so doing, to deal with globally increasing opposition to resource extraction operations. To underline this argument, the article delineates four major challenges connected to technology development and application in the domain of resource extraction: the identification of the problems’ locus, knowledge integration, the consideration of non-knowledge, and the reflection of manifold roles that actors have in technology development contexts. The article concludes with future research challenges for technology development in the domain of resource extraction.


2020 ◽  
Vol 14 (3) ◽  
pp. 44-53
Author(s):  
N. E. Sokolinskaya ◽  
L. M. Kupriyanova

The relevance of the article is because in parallel with the processes of introduction of innovations in the field of automation and computerization of the banking system, the number of types of banking risks associated with innovations in the field of on-line customer service and internal Bank reporting, as well as information systems. As a result of this article, we have studied the latest legislative acts of the Central Bank of Russia as a mega-regulator and summarized the practice of both individual credit institutions and the banking sector in the field of information technology development risks in the banking sector. To strengthen the development of new financial technologies in the digital economy, it is necessary to regularly discuss the emergence of new phenomena and innovations; to consider the possibility of further analysis of existing methodological developments to exchange best practices of banks. Building an effective it security risk management system is not a one-time project. Still, a complex process is important, focused on minimizing external and internal threats and taking into account the limitations on resources and time factor


2020 ◽  
Vol 22 (12) ◽  
pp. 5-9
Author(s):  
Livak N.S. ◽  
Klimova I.V. ◽  
Lebedikhin V.V.

Modern youth and the student community today play a key role in the development of social and social life. Due to the peculiarities of the university space, the student community is in constant interaction and communication, both in the framework of the educational process and events of various formats, and in social and everyday conditions. In the context of interactions, this social group, which is most at risk of spreading negative ideologies that threaten not only the personal security of everyone, but also peaceful coexistence in the conditions of a multinational society in Russia. In the absence of educational measures as a prevention, an unfavorable environment arises in which it is very easy to influence the thinking of young people, their involvement in nationalist movements, extremist activities, etc. Hence the concept of «youth extremism» appears, which is manifested in the views and behavior of young people based on the manifestation of aggression and non-acceptance of dissenters. The search for new technologies of psychological support that allow to form cultural tolerance, value orientations and prevent the spread of extremist ideologies becomes relevant. The authors consider a set of measures that contribute to the generalization, dissemination, as well as the introduction into the student environment of the best practices of spiritual and moral education, the development of interethnic and interreligious dialogue, and the prevention of negative ideologies. To implement these tasks, it is necessary to form a pool of specialists in the prevention of extremism in the student environment, hold seminars and meetings for vice-rectors of universities on security and educational work, as well as educational seminars for managers of student organizations. This will make it possible to form leadership student associations that broadcast the values of cultural tolerance to the youth environment.


Author(s):  
Ihor Melnychuk

Nowadays RF have a lot of obstacles. The intense process of globalization, the rapid development of information technology, development of a new instruments of geo-cultural and ideological influence not only lead to problems in the way of expansion of the Russian world, but also to the need to enhance the security of the current geo-cultural space of Russian Federation and design its system concept. The author notes that the new internal doctrine of RF is penetrated by a nostalgia for a powerful state status. Its main task is to strengthen the unity of society by strengthening civic identity. Therefore we do not underestimate the practical importance of theoretical developments in cultural, ideological and informational spheres. The ideology which promoted by Russian state media includes the concept of «russkiy mir» that actually justify claims to territories which are inhabited by ethnic Russians. This idea appeals to the Orthodox fundamentalism, as well as the Eurasian geopolitical and historical myths of permanent confrontation between Russia and the West. The main reason for the success of ideological propaganda – in a primitive but effective substitution of concepts. In conclusion the author stresses that the process of forming a single geo-cultural world of the Russian Federation does not impose functional and effective integration ideology and current Russian civilization and socio-cultural projects are not attractive and competitive position to societies and elites of neighbor states but can be used to consolidate the political situation inside Russia. Keywords: Political and ideological principles, Russian Federation, cultural and ideological spheres, information sphere, geo-cultural world, civic identity


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


Sign in / Sign up

Export Citation Format

Share Document