scholarly journals Using I2P Encrypted Virtual Tunnels for a Secure and Anonymous Communication in VANets: I2P Vehicular Protocol (IVP)

Author(s):  
Tayeb Diab ◽  
Marc Gilg ◽  
Frederic Drouhin ◽  
Pascal Lorenz

Abstract Providing security and anonymity within VANet requires application of robust and secure models that meet several characteristics of VANet. I2P as a secure protocol designed to anonymize the communication on the internet, can be used as a reference model to develop new mechanisms of security and anonymity in VANet. I2P uses robust mechanisms and strong algorithms to reinforce the security and the anonymity of the communication. However, the difference between internet and VANet in terms of mobility and connectivity of nodes presents a big issue that needs to be treated when using I2P mechanisms in VANet. In the previous work [1], we propose a protocol based on tunnels and encryption algorithms that use digital signatures and authentication mechanisms. Tunnels are created in static scenarios and without maintaining their existence. In this paper, we complete the last version of the proposed protocol (I2P Vehicular Protocol) by integrating a tunnel maintenance algorithm for maintaining the existence of the created tunnels during the communication. This algorithm allows the implementation of the protocol in mobile scenarios of VANet. The effectiveness and security of IVP protocol are proved by analyzing the added part related to the tunnel maintenance process and showing performance results (end-to-end delay, PDR and overhead). Simulation scenarios were executed using NS3 simulator.

Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


2021 ◽  
Vol 17 (1) ◽  
pp. 260-264
Author(s):  
Alexandru VULPE ◽  
Raluca ANDREI ◽  
Alexandru BRUMARU ◽  
Octavian FRATU

Abstract: With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in networks (including the Internet) have made security issues very important devices as well as for users. One of the main methodologies that ensures data confidentiality is encryption, which protects data from unauthorized access, but at the cost of using extensive mathematical models. Due to the nature of IoT devices, the resources allocated to a device can be constrained by certain factors, some of which are related to costs and others to the physical limitations of the device. Ensuring the confidentiality of data requires the use of encryption algorithms for these interconnected devices, which provide protection while maintaining the operation of that device. The need for these types of algorithms has created conditions for the growth and development of the concept of lightweight encryption, which aim to find encryption systems that can be implemented on these categories of devices, with limited hardware and software requirements. The paper proposes a lightweight cryptographic algorithm implemented on a microcontroller system, comparing its performances with those of the already existing system (based on x86).


10.2196/24971 ◽  
2021 ◽  
Vol 4 (1) ◽  
pp. e24971
Author(s):  
Pengyi Zhu ◽  
Benjamin K P Woo

Background Herpes zoster affects approximately 1 million people annually in the United States, with postherpetic neuralgia as the most common complication. The frequent prescription of opioids as the first-line medication for herpes zoster or postherpetic neuralgia contributes to the increasing health care costs of their treatment. Despite the advent of internet retailers providing alternative products for the prevention and management these conditions, there are limited studies on the availability, ingredients, and consumer preference for the products. Objective This study used the internet retailer Amazon to determine the availability of products for the management of herpes zoster and postherpetic neuralgia, and assessed consumer preference based on listed ingredients. Methods The internet retailer Amazon was used to perform a search for products related to “shingles” in September 2020. Top products sorted by reviews and ratings were determined to be either shingles-specific (including “shingles” in either the product title or description) or shingles-nonspecific. Analysis of price, rating, type of vehicle, and ingredients was performed. The types of vehicles, ingredients, and percentages of positive and negative reviews related to “shingles” of the product groups were analyzed with a two-tailed two-sample proportions Z-test to assess the difference between shingles-specific and shingles-nonspecific products. Statistical significance was judged at P<.05. Results The top 131 products among over 3000 products retrieved were determined based on a rating of 4 or more stars after searching for the term “shingles” on Amazon. Forty-six of the 131 products (35.1%) were shingles-specific. Shingles-nonspecific products were more likely to have positive reviews mentioning “shingles” (P=.005). Vehicles, balms (P=.02), and salves (P=.04) were more likely to be shingles-specific, whereas tablets or capsules (P=.002) were more likely to be shingles-nonspecific. Among the ingredients analyzed, aloe vera was the top-ranked ingredient, included in 29 of the 131 total products (22.1%). Aloe vera (P=.01), lemon balm (P<.001), vitamin E (P=.03), and peppermint oil (P=.008) were more likely to be included in the shingles-specific products, whereas magnesium (P=.01) was more likely to be included in shingles-nonspecific products. Conclusions There is an abundance of products and ingredients being used for the management and treatment of shingles with certain ingredients preferred by consumers. There is a discrepancy between approved ingredients and the ingredients preferred by consumers. Furthermore, there are insufficient studies on ingredients used by consumers on internet retailers such as Amazon, and future studies can focus on the effectiveness of popular ingredients to decrease misinformation on the internet.


2020 ◽  
Vol 8 (6) ◽  
pp. 5759-5764

Given the current use of the Internet, The most important thing is to provide security to the user's information. Many encryption algorithms already exist for this purpose. Here we discussed a new process called Mahaviracharya Encryption Standard. MES is a symmetric encryption algorithm. Here, this algorithm is cryptanalyzed, and compared with blowfish algorithm. MES algorithm can be used instead off algorithms like AES, Blowfish etc.


Author(s):  
Hassan Rahnaward Ghulami ◽  
Mohd Rashid Ab Hamid ◽  
Mohd Reza Ibrahim ◽  
Ali Hikmat ◽  
Hussein Aziz

This study evaluates the relationship between Internet addiction and academic performance among students of eight Afghan universities. The differences between internet addiction in terms of gender was also identified. The survey/research method adopted the Internet Addiction Test (IAT) based on Young’s survey applied with some modifications. From 1000 distributed questionnaires only 976 participants (358 females, and 618 males) were responded completely. The descriptive analysis was used to identify the demographic characteristics of student’s Internet usage profile. The independents sample t-test was performed to determine the differences in the level of Internet addiction in terms of gender. Statistical significance was set at a value of p <0.01. Likewise, the correlation test was implemented to identify the relationship between Internet addiction and academic performance, with referencing of sample. The results indicated that statistically there is a significant correlation among Internet addiction and academic performance. Results also indicated that statistically there were significant differences between Internet addictions in terms of demographic characteristics. This study suggests that future researchers need to work on large sample while conducting the related research. It emphasizes that students should concentrate more on their academic activities than spending time on unnecessary Internet surfing. Findings also revealed that, in Afghanistan the problem of Internet addiction is not a serious challenge, but this information should be disseminated among undergraduate university students to stop the indulgent in using the Internet.


Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Saryanto Saryanto ◽  
Sumarsono Sumarsono ◽  
Nurcahyani Dewi Retnowati

Data communication in the internet today is so complex as an example of the speed factor becomes very important in communicating, everyone wants fast data communication services provided in order to maximum. In relation to the application as a communication liaison with client server applications, web service using a data serialization format to transmit the data. Before the data is sent, either fromthe client to the server or vice versa, should be modified in a specific data format beforehand according to the web service is used. Types of data serialization format used in the web service such as XML and JSON. The method used for testing include data serialization method, data measurement method and data parsing method. Data serialization method is used to calculate the time serialization of data from the database to the form of XML and JSON in applications with PHP platform. Data measurement method used to measure the size of the XML and JSON data which based on many fields of data serialization process. Data parsing method is used to calculate the processing time and JSON parsing XML data. Results o f comparative analysis o f XML and JSON in PHP applications using thearchitecture Rest can be concluded that the test result o f the difference in time and time serialization and JSON parsing XML data is influenced by the number o f records, if the number of records the greater the difference in eating time data serialization and parsing the data the greater the time also itcan be concluded that the faster the process JSON serialization and parsing XML data is compared. Testing results o f the JSON data size is smaller than the size of XML. Data exchange using XML format has a size limit of up to 31456.31 KB while JSON XML exceeds the size limit. Testing results on the Internet when the number o f records up to 50,000 data when the data serialization and parsing time data can not be detected in the database.


2021 ◽  
Author(s):  
Jianchen Luo ◽  
Jing Ma ◽  
Liangliang Xu ◽  
Lian Li ◽  
Ming Zhang ◽  
...  

BACKGROUND The Internet has gradually become the most important way for people to search for information. Increasing number of people searched for relevant information or even treatment plans on the Internet when they get health problem. The reliability of the medical information provided online remains to be proved. Wikipedia and Baidu Encyclopedia are the most widely used search engines in English and Chinese, respectively. The quality of the medical information they provide needs to be assessed. OBJECTIVE This study aimed to evaluate the quality and timeliness of medical information related with digestive system malignancy retrieved from Wikipedia and Baidu Encyclopedia. Comparison was made between the 2 encyclopedias. We conducted a 3-year follow-up to find out if the quality and timeliness of articles improved. METHODS We conducted a search based on International Statistical Classification of Diseases and Related Health Problems 10th Revision Version 2016 codes in Wikipedia and Baidu Encyclopedia, and evaluated articles related to digestive system malignancy by using the DISCERN instrument. We calculated the update interval of the webpages to evaluate the update timeliness of these websites. RESULTS In 2017 and 2020, we searched out a total of 50 and 52 articles from Baidu Encyclopedia, with 2 articles increased and no article missed. 30 and 32 articles were found in Wikipedia, with 1 article increased and no article missed. According to the scores evaluated by DISCERN instrument. In both 2017 and 2020, Wikipedia scored higher than Baidu Encyclopedia in section1 and section2, and it's statistically significant. Wikipedia scored higher than Baidu Encyclopedia in Section3, but it's not statistically significant. The total score of Wikipedia was higher than Baidu Encyclopedia, and the difference was statistically significant. The update interval of Wikipedia is shorter than that of Baidu Encyclopedia, with better timeliness and statistical significance. CONCLUSIONS The quality and timeliness of digestive system malignancy relative articles on Wikipedia are better than those on Baidu Encyclopedia. Both Baidu Encyclopedia and Wikipedia articles have improved in quality over the past three years. However, the treatment information obtained from the Internet still can’t guarantee its comprehensiveness or reliability. Patients should consult a medical professional directly.


2008 ◽  
pp. 1434-1442
Author(s):  
Calin Gurau

The development of the World Wide Web has created new opportunities for interpersonal interaction. The Internet allows one-to-one (e-mail), one-to-many (Web sites, e-mail lists) or many-to-many (online discussion forums) interaction, which represent a unique feature in comparison with traditional communication channels (Armstrong & Hagel, 1996). On the other hand, the Internet has specific characteristics, such as: • Interactivity: The Internet offers multiple possibilities of interactive communication, acting not only as an interface, but also as a communication agent (allowing a direct interaction between individuals and software applications) • Transparency: The information published online can be accessed and viewed by any Internet user, unless this information is specifically protected • Memory: The Web is a channel not only for transmitting information, but also for storing information¾in other words, the information published on the Web remains in the memory of the network until it is erased. These characteristics permit the development of online or virtual communities¾groups of people with similar interests who communicate on the Web in a regular manner (Armstrong & Hagel, 1996; Goldsborough, 1999a, 1999b; Gordon, 2000). Many studies deal with the ethics of research in Cyberspace and Virtual Communities (Bakardjieva, Feenberg, & Goldie, 2004), but very few publications relate with the Codes of Ethics used in Public Discussion Forums (Belilos, 1998; Johnson, 1997). Other specialists have analyzed specific categories or uses of online discussion forums, such as online learning (Blignaut & Trollip, 2003; DeSanctis, Fayard, Roach, & Jiang, 2003) or the creation of professional communities of practice (Bickart & Schindler, 2001; Kling, McKim & King, 2003; Millen, Fontaine, & Muller, 2002), and in this context, have also discussed briefly the importance of netiquette and forum monitoring (Fauske & Wade, 2003, 2004). The difference between these online communities and public discussion forums is the degree of control exercised on the functioning and purpose of the forum by a specific individual or organization. This article attempts to investigate, analyze and present the main patterns of the codes/rules of ethics used in the public discussion forums, otherwise known as Newsgroups, and their influence on the profile and functioning of the community.


2018 ◽  
Vol 12 (4) ◽  
pp. 452-471 ◽  
Author(s):  
Maryna Chepurna ◽  
Josep Rialp Criado

Purpose Value co-creation is an important topic of interest in marketing domain for the past decade. Co-creation via the internet has received a particular attention in the literature (O’Hern and Rindfleisch, 2010). Although there have been substantive number of studies of what motivates customers to participate in value co-creation in the internet-based platforms, there is a lack of research of what the deterrents are that may prevent customers from contributing their ideas online. This research was undertaken to define the deterrents from the customers and companies’ point of view. Furthermore, the difference, if exists, between the users’ and marketing professionals’ ranking of the inhibitors to co-creation online is also studied. Design/methodology/approach This exploratory qualitative research is based on 20 in-depth semi-structured interviews with customers and 20 in-depth semi-structured interviews with marketing specialists from different companies. Spearman’s rank correlation is applied to explore the relationship between the internet users’ and marketers’ responses. Findings There are nine constraining factors. The results show that although there is a repetition of the mentioned constraining factors indicated by the both groups of the interviewees, the ranking of the barriers is distinctive. Research Implications New conceptual information is received on what restrains customers from co-creation from both customers’ and companies’ point of view. Practical Implications This paper explains the potential problems to be confronted when launching a co-creation project in the internet-based platforms and offers managers a preliminary guide to comprehension of the users’ deterrents rating. Originality The paper that defines deterrents to co-creation online.


Sign in / Sign up

Export Citation Format

Share Document