scholarly journals Applying attribute-based encryption on mobile devices

Author(s):  
Nhan Tam Dang ◽  
Hai-Duong Le ◽  
Son Thanh Le ◽  
Ha Manh Tran

The 21st century has witnessed the rapid development of small and convenient mobile devices such as smartphones, tablets, game players, sensor nodes, etc. The rise of such mobile devices indicates the increase of colossal data transmission through the Internet and online services along with the challenges of data security. It is common to think of a solution to protect sensitive data from unauthorized users, and the most popular solution is to use encryption. While many research activities in functional encryption have widely been applied to network devices, computers, and applications, mobile devices still attract much attention to security issues due to the limitations of system resources, connectivity, data transmission and power consumption that malicious users can exploit to launch attacks. Especially, mobile devices have become a principal tool to share data on the Internet through online services, such as Facebook, Youtube, DropBox, Amazon, Online Games, etc. This paper presents a study of the Attribute-Based Encryption (ABE) scheme that exploits user attributes to build the secret key and the ciphertext. ABE encryption is specified by a set of attributes or a policy defining attributes that users possess. The paper also describes a few implementations of ABE applied in the cryptography community and the challenges of integrating ABE into real-world applications. Finally, the paper proposes an implementation of ABE for Android mobile devices. This implementation associated with the Kerberos protocol can be applied to secured data sharing applications. The Kerberos protocol aims at providing mutual authentication for the client server model. Experiments have evaluated the proposed ABE implementation on Android mobile devices along with the Kerberos system. The evaluation also includes ABE performance with discussions and lessons learned.

2012 ◽  
Vol 452-453 ◽  
pp. 932-936
Author(s):  
Xiang Dong Hu ◽  
Peng Qin Yu

With the rapid development of ubiquitous network and its applications, the key technologies of the Internet of things are actively researched all over the world. The Internet of things has tremendous attraction for adversaries, and it is easily attacked due to poor resource and non-perfect distribution of sensor nodes, then false data maybe be injected into network. Security is one of the most important demands for applications in the Internet of things, an algorithm of malicious nodes detection is proposed to protect the network from destruction based on weighted confidence filter, namely, the cluster heads take charge of collecting messages from nodes and computing their average of confidence in cluster-based network, then they aggregate data from nodes with higher confidence than average and ignore the others, they update confidence of each node by comparing the aggregation value and the received data, and regard it as the weight of exactness of message from node. A sensor node is judged to be a malicious one if its weight is lower than the set threshold. The simulation results show that the algorithm can detect malicious nodes with high detection ratio, low false alarm ratio and outstanding scalability.


2018 ◽  
Vol 73 ◽  
pp. 13024 ◽  
Author(s):  
Suryono Suryono ◽  
Sunarno Sunarno ◽  
Ragil Saputra

Greenhouse is a very effective method of matching and has been able to contribute to food independence in various countries. Plants that are in the greenhouse must be maintained with chemical-physical parameters in order to grow optimally. Monitoring of plants in greenhouses must always be done. Some monitoring reports have been made online so that they can provide solutions as quickly as possible if there is a disturbance on the plants. Unfortunately, online monitoring is still dependent on internet networks that require network infrastructure needs that have many limitations. As a result, many agricultural lands are not covered by the internet network to monitor the greenhouse. The use of a large number of sensor nodes also affects the decline in available broadband internet performance so as to reduce monitoring performance. In this research proposed a fog network that connects the sensor node with the local fog server via a WIFI network. Sensor node has been built with a system on chips WIFI-Microcontroller ESP8266 to perform data acquisition and temperature sensor data transmission, relative humidity and light intensity using the WIFI network to the fog server. In this study testing the accuracy of sensor parameters used and network performance by comparing with the use of cloud networks. From the tests performed, the results of Mean Absolute Percent Error (MAPE) were obtained for each parameter, temperature = 1.3%, humidity: 1.9% and light intensity: 0.6%. The use of the fog network has proven to not contribute significantly to the error value of measurement data sent to the server. The use of WIFI on the fog network requires less network broadband needs when compared to cloud networks. This difference is very significant, which is an average of 253 BPS if using a fog network and 1276 BPS if using a cloud network. From the experiments conducted, the use of networks for proven to have a high data transmission speed with value 471 ms when compared to the internet network with value 1349 ms. Variations in the number of sensor nodes up to 5 nodes do not significantly affect that speed.


Elkawnie ◽  
2020 ◽  
Vol 6 (1) ◽  
pp. 121
Author(s):  
Novan Wijaya

Abstract : The rapid development of the internet has an impact on the security of data sent using internet media. One government agency that uses the internet as data transmission includes the KPU. Data transmission becomes very risky especially the data sent is very important and even confidential. In the internet world, there are many threats and ways to change or retrieve data sent via the internet. Indonesia in particular has conducted direct elections but the data that are in the regions which are the results of recapitulation of the elections will be sent via the internet with a system provided by the KPU. Data from the recapitulation of regional elections becomes very important because it can be changed by intruders. Secure the data sent, methods such as cryptographic techniques that can minimize interference from intruders are needed. One algorithm that can be applied as data security is the GOST algorithm. The GOST algorithm is designed to take a balance between data efficiency and security. Cryptographic techniques that use the GOST algorithm are expected to be able to increase the security of sending election results from various threats without reducing the performance of sending data. The rapid development of the internet has the impact of the security of data sent using internet media. One government agency that uses the internet as data transmission includes the KPU. Data transmission becomes very risky especially the data sent is very important and even confidential. In the internet world, there are many threats and ways to change or retrieve data sent through internet media. Indonesia in particular has conducted direct elections but the data that are in the regions which are the results of recapitulation of the elections will be sent via the internet with a system provided by the KPU. Data from the recapitulation of regional elections becomes very important because it can be changed by intruders. Secure the data sent, methods such as cryptographic techniques that can minimize interference from intruders are needed. One algorithm that can be applied as data security is the GOST algorithm. The GOST algorithm is designed to take a balance between data efficiency and security. Cryptographic techniques that use GOST algorithm can improve the security of sending election results from various threats without reducing the performance of sending data. Election result data that was conducted during the testing was the Ogan Ilir regional election recap data. Tests that have been carried out using the GOST algorithm using WireShark produce stream files sent over the network are not easily identified because they are converted into random strings, so it takes a long time to analyze them.Abstrak : Perkembangan internet yang sangat cepat mempunyai dampak diantranya keamanan data yang dikirim menggunakan media internet. Salah satu instansi pemerintahan yang menggunakan internet sebagai pengiriman data diantaranya KPU. Pengiriman data menjadi sangat beresiko terlebih data yang dikirimkan sangat penting bahkan bersifat rahasia. Didunia internet terdapat banyak ancaman serta cara dalam mengubah atau mengambil data yang dikirimkan melalui media internet. Indonesia pada khususnya telah melakukan pemilu secara langsung tetapi data-data yang berada pada daerah yang merupakan hasil rekapitulasi dari pemilu akan dikirimkan melalui internet dengan sistem yang telah disediakan oleh KPU. Data hasil rekapitulasi pemilu suatu daerah menjadi sangat penting dikarenakan bisa diubah oleh intruder. Untuk mengamankan data yang dikirimkan diperlukan metode seperti teknik kriptografi yang bisa meminimalisir gangguan dari para intruder. Salah satu algoritma yang bisa diterapkan sebagai keamanan data yaitu algoritma GOST. Algoritma GOST dirancang agar mengambil keseimbangan antara efisiensi dan keamanan data. Teknik kriptografi yang menggunakan algoritma GOST mampu meningkatkan keamanan pengiriman data hasil pemilu dari berbagai ancaman tanpa mengurangi performansi dari pengiriman data. Data hasil pemilu yang dilakukan saat pengujian ialah data rekap pilkada Ogan Ilir. Pengujian yang telah dilakukan menggunakan algoritma GOST menggunakan wireshark menghasilkan stream file yang dikirim melalui jaringan tidak mudah diidentifikasi dikarenakan diubah menjadi string acak sehingga membutuhkan waktu yang lama untuk menganalisanya.


2020 ◽  
Vol 10 (11) ◽  
pp. 3784
Author(s):  
Kyeong Mi Noh ◽  
Jong Hyuk Park ◽  
Ji Su Park

With the continuous development of wireless communication technology, the Internet of Things (IoT) is being used in a wide range of fields. The IoT collects and exchanges large amounts of data with objects, either tangible or intangible, such as sensors or physical devices, connected to the Internet. Wireless sensor networks (WSNs) are components of IoT systems. WSNs are used in various IoT systems, such as monitoring, tracking, and detection systems, to extract relevant information and deliver it to users. WSNs consist of sensor nodes with low power, low cost, and multiple functions. Because sensor nodes have limited resources, such as power and memory, a reduction in the energy efficiency of the sensor nodes in WSNs will lead to a decrease in wireless network performance and an increase in packet loss, which affects IoT system performance. Therefore, this study aimed to find an energy-efficient routing method that extends the lifetime of WSNs by minimizing the battery use of sensor nodes to improve the network performance of IoT systems. Conserving energy from sensor nodes and increasing network throughput in WSNs involves having protocols. The low-energy adaptive clustering hierarchy (LEACH ) protocol is a well-known hierarchical routing protocol in WSNs that constructs clusters and transmits data. LEACH increases energy efficiency by transmitting data from sensor nodes to the base station (BS) through the cluster head. It is widely adopted in the WSN network field, and many protocols are being studied to improve cluster header selection and data transmission to increase the energy efficiency of sensor nodes. In this study, we attempted to improve energy efficiency by removing unnecessary energy from LEACH. In LEACH, when the sensor node is located between the BS and the cluster head, the sensor node transmits data to the cluster head in the opposite direction of the BS. The data sent to the cluster head are transmitted in the direction of the BS. Thus, transmission in the opposite direction consumes unnecessary energy and affects the WSN performance of IoT systems. In this study, we propose a D-LEACH (direction-based LEACH) protocol based on the received signal strength indicator (RSSI) that improves the efficiency of transmission energy considering the data transmission direction of sensor nodes. D-LEACH aims to balance the energy of the sensor nodes and improve the performance of WSNs in the IoT system by reducing unnecessary energy consumption caused by reverse transmission considering the data transmission direction of the sensor nodes. In the course of the paper, we refer to the routing protocol of WSNs to improve network performance and describe LEACH. We also explain the D-LEACH protocol proposed in this paper and confirm the performance improvement of WSNs in an IoT system through simulation.


Author(s):  
Tetyana Jezhyzhanska

In the information society the status of information is changing: this main value of global civilization becomes an important resource of socio- economic, technological and cultural development. The rapid development of virtual technologies and the growing number of Internet users in Ukraine and in the world causes the new challenges to communication of each organization. The book publishers are also obliged to respond to these processes. However, the works devoted directly to publishers’ communication in the modern media space are still lacking in Ukraine. The objective of the article is to clarify peculiarities and conditions of the activities of Ukrainian book publishers in today’s media space which is an important issue today. It is analyzed the literature and sources on this issue and it is ascertained the theoretical and practical possibilities to take into account the trends in the world of modern media in the PR-activity of book publishers. Also the prospects for further scientific study and practical use of PR-communications in the activity of publishers are determined. The analysis of current changes in the modern information space allows us to trace the general tendencies: the new subject and object areas are formed; the number of subjects is expanded; the new formats of interaction within the system of communications of the organization and in society as a whole are created. That means that publishing house’s PR-communications are complicated by the emergence of new elements, such as active audience, social networks as communication channels, promotions on the Internet and others. PR communication in the Internet space is the most effective and inexpensive tool for interaction of publishers with active audiences. Thus, the activation of PR communication in the modern media space is associated with the emergence of the latest information technologies, online media as well as development of Internet. The use of online channels of Internet for communication with the target audience of publishing organizations has certain advantages over traditional media. At the same time, it is necessary to take into account the information saturation of media space, which complicates the way of PR-messages of book publishers to the reader.


2018 ◽  
Vol 1 (2) ◽  
pp. 12
Author(s):  
Pedro Vitor de Sousa Guimarães ◽  
Sandro César Silveira Jucá ◽  
Renata Imaculada Soares Pereira ◽  
Ayrton Alexsander Monteiro Monteiro

This paper describes the use of a Linux embedded system for use in digital information and communication technology in order to generate image warnings using Internet of Things (IoT) prin- ciples. The proposed project generated a product, developed using concepts of project-based learning (ABP), called SECI (electronic internal communication system) that is accessed by students to view online warnings by distributed monitors and also by mobile devices connected to the Internet.


2019 ◽  
Author(s):  
Kejimu Sunzi ◽  
Cheng Lei ◽  
Zhuoyuanyuan Chen ◽  
Baolu Zhang

BACKGROUND The rapid development of health information technology has an increasingly significant impact on nursing work. The development of informatization also puts forward higher requirements for nurses under standardized training (NUST). Informatics knowledge and skills are essential if clinicians are to master the large volume of information generated in healthcare today. Nurses with competent nursing informatics competencies (NIC) will be able to better adapt to the needs of work and the development of the times. OBJECTIVE This study aimed to explore, analyze, and discuss the current situation of NIC of NUST in China, and analyze the influencing factors, to provide references for improving the NIC of NUST. METHODS We conducted a cross-sectional survey of standard training nurses' NIC in a tertiary hospital in Sichuan Province, China, with convenience sampling. The study consists of two parts included socio-demographic characteristics and NIC, a self-designed general information questionnaire, and a Self-Assessment Nursing Informatics Competency Scale-SF28 were used as survey tools. An online survey collected the data, and the scores of nurses' NIC were analyzed, and the factors were determined by linear regression statistical analysis. RESULTS Overall 191 target population responded to the questionnaire, including 22 males (11.52%) and 169 females (88.48%), the age range was 21 to 28 years, the average age was 24.64 (SD 1.43). 53 persons without computer level certificate (27.75%), 138 persons with computer level certificate (72.25%), the total score of Self-Assessment Nursing Informatics Competency Scale was 68.65 (SD 10.47), the scores of each dimension were role of clinical information 10.12 (SD 2.17), basic computer knowledge and skills 26.64 (SD 4.96), application ability of computer skills 7.16 (SD 1.82), wireless equipment skills 8.02 (SD 2.04), nursing information attitude 16.73 (SD 3.25). In the analysis of influencing factors of NIC, “whether learned professional knowledge through the internet” is the influencing factor of NIC (P< .05). CONCLUSIONS The clinical nursing informatics (NC) of nurses was at a medium level, mainly influenced by “whether learned professional knowledge through the internet.” In the future regulation process, it is necessary to strengthen further the capacity training of information to improve their clinical information decision-making ability and better serve patients.


2020 ◽  
Vol 93 (4) ◽  
pp. 16-23
Author(s):  
Song Linlin ◽  

Since the establishment of the China (Heilongjiang) pilot free trade zone, the development of cross-border e-commerce with Russia has continued to increase speed and quality. With its geographical advantages and its comparative advantages in the Internet field, Heilongjiang Province promoted the rapid development of the Internet economy in Russia, fostered a new digital trade format represented by cross-border e-commerce, and promoted online and offline collaborative promotion of customs clearance logistics and financial services. The paper expounds foundation and development status of Heilongjiang Province’s cross-border e-commerce, analyzes in integrated development of digital economy with the Heilongjiang Province’s cross-border e-commerce with Russia, and further puts forward prospects and recommendations.


Sign in / Sign up

Export Citation Format

Share Document