security scheme
Recently Published Documents


TOTAL DOCUMENTS

455
(FIVE YEARS 137)

H-INDEX

18
(FIVE YEARS 5)

2022 ◽  
Vol 2146 (1) ◽  
pp. 012019
Author(s):  
Ang Zhou

Abstract Networking is one of the new technologies supported by our country’s national “125” strategic industry plan, mainly used in medicine, military industry, transportation and other fields. While enjoying the convenient business of the, people also pay more attention to the security of the Internet of Things information system. Therefore, this article mainly discusses security under the perspective of the IoT, and understands the relevant basic theoretical knowledge about the IoT and security on the basis of a large number of documents, and then conceives the security methods under the perspective of the IoT, and the designed method has been tested, and the test results show that the performance of the encryption algorithm in the network security scheme of this article is due to the traditional encryption algorithm. When the encrypted text is 15000 bytes, the encryption time is 40s.


Author(s):  
Andrey Silva

The constant growing on the number of vehicles is increasing the complexity of traffic in urban and highway environments. It is paramount to improve traffic management to guarantee better road usage and people’s safety. Through efficient communications, Vehicular Ad hoc Networks (VANETs) can provide enough information for traffic safety initiatives, daily traffic data processing, and entertainment information. However, VANETs are vulnerable to malicious nodes applying different types of net-work attacks, where an attacker can, for instance, forge its position to receive the data packet and drop the message. This can lead vehicles and authorities to make incorrect assumptions and decisions, which can result in dangerous situations. Therefore, any data dissemination protocol designed for VANET should consider security issues when selecting the next-hop forwarding node. In this paper, we propose a security scheme designed for position-based routing algorithms, which analyzes nodes position, transmission range, and hello packet interval. The scheme deals with malicious nodes performing network attacks, faking their positions forcing packets to be dropped. We used the Simulation of Urban MObility (SUMO) and Network Simulator-version 3 (NS-3) to compare our proposed scheme integrated with two well-known position-based algorithms. The results were collected in an urban Manhattan grid environment varying the number of nodes, the number of malicious nodes, as well as the number of source-destination pairs. The results show that the proposed security scheme can successfully improve the packet delivery ratio while maintaining low average end-to-end delay of the algorithms. 


Author(s):  
Shaheda Viriyathorn ◽  
Mathudara Phaiyarom ◽  
Putthipanya Rueangsom ◽  
Rapeepong Suphanchaimat

Background: Thailand has a large flow of migrants from neighbouring countries; however, the relationship between economic status at the provincial level and the insured status of migrants is still vague. This study aimed to examine the association between provincial economy and the coverage of the Social Security Scheme (SSS) for migrants. Methods: Time-series data were analysed. The units of analysis were 77 provinces during 2015–2018. Data were obtained from the Social Security Office (SSO). Spatiotemporal regression (Spatial Durbin model (SDM)) was applied. Results: Migrant workers were mostly concentrated in Greater Bangkok, the capital city and areas surrounding it, but SSS coverage was less than 50%. However, the ratio of insured migrants to all migrants seemed to have positive relationship with the provincial economy in SDM. The ratio of insured migrants to all migrants was enlarged in all regions outside Greater Bangkok with statistical significance. Conclusions: Low enforcement on employment law in some areas, particularly Greater Bangkok, can result in lesser SSS coverage. The provincial economic prosperity did not guarantee large SSS coverage. Interventions to ensure strict insurance enrolment are required.


Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 7917
Author(s):  
Zheng Zuo ◽  
Shichun Yang ◽  
Bin Ma ◽  
Bosong Zou ◽  
Yaoguang Cao ◽  
...  

In recent years, Ethernet has been introduced into vehicular networks to cope with the increasing demand for bandwidth and complexity in communication networks. To exchange data between controller area network (CAN) and Ethernet, a gateway system is required to provide a communication interface. Additionally, the existence of networked devices exposes automobiles to cyber security threats. Against this background, a gateway for CAN/CAN with flexible data-rate (CANFD) to scalable service-oriented middleware over IP (SOME/IP) protocol conversion is designed, and security schemes are implemented in the routing process to provide integrity and confidentiality protections. Based on NXP-S32G, the designed gateway is implemented and evaluated. Under most operating conditions, the CPU and the RAM usage are less than 5% and 20 MB, respectively. Devices running a Linux operating system can easily bear such a system resource overhead. The latency caused by the security scheme accounts for about 25% of the entire protocol conversion latency. Considering the security protection provided by the security scheme, this overhead is worthwhile. The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.


2021 ◽  
pp. 1-22
Author(s):  
Md Whaiduzzaman ◽  
Nishat Farjana ◽  
Alistair Barros ◽  
Md. Julkar Nayeen Mahi ◽  
Md. Shahriare Satu ◽  
...  

Fog computing complemented cloud computing integration services in the Internet of Things (IoT) and the web of real-time interactivity. Fog offers faster computing and other services facilities sitting close to user applications. However, secure data transfer in the fog is still a challenging issue requiring attention and efficient deployment of a secure data security scheme. We present an Identity Based Encryption (IBE) scheme to secure data security and transmission in fog clouds and IoT ecosystems. We devise and develop a four-level Hierarchical Identity Based Architecture for Fog Computing (HIBAF) data security scheme to enhance data security. We also analyze the system’s performance regarding response time, CPU utilization, run-time encryption-decryption, and key generation time in the fog computing paradigm to an increasing number of users data-loads. Moreover, we evaluate our scheme and compare the outcomes with different cryptography structures to discern our scheme’s effectiveness. Furthermore, we also evaluate secret key updating time, re-encrypted key updating time, and file revoking time by launching DDoS attacks both in the cloud and fog computing environment to compare improvements of HIBAF in the fog computing paradigm. Finally, through this overall evaluation, we have found that the developed HIBAF scheme provides a 33% performance enhancement in a fog environment in terms of data processing, provision, and management compared to the cloud environment.


EDPACS ◽  
2021 ◽  
pp. 1-17
Author(s):  
Sehrish Aqeel ◽  
Adnan Shahid Khan ◽  
Zeeshan Ahmad ◽  
Johari Abdullah

Sign in / Sign up

Export Citation Format

Share Document