security investigation
Recently Published Documents


TOTAL DOCUMENTS

23
(FIVE YEARS 9)

H-INDEX

3
(FIVE YEARS 1)

Integrating the Mobile Ad-Hoc Network (MANET) with Internet has many advantages. The Data collected from the Mobile nodes can be broadcasted to the world by connecting the Internet to it via Gateway. Clustering is a practical way to enhance the system performance. Security is a significant issue in the Integrated MANETInternet climate in light of the fact that in this climate we need to think about the assaults on Internet availability. So, to overcome this issue, we have proposed Secure and Authenticated routing protocol (SARP) to enhance security performance of the networks. This routing protocol is used to discover a secure route and to transmit data packets securely. In this protocol clusters are formed and security relies on the hardness of the symmetric and asymmetric key algorithms. We show the practicality of this convention as for the security prerequisites and security investigation against different assaults. The estimations and reproductions are given to show the security of the proposed convention. The outcomes show that, the proposed convention have preferred execution over the current secure conventions for Cluster based Internet Integrated with MANETs, in terms of security.


2021 ◽  
Vol 234 ◽  
pp. 00012 ◽  
Author(s):  
Yaryna Samusevych ◽  
Alina Vysochyna ◽  
Tetiana Vasylieva ◽  
Serhiy Lyeonov ◽  
Svitlana Pokhylko

The paper is devoted to the investigation of environmental, energy and economic security by multivariate analysis methods. A set of indicators selected for research conducting includes 9 parameters for each security type. Study sample is formed by data for 6 Eastern European countries (Ukraine, Moldova, Poland, Romania, Hungary and Slovak Republic) for the period 2000–2019. Empirical study was conducted by factor analysis, which allowed identifying the main components of environmental, energy and economic security. Comparison of the results obtained for the studied countries showed differentiation of individual profiles of such types of security. Investigation of integral vectors of environmental, energy and economic security showed the highest level of interaction between energy and environmental security and the lowest one between energy and economic security.


A blockchain enlivened web of-things design for making a straightforward food flexibly chain. The engineering utilizes a proof-of-object based validation convention, which is undifferentiated from the cryptographic money's evidence of-work convention. This design is acknowledged by utilizing a RFID based sensor at the client level and blockchain at digital layer. The RFID gives a one of a kind character of the item and the sensor information, which helps continuously observing of value. So a little element size 900 MHz RFID coupled sensor was - ¬-developed and signified for continuous sensor information securing. The blockchain engineering helps in making a solid computerized database of the food bundles at each case. A total security investigation was performed to investigate the defenselessness of the proposed engineering under various sorts of cyberattacks.


2020 ◽  
Vol 17 (6) ◽  
pp. 2557-2561
Author(s):  
Deepak Garg ◽  
Shalli Rani

With help of internet technology today people can process, store and share data easily moreover, cloud computing model has provided various application services to users such as storage because cloud provide pay as you go environment. Storage helps data owner to share their data among users or employees of organization. But there is a need for data owners to provide flexible access control such that unauthorized users cannot have access to the data and confidentiality can be maintained. In addition, there is a need that only encrypted data is shared over the cloud. Encryption schemes have a major role in security domain of cloud computing model. In this article, DHSE scheme which is a hybrid technique and uses AES, ABE and IBE for key and data encryption is proposed. Furthermore, to validate and to do the security investigation of our plan we have verified our results using AVISPA tools.


2020 ◽  
Vol 8 ◽  
pp. 710-736
Author(s):  
Gerald Mutonyi ◽  
Ann Merecia Sirera ◽  
Wangari Mwai

Maintenance of security and good order for the citizens, had traditionally been undertaken by the state. However, non-state actors have come up to offer security to those who can afford to pay for it. And this is the liberalists view of the provision of security that, the pursuance of security can be achieved with the involvement of other actors offering the same. Despite this development, few studies have examined commercialized security industry services on national security in Kenya. Using Security Governance theory and Network Analysis theory, this study sought to understand the topic. The study took on a cross sectional survey design, and was carried out in Nairobi with the adult residents as the target population. A multistage sampling technique was employed to obtain the respondents. Questionnaires, scheduled interviews and structured observation were used to collect data. The Statistical Package for Social Sciences (SPSS version 25, 2017) was used in data management and analysis. The results demonstrate that (1) Manned guarding significantly contributes to the 26 % of outcome of the commercialized security B = .260, β = .135, P = .007; (2) Alarm and Electronics 22.9 %; B = .229, β = .224, P = .001; (3) CVIT security service contributes significantly and positively at 10.8 %; B = .108, β = .118, P = .018. While commercial investigative security service 3.6 % (B = .036, β = .084, P < = .103 although it was not significant. The study concluded that, commercialized security though motivated by profit making plays a significant role that enhances state capacity in provision of security as well as contributes to safety of citizens. Thus the study recommended that, there should be efforts to increase the usage of commercialized security investigation service. It is expected that the findings of this research will provide data that can be used to inform policy and practice amongst commercial security providers to increase their impact on national security in Kenya. The data can also stimulate the academic community towards more research in the field.


Author(s):  
Boutheina A. Fessi ◽  
Yacine Djemaiel ◽  
Noureddine Boudriga

This chapter provides a review about the usefulness of applying data mining techniques to detect intrusion within dynamic environments and its contribution in digital investigation. Numerous applications and models are described based on data mining analytics. The chapter addresses also different requirements that should be fulfilled to efficiently perform cyber-crime investigation based on data mining analytics. It states, at the end, future research directions related to cyber-crime investigation that could be investigated and presents new trends of data mining techniques that deal with big data to detect attacks.


Protection assurance in Content Based Image Retrieval (CBIR) is another exploration point in digital security and security. The state of-workmanship CBIR structures generally get wise instrument, specifically criticalness analysis, to improve the recuperation precision. Directions to guarantee the customer's assurance in such Relevance Feedback based CBIR (RF-CBIR) is a test issue. In this paper, we investigate this issue and propose another Private Relevance Feedback CBIR (PRFCBIR) scheme. PRF-CBIR can utilize the execution increment of congruity info and spare the customer's request point meanwhile. The new PRF-CBIR involves three stages: 1) private inquiry; 2) private information; 3) neighbourhood recuperation. Private request plays out the fundamental inquiry with a security controllable component vector; private input develops the criticism picture set by presenting confounding classes following the K-secrecy standard; nearby recovery at long last re-positions the pictures in the client side. Security investigation demonstrates that PRF-CBIR satisfies the protection necessities. The analyses completed on this present reality picture gathering affirm the viability of the proposed PRF-CBIR plot.


Sign in / Sign up

Export Citation Format

Share Document