security models
Recently Published Documents


TOTAL DOCUMENTS

370
(FIVE YEARS 116)

H-INDEX

23
(FIVE YEARS 3)

2022 ◽  
pp. 1459-1480
Author(s):  
Anand Nayyar ◽  
Rachna Jain ◽  
Bandana Mahapatra ◽  
Anubhav Singh

Smart cities are composed of interlinked components with constant data transfer and services targeted at increasing the life style of the people. The chapter focuses on diverged smart city components as well as the security models designed to be implemented. The four major paradigms discussed in this chapter are smart grids, building automation system (BAS), unmanned aerial vehicle (UAV), and smart vehicles. Apart from addressing the security concerns of every component, the major highlights of this chapter are architecture, smart environment, industry, lifestyle, services, and digital lifestyle quality. Finally, the chapter focuses on privacy preserving mechanisms, its essence over smart cities, strong architecture related to privacy, preserving mechanism, and various approaches available that can retaliate these issues in a smart city environment.


2022 ◽  
pp. 563-577
Author(s):  
Ignacio Aguirre ◽  
Jacinto Garrido Velarde ◽  
Javier Lozano Parra

In the last decades there has been a strong increase around the world in the use of plastic greenhouses (PGs). The Valparaíso region, in the central valley of Chile, has not been the exception, and the area covered by greenhouses has also experienced an increase over the years, reaching 1180 ha in 2007. Taking into account that agriculture in this region employs more than 60,000 people and accounts for 4% of the regional GDP, this information should be available to be included in territorial planning and incorporated into hydrological, economic, and food security models. To do this, the authors propose a new method for identifying the surface covered by PGs based on the intersection of the normalized difference indices and the areas excluded by the masks. The results showed that this methodology was able to identify with a general precision of 86.25% which allowed to classify 1409.85 ha. This area is consistent with the agricultural census carried out in 2007 and with the increase of more than 900 subsidies granted by the government for the installation of new structures.


Cloud-based Internet of Things environments exhibit different architectures based on the services they provide, thus making it even harder to find ‘global’ security measures. Many of the security issues in relations to Cloud Computing architecture, governance, portability and interoperability, have been addressed in other systems. The specific characteristics of Internet of Things application in Cloud environments result into new security concerns. Various security models have been proposed to deal with security threats ranging from authentication, access control, lightweight security, data privacy and so on. However, users are not aware of the degree of security integrated with the CloudInternet of Things application system thereby limiting the perceived trustworthiness of such systems. Therefore, the need to provide aCloud-based Internet of Things application reporting system that can predict and monitor the effectiveness of such applications cannot be overemphasized. In this paper, reviews of existing Cloud-based Internet of Things security approaches are presented. This paper is concluded by highlighting the future research direction with respect to improving the acceptability of secured Cloud-based Internet of Things deployment


2021 ◽  
Vol 20 ◽  
pp. 637-649
Author(s):  
Solimun - ◽  
Adji Achmad Rinaldo Fernandes ◽  
Nurjannah - ◽  
Indah Yanti ◽  
Luthfatul Amaliana ◽  
...  

This study aims to map and model the determinants of food security. Mapping is done by cluster and biplot analysis, while modeling is done by non-linear path analysis. This research is mix-method research that combines quantitative and qualitative research. In the qualitative method, this study applies a qualitative Discourse Network Analysis (DNA) approach. Sources of DNA data come from various information in cyberspace (mass media, journals, articles, etc.) that are in accordance with the research context. In DNA data processing, statements, actors, concepts/issues, sentiments, along with the origin of the organization will be generated. As for the quantitative method, this study uses descriptive statistical analysis, biplot, cluster, and non-linear path analysis (square and cubic). The coefficient of determination for both quadratic and cubic path analysis is 0.88, which means that the influence of the independent variable simultaneously on the Y variable is 0.88, which is very strong. Thus, the model formed is quite good because the predictor variable is able to explain food security by 88% while the rest is explained by other factors outside the model. The originality of this research is the reconstruction of non-linear path analysis which is more flexible (no need for assumptions of normality and homogeneity) and is equipped with a measurement model.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Javier Junquera-Sánchez ◽  
Carlos Cilleruelo ◽  
Luis De-Marcos ◽  
José-Javier Martinez-Herráiz

Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.


Author(s):  
K. Janani ◽  

Cybersecurity is a technique that entails security models development techniques to the illegal access, modification, or destruction of computing resources, networks, program, and data. Due to tremendous developments in information and communication technologies, new dangers to cyber security have arisen and are rapidly changing. The creation of a Deep Learning system requires a substantial number of input samples and it can take a great deal of time and resources to gather and process the samples. Building and maintaining the basic system requires a huge number of resources, including memory, data and computational power. In this paper, we develop an Ensemble Deep Belief Networks to classify the cybersecurity threats in large scale network. An extensive simulation is conducted to test the efficacy of model under different security attacks. The results show that the proposed method achieves higher level of security than the other methods.


Author(s):  
Calvin Lee ◽  
Gouher Ahmed

IoT has continued to evolve over the years with a promise to provide the users with effective means to interact, communicate, transact and create strong relationship. The invention and the development of IoT have created benefits for many businesses and individuals. However, as the IoT continues to evolve and develop, it has been subjected to certain threats and vulnerabilities. The common vulnerabilities notable in IoT include the security, privacy and data protection concerns. These issues have not been addressed by many scholars thus necessitated the need for this research study. Therefor the research study was concerned with the developed of a new IoT model that can enhance the security and privacy of the users of the IoT. The results indicate that the new model can be effective in addressing the needs of the IoT users. However, it noted that future research studies are still needed to improve the performance of the IoT security models.


Sign in / Sign up

Export Citation Format

Share Document