secure networks
Recently Published Documents


TOTAL DOCUMENTS

66
(FIVE YEARS 30)

H-INDEX

5
(FIVE YEARS 1)

Electronics ◽  
2022 ◽  
Vol 11 (2) ◽  
pp. 222
Author(s):  
Tomasz Wichary ◽  
Jordi Mongay Batalla ◽  
Constandinos X. Mavromoustakis ◽  
Jerzy Żurek ◽  
George Mastorakis

This paper focuses on the security challenges of network slice implementation in 5G networks. We propose that network slice controllers support security by enabling security controls at different network layers. The slice controller orchestrates multilevel domains with resources at a very high level but needs to understand how to define the resources at lower levels. In this context, the main outstanding security challenge is the compromise of several resources in the presence of an attack due to weak resource isolation at different levels. We analysed the current standards and trends directed to mitigate the vulnerabilities mentioned above, and we propose security controls and classify them by efficiency and applicability (easiness to develop). Security controls are a common way to secure networks, but they enforce security policies only in respective areas. Therefore, the security domains allow for structuring the orchestration principles by considering the necessary security controls to be applied. This approach is common for both vendor-neutral and vendor-dependent security solutions. In our classification, we considered the controls in the following fields: (i) fair resource allocation with dynamic security assurance, (ii) isolation in a multilayer architecture and (iii) response to DDoS attacks without service and security degradation.


2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


2021 ◽  
Author(s):  
◽  
Dennis Michael DiGiusto

<p>Threats arising from wireless hacking have been recently acknowledged both within academic literature and in the mainstream media. Additionally, it has been reported that many users of wireless networks make no attempt to activate security measures on their networks. This report replicates and expands upon research found in Woon, Tan and Low (2005) in order to ascertain characteristics of home wireless network users in New Zealand. The first research area asks the question: aside from the people who activate and those who do not, are there also people who are worried about wireless security and those who are not? This was proven to be true and that there is indeed a subgroup of wireless router users in New Zealand who are worried about wireless security. The second research area seeks to determine what factors affect a person's intention to enable or not enable security features on a home wireless network. The results showed that: The more people notice an increase in the degree of risk posed by wireless hacking, the more they feel like they could autonomously enable security features. The more people feel vulnerable to threats of wireless hacking, the more they feel that they would need help in setting up security features on their wireless network. The more people feel susceptible to wireless hacking, the more they feel that enabling security features would require extra efforts of time and money on their part. In order to get users to secure wireless networks, they must be convinced that enabling security features will deter hacker attacks. In order to get users to secure networks they need to feel that they could actually enable security features by themselves without some form of human assistance to help them do it.</p>


2021 ◽  
Vol 5 (9 (113)) ◽  
pp. 56-69
Author(s):  
Gulzinat Ordabayeva ◽  
Abdizhapar Saparbayev ◽  
Bibinur Kirgizbayeva ◽  
Gulzat Dzhsupbekova ◽  
Nazira Rakhymbek

A Software-Defined Network (SDN) on a Wide Area Network (WAN) is a computer network that is controlled and created by software. SD-WAN is an emerging research area that has received a lot of attention from industry and government. This technology offers tremendous opportunities to support the creation of consolidated data centers and secure networks. This is an innovation that allows the network to be monitored and programmed so that it can respond to network events caused by security breaches. This solution provides network security, offers a single network management console, and provides complete control over the network architecture. Also controls security in the cloud software-defined infrastructure (SDI), such as dynamically changing the network configuration when forwarding packets, blocking, redirecting, changing Media Access Control (MAC) or Internet Protocol (IP) addresses, limiting the packet flow rate etc. Using SD-WAN technology, it is possible to reduce the cost of dedicated bandwidth channels, achieve a high-quality Virtual Private Network (VPN), and the ability to automatically select a channel for certain channels. The main advantages of SD-WAN are the management of an unlimited number of devices from a single center, reducing the cost of deploying branch infrastructure. According to the results of the survey, 7 % of respondents use SD-WAN for security solutions, 14% at the piloting stage. As a result of the research, it was revealed that by 2024, to increase the flexibility and support of cloud applications, more than 60 % of SD-WAN customers will implement the SASE (Secure Access Service Edge) architecture, which is 30% more than in 2020 and the main concept - application security and cloud functions. Keywords: OpenFlow, Software defined wide area network (SD-WAN), architecture, DDoS attack, WAN network


10.2196/17551 ◽  
2021 ◽  
Vol 23 (6) ◽  
pp. e17551
Author(s):  
Eleonore Bayen ◽  
Shirley Nickels ◽  
Glen Xiong ◽  
Julien Jacquemot ◽  
Raghav Subramaniam ◽  
...  

Background Lying on the floor for a long period of time has been described as a critical determinant of prognosis following a fall. In addition to fall-related injuries due to the trauma itself, prolonged immobilization on the floor results in a wide range of comorbidities and may double the risk of death in elderly. Thus, reducing the length of Time On the Ground (TOG) in fallers seems crucial in vulnerable individuals with cognitive disorders who cannot get up independently. Objective This study aimed to examine the effect of a new technology called SafelyYou Guardian (SYG) on early post-fall care including reduction of Time Until staff Assistance (TUA) and TOG. Methods SYG uses continuous video monitoring, artificial intelligence, secure networks, and customized computer applications to detect and notify caregivers about falls in real time while providing immediate access to video footage of falls. The present observational study was conducted in 6 California memory care facilities where SYG was installed in bedrooms of consenting residents and families. Fall events were video recorded over 10 months. During the baseline installation period (November 2017 to December 2017), SYG video captures of falls were not provided on a regular basis to facility staff review. During a second period (January 2018 to April 2018), video captures were delivered to facility staff on a regular weekly basis. During the third period (May 2018 to August 2018), real-time notification (RTN) of any fall was provided to facility staff. Two digital markers (TUA, TOG) were automatically measured and compared between the baseline period (first 2 months) and the RTN period (last 4 months). The total number of falls including those happening outside of the bedroom (such as common areas and bathrooms) was separately reported by facility staff. Results A total of 436 falls were recorded in 66 participants suffering from Alzheimer disease or related dementias (mean age 87 years; minimum 65, maximum 104 years). Over 80% of the falls happened in bedrooms, with two-thirds occurring overnight (8 PM to 8 AM). While only 8.1% (22/272) of falls were scored as moderate or severe, fallers were not able to stand up alone in 97.6% (247/253) of the cases. Reductions of 28.3 (CI 19.6-37.1) minutes in TUA and 29.6 (CI 20.3-38.9) minutes in TOG were observed between the baseline and RTN periods. The proportion of fallers with TOG >1 hour fell from 31% (8/26; baseline) to zero events (RTN period). During the RTN period, 76.6% (108/141) of fallers received human staff assistance in less than 10 minutes, and 55.3% (78/141) of them spent less than 10 minutes on the ground. Conclusions SYG technology is capable of reducing TOG and TUA while efficiently covering the area (bedroom) and time zone (nighttime) that are at highest risk. After 6 months of SYG monitoring, TOG was reduced by a factor of 3. The drastic reduction of TOG is likely to decrease secondary comorbid complications, improve post-fall prognosis, and reduce health care costs.


2021 ◽  
Vol 10 (2) ◽  
pp. 38-45
Author(s):  
Saiida Lazaar

The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting confidentiality, integrity and authentication. The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming and efficiency, of the main hash functions standardized by NIST (National Institute of Standards and Technology). In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework.


2021 ◽  
Vol 43 (4) ◽  
pp. 101-124
Author(s):  
Valentina Marguerite Kozák

The arrival in Madrid in 1690 of the future queen consort, Maria Anna of Palatinate-Neuburg (1667–1740), second wife of the Spanish king Carlos II (1661–1700), also brought about the establishment of an unofficial palace faction known as the German Chamber. Since the members of this faction were part of Maria Anna’s household, the analysis of their social activities gives insight into court practices during the last decade of Carlos II’s reign. This article intends to shed light on the new networks and agency of members of the German Chamber at the Madrid court, in particular, that of the queen’s confessor, Gabriel Pontifeser di Chiusa. By investigating the activities and new court practices within the queen consort’s household that enabled Pontifeser to build secure networks and achieve importance, the article reveals the significant power wielded by foreign courtiers at the Madrid court between 1690 and 1700.


Sign in / Sign up

Export Citation Format

Share Document