Security Solutions for Hyperconnectivity and the Internet of Things - Advances in Information Security, Privacy, and Ethics
Latest Publications


TOTAL DOCUMENTS

11
(FIVE YEARS 0)

H-INDEX

1
(FIVE YEARS 0)

Published By IGI Global

9781522507413, 9781522507420

Author(s):  
Calvin Nobles

Civil aviation faces increased cybersecurity threats due to hyperconnectivity and the lack of standardized frameworks and cybersecurity defenses. Educating the civil aviation workforce is one method to enhance cyber defense against cyber-attacks. Educating the workforce will lead to initiatives and strategies to combat cyber-attacks. Private and public entities need to remain aggressive in developing cyber defense strategies to keep pace with the increasing vulnerabilities of hyperconnectivity. Areas that require immediate attention to safeguard against cybersecurity threats in civil aviation are: 1) Eliminating supply risks, 2) Upgrading legacy systems, 3) Mitigating technological aftereffects, 4) Increasing cybersecurity awareness, 5) Developing cybersecurity workforce, 6) Managing hyperconnectivity, and 7) Leveraging international entities. To safeguard civil aviation infrastructure from cybersecurity threats require assertive, coordinated, and effective strategies and capabilities to defend the network.


Author(s):  
Ghada Farouk Elkabbany ◽  
Mohamed Rasslan

Distributed computing systems allow homogenous/heterogeneous computers and workstations to act as a computing environment. In this environment, users can uniformly access local and remote resources in order to run processes. Users are not aware of which computers their processes are running on. This might pose some complicated security problems. This chapter provides a security review of distributed systems. It begins with a survey about different and diverse definitions of distributed computing systems in the literature. Different systems are discussed with emphasize on the most recent. Finally, different aspects of distributed systems security and prominent research directions are explored.


Author(s):  
Maurice Dawson

Secure computing is essential as environments continue to become intertwined and hyperconnected. As the Internet of Things (IoT), Web of Things (WoT), and the Internet of Everything (IoE) dominate the landscape of technological platforms, protection these complicated networks is important. The everyday person who wishes to have more devices that allow the ability to be connected needs to be aware of what threats they could be potentially exposing themselves to. Additionally, for the unknowing consumer of everyday products needs to be aware of what it means to have sensors, Radio Frequency IDentification (RFID), Bluetooth, and WiFi enabled products. This submission explores how Availability, Integrity, and Confidentiality (AIC) can be applied to IoT, WoT, and IoE with consideration for the application of these architectures in the defense sector.


Author(s):  
Jose Antonio Cardenas-Haro ◽  
Maurice Dawson

After the information released by Edward Snowden, the world realized about the security risks of high surveillance from governments to citizens or among governments, and how it can affect the freedom, democracy and/or peace. Research has been carried out for the creation of the necessary tools for the countermeasures to all this surveillance. One of the more powerful tools is the Tails system as a complement of The Onion Router (TOR). Even though there are limitations and flaws, the progress has been significant and we are moving in the right direction.


Author(s):  
Eric Kuada

The discussion of security and trust issues in this book chapter will follow from the discussions on the role of virtualization in cloud computing and hence the impact that the various categories of virtualization such as server virtualization, network virtualization, storage virtualization, and application virtualization have on the security and trust issues in cloud computing. It will be evident from these discussions that virtualization introduces a number of security and risk related challenges in cloud computing based on the three security objectives of confidentiality, integrity, and availability; and the two main other related security objectives of authenticity and accountability of information systems that were adopted for this discussion. It was however also noted that if the necessary recommended best practices of virtualizations are faithfully adhered to, then virtualization can actually lead to improvement or enhancement in the security posture of cloud environments.


Author(s):  
Vimal Kumar ◽  
Rakesh Kumar

One of the generally used routing protocols for MANET is AODV (Ad hoc on demand Distance Vector), which is vulnerable to one of the particular type of security attack called blackhole attack. The characteristics of blackhole attack, a malicious node sends a false route reply without having any fresh route to a destination and is also drop all receiving packets and replay packet in the entire network. A certificateless based signature scheme enables users to generate their public key and private key without using any certificate. Due to this reason, we do not need any certificate authority (CA). In this paper, we propose a novel CLS scheme for prevention of a blackhole attack and also provide secure communication based on CLS scheme. Simulation results show that CLS scheme prevents blackhole attack successfully and is provide better performance to other existing schemes in the presence of blackhole node and also ensuring authentication, integrity and non-repudiation.


Author(s):  
Derek Mohammed ◽  
Marwan Omar ◽  
Van Nguyen

This paper investigates laws and regulations within the financial industry that are applicable to cybersecurity. It analyzes both compliance and regulatory issues across the financial sector at the federal and state levels. Additionally; the paper highlights the importance of adhering to, and implementing industry-based regulations to improve the protection of financial digital assets against cyber-attacks. It also reviews similarities and differences among compliance environments created by financial regulations. Identification, interpretation and application of federal and state government regulations, directives and acts as they apply to the security of digital systems in the financial sector is another objective of this research study. Finally, this paper contrasts the values and issues created by increasing compliance requirements.


Author(s):  
Stuart Armstrong ◽  
Roman V. Yampolskiy

Superintelligent systems are likely to present serious safety issues, since such entities would have great power to control the future according to their possibly misaligned goals or motivation systems. Oracle AIs (OAI) are confined AIs that can only answer questions and do not act in the world, represent one particular solution to this problem. However even Oracles are not particularly safe: humans are still vulnerable to traps, social engineering, or simply becoming dependent on the OAI. But OAIs are still strictly safer than general AIs, and there are many extra layers of precautions we can add on top of these. This paper begins with the definition of the OAI Confinement Problem. After analysis of existing solutions and their shortcomings, a protocol is proposed aimed at making a more secure confinement environment which might delay negative effects from a potentially unfriendly superintelligence while allowing for future research and development of superintelligent systems.


Author(s):  
Vijay L. Hallappanavar ◽  
Mahantesh N. Birje

Cloud computing is a model for enabling everywhere, suitable, on-demand network access. There are a number of challenges to provide cloud computing services and to accomplish this, it is necessary to establish trust across the cloud, between the user and the service provider. It is becoming increasingly complex for cloud users to make distinction among service providers offering similar kinds of services. There must be some mechanisms in the hands of users to determine trustworthiness of service providers so that they can select service providers with confidence and with some degree of assurance that service provider will not behave unpredictably or maliciously. An effective trust management system helps cloud service providers and consumers reap the benefits brought about by cloud computing technologies. Hence the objective of this chapter is to describe existing mechanisms that are used to determine a trust worthiness of a cloud service, various models that are used for calculating a trust value and method to establish trust management system.


Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

The Internet of Things (IoT) promises to revolute communications on the Internet. The IoT enables numerous business opportunities in fields as diverse as e-health, smart cities, smart homes, among many others. It incorporates multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. This will result in the IoT being pervasive in many areas which raise many challenges. This chapter reviews the major research issues challenging the IoT with regard to security, privacy, and management.


Sign in / Sign up

Export Citation Format

Share Document