• Title/Summary/Keyword: Security Cooperation

Search Result 874, Processing Time 0.023 seconds

Blockchain-based authentication for IoT

  • Alaa Alsubhi;Jawaher Alhrthi;Wajdi Alhakami
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.198-204
    • /
    • 2024
  • Correspondence security between IoT devices is a significant concern, and the blockchain makes the latest difference by reducing this matter. In the blockchain idea, the larger part or even all organization hubs check the legitimacy and precision of traded information before tolerating and recording them, regardless of whether this information is identified with monetary exchanges or estimations of a sensor or a confirmation message. In assessing the legitimacy of a traded information, hubs should agree to play out an uncommon activity. The chance to enter and record exchanges and problematic cooperation with the framework is fundamentally decreased. To share and access the executives of IoT devices data with disseminated demeanour, another confirmation convention dependent on block-chain is proposed, and it is guaranteed that this convention fulfils client protection saving and security. This paper highlights the recent approaches conducted by other researchers to secure the Internet of Things environments using blockchain. These approaches are studied and compared with each other to present their features and disadvantages.

Neighbor Cooperation Based In-Network Caching for Content-Centric Networking

  • Luo, Xi;An, Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2398-2415
    • /
    • 2017
  • Content-Centric Networking (CCN) is a new Internet architecture with routing and caching centered on contents. Through its receiver-driven and connectionless communication model, CCN natively supports the seamless mobility of nodes and scalable content acquisition. In-network caching is one of the core technologies in CCN, and the research of efficient caching scheme becomes increasingly attractive. To address the problem of unbalanced cache load distribution in some existing caching strategies, this paper presents a neighbor cooperation based in-network caching scheme. In this scheme, the node with the highest betweenness centrality in the content delivery path is selected as the central caching node and the area of its ego network is selected as the caching area. When the caching node has no sufficient resource, part of its cached contents will be picked out and transferred to the appropriate neighbor by comprehensively considering the factors, such as available node cache, cache replacement rate and link stability between nodes. Simulation results show that our scheme can effectively enhance the utilization of cache resources and improve cache hit rate and average access cost.

Ways of Integration of Media and Educational Space: Problems and Solutions

  • Bordeniuk, Serhii;Nebera, Pavlo;Priadko, Oleksandr;Timlin, Eduard;Khymych, Anatolii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.61-64
    • /
    • 2021
  • The work is devoted to the problem of modernization of the higher education system of Ukraine through the integration of higher education institutions into the European Higher Education Area. Based on the analysis of statistical data, a conclusion was made about the collapse of the higher education system of Ukraine due to a number of problems, which negatively affects the formation of human capital. The importance of international cooperation with the EU in the field of education for the modernization of higher education is substantiated. The institutional principles of formation are investigated, the main priorities of its development at the present stage are determined. The legal bases of European integration of higher education in Ukraine are analyzed. An analysis of the development of international cooperation of Ukrainian universities and their participation in European educational programs. There is a positive tendency to increase the activity of Ukrainian universities in international cooperation, which increases their position in international rankings. Weaknesses of integration processes are revealed and directions of improvement of higher education are offered.

An Integration of TAM and D&M Model in the Ministry of Social Affairs and Labor in Kuwait

  • Faisal L F H Almutairi;Ramayah Thurasamy;Jasmine A.L. Yeap;Muhammad Khaleel
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.187-199
    • /
    • 2024
  • This study based on TAM and D&M model to examine the Kuwaiti employee performance using the electronic document and records management system (EDRMS) in the Ministry of social affairs and labor. Additionally, this study has proposed the moderating effect of work cooperation on employee performance Data of 345 employees were collected from Ministry of social affairs and labor in Kuwait. Smart PLS 3.0 was used to analyze the data. Results indicated that perceived ease of use and perceived usefulness have a positive influence on employee performance. However, findings do not support the relationship between system usage and user satisfaction. Additionally, the results show that there is a significant positive moderating effect of work cooperation. This research provides strong evidence for defining the key factors affecting system usage but also in view of its limits. It should be evaluated. Not all the factors affecting the intentions of end-users to use EDRMS have been fully covered. There are major variables, for example, facilitating state and perceived compatibility are important factors that can be covered in future research. This research is an addition to the current literature and the first attempt in this area to the best of authors' knowledge.

Development of Convergence Security Industry Knowledge Map for the 4th Industrial Revolution Security Infrastructure (4차 산업혁명의 보안 인프라 구축을 위한 융합보안산업 지식 맵 개발)

  • Lee, Daesung
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.173-180
    • /
    • 2019
  • As the 4th Industrial Revolution(Industry 4.0), symbolized as CPS(Cyber Physical System), spreads around the world, it is essential to establish a converged security infrastructure to secure technical stability and reliability of various cyber systems to be implemented in the future. In this study, we will investigate the phenomenon of broad convergence security industry and technology including the concept of life safety in relation to the spread of the 4th industrial revolution, and analyze the possibility of linkage between related knowledge to promote academic-industrial cooperation necessary for the convergence of security. we would like to propose a comprehensive development policy on human resource development, technology development and policy improvement.

The Improvement Plan of the Curriculum for Development in Study of Security (경호학의 발전을 위한 교육과정 개선방안)

  • Jeong, Youn-min;Bak, Jun-seok;Yang, Deok-youl
    • Journal of the Society of Disaster Information
    • /
    • v.5 no.2
    • /
    • pp.88-106
    • /
    • 2009
  • The potential risks of Korean public security has been increasing by economic stagnation. As a result of this, a feeling of unrest about our society causes expansion of private security industry as well as necessity of professional education. It has been 15years to produce security expert in colleges which is professional education institute, and academic efforts and contributions to society are shown remarkable results for the period. A private security industry had got public interest as a potential favorable job, because of increasing dependence of public to take care of unrest facts. Many colleges have introduced courses about public security because of facing necessity of professional education system. Then total 59 institutes including 22 universities and 37 colleges introduce courses of public security. Although name of courses are diverse depends on institution, purpose of course or members of course, the ultimate purpose of these courses is preventing public from crimes and managing public security. A fixed and out of date education system of universities in Korea can not produce talent person who people, companies and government want. The institutions have been recruiting many student so far, and it shows growth of the industry in quantity aspects. However quality aspect of the industry has been failed because it is hard to get a job for graduated students. Consequently, to improve quality of the industry people need cooperation of institution, professors and students.

  • PDF

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

Encounter Measure System Against Cyber-Terror And Legalism (사이버테러 대응체제와 법치주의)

  • Jeong, Jun-hyeon;Kim, Kui-nahm
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.83-90
    • /
    • 2004
  • Preventive measures and control over cyber terrorism in Korea is a complex problem. Today laws should meet requirements made by modern technologies development, Law enforcement, special services and judicial system cooperation, their efforts coordination and their material security are priority directions, None of the country is able to prevent cyber terror independently and international cooperation in this field is vital. Taking the above into consideration, we propose and inisit that National Intelligence Service(NIS) should share cyber terror data with Police Agency and have top police authority over the cyber terror.

  • PDF

The Design of Hybrid Cryptosystem for Smart Card (스마트카드용 Hybrid 암호시스템 설계)

  • Song, Je-Ho;Lee, Woo-Choun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2322-2326
    • /
    • 2011
  • General cryptosystem uses differently the data and key value for the increment of security level, processes the repetition of limited number and increases the periodic feature of LFSR similar infinite series. So, it cause the efficiency of the cryptosystem. In this thesis, proposed algorithm is composed of reformat, permutation, data cipher block and key scheduler which is applied the new function by mixed symmetric cryptography and asymmetric cryptography. We design the cryptosystem of smart card using the common Synopsys and simulate by ALTERA MAX+PLUS II at 40MHz. Consequently, we confirm the 52% increment of processing rate and the security level of 16 rounds.

A Study of Secure Group Key Management Based on Key-Chain for Multicast Data Transmission (멀티캐스트 전송을 위한 키 체인 기반의 안전한 그룹 키 관리방안 연구)

  • Kim, Bo-Seung;Kim, Jeong-Jai;Lee, Ki-Young;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.9
    • /
    • pp.3495-3501
    • /
    • 2010
  • Because the application simultaneously to transmit large amounts of data (Video conferencing, Internet broadcasting, Online games etc.) to multiple users increases, the importance and utilization of group communication was greater. So the security was recognized as a important issue. To provide security in multicast environment, A study of single group management server using protocol based on Key Tree Scheme was proposed. But the paper proposes secure group key management scheme to be a relatively low-overhead. Therefore proposed paper is demonstrated to be excellent by comparing the effectiveness of existing and proposed group key management scheme.