• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.026 seconds

Securing the MQTT Protocol using the LEA Algorithm (LEA 알고리즘을 이용한 MQTT 프로토콜 보안)

  • Laksmono Agus Mahardika Ari;Iqbal Muhammad;Pratama Derry;Howon Kim
    • Annual Conference of KIPS
    • /
    • 2024.05a
    • /
    • pp.175-178
    • /
    • 2024
  • IoT is becoming more and more popular, along with the massive availability of cheap and easy-to-use IoT devices. One protocol that is often used in IoT devices is the Message Queuing Telemetry Transport (MQTT) protocol. By default, the MQTT protocol does not activate encrypted data security features. This MQTT default feature makes the transmitted and received message data vulnerable to attacks, such as eavesdropping. Therefore, this paper will design and implement encrypted data security using the lightweight cryptography algorithm. The focus of this paper will be on securing MQTT message data at the application layer. We propose a method for encrypting specific MQTT message fields while maintaining compatibility with the protocol's functionalities. The paper then analyzes the timing performance of the MQTT-LEA implementation on the Raspberry Pi 3+. Our findings demonstrate the feasibility of using LEA at the application layer to secure MQTT message communication on resource-constrained devices.

Critical Assessment on Performance Management Systems for Health and Fitness Club using Balanced Score Card

  • Samina Saleem;Hussain Saleem;Abida Siddiqui;Umer Sheikh;Muhammad Asim;Jamshed Butt;Ali Muhammad Aslam
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.177-185
    • /
    • 2024
  • Web science, a general discipline of learning is presently at high demand of expertise with ideas to develop software-based WebApps and MobileApps to facilitate user or customer demand e.g. shopping etc. electronically with the access at their smartphones benefitting the business enterprise as well. A worldwide-computerized reservation network is used as a single point of access for reserving airline seats, hotel rooms, rental cars, and other travel related items directly or via web-based travel agents or via online reservation sites with the advent of social-web, e-commerce, e-business, from anywhere-on-earth (AoE). This results in the accumulation of large and diverse distributed databases known as big data. This paper describes a novel intelligent web-based electronic booking framework for e-business with distributed computing and data mining support with the detail of e-business system flow for e-Booking application architecture design using the approaches for distributed computing and data mining tools support. Further, the importance of business intelligence and data analytics with issues and challenges are also discussed.

Bridging the Gap: Follow-up Strategies for Effective Software Architecture Implementation

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.1-10
    • /
    • 2024
  • Software architecture are High-level design decisions shaping a software system's components, structure, and interactions. It can be a blueprint for development, evolution, and ongoing maintenance. This research investigates the communication practices employed by software architects and developers to ensure adherence to the designed software architecture. It explores the factors influencing the selection of follow-up methods and the impact of follow-up frequency on successful implementation. Findings reveal that formalized follow-up procedures are not yet a ubiquitous element within the software development lifecycle. While electronic communication, particularly email, appears to be the preferred method for both architects and developers, physical and online meetings are utilized less frequently. Interestingly, the study suggests a potential confidence gap, with architects expressing concerns about developers' ability to faithfully implement the architecture. This may lead to architects providing additional clarification. Conversely, while most developers reported confidence in their software knowledge, overly detailed architecture documentation may pose challenges, highlighting the need for architects to consider alternative communication strategies. A key limitation of this study is the sample size, restricting the generalizability of the conclusions. However, the research offers valuable preliminary insights into the communication practices employed for architecture implementation, paving the way for further investigation with a larger and more diverse participant pool.

Determinations of Impulsive Buying Behavior: An Empirical Analysis of Consumers' Purchase Intentions for Offline Beauty Products

  • Tayyaba Tanveer;Mustaghis ur Rahman;Syeda Qurat ul Ain Kazmi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.45-54
    • /
    • 2024
  • Ingrained in multiple consumption theories, this research covers the seven determinants (Hedonic Consumption, Consumers' mood, Store layout, product promotion, Persons' situation, Materialism, and Product Attributes) of purchase intentions of a consumer. For this study, 384 offline shoppers were surveyed and found that out of seven, six determinants significantly trigger impulse buying behavior of customers of beauty products in a modern market setting while one determinant 'Materialism' did not have any influence on the impulse buying behavior. The relationships of the variables were statistically checked by multiple linear regression. Results of this study show that a consumer's mood has a significant impact on impulse buying as it can trigger the impulse behavior of consumers. Person situations also have a positive impact on impulse buying it means time, money, fear of missing out can active impulse buying. Store layout can also trigger that unplanned purchase which means store lighting, the music of the store, ambiance may affect the purchasing. Product promotion has an impact on spontaneous purchase which indicates that free coupons, discounts, free delivery, offers to attract the customer to sudden purchase. Product design, packaging, color, labeling indicate a positive and significant impact on impulse buying. However, materialism indicates an insignificant impact on impulse buying.

Searching Algorithms Implementation and Comparison of Romania Problem

  • Ismail. A. Humied
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.105-110
    • /
    • 2024
  • Nowadays, permutation problems with large state spaces and the path to solution is irrelevant such as N-Queens problem has the same general property for many important applications such as integrated-circuit design, factory-floor layout, job-shop scheduling, automatic programming, telecommunications network optimization, vehicle routing, and portfolio management. Therefore, methods which are able to find a solution are very important. Genetic algorithm (GA) is one the most well-known methods for solving N-Queens problem and applicable to a wide range of permutation problems. In the absence of specialized solution for a particular problem, genetic algorithm would be efficient. But holism and random choices cause problem for genetic algorithm in searching large state spaces. So, the efficiency of this algorithm would be demoted when the size of state space of the problem grows exponentially. In this paper, the new method presented based on genetic algorithm to cover this weakness. This new method is trying to provide partial view for genetic algorithm by locally searching the state space. This may cause genetic algorithm to take shorter steps toward the solution. To find the first solution and other solutions in N-Queens problem using proposed method: dividing N-Queens problem into subproblems, which configuring initial population of genetic algorithm. The proposed method is evaluated and compares it with two similar methods that indicate the amount of performance improvement.

A Generalized Multicarrier Communication System - Part III: Dual Symbol Superposition Block Carrier Transmission with Frequency Domain Equalization

  • Imran Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.41-49
    • /
    • 2024
  • This paper proposes dual symbol superposition block carrier transmission with frequency domain equalization (DSS-FDE) system. This system is based upon χ-transform matrix, which is obtained by concatenation of discrete Hartley transform (DHT) matrix and discrete Fourier transform (DFT) matrices into single matrix that is remarkably sparse, so that, as it will be shown in this paper, it only has non-zero entries on its principal diagonal and one below the principle anti-diagonal, giving it shape of Latin alphabet χ. When multiplied with constellation mapped complex transmit vector, each entry of resultant vector is weighted superposition of only two entries of original vector, as opposed to all entries in conventional DFT based OFDM. Such a transmitter is close to single carrier block transmission with frequency domain equalization (SC-FDE), which is known to have no superposition. The DSS-FDE offers remarkable simplicity in transmitter design and yields great benefits in reduced complexity and low PAPR. At receiver-end, it offers the ability to harvest full diversity from multipath fading channel, full coding gain, with significant bit error rate (BER) improvement. These results will be demonstrated using both analytical expressions, as well as simulation results. As will be seen, this paper is Part III of three-paper series on alternative transforms for multicarrier communication (MC) systems.

Real time instruction classification system

  • Sang-Hoon Lee;Dong-Jin Kwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.212-220
    • /
    • 2024
  • A recently the advancement of society, AI technology has made significant strides, especially in the fields of computer vision and voice recognition. This study introduces a system that leverages these technologies to recognize users through a camera and relay commands within a vehicle based on voice commands. The system uses the YOLO (You Only Look Once) machine learning algorithm, widely used for object and entity recognition, to identify specific users. For voice command recognition, a machine learning model based on spectrogram voice analysis is employed to identify specific commands. This design aims to enhance security and convenience by preventing unauthorized access to vehicles and IoT devices by anyone other than registered users. We converts camera input data into YOLO system inputs to determine if it is a person, Additionally, it collects voice data through a microphone embedded in the device or computer, converting it into time-domain spectrogram data to be used as input for the voice recognition machine learning system. The input camera image data and voice data undergo inference tasks through pre-trained models, enabling the recognition of simple commands within a limited space based on the inference results. This study demonstrates the feasibility of constructing a device management system within a confined space that enhances security and user convenience through a simple real-time system model. Finally our work aims to provide practical solutions in various application fields, such as smart homes and autonomous vehicles.

User Experience Study on First Aid Training Using Virtual Reality

  • Narmeen Alhyari;Shaidah Jusoh
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.21-31
    • /
    • 2024
  • This study investigates the user experience (UX) of first aid training using virtual reality (VR) technology. As VR continues to be adopted for educational and training purposes, it is important to understand how learners perceive and engage with this medium for developing critical skills, such as first aid. In this study, we developed a VR application called "VR First Aid" that includes training modules on three emergency scenarios: heatstroke, shock, and seizure. The application has both tutorial and hands-on training components. We conducted a UX study by administering a questionnaire to participants. The UX of learning through the VR application was then compared to using a traditional e-book format. Results indicate that participants perceived stronger internal behavior control with the e-book but reported better confirmation, engagement, enjoyment, and intention to use when training with the VR system. Gender differences were also explored, revealing that female participants expressed greater interest in learning through the VR platform compared to male participants. These findings provide insights into the strengths and limitations of VR-based first aid training compared to traditional methods. Implications for the design and deployment of VR training systems are discussed, with a focus on optimizing the learner experience and learning outcomes.

Does Online Travel & Retail Distribution Agency's e-Service Quality Improve Customer Satisfaction, Trust, and Loyalty?

  • Wen Rou XIANG;Yong-Ki LEE;Wen Long WANG
    • Journal of Distribution Science
    • /
    • v.22 no.10
    • /
    • pp.91-102
    • /
    • 2024
  • Purpose: This study exploresthe impact of e-service quality (e-SQ) on satisfaction, trust, and loyalty within Chinese online travel retail distribution agencies (OTRDAs) using the SOR (stimulus-organism-response) model. In addition, this research examines the mediating roles of satisfaction and trust in the relationship between e-SQ and loyalty. In the model, e-SQ encompasses four sub-dimensions, such as information, efficiency, reliability, and security. Research design, data, and methodology: Data were collected from 401 respondents through an online survey. The data were analyzed using SPSS 25.0 and SmartPLS 4.1 to test the relationships among the variables. Results: The findings reveal that information, efficiency, reliability, and security positively influence satisfaction and trust. Both satisfaction and trust, in turn, significantly enhance loyalty. Mediation analysisindicatesthat satisfaction and trust partially mediate the relationship between e-SQ and loyalty. Conclusions: The study highlights the direct effects of e-SQ components on satisfaction and trust, as well as their indirect effects on loyalty within the OTRDA framework. Notably, trust exerts a stronger influence on loyalty than satisfaction, underscoring the importance of trust as a mediator in the satisfaction-loyalty relationship. Consequently, customer loyalty programs for OTRDAs should prioritize trust evaluations alongside satisfaction measures.

Satisfaction Realization of Apartment House Inhabitants for CPTED Design Element: To with Group by CPTED Application Level, Reciprocal Action Effect of Crime Prevention Effort (CPTED 설계요소에 대한 공동주택주민의 만족도 인식: CPTED 적용수준별 집단과 거주기간, 범죄예방노력의 교호작용효과)

  • Choi, Hyun-Sick;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.231-258
    • /
    • 2010
  • A study apartment house inhabitants of to, crime prevention effort is done satisfaction analysis and that deduce design plan of CPTED that can overcome safe life space embodiment and criminal fear from crime in Juminin viewpoint through atomize group's interaction by background fantast. Is positive because factor analysis wave and satisfaction index of deduce universe (Total group) 8 factor are presented more than all 0, and quite was expose by level that is worth accommodating. Satisfaction index of The secondary design group (Group1) 8 factor is positive because is presented more than all 0, and mechanical access control, mechanical surveillance is level that is worth accommodating quite, and level that is proper in remainder 6 dimension appear. Can know that 1 The secondary design group(Group2) is expose by level that satisfaction characteristic of 8 factor can be presented more than all 0 and appeared positively, and accommodate quite in all dimensions. Result that analyze Two-way ANOVA satisfaction difference of environment design of group by satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction by appeared satisfaction high in group less than natural access control, 2 years of natural surveillance, and reciprocal action effect that go with group is high satisfaction in 2 years low in The secondary design group more than the primary and the secondary design group of systematic access control and natural access control, and the primary and the secondary design group appeared high in subgroup of 2 remainders. Satisfaction difference by group by crime prevention effort satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction difference by crime prevention effort appeared satisfaction high in 'A prize' group to The secondary design group, and reciprocal action efficiency is high in 'A prize' group in The secondary design group more than the primary and the secondary design group in mechanical access control, systematic access control, natural access control, territoriality reinforcement, and satisfaction of 'Between' and 'Very' group appeared high in the primary and the secondary design group.

  • PDF