• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.027 seconds

A Survey of Trust Management in WSNs, Internet of Things and Future Internet

  • Chang, Kai-Di;Chen, Jiann-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.5-23
    • /
    • 2012
  • Nowadays, most researchers and manufacturers always pay attention on wireless sensor networks (WSNs) due to its potential applications in many regions such as military, industrial and civilian areas. WSNs are the basic components of Internet of Things (IoT) and the key to machine-to-machine communications and the future Internet. Also, the security is an essential element for deploying WSNs. Recently the concept of trust-based mechanism was proposed in WSNs such as traditional cryptographic and authentication mechanisms. However, there is lack a survey on trust management for WSNs, IoT even future Internet. In this paper, we discuss the concept and potential application areas of trust management for WSNs and IoT worlds. Furthermore, we survey different trust management issues (i.e., cluster, aggregation, reputation). Finally, future research directions with respect to trust management in WSNs and future IoT world are provided. We give not only simple WSNs for IoT environments but also a simulated bootstrap platform to provide the discussion of open challenges and solutions for deploying IoT in Future Internet.

Towards Designing Efficient Lightweight Ciphers for Internet of Things

  • Tausif, Muhammad;Ferzund, Javed;Jabbar, Sohail;Shahzadi, Raheela
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4006-4024
    • /
    • 2017
  • Internet of Things (IoT) will transform our daily life by making different aspects of life smart like smart home, smart workplace, smart health and smart city etc. IoT is based on network of physical objects equipped with sensors and actuators that can gather and share data with other objects or humans. Secure communication is required for successful working of IoT. In this paper, a total of 13 lightweight cryptographic algorithms are evaluated based on their implementation results on 8-bit, 16-bit, and 32-bit microcontrollers and their appropriateness is examined for resource-constrained scenarios like IoT. These algorithms are analysed by dissecting them into their logical and structural elements. This paper tries to investigate the relationships between the structural elements of an algorithm and its performance. Association rule mining is used to find association patterns among the constituent elements of the selected ciphers and their performance. Interesting results are found on the type of element used to improve the cipher in terms of code size, RAM requirement and execution time. This paper will serve as a guideline for cryptographic designers to design improved ciphers for resource constrained environments like IoT.

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.

A Study on Identification of the Heat Vulnerability Area - Case Study in Chungcheongnamdo - (폭염 취약지역 도출에 관한 연구 - 충청남도를 대상으로 -)

  • Lee, Gyeongjin;Cha, Jungwoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.25 no.1
    • /
    • pp.67-74
    • /
    • 2019
  • This study is to identify the heat vulnerability area as represented by heat risk factors which could be attributable to heat-related deaths. The heat risk factors were temperature, Older Adults(OA), Economic Disadvantage(ED), Accessibility of Medical Services(AMS), The population Single Person Households(SPH). The factors are follow as; the temperature means to the number of days for decades average daily maximum temperature above $31^{\circ}C$, the Older Adults means to population ages 65 and above, furthermore, the Economic Disadvantage means to the population of Basic Livelihood Security Recipients(BLSR), the Accessibility of Medical Services(AMS) means to 5 minutes away from emergency medical services. The results of the analysis are showed that the top-level of temperature vulnerability areas is Dong, the top-level of vulnerability OA areas is Eup, the top-level of AMS vulnerability is Eup. Moreover, the top-level of vulnerability ED area appears in the Eup and Dong. The result of analysing relative importance to each element, most of the Eup were vulnerable to heat. Since, there are many vulnerable groups such as Economic Disadvantage, Older Adults in the Eup. We can be figured out estimated the number of heat-related deaths was high in the Eup and Dong by the data of emergency activation in the Chungcheongnam-do Fire Department. Therefore, the result of this study could be reasonable.

Computer vision monitoring and detection for landslides

  • Chen, Tim;Kuo, C.F.;Chen, J.C.Y.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.2
    • /
    • pp.161-171
    • /
    • 2019
  • There have been a few checking frameworks intended to ensure and improve the nature of their regular habitat. The greater part of these frameworks are constrained in their capacities. In this paper, the insightful checking framework intended for debacle help and administrations has been exhibited. The ideal administrations, necessities and coming about plan proposition have been indicated. This has prompted a framework that depends fundamentally on ecological examination so as to offer consideration and security administrations to give the self-governance of indigenous habitats. In this sense, ecological acknowledgment is considered, where, in light of past work, novel commitments have been made to help include based and PC vision situations. This epic PC vision procedure utilized as notice framework for avalanche identification depends on changes in the normal landscape. The multi-criteria basic leadership strategy is used to incorporate slope data and the level of variety of the highlights. The reproduction consequences of highlight point discovery are shown in highlight guide coordinating toward discover steady and coordinating component focuses and effectively identified utilizing these two systems, by examining the variety in the distinguished highlights and the element coordinating.

Critical Factors of Reacquainting Consumer Trust in E-Commerce

  • FAN, Mingyue;AMMAH, Victoria;DAKHAN, Sarfraz Ahmed;LIU, Ran;MINGLE, Moses NiiAkwei;PU, Zhengjia
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.3
    • /
    • pp.561-573
    • /
    • 2021
  • Knowing how to build and maintain consumer trust is crucial for e-commerce. Despite the number of empirical studies that have explored the factors that influence consumer trust, none of them considers the relative importance of different antecedents and how they interact to influence consumer trust. Therefore, based on the integrated Decision Making Trial and Evaluation Laboratory (DEMATEL) and Interpretive Structural Modeling (ISM) approaches, we establish a hierarchical structural model, which not only demonstrates the intensity of the relationships but also identifies the interdependence among the drivers of consumer trust in E-commerce. The findings confirm that propensity to trust is the most important determinant of consumer trust. The brand-related factors and platform-related factors are prominent in the process of building trust as they influence consumer trust indirectly through propensity to trust. Geographic location, demographic variables, and high security are identified as the root causes that affect consumer trust through other trust antecedents. Furthermore, the findings of this study offer valuable insights into an important element of e-commerce and provide a useful platform for future research. More represented samples and factors are encouraged for further research to ensure research fairness and minimize consumer distrust and uncertainty.

A Study on the Users' Response to Privacy Issues in Customized Services

  • Park, Sunwoo;Baek, Jeongyun;Yoo, Yeajoo;Kim, Dongwhan
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.201-208
    • /
    • 2022
  • Customized service is a vital and mandatory element for apps in improving their technical performance and app customer analysis. While apps require users' consent for their data extraction and usage, many of the terms and agreement forms are written intricately, making it harder for users to fully understand the whole concept of users' data collection for customized services. Ever since the Facebook-Cambridge Analytica scandal, personal data privacy has been re-examined, forcing many app companies to reinforce a reliable solution to data privacy issues. However, there has not been a secured solution, which worries many people about the future advanced issues when metaverse platforms are actively used in daily apps. The research aims to collect the reactions and behaviors of everyday app users who utilize apps with customized services to understand the nature of privacy data issues and the users' opinions about the future implementation of metaverse platforms. The method of the research was an online questionnaire that targeted university students. The study revealed many fearful and anxious reactions about personal data and further metaverse issues where most app users were uneducated about how current apps collect and utilize users' private data.

Simplified analytical solution of tunnel cross section under oblique incident SH wave in layered ground

  • Huifang Li;Mi Zhao;Jingqi Huang;Weizhang Liao;Chao Ma
    • Earthquakes and Structures
    • /
    • v.24 no.1
    • /
    • pp.65-79
    • /
    • 2023
  • A simplified analytical solution for seismic response of tunnel cross section in horizontally layered ground subjected to oblique incidence of SH wave is deduced in this paper. The proposed analytical solution consists of two main steps: free-field response in layered field and tunnel response. The free field responses of the layered ground are obtained by one-dimensional finite element method in time domain. The tunnel lining is treated as a thick-wall cylinder to calculate the tunnel response, which subject to free field stress. The analytical solutions are verified by comparing with the dynamic numerical results of two-dimensional ground-lining interaction analysis under earthquake in some common situations, which have a good agreement. Then, the appropriate range of the proposed analytical solution is analyzed, considering the height of the layered ground, the wavelength and incident angle of SH wave. Finally, by using the analytical solutions, the effects of the ground material, burial depth of the tunnel, and lining thickness and the slippage effect at the ground-lining interface on the seismic response of tunnels are investigated. The proposed solution could serve as a useful tool for seismic analysis and design of tunnels in layered ground.

Numerical investigation of glass windows under near-field blast

  • Chiara Bedon;Damijan Markovic;Vasilis Karlos;Martin Larcher
    • Coupled systems mechanics
    • /
    • v.12 no.2
    • /
    • pp.167-181
    • /
    • 2023
  • The determination of the blast protection level and the corresponding minimum load-bearing capacity for a laminated glass (LG) window is of crucial importance for safety and security design purposes. In this paper, the focus is given to the window response under near-field blast loading, i.e., where relatively small explosives would be activated close to the target, representative of attack scenarios using small commercial drones. In general, the assessment of the load-bearing capacity of a window is based on complex and expensive experiments, which can be conducted for a small number of configurations. On the other hand, nowadays, validated numerical simulations tools based on the Finite Element Method (FEM) are available to partially substitute the physical tests for the assessment of the performance of various LG systems, especially for the far-field blast loading. However, very little literature is available on the LG window performance under near-field blast loads, which differs from far-field situations in two points: i) the duration of the load is very short, since the blast wavelength tends to increase with the distance and ii) the load distribution is not uniform over the window surface, as opposed to the almost plane wave configuration for far-field configurations. Therefore, the current study focuses on the performance assessment and structural behaviour of LG windows under near-field blasts. Typical behavioural trends are investigated, by taking into account possible relevant damage mechanisms in the LG window components, while size effects for target LG windows are also addressed under a multitude of blast loading configurations.

The Legal Definition of Effective Control and Dokdo Issue: International Law as Critical Asset of National Maritime Strategy (독도(獨島)의 실효적(實效的) 지배(支配)와 해양(海洋) 전략자산(戰略資産)으로서의 국제법(國際法))

  • AHN, Han Byul
    • Strategy21
    • /
    • s.38
    • /
    • pp.13-46
    • /
    • 2015
  • Dokdo issue reaches beyond economic and security interest to Koreans, as it is regarded as symbol of her independence. Albeit the fact that Japan has merely no legitimate title over Dokdo, Japan has been tenaciously insisting their jurisdiction over Dokdo since the independence of Korea. Under such circumstances, public outrage towards Japan is most certainly understandable. Yet, mere outrage itself, lacking in logic and factual grounds, can contribute little if not any, to the desirable solution of the problem. Precedents reveal that dealing maritime issues amid lack of profound understanding in international law has often led to undesirable results, such as the inclusion of Dokdo in the Joint Management Fisheries Zone in 1999 Korea-Japan Fisheries Agreement. In a sense, adroit use of international law is a critical element in preserving Korea's sovereign rights against persistent Japanese plans to rob Dokdo once again. The Dokdo issue is inextricably bound to international law; the legal status of Dokdo as island, the equitable solution of maritime boundary delimitation and effective control, existence of dispute. Yet, the public policies and arguments made by pundits are generally in lack of understanding in international law. It is now the time for Korea to commence on long-term cross-academia / department plans to establish Dokdo strategy as part of the nationwide maritime strategy effectively using international law as its stronghold.