• Title/Summary/Keyword: Smart world security

Search Result 80, Processing Time 0.031 seconds

Self-sufficiencies in Cyber Technologies: A requirement study on Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.204-214
    • /
    • 2022
  • Speedy development has been witnessed in communication technologies and the adoption of the Internet across the world. Information dissemination is the primary goal of these technologies. One of the rapidly developing nations in the Middle East is Saudi Arabia, where the use of communication technologies, including mobile and Internet, has drastically risen in recent times. These advancements are relatively new to the region when contrasted to developed nations. Thus, offenses arising from the adoption of these technologies may be new to Saudi Arabians. This study examines cyber security awareness among Saudi Arabian citizens in distinct settings. A comparison is made between the cybersecurity policy guidelines adopted in Saudi Arabia and three other nations. This review will explore distinct essential elements and approaches to mitigating cybercrimes in the United States, Singapore, and India. Following an analysis of the current cybersecurity framework in Saudi Arabia, suggestions for improvement are determined from the overall findings. A key objective is enhancing the nationwide focus on efficient safety and security systems. While the participants display a clear knowledge of IT, the surveyed literature shows limited awareness of the risks related to cyber security practices and the role of government in promoting data safety across the Internet. As the findings indicate, proper frameworks regarding cyber security need to be considered to ensure that associated threats are mitigated as Saudi Arabia aspires to become an efficient smart nation.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Optimization of multi-water resources in economical and sustainable way satisfying different water requirements for the water security of an area

  • Gnawali, Kapil;Han, KukHeon;Koo, KangMin;Yum, KyungTaek;Jun, Kyung Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.161-161
    • /
    • 2019
  • Water security issues, stimulated by increasing population and changing climate, are growing and pausing major challenges for water resources managers around the world. Proper utilization, management and distribution of all available water resources is key to sustainable development for achieving water security To alleviate the water shortage, most of the current research on multi-sources combined water supplies depends on an overall generalization of regional water supply systems, which are seldom broken down into the detail required to address specific research objectives. This paper proposes the concept of optimization framework on multi water sources selection. A multi-objective water allocation model with four objective functions is introduced in this paper. Harmony search algorithm is employed to solve the applied model. The objective functions addresses the economic, environmental, and social factors that must be considered for achieving a sustainable water allocation to solve the issue of water security.

  • PDF

A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube

  • Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.113-122
    • /
    • 2022
  • At the point when it is check out ourselves, it might track down various information in each turn or part of our lives. Truth be told, information is the new main thrust of our advanced civilization and in this every day, "information-driven" world, security is the significant angle to consider to guarantee dependability and accessibility of our organization frameworks. This paper includes a new cryptographic algorithm for safe route traversal for data of smart cities which is a contemporary, non-hash, non-straight, 3D encryption execution intended for having information securely scrambled in the interim having a subsequent theoretical layer of safety over it. Encryption generally takes an information string and creates encryption keys, which is the way to unscramble as well. In the interim in another strategy, on the off chance that one can sort out the encryption key, there are opportunities to unravel the information scrambled inside the information string. Be that as it may, in this encryption framework, the work over an encryption key (which is created naturally, henceforth no pre-assurance or uncertainty) just as the calculation produces a "state" in a way where characters are directed into the Rubik block design to disregard the information organization.

Implementation of Smart Control System based on Intelligent Dimming with LEDs

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.127-133
    • /
    • 2016
  • In this paper, an intelligent dimming control system is designed and implemented with the human visual response function using CDS sensor, PIR sensor and temperature sensor, etc. The proposed system is designed to detect a moving object by PIR sensor and to control the LED dimming considering the human visual response. Also, the dimming of LED light can modulate on the app, and simultaneously control dimming in real-world environments with smart phone app. A high-temperature warning or a fire hazard information is transmitted to user's smart phone according to sensor values and Data graph are provided as part of data visualization. Connecting the hardware controller, the proposed intelligent smart dimming control system is expected to contribute to the power reduction interior LED, smart grid building and saving home combining with internet of things.

When Sensor and Actuator Networks Cover the World

  • Stankovic, John A.
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.627-633
    • /
    • 2008
  • The technologies for wireless communication, sensing, and computation are each progressing at faster and faster rates. Notably, they are also being combined for an amazingly large multiplicative effect. It can be envisioned that the world will eventually be covered by networks of networks of smart sensors and actuators. This fact will give rise to revolutionary applications. However, to make this vision a reality, many research challenges must be overcome. This paper describes a representative set of new applications and identifies several key research challenges.

  • PDF

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF

Factors of Successful Development of Smart Cities

  • Iryna, Kalenyuk;Iryna, Uninets;Yevhen, Panchenko;Nataliia, Datsenko;Maxym, Bohun
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.21-28
    • /
    • 2022
  • The increase in the number of large cities and the size of their population sharpens attention to the new role of cities as entities to ensure a high-quality, safe and modern life of citizens, which has become significantly more active in recent years. The rapid spread of smart cities in the modern world has actualized the issue of analyzing their success and assessing the role of various factors in this. Every success of a smart city is always the result of a unique combination of the most modern technologies, environmental and social initiatives, skillful and consistent management, as well as available human potential. The purpose of the article is to analyze the success factors of smart cities based on the generalization of the results of the most famous ratings. In order to identify the impact of various factors, primarily intellectual, on the success and leadership positions of smart cities, the following ratings were consistently analyzed: Smart City Index (SCI), City in Motion Index (CIMI), Global Power City Index (GPCI), Global Cities Index (GCI), Global Cities Outlook (GCO). They have a different list of indicators and main pillars (dimensions), but all ratings take into account aspects such as: governance, ICT, mobility, functionality, human capital, etc. The highest correlation coefficient, that is, the strongest linear relationship of the CIMI index was found with such factors as: Human capital, Economy, Governance and Technologies. Summarizing the results of the TOP 20 smart cities according to different ratings allowed us to confirm that the list of leaders is very similar in all ratings. Among those cities that are in the TOP-20 in all five indexes are: London, Sydney and Singapore. There are four indices: New York, Paris, Tokyo, Copenhagen, Berlin, Amsterdam, Melbourne. Achieving leadership positions in smart city rankings is always the result of a combination and synergy of certain factors, and first of all, it is the quality of human capital. The intensity and success of the use of information and communication technologies in locality management processes, city planning and improvement of the city's living conditions depend on it.

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

IoT and Smart City Technology: Challenges, Opportunities, and Solutions

  • Jeong, Young-Sik;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.233-238
    • /
    • 2019
  • Internet of Things (IoT) technology has been recently utilized in diverse fields. Smart city is one of the IoT application domains with a lot of research topics and which is operated by integrated IoT applications. In this paper, diverse kinds of solutions, processes, and frameworks to address the existing challenges in information technology are introduced. Such solutions involve various future track topics including blockchain, security, steganography, optimization, machine learning, smart system, and so on. In the subsequent paragraphs, we describe each topic in a summarized way in terms of the existing challenges and their solutions. Specifically, this paper introduced 18 novel and enhanced research studies from different countries in the world. We present diverse kinds of paradigms to subjects that tackle diverse kinds of research areas such as IoT and Smart City, and so on.