2,158 research outputs found

    Can The Functions Of A Paper Bill Of Lading Be Replicated By Electronic Bill Of Lading

    Get PDF
    The replication of the functions of paper bill of lading by the electronic bill of lading has generated series of controversy among shippers and carriers from high tech states and low tech states. Due to the nature of the traditional functions of paper bill of lading being capable of recognised as receipt for goods, evidence of contract of carriage and documents of title, proponent of the paper bill have questioned the capability of the electronic bill to actually replicate these functions. Modern means of replicating the paper bill are in operation in advanced states. Such electronic data base system like Bolero, The @ Global Trade, APL have all attempted to replicate the paper bill of lading, though, with some defects which borders on security concerns associated with electronic data message coupled with the evidentiary value of such data messages in different jurisdictions. Furthermore the problems of negotiability and meeting the writing requirements of the paper bill by the electronic bill has been a major source of concern considering the deep rooted conservative attitude of traders. Various arguments and defects of the paper and electronic bill of lading will be examined critically with the objective of finding practical and viable option which is faster and convenient in transacting international business for shippers and carriers. Keywords: bill of lading, electronic bill, contract of carriag

    Security assessment of the smart grid : a review focusing on the NAN architecture

    Get PDF
    Abstract: This paper presents a comprehensive review on the security aspect of the smart grid communication network. The paper focus on the Neighborhood Area Network (NAN) cybersecurity and it laid emphasis on how the NAN architecture is such an attractive target to intruders and attackers. The paper aims at summarizing recent research efforts on some of the attacks and the various techniques employed in tackling them as they were discussed in recent literatures and research works. Furthermore, the paper presents a detailed review on the smart grid communication layers, wireless technology standards, networks and the security challenges the grid is currently facing. The work concludes by explaining current and future directions NAN communication security could consider in terms of data privacy measures. The data privacy measures are discussed in terms of prevention and detection techniques

    DESIGN OF EFFICIENT NANOELECTRONIC MEMORY AND CRYPTOGRAPHIC CIRCUITS

    Get PDF
    This thesis presents the design of Nanoelectronic Memory cell and arrays compatible with molecular switch (nanodevice) electrical characteristics. The proposed transmission gate based CMOL (hybrid CMOS / Molecular) memory cell surmounts the operational difficulties facing previous design. The Control circuitry with improved multiplexer design is introduced in this dissertation. Yield improvement through replacing the defective cell with a free cell can be achieved using a proposed algorithm. Moreover, the proposed memory cell has the same area as the existing CMOL inverter cells allowing easier implementation of both logic and memory circuits on the same chip. An efficient hardware implementation of the SBox from the Advanced Encryption Standard (AES) is presented in this dissertation. Modification of the design was achieved by adding Tri­ state Inverter followed by an Inverter (TII). Simulation results show a reduction in the average power dissipation as well as the time delays. Reduction of supply voltage and using low Vdd in non critical path improved the performance by reducing the energy delay product. Different transistors models with dual threshold voltage (Vt) based on 65nm CMOS technology were applied to the design to achieve further improvement. Keywords: CMOL, CMOL circuits, Nanoscale memory, Control Circuit, AES, SBox, Deep sub-micron CMOS technology, Tri-state Inverter, Low Power SBo

    Security Weaknesses in the APCO Project 25 Two-Way Radio System

    Get PDF
    APCO Project 25 (“P25”) is a suite of wireless communications protocols designed for public safety two-way (voice) radio systems. The protocols include security options in which voice and data traffic can be cryptographically protected from eavesdropping. This report analyzes the security of P25 systems against passive and active attacks. We find a number of protocol, implementation, and user interface weaknesses that can leak information to a passive eavesdropper and that facilitate active attacks. In particular, P25 systems are highly susceptible to active traffic analysis attacks, in which radio user locations are surreptitiously determined, and selective jamming attacks, in which an attacker can jam specific kinds of traffic (such as encrypted messages or key management traffic). The P25 protocols make such attacks not only feasible but highly efficient, requiring, for example, significantly less aggregate energy output from a jammer than from the legitimate transmitters

    Remote ECG System Data Encryption Scheme

    Get PDF

    A Machine Learning SDN-Enabled Big Data Model for IoMT System

    Full text link
    [EN] In recent times, health applications have been gaining rapid popularity in smart cities using the Internet of Medical Things (IoMT). Many real-time solutions are giving benefits to both patients and professionals for remote data accessibility and suitable actions. However, timely medical decisions and efficient management of big data using IoT-based resources are the burning research challenges. Additionally, the distributed nature of data processing in many proposed solutions explicitly increases the threats of information leakages and damages the network integrity. Such solutions impose overhead on medical sensors and decrease the stability of the real-time transmission systems. Therefore, this paper presents a machine-learning model with SDN-enabled security to predict the consumption of network resources and improve the delivery of sensors data. Additionally, it offers centralized-based software define network (SDN) architecture to overcome the network threats among deployed sensors with nominal management cost. Firstly, it offers an unsupervised machine learning technique and decreases the communication overheads for IoT networks. Secondly, it predicts the link status using dynamic metrics and refines its strategies using SDN architecture. In the end, a security algorithm is utilized by the SDN controller that efficiently manages the consumption of the IoT nodes and protects it from unidentified occurrences. The proposed model is verified using simulations and improves system performance in terms of network throughput by 13%, data drop ratio by 39%, data delay by 11%, and faulty packets by 46% compared to HUNA and CMMA schemes.Haseeb, K.; Ahmad, I.; Iqbal Awan, I.; Lloret, J.; Bosch Roig, I. (2021). A Machine Learning SDN-Enabled Big Data Model for IoMT System. Electronics. 10(18):1-13. https://doi.org/10.3390/electronics10182228S113101

    Analyzing the Efficiency of a New Image Encryption Method Based on Aboodh Transformations

    Get PDF
    الهدف من هذا البحث هو تطوير طريقة تشفير فريدة من نوعها تستخدم طريقة Aboodh وتحويلها العكسي مع طريقة S-Box. تشير نتائج التقييمات إلى أن هذا العمل مناسب للاستخدام في تطبيقات التشفير الآمنة، ويوفر أدلة فيما يتعلق ببناء نظام تشفير للصور بناءً على السلوكيات المعقدة التي يوضحها. بعد تطبيق المنهجيات التي تم تقديمها لتصوير البيانات المأخوذة من مواقف الحياة الواقعية، تم تقييم النتائج باستخدام مجموعة واسعة من المعايير الإحصائية ومعايير الأداء. نتائج هذا التحقيق تؤدي إلى تحسين موثوقية نظام التشفير.The goal of this research is to develop a unique cryptographic method that makes use of Aboodh and its inverse transform in combination with the S-Box approach. The results of evaluations indicate that this work is appropriate for use in safe cryptographic applications, and it provides clues regarding the building of an image cryptosystem based on the complicated behaviors that it demonstrates. After applying the methodologies that have been provided to depict data taken from real-life situations, the results have been evaluated using a wide variety of statistical and performance criteria. The findings of this investigation result in an improvement to the reliability of the cryptosystem

    A service-oriented architecture for robust e-voting

    Get PDF

    Design of a Secure Architecture for Last Mile Communication in Smart Grid Systems

    Get PDF
    AbstractEver increasing need of electricity has paved the need for Smart Grids. Smart Meters, digitalized networks and fault tolerant systems are the basic infrastructure which supports Smart Grid. Security in Smart Grid has become a major concern in the present scenario. In this paper we have proposed security architecture at the last mile distribution in Home Area Networks. A Secure communication architecture has been modeled which focuses on secure data transmission between the Smart Meters at home and Central Gateway at the utility centre. Hybrid Encryption algorithms and Digital Signature has been used to provide data integrity. The strength of the model has been verified with the help of an attacker and the model is found to resist attacks. The Encryption time and Decryption time of the cyptostack is lower when compared with other encryption algorithms
    corecore