3,874 research outputs found

    A survey on cyber security for smart grid communications

    Get PDF
    A smart grid is a new form of electricity network with high fidelity power-flow control, self-healing, and energy reliability and energy security using digital communications and control technology. To upgrade an existing power grid into a smart grid, it requires significant dependence on intelligent and secure communication infrastructures. It requires security frameworks for distributed communications, pervasive computing and sensing technologies in smart grid. However, as many of the communication technologies currently recommended to use by a smart grid is vulnerable in cyber security, it could lead to unreliable system operations, causing unnecessary expenditure, even consequential disaster to both utilities and consumers. In this paper, we summarize the cyber security requirements and the possible vulnerabilities in smart grid communications and survey the current solutions on cyber security for smart grid communications. © 2012 IEEE

    COSPO/CENDI Industry Day Conference

    Get PDF
    The conference's objective was to provide a forum where government information managers and industry information technology experts could have an open exchange and discuss their respective needs and compare them to the available, or soon to be available, solutions. Technical summaries and points of contact are provided for the following sessions: secure products, protocols, and encryption; information providers; electronic document management and publishing; information indexing, discovery, and retrieval (IIDR); automated language translators; IIDR - natural language capabilities; IIDR - advanced technologies; IIDR - distributed heterogeneous and large database support; and communications - speed, bandwidth, and wireless

    Smart Contract Assisted Blockchain based PKI System

    Full text link
    The proposed smart contract can prevent seven cyber attacks, such as Denial of Service (DoS), Man in the Middle Attack (MITM), Distributed Denial of Service (DDoS), 51\%, Injection attacks, Routing Attack, and Eclipse attack. The Delegated Proof of Stake (DPoS) consensus algorithm used in this model reduces the number of validators for each transaction which makes it suitable for lightweight applications. The timing complexity of key/certificate validation and signature/certificate revocation processes do not depend on the number of transactions. The comparisons of various timing parameters with existing solutions show that the proposed PKI is competitively better.Comment: manuscrip

    Designing an architecture for secure sharing of personal health records : a case of developing countries

    Get PDF
    Includes bibliographical references.While there has been an increase in the design and development of Personal Health Record (PHR) systems in the developed world, little has been done to explore the utility of these systems in the developing world. Despite the usual problems of poor infrastructure, PHR systems designed for the developing world need to conform to users with different models of security and literacy than those designed for developed world. This study investigated a PHR system distributed across mobile devices with a security model and an interface that supports the usage and concerns of low literacy users in developing countries. The main question addressed in this study is: “Can personal health records be stored securely and usefully on mobile phones?” In this study, mobile phones were integrated into the PHR architecture that we/I designed because the literature reveals that the majority of the population in developing countries possess mobile phones. Additionally, mobile phones are very flexible and cost efficient devices that offer adequate storage and computing capabilities to users for typically communication operations. However, it is also worth noting that, mobile phones generally do not provide sufficient security mechanisms to protect the user data from unauthorized access

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects

    Survey on E-commerce and its applications

    Get PDF
    Electronic Commerce, usually is called e-commerce, conducts business on-line. It is electronic forms of communication that permits the exchange of sale information related to goods and services purchasing between buyers and sellers with digital cash and via Electronic Data Interchange (EDI). The application of e-commerce is very important because that is the only way that how buyers and on-line business stores make the deals without seeing and talking each other. The applications should be very friendly (interface with nice layout and easily accepted by the potential buyers), easy to access and use (almost without to learn any computer and network skills), showing all the necessary and related information to all the viewers (no any questions could not be found during purchasing), and trusted by real buyers (secure without the personal information leaking to third party especially social secure number and financial information). The well know on-line solutions are from IBM’s WebSphere Commerce Suite, Microsoft Corp’s Site Server Commerce Edition, Yahoo’s Yahoo Store, and BroadVision’s One-to-One Commerce, and all of them use web secure protocols such as S-HTTP (Secure HyperText Transfer Protocol), SSL (Secure Sockets Layer), or SEPP (Secure Electronic Payment Protocol). E-commerce has a lot of benefits if it compares with long time traditional business - less expense, space saving, spread fast, saving shopping time, easy comparison, almost no sales tax, etc.. With Internet and personal computer growing dramatically in the last decade, we already saw the huge on-line business obviously. In the next few years along with technological development and innovation of computer, Internet, and any other related factors, the potential e-commerce market will grow to billion and billion dollars business worldwide. E-commerce is changing people’s daily life and their shopping habitations

    Blockchain based application for circular economy

    Get PDF
    Over the last few years, web services have evolved enormously, from archaic text-only websites where only the web master can upload and update content, to the most modern applications such as social networks with video calls and real-time video streaming where all users interact and create new content. All these advances in the way services are built and how we interact with them have been made possible by major technological improvements and contributions, such as the increasing speed of access networks, the evolution from desktop to laptop computers, the emergence of pocket devices such as smartphones and the development of even more powerful wireless access networks, such as the evolution of mobile telephony standards. Despite all this evolution, technology has not stagnated and continues to evolve to provide us new ways to build services and interact with virtual worlds. In recent years, new technologies have appeared, and these technologies have produced a paradigm shift in the relationship we will have with web-based services, and some companies are even talking about the beginning of a fully immersive metaverse. In this thesis we will analyze some of these technologies, such as blockchain networks, their possible social implications and we will develop an application based on this technology following a circular economy framework.Objectius de Desenvolupament Sostenible::9 - Indústria, Innovació i InfraestructuraObjectius de Desenvolupament Sostenible::10 - Reducció de les Desigualtat

    Developing Affordable Smart Solutions for Police Reporting

    Get PDF
    Due to the high costs of many eCitation systems currently on the market, many police agencies are still using pen and paper to fill out their citations. This traditional citation method may be cost effective. However, it is time consuming and the chance of errors occurring on the form are high. PARIS, an eCitation system developed by The University Of Oklahoma (OU) Center For Intelligent Transportation Systems (CITS), has solved many of the issues faced by these agencies but because of the high cost of implementation, it is not a viable option for all police agencies in the State of Oklahoma. By taking advantage of the smartphones already carried by most officers and the help of Xamerin forms, I offer a solution based on the current design and implementation of PARIS called PARIS+. The development of the cross platform application, PARIS+, creates a police data collection system that is both more affordable and easier to use than currently available systems while still delivering high accuracy data for electronic citations. Since the system was also developed with scalability in mind, it has the potential to be able to support Crash, Driving Under Influence(DUI), or Stored Vehicle Report Forms in the futu

    Challenges in Cybersecurity and Privacy - the European Research Landscape

    Get PDF
    Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects
    corecore