285 research outputs found
Cognitive Radio for Smart Grid with Security Considerations
In this paper, we investigate how Cognitive Radio as a means of communication can be utilized to serve a smart grid deployment end to end, from a home area network to power generation. We show how Cognitive Radio can be mapped to integrate the possible different communication networks within a smart grid large scale deployment. In addition, various applications in smart grid are defined and discussed showing how Cognitive Radio can be used to fulfill their communication requirements. Moreover, information security issues pertained to the use of Cognitive Radio in a smart grid environment at different levels and layers are discussed and mitigation techniques are suggested. Finally, the well-known Role-Based Access Control (RBAC) is integrated with the Cognitive Radio part of a smart grid communication network to protect against unauthorized access to customer’s data and to the network at large
Situational Awareness based Risk-Adapatable Access Control in Enterprise Networks
As the computing landscape evolves towards distributed architectures such as
Internet of Things (IoT),enterprises are moving away from traditional perimeter
based security models toward so called zero trust networking (ZTN) models that
treat both the intranet and Internet as equally untrustworthy. Such security
models incorporate risk arising from dynamic and situational factors, such as
device location and security risk level risk, into the access control decision.
Researchers have developed a number of risk models such as RAdAC (Risk
Adaptable Access Control) to handle dynamic contexts and these have been
applied to medical and other scenarios. In this position paper we describe our
ongoing work to apply RAdAC to ZTN. We develop a policy management framework,
FURZE, to facilitate fuzzy risk evaluation that also defines how to adapt to
dynamically changing contexts. We also consider how enterprise security
situational awareness (SSA) - which describes the potential impact to an
organisations mission based on the current threats and the relative importance
of the information asset under threat - can be incorporated into a RAdAC schemeComment: 6 page
Internet of things: Vision, applications and research challenges
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects related to the extension of the Internet and the Web into the physical realm, by means of the widespread deployment of spatially distributed devices with embedded identification, sensing and/or actuation capabilities. Internet-of-Things envisions a future in which digital and physical entities can be linked, by means of appropriate information and communication technologies, to enable a whole new class of applications and services. In this article, we present a survey of technologies, applications and research challenges for Internet-of-Things
Access control technologies for Big Data management systems: literature review and future trends
Abstract Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a reference data model and related data manipulation languages. In this paper, we focus on one of the key data security services, that is, access control, by highlighting the differences with traditional data management systems and describing a set of requirements that any access control solution for Big Data platforms may fulfill. We then describe the state of the art and discuss open research issues
- …