145,252 research outputs found
Overlay Security: Quantum-Safe Communication over the Internet Infrastructure
The need for a quantum-safe Internet is emerging, and this is a great opportunity to re-examine the legacy of public key infrastructure. There is a need for perspective on the evolution of cryptography over the years, including the perfect information-theoretical secure schemes and the computationally secure schemes, in particular. There is also a need to examine the evolving Internet infrastructure to identify efficient design and secure cryptographic schemes over the existing Internet infrastructure. A combination of overlay security, blockchain, and Merkle trees with Lamport’s signatures offers just such an easily implementable quantum-safe Internet
A novel pseudo-random number generator based on discrete chaotic iterations
Security of information transmitted through the Internet, against passive or
active attacks is an international concern. The use of a chaos-based
pseudo-random bit sequence to make it unrecognizable by an intruder, is a field
of research in full expansion. This mask of useful information by modulation or
encryption is a fundamental part of the TLS Internet exchange protocol. In this
paper, a new method using discrete chaotic iterations to generate pseudo-random
numbers is presented. This pseudo-random number generator has successfully
passed the NIST statistical test suite (NIST SP800-22). Security analysis shows
its good characteristics. The application for secure image transmission through
the Internet is proposed at the end of the paper.Comment: The First International Conference on Evolving Internet:Internet 2009
pp.71--76 http://dx.doi.org/10.1109/INTERNET.2009.1
A Secure Mechanism for Big Data Collection in Large Scale Internet of Vehicle
As an extension for Internet of Things (IoT), Internet of Vehicles (IoV) achieves unified management in smart transportation area. With the development of IoV, an increasing number of vehicles are connected to the network. Large scale IoV collects data from different places and various attributes, which conform with heterogeneous nature of big data in size, volume, and dimensionality. Big data collection between vehicle and application platform becomes more and more frequent through various communication technologies, which causes evolving security attack. However, the existing protocols in IoT cannot be directly applied in big data collection in large scale IoV. The dynamic network structure and growing amount of vehicle nodes increases the complexity and necessary of the secure mechanism. In this paper, a secure mechanism for big data collection in large scale IoV is proposed for improved security performance and efficiency. To begin with, vehicles need to register in the big data center to connect into the network. Afterwards, vehicles associate with big data center via mutual authentication and single sign-on algorithm. Two different secure protocols are proposed for business data and confidential data collection. The collected big data is stored securely using distributed storage. The discussion and performance evaluation result shows the security and efficiency of the proposed secure mechanism
Recommended from our members
The internet of food things: Adding values to the digitalisation of the UK food supply chain
The Internet of Things (IoT) is beginning to have a pronounced impact on the digitalised food manufacturing chain. Whilst the food chain is becoming at once more complex and more critical, the application of IoT has begun to be recognised as a key component of this transformation. However, exactly what the IoT is, or is not, is both evolving and provoking a lively debate. New clarifiers are being added to the term such as the Internet of Industrial Things and the Autonomous Internet of Things to ostensibly help clarify the terminology. For the purposes of the Internet of Food Things Network Plus, our conceptual and physical platform is predicated on the idea of a secure and trustworthy network based on open standards, where-possible commodity devices, and underpinned by societally ratified regulatory arrangements
Case Studies in Physical Therapy: Transitioning a "Hands-On" Approach into a Virtual Platform
Technology is expanding at an unprecedented rate. Because patients value the speed and convenience of the internet, there is an increasing demand for telemedicine. Practitioners must therefore adapt their clinical skills to evolving online technologies. This paper presents a series of three case studies in which a physical therapist first assessed and treated musculoskeletal disorders via a live, secure video. The basis of the mechanical assessment was observation of movement rather than palpation. In each case, the virtual mechanical assessment identified a specific sub-classification with a directional preference. All patients reported improvements in symptoms and function in less than four visits and all maintained a reduction in symptoms after three months. Given the “hands-off” role of the evaluator, this approach can become an effective tool in the evolving healthcare platform of telerehabilitation.
Smart Cities for Real People
Accelerating urbanization of the population and the emergence of new smart sensors (the Internet of Things) are combining in the phenomenon of the smart city. This movement is leading to improved quality of life and public safety, helping cities to enjoy economies that help remedy some budget overruns, better health care, and is resulting in increased productivity.
The following report summarizes evolving digital technology trends, including smart phone applications, mapping software, big data and sensor miniaturization and broadband networking, that combine to create a technology toolkit available to smart city developers, managers and citizens. As noted above, the benefits of the smart city are already evident in some key areas as the technology sees actual implementation, 30 years after the creation of the broadband cable modem.
The challenges of urbanization require urgent action and intelligent strategies. The applications and tools that truly benefit the people who live in cities will depend not on just the tools, but their intelligent application given current systemic obstacles, some of which are highlighted in the article. Of course, all the emerging technologies mentioned are dependent on ubiquitous, economical, reliable, safe and secure networks (wired and wireless) and network service providers
Trends in Migration, Hosting and Payment for Commercial Child Pornography Websites
The Financial Coalition Against Child Pornography ("Coalition") was formed in 2006 to address the alarming growth of commercial child pornography over the Internet. Its members include leaders in the banking and payments industries, as well as Internet services companies. One of the Coalition's charters is to track and anticipate how the mechanics of commercial child pornography are evolving. This paper looks at Trends in Migration, Hosting and Payment for Commercial Child Pornography Websites
Ontology acquisition and exchange of evolutionary product-brokering agents
Agent-based electronic commerce (e-commerce) has been booming with the development of the Internet and agent technologies. However, little effort has been devoted to exploring the learning and evolving capabilities of software agents. This paper addresses issues of evolving software agents in e-commerce applications. An agent structure with evolution features is proposed with a focus on internal hierarchical knowledge. We argue that knowledge base of agents should be the cornerstone for their evolution capabilities, and agents can enhance their knowledge bases by exchanging knowledge with other agents. In this paper, product ontology is chosen as an instance of knowledge base. We propose a new approach to facilitate ontology exchange among e-commerce agents. The ontology exchange model and its formalities are elaborated. Product-brokering agents have been designed and implemented, which accomplish the ontology exchange process from request to integration
- …