279,148 research outputs found
A security transmission and storage solution about sensing image for blockchain in the internet of things
With the rapid development of the Internet of Things (IoT), the number of IoT devices has increased exponentially. Therefore, we have put forward higher security requirements for the management, transmission, and storage of massive IoT data. However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. Once the server is maliciously attacked, the security of IoT data will be greatly threatened. In view of the above-mentioned security issues, a security transmission and storage solution is proposed about sensing image for blockchain in the IoT. Firstly, this solution intelligently senses user image information, and divides these sensed data into intelligent blocks. Secondly, different blocks of data are encrypted and transmitted securely through intelligent encryption algorithms. Finally, signature verification and storage are performed through an intelligent verification algorithm. Compared with the traditional IoT data transmission and centralized storage solution, our solution combines the IoT with the blockchain, making use of the advantages of blockchain decentralization, high reliability, and low cost to transfer and store users image information securely. Security analysis proves that the solution can resist theft attacks and ensure the security of user image information during transmission and storage
Intelligent data leak detection through behavioural analysis
In this paper we discuss a solution to detect data leaks in an intelligent and furtive way through a real time analysis of the user’s behaviour while handling classified information. Data is based on experiences with real world use cases and a variety of data preparation and data analysis techniques have been tried. Results show the feasibility of the approach, but also the necessity to correlate with other security events to improve the precision.UID/CEC/00319/201
Security Guidelines for the Development of Accessible Web Applications through the implementation of intelligent systems
Due to the significant increase in threats, attacks
and vulnerabilities that affect the Web in recent years has
resulted the development and implementation of tools and
methods to ensure security measures in the privacy,
confidentiality and data integrity of users and businesses. Under
certain circumstances, despite the implementation of these tools
do not always get the flow of information which is passed in a
secure manner. Many of these security tools and methods cannot
be accessed by people who have disabilities or assistive
technologies which enable people to access the Web efficiently.
Among these security tools that are not accessible are the virtual
keyboard, the CAPTCHA and other technologies that help to
some extent to ensure safety on the Internet and are used in
certain measures to combat malicious code and attacks that have
been increased in recent times on the Web. Through the
implementation of intelligent systems can detect, recover and
receive information on the characteristics and properties of the
different tools and hardware devices or software with which the
user is accessing a web application and through analysis and
interpretation of these intelligent systems can infer and
automatically adjust the characteristics necessary to have these
tools to be accessible by anyone regardless of disability or
navigation context. This paper defines a set of guidelines and
specific features that should have the security tools and methods
to ensure the Web accessibility through the implementation of
intelligent systems
A Delay Analysis of Mass Volume Train Security Detection Network
Mass volume train security detection network is a reliable and real-time onboard train communication network based on the train level and vehicle level Ethernet network, which will send and transmit large capacity status and fault diagnosis data, the event log data, passenger information which are stored in different vehicles equipments for fault diagnosis and intelligent maintenance. The topology structure and onboard devices logic relation of the train security detection network is presented. Then, a delay model of different topology structure is analysed, which indicate that the onboard ring network is superior to the bus network topology. Finally, the analysis is confirmed by simulation results. The research results will improve control and network function of train
Using discriminant analysis to detect intrusions in external communication for self-driving vehicles
Security systems are a necessity for the deployment of smart vehicles in our society. Security in vehicular ad hoc networks is crucial to the reliable exchange of information and control data. In this paper, we propose an intelligent Intrusion Detection System (IDS) to protect the external communication of self-driving and semi self-driving vehicles. This technology has the ability to detect Denial of Service (DoS) and black hole attacks on vehicular ad hoc networks (VANETs). The advantage of the proposed IDS over existing security systems is that it detects attacks before they causes significant damage. The intrusion prediction technique is based on Linear Discriminant Analysis (LDA) and Quadratic Discriminant Analysis (QDA) which are used to predict attacks based on observed vehicle behavior. We perform simulations using Network Simulator 2 to demonstrate that the IDS achieves a low rate of false alarms and high accuracy in detection
- …