469 research outputs found

    Towards Cyber Security for Low-Carbon Transportation: Overview, Challenges and Future Directions

    Full text link
    In recent years, low-carbon transportation has become an indispensable part as sustainable development strategies of various countries, and plays a very important responsibility in promoting low-carbon cities. However, the security of low-carbon transportation has been threatened from various ways. For example, denial of service attacks pose a great threat to the electric vehicles and vehicle-to-grid networks. To minimize these threats, several methods have been proposed to defense against them. Yet, these methods are only for certain types of scenarios or attacks. Therefore, this review addresses security aspect from holistic view, provides the overview, challenges and future directions of cyber security technologies in low-carbon transportation. Firstly, based on the concept and importance of low-carbon transportation, this review positions the low-carbon transportation services. Then, with the perspective of network architecture and communication mode, this review classifies its typical attack risks. The corresponding defense technologies and relevant security suggestions are further reviewed from perspective of data security, network management security and network application security. Finally, in view of the long term development of low-carbon transportation, future research directions have been concerned.Comment: 34 pages, 6 figures, accepted by journal Renewable and Sustainable Energy Review

    A Cluster Tree Based Model for Secure Data Retrieval in Military using Wireless Sensor Networks

    Get PDF
    Wireless sensor networks (WSNs) can be used in military environments such as a battlefield tracking the enemies. One of the challenging issues in this scenario is enforcement of authorization policies and the policies update for secure data retrieval. CP-ABE is using efficient and secure data retrieval method for decentralized DTNs. However implementing Cipher text-Policy Attribute – Based Encryption (CP-ABE) in decentralized DTNs where the key authorities might be compromised or not fully trusted. In this paper we propose a secured data retrieval method using Cluster Tree Based Model proposes grouping the slave nodes, where each node has an individual group head. The cluster model provide key to group head and the group head will distribute the key to all members and implementing Position-based Aggregator Node Election protocol (PANEL) is a position-based clustering routing protocol for WSNs. The main goal of PANEL is to elect aggregators, i.e., CHs. PANEL protocol are used to balance the network node load pressure and reduces the communication load

    Randomized and Efficient Authentication in Mobile Environments

    Get PDF
    In a mobile environment, a number of users act as a network nodes and communicate with one another to acquire location based information and services. This emerging paradigm has opened up new business opportunities and enables numerous applications such as road safety enhancement, service recommendations and mobile entertainment. A fundamental issue that impacts the success of these applications is the security and privacy concerns raised regarding the mobile users. In that, a malicious user or service provider can track the locations of a user traveled so that other malicious act can be carried out more effectively against the user. Therefore, the challenge becomes how to authenticate mobile users while preserving their actual identity and location privacy. In this work, we propose a novel randomized or privacy-preserving authentication protocol based on homomorphic encryption. The protocol allows individual users to self generate any number of authenticated identities to achieve full anonymity in mobile environment. The proposed protocol prevents users being tracked by any single party including peer users, service providers, authentication servers, and other infrastructure. Meanwhile, our protocol also provides traceability in case of any dispute. We have conducted experimental study which demonstrates the efficiency of our protocol. Another advantage of the proposed protocol is lightweight computation and storage requirement, particularly suitable for any mobile devices with limited computation power and storage space

    SECURELY DATA RETRIEVAL FOR DECENTRALIZED DISRUPTION TOLERANT MILITARY SYSTEMS

    Get PDF
    There are some parts of the military environment, such as battlefields or hostile areas. They may suffer from intermittent network connections. They have frequent partitions. Networking DTN networking technology is a truly simple solution. DTN network, tear-resistant; it allows wireless and military personnel to carry the interaction with each other. These devices reliably protect confidential information or use external storage node commands. In these network environments, DTN is a very successful technology. If there is no wired connection between the source and the target device, the intermediate node may need information from the source node for a long time until the connection is properly established. One of the complex methods is ABE. This is a property-based encryption that meets the requirements for secure data retrieval in DTN. This concept is a password strategy Cipher text-Policy ABE (CP-ABE). It provides an appropriate way to encrypt data. Encryption includes a set of attributes that need to be decrypted to decrypt the encrypted text. Therefore, many users can be allowed to decrypt different data according to the security polic

    An Approach for Security in Data Sharing Application for Decentralized Military Network

    Get PDF
    Portable hubs in military situations, for example, a front line or a threatening locale are liable to experience the ill effects of irregular system network and continuous allotments. Interruption tolerant system (DTN) advances are getting to be fruitful arrangements that permit remote gadgets conveyed by officers to correspond with one another and access the classified data or summon dependably by misusing outer stockpiling hubs. The absolute most difficult issues in this situation are the implementation of approval strategies and the approaches redesign for secure information recovery. Cipher text-approach trait based encryption (CP-ABE) is a promising cryptographic answer for the entrance control issues. Be that as it may, the issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges as to the property denial, key escrow, and coordination of characteristics issued from distinctive powers. In this paper, we propose a safe information recovery plan utilizing CP-ABE for decentralized DTNs where various key powers deal with their qualities freely. We show how to apply the proposed instrument to safely and effectively deal with the private information dispersed in the disturbance tolerant military system

    Security and privacy issues of physical objects in the IoT: Challenges and opportunities

    Get PDF
    In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of pre-working, in-working, and post-working. On this basis, a physical object-based security architecture for the IoT is put forward. According to the security architecture, security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail. Considering the development of IoT technologies, potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized. At the same time, possible directions for dealing with these challenges are also pointed out
    • …
    corecore