4,691 research outputs found

    An Ordinal factor analysis of requirements and challenges of information and communication technology system to train private agricultural insurance brokers in Iran

    Get PDF
    This study was conducted to identify challenges and requirements of an information and communication technology (ICT) system to train brokers. Using the ordinal factor analysis, the challenges and requirements have been classified into six factors (Human, Organisational, Technical,Social, Financial, and Legal) and four factors (instructional,technical, organisational, and cultural) respectively. Finally a conceptual framework is presented for the challenges and requirements of the ICT training system

    Securing the Internet of Things Infrastructure - Standards and Techniques

    Get PDF
    The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed

    Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement

    Get PDF
    During the past decade, the electronic healthcare (e-health) system has been evolved into a more patient-oriented service with smaller and smarter wireless devices. However, these convenient smart devices have limited computing capacity and memory size, which makes it harder to protect the user’s massive private data in the e-health system. Although some works have established a secure session key between the user and the medical server, the weaknesses still exist in preserving the anonymity with low energy consumption. Moreover, the misuse of biometric information in key agreement process may lead to privacy disclosure, which is irreparable. In this study, we design a dynamic privacy protection mechanism offering the biometric authentication at the server side whereas the exact value of the biometric template remains unknown to the server. And the user anonymity can be fully preserved during the authentication and key negotiation process because the messages transmitted with the proposed scheme are untraceable. Furthermore, the proposed scheme is proved to be semantic secure under the Real-or-Random Model. The performance analysis shows that the proposed scheme suits the e-health environment at the aspect of security and resource occupation

    The scope of the crustacean immune system for disease control

    No full text
    The culture or wild capture of marine and freshwater shellfish, including crustaceans, is without doubt a key source of protein for a burgeoning world population. Historically the expansion of aquaculture has, however, been accompanied by the increased incidence of economically significant diseases, most notably of viral and bacterial origin. Since the late 1970s great progress has been made in our understanding of the generalized protostome innate immune system. Distinct pathways, pathogen receptor proteins and effector molecules have since been identified that are not ancestral or homologous to those of the deuterostomes, including vertebrates. Within the past decade progress has accelerated with the rapid characterisation of new classes of recognition proteins, immune effectors and regulatory pathways. This paper provides a broad overview of our current understanding of invertebrate immunology, taking the crustacean decapod immune system as its focus. Recent developments in the field are described briefly and their implications and potential considered. These advances offer fundamental new insights in our efforts to understand disease in cultured populations and also to develop knowledge of environmental effects on host/pathogen interactions within a fishery context. Of course, challenges do remain, including the lack of an immortal cell line and the limited publically-available genomic resources. These are considered in this review as priorities for future research effort. With the continued application of more insightful technologies, coupled with associated investment, it is expected that the speed at which some of these issues are resolved will accelerate

    Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications

    Full text link
    The unprecedented proliferation of smart devices together with novel communication, computing, and control technologies have paved the way for the Advanced Internet of Things~(A-IoT). This development involves new categories of capable devices, such as high-end wearables, smart vehicles, and consumer drones aiming to enable efficient and collaborative utilization within the Smart City paradigm. While massive deployments of these objects may enrich people's lives, unauthorized access to the said equipment is potentially dangerous. Hence, highly-secure human authentication mechanisms have to be designed. At the same time, human beings desire comfortable interaction with their owned devices on a daily basis, thus demanding the authentication procedures to be seamless and user-friendly, mindful of the contemporary urban dynamics. In response to these unique challenges, this work advocates for the adoption of multi-factor authentication for A-IoT, such that multiple heterogeneous methods - both well-established and emerging - are combined intelligently to grant or deny access reliably. We thus discuss the pros and cons of various solutions as well as introduce tools to combine the authentication factors, with an emphasis on challenging Smart City environments. We finally outline the open questions to shape future research efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for publication in IEEE Network, 2019. Copyright may be transferred without notice, after which this version may no longer be accessibl

    Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

    Get PDF
    Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabling mobile IP communications raises real concerns about the possibility of tracking the locations of connected EVs through their mobile IP addresses. In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6) protocol for V2G networks. SP-PMIPv6 achieves low authentication latency while protecting the identity and location privacy of the mobile EV. We evaluate the SP-PMIPv6 protocol in terms of its authentication overhead and the information-theoretic uncertainty derived by the mutual information metric to show the high level of achieved anonymity

    Mpdtn: A Novel Mobile Payment Scheme for Secure and Private Transactions

    Get PDF
    Mobile commerce is becoming more and more popular which makes it possible to purchase goods and services anywhere and anytime. However, traditional payment schemes do not suffice for our demand as more novel commercial services were provided. Therefore, it’s urgent to construct a safer and more convenient payment scheme for the forthcoming mobile era. A mobile payment scheme is proposed in the paper. The scheme called MPDTN provides an ideal mobile payment with dynamic transaction numbers. Through it, consumers can pay fares by using mobile phones no matter in real store or virtual shop. Besides explaining our payment architecture and processes in detail, evaluation of the MPDTN’s security from the aspect of defender and different roles of the attackers is provided in the paper. The investigation shows that, MPDTN can not only satisfy security criteria of confidence, integrity, authentication, and non-repudiation but also provide full transaction privacy to consumers
    • …
    corecore