4,691 research outputs found
An Ordinal factor analysis of requirements and challenges of information and communication technology system to train private agricultural insurance brokers in Iran
This study was conducted to identify challenges and
requirements of an information and communication
technology (ICT) system to train brokers. Using the ordinal
factor analysis, the challenges and requirements have been
classified into six factors (Human, Organisational, Technical,Social, Financial, and Legal) and four factors (instructional,technical, organisational, and cultural) respectively. Finally a conceptual framework is presented for the challenges and requirements of the ICT training system
Securing the Internet of Things Infrastructure - Standards and Techniques
The Internet of Things (IoT) infrastructure is a conglomerate of electronic devices interconnected through the Internet, with the purpose of providing prompt and effective service to end-users. Applications running on an IoT infrastructure generally handle sensitive information such as a patient’s healthcare record, the position of a logistic vehicle, or the temperature readings obtained through wireless sensor nodes deployed in a bushland. The protection of such information from unlawful disclosure, tampering or modification, as well as the unscathed presence of IoT devices, in adversarial environments, is of prime concern. In this paper, a descriptive analysis of the security of standards and technologies for protecting the IoT communication channel from adversarial threats is provided. In addition, two paradigms for securing the IoT infrastructure, namely, common key based and paired key based, are proposed
Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement
During the past decade, the electronic healthcare (e-health) system has been evolved into a more patient-oriented service with smaller and smarter wireless devices. However, these convenient smart devices have limited computing capacity and memory size, which makes it harder to protect the user’s massive private data in the e-health system. Although some works have established a secure session key between the user and the medical server, the weaknesses still exist in preserving the anonymity with low energy consumption. Moreover, the misuse of biometric information in key agreement process may lead to privacy disclosure, which is irreparable. In this study, we design a dynamic privacy protection mechanism offering the biometric authentication at the server side whereas the exact value of the biometric template remains unknown to the server. And the user anonymity can be fully preserved during the authentication and key negotiation process because the messages transmitted with the proposed scheme are untraceable. Furthermore, the proposed scheme is proved to be semantic secure under the Real-or-Random Model. The performance analysis shows that the proposed scheme suits the e-health environment at the aspect of security and resource occupation
The scope of the crustacean immune system for disease control
The culture or wild capture of marine and freshwater shellfish, including crustaceans, is without doubt a key source of protein for a burgeoning world population. Historically the expansion of aquaculture has, however, been accompanied by the increased incidence of economically significant diseases, most notably of viral and bacterial origin. Since the late 1970s great progress has been made in our understanding of the generalized protostome innate immune system. Distinct pathways, pathogen receptor proteins and effector molecules have since been identified that are not ancestral or homologous to those of the deuterostomes, including vertebrates. Within the past decade progress has accelerated with the rapid characterisation of new classes of recognition proteins, immune effectors and regulatory pathways. This paper provides a broad overview of our current understanding of invertebrate immunology, taking the crustacean decapod immune system as its focus. Recent developments in the field are described briefly and their implications and potential considered. These advances offer fundamental new insights in our efforts to understand disease in cultured populations and also to develop knowledge of environmental effects on host/pathogen interactions within a fishery context. Of course, challenges do remain, including the lack of an immortal cell line and the limited publically-available genomic resources. These are considered in this review as priorities for future research effort. With the continued application of more insightful technologies, coupled with associated investment, it is expected that the speed at which some of these issues are resolved will accelerate
Challenges of Multi-Factor Authentication for Securing Advanced IoT (A-IoT) Applications
The unprecedented proliferation of smart devices together with novel
communication, computing, and control technologies have paved the way for the
Advanced Internet of Things~(A-IoT). This development involves new categories
of capable devices, such as high-end wearables, smart vehicles, and consumer
drones aiming to enable efficient and collaborative utilization within the
Smart City paradigm. While massive deployments of these objects may enrich
people's lives, unauthorized access to the said equipment is potentially
dangerous. Hence, highly-secure human authentication mechanisms have to be
designed. At the same time, human beings desire comfortable interaction with
their owned devices on a daily basis, thus demanding the authentication
procedures to be seamless and user-friendly, mindful of the contemporary urban
dynamics. In response to these unique challenges, this work advocates for the
adoption of multi-factor authentication for A-IoT, such that multiple
heterogeneous methods - both well-established and emerging - are combined
intelligently to grant or deny access reliably. We thus discuss the pros and
cons of various solutions as well as introduce tools to combine the
authentication factors, with an emphasis on challenging Smart City
environments. We finally outline the open questions to shape future research
efforts in this emerging field.Comment: 7 pages, 4 figures, 2 tables. The work has been accepted for
publication in IEEE Network, 2019. Copyright may be transferred without
notice, after which this version may no longer be accessibl
Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks
Vehicle-to-Grid (V2G) networks have emerged as a new communication paradigm between Electric Vehicles (EVs) and the Smart Grid (SG). In order to ensure seamless communications between mobile EVs and the electric vehicle supply equipment, the support of ubiquitous and transparent mobile IP communications is essential in V2G networks. However, enabling mobile IP communications raises real concerns about the possibility of tracking the locations of connected EVs through their mobile IP addresses. In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6) protocol for V2G networks. SP-PMIPv6 achieves low authentication latency while protecting the identity and location privacy of the mobile EV. We evaluate the SP-PMIPv6 protocol in terms of its authentication overhead and the information-theoretic uncertainty derived by the mutual information metric to show the high level of achieved anonymity
Mpdtn: A Novel Mobile Payment Scheme for Secure and Private Transactions
Mobile commerce is becoming more and more popular which makes it possible to purchase goods and services anywhere and anytime. However, traditional payment schemes do not suffice for our demand as more novel commercial services were provided. Therefore, it’s urgent to construct a safer and more convenient payment scheme for the forthcoming mobile era. A mobile payment scheme is proposed in the paper. The scheme called MPDTN provides an ideal mobile payment with dynamic transaction numbers. Through it, consumers can pay fares by using mobile phones no matter in real store or virtual shop. Besides explaining our payment architecture and processes in detail, evaluation of the MPDTN’s security from the aspect of defender and different roles of the attackers is provided in the paper. The investigation shows that, MPDTN can not only satisfy security criteria of confidence, integrity, authentication, and non-repudiation but also provide full transaction privacy to consumers
- …