175,845 research outputs found
A Design Approach to IoT Endpoint Security for Production Machinery Monitoring
The Internet of Things (IoT) has significant potential in upgrading legacy production machinery with monitoring capabilities to unlock new capabilities and bring economic benefits. However, the introduction of IoT at the shop floor layer exposes it to additional security risks with potentially significant adverse operational impact. This article addresses such fundamental new risks at their root by introducing a novel endpoint security-by-design approach. The approach is implemented on a widely applicable production-machinery-monitoring application by introducing real-time adaptation features for IoT device security through subsystem isolation and a dedicated lightweight authentication protocol. This paper establishes a novel viewpoint for the understanding of IoT endpoint security risks and relevant mitigation strategies and opens a new space of risk-averse designs that enable IoT benefits, while shielding operational integrity in industrial environments
Web3.0 Security: Privacy Enhancing and Anonym Auditing in Blockchain-based Structures
The advent of Web 3.0, underpinned by blockchain technologies, promises to
transform the internet's landscape by empowering individuals with decentralized
control over their data. However, this evolution brings unique security
challenges that need to be addressed. This paper explores these complexities,
focusing on enhancing privacy and anonymous auditing within blockchain
structures. We present the architecture of Web 3.0 based on the blockchain,
providing a clear perspective on its workflow and security mechanisms. A
security protocol for Web 3.0 systems, employing privacy-preserving techniques
and anonymous auditing during runtime, is proposed. Key components of our
solution include the integration of privacy-enhancing techniques and the
utilization of Tor for anonymous auditing. We discuss related work and propose
a framework that meets these new security requirements. Lastly, we offer an
evaluation and comparison of our model to existing methods. This research
contributes towards the foundational understanding of Web 3.0's secure
structure and offers a pathway towards secure and privacy-preserving digital
interactions in this novel internet landscape
Keamanan Komunikasi Data Pada Jaringan Komputer Berbasis Socket Programming
A socket is software used to communicate data between computers on a network, which is a combination of an IP (Internet Protocol) address and a port number. In data communication on a computer network, one of the important things that are lacking attention and understanding from users is information security, both in terms of information content and communication lines. So without realizing it that the communication lines used have been infiltrated by other people. Because one of the loopholes that can be exploited in infiltrating other people's networks is a socket on the network. One way or method of securing communication lines on a network is socket programming. Socket Programming is a protocol that makes connections between devices in a network so that one program can interact with other programs in a network
An Internet Heartbeat
Obtaining sound inferences over remote networks via active or passive
measurements is difficult. Active measurement campaigns face challenges of
load, coverage, and visibility. Passive measurements require a privileged
vantage point. Even networks under our own control too often remain poorly
understood and hard to diagnose. As a step toward the democratization of
Internet measurement, we consider the inferential power possible were the
network to include a constant and predictable stream of dedicated lightweight
measurement traffic. We posit an Internet "heartbeat," which nodes periodically
send to random destinations, and show how aggregating heartbeats facilitates
introspection into parts of the network that are today generally obtuse. We
explore the design space of an Internet heartbeat, potential use cases,
incentives, and paths to deployment
IPv6 Network Mobility
Network Authentication, Authorization, and Accounting has
been used since before the days of the Internet as we know it
today. Authentication asks the question, “Who or what are
you?” Authorization asks, “What are you allowed to do?” And fi nally,
accounting wants to know, “What did you do?” These fundamental
security building blocks are being used in expanded ways today. The
fi rst part of this two-part series focused on the overall concepts of
AAA, the elements involved in AAA communications, and highlevel
approaches to achieving specifi c AAA goals. It was published in
IPJ Volume 10, No. 1[0]. This second part of the series discusses the
protocols involved, specifi c applications of AAA, and considerations
for the future of AAA
Samba Openldap: An Evolution And Insight
Directory services facilitate access to information
organized under a variety of frameworks and applications. The
Lightweight Directory Access Protocol is a promising technology
that provides access to directory information using a data
structure similar to that of the X.500 protocol. IBM Tivoli,
Novell, Sun, Oracle, Microsoft, and many other vendor features
LDAP-based implementations. The technology’s increasing
popularity is due both to its flexibility and its compatibility with
existing applications. A directory service is a searchable
database repository that lets authorized users and services find
information related to people, computers, network devices, and
applications. Given the increasing need for information —
particularly over the Internet — directory popularity has grown
over the last decade and is now a common choice for distributed
applications. Lightweight Directory Access Protocol (LDAP)
accommodates the need of high level of security, single sign-on,
and centralized user management. This protocol offers security
services and integrated directory with capability of storage
management user information in a directory. Therefore at the
same time the user can determine application, service, server to
be accessed, and user privileges. It is necessary to realize files
sharing between different operating systems in local area
network. Samba software package, as the bridge across Windows
and Linux, can help us resolve the problem. In this paper, we try
to explore previous literature on this topic and also consider
current authors work then come out with our views on the
subject matter of discussion based on our understanding
- …