6 research outputs found

    A framework for proving the correctness of cryptographic protocol properties by linear temporal logic

    Get PDF
    In this paper, a framework for cryptographic protocol analysis using linear temporal logic is proposed. The framework can be used to specify and analyse security protocols. It aims to investigate and analyse the security protocols properties that are secure or have any flaws. The framework extends the linear temporal logic by including the knowledge of participants in each status that may change over the time. It includes two main parts, the Language of Temporal Logic (LTL) and the domain knowledge. The ability of the framework is demonstrated by analysing the Needham-Schroeder public key protocol and the Andrew Secure RPC protocol as examples

    Design and Implementation: An IoT-Framework-Based Automated Wastewater Irrigation System

    No full text
    Automation is being fueled by a multifaceted approach to technological advancements, which includes advances in artificial intelligence, robotics, sensors, and cloud computing. The use of automated, as opposed to conventional, systems, has become more popular in recent years. Modern agricultural technology has played an important role in the development of Saudi Arabia in addition to upgrading infrastructure and plans. Agriculture in Saudi Arabia is dependent upon wells, which are insufficient in terms of water supplies. Thus, irrigation is used for agricultural fields, depending on the soil type, and water is provided to the plants. Two essential elements are necessary for farming, the first is the ability to determine the soil’s fertility, and the second is the use of different technologies to reduce the dependence of water on electrical power and on/off schedules. The purpose of this study is to propose a system in which moisture sensors are placed under trees or plants. The gateway unit transmits sensor information to the controller, which then turns on the pump and recycles the water flow. A farmland’s water pump can be remotely controlled and parameters such as moisture and flow rate can be monitored using an HTTP dashboard. In order to evaluate the applicability of IOT-based automatic wastewater irrigation systems, a pilot test was conducted using the developed framework. Theoretically, such a system could be expanded by including any pre-defined selection parameters

    Design and Implementation: An IoT-Framework-Based Automated Wastewater Irrigation System

    No full text
    Automation is being fueled by a multifaceted approach to technological advancements, which includes advances in artificial intelligence, robotics, sensors, and cloud computing. The use of automated, as opposed to conventional, systems, has become more popular in recent years. Modern agricultural technology has played an important role in the development of Saudi Arabia in addition to upgrading infrastructure and plans. Agriculture in Saudi Arabia is dependent upon wells, which are insufficient in terms of water supplies. Thus, irrigation is used for agricultural fields, depending on the soil type, and water is provided to the plants. Two essential elements are necessary for farming, the first is the ability to determine the soil’s fertility, and the second is the use of different technologies to reduce the dependence of water on electrical power and on/off schedules. The purpose of this study is to propose a system in which moisture sensors are placed under trees or plants. The gateway unit transmits sensor information to the controller, which then turns on the pump and recycles the water flow. A farmland’s water pump can be remotely controlled and parameters such as moisture and flow rate can be monitored using an HTTP dashboard. In order to evaluate the applicability of IOT-based automatic wastewater irrigation systems, a pilot test was conducted using the developed framework. Theoretically, such a system could be expanded by including any pre-defined selection parameters

    A Novel Cloud Enabled Access Control Model for Preserving the Security and Privacy of Medical Big Data

    No full text
    In the context of healthcare, big data refers to a complex compilation of digital medical data collected from many sources that are difficult to manage with normal technology and software due to its size and complexity. These big data are useful in various aspects of healthcare, such as disease diagnosis, early prevention of diseases, and predicting epidemics. Even though medical big data has many advantages and a lot of potential for revolutionizing healthcare, it also has a lot of drawbacks and problems, of which security and privacy are of the utmost concern, owing to the severity of the complications once the medical data is compromised. On the other hand, it is evident that existing security and privacy safeguards in healthcare organizations are insufficient to protect their massive, big data repositories and ubiquitous environment. Thus, motivated by the synthesizing of the current knowledge pertaining to the security and privacy of medical big data, including the countermeasures, in the study, firstly, we provide a comprehensive review of the security and privacy of medical big data, including countermeasures. Secondly, we propose a novel cloud-enabled hybrid access control framework for securing the medical big data in healthcare organizations, and the result of this research indicates that the proposed access control model can withstand most cyber-attacks, and it is also proven that the proposed framework can be utilized as a primary base to build secure and safe medical big data solutions. Thus, we believe this research would be useful for future researchers to comprehend the knowledge on the security and privacy of medical big data and the development of countermeasures

    A Multi-Layer Semantic Approach for Digital Forensics Automation for Online Social Networks

    No full text
    Currently, law enforcement and legal consultants are heavily utilizing social media platforms to easily access data associated with the preparators of illegitimate events. However, accessing this publicly available information for legal use is technically challenging and legally intricate due to heterogeneous and unstructured data and privacy laws, thus generating massive workloads of cognitively demanding cases for investigators. Therefore, it is critical to develop solutions and tools that can assist investigators in their work and decision making. Automating digital forensics is not exclusively a technical problem; the technical issues are always coupled with privacy and legal matters. Here, we introduce a multi-layer automation approach that addresses the automation issues from collection to evidence analysis in online social network forensics. Finally, we propose a set of analysis operators based on domain correlations. These operators can be embedded in software tools to help the investigators draw realistic conclusions. These operators are implemented using Twitter ontology and tested through a case study. This study describes a proof-of-concept approach for forensic automation on online social networks
    corecore