51 research outputs found

    A new hybrid text encryption approach over mobile ad hoc network

    Get PDF
    Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation

    An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network

    Get PDF
    The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchainenabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system

    A Novel Hybrid Trustworthy Decentralized Authentication and Data Preservation Model for Digital Healthcare IoT Based CPS

    No full text
    Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effective results. Although this technology offers extraordinary results, but at the same time, it also offers multifarious security perils that need to be handled effectively to preserve the trust among all engaged stakeholders. For this, the literature proposes several authentications and data preservation schemes, but somehow they fail to tackle this issue with effectual results. Keeping in view, these constraints, in this paper, we proposed a lightweight authentication and data preservation scheme for IoT based-CPS utilizing deep learning (DL) to facilitate decentralized authentication among legal devices. With decentralized authentication, we have depreciated the validation latency among pairing devices followed by improved communication statistics. Moreover, the experimental results were compared with the benchmark models to acknowledge the significance of our model. During the evaluation phase, the proposed model reveals incredible advancement in terms of comparative parameters in comparison with benchmark models

    A Conceptual Framework for Determining Quality Requirements for Mobile Learning Applications Using Delphi Method

    No full text
    The development of mobile learning apps might fail due to poor selection of the suitable technical requirements for mobile devices. This will affect the quality of mobile learning applications and, thus, will increase the development cost of mobile learning apps. Due to the above issues, we need to determine the most appropriate technical quality requirements for the development of mobile learning apps that meet user requirements. To achieve that, we propose a comprehensive framework to capture the most suitable technical quality requirements for mobile learning apps. A Delphi method was used to collect, evaluate, and analyze the data for this study. As a result of our Delphi study, we have identified nineteen technical quality requirements, divided into six quality dimensions, for the development of mobile learning applications. The proposed framework is expected to be a guideline for mobile apps designers and developers to successfully develop mobile learning apps

    Smart Mobile Learning Success Model for Higher Educational Institutions in the Context of the COVID-19 Pandemic

    No full text
    Smart mobile learning (M-learning) applications have shown several new benefits for higher educational institutions during the COVID-19 pandemic, during which such applications were used to support distance learning. Therefore, this study aims to examine the most important drivers influencing the adoption of M-learning by using the technology acceptance model (TAM). The structural equation modelling (SEM) method was used to test the hypotheses in the proposed model. Data were collected via online questionnaires from 520 undergraduate and postgraduate students at four universities in Saudi Arabia. Partial least squares (PLS)–SEM was used to analyse the data. The findings indicated that M-learning acceptance is influenced by three main factors, namely, awareness, IT infrastructure (ITI), and top management support. This research contributes to the body of knowledge on M-learning acceptance practices. Likewise, it may help to facilitate and promote the acceptance of M-learning among students in Saudi universities

    Investigating Students' Perceptions on Mobile Learning Services

    No full text
    M-learning is a form of learning, which has similarities and differences with the electronic learning (e-learning). It is mainly based on the use of the mobile wireless technologies that allow for learners to easily access learning materials anytime he desires and anywhere, whether on campus or off campus. Therefore, this creates a new flexible learning environment in the context of different learning settings. Students' perception of such technology is one of the most important factors for successful adoption of m-learning in the higher education environment. This study is conducted to investigate the perceptions of students in University Malaysia Terengganu (UMT) to move towards applying m-learning in their studies by using their mobile devices and to explore their expectations on mobile learning services. A total number of 91 undergraduate students majoring in computer science participated in the study. The findings show that the students have positive perception towards mobile learning and would like to use their mobile devices for both learning and administrative services

    Investigating Students' Perceptions on Mobile Learning Services

    No full text

    Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions

    No full text
    The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier. Despite the multiple benefits offered by IoT, it may also represent a critical issue due its lack of information security. Since the number of IoT devices has been rapidly increasing all over the world, they have become a target for many attackers, who try to steal sensitive information and compromise people’s privacy. As part of the IoT environment, data and services should be protected with features such as confidentiality, accuracy, comprehensiveness, authentication, access control, availability, and privacy. Cybersecurity threats are unique to the Internet of Things, which has unique characteristics and limitations. In consideration of this, a variety of threats and attacks are being launched daily against IoT. Therefore, it is important to identify these types of threats and find solutions to mitigate their risks. Therefore, in this paper, we reviewed and identified the most common threats in the IoT environment, and we classified these threats based on three layers of IoT architecture. In addition, we discussed the most common countermeasures to control the IoT threats and mitigation techniques that can be used to mitigate these threats by reviewing the related publications, as well as analyzing the popular application-layer protocols employed in IoT environments and their security risks and challenges

    Cybersecurity Threats, Countermeasures and Mitigation Techniques on the IoT: Future Research Directions

    No full text
    The Internet of Things (IoT) interconnects physical and virtual objects embedded with sensors, software, and other technologies, which exchange data using the Internet. This technology allows billions of devices and people to communicate, share data, and personalize services to make our lives easier. Despite the multiple benefits offered by IoT, it may also represent a critical issue due its lack of information security. Since the number of IoT devices has been rapidly increasing all over the world, they have become a target for many attackers, who try to steal sensitive information and compromise people’s privacy. As part of the IoT environment, data and services should be protected with features such as confidentiality, accuracy, comprehensiveness, authentication, access control, availability, and privacy. Cybersecurity threats are unique to the Internet of Things, which has unique characteristics and limitations. In consideration of this, a variety of threats and attacks are being launched daily against IoT. Therefore, it is important to identify these types of threats and find solutions to mitigate their risks. Therefore, in this paper, we reviewed and identified the most common threats in the IoT environment, and we classified these threats based on three layers of IoT architecture. In addition, we discussed the most common countermeasures to control the IoT threats and mitigation techniques that can be used to mitigate these threats by reviewing the related publications, as well as analyzing the popular application-layer protocols employed in IoT environments and their security risks and challenges

    Cybersecurity Risk Analysis in the IoT: A Systematic Review

    No full text
    The Internet of Things (IoT) is increasingly becoming a part of our daily lives, raising significant concerns about future cybersecurity risks and the need for reliable solutions. This study conducts a comprehensive systematic literature review to examine the various challenges and attacks threatening IoT cybersecurity, as well as the proposed frameworks and solutions. Furthermore, it explores emerging trends and identifies existing gaps in this domain. The study’s novelty lies in its extensive exploration of machine learning techniques for detecting and countering IoT threats. It also contributes by highlighting research gaps in economic impact assessment and industrial IoT security. The systematic review analyzes 40 articles, providing valuable insights and guiding future research directions. Results show that privacy issues and cybercrimes are the primary concerns in IoT security, and artificial intelligence holds promise for future cybersecurity. However, some attacks remain inadequately addressed by existing solutions, such as confidentiality, security authentication, and data server connection attacks, necessitating further research and real-life testing of proposed remedies
    • …
    corecore