4 research outputs found

    Complete Security Package for USB Thumb Drive

    Get PDF
    This paper is devoted to design and implement a complete security platform for USB flash disks due to the popularity of this device in exchanging data, it is a complete system security solution as it concerns the thumb drive due to the manipulation of I/O operation not the file system.  USB flash disks have been the major threat for computer system beside the internet threats where viruses can spread from computer to computer or from computer to network. USB complete security system presented by this paper is composed of three essential elements: kernel filter driver which will be installed in USB device driver stack to intercept all exchanged packets and send it to encryption unit, kernel level encryption/decryption unit and configuration unit. In contrary to most USB security modules the system presented by this paper will store only the round number of the key generator with the encrypted data. Round number will be coded using MD5 algorithm to increase the immunity of attacking data stored in the flash disks. Keywords: USB protection, kernel driver, device stack, encryption/decryption, filter driver, MD5.

    Multi-Agent Based Security Framework for E-Government in Recently technology Developed Countries

    Get PDF
    E-Government is an environment where government produces services to citizens electronically, this is beside services to other e-Governments, and one crucial factor regarding the reliability of accepting services provided by e-Government is the security factor. This work is targeting Countries in their developing process that need to develop configurable management model, that capable of adapting security technologies to other factors revealed from the society.  The configuration of this management model will be autonomously built up through the association of three domains presented by this proposal: policies, measures and infrastructure. Along this work; ontology will be built up to accommodate these domains and eventually to grant Agent software the ability to perceive the environment and configure the management model for deploying security technologies. Keywords: Socio-Techno, Java Agent, Security policy, eGovernment, JADE, Ontology, knowledge development

    Dynamic Lightweight Mechanism for Security and Performance in Internet of Things

    No full text
    Communication between machines has become commonplace in recent years, and the Internet of Things (IoT) is gaining notoriety. Congestion control is a prevalent issue in the transportation system, and GPS devices, which drivers and traffic authorities alike utilise, are well-suited to the job. Traffic density is expanding at an alarming rate, making it impossible for drivers to see and handle all of the possible scenarios in a traffic area they are ready to enter. It's also becoming increasingly difficult to maintain security and integrity due to a growing number of assaults by hackers that send harmful code or bogus packets. There are a few new technologies that have yet to be put into practise under the Internet of Things umbrella, including ubiquitous computing (IoT)

    A Multi-Layered Energy Efficient Approach for Performance Aware Internet of Ocean Things

    No full text
    Over seventy-one percent of the Earth's surface is covered by oceans, a vast body of water that is sometimes divided up into smaller bodies of water called seas. Research in this area is focusing on the significant advantages of an undersea or ocean-based environment, which is impacted by the ocean's temperature. Freshwater lakes and rivers cover less than 1% of the Earth's surface. So, ecosystems are damaged and modern technology must be developed so that climate and other elements may be regulated. The Internet of Underwater Things is cutting-edge technology in the ocean and underwater environments (IoUT). It's a network of underwater items that can be used to monitor large, undiscovered aquatic areas with a real-time Internet connection. There are several uses for IoUT, including in the military, strategic fields, climate research, and thermal pollution monitoring. With the use of the World Wide Web, Ocean of Things (OoT) devices may communicate in real-time using this technology. An IoUT is one of the most important IoT areas where a dynamic network is built and many advantages are reaped from the process. Using a multi-dimensional method for cumulative performance in the marine and undersea objects area, this research publication presents use examples for IoUT. Many significant applications and real-world domains are demonstrated to interface with crucial IoUT components. The proposed approach is making use of a multi-hop and metaheuristic-based approach for the effectiveness and overall performance of IoUT. As there are so many challenges in IoUT including frequent battery reduction and energy issues, there is a need to integrate the multi-layered approach. The presented approach is effective in terms of fewer packet losses, high throughput, and minimum energy consumption
    corecore