7 research outputs found

    SECURITY AND PRIVACY ISSUES IN MOBILE NETWORKS, DIFFICULTIES AND SOLUTIONS

    Get PDF
    Mobile communication is playing a vital role in the daily life for the last two decades; in turn its fields gained the research attention, which led to the introduction of new technologies, services and applications. These new added facilities aimed to ease the connectivity and reachability; on the other hand, many security and privacy concerns were not taken into consideration. This opened the door for the malicious activities to threaten the deployed systems and caused vulnerabilities for users, translated in the loss of valuable data and major privacy invasions. Recently, many attempts have been carried out to handle these concerns, such as improving systems’ security and implementing different privacy enhancing mechanisms. This research addresses these problems and provides a mean to preserve privacy in particular. In this research, a detailed description and analysis of the current security and privacy situation in the deployed systems is given. As a result, the existing shortages within these systems are pointed out, to be mitigated in development. Finally a privacy preserving prototype model is proposed. This research has been conducted as an extensive literature review about the most relevant references and researches in the field, using the descriptive and evaluative research methodologies. The main security models, parameters, modules and protocols are presented, also a detailed description of privacy and its related arguments, dimensions and factors is given. The findings include that mobile networks’ security along with users are vulnerable due to the weaknesses of the key exchange procedures, the difficulties that face possession, repudiation, standardization, compatibility drawbacks and lack of configurability. It also includes the need to implement new mechanisms to protect security and preserve privacy, which include public key cryptography, HIP servers, IPSec, TLS, NAT and DTLS-SRTP. Last but not least, it shows that privacy is not absolute and it has many conflicts, also privacy requires sophisticated systems, which increase the load and cost of the system.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    Understanding Cyberprivacy : Context, Concept, and Issues

    Get PDF
    Cyberprivacy has become one of the most worrisome issues in the age of digitalization, as data breaches have increased at an alarming rate, and the development of technology has changed privacy norms themselves. Thus, maintaining cyberprivacy is important for both academia and practitioners. However, the literature on cyberprivacy is fragmented, since the topic is multidisciplinary and often confused with cybersecurity and data privacy. In this study, we seek to understand cyberprivacy by conducting a comprehensive literature review and analyzing 79 selected articles on the topic between 2008 and 2021. Our analysis shows that there are eight contexts associated with cyberprivacy. We proposed concepts on cyberprivacy from different views and highlighted four issues related to cyberprivacy for future consideration. Taken together, the knowledge on cyberprivacy, its challenges and its practices does not seem to accumulate. Consequently, there is a need for more targeted research on the topic to cover different contexts.©2022 The Association for Information Systems (AIS), Friedrich-Alexander-Universität, International Conference on Wirtschaftsinformatik.fi=vertaisarvioitu|en=peerReviewed

    Understanding Cyberprivacy: Context, Concept, and Issues

    Get PDF
    Cyberprivacy has become one of the most worrisome issues in the age of digitalization, as data breaches have increased at an alarming rate, and the development of technology has changed privacy norms themselves. Thus, maintaining cyberprivacy is important for both academia and practitioners. However, the literature on cyberprivacy is fragmented, since the topic is multidisciplinary and often confused with cybersecurity and data privacy. In this study, we seek to understand cyberprivacy by conducting a comprehensive literature review and analyzing 79 selected articles on the topic between 2008 and 2021. Our analysis shows that there are eight contexts associated with cyberprivacy. We proposed concepts on cyberprivacy from different views and highlighted four issues related to cyberprivacy for future consideration. Taken together, the knowledge on cyberprivacy, its challenges and its practices does not seem to accumulate. Consequently, there is a need for more targeted research on the topic to cover different contexts

    Towards a Complete Automation Feature Recognition System for Sheet Metal Manufacturing

    Get PDF
    Sheet metal processing is automated, but the step from product models to the production machine control still requires human intervention. This may cause time consuming bottlenecks in the production process and increase the risk of human errors. In this paper we present a system, which automatically recognizes features from the CAD-model of the sheet metal product. By using these features, the system produces a complete model of the particular sheet metal product. Then the model is used as an input for the sheet metal processing machine. Currently the system is implemented, capable to recognize more than 11 of the most common sheet metal structural features, and the procedure is fully automated. This provides remarkable savings in the production time, and protects against the human errors. This paper presents the developed system architecture, applied algorithms and system software implementation and testing.© 2017 World Academy of Science, Engineering and Technology.fi=vertaisarvioimaton|en=nonPeerReviewed

    Towards A Massive Open Online Course for Cybersecurity in Smart Grids – A Roadmap Strategy

    Get PDF
    The major trends and transformations in energy systems have brought many challenges, and cybersecurity and operational security are among the most important issues to consider. First, due to the criticality of the energy sector. Second, due to the lack of smart girds’ cybersecurity professionals. Previous research has highlighted skill gaps and shortage in cybersecurity training and education in this sector. Accordingly, we proceeded by crafting a roadmap strategy to foster cybersecurity education in smart grids. This paper outlines the methodology of teaching cybersecurity in smart grids to a large group of students in selected European universities via implementing a Massive Open Online Course. Unlike other solutions, this one focuses on hands-on practical skills without trading-off theoretical knowledge. Thus, flipped learning methodology and gamification practices were used to maximize retention rate. Also, a remote lab that includes a real-time simulator was established for training. Here, the process, outcome, and obstacles to overcome in future deployments, are presented.©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.fi=vertaisarvioitu|en=peerReviewed

    Towards a Complete Automation Feature Recognition System for Sheet Metal Manufacturing

    Get PDF
    Sheet metal processing is automated, but the step from product models to the production machine control still requires human intervention. This may cause time consuming bottlenecks in the production process and increase the risk of human errors. In this paper we present a system, which automatically recognizes features from the CAD-model of the sheet metal product. By using these features, the system produces a complete model of the particular sheet metal product. Then the model is used as an input for the sheet metal processing machine. Currently the system is implemented, capable to recognize more than 11 of the most common sheet metal structural features, and the procedure is fully automated. This provides remarkable savings in the production time, and protects against the human errors. This paper presents the developed system architecture, applied algorithms and system software implementation and testing

    Battery Energy Storage System Performance during Black-Start and Voltage and Frequency Disturbances

    No full text
    With the increasing penetration of Renewable Energy Resources (RESs) into power systems, concerns over grid blackout and stabilization solutions are being raised. Capability of Battery Energy Storage System (BESS) on balancing the variable generation profiles of Photovoltaic (PV) systems makes the BESS a modern grid solution. Furthermore, the BESS can help restore power in the event of blackout. In this paper, the contribution of BESS to facilitate their black-start capability is investigated. In addition, the role of the BESS in smoothing out fluctuations and disturbances associated with voltage and frequency changes, is assessed following an unexpected disturbance. To evaluate the dynamic performance and response of the BESS in recovering power during black-start and reducing disturbances, simulation studies were carried out considering IEEE 33 node test network, PV systems, and a BESS. Two critical case studies were considered to determine the level of BESS contribution in reducing disturbances’ impacts and speeding network recovery. Results showed that, with the BESS, 100% of the total load of the network is supplied while it is not the case without the use of BESS. The BESS responds to sudden voltage and frequency changes. During voltage variation, the BESS injects reactive power to the network which could increase the network voltage at some nodes. Finally, the power drawn from MV grid is reduced due to BESS frequency response under frequency excursion.© 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.fi=vertaisarvioitu|en=peerReviewed
    corecore