7 research outputs found

    Design and Implementation of Distributed Identity and Access Management Framework for Internet of Things (IoT) Enabled Distribution Automation

    Get PDF
    The smart grid and Internet of Things (IoT) technologies play vital roles in improving the quality of services offered in traditional electrical grid. They open a room for the introduction of new services like distribution automation (DA) that has a significant advantage to both utility companies and final consumers. DA integrates sensors, actuators, intelligent electrical devices (IED) and information and communication technologies to monitor and control electrical grid. However, the integration of these technologies poses security threats to the electrical grid like Denial of Service (DoS) attacks, false data injection attacks, and masquerading attacks like system node impersonation that can transmit wrong readings, resulting in false alarm reports and hence leading to incorrect node actuation. To overcome these challenges, researchers have proposed a centralized public key infrastructure (PKI) with bridged certificate authority (CA) which is prone to DoS attacks. Moreover, the proposed blockchain based distributed identity and access management (DIAM) in IoT domain at the global scale is adding communicational and computational overheads. Also. It is imposing new security threats to the DA system by integrating it with online services like IoTEX and IoTA. For those reasons, this study proposes a DIAM security scheme to secure IoT-enabled distribution automation. The scheme divides areas into clusters and each cluster has a device registry and a registry controller. The registry controller is a command line tool to access and manage a device registry. The results show that the scheme can prevent impersonated and non-legitimate system nodes and users from accessing the system by imposing role-based access control (RBAC) at the cluster level. Keywords: Distributed Identity and Access Management; Electrical Secondary Distribution Network; Internet of Things; IoT Enabled Distribution Automation; Smart Grid Securit

    Building Clinical Clerkships Capacity in a Resource-limited Setting: The Case of the Kilimanjaro Christian Medical University College in Tanzania

    Get PDF
    Background: The shortage of medical doctors in sub-Saharan Africa (SSA) has resulted in increased enrolment in medical schools, which has not been matched with increased faculty size or physical infrastructure. This process has led to overcrowding and possibly reduced quality of training. To reduce overcrowding at its teaching hospital, the Kilimanjaro Christian Medical University College introduced eight-week peripheral clerkship rotations in 2012. We explore students’ perceptions and attitudes towards peripheral hospital placements. Method: The clerkship rotations were conducted in eight hospitals operating in the northern Tanzania, after evaluating each hospitals’ capabilities and establishing the optimum number of students per hospital. Paper-based surveys were conducted after student rotations from 2014 to 2016. Results: Overall student satisfaction was moderate (strength of consensus measure (sCns), 77%). The three cohorts exhibited improving trends over three years with respect to satisfaction with clinical skills and attitude towards placements. student-preceptor interaction was rated highly (sCns 81–84%). The first cohort students expressed concerns about limited laboratory support, and poor access to Internet and learning resources. Specific interventions were undertaken to address these concerns. Conclusions: Student experiences in peripheral rotations were positive with adequate satisfaction levels. Opportunities exist for medical schools in SSA to enhance clinical training and relieve overcrowding through peripheral clerkship rotations.<p

    ICT Security Readiness Checklist for Developing Countries : A Social-Technical Approach

    No full text
    The consequences of Information and Communication Technology (ICT) revolution on society are almost impossible to enumerate. New types of ICT products, services and capabilities are finding their way into our offices, schools and homes - almost on daily basis; impacting the way we work, learn and live. Following this revolution, governments around the world have recognised that the transformation from traditional government to electronic government is one of the most important public policy issues to embrace. Likewise, organisations and businesses around the world are transforming from traditional organisations and businesses to their electronic equivalent. However, to be a part in this revolution, it is important for the concerned governments and organisations to have an ability to differentiate between implementing a new IT/ICT system and a transformation to e-government, e-organisation, and e-business. E-government is not simply about implementing new ICT systems, but it is about changing business models and processes to do things differently and better. ICT offers the solutions, but e-government, eorganisation, and e-business are about changing the way they operate to achieve their mission objectives.Implicitly there are a number of key issues to be considered in this transformation. One such key issue is security, since many of the technical and social security control mechanisms that are in place today are rendered ineffective by the ICT revolution. As such, we can no longer rely entirely on our traditional security controls—e.g. physical access controls, security guards and locks—to ensure the security of an organisation’s assets, processes and communications. The multiplicity of new technical possibilities gives rise not only to new products, services and more efficient and effective ways of doing things, but also to the possibility of misuse of the technology. Consequently, new social and technical security controls are imperative in this revolution. However, research findings show that, in many cases, security issues come as an-after-thought in the ongoing transformations to ICT-enabled organisational or governmental contexts. In this thesis, the challenges of the process of computerisation and other changes due to ICT are investigated from a security point of view. An explorative study of both theoretical and practical aspects of addressing ICT security in organisations was performed. The findings from some organisations studied show that, organisations—as social-technical systems—are facing a myriad of problems in their effort to adequately and effectively implementing a sound ICT security program. As a result, the organisations, individuals, or nations as a whole; may fail in meeting the challenges of exploiting the benefits of ICT; due, in part, to their failure to manage the risks which ICT presents—not being ‘e-ready’ in ICT security matters. In view of the above, the following are the end products of the research: a Model of Security Knowledge, and a Social-Technical ICT Security Readiness Checklist. These end products draw from the available ICT-security knowledge-body and a practical experience from an empirical study conducted in Tanzania. We believe the model and checklist would serve as a starting point in assisting organisations having a similar security situation as those studied, to meet the security challenges of exploiting the benefits of ICT. By providing means for evaluation, formation and implementation of ICT security controls—both social and technical ones—the checklist can be helpful in managing the risks that ICT presents

    Abstracts of Tanzania Health Summit 2020

    No full text
    This book contains the abstracts of the papers/posters presented at the Tanzania Health Summit 2020 (THS-2020) Organized by the Ministry of Health Community Development, Gender, Elderly and Children (MoHCDGEC); President Office Regional Administration and Local Government (PORALG); Ministry of Health, Social Welfare, Elderly, Gender, and Children Zanzibar; Association of Private Health Facilities in Tanzania (APHFTA); National Muslim Council of Tanzania (BAKWATA); Christian Social Services Commission (CSSC); &amp; Tindwa Medical and Health Services (TMHS) held on 25–26 November 2020. The Tanzania Health Summit is the annual largest healthcare platform in Tanzania that attracts more than 1000 participants, national and international experts, from policymakers, health researchers, public health professionals, health insurers, medical doctors, nurses, pharmacists, private health investors, supply chain experts, and the civil society. During the three-day summit, stakeholders and decision-makers from every field in healthcare work together to find solutions to the country’s and regional health challenges and set the agenda for a healthier future. Summit Title: Tanzania Health SummitSummit Acronym: THS-2020Summit Date: 25–26 November 2020Summit Location: St. Gasper Hotel and Conference Centre in Dodoma, TanzaniaSummit Organizers: Ministry of Health Community Development, Gender, Elderly and Children (MoHCDGEC); President Office Regional Administration and Local Government (PORALG); Ministry of Health, Social Welfare, Elderly, Gender and Children Zanzibar; Association of Private Health Facilities in Tanzania (APHFTA); National Muslim Council of Tanzania (BAKWATA); Christian Social Services Commission (CSSC); &amp; Tindwa Medical and Health Services (TMHS)
    corecore