Security Issues Research Papers - Academia.edu (original) (raw)
Cloud Computing is a type of internet based computing which provides services via the internet and accesses the resources within the user enterprise either in a private-own-cloud or on a third-party server On Demand. The model is... more
Cloud Computing is a type of internet based computing which provides services via the internet and accesses the resources within the user enterprise either in a private-own-cloud or on a third-party server On Demand. The model is characterized by three attributes: scalability, pay-per-use, self-services. Many industries such as banking, healthcare, Retail, Education, Manufacturing and business are adopting this cloud technique due to efficiency of services provided by pay-per-use pattern which helps in accessing the networks, storage, servers, services and applications, without physically acquiring them [3]. The circumscribed control over the data may cause various security issues in cloud computing like Data crash, Misuse and reprehensible use of cloud computing, Insecure API, Wicked Insiders, Shared technology issues/multi-tendency nature, Account services and Traffic Hijacking. There are many new technologies, improvements and research proceedings happening every day in order to develop the security and to provide assurance for users [2]. This research paper brings a framework on what cloud computing is, main security risks and issues that are currently present in the field of cloud computing, research challenges, importance in key industries and also the personal hypothesis on future advances in the field of cloud security.
NoSQL databases outperform the traditional RDBMS due to their faster retrieval of large volumes of data, scalability, and high performance. The need for these databases has been increasing in recent years because data collection is... more
NoSQL databases outperform the traditional RDBMS due to their faster retrieval of large volumes of data, scalability, and high performance. The need for these databases has been increasing in recent years because data collection is growing tremendously. Structured, unstructured, and semi-structured data storage is allowed in NoSQL, which is not possible in a traditional database. NoSQL needs to compensate with its security feature for its amazing functionalities of faster data access and large data storage. The main concern exists in sensitive information stored in the data. The need to protect this sensitive data is crucial for confidentiality and privacy problems. To understand the severity of preserving sensitive data, recognizing the security issues is important. These security issues, if not resolved, will cause data loss, unauthorized access, database crashes by hackers, and security breaches. This paper investigates the security issues common to the top twenty NoSQL databases of the following types: document, key-value, column, graph, objectoriented, and multi-model. The top twenty NoSQL databases studied were MongoDB,
The popularity of the Mobile Database is increasing day by day as people need information even on the move in the fast changing world. This database technology permits employees using mobile devices to connect to their corporate networks,... more
The popularity of the Mobile Database is increasing day by day as people need information even on the move in the fast changing world. This database technology permits employees using mobile devices to connect to their corporate networks, hoard the needed data, work in the disconnected mode and reconnect to the network to synchronize with the corporate database. In this scenario, the data is being moved closer to the applications in order to improve the performance and autonomy. This leads to many interesting problems in mobile database research and Mobile Database has become a fertile land for many researchers. In this paper a survey is presented on data and Transaction management in Mobile Databases from the year 2000 onwards. The survey focuses on the complete study on the various types of Architectures used in Mobile databases and Mobile Transaction Models. It also addresses the data management issues namely Replication and Caching strategies and the transaction management functionalities such as Concurrency Control and Commit protocols, Synchronization, Query Processing, Recovery and Security. It also provides Research Directions in Mobile databases.
Ethics is a study of moral issues in the fields of individual and collective interaction. The term is also sometimes used more generally to describe issues in arts and sciences, religious beliefs and cultural priorities. The professional... more
Ethics is a study of moral issues in the fields of individual and collective interaction. The term is also sometimes used more generally to describe issues in arts and sciences, religious beliefs and cultural priorities. The professional fields that deals with ethical issues and include medicine, trading, business, law etc. Ethics and values denote something's degree of importance with the aim of determining what action is the best to live or to do or at least attempt to describe the value of different actions. The fundamentals of living are being learnt on none other than through the acquisition of language, and the widely developed literature universally. The introspection of the self and the retrospection only always create room for further development in any dimension in general and in ethical point of view in particular. The development of the universal culture solely depends up on the development of the language. This paper focuses on the how each and every stage of the evolution process is governed by the ethical values with a special reference to origination and sustenance of the Indian culture. For Indian life style, philosophy and for the nurturing of ethical values, the epics like Ramayana, Bharatha and Bhagavatam and various forms of literature like Upanishads, Aaranyakas have laid the corner stone, and given the continuous renaissance through their language with a splendid stature and enriched with affluent literature. This paper throws light on the systematic and conceptual analysis on the ethics and values through introspection and retrospection in the Indian literature and Indian culture with an underlying observation on the chronological impact on the value enrichment.
Cloud computing is an architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring... more
Cloud computing is an architecture for providing computing service via the internet on demand and pay per use access to a pool of shared resources namely networks, storage, servers, services and applications, without physically acquiring them. So it saves managing cost and time for organizations. Many industries, such as banking, healthcare and education are moving towards the cloud due to the efficiency of services provided by the pay-per-use pattern based on the resources such as processing power used, transactions carried out, bandwidth consumed, data transferred, or storage space occupied etc. Cloud computing is a completely internet dependent technology where client data is stored and maintain in the data center of a cloud provider like Google, Amazon, Salesforce.som and Microsoft etc. Limited control over the data may incur various security issues and threats which include data leakage, insecure interface, sharing of resources, data availability and inside attacks. There are various research challenges also there for adopting cloud computing such as well managed service level agreement (SLA), privacy, interoperability and reliability. This research paper outlines what cloud computing is, the various cloud models and the main security risks and issues that are currently present within the cloud computing industry. This research paper also analyzes the key research and challenges that presents in cloud computing and offers best practices to service providers as well as enterprises hoping to leverage cloud service to improve their bottom line in this severe economic climate.
Electronic commerce (e-commerce) is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered as e-commerce. E-commerce may have... more
Electronic commerce (e-commerce) is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered as e-commerce. E-commerce may have large economic effects in the future. Internet commerce will change the face of business forever. Moreover, it has affected the information technology, economic, social, and e-commerce has enhanced the productivity growth worldwide in the 21 st century. The impact of e-commerce on developing countries for reducing inefficiencies for trading and to increase productivity in terms of economies with competitors internationally. There are many ways to accelerate the growth of productivity by cutting costs, increasing efficiency and reducing time and distance, e-commerce could become an important tool for development and growth in all sectors. Information security framework is specifically applied to the components that affect e-commerce that includes computer security, data security, and other wider realms of the information security framework. E-commerce security has its own particular nuances and is one of the highest visible security components that affect the end user through to obtain e-trade finance and equity investment, tourism and its internet incarnation.
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to... more
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to internet and built-in sensors keep on increasing. As a fact, smart phones are at every hand and their usage are sky-rocketing. This concept permits anybody to connect anything through the internet. But storing and communicating information with anyone or any device will create a serious problem in the context of security. Secure connection, communication and sharing of information are also in question in this environment. This paper brings the issues such as confidentiality, integrity and availability related to IoT security.
E-commerce is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered e-commerce. E-commerce is subdivided into three categories:... more
E-commerce is widely considered the buying and selling of products over the internet, but any transaction that is completed solely through electronic measures can be considered e-commerce. E-commerce is subdivided into three categories: business to business or B2B (Cisco), business to consumer or B2C (Amazon), and consumer to consumer or C2C (eBay). also called electronic commerce. M-commerce is a term that is used to refer to the growing practice of conducting financial and promotional activities with the use of a wireless handheld device. The term m-commerce is short for mobile commerce, and recognizes that the transactions may be conducted using cell phones, personal digital assistants and other hand held devices that have operate with Internet access. E-commerce Security is a part of the Information Security framework and is specifically applied to the components that affect e-commerce that include Computer Security, Data security and other wider realms of the Information Security framework. E-commerce security has its own particular nuances and is one of the highest visible security components that affect the end user through their daily payment interaction with business.
The modern world is filled with a huge data. As data is distributed across different networks by the distributed systems so security becomes the most important issues in these systems. Data is distributed via public networks so the data... more
The modern world is filled with a huge data. As data is distributed across different networks by the distributed systems so security becomes the most important issues in these systems. Data is distributed via public networks so the data and other resources can be attacked by hackers. In this paper we define different security aspects including on the basis of authorization, authentication, encryption and access control for distributed systems.
- by Istam Shadmanov and +2
- •
- Distributed Systems, Integrity, Security Issues
An appealing feature of blockchain technology is smart contracts. A smart contract is executable code that runs on top of the blockchain to facilitate, execute and enforce an agreement between untrusted parties without the involvement of... more
An appealing feature of blockchain technology is smart contracts. A smart contract is executable code that runs on top of the blockchain to facilitate, execute and enforce an agreement between untrusted parties without the involvement of a trusted third party. In this paper, we conduct a systematic mapping study to collect all research that is relevant to smart contracts from a technical perspective. The aim of doing so is to identify current research topics and open challenges for future studies in smart contract research. We extract 24 papers from different scientific databases. The results show that about two thirds of the papers focus on identifying and tackling smart contract issues. Four key issues are identified, namely, codifying, security, privacy and performance issues. The rest of the papers focuses on smart contract applications or other smart contract related topics. Research gaps that need to be addressed in future studies are provided.
Security is an important issue in the actual educational context where e-learning increases in popularity and increasingly more people are taking online courses. The e-learning platforms are today production systems that need to be... more
Security is an important issue in the actual educational context where e-learning increases in popularity and increasingly more people are taking online courses. The e-learning platforms are today production systems that need to be secured. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. In this paper we will highlight some key security issues that must be taken into consideration in developing and using an e-learning platform. We will also examine some security aspects of one of the most popular open-source e-learning systems: Moodle.
Social media is playing a prominent part in people's lives now-a-days. Facebook, YouTube, Instagram, Google+ etc. have emerged as the popular social media websites. Since its inception in 2004, Facebook has emerged as the most popular... more
Social media is playing a prominent part in people's lives now-a-days. Facebook, YouTube, Instagram, Google+ etc. have emerged as the popular social media websites. Since its inception in 2004, Facebook has emerged as the most popular social media website. In this research, strategic analysis of most popular services provided by Facebook was carried out by using BCG matrix. The data of relative market share and market growth rate was used to plot bubble chart in Microsoft Excel. The analysis using BCG matrix shows that Facebook should minimize its investments in internet advertisements and instead increase its investment in mobile advertisements. Facebook should try to hold its position in the games segment and rebrand its gifts segment. In order to provide its services effectively, security issues faced by Facebook should be effectively managed. The security issues faced by Facebook include privacy, information sharing with third parties, identity theft and children security. In this research, model has been proposed to manage the security issues faced by Facebook.
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for testing dynamics and... more
MANET has been around for more than two decades. Ad hoc network deployment, ability to cater emergent requirements on-the-spot and providing infrastructure less utility makes Ad hoc networks a play field for testing dynamics and applications. Wireless medium as medium for communication and lack of centralized control renders MANETs a favorable victim of hackers and intruders. Other features like change in the topology due to node's movements, battery depletion at nodes and coverage hampering due to obstacles in random terrains etc. adds to miseries of Ad hoc networks. With lots of proposals in recent times to cater the routing and security requirements in Ad hoc, this works presents a review of historic and current perspective in secure routing schemes in recent times.
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing... more
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing reliance on wireless communication also brings great challenges to the security measures and other correlated issues. Although the newly introduced corrected security standard, IEEE 802.11i, offers extensive security for the wireless environment but it is still premature and does not provide effective measures to protect the wireless networks from confidentiality and integrity threats. The main issues for deployment of wireless networks are security attacks, vulnerabilities, battery power and improper security models. This paper provides a study on these problems especially in ad-hoc wireless networks. The study is based on numerous proposed schemes in the endeavor to secure such networks. The goal of this paper is to probe the principal security issues, challenges and fundamental security requirements of wireless communications on the bases of their proposed solutions.
Abstract: In recent years wireless sensor networks has gained a lot of attention and is used in number of commercial and military applications including home automation, building structure monitoring, battlefield monitoring and... more
Abstract: In recent years wireless sensor networks has gained a lot of attention and is used in number of commercial and military applications including home automation, building structure monitoring, battlefield monitoring and surveillance. In WSN each sensor node is prone to a plenty of possible malicious attacks launched by the invader and there’s a need of making the WSN immune to those attacks. The denial of service is most severe attack. Acknowledging the severity of such attacks, this paper first presents the review of security goals followed by types of denial of service attacks at different layers of transmission control protocol (TCP) model. At last various defense strategies against denial of service attacks have been discussed.
Keywords: Wireless sensor networks (WSN), security issues, transmission control protocol (TCP), active attacks, denial of service (DOS) attacks.
Title: A Review of Security Issues and Denial of Service Attacks in Wireless Sensor Networks
Author: Munish Dhar, Rajeshwar Singh
International Journal of Computer Science and Information Technology Research
ISSN 2348-120X (online), ISSN 2348-1196 (print)
Research Publish Journals
In wireless sensor network (WSN) there are two main problems in employing conventional compression techniques. The compression performance depends on the organization of the routes for a larger extent. The efficiency of an in-network... more
In wireless sensor network (WSN) there are two main problems in employing conventional compression techniques. The compression performance depends on the organization of the routes for a larger extent.
The efficiency of an in-network data compression scheme is not solely determined by the compression ratio, but also depends on the computational and communication overheads. In Compressive Data Aggregation technique, data is gathered at some intermediate node where its size is reduced by applying compression technique without losing any information of complete data. In our previous work, we have developed an adaptive traffic aware aggregation technique in which the aggregation technique can be changed into structured and structure-free adaptively, depending on the load status of the traffic. In this paper, as an extension to our previous work, we provide a cost effective compressive data gathering technique to enhance the traffic load, by using structured data aggregation scheme. We also design a
technique that effectively reduces the computation and communication costs involved in the compressive data gathering process. The use of compressive data gathering process provides a compressed sensor
reading to reduce global data traffic and distributes energy consumption evenly to prolong the network lifetime. By simulation results, we show that our proposed technique improves the delivery ratio while
reducing the energy and delay.
Internet of Things (IoT) can be found everywhere in our life. They find application at homes for control and reporting in emergency clinics and for adjustment reporting in various conditions, counteracting fires and in various other... more
Internet of Things (IoT) can be found everywhere in our life. They find application at homes for control and reporting in emergency clinics and for adjustment reporting in various conditions, counteracting fires and in various other applications. These applications are advantageous in various applications which can be either misfortune of security issues. For securing the various gadgets involved a number of research work has been carried out in various counteractivity measures, thus those issues are identified and then located in order to develop a method for disposing off these problems. For protecting the security of the consumer, the consequences are made to limit. The paper has four sections. First part will present the order of assaults of IoT and following sections tries to concentrate on the design and components for the purpose of verification and also to control. In the last section, various layers are discussed in detail
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing... more
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly and boosted the business concept in IT industry. Despite of all the achievements in cloud computing, security is still a critical challenge in cloud computing paradigm. These challenges include user's secret data (like health and financial data) loss, leakage and disclosing of privacy. We have studied literature and discussed various model in cloud computing, it shows that privacy/protection in cloud is still immature.
The aim of this research is to identify the availability levels of fear, neutralization, and Information Systems Security (ISS) and determining the impacts of Fear, and Neutralization on ISS. The primary data of the study collected using... more
The aim of this research is to identify the availability levels of fear, neutralization, and Information Systems Security (ISS) and determining the impacts of Fear, and Neutralization on ISS. The primary data of the study collected using manual distributed questionnaire. By using appropriate statistical test, the collected data has been analyzed. The reliability and hypotheses tested using several statistical methods such as multiple and linear regression test. While validity tested using Cronbach's alpha. The findings of the study shown there is a significant statistical effect of fear and neutralization on the information system security which explains (40.3%) of the variation in ISS. Also, ISS availability level is high as the mean is (3.49) and the responses are very close as the Standard Deviation is (0.98). the research suggested to Study more variables that may affect ISS and increase restrictive procedures of information security and make sure that everyone in organizations are understand the sequences of violating them.
- by Shahrazad Al Marhoon and +1
- •
- Security Issues, E-Commerce
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing... more
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly and boosted the business concept in IT industry. Despite of all the achievements in cloud computing, security is still a critical challenge in cloud computing paradigm. These challenges include user's secret data (like health and financial data) loss, leakage and disclosing of privacy. We have studied literature and discussed various model in cloud computing, it shows that privacy/protection in cloud is still immature.
VoIP (Voice over Internet Protocol) is a growing technology during last decade. It provides the audio, video streaming facility on successful implementation in the network. However, it provides the text transport facility over the... more
VoIP (Voice over Internet Protocol) is a growing technology during last decade. It provides the audio, video streaming facility on successful implementation in the network. However, it provides the text transport facility over the network. Due to implementation of it the cost effective solution, it can be
developed for the intercommunication among the employees of a prestigious organization. The proposed idea has been implemented on the audio streaming area of the VoIP technology. In the audio streaming, the security vulnerabilities are possible on the VoIP server during communication between two parties. In the proposed model, first the VoIP system has been implemented with IVR (Interactive Voice Response) as a case study and with the implementation of the security parameters provided to the asterisk server which
works as a VoIP service provider. The asterisk server has been configured with different security parameters like VPN server, Firewall iptable rules, Intrusion Detection and Intrusion Prevention System. Every parameter will be monitored by the system administrator of the VoIP server along with the MySQL
database. The system admin will get every update related to the attacks on the server through Mail server attached to the asterisk server. The main beauty of the proposed system is VoIP server alone is configured as a VoIP server, IVR provider, Mail Server with IDS and IPS, VPN server, connection with database server in a single asterisk server inside virtualization environment. The VoIP system is implemented for a
Local Area Network inside the university system.
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing... more
Cloud computing is a technique to deliver software, storage and processing. It increases system's capability without changing the existing infrastructure, educating new people or taking license for the softwares. It improves the existing software capabilities and extends the Information Technology resources. In recent years, cloud computing has grown up rapidly and boosted the business concept in IT industry. Despite of all the achievements in cloud computing, security is still a critical challenge in cloud computing paradigm. These challenges include user's secret data (like health and financial data) loss, leakage and disclosing of privacy. We have studied literature and discussed various model in cloud computing, it shows that privacy/protection in cloud is still immature.
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data... more
Cloud computing is utility-based computing provides many benefits to its clients but security is one aspect which is delaying its adoptions. Security challenges include data security, network security and infrastructure security. Data security can be achieved using Cryptography. If we include location information in the encryption and decryption process then we can bind access to data with the location so that data can be accessed only from the specified locations. In this paper, we propose a method based on the symmetric cryptography, location-based cryptography and ciphertext policy-Attribute-based encryption (CP-ABE) to implements secure access control to the outsourced data. The Symmetric key is used to encrypt that data whereas CP-ABE is used to encrypt the secret key and the location lock value before uploading on the server. User will download encrypted data and the symmetric secret key XORed with the Location Lock value, using his attributes based secret key he can obtain first XORed value of Symmetric secret key and location lock value. Using anti-spoof GPS Location lock value can be obtained which can be used to retrieve the symmetric secret key. We have adopted Massage Authentication Code (MAC) to ensure Integrity and Availability of the data. This protocol can be used in the Bank, government organization, military services or any other industry those are having their offices/work location at a fixed place, so data access can be bounded to that location.
Cloud computing is a model which uses the mixture concept of " software-as-a-service " and " utility co mputing " , and provides various on-demand services in a convenient way requested end users. It is internet based where resources are... more
Cloud computing is a model which uses the mixture concept of " software-as-a-service " and " utility co mputing " , and provides various on-demand services in a convenient way requested end users. It is internet based where resources are shared and the informat ion is available fo r on demand service users. Security issue in Cloud computing is the important and critical issues because the resources are distributed. Both the Cloud provider and the cloud consumer should be fully sure that the cloud is safe enough from all the external threats so that the customer does not face any kind of problem like loss or theft of their valua ble data. There is also a possibility where a malicious user can penetrate th e cloud by imitate an authorized user, and affect with a virus to the entire cloud and affects many customers who are sharing the infected cloud. In this paper we firstly lists the parameters that affects the security of the cloud then it explores the secu rity issues of cloud computing and the troubles faced by providers and consumers about their data, privacy, and infected application and security issues. It also presents some security solutions for tackling these issues and problems.
"Integracja europejska. Wprowadzenie, praca zbiorowa pod redakcją Macieja Perkowskiego - to nowoczesny podręcznik akademicki, adresowany do studentów i słuchaczy studiów podyplomowych kierunków: prawo, administracja, ekonomia,... more
"Integracja europejska. Wprowadzenie, praca zbiorowa pod redakcją Macieja Perkowskiego - to nowoczesny podręcznik akademicki, adresowany do studentów i słuchaczy studiów podyplomowych kierunków: prawo, administracja, ekonomia, zarządzanie, dziennikarstwo, politologia i kilku innych, których programy nauczania obejmują szeroko pojętą problematykę integracji europejskiej. Omawiana tematyka to m.in.: podstawy integracji, sprawy bezpieczeństwa, rynku, finansów, prawa człowieka, obywatelstwo, a także wybrane polityki integracji oraz instytucje i agencje UE, których wykaz dodatkowo znajduje się na końcu książki. Opracowanie - poprzez wykorzystanie do zajęć ćwiczeniowych zawartych w nim materiałów dydaktycznych - ma ułatwić przedmiotowe studiowanie oraz dydaktykę, zwłaszcza w nowo powstałych ośrodkach akademickich. Treść i forma podręcznika służą pobudzeniu odbiorców do samodzielnych analiz i ocen, tudzież zachęceniu ich do pogłębionych studiów przedmiotu.
Dr Maciej Perkowski - jest adiunktem na Wydziale Prawa Uniwersytetu w Białymstoku, wykładowcą w Wyższej Szkole Administracji Publicznej w Białymstoku i w Wyższej Szkole Finansów i Zarządzania w Siedlcach. Wykładał też prawo międzynarodowe publiczne na Uniwersytecie Polskim w Wilnie. Odbył kilka staży naukowych w zakresie prawa europejskiego w zagranicznych placówkach naukowych (Uniwersytet Wiedeński, Uniwersytet Humboldta w Berlinie) oraz instytucjach UE (Trybunał Sprawiedliwości Wspólnot Europejskich w Luksemburgu). Jako doradca i koordynator uczestniczy w realizacji programów pomocowych UE. Jest członkiem towarzystw naukowych, m.in. International Law Association, autorem wielu prac opublikowanych w kraju i za granicą."
Présentation séminaire Promédiation Centre 4S - Septembre 2015
Mobile Ad-Hoc Networks (MANET) is top area of research. MANET is self-configured, self- administered and self-organized network. In MANET, nodes are not bodily connected to each other, but the communication can takes place if nodes are in... more
Mobile Ad-Hoc Networks (MANET) is top area of research. MANET is self-configured, self- administered and self-organized network. In MANET, nodes are not bodily connected to each other, but the communication can takes place if nodes are in each other’s transmission range. Because of mobile nature of nodes, the topology of MANET changes from time to time and they lack fixed infrastructure, due to which MANET is open to many security attacks. In this paper, the author discusses Blackhole Attack, which is one of the serious attacks in MANET and comparison of various Blackhole Attack detection techniques.
— Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing... more
— Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing reliance on wireless communication also brings great challenges to the security measures and other correlated issues. Although the newly introduced corrected security standard, IEEE 802.11i, offers extensive security for the wireless environment but it is still premature and does not provide effective measures to protect the wireless networks from confidentiality and integrity threats. The main issues for deployment of wireless networks are security attacks, vulnerabilities, battery power and improper security models. This paper provides a study on these problems especially in ad-hoc wireless networks. The study is based on numerous proposed schemes in the endeavor to secure such networks. The goal of this paper is to probe the principal security i...
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to... more
The Internet of Things (IoT), an emerging research area and talk of the scientific world. Today, the Internet connectivity is widely available and the cost of connection is drastically decreasing. The number of devices connected to internet and built-in sensors keep on increasing. As a fact, smart phones are at every hand and their usage are sky-rocketing. This concept permits anybody to connect anything through the internet. But storing and communicating information with anyone or any device will create a serious problem in the context of security. Secure connection, communication and sharing of information are also in question in this environment. This paper brings the issues such as confidentiality, integrity and availability related to IoT security.
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing... more
Without the need of an infrastructure, low-cost, auto-managed, flexible and low power consumer, wireless communication is becoming emerging technology. It shows great binder for present as well as future hi-tech applications. Increasing reliance on wireless communication also brings great challenges to the security measures and other correlated issues. Although the newly introduced corrected security standard, IEEE 802.11i, offers extensive security for the wireless environment but it is still premature and does not provide effective measures to protect the wireless networks from confidentiality and integrity threats. The main issues for deployment of wireless networks are security attacks, vulnerabilities, battery power and improper security models. This paper provides a study on these problems especially in ad-hoc wireless networks. The study is based on numerous proposed schemes in the endeavor to secure such networks. The goal of this paper is to probe the principal security issues, challenges and fundamental security requirements of wireless communications on the bases of their proposed solutions. 2 ISSUES AND CHALLENGESS Wireless communication has emerged as a major breakthrough in traditional wired communications. It has changed messy wired world into a clean and flexible atmosphere. According to a well known adage, there is no unmixed good in this world; implementation of wireless network carries numerous performance and security issues. These issues include: 2.1 Vulnerabilities in Current Wireless Communications The wireless communications survivability relates to wireless communication protection mechanism and robustness against attacks and failure of wireless network elements or communication itself. Some of these issues are as follows: D
The Computer Network technology is developing rapidly and the recent advances have introduced a new technology for wireless communication over the internet in future in MANET. It becomes the popular research topic in recent years.... more
The Computer Network technology is developing rapidly and the recent advances have introduced a new technology for wireless communication over the internet in future in MANET. It becomes the popular research topic in recent years. Security has become one of the most important challenges against malicious behaviours and nodes in MANET and there are more studies focused on several security problems. After quantifying and analysing the network information Security elements like integrity, availability and confidentiality, we are going to discuss about the overview of security issues in detail with respect to services, parameters, applications, attacks and challenges, some of the applications that is used in MANET and also the various types of attacks that can be involved internally as well as externally such as delay of packets, time consumption and bandwidth etc.,
ARTICLE INFO ABSTRACT Advancements instructions and other services. However, as more organizations continue to embrace technology in their online operations, the risk of information security attacks cannot education institutions have a... more
ARTICLE INFO ABSTRACT Advancements instructions and other services. However, as more organizations continue to embrace technology in their online operations, the risk of information security attacks cannot education institutions have a risk of information security attacks since they have the least secure environment to protect information resources and systems. In addition, colleges, universities, and non profit groups are very vuln Thus, most hackers prefer to use university and college information systems to hide their identities especially when they intend to launch attacks on commercial systems. The attacker systems from these institutions because they contain personal and financial information for students, alumni, employees, and other relevant stakeholders. Failure to safeguard these information systems could or have already resulted in institutions. A questionnaire was distributed to information technology department administrators at higher educational institutions in the Kingdom of Saudi Arabia and further analyzed. Th at discussing the analysis results which include security threats that face these institutions, as well as the security systems they use.
Wireless sensor networks determine probable in military, environments, health and commercial applications. The process of transferring of information from a remote sensor node to other nodes in a network holds importance for such... more
Wireless sensor networks determine probable in military, environments, health and commercial applications. The process of transferring of information from a remote sensor node to other nodes in a network holds importance for such applications. Various constraints such as limited computation, storage and power makes the process of transferring of information routing interesting and has opened new arenas for researchers. The fundamental problem in sensor networks states the significance and routing of information through a real path as path length decides some basic performance parameters for sensor networks. This paper strongly focuses on a shortest path algorithm for wireless adhoc networks. The simulations are performed on NS2 and the results obtained discuss the role of transferring of information through a shortest path.
Mobile Ad hoc Networks (MANETs) are wireless networks consisted of mobile free nodes that can move anywhere at any time without the need to any fixed infrastructure or any centralized administration. In this category of networks existing... more
Mobile Ad hoc Networks (MANETs) are wireless networks consisted of mobile free nodes that can move anywhere at any time without the need to any fixed infrastructure or any centralized administration. In this category of networks existing nodes must rely on each other to play the role of routers or switches instead of using central ones. The self-organized nature of such environments made MANETs vulnerable against many security threats. As a result, providing security requirements in MANETs is one of the most interesting challenges in such a network. In this group of networks, the use of cryptographic solutions is one of the most interesting security issues. The importance of this scientific area in MANETs is more drastic by considering that mentioned schemes must be lightweight enough to be appropriate for resource constrained platforms in such environment. This paper has tried to represent the position of cryptographic issues in MANETs. Moreover, security issues in mobile Ad hoc networks beside of different classes of public key cryptosystems have been introduced.
In this paper a meticulous analysis of applicable literature on “Security in Grid Computing” is turned out. The intension of this survey is to bring out the recently available security models and authorization mechanisms in Grid... more
In this paper a meticulous analysis of applicable literature on “Security in Grid Computing” is turned out.
The intension of this survey is to bring out the recently available security models and authorization
mechanisms in Grid computing. A detailed report has been presented with approaches, algorithms and
implementation system which has been proposed during the previous span of Grid computing progression.
This paper has been systematized as follows, First and foremost analysis of importance of Security in Grid
computing is discussed, which is followed by the Taxonomy of Grid Security issues in section 2.Section 3
presents Grid authorization efforts and Trust relationship in Grid computing. Next, we also put forward
other approaches related to security issues and security measures specified as a segment in the survey.
Security is an important issue in the actual educational context where e-learning increases in popularity and increasingly more people are taking online courses. The e-learning platforms are today production systems that need to be... more
Security is an important issue in the actual educational context where e-learning increases in popularity and increasingly more people are taking online courses. The e-learning platforms are today production systems that need to be secured. To achieve a good level of security, there are many important elements that must be taken into account: authentication, access control, data integrity, content protection, etc. Information security can be obtained using methods such as cryptography and network protocols. In this paper we will highlight some key security issues that must be taken into consideration in developing and using an e-learning platform. We will also examine some security aspects of one of the most popular open-source e-learning systems: Moodle.
Książka jest ósmym tomem wydanym w ramach w serii edytorskiej „Władza – Elity – Przywództwo”. Prezentuje wyniki kolejnego etapu badań prowadzonych przez międzynarodowy zespół badawczy projektu naukowego Elity polityczne Kaukazu... more
Książka jest ósmym tomem wydanym w ramach w serii edytorskiej „Władza – Elity – Przywództwo”. Prezentuje
wyniki kolejnego etapu badań prowadzonych przez międzynarodowy zespół badawczy projektu naukowego
Elity polityczne Kaukazu Północnego: badania i wyzwania. Warto odnotować, że krótko po publikacji niniejszej książki został wydany 9 tom pt. Kaukaz: elity władzy i życie polityczne (Warszawa 2014, 431 s.). Obie publikacje zostały oficjalnie zaprezentowanie 16 października 2014 roku na
II Międzynarodowym Forum Historyków- Kaukazoznawców organizowanym przez Federalny Uniwersytet Południowy oraz Czeczeńską Akademię Nauk w Rostowie nad Donem.
Over the last years many solutions have been proposed for facial expression analyses for emotion assessment, some of which claim high recognition accuracy in real time, even on natural expressions. However, in most (if not all) cases,... more
Over the last years many solutions have been proposed for facial expression analyses for emotion assessment, some of which claim high recognition accuracy in real time, even on natural expressions. However, in most (if not all) cases, these studies do not use a publically available and validated dataset for inducing emotions and fail to place the reported performance in the right context by comparing against human expert scoring performance. We evaluate the abilities of FaceReader, a commercially available product for fully automatic real-time emotional expression recognition, to detect spontaneously induced emotions. We presented a balanced subset of IAPS pictures to a number of test subjects and compared the automatically detected emotional valence as reported by FaceReader to the IAPS valence labels and to the evaluation of three psychologists.