The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Always-on Internet-connected devices [the so-called Internet of Things (IoT)] have become common tools deployed throughout the cement industry. As plant managers employ more automation technologies, the implementation of more connected devices can lead to information security and personnel safety concerns. IoT devices provide significant value in cost reduction, increased efficiency, and greater visibility...
The number of mobile users have grown tremendously in the past few years. Nowadays, mobile phones are not just used for the purpose of making calls, rather they have become an important modern gadget which helps people in various aspects of their lives. With this increase, a lot of time on mobile is spent in browsing the internet websites through mobile web browsers. Hence, mobile web browsers actually...
With the advent of smart devices and lowering prices of sensing devices, adoption of Internet of Things (IoT) is gaining momentum. These IoT devices come with greater threat of being attacked or compromised that could lead to Denial of Service (DoS) and Distributed Denial of Service (DDoS). The high volume of IoT devices with high level of heterogeneity, magnify the possibility of security threats...
We present an approach to tracking the behaviour of an attacker on a decoy system, where the decoy communicates with the real system only through low energy bluetooth. The result is a low-cost solution that does not interrupt the live system, while limiting potential damage. The attacker has no way to detect that they are being monitored, while their actions are being logged for further investigation...
Internet of Things (IoT) is slowly taking over the world where its predicted that by 2025, it will grow to 1-3 trillion connected machines/devices. With large scale deployments, maintaining these devices is a seeming burden on the operations. Also, with huge deployments of IoT devices, most concerns center around privacy and security. To reduce the efforts of on-field maintenance and to perform such...
Fraud prevention in the banking sphere is a very important type of activity which can cover a whole range of fraud schemes — both from employees and customers. The article studies the existing technologies for realization of the system of security control over functioning of POS networks in real time and analyzes them in detail. Besides, the concept of the system of monitoring and analysis of threats...
There is an increasing availability of high throughput networks which leads to the need of security appliances in these networks. Testing these appliances with regards to performance and effectiveness relies on testing tools that can achieve or even surpass the capabilities of the devices and networks under test. However, current tools are not capable of achieving both the flexibility and performance...
Nowadays, touchscreen mobile devices make up a larger share in the market. Users often use these devices to store personal and sensitive data. This necessitate to find more effective and robust methods to continuously authenticate touch-based mobile device users. In this paper, we propose two levels of behavioral touch features that can be extracted from raw touchscreen logs and demonstrate that different...
Nowadays one of the most important tasks in the field of network technologies is to ensure the data transmission, processing and storage security. In this paper, the idea of a new approach to the design of a distributed system for managing data flows and protecting computer networks from harmful effects is proposed. The main principles of this approach are considered, problems are set and ways of...
The aim of the paper mainly study to group decision making problem in the police station performance evaluation system by utilizing interval-valued intuitionistic fuzzy soft set based on operations. In the process of the decision making, we fully consider the importance of each expert according to their knowledge background. Firstly, we introduce an interval-valued intuitionistic fuzzy soft set and...
Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we set up a secure analytical framework for IoT networks to characterize the network delay performance and secrecy performance. Firstly, stochastic geometry and queueing theory are adopted to model the location of IoT devices and the temporal arrival of packets. Based on this model, a low-complexity secure...
Increasing demand has led to wireless spectrum shortages, with many parts of the existing spectrum being heavily used. Dynamic spectrum access (DSA) has been proposed to allow cognitive radio networks to use existing spectrum more efficiently. It will allow secondary users to transmit on already allocated spectrum on a non-interference basis. Cognitive radios are able to change bandwidth and other...
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scenarios. Through their communication paradigm and platform versatility WSNs are able to meet increasingly demanding communication requirements. However, a critical area that has not been...
Malware detection is an important aspect of cyber security. The process of identifying malicious code in files or network traffic is very complex and requires a lot of computational resources. Most security solutions that deal with malware detection implement advanced string matching algorithms or look for certain behavioral patterns during program execution. These methods of detection can cause significant...
The paper is devoted to the issues of design of secure cyber-physical systems based on embedded devices. It aims to develop a generalized approach to the design of secure systems based on embedded devices. Current approaches to design secure software and embedded devices are analyzed. The design lifecycle for secure embedded devices system is proposed. Advantages and disadvantages of the approach...
During the last few years critical advancements in Wireless Sensor Networks (WSNs) have highlighted respective platforms as a prominent technology able to tackle various challenges posed by Smart-City application scenarios. However, a critical area that has not been adequately taken into consideration concerns security provision necessity in conjunction to its impact on real WSN platform communication...
Advancement in digitization gave rise to a new paradigm of communication, called Internet of Things (IoT), where various heterogeneous physical objects (IoT devices) with embedded intelligence can provide or receive services from each other seamlessly. One concerned issue is to maintain reliability in the system with these heterogeneous devices for effective utilization of services. Trust and Reputation...
We present in this paper a security analysis of electronic devices which considers the lifecycle properties of embedded systems. We first define a generic model of electronic devices lifecycle showing the complex interactions between the numerous assets and the actors. The method is illustrated through a case study: a connected insulin pump. The lifecycle induced vulnerabilities are analyzed using...
Internet of Things (IoT) is a paradigm which has become extremely popular, with applications spanning from ehealth to industrial controls. IoT architectures are distributed and often based on constrained devices, which make challenging the task of introducing security mechanisms, in particular those requiring dynamic policy evaluation. In this paper we present UCIoT (Usage Control in IoT), a fault...
This paper presents polymorphic logic gates for hardware security using giant spin Hall effect (GSHE) devices in which electron spin is the information token. Compared to existing CMOS (charge-based) IP protection and camouflaging security techniques, the proposed GSHE logic offers significant reduction in implementation area as well as power dissipation. Based on the Monte-Carlo simulation of stochastic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.