The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a case study from a project in Arusha region (north Tanzania), aiming at improving access to electricity in secondary schools through the establishment of a social enterprise, in charge of promoting rural electrification by applying the “4As Framework” with an innovative way and business structure. The work highlights benefits and challenges from the field, in order to drawn some...
The use of Intelligent Electronic Devices (IEDs) in electrical substations has brought a great improvement in terms of speed, costs, maintenance, and reliability. In this context, the use of IEC 61850 standard appears as one of the main recommendations for substation automation in smart grids that digitally perform the electrical network control and protection. Nevertheless, this improvement may be...
As the key to both offline and online business, consumers' trust to retailers always influences their purchase decision. In recent years, based on the traditional business, more and more click and mortar companies spring up. But could consumers' trust transfer from offline to online channel? And how? Extant researches lack deep exploration for these questions. In this study, introducing perceived...
The principal mission of Multi-Source Multicast (MSM) is to disseminate all messages from all sources in a network to all destinations. MSM is utilized in numerous applications. In many of them, securing the messages disseminated is critical. A common secure model is to consider a network where there is an eavesdropper which is able to observe a subset of the network links, and seek a code which keeps...
Traditional software updating techniques usually needs to shut down the applications, which make them not applicable for applications that needs continuous service. Dynamic software updating (DSU) can update the running programs without downtime, but the existing DSU systems cannot combine flexibility, immediacy and security when they update the software. This paper presents an Immediate and Safe...
This paper presents the development of wide area protection (WAP). The studied case focuses on Vientiane Capital area, Lao PDR. It consists seven substations which are connected the loop network in 22 kV distribution system. The protection system based a characteristic are setting on substation each. The fault area in circuit mainly was affecting the operation of protection, when has occurred a fault...
All international standards of data centers, Uptime Tier Classification, TIA-942, BICSI 002, BITKOM, and EN 50600, are defined system reliability design by topology. Most of topology defines by a single line diagram (SLD) of power distribution systems (PDS). The PDS design approach is using a coherent zone protection mechanism. This mechanism is tried to get rid of single points of failure by applying...
We study secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We describe a technique to shorten the secure EVENODD scheme in [6], which can optimally tolerate 2 node failures and 2 eavesdropping nodes. The shortening technique allows us to obtain secure EVENODD schemes of arbitrary lengths, which...
We consider a wireless sensor network secured by a heterogeneous random key predistribution scheme and investigate its reliability against both link and node failures. The heterogeneous random key predistribution scheme is a lightweight security mechanism proposed to secure sensor networks that include nodes with varying levels of resources, features, or connectivity requirements; e.g., regular nodes...
“To be considered for the 2017 IEEE Jack Keil Wolf ISIT Student Paper Award” In this paper, we show the equivalency of weak and strong secrecy conditions for a large class of secure network coding problems. When we restrict to linear operations, we show the equivalency of “perfect secrecy with zero-error constraint” and “weak secrecy with ∊-error constraint”.
Many Cyber-Physical Systems (CPS) at different scales are being developed for a variety of applications that provide valuable interactions between the cyber world and the physical systems and environments. However, the development of these systems face many challenges due to the complexity of the applications. An appropriate middleware is needed to provide infrastructural support and assist the development...
Determining generation units that provide security to the system under normal operating conditions and contingencies is a task of the planner to avoid emergencies. It is more critical when the system is operated with local areas with reduced voltage support and new generation based on renewable energy resources (RER). This work presents a practical method based on the monitoring of the security of...
This paper presents transmission grid reliability modeling and assessment that is critical to system reinforcement and expansion. This study explored an analytical approach for application on sub-Saharan African grids, which are fraught with effective expansion planning challenges or know-how. In this study, application of delivery point and system reliability concepts was explored and demonstrated,...
The Internet of Things (IoT) paradigm describes a vision where different heterogeneous physical objects like cell phones, computers, sensors, cars, refrigerators, kitchen appliances, TVs, smart homes are connected over the Internet in a global network. Such an immense network of interconnected objects will raise some new dependability and security challenges. In this paper, we propose a way to address...
Applications integrating software with a large number of physical objects and devices in a large-scale Internet of Things (IoT) networks are on the rise. Some examples of these applications are smart grids and water networks and intelligent transportation systems. As they operate in and control a large heterogeneous environment, these applications need real-time controls, powerful and scalable data...
This paper proposes a physical layer coding scheme to provide reliability and security in wireless communication systems. An Adaptive Granular Hybrid Automatic Repeat re- Quest (AG-HARQ) scheme based on Low-Density-Parity-Check (LDPC) codes is proposed. In the AG-HARQ protocol, the whole codewords are first transmitted (by Alice) to the intended receiver (Bob) and potentially intercepted by an unauthorized...
In a number of information security scenarios, human beings can be better than technical security measures at detecting threats. This is particularly the case when a threat is based on deception of the user rather than exploitation of a specific technical flaw, as is the case of spear-phishing, application spoofing, multimedia masquerading and other semantic social engineering attacks. Here, we put...
Safety-critical system domains such as critical infrastructures, aerospace, automotive, and industrial manufacturing and control are becoming increasingly dependent on the use of distributed systems to achieve their functionality. These distributed systems can contain many complex interactions among their constituent components. Despite extensive testing and verification of individual components,...
A case study is presented that empirically analyzes the use of known unsafe functions in gcc, a well-known general purpose software system, along with their distribution over a 5-year period from, 2012 through 2016. The 5-year history of gcc studied is comprised of a total of over 26 million lines of code. gcc was statically analyzed with the use of srcML and a tool created by one of the authors....
Online purchasing power has increased and beyond limitations once internet drives the mankind way of life. It has become an increasingly demanded platform since the existence of WWW in early 1990s. In conjunction with this trending, a study on insights on online purchasing where the study framework embedded the dimensions of information satisfaction, trust, convenience security and purchasing online...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.