The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Android system has been widely utilized in smartphones, but it also has many security threats. Android uses the permission system to notice the user during installation about what permissions it will receive. However, according to related research, most users have poor understanding of permissions, and will accept the prompt directly. Over privileged applications will expose users to unnecessary permission...
To date a number of comprehensive techniques have been proposed to defend against buffer over attacks. In spite of continuing research in this area, security vulnerabilities in software continue to be discovered and exploited. This is because the existing protection techniques suffer from one or more of the following problems: high run time overheads (often exceeding 100%), incompatibility with legacy...
There has been always a need to search new mediums as well as techniques to send the data secretly. Recent research establishes Deoxyribonucleic Acid (DNA) as an interesting medium for Steganography. DNA have various artificial components that can be used for hiding and sending secret information from any source to destination. Genetic information obtained from DNA is encoded as a sequence of nucleotides...
This paper puts forward an analytic factor neuron model which combines reasoning machine based on the cloud generator with the Factors Neural Network theory. The factor neuron model is realized based on mobile intelligent agent and malicious behavior perception technology. Therefore, it, compared with the traditional security defense technology, has strong flexibility, mobility, scalability and other...
Finding good entropy sources, designing deterministic (pseudo) random number generators, or simply finding suitable non-deterministic random number generators are major challenges. The goal of this paper is to evaluate the use of three motion sensors present in smartphones as potential nondeterministic, true random bit generators (TRNG). This paper focuses in particular on sensors present in Samsung...
In vehicular networks, automobiles assist each other in accident avoidance and information sharing. However, securing the On Board Unit (OBU)'s stored and communicated data is not an easy task. In this paper, we suggest a tactic, which combines an elegant key pre-distribution scheme [16] with a somewhat homomorphic encrypting system (Boneh-Goh-Nissim) [17] to provide muddled secure session keys that...
A wav-audio steganography algorithm based on amplitude modifying is proposed. The secret audio is scrambled through a random number generator. Sampling points are grouped by every three successive ones and the amplitude values are calculated. In order to embed secret audio information, we can decide whether to modify the amplitude value of the second sampling point by comparing the amplitude values...
This paper deals with security constraied optimal power flow (SCOPF) in which FACTS devices are employed to meet system constraints under both normal and contingency states. The considered constraints are power generation limit, voltage limit, transmision limit and FACTS devices operation limit. In normal state, the objective function is to minimize operation cost while satisfying system constraints...
Increasing the security of memory systems is relevant due to the sensitive information which is stored in plain-text. Over the last decade, device specific attacks have been reported as being successfully in retrieving encryption and private keys from AES algorithms. A novel technique is proposed in this work, which improves the security of a cache memory through the use of data scrambling. Several...
With increased power demand and the complexity of power systems, the Australian electricity market needs to undertake a series of changes and updates, including power system deregulation, allowing independent power producers (IPPs) to enter the market. One of the current systems that needs to be updated is the spot pricing system, which involves the application of slack bus independent distribution...
Much of the research on security of industrial automation systems has focused on countermeasures such as intrusion detection, certificate management or public key infrastructures. Due to limited resources, countermeasures should be focused to prevent the attacks with highest potential for damage. The impact of an attack can only be determined through a detailed analysis of the interactions of the...
Data encryption is the primary method to protect embedded devices in the hostile environment. The security of the traditional data encryption algorithms relies on keeping the keys secret and they always require a lot of arithmetic and logical computations, which may be not suitable for area critical or power critical embedded devices. At TrustCom 2013, Hou et al. Proposed to use a physical unclonable...
Developers have to ensure that their systems meet certain security requirements. Structured argumentation can be a powerful tool for developers to deal with system behavior, vulnerabilities, and threats. Haley's framework is based on construction of a context for the system, representing security requirements as constraints, and developing satisfaction arguments for the security requirements. Incomplete...
Cloud storage services have become necessities in our daily life. Although the cloud storage services provide online storage to hold data for the data owner with high accessibility, trust is always an obstacle between the user and the service provider. In this paper, we aim at the audit privilege management issue of integrity audit for cloud storage and search for a proper solution to provide controllable...
In this paper, we propose a new encoding method for converting an electroencephalogram (EEG) signal into binary sequences which use for supplying the random numbers. We focus on low-cost EEG signal since it can be used in real applications that require true random number generator, such as gaming, gambling, and some complex model simulations. Our encoding method uses fluctuations that lie in EEG data...
Managing uncertainties becomes a major challenge in power systems with a high penetration of volatile generation and load. On the contrary, the controllability of the transmission system increases due to the evolution of a smart grid and more flexible technologies. In this paper a methodology for analyzing the impact of uncertainties and operational flexibility in the context of different market coupling...
In modern electricity grids uncertainties only multiply. The ongoing deregulation and the expansion of renewable energy in power system worldwide require more complex control and decision making. As a result, large-scale blackouts still continue to happen. The authors deal with a topical issue: how to take the effective preventive actions given randomly changing circumstances in order to avoid power...
This paper proposes a formulation for a stochastic security constrained unit commitment, dispatch and reserve scheduling, considering N-1 security and non-spinning reserves. We employ a randomized optimization technique that is based on scenario generation of the uncertain variables, in this case the wind power, and offers probabilistic certificates regarding the robustness properties of the resulting...
This paper illustrates the usefulness of visualizing the secure operating domains and the value of dynamic analyses when considering the vulnerability of a power system. The paper includes studies of the secure power transfer limits and vulnerabilities of the IEEE Reliability Test System (RTS). The limits and vulnerabilities are determined by simulating the dynamic response of single and multiple...
This paper proposes an approach for optimal power flow with incorporation of preventive and corrective control. The approach is useful for operation planning to guarantee secure operation under both normal and contingency states. Therefore, the approach consists of main problem and sub problem representing normal and contingency states, respectively. In normal state, preventive control is used to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.