To see the other types of publications on this topic, follow the link: Data transmission systems Security measures.

Journal articles on the topic 'Data transmission systems Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data transmission systems Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Li, Feng, and Hai Ying Wang. "Designed on Information Security Systems for Mobile Databases." Advanced Materials Research 915-916 (April 2014): 1424–27. http://dx.doi.org/10.4028/www.scientific.net/amr.915-916.1424.

Full text
Abstract:
In this paper, the existing transmission network message transfer protocol and conducted in-depth analysis to identify which existing security measures and the presence of hidden proposed secure data transmission scheme. The program takes into account the feasibility of the existing network to transmit messages that programs load capacity, on the other hand give full consideration to the needs of users, providing different levels of security services for different users.
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Yang. "Research on Internet Information Security in the Big Data Era." E3S Web of Conferences 218 (2020): 04008. http://dx.doi.org/10.1051/e3sconf/202021804008.

Full text
Abstract:
In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.
APA, Harvard, Vancouver, ISO, and other styles
3

Khan, Muhammad Amir, Jawad Khan, Nabila Sehito, Khalid Mahmood, Haider Ali, Inam Bari, Muhammad Arif, and Raania M. Ghoniem. "An Adaptive Enhanced Technique for Locked Target Detection and Data Transmission over Internet of Healthcare Things." Electronics 11, no. 17 (August 30, 2022): 2726. http://dx.doi.org/10.3390/electronics11172726.

Full text
Abstract:
The incredible advancements in data transmission technology have opened up more potentials for data security than ever before. Numerous methods for data protection have been developed during the previous decades, including steganography and cryptography. The security and integrity of medical data have emerged as major barriers for healthcare service systems as the Internet of Things has evolved dramatically in the healthcare business. Communication between two devices securely is a difficult problem. Numerous cryptographic algorithms are already available, including data encryption standard (DES), Rivest–Shamir–Adleman (RSA), and advanced encryption standard (AES). In this paper, we present a hybrid security model for the protection of diagnostic text data contained in medical photographs. The proposed model is built by combining a proposed hybrid encryption system with either a 2D Discrete Wavelet Transform 1 Level (2D-DWT-1L) or a 2D Discrete Wavelet Transform 2 Level (2D-DWT-2L) steganography technique. The suggested model encrypts secret data and hides them using 2D-DWT-3L. As text covers, color and grayscale images are employed. The suggested system’s performance was tested using PSNR, SSIM, MSE, and Correlation. Associated to state-of-the-art approaches, the proposed model masked personal patient data with high capacity, imperceptibility and minimum deterioration in the received stego-image. We use MATLAB to build the proposed mechanism, and measures such as throughput and execution time are used to assess performance.
APA, Harvard, Vancouver, ISO, and other styles
4

Mallikarjuna Shastry P.M, Prasanthi Konduru,. "Huffman Coding and Multi-Generation Mixing Assisted Network Coding Based MAC for QoS-Centric Secure Data Communication over MANETs." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2146–66. http://dx.doi.org/10.17762/turcomat.v12i6.4820.

Full text
Abstract:
The exponential rise in wireless transmission has gained widespread attention to meet major mobile communication purposes including, Internet of Things (IoT) and Machine-to-Machine (M2M) communications. Mobile Ad-hoc Network (MANET) has emerged as one of the most viable solution to meet aforesaid mobile communication purposes; however, being decentralized and infrastructure-less network it undergoes adversaries including dynamic topology and security breaches due to malicious node attachment during routing. On the contrary, data security and allied Quality-of-Service (QoS) provision are inevitable in NextGen communication systems. Unlike routing-based security measures, Medium Access Control (MAC) based approaches are found more effective for MANETs. However, most of the classical MAC designs either address QoS or security as standalone objective. Unlike existing MAC solutions, in this paper a state-of-art novel Huffman Coding and Multi-Generation Mixing (MGM) assisted random linear network model-based MAC design (HM2-MAC) is proposed for MANET. Realizing the robustness of the network coding algorithms towards reliable, secure and error-free multicast transmission, we designed HM2-MAC in such manner that Huffman coding helps securing the source data packets, while MGM concept enables reduction in redundant packets to make overall communication resource efficient and secure. Unlike redundant packet-per-generation, MGM concept helps in reducing redundant transmission and hence achieves resource efficiency. Since, in HM2-MAC model the coefficient matrix used to encode the data is known only to the sink, no intermediate node can decode it or can pollute it. It makes multicast transmission more secure over MANET. Additionally, the use of iterative buffer flush technique preserves resources or buffer to accommodate more data for transmission and hence higher throughput. Noticeably, error sensitive packetization and MGM control strengthens our proposed model to retain optimal performance. HM2-MAC has been applied as a sub-layer of native IEEE 802.11 MAC and hence retains backward compatibility towards real-world implementation. MATLAB based simulation revealed that our proposed HM2-MAC protocol achieved almost 99.6% throughput even under varying link-loss patterns, which reveals its robustness to ensure QoS delivery with secure data transmission in MANET.
APA, Harvard, Vancouver, ISO, and other styles
5

Storm van Leeuwen, Daan, Ali Ahmed, Craig Watterson, and Nilufar Baghaei. "Contact Tracing: Ensuring Privacy and Security." Applied Sciences 11, no. 21 (October 25, 2021): 9977. http://dx.doi.org/10.3390/app11219977.

Full text
Abstract:
Faced with the biggest virus outbreak in a century, world governments at the start of 2020 took unprecedented measures to protect their healthcare systems from being overwhelmed in the light of the COVID-19 pandemic. International travel was halted and lockdowns were imposed. Many nations adopted measures to stop the transmission of the virus, such as imposing the wearing of face masks, social distancing, and limits on social gatherings. Technology was quickly developed for mobile phones, allowing governments to track people’s movements concerning locations of the virus (both people and places). These are called contact tracing applications. Contact tracing applications raise serious privacy and security concerns. Within Europe, two systems evolved: a centralised system, which calculates risk on a central server, and a decentralised system, which calculates risk on the users’ handset. This study examined both systems from a threat perspective to design a framework that enables privacy and security for contact tracing applications. Such a framework is helpful for App developers. The study found that even though both systems comply with the General Data Protection Regulation (GDPR), Europe’s privacy legislation, the centralised system suffers from severe risks against the threats identified. Experiments, research, and reviews tested the decentralised system in various settings but found that it performs better but still suffers from inherent shortcomings. User tracking and re-identification are possible, especially when users report themselves as infected. Based on these data, the study identified and validated a framework that enables privacy and security. The study also found that the current implementations using the decentralised Google/Apple API do not comply with the framework.
APA, Harvard, Vancouver, ISO, and other styles
6

Sokolovsky, S. P. "PARAMETRIC OPTIMIZATION OF INFORMATION SYSTEMS FOR PROACTIVE PROTECTION OF DATA TRANSMISSION SERVICE FROM NETWORK RECONNAISSANCE." Vestnik komp'iuternykh i informatsionnykh tekhnologii, no. 215 (May 2022): 49–57. http://dx.doi.org/10.14489/vkit.2022.05.pp.049-057.

Full text
Abstract:
The analysis of the FTP protocol revealed a number of vulnerabilities in it, which can be used by an adversary to uncover the IDs of data transfer service clients and compromise the used network security features. On the one hand, it is due to the possibility of repeated authorization attempts to unauthorized clients, allowing to implement a data transfer service username and password. On the other hand, the implementation of reactive measures of protection, which consists in breaking the control connection to the adversary after a number of unsuccessful authorization attempts, forcing him to change the strategy of exposure. In this regard, the use of proactive protection measures, allowing to increase the time of dialog interaction with the intruder and imposing restrictions on computing and temporal resources used by the intruder, is proposed as a countermeasure to the network reconnaissance tools. The essence of proactive protection measures consists in splitting the response of FTP server to unauthorized client commands into fragments and sending those fragments to the intruder after a specified delay time. Application of proactive protection gives the security system of information system a number of advantages over the intruder in using the time resource, allowing to implement additional protection measures. The problematic issues when implementing proactive protection measures for data transmission service of information systems are, firstly, the need to send fragments of response to the intruder at intervals shorter than the timeout time of waiting for these responses, set by the intruder. Secondly, the possibility of sending to the violator the limited number of fragments of response, that is caused by FTP protocol capabilities, regulating the size of response, as well as the excessive saturation of the communication channel by fragments of messages, that can lead to exhaustion of the resource opportunities of data transmission medium. Therefore, there is a need to find the optimal parameters of the information system in the configuration of data transmission parameters in the interaction with the network reconnaissance tools. The process of information system՚s data transmission service functioning under the influence of network reconnaissance tools is formalized in the form of a Markov random process with discrete states and continuous time. Intensities of streams of events, under which the system passes from state to state, are the input data for solving the task of finding the optimal parameters of the information system for the situation under consideration. The qualitative formulation of the task of determining the optimal parameters of the information system is formulated as follows: using a given mathematical model of the information system՚s data transmission service under conditions of network reconnaissance we should find such a set of parameters of information system՚s functioning, in which the maximum efficiency of its protection while ensuring a given level of availability is provided. The problem under consideration is a vector (multi-criteria) parametric optimization problem, which will be reduced to single-criteria (scalar) optimization by constraint method (main criterion). Main criterion method implies selection of one scalar target function and transfer of other target functions into additional restriction functions. As the constraints for solving the optimization problem set resource constraints, characterized by the coefficient of the transmission medium, as well as the condition of a given level of robustness of the information system, characterized by the number of conditionality of the matrix of the intensity of the flow of events. The research applies a nonlinear optimization algorithm, an annealing simulation algorithm that provides the ability to approximate the search for a global extremum. The results obtained during the study are presented in the form of an assortment of graphic dependences of changes in the optimal parameters of the information system on the intensity of the impact of network reconnaissance means and the imposed constraints.
APA, Harvard, Vancouver, ISO, and other styles
7

Pathak, Gaurav, Jairo Gutierrez, and Saeed Ur Rehman. "Security in Low Powered Wide Area Networks: Opportunities for Software Defined Network-Supported Solutions." Electronics 9, no. 8 (July 25, 2020): 1195. http://dx.doi.org/10.3390/electronics9081195.

Full text
Abstract:
The Internet of things (IoT) has revolutionized the use of connectivity and has given birth to new transmission technologies to satisfy the requirements of diverse IoT applications. Low powered wide area networks (LPWAN) is one of those transmission technologies, and is becoming exceptionally useful for IoT applications. The nodes use energy-efficient mechanisms for long-range data transmission (10–20 km), lasting in hostile environments for years and making them suitable for IoT applications such as environmental monitoring, automated billing systems, smart homes, smart offices, and patient monitoring. However, LPWAN devices have minimal resources, which makes it challenging to provide promising security to devices and data in the network. In this paper, we discuss the security mechanisms used in current LPWAN technologies along with their vulnerabilities and possible attacks on them. A detailed literature review is conducted on existing solutions on the security of constrained IoT networks similar to LPWAN using different networking frameworks. The reviewed literature is then compared based on various network security measures addressed by them. In addition, the emergence of software defined network (SDN) architecture for security in IoT is explained based on literature. Finally, the applicability of SDN in LPWAN security, its opportunities, and challenges in implementation are discussed.
APA, Harvard, Vancouver, ISO, and other styles
8

Bagul, Riya, Atharva Karaguppi, Vishwas Karale, Mudit Singal, and Dr Vaishali Ingale. "A Dynamic and Highly Configurable Crypto-Processor for brief communication interval." Journal of University of Shanghai for Science and Technology 23, no. 05 (May 25, 2021): 551–61. http://dx.doi.org/10.51201/jusst/21/05162.

Full text
Abstract:
In modern computing systems data security is of paramount importance. The data transfer must be made secure because it can be significantly sensitive for any organization involved. This paper expounds a SOC architecture to facilitate end to end secure data exchange for applications involving short communication intervals. This SOC has been designed to behave as a co-processor which along with a standard general-purpose processor would serve as a cryptosystem. The SOC employs two famous algorithms – RSA and AES for cryptography. In contrast to usual single key cryptographic systems, this paper tries to elaborate an innovative methodology involving dynamic security measures that makes the system distributed rather than making it central to a specific algorithm and hence a particular key. The methodology involves generating and using an AES key for data encryption and RSA key for secure transfer of the AES key between the point of transmission and reception.
APA, Harvard, Vancouver, ISO, and other styles
9

Martin Boros, Matej Kucera, Andrej Velas, and Jan Valouch. "Possibilities for Experimental Testing of Alarm Transmission Systems." Communications - Scientific letters of the University of Zilina 22, no. 2 (April 1, 2020): 123–28. http://dx.doi.org/10.26552/com.c.2020.2.123-128.

Full text
Abstract:
In the current digital era, information is a basis of some systems. In the area of information, great emphasis is also placed on its security and possibilities of use. The basis of the alarm transmission system is information about the protected object, which is transmitted to the remote center of the alarm transmission system. Operators of alarm transmission system centers should be obliged to carry out regular testing of the availability of individual transmission networks. At present, there is a trend that those tests are carried out by telephone calls between the two technicians and the time of transmission of information is measured utilizing a stopwatch. To automate this process, a test facility has been created that can simulate and record the intrusion of a protected object. Initial experimental tests have ascertained whether it is possible, with the test equipment, to generate the data necessary to assess the reliability of alarm transmission systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Kumari, Kimmi, and M. Mrunalini. "IoT Big Data Security, Privacy and Challenges Related to Smart Grid." International Journal of Wireless Networks and Broadband Technologies 8, no. 2 (July 2019): 1–10. http://dx.doi.org/10.4018/ijwnbt.2019070101.

Full text
Abstract:
The highly interconnected network of heterogeneous devices which enables all kinds of communications to take place in an efficient manner is referred to as “IOT.” In the current situation, the data are increasing day by day in size as well as in terms of complexities. These are the big data which are in huge demand in the industrial sectors. Various IT sectors are adopting big data present on IOT for the growth of their companies and fulfilling their requirements. But organizations are facing a lot of security issues and challenges while protecting their confidential data. IOT type systems require security while communications which is required currently by configuration levels of security algorithms, but these algorithms give more priority to functionalities of the applications over security. Smart grids have become one of the major subjects of discussions when the demands for IOT devices increases. The requirements arise related to the generation and transmission of electricity, consumption of electricity being monitored, etc. The system which is responsible to collect heterogeneous data are a complicated structure and some of its major subsystems which they require for smooth communications include log servers, smart meters, appliances which are intelligent, different sensors chosen based on their requirements, actuators with proper and efficient infrastructure. Security measures like collection, storage, manipulations and a massive amount of data retention are required as the system is highly diverse in its architecture and even the heterogeneous IOT devices are interacting with each other. In this article, security challenges and concerns of IOT big data associated with smart grid are discussed along with the new security enhancements for identification and authentications of things in IOT big data environments.
APA, Harvard, Vancouver, ISO, and other styles
11

Maosa, Herbert, Karim Ouazzane, and Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework." International Journal of Information Security and Privacy 16, no. 1 (January 1, 2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.

Full text
Abstract:
In cyber security, it is critical that event data is collected in as near real time as possible to enable early detection and response to threats. Performing analytics from event logs stored in databases slows down the response time due to the time cost of database insertion and retrieval operations. The authors present a data collection framework that minimizes the need for long-term storage. Events are buffered in memory, up to a configurable threshold, before being streamed in real time using live streaming technologies. The framework deploys virtualized data collecting agents that ingest data from multiple sources including threat intelligence. The framework enables the correlation of events from various sources, improving detection precision. The authors have tested the framework in a real time, machine-learning-based threat detection system. The results show a time gain of 300 milliseconds in transmission time from event capture to analytics system, compared with storage-based collection frameworks. Threat detection was measured at 95%, which is comparable to the benchmark snort IDS.
APA, Harvard, Vancouver, ISO, and other styles
12

Burczyk, Robert, Agnieszka Czapiewska, Malgorzata Gajewska, and Slawomir Gajewski. "LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module." Electronics 11, no. 18 (September 13, 2022): 2892. http://dx.doi.org/10.3390/electronics11182892.

Full text
Abstract:
Monitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer of performed measurements from many places to the network management center. However, there are still no devices that act as data concentrators, which would integrate many transmission technologies and protocols in one device, supporting the communication between those different transmission technologies and which would realize edge computing to assist the management center by prioritizing and combining transmitted data. In this article, the authors present a device that meets the above-mentioned requirements. There are presented research results leading to the development of a decision algorithm, called Multilink—ML, dedicated to the presented device. This algorithm enables the selection between LTE and NB-IoT interfaces for packet transmission without the need to burden the communication system with additional transmissions.
APA, Harvard, Vancouver, ISO, and other styles
13

M., Vardhana, and Anil Kumar Bhat. "VLSI Implementation and Software Co-Simulation of Digital Image Watermarking with Increased Security." International Journal of Sensors, Wireless Communications and Control 10, no. 4 (December 18, 2020): 634–38. http://dx.doi.org/10.2174/2210327909666190319150314.

Full text
Abstract:
Background: Security is one of the fundamental and essential factors, which has to be addressed in the field of communication. Communication refers to the exchange of useful information between two or more nodes. Sometimes it is required to exchange some of the confidential information such as a company’s logo, which needs to be hidden from the third person. The data that is being exchanged between these nodes has to be kept confidential and secured from unintended users. The three fundamental components of security are confidentiality, integrity and authentication. The data that is being exchanged has to be confidential, and only the authorized party should have access to the information that is being exchanged. One of the key methods for securing the data is encryption. Objective: The main objective of this paper was to address the problem of data hiding and security in communication systems. There is a need for having hardware resources for having high speed data security and protection. Methods: In this paper, we implemented image watermarking using LSB technique to hide a secret image, and employed encryption using Advanced Encryption Standard, to enhance the security of the image. An image is a two dimensional signal, with each pixel value representing the intensity level. The secure transmission of the image along the channel is a challenging task, because of the reason that, any individual can access it, if no security measures are taken. Conclusion: An efficient method of digital watermarking has been implemented with increased security and performance parameters are presented. Results: In this paper, hardware realization of image watermarking/encryption and dewatermarking/ decryption is implemented using Very Large Scale Integration. The design is verified by means of co-simulation using MATLAB and Xilinx. The paper also presents the performance parameters of the design, with respect to speed, area and power.
APA, Harvard, Vancouver, ISO, and other styles
14

Kuchurov, Vadim, Roman Maximov, and Roman Sherstobitov. "Model and Technique for Abonent Address Masking in Cyberspace." Voprosy kiberbezopasnosti, no. 6(40) (2020): 2–13. http://dx.doi.org/10.21681/2311-3456-2020-06-2-13.

Full text
Abstract:
Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.
APA, Harvard, Vancouver, ISO, and other styles
15

Levchenko, A. O., S. H. Trutnev, N. P. Ismailova, and I. V. Sharipova. "SOFTWARE IMPLEMENTATION OF EXPERTS DATA EXCHANGE SUB-SYSTEMS IN DISTRIBUTED COMPLEXES FOR SIMULATION OF COMBAT ACTIONS." Проблеми створення, випробування, застосування та експлуатації складних інформаційних систем, no. 22 (August 4, 2022): 4–13. http://dx.doi.org/10.46972/2076-1546.2022.22.01.

Full text
Abstract:
The comprehensive development of information systems creates conditions for the development and implementation of modern information tools that automate, and thereby more effectively implement management processes. At the same time, due to the increasing complexity of information systems and the information technologies used in them, the volume of requirements for them is growing. One of the directions for introducing IS into modern models of military equipment is information systems control units. Modern information systems control units not only provide control of the military equipment sample, but also provide operational data exchange with the crew. Modern database modeling complexes (such as PEO STRI, the American company "Alion Science & Technology") make it possible to simulate the combat actions of a unit with the exchange of data between the crew (experts). The main role in ensuring the security of accounting subsystems of modern database modeling complexes should be played by well-tried and tested methods of modern cryptography. The use of one or another cryptographic protocol or algorithm should be dictated by necessity and validity. Since in the modern conditions of the development of the Armed Forces of Ukraine in general and in the accounting subsystems of modern database modeling complexes in particular, ensuring secure data exchange is an urgent task, such measures should be taken when exchanging data in which data transmission from each workstation of the system is not available to third parties. persons, therefore it is proposed to use blockchain technology in the field of electronic data exchange. Thus, when exchanging data, such measures are used in which the transfer of data from each workstation of the system was not available to third parties. This process increases the likelihood of eliminating the possibility of data leakage. However, with secure data exchange, this procedure cannot be considered completely adequate, since this method of data exchange cannot be tested on a large number of operators (that is, at the operational-tactical level). Keywords: data exchange, workplace data protection modeling, blockchain, information systems, military operations.
APA, Harvard, Vancouver, ISO, and other styles
16

M, Ganavi, Prabhudeva S, and Hemanth Kumar N P. "An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform." International Journal of Computer Network and Information Security 14, no. 4 (August 8, 2022): 43–59. http://dx.doi.org/10.5815/ijcnis.2022.04.04.

Full text
Abstract:
Information security is indispensable in the transmission of multimedia data. While accumulating and distributing such multimedia data, the access of data from a third person is the real security challenging issue. Information hiding plays an important role. Scramble the data before hiding it in carrier media gives enhanced security level for the data. In this paper, bit plane slicing is used to represent an input image with eight planes at bit-level instead of pixel-level. As the least significant bit contains noisy information, only the most significant bit plane can be used to represent an image. At the first level, an input image is processed through the spatial domain. Transform domain techniques are used to process the image at the middle level. Elliptic curve cryptography is used to scramble and descramble the MSB plane image. A logistic chaotic sequence of the input image is added to the most significant bit plane image to generate the final scrambled image. The discrete wavelet transform is used to embed the scrambled image in its high-frequency sub-bands. At the last level, a least significant bit technique, a spatial domain is used to embed the scrambled image in the carrier image. Message integrity is also verified by finding the hash of an input image. The performance of the proposed method is evaluated through various security measures. It gives good results as number of pixel change rate is closer to 100% and unified average changing intensity is 33.46.
APA, Harvard, Vancouver, ISO, and other styles
17

Morozov, Ilya Leonidovich. "State Policy in the Field of Information Security on Legitimacy of the Political Structure of Modern Russia – Trends, Problems, Solutions." Общество политика экономика право, no. 9 (September 2020): 12–15. http://dx.doi.org/10.24158/pep.2020.9.1.

Full text
Abstract:
Information security in the modern post-industrial “authorized” world is becoming one of the key ele-ments in the state’s national security system. The author of the article notes that the Russian state policy in the field of information security is imple-mented according to a “tough” model: reliance on law enforcement agencies and prohibitive measures, the desire to control the transmission channels of big data, to monopolize or at least take control of the main sources of media generation. As recom-mendations for optimizing the state information policy, the author proposes to strengthen the inter-action of state institutions with non-profit organiza-tions, social movements and other elements of civil society. Moreover, it is needed to move from a pro-hibitive model of informational confrontation to a combined one, combining both counterpropaganda and readiness for dialogue with external political actors on mutual interests; to step up the work of state bodies in compliance with the legality of the circulation of information in the latest communica-tion systems. It is also proposed to introduce the development of competence to counter informa-tional political aggression into the system of train-ing the state and municipal employees.
APA, Harvard, Vancouver, ISO, and other styles
18

Sumathi, Appasamy, Muthuramalingam Akila, Rocío Pérez de Prado, Marcin Wozniak, and Parameshachari Divakarachari. "Dynamic Bargain Game Theory in the Internet of Things for Data Trustworthiness." Sensors 21, no. 22 (November 16, 2021): 7611. http://dx.doi.org/10.3390/s21227611.

Full text
Abstract:
Smart home and smart building systems based on the Internet of Things (IoT) in smart cities currently suffer from security issues. In particular, data trustworthiness and efficiency are two major concerns in Internet of Things (IoT)-based Wireless Sensor Networks (WSN). Various approaches, such as routing methods, intrusion detection, and path selection, have been applied to improve the security and efficiency of real-time networks. Path selection and malicious node discovery provide better solutions in terms of security and efficiency. This study proposed the Dynamic Bargaining Game (DBG) method for node selection and data transfer, to increase the data trustworthiness and efficiency. The data trustworthiness and efficiency are considered in the Pareto optimal solution to select the node, and the bargaining method assigns the disagreement measure to the nodes to eliminate the malicious nodes from the node selection. The DBG method performs the search process in a distributed manner that helps to find an effective solution for the dynamic networks. In this study, the data trustworthiness was measured based on the node used for data transmission and throughput was measured to analyze the efficiency. An SF attack was simulated in the network and the packet delivery ratio was measured to test the resilience of the DBG and existing methods. The results of the packet delivery ratio showed that the DBG method has higher resilience than the existing methods in a dynamic network. Moreover, for 100 nodes, the DBG method has higher data trustworthiness of 98% and throughput of 398 Mbps, whereas the existing fuzzy cross entropy method has data trustworthiness of 94% and a throughput of 334 Mbps.
APA, Harvard, Vancouver, ISO, and other styles
19

Mulvaney, David, Bryan Woodward, Sekharjit Datta, Paul Harvey, Anoop Vyas, Bhaskar Thakker, Omar Farooq, and Robert Istepanian. "Monitoring Heart Disease and Diabetes with Mobile Internet Communications." International Journal of Telemedicine and Applications 2012 (2012): 1–12. http://dx.doi.org/10.1155/2012/195970.

Full text
Abstract:
A telemedicine system is described for monitoring vital signs and general health indicators of patients with cardiac and diabetic conditions. Telemetry from wireless sensors and readings from other instruments are combined into a comprehensive set of measured patient parameters. Using a combination of mobile device applications and web browser, the data can be stored, accessed, and displayed using mobile internet communications to the central server. As an extra layer of security in the data transmission, information embedded in the data is used in its verification. The paper highlights features that could be enhanced from previous systems by using alternative components or methods.
APA, Harvard, Vancouver, ISO, and other styles
20

Odingo, Myron. "An Exploration of COVID-19 Management Policies across Nine African Countries." East African Health Research Journal 4, no. 2 (November 26, 2020): 113–17. http://dx.doi.org/10.24248/eahrj.v4i2.634.

Full text
Abstract:
Background: The Coronavirus disease 2019 (COVID-19) has registered more than 16 million cases and has been declared a global pandemic. Social distancing measures have been recommended as part of health policies aimed at reducing the transmission of the disease. These have resulted in adverse social and economic implications; many countries are therefore discussing exit strategies for the relaxation of COVID-19 restrictions. Aim: To explore the COVID-19 management policies and their outcomes among 9 African countries in order to guide the upcoming and ongoing relaxation of containment and mitigation measures. Methods: Daily COVID-19 statistics were obtained from the World Health Organization between12th March 2020 and 17th July 2020). Data on government policies was obtained from the Human Data Exchange Program between 20th January 2020 and 24th July 2020, a service operated by the United Nations Office for the Coordination of Humanitarian Affairs (OCHA). Data analysis was conducted using the Python (version 3) programming language modules: Pandas, NumPy, Matplotlib, Seaborn and SciPy. Results: The most common containment and mitigation measures were under the categories of; health systems strengthening, enhanced detection measures, implementation of quarantine measures, movement restrictions and social distancing. Countries with low cases and low deaths prioritised social distancing and movement restriction policies, while countries with high cases and high deaths focused on quarantines, closures of public places and borders and public communication. High cases with low death areas implemented health systems strengthening, social distancing, detection and logistics/ security improvement. Low cases with high death countries focused on public communication and improved detection measures. Conclusion: The current study found that social distancing measures remain an effective method of controlling COVID-19. However, coordination between government and organisations to develop social distancing protocols within businesses and specialist organisations such as the military, prisons, educational facilities and the transport industry was observed in countries with better control of the disease.
APA, Harvard, Vancouver, ISO, and other styles
21

Vatambeti, Ramesh, Nadella Sree Divya, Hanumantha Rao Jalla, and Mukkamula Venu Gopalachari. "Attack Detection Using a Lightweight Blockchain Based Elliptic Curve Digital Signature Algorithm in Cyber Systems." International Journal of Safety and Security Engineering 12, no. 6 (December 31, 2022): 745–53. http://dx.doi.org/10.18280/ijsse.120611.

Full text
Abstract:
Cyber-physical systems (CPSs) are highly susceptible to malicious cyberattacks due to their reliance on communication networks. For this reason, many different attack detection techniques have been developed to guarantee the safety of CPSs. This article introduces BlockChain (BC) to address CPS issues such as data security and privacy. Additionally, BC is not well suited for CPS due to its high computing complexity, limited scalability, significant bandwidth overhead, and latency. To meet the requirements of CPS, a light-weight blockchain-based signature algorithm (LWBSA) model is developed in this work. The concept's resource constraints are alleviated by having a single centrally managed manager generate shared keys for outward-bound data transmission requests. The LWBSA paradigm provided herein produces an overlay network where extremely equipped resources can merge into a community BC, hence ensuring both dedicated privileges. Lightweight consensus, the elliptic curve digital signature algorithm (ECDSA), and distributed throughput management (DTM) are the three optimizations implemented in the ELIB model discussed here. Extensive simulation is carried out to examine the implications of different situations on processing time, energy usage, and overhead. The experimental outcomes show that the LWBSA achieves the best possible performance across a wide variety of measures.
APA, Harvard, Vancouver, ISO, and other styles
22

Lukova-Chuiko, N. V., O. A. Laptev, O. V. Barabash, A. P. Musienko, and V. M. Akhramovich. "THE METHOD OF CALCULATION OF PERSONAL DATA PROTECTION ON THE BASIS OF A SET OF SPECIFIC PARAMETERS OF SOCIAL NETWORKS." Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University, no. 76 (2022): 54–68. http://dx.doi.org/10.17721/2519-481x/2022/76-05.

Full text
Abstract:
In Ukraine, the right to protection of personal data is a constitutional guarantee, and the protection of personal data is one of the areas in which such a guarantee should be implemented. The subject of our research will not be objects in general, but dynamic systems of information protection in social networks in the mathematical sense of the term. The study developed a linear mathematical model and conducted a survey of the model of protection of personal data from a set of specific network parameters and the intensity of data transmission in social networks. Dependencies are considered: the amount of information flow in the social network from the components of information protection, personal data, and data flow rate; security of the system from the size of the system and from the amount of personal data; information security threats from a set of specific network parameters.A system of linear equations is obtained, which consists of the equation: rate of change of information flow from social network security and coefficients that reflect the impact of security measures, amount of personal data, leakage rate, changes in information protection from a set of specific network parameters, its size, personal data protection As a result of solving the system of differential equations, mathematical and graphical dependences of the indicator of personal data protection in the social network on various components are obtained. Considering three options for solving the equation near the steady-state of the system, we can conclude that, based on the conditions of the ratio of dissipation and natural frequency, the attenuation of the latter to a specific value is carried out periodically, with attenuation: amplitude, or exponentially fading law. A more visual analysis of the system behavior is performed, moving from the differential form of equations to the discrete one and modeling some interval of the system's existence. Mathematical and graphical dependences of the frequency of natural oscillations of the system, the period of oscillations, and the attenuation coefficient are presented. Simulation modeling for values with deviation from the stationary position of the system is performed. As a result of the simulation, it is proved that the social network protection system is nonlinear.
APA, Harvard, Vancouver, ISO, and other styles
23

Haseeb, Khalid, Ikram Ud Din, Ahmad Almogren, and Naveed Islam. "An Energy Efficient and Secure IoT-Based WSN Framework: An Application to Smart Agriculture." Sensors 20, no. 7 (April 7, 2020): 2081. http://dx.doi.org/10.3390/s20072081.

Full text
Abstract:
Wireless sensor networks (WSNs) have demonstrated research and developmental interests in numerous fields, like communication, agriculture, industry, smart health, monitoring, and surveillance. In the area of agriculture production, IoT-based WSN has been used to observe the yields condition and automate agriculture precision using various sensors. These sensors are deployed in the agricultural environment to improve production yields through intelligent farming decisions and obtain information regarding crops, plants, temperature measurement, humidity, and irrigation systems. However, sensors have limited resources concerning processing, energy, transmitting, and memory capabilities that can negatively impact agriculture production. Besides efficiency, the protection and security of these IoT-based agricultural sensors are also important from malicious adversaries. In this article, we proposed an IoT-based WSN framework as an application to smart agriculture comprising different design levels. Firstly, agricultural sensors capture relevant data and determine a set of cluster heads based on multi-criteria decision function. Additionally, the strength of the signals on the transmission links is measured while using signal to noise ratio (SNR) to achieve consistent and efficient data transmissions. Secondly, security is provided for data transmission from agricultural sensors towards base stations (BS) while using the recurrence of the linear congruential generator. The simulated results proved that the proposed framework significantly enhanced the communication performance as an average of 13.5% in the network throughput, 38.5% in the packets drop ratio, 13.5% in the network latency, 16% in the energy consumption, and 26% in the routing overheads for smart agriculture, as compared to other solutions.
APA, Harvard, Vancouver, ISO, and other styles
24

Carvajal-Gámez, Blanca Esther, and Manuel Alejandro Diaz-Casco. "Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications." Security and Communication Networks 2018 (July 26, 2018): 1–29. http://dx.doi.org/10.1155/2018/1404826.

Full text
Abstract:
In recent years, thanks to the use of Internet services, daily activities used to imply movement became more accessible to any user. As a result of such interconnection, now millions of people from different countries are able to communicate among themselves through the Internet, generating a great flow of data and classified information. The information on the Internet can be stolen, intercepted, anonymized, or even destroyed, resulting in cases of infringement of intellectual property rights, and the loss or damage of data. In such a globalized and interconnected world, solid security measures have become increasingly important to ensure data privacy protection and its confidentiality during transit. Nowadays, there is a variety of security mechanisms such as the steganography, an information hiding technique, which protects intellectual property by allowing the transmission of hidden data without drawing any suspicion. In order to achieve these criteria, an adaptation of the nonlocal maximum likelihood filter is proposed; in this class of filters, in general, they are used in images that require a high level of irregular pattern detection, based on the statistical dependence of the underlying pixels of the image analysis area, when using it in the wavelet domain as edge detector and/or discontinuities in images in order to have a greater selectivity when inserting information in the image. It strengthens the detection of the areas with the highest probability of having noise presenting results which are suitable areas to insert the information and that it is imperceptible in a quantitative and qualitative manner as presented in the Results and Discussion.
APA, Harvard, Vancouver, ISO, and other styles
25

Cherian, Mimi M., and Satishkumar L. Varma. "Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks." International Journal of Computer Network and Information Security 14, no. 1 (February 8, 2021): 52–68. http://dx.doi.org/10.5815/ijcnis.2022.01.05.

Full text
Abstract:
In recent years the domain of Internet of Things (IoT) has acquired great interest from the ICT community. Environmental observation and collecting information is one of the key reasons that IoT infrastructure facilitates the creation of many varieties of the latest business methods and applications. There are however still issues about security measures to be resolved to ensure adequate operation of devices. Distributed Denial of Service (DDoS) attacks are currently the most severe virtual threats that are causing serious damage to many IoT devices. With this in mind, numerous research projects were carried out to discover new methods and develop Novel techniques and solutions for DDOS attacks prevention. The use of new technology, such as software-defined networking (SDN) along with IoT devices has proven to be an innovative solution to mitigate DDoS attacks. In this article, we are using a novel data sharing system in IoT units that link IoT units with the SDN controller and encrypt information from IoT unit. We use conventional Redstone cryptographic algorithms to encrypt information from IoT devices in this framework. The Proposed Belief Based Secure Correlation methodology supports the prevention of DDOS attacks and other forms of data attacks. The system proposes new routes for transmission through the controller and communicates with approved switches for the safe transmission of data. To simulate our entire scenario, we proposed the algorithm Belief Based Secure Correlation (BBSC) implemented in SDN–IoT Testbed and verified IoT data is secure during transmission in the network.
APA, Harvard, Vancouver, ISO, and other styles
26

Singamaneni, Kranthi Kumar, Abhinav Juneja, Mohammed Abd-Elnaby, Kamal Gulati, Ketan Kotecha, and A. P. Senthil Kumar. "An Enhanced Dynamic Nonlinear Polynomial Integrity-Based QHCP-ABE Framework for Big Data Privacy and Security." Security and Communication Networks 2022 (August 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/4206000.

Full text
Abstract:
Topics such as computational sources and cloud-based transmission and security of big data have turned out to be a major new domain of exploration due to the exponential evolution of cloud-based data and grid facilities. Various categories of cloud services have been utilized more and more widely across a variety of fields like military, army systems, medical databases, and more, in order to manage data storage and resource calculations. Attribute-based encipherment (ABE) is one of the more efficient algorithms that leads to better consignment and safety of information located within such cloud-based storage amenities. Many outmoded ABE practices are useful for smaller datasets to produce fixed-size cryptograms with restricted computational properties, in which their characteristics are measured as evidence and stagnant standards used to generate the key, encipherment, and decipherment means alike. To surmount the existing problems with such limited methods, in this work, a dynamic nonlinear poly randomized quantum hash system is applied to enhance the safety of cloud-based information. In the proposed work, users’ attributes are guaranteed with the help of a dynamic nonlinear poly randomized equation to initialize the chaotic key, encipherment, and decipherment. In this standard, structured and unstructured big data from clinical datasets are utilized as inputs. Real-time simulated outcomes demonstrate that the stated standard has superior exactness, achieving over 90% accuracy with respect to bit change and over 95% accuracy with respect to dynamic key generation, encipherment time, and decipherment time compared to existing models from the field and literature. Experimental results are demonstrated that the proposed cloud security standard has a good efficiency in terms of key generation, encoding, and decoding process than the conventional methods in a cloud computing environment.
APA, Harvard, Vancouver, ISO, and other styles
27

Baig, Mirza Mansoor, Hamid Gholam Hosseini, and De Han Luo. "A Secure Wireless Telehealthcare Monitoring System and its Web Application." Applied Mechanics and Materials 541-542 (March 2014): 1309–12. http://dx.doi.org/10.4028/www.scientific.net/amm.541-542.1309.

Full text
Abstract:
Efforts to prepare for a growing number of elderly patients, reducing the escalation of healthcare costs, and avoiding hospitals emergency room overcrowding are some of the driving forces for adopting wireless healthcare monitoring systems. However, due to the open-to-air commination nature of multilayer wireless networks, it is important to consider reliability, accuracy, security and privacy of such data transmission. We have developed a low-cost and wireless telehealthcare system for monitoring of basic physiological parameters and automatically transmitting the measured data to an electronic patient record. It employs off the shelf wireless products and a secure web-based application which have been tested in a hospital with satisfactory outcomes.
APA, Harvard, Vancouver, ISO, and other styles
28

Xu, Wenfeng, and Yongxian Fan. "Intrusion Detection Systems Based on Logarithmic Autoencoder and XGBoost." Security and Communication Networks 2022 (April 11, 2022): 1–8. http://dx.doi.org/10.1155/2022/9068724.

Full text
Abstract:
An intrusion detection system (IDS) is a network security device that performs real-time monitoring of network transmissions and sends out alarms or takes active response measures when suspicious transmissions are found. In this regard, many researches have combined traditional machine learning models with other optimization algorithms to improve intrusion detection performance. However, although the existing intrusion detection model can effectively improve the performance of the model, there are still problems such as unsatisfactory detection accuracy and data preprocessing operations that may lead to a decrease in accuracy. To solve this problem, in this paper, we have proposed a novel intrusion detection system model based on logarithmic autoencoder (LogAE) and eXtreme Gradient Boosting (XGBoost). First, we build LogAE to learn the hidden features of the input data to reconstruct new data similar to the training samples, with the purpose of highlighting important features. It is worth mentioning that LogAE is not necessary to normalize the training data. This is because we add a logarithmic layer to learn this mapping. Then, XGBoost is used as a classifier to identify the data set that combines the original data set with the generated data set. In the experiment, our proposed model is evaluated on the UNSW-NB15 data set and CICIDS2017 data set. Additionally, we use accuracy, recall, precision, F1-score, and runtime as evaluation metrics. For detection performance, the detection accuracy of our proposed model is 95.11% for UNSW-NB15 and 99.92% for CICIDS2017, which is better than most state-of-the-art intrusion detection methods. Meantime, the runtime of our proposed model is the lowest for UNSW-NB15.
APA, Harvard, Vancouver, ISO, and other styles
29

Baig, Mirza Jabbar Aziz, Mohammad Tariq Iqbal, Mohsin Jamil, and Jahangir Khan. "Blockchain-Based Peer-to-Peer Energy Trading System Using Open-Source Angular Framework and Hypertext Transfer Protocol." Electronics 12, no. 2 (January 5, 2023): 287. http://dx.doi.org/10.3390/electronics12020287.

Full text
Abstract:
Renewable energy resources have been gaining ground in recent years and we are on the verge of a decentralized energy market with consumers becoming prosumers. Platforms that facilitate peer-to-peer (P2P) sale or purchase of energy are therefore essential. This paper presents a way to trade energy across P2P networks using blockchain technology. The main server is a Raspberry Pi 4 Model B (Pi4B), on which the user interface (UI) as well as the private Ethereum blockchain are configured. The blockchain also implements a smart contract. For the purpose of developing the UI that provides assistance in conducting trading activities, an open-source Angular framework is used. Also explored in the study is the development of an Internet of Things (IoT) server using the latest ESP32-S3 microcontroller. The field instrumentation devices (FIDs) are connected to the microcontroller for the purpose of data acquisition and for subsequent transmission to an IoT server. The blockchain network maintains a record of all transactions in an immutable manner. Assuring security is achieved through a local configuration of the system, hosted on a private network with restricted access. For the purposes of information security and data integrity, additional security measures are also considered, such as a secret recovery phrase, firewalls, login credentials and private key. Among the servers and clients, there is an implementation of a Hypertext Transfer Protocol. The P2P energy trading approach involving renewable energy designed for remote communities is explained and illustrated in this paper.
APA, Harvard, Vancouver, ISO, and other styles
30

Zhang, Jing, Qi Liu, Lu Chen, Ye Tian, and Jun Wang. "Nonintrusive Load Management Based on Distributed Edge and Secure Key Agreement." Wireless Communications and Mobile Computing 2021 (January 29, 2021): 1–13. http://dx.doi.org/10.1155/2021/6691348.

Full text
Abstract:
With the advancement of national policies and the rise of Internet of things (IoT) technology, smart meters, smart home appliances, and other energy monitoring systems continue to appear, but due to the fixed application scenarios, it is difficult to apply to different equipment monitoring. At the same time, the limited computing resources of sensing devices make it difficult to guarantee the security in the transmission process. In order to help users better understand the energy consumption of different devices in different scenarios, we designed a nonintrusive load management based on distributed edge and secure key agreement, which uses narrowband Internet of things (NB-IoT) for transmission and uses edge devices to forward node data to provide real-time power monitoring for users. At the same time, we measured the changes of server power under different behaviors to prepare for further analysis of the relationship between server operating state and energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
31

Wang, Xiangqing, Xiaokun Yang, Dongfei Wang, Bin Liu, Lan Zhang, Zufang Yang, Han Zhu, and Baohong Wu. "Demonstration of a Key Distribution Scheme Based on the Masking Effect of Fiber Channel Noise in Power Transmission System." Photonics 10, no. 1 (December 27, 2022): 26. http://dx.doi.org/10.3390/photonics10010026.

Full text
Abstract:
This paper proposes a novel key distribution method based on the masking effect of fiber channel noise in a power transmission system. The two physical layer signal processing technologies used in this solution are frame synchronization and resampling. The random data sent and received is digitally processed by these two techniques. An experimental platform is built, and the key performance is assessed by analyzing the measured bit error rate (BER) dynamic curve, setting different decision thresholds and the amplitude of the state basis. Experimental results show that the key distribution rate can reach 10 kbit/s with a key consistency rate of 98%. This is of great significance to the development of safe optical communication technology in power transmission systems. In the power communication system, a large number of optical fiber communication devices are used. The key distribution method proposed in this paper can effectively improve the security of optical fiber communication, which is of great significance.
APA, Harvard, Vancouver, ISO, and other styles
32

Jeong, SoonHyeong, Jun-Hong Shen, and Byeongtae Ahn. "A Study on Smart Healthcare Monitoring Using IoT Based on Blockchain." Wireless Communications and Mobile Computing 2021 (May 14, 2021): 1–9. http://dx.doi.org/10.1155/2021/9932091.

Full text
Abstract:
Background/Motivation. Recently, a lot of interest in health is increasing due to the technology of the 4th industrial revolution. In particular, personal medical information through intelligent self-diagnosis is emerging as very important. However, such personal medical information causes many problems in security and reliability. Problem/Issues. Personal medical information accidents may occur on the server, but most of all, they occur more often in information sharing and data transmission. Therefore, in this paper, blockchain technology is applied to improve the reliability of such personal information management. Research Objective/Methodology. For intelligent healthcare incorporating blockchain technology, this study utilized the blockchain-based Internet of Things. In addition, information was accumulated using a number of measurement sensors to analyze individual ECG information. The measured biosignals were monitored for personalized diagnosis by analyzing the fused threshold. Result. In this paper, we implemented a monitoring system using measurement sensors to analyze individual biometric information. The implemented system information has improved reliability and security by incorporating blockchain technology.
APA, Harvard, Vancouver, ISO, and other styles
33

Lubkin, Ivan, and Vyacheslav Zolotarev. "Comprehensive Defense System against Vulnerabilities Based on Return-Oriented Programming." Informatics and Automation 21, no. 2 (November 16, 2021): 275–310. http://dx.doi.org/10.15622/ia.21.2.3.

Full text
Abstract:
It is difficult or impossible to develop software without included errors. Errors can lead to an abnormal order of machine code execution during data transmission to a program. Program splitting into routines causes possible attacks by using return instructions from these routines. Most of existing security tools need to apply program source codes to protect against such attacks. The proposed defensive method is intended to a comprehensive solution to the problem. Firstly, it makes it difficult for an attacker to gain control over program execution, and secondly, the number of program routines, which can be used during the attack, decreases. Specific security code insertion is used at the beginning and end of the routines to make it complicated to gain control over the program execution. The return address is kept secure during a call of the protected routine, and the protected routine is restored after its execution if it was damaged by the attacker. To reduce the number of suitable routines for attacks, it was suggested to use synonymous substitutions of instructions that contain dangerous values. It should be mentioned that proposed defensive measures do not affect the original application`s algorithm. To confirm the effectiveness of the described defensive method, software implementation and its testing were accomplished. Acknowledging controls were conducted using synthetic tests, performance tests and real programs. Results of testing have demonstrated the reliability of the proposed measures. It ensures the elimination of program routines suitable for attacks and ensures the impossibility of using standard return instructions for conducting attacks. Performance tests have shown a 14 % drop in the operating speed, which approximately matches the level of the nearest analogues. The application of the proposed solution declines the number of possible attack scenarios, and its applicability level is higher in comparison with analogues.
APA, Harvard, Vancouver, ISO, and other styles
34

Lazaar, Saiida. "A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments." General Letters in Mathematics 10, no. 2 (June 2021): 38–45. http://dx.doi.org/10.31559/glm2021.10.2.4.

Full text
Abstract:
The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting confidentiality, integrity and authentication. The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming and efficiency, of the main hash functions standardized by NIST (National Institute of Standards and Technology). In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework.
APA, Harvard, Vancouver, ISO, and other styles
35

Dolha, Stelian, Paul Negirla, Florin Alexa, and Ioan Silea. "Considerations about the Signal Level Measurement in Wireless Sensor Networks for Node Position Estimation." Sensors 19, no. 19 (September 26, 2019): 4179. http://dx.doi.org/10.3390/s19194179.

Full text
Abstract:
Wireless Sensor Networks (WSN) are widely used in different monitoring systems. Given the distributed nature of WSN, a constantly increasing number of research studies are concentrated on some important aspects: maximizing network autonomy, node localization, and data access security. The node localization and distance estimation algorithms have, as their starting points, different information provided by the nodes. The level of signal strength is often such a starting point. A system for Received Signal Strength Indicator (RSSI) acquisition has been designed, implemented, and tested. In this paper, experiments in different operating environments have been conducted to show the variation of Received Signal Strength Indicator (RSSI) metric related to distance and geometrical orientation of the nodes and environment, both indoor and outdoor. Energy aware data transmission algorithms adjust the power consumed by the nodes according to the relative distance between the nodes. Experiments have been conducted to measure the current consumed by the node depending on the adjusted transmission power. In order to use the RSSI values as input for distance or location detection algorithms, the RSSI values can’t be used without intermediate processing steps to mitigate with the non-linearity of the measured values. The results of the measurements confirmed that the RSSI level varies with distance, geometrical orientation of the sensors, and environment characteristics.
APA, Harvard, Vancouver, ISO, and other styles
36

Putra, Shiva, H. S. Sheshadri, and V. Lokesha. "A Naïve Visual Cryptographic Algorithm for the Transfer of a Compressed Medical Images." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 3, no. 4 (December 14, 2015): 26. http://dx.doi.org/10.3991/ijes.v3i4.5190.

Full text
Abstract:
The transmission of a suitably compressed image over a bandwidth, over long distances, gives rise towards a new era in the field of information technology. A gradual increase in this appending scenic application, involving the transfer of the images securely over the Ethernet has become an increasingly important aspect to be addressed during thou phenomenon, especially in the transfer of the digital medical images vividly, encapsulated with abundant information related to these images. The compressed medical images of the DICOM format contain certain amount of confidential data, pertaining to a clinical research or to an individual, and the confidentiality of the same has to be preserved from various security threats and eves-dropping. With a widespread applications among various multimedia applicative systems, telemedicine, medical imaging, military and certain safety-critical applications, inter-net and intra-net communicative applications, etc, a reliable transfer of suitable information, efficiently & securely is considered as one of the revolutionary aims in today’s communication technology and visual cryptographic methodologies. Real-time applications as such detailed above majorly is concerned with the security measures and many algorithms have been developed as a proof for various visual cryptographic methodologies. In this paper we propose an efficient and a reliable visual cryptographic methodology which focuses on the encryption and decryption of the two-dimensional DICOM standard compressed medical image, effectively. This paper discusses an efficient design of 192 bit encoder using AES Rijndael Algorithm with the decomposition of an image into square image size blocks and the image blocks are shuffled using 2D CAT map. The shuffling of the image blocks/pixels employs a Logistic map of these image pixels coupled with 2D mapping of the pixels of the DICOM standard medical image, generated randomly, being the control parameter thereby creating a confusion between the cipher and the plain image, gradually increasing the resistive factor against the significant attacks. This paper proposes various analytical metrics such as correlation analysis, entropy analysis, homogeneity analysis, energy analysis, contrast and mean of absolute deviation analysis, to evaluate the proposed algorithm, and their suitability in image encryption applications.
APA, Harvard, Vancouver, ISO, and other styles
37

Kariuki, Paul, Lizzy O Ofusori, Prabhakar Rontala Subramanniam, Moses Okpeku, and Maria L Goyayi. "Challenges in Contact Tracing by Mining Mobile Phone Location Data for COVID-19: Implications for Public Governance in South Africa." Interdisciplinary Journal of Information, Knowledge, and Management 16 (2021): 101–24. http://dx.doi.org/10.28945/4736.

Full text
Abstract:
Aim/Purpose: The paper’s objective is to examine the challenges of using the mobile phone to mine location data for effective contact tracing of symptomatic, pre-symptomatic, and asymptomatic individuals and the implications of this technology for public health governance. Background: The COVID-19 crisis has created an unprecedented need for contact tracing across South Africa, requiring thousands of people to be traced and their details captured in government health databases as part of public health efforts aimed at breaking the chains of transmission. Contact tracing for COVID-19 requires the identification of persons who may have been exposed to the virus and following them up daily for 14 days from the last point of exposure. Mining mobile phone location data can play a critical role in locating people from the time they were identified as contacts to the time they access medical assistance. In this case, it aids data flow to various databases designated for COVID-19 work. Methodology: The researchers conducted a review of the available literature on this subject drawing from academic articles published in peer-reviewed journals, research reports, and other relevant national and international government documents reporting on public health and COVID-19. Document analysis was used as the primary research method, drawing on the case studies. Contribution: Contact tracing remains a critical strategy in curbing the deadly COVID-19 pandemic in South Africa and elsewhere in the world. However, given increasing concern regarding its invasive nature and possible infringement of individual liberties, it is imperative to interrogate the challenges related to its implementation to ensure a balance with public governance. The research findings can thus be used to inform policies and practices associated with contact tracing in South Africa. Findings: The study found that contact tracing using mobile phone location data mining can be used to enforce quarantine measures such as lockdowns aimed at mitigating a public health emergency such as COVID-19. However, the use of technology can expose the public to criminal activities by exposing their locations. From a public governance point of view, any exposure of the public to social ills is highly undesirable. Recommendations for Practitioners: In using contact tracing apps to provide pertinent data location caution needs to be exercised to ensure that sensitive private information is not made public to the extent that it compromises citizens’ safety and security. The study recommends the development and implementation of data use protocols to support the use of this technology, in order to mitigate against infringement of individual privacy and other civil liberties. Recommendation for Researchers: Researchers should explore ways of improving digital applications in order to improve the acceptability of the use of contact tracing technology to manage pandemics such as COVID-19, paying attention to ethical considerations. Impact on Society: Since contact tracing has implications for privacy and confidentiality it must be conducted with caution. This research highlights the challenges that the authorities must address to ensure that the right to privacy and confidentiality is upheld. Future Research: Future research could focus on collecting primary data to provide insight on contact tracing through mining mobile phone location data. Research could also be conducted on how app-based technology can enhance the effectiveness of contact tracing in order to optimize testing and tracing coverage. This has the potential to minimize transmission whilst also minimizing tracing delays. Moreover, it is important to develop contact tracing apps that are universally inter-operable and privacy-preserving.
APA, Harvard, Vancouver, ISO, and other styles
38

YURCHUK, Natalia. "MANAGEMENT OF INFORMATION RISKS OF THE ENTERPRISE IN THE CONDITIONS OF DIGITALIZATION." "EСONOMY. FINANСES. MANAGEMENT: Topical issues of science and practical activity", no. 1 (50) (April 28, 2020): 86–101. http://dx.doi.org/10.37128/2411-4413-2020-1-6.

Full text
Abstract:
The features of modern information risk management are considered and analyzed in the article. The influence of digitalization of enterprises on information security is analyzed. Approaches to the interpretation of the definition of "information risk" are analyzed. It is indicated that information risks arise primarily from the creation, transmission, storage, processing, use of information in practical activities using digital media and other information and communication means. The purpose of risk management of information risks of the enterprise is to minimize the costs of counteracting information risks and the overall losses from them. Information risks include risks of internal and external fraud, unauthorized use of company resources, breach of confidentiality, integrity and reliability of information, etc. The proposed information risk management system provides for the implementation of such procedures as identification of information risks, analysis of information risks, selection and implementation of the method of reducing information risks, control of information risks. It has been found that it is advisable to use models based on international standards when modeling information threats. Popular practices used in practice are based on standards such as ISO / IEC 27005: 2011, NIST SP800-30, EBIOS, OCTAVE. It is determined that quantitative calculation of risk situations is used first of all when it is necessary to choose the optimal variant of solving a risk situation. Enterprise information risk management techniques include organizational and technological measures. It is established that the methods of information risk management of the enterprise include organizational and technological measures. Organizational methods of risk reduction include: risk aversion, loss prevention, loss minimization, transfer of risk control, risk sharing method, information seeking, control or risk management. Technology measures include the accumulation of risk information, their assessment and analysis, ranking and informing management about the implementation of risks and the likelihood of their occurrence, the use of modern data protection systems (obstruction, access control, masking, regulation, etc.). It is established that the choice of information risk management methodology in each individual case depends on the specific activity of the enterprise.
APA, Harvard, Vancouver, ISO, and other styles
39

Lionis, Antonios, Konstantinos Peppas, Hector E. Nistazakis, Andreas D. Tsigopoulos, and Keith Cohn. "Experimental Performance Analysis of an Optical Communication Channel over Maritime Environment." Electronics 9, no. 7 (July 9, 2020): 1109. http://dx.doi.org/10.3390/electronics9071109.

Full text
Abstract:
Free space optical communications (FSO), which make use of the visible and infrared spectrum for data transmission, offer significant advantages such as a very high data rate, security and immunity, low cost of installation and ease of use without any license restrictions. However, a significant challenge for FSO systems is their inherent constraints due to environmental conditions and especially atmospheric turbulence. This paper focuses on the experimental performance analysis of a real FSO system in a maritime environment. We propose a new model which allows an FSO link performance estimation over sea and depends upon point measurements of environmental parameters. The Received Signal Strength Indicator (RSSI) has been measured and a second-order polynomial has been constructed using regression modeling to quantify its relation with macroscopic environmental parameters collected by a weather station. This model has then been validated against real meteorological data over different period of times and exhibited a reasonably strong correlation. Atmospheric turbulence has been determined using bulk estimates of the structure index parameter extracted from the same meteorological data, and thus allowed for a statistical correlation between turbulence and RSSI. In the second part of the paper, the probability distribution of the RSSI data has been investigated and the Kullback-Leibler (KL) divergence has been used to investigate the difference between probability distributions over the same variable. As an illustrative example of the process, the Weibull, Lognormal and Gamma distributions have been evaluated against the RSSI data probability distribution and the latter has proved to exhibit the best fit.
APA, Harvard, Vancouver, ISO, and other styles
40

Lara, Brenda, Janey Kottler, Abigail Olsen, Andrew Best, Jessica Conkright, and Karen Larimer. "Home Monitoring Programs for Patients Testing Positive for SARS-CoV-2: An Integrative Literature Review." Applied Clinical Informatics 13, no. 01 (January 2022): 203–17. http://dx.doi.org/10.1055/s-0042-1742370.

Full text
Abstract:
Abstract Background The severe acute respiratory syndrome-coronavirus-2 (SARS-CoV-2) pandemic threatened to oversaturate hospitals worldwide, necessitating rapid patient discharge to preserve capacity for the most severe cases. This need, as well as the high risk of SARS-CoV-2 transmission, led many hospitals to implement remote patient monitoring (RPM) programs for SARS-CoV-2 positive patients in an effort to provide care that was safe and preserve scarce resources. Objective The aim of this study is to provide an integrative review of peer-reviewed literature on different RPM programs that were implemented for SARS-CoV-2 positive patients including their strengths and challenges. Methods A search was conducted for peer reviewed literature using PubMed, CINAHL, OVID, and Google Scholar. Peer-reviewed studies written in English or Spanish and published between 2019 and 2021 on RPM of SARS-CoV-2-positive patients were considered. Information was extracted according to a qualitative content analysis method, informed by the Comparison of Mobile Patient Monitoring Systems Framework. Results Of 57 retrieved articles, 10 publications were included. The sample sizes ranged from 75 to 48,290 and the monitoring length ranged from 7 to 30 days. Information regarding the comparison framework was summarized. Main strengths of using RPM for SARS-CoV-2 positive patients was participant acceptance, feasibility, safety, and resource conservation. Main limitations were the lack of information on patient data security measures, robust outcomes testing, and identification of the most effective biomarkers to track SARS-CoV-2 decompensation. Conclusion Different RPM programs for SARS-CoV-2 were implemented, from sending home participants with a pulse oximeter and collecting readings via call to modifying existing mobile applications and sending holistic health questionnaires to participants. This review determined that RPM is beneficial to SARS-CoV-2 positive patients; however, its effectiveness can be improved by further research. Mainly, identifying what patient data are most effective at tracking SARS-CoV-2 decompensation by utilizing advanced technology already in the market.
APA, Harvard, Vancouver, ISO, and other styles
41

Sirisha, Uddagiri, and Bolem Sai Chandana. "Privacy Preserving Image Encryption with Optimal Deep Transfer Learning Based Accident Severity Classification Model." Sensors 23, no. 1 (January 3, 2023): 519. http://dx.doi.org/10.3390/s23010519.

Full text
Abstract:
Effective accident management acts as a vital part of emergency and traffic control systems. In such systems, accident data can be collected from different sources (unmanned aerial vehicles, surveillance cameras, on-site people, etc.) and images are considered a major source. Accident site photos and measurements are the most important evidence. Attackers will steal data and breach personal privacy, causing untold costs. The massive number of images commonly employed poses a significant challenge to privacy preservation, and image encryption can be used to accomplish cloud storage and secure image transmission. Automated severity estimation using deep-learning (DL) models becomes essential for effective accident management. Therefore, this article presents a novel Privacy Preserving Image Encryption with Optimal Deep-Learning-based Accident Severity Classification (PPIE-ODLASC) method. The primary objective of the PPIE-ODLASC algorithm is to securely transmit the accident images and classify accident severity into different levels. In the presented PPIE-ODLASC technique, two major processes are involved, namely encryption and severity classification (i.e., high, medium, low, and normal). For accident image encryption, the multi-key homomorphic encryption (MKHE) technique with lion swarm optimization (LSO)-based optimal key generation procedure is involved. In addition, the PPIE-ODLASC approach involves YOLO-v5 object detector to identify the region of interest (ROI) in the accident images. Moreover, the accident severity classification module encompasses Xception feature extractor, bidirectional gated recurrent unit (BiGRU) classification, and Bayesian optimization (BO)-based hyperparameter tuning. The experimental validation of the proposed PPIE-ODLASC algorithm is tested utilizing accident images and the outcomes are examined in terms of many measures. The comparative examination revealed that the PPIE-ODLASC technique showed an enhanced performance of 57.68 dB over other existing models.
APA, Harvard, Vancouver, ISO, and other styles
42

Bae, Dongryeoul, Kwang-Young Song, Donah Mary Macoy, Min Gab Kim, Chul-Kyu Lee, and Yu-Seong Kim. "Inactivation of Airborne Avian Pathogenic E. coli (APEC) via Application of a Novel High-Pressure Spraying System." Microorganisms 10, no. 11 (November 7, 2022): 2201. http://dx.doi.org/10.3390/microorganisms10112201.

Full text
Abstract:
Infectious diseases of livestock caused by novel pathogenic viruses and bacteria are a major threat to global animal health and welfare and their effective control is crucial for agronomic health and for securing global food supply. It has been widely recognized that the transmission of infectious agents can occur between people and/or animals in indoor spaces. Therefore, infection control practices are critical to reduce the transmission of the airborne pathogens. ViKiller®-high-pressure sprayer and Deger®-disinfectant are newly developed spraying systems that can produce an optimal size of disinfectants to reduce airborne microbes. The system was evaluated to reduce the infection caused by avian pathogenic Escherichia coli (APEC), an airborne bacterium which survives in indoor spaces. pH-neutral electrolyzed water (NEW) containing 100 ppm of free chlorine, laboratory-scale chambers, a recently developed sprayer, and a conventional sprayer were used in the study. A total of 123 day-of-hatch male layer chicks (Hy-Line W-36) were randomly classified into five groups (negative control (NC): no treatment; treatment 1 (Trt 1): spraying only NEW without APEC; treatment 2 (Trt 2): spraying NEW + APEC using a high-pressure sprayer; treatment 3 (Trt 3): spraying NEW + APEC using a conventional sprayer; positive control (PC): spraying only APEC). Experimental chicks in the chambers were daily exposed to 50 mL of NEW and/or APEC (1.0 × 106 cfu/mL) until the end of the experiment (day 35). APEC strains were sprayed by ViKiller®. At least four chicks in each group were evaluated weekly to monitor APEC infection and determine the lesion. Data showed that our spraying system significantly reduced airborne APEC concentrations, mortality rate, respiratory infection, and APEC lesions in birds in the chamber space (p < 0.05). The results demonstrate that the antibacterial effect of the novel spraying sprayer with NEW on APEC was far superior compared to the conventional sprayer. This study provides a new insight for preventive measures against airborne microorganisms in indoor spaces.
APA, Harvard, Vancouver, ISO, and other styles
43

Rajesh Kumar Dhanaraj, Rajesh Kumar Dhanaraj, Seifedine Kadry Rajesh Kumar Dhanaraj, Byeong-Gwon Kang Seifedine Kadry, and Yunyoung Nam Byeong-Gwon Kang. "Probit Cryptographic Blockchain for Secure Data Transmission in Intelligent Transportation Systems." 網際網路技術學刊 23, no. 6 (November 2022): 1303–13. http://dx.doi.org/10.53106/160792642022112306013.

Full text
Abstract:
<p>To address the current security challenges, Digital Twin (DT) models and strategies are to be applied to improve security, privacy, and safety in intelligent transportation systems. However, the existing algorithm was failed to address the security and privacy issues for data between the vehicles. To enhance the security of data transmission, a novel Probit Regressive Davis Mayer Kupyna Cryptographic Hash Blockchain (PRDMKCHB) technique is proposed. Initially, the source vehicle finds the nearest vehicle to transmit the data based on the trust value using the probit regression function. After finding the neighboring nodes, the Blockchain is constructed to improve the security of data transmission from the source to the destination. The Blockchain uses the Kupyna Cryptography to generate the hash value for each data. Davis Mayer compression function is to improve the security of data delivery and to minimize packet loss. The comprehensive simulation is carried out to validate the performance of the proposed PRDMKCHB technique and existing Blockchain technology in terms of packet delivery ratio, packet loss rate, and execution time. Simulation results show the performance improvement of the proposed PRDMKCHB technique compared to the previous Blockchain technology in terms of higher packet delivery ratio, minimum packet loss, and execution time with respect to the number of data packets.</p> <p>&nbsp;</p>
APA, Harvard, Vancouver, ISO, and other styles
44

Gyimah, Seth Adjei. "Security During Transmission Of Data Using Web Steganography." Advances in Multidisciplinary and scientific Research Journal Publication 34 (December 30, 2022): 37–42. http://dx.doi.org/10.22624/aims/accrabespoke2022/v34p3.

Full text
Abstract:
The enormous improvements in communications and related technologies, such as the Internet of Things (IoT) and its web-based and mobile applications, have changed our way of life. We are also noticing a trend in which internet-connected electronic devices are using technology more frequently and providing customers with services of a higher standard. However, there are several complications and issues that arise when sending and receiving information via the internet. The security, privacy, and preservation of sent information are the most critical of them all. The security of information has grown to be a significant problem with the expansion of data transfer across computer networks. There are numerous ways to safeguard data and prevent unwanted users from accessing it. Steganography and cryptography are two different data hiding and protection techniques. Steganography conceals communications within some other digital media. On the other side, cryptography obscures the message's content and makes it challenging for readers to decipher. To safeguard data, steganography can be combined with cryptographic methods. Combining steganography and cryptography for hidden data transmission is the best suggested method for protecting data transferred over the internet. A data carrier that is an image can be used for the transmission. With regard to capacity, security, and robustness for secure data transmission over an open channel, this combinational methodology will be sufficient. The purpose of this paper is to explain the steganographic security measures used to protect data while it is being transmitted across a network. Key words: Security, Transmission, Data, Web Steganography
APA, Harvard, Vancouver, ISO, and other styles
45

Piedrahita Castillo, Diego, Francisco Machío Regidor, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "A New Mail System for Secure Data Transmission in Cyber Physical Systems." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 28, Supp02 (December 2020): 23–48. http://dx.doi.org/10.1142/s0218488520400127.

Full text
Abstract:
This paper provides a complete study on email requirements, with special emphasis on its security aspects and architecture. It explores how current protocols have evolved, the environment in which they have been developed and the evolution of security requirements. This paper also analyzes email vulnerabilities and the reasons that have motivated the exploitation of them. The threats and solutions of the most used email protocols today are detailed, such as Simple Mail Transfer Protocol, Post office Protocol, Internet Message Access Protocol protocols, among others. An analysis of the main security solutions proposed in recent years is carried out and how these threats are solved, as well as a comparison of each of them. The result of this work leads us to conclude that it is necessary to make an integral change in the protocols used in the electronic mail in order to have a secure message exchange system that meets all the security requirements demanded today. We are working on a proposal based on blockchain that solves the security problems identified in this work.
APA, Harvard, Vancouver, ISO, and other styles
46

Dang, Chinh Manh, Vinh Quang Thai, Minh Ngoc Pham, Trung Thanh Dang, Mai Thanh Thi Phung, and Tan Duy Ngo. "The solution of data transmission security for Gateway IoT." Journal of Mining and Earth Sciences 61, no. 2 (April 29, 2020): 58–67. http://dx.doi.org/10.46326/jmes.2020.61(2).07.

Full text
Abstract:
We are living in the trend of the Internet of Things (IoT), electronic devices that are capable of connecting and exchanging information with each other via the Internet. For automation, monitoring and control systems, there is a need to upgrade existing systems so that users can remotely monitor via the Internet. The solution is to integrate the Gateway device to transmit and receive data. However, in the Internet environment, the issue of information security and safety always needs attention because of the risk of network attacks and data theft. In this paper, the authors present data security solutions for Gateway IoT devices to ensure information security against eavesdropping or sniffers. The device has been integrated into a landslide monitoring system, which has proven to work, increasing the reliability of the system.
APA, Harvard, Vancouver, ISO, and other styles
47

Zenevich, A. O., E. V. Novikov, T. A. Matkovskaia, and A. A. Lagutik. "Method for Ensuring Information Security of Object Fiber-Optical Data Transmission System." Doklady BGUIR 20, no. 2 (April 5, 2022): 86–93. http://dx.doi.org/10.35596/1729-7648-2022-20-2-86-93.

Full text
Abstract:
Currently, ensuring information security of object fiber-optic data transmission systems is an important and urgent task. Therefore, the purpose of this article is to develop an easy-to-implement method for protecting object fiber-optic data transmission systems from unauthorized access to information. This work proposes an easyto-implement method for protecting object fiber-optic data transmission systems from unauthorized access to an information signal, based on weakening the power of this signal. It is shown that the use of the proposed method will not lead to a significant decrease in the data transmission rate in the object fiber-optic data transmission systems, but will increase its information security. The theoretical limit of signal decoding for data transmission technologies over optical fiber Ethernet has been determined. It was found that the lowest value of the theoretical limit of signal decoding corresponds to Fast Ethernet technology (100Base-FX). It was found that when the value of the attenuation coefficient of optical radiation D > 20 dB, the data transmission using Fast Ethernet technology (100Base-FX) is terminated. The results of this article can find application in the means of technical protection of information transmitted over object fiber-optic data transmission systems.
APA, Harvard, Vancouver, ISO, and other styles
48

Xu, Xian Cheng. "Design Considerations for Reliable Data Transmission and Network Separation." Applied Mechanics and Materials 738-739 (March 2015): 1146–49. http://dx.doi.org/10.4028/www.scientific.net/amm.738-739.1146.

Full text
Abstract:
To tackle such problems as low security, inefficiency and high cost in traditional data transmission between different security domains, this paper discussed the basic design decisions that form the first step one should consider, especially for creating a design with the advantage of high-efficiency and low-cost optical devices. It first explored the design issues of software and hardware systems with the application of various network separation systems. It then described the reliability features with regard to error detection and data integration, and the mechanism of the newly defined protocol structure. At last, it outlined the key design points for the system implement and measurement.
APA, Harvard, Vancouver, ISO, and other styles
49

Chountasis, Spiros. "Communication Challenges for Electric Power Transmission Systems." International Journal of Engineering and Technologies 21 (October 25, 2021): 1–15. http://dx.doi.org/10.18052/www.scipress.com/ijet.21.1.

Full text
Abstract:
Uninterrupted electric power supply and transmission is a part of critical infrastructure for any nation’s security, economy and healthcare systems. Essential requirements for operating and managing an industrial control system is the secure and instant data transfer between control centers and generation stations or substations. This paper review the general Energy Management System architecture implemented for the Hellenic Power Transmission System. It gives a possible direction to best suited SCADA system network communication by emphasizing on the security. A brief study of the communication protocols is also presented. This work focuses on the key role of telecommunication provision for critical distributed control infrastructures. Based on the relative analysis presented in this paper directions towards a secure critical infrastructures network communications are provided. Subject Classification Numbers: 68M01, 68M10, 94A05.
APA, Harvard, Vancouver, ISO, and other styles
50

Chountasis, Spiros. "Communication Challenges for Electric Power Transmission Systems." International Journal of Engineering and Technologies 21 (October 25, 2021): 1–15. http://dx.doi.org/10.56431/p-5ayzg2.

Full text
Abstract:
Uninterrupted electric power supply and transmission is a part of critical infrastructure for any nation’s security, economy and healthcare systems. Essential requirements for operating and managing an industrial control system is the secure and instant data transfer between control centers and generation stations or substations. This paper review the general Energy Management System architecture implemented for the Hellenic Power Transmission System. It gives a possible direction to best suited SCADA system network communication by emphasizing on the security. A brief study of the communication protocols is also presented. This work focuses on the key role of telecommunication provision for critical distributed control infrastructures. Based on the relative analysis presented in this paper directions towards a secure critical infrastructures network communications are provided. Subject Classification Numbers: 68M01, 68M10, 94A05.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography