首页 > 最新文献

International Journal of Reliable Information and Assurance最新文献

英文 中文
Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review 移动自组织网络中的协议、安全问题和挑战:广泛回顾
Pub Date : 2020-06-30 DOI: 10.21742/ijria.2020.8.1.04
N. Thirupathi Rao, D. Bhattacharyya
In this article, an overview of secure specially appointed steering conventions for remote systems was presented. Impromptu system is a gathering of hubs that is associated through a remote medium framing quickly evolving topologies. Assaults on specially appointed system steering conventions disturb organize execution and unwavering quality with their arrangement. We quickly exhibit the most well-known conventions that take after the table-driven and the source-started on-request approaches. The association flanked by the proposed arrangements and parameters of specially appointed system demonstrates the execution as indicated by secure conventions. We talk about in this paper directing convention and challenges and furthermore examine verification in specially appointed system. 1
在本文中,概述了远程系统的安全的特别指定的转向约定。即兴系统是一个集线器的集合,这些集线器是通过一个远程介质框架快速发展的拓扑结构相关联的。对专门指定的制度指导惯例的攻击,影响了其安排的组织执行和质量的稳定。我们很快展示了继表驱动和按请求启动源方法之后的最著名的约定。由特别指定的系统的拟议安排和参数组成的关联显示了安全约定所指示的执行。本文讨论了定向惯例和面临的挑战,并进一步对定向制度进行了验证。1
{"title":"Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.21742/ijria.2020.8.1.04","DOIUrl":"https://doi.org/10.21742/ijria.2020.8.1.04","url":null,"abstract":"In this article, an overview of secure specially appointed steering conventions for remote systems was presented. Impromptu system is a gathering of hubs that is associated through a remote medium framing quickly evolving topologies. Assaults on specially appointed system steering conventions disturb organize execution and unwavering quality with their arrangement. We quickly exhibit the most well-known conventions that take after the table-driven and the source-started on-request approaches. The association flanked by the proposed arrangements and parameters of specially appointed system demonstrates the execution as indicated by secure conventions. We talk about in this paper directing convention and challenges and furthermore examine verification in specially appointed system. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Performance Model of Controller Area Networks for Vehicles under Unsaturated Traffic 不饱和交通条件下车辆控制器区域网络的性能模型
Pub Date : 2020-06-30 DOI: 10.21742/ijria.2020.8.1.01
Jin-Yeong Um
This paper proposes a performance model of Controller Area Networks (CAN) to measure the effect of bit-error, especially on an identifier field of CAN messages over erroneous channels. CAN were introduced to allow various devices embedded inside cars to communicate in real-time over a shared channel. For resolving collisions in a real-time way, CAN adopt a contention-free protocol, namely a bit-map algorithm where messages are bitwise arbitrated based on their priority, precisely the identifier in CAN’s messages when multiple nodes contend for the shared channel. Contamination on the identifier, therefore, can severely degrade the performance of CAN since all senders recognizing errors immediately terminate their transmission and wait for a certain amount of time to resume competition. Furthermore, when the number of errors experienced exceeds the predetermined threshold, CAN stays at the bus-off mode where no messages are sent, requiring outside intervention to be back to the normal operational mode. To predict the performance deterioration of CAN over noisy channels, this paper builds a Markov chain model of CAN.
本文提出了一个控制器局域网(CAN)的性能模型来测量误码的影响,特别是误码对错误信道上CAN报文标识字段的影响。引入CAN是为了允许嵌入在汽车内部的各种设备通过共享通道进行实时通信。为了实时解决冲突,CAN采用无争用协议,即位图算法,消息根据其优先级进行位仲裁,即多个节点争夺共享通道时CAN消息中的标识符。因此,标识符上的污染会严重降低can的性能,因为所有识别错误的发送方都会立即终止其传输,并等待一定的时间来恢复竞争。此外,当经历的错误数量超过预定的阈值时,CAN保持在不发送消息的总线关闭模式,需要外部干预才能回到正常的操作模式。为了预测CAN在噪声信道下的性能下降,本文建立了CAN的马尔可夫链模型。
{"title":"A Performance Model of Controller Area Networks for Vehicles under Unsaturated Traffic","authors":"Jin-Yeong Um","doi":"10.21742/ijria.2020.8.1.01","DOIUrl":"https://doi.org/10.21742/ijria.2020.8.1.01","url":null,"abstract":"This paper proposes a performance model of Controller Area Networks (CAN) to measure the effect of bit-error, especially on an identifier field of CAN messages over erroneous channels. CAN were introduced to allow various devices embedded inside cars to communicate in real-time over a shared channel. For resolving collisions in a real-time way, CAN adopt a contention-free protocol, namely a bit-map algorithm where messages are bitwise arbitrated based on their priority, precisely the identifier in CAN’s messages when multiple nodes contend for the shared channel. Contamination on the identifier, therefore, can severely degrade the performance of CAN since all senders recognizing errors immediately terminate their transmission and wait for a certain amount of time to resume competition. Furthermore, when the number of errors experienced exceeds the predetermined threshold, CAN stays at the bus-off mode where no messages are sent, requiring outside intervention to be back to the normal operational mode. To predict the performance deterioration of CAN over noisy channels, this paper builds a Markov chain model of CAN.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127835811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Methodology for Assessing Security Vulnerability of Cloud Services 一种云服务安全漏洞评估方法
Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.01
K. Seo
Cloud services continue to change the business paradigm to use computing resources such as infrastructure, platform and application using the network access. They have created new security threats and challenges. When large amounts of data are saved in the cloud, the cloud is naturally exposed to attack. In cloud services, analysis and evaluation of security vulnerability should be made with protection plans that provide the objective data and information necessary to establish measures for information protection for each business of firms and take into account the impact on their respective responsibilities. This paper presents a framework to evaluate security vulnerability that reflects the business impacts. Through this framework, it is possible to evaluate vulnerability items of cloud services. Eventually, the proposed methodology will help establish security policies for both cloud service providers and users. 1
云服务不断改变商业模式,利用基础设施、平台和应用程序等计算资源进行网络访问。它们带来了新的安全威胁和挑战。当大量数据保存在云中时,云自然会受到攻击。在云服务中,需要对安全漏洞进行分析和评估,制定保护计划,为企业的各项业务制定信息保护措施提供必要的客观数据和信息,并考虑对各自责任的影响。本文提出了一个反映业务影响的安全漏洞评估框架。通过该框架,可以对云服务的漏洞项进行评估。最终,建议的方法将有助于为云服务提供商和用户建立安全策略。1
{"title":"A Methodology for Assessing Security Vulnerability of Cloud Services","authors":"K. Seo","doi":"10.21742/IJRIA.2019.7.2.01","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.01","url":null,"abstract":"Cloud services continue to change the business paradigm to use computing resources such as infrastructure, platform and application using the network access. They have created new security threats and challenges. When large amounts of data are saved in the cloud, the cloud is naturally exposed to attack. In cloud services, analysis and evaluation of security vulnerability should be made with protection plans that provide the objective data and information necessary to establish measures for information protection for each business of firms and take into account the impact on their respective responsibilities. This paper presents a framework to evaluate security vulnerability that reflects the business impacts. Through this framework, it is possible to evaluate vulnerability items of cloud services. Eventually, the proposed methodology will help establish security policies for both cloud service providers and users. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Detailed Review on Focus Areas of Cyber Security 网络安全重点领域综述
Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.05
N. Rao
Security is one of the most important factor or point to be considered for everyone in their life. Providing security and breaking the security are two important points to be noted for everyone who can be using the gadgets in these days. The other important factor or the point to be considered was the cyber security. The attacks or the collection go data unethically without the knowledge of the user’s being stolen. The cases or the issues being under this trap are being increased from time to time and day to day in those days. The data to be stolen will be used for various reasons. Some may be using for money collection and some are using it for anti-social elements and unethical issues. Hence, in the current article an attempt has been made to provide a detailed idea of the types of attacks and types of issues and types of malwares that can be attacked and also some suggestions were provided. The important issues to be focused in the case of cyber security issues are given a thought and the details are given a light on it. The readers of this article can get the basic knowledge about the cyber security issues and threats and the steps to be followed such that to escape from these sorts of attacks. Also a focus was given on various aspects such that to escape from these types of security attacks.
安全是每个人在生活中要考虑的最重要的因素或点之一。提供安全和破坏安全是每个人都要注意的两个要点,谁可以使用这些小工具在这些天。另一个需要考虑的重要因素是网络安全。攻击或收集数据是不道德的,而不知道用户被窃取了。在那些日子里,这个陷阱下的案件或问题每天都在不断增加。被窃取的数据将被用于各种原因。有些人可能会用它来收钱,有些人会用它来做反社会因素和不道德的事情。因此,在当前的文章中,我们试图提供攻击类型、问题类型和可攻击的恶意软件类型的详细概念,并提供一些建议。对网络安全问题中需要关注的重要问题进行了思考,并对其细节进行了阐述。本文的读者可以获得有关网络安全问题和威胁的基本知识,以及应遵循的步骤,以便逃避这些类型的攻击。此外,还重点讨论了如何避免这些类型的安全攻击的各个方面。
{"title":"A Detailed Review on Focus Areas of Cyber Security","authors":"N. Rao","doi":"10.21742/IJRIA.2019.7.2.05","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.05","url":null,"abstract":"Security is one of the most important factor or point to be considered for everyone in their life. Providing security and breaking the security are two important points to be noted for everyone who can be using the gadgets in these days. The other important factor or the point to be considered was the cyber security. The attacks or the collection go data unethically without the knowledge of the user’s being stolen. The cases or the issues being under this trap are being increased from time to time and day to day in those days. The data to be stolen will be used for various reasons. Some may be using for money collection and some are using it for anti-social elements and unethical issues. Hence, in the current article an attempt has been made to provide a detailed idea of the types of attacks and types of issues and types of malwares that can be attacked and also some suggestions were provided. The important issues to be focused in the case of cyber security issues are given a thought and the details are given a light on it. The readers of this article can get the basic knowledge about the cyber security issues and threats and the steps to be followed such that to escape from these sorts of attacks. Also a focus was given on various aspects such that to escape from these types of security attacks.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Essential Strategies for Avoiding Cloud Data Leaks 避免云数据泄露的基本策略调查
Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.03
Ch. Sudhakar
As of late, there has been a tremendous development from putting away information the customary route, as the cloud has developed and turned into the better answer and alternative for organizations and associations alike. Notwithstanding, this has additionally prompted a development in digital culprits and information breaks now that somebody can get to touchy archives from their lounge room love seat. In that capacity, cloud information spills have turned into a very regular issue for organizations. More news has examined approaches to counteract breaks, and you can discover a plenty of articles that discuss about huge and little organizations alike being assaulted. Therefore, knowing how to keep a cloud information spill is the initial phase in protecting your business and data. In this paper there are a couple of the best and most straightforward methodologies to maintain a strategic distance from cloud information spills.
最近,随着云计算的发展,它已经成为组织和协会的更好的解决方案和替代方案,从传统的方式存储信息已经有了巨大的发展。尽管如此,这也促使了数字罪犯和信息泄露的发展,现在有人可以在休息室的双人座椅上获取敏感档案。在这种情况下,云信息泄漏已经成为组织的一个非常常见的问题。更多的新闻研究了抵消休息的方法,您可以发现许多文章讨论了大型和小型组织都受到攻击的问题。因此,了解如何保持云信息泄漏是保护您的业务和数据的初始阶段。在本文中,有几个最好和最直接的方法来保持与云信息泄漏的战略距离。
{"title":"A Survey on Essential Strategies for Avoiding Cloud Data Leaks","authors":"Ch. Sudhakar","doi":"10.21742/IJRIA.2019.7.2.03","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.03","url":null,"abstract":"As of late, there has been a tremendous development from putting away information the customary route, as the cloud has developed and turned into the better answer and alternative for organizations and associations alike. Notwithstanding, this has additionally prompted a development in digital culprits and information breaks now that somebody can get to touchy archives from their lounge room love seat. In that capacity, cloud information spills have turned into a very regular issue for organizations. More news has examined approaches to counteract breaks, and you can discover a plenty of articles that discuss about huge and little organizations alike being assaulted. Therefore, knowing how to keep a cloud information spill is the initial phase in protecting your business and data. In this paper there are a couple of the best and most straightforward methodologies to maintain a strategic distance from cloud information spills.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using IDoT Attributes for Secure Power Data Sharing Based on Blockchain Dynamic Access Control 基于区块链动态访问控制的IDoT属性安全电力数据共享
Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.02
Jaekyu Lee
Data collected through devices are stored in a single cloud and processed in Internet of Things (IoT) environment. Because IoT has a limitation of computing and storage space of devices. In order to solve the problem of reliability of centralized system, previous researches have been carried out to link blockchain to the Internet. However, user privacy protection is an indispensable factor for sharing data through the Internet. However, these limitations are not overcome. In this paper, the access control of the user is made flexible and robust through Dynamic Access Control Table (DACT) using the context attribute of IDentity of Things (IDoT). The system proposed in this paper can build a platform to securely share users’ power consumption data in the energy cloud. 1
通过设备收集的数据存储在单个云中,并在物联网(IoT)环境中进行处理。因为物联网有设备计算和存储空间的限制。为了解决集中式系统的可靠性问题,人们对区块链与Internet的连接进行了研究。然而,用户隐私保护是通过互联网共享数据不可或缺的因素。然而,这些限制并没有被克服。本文利用物的身份(IDentity of Things, IDoT)的上下文属性,通过动态访问控制表(Dynamic access control Table, DACT)实现了对用户的访问控制的灵活性和鲁棒性。本文提出的系统可以在能源云中搭建一个安全共享用户用电数据的平台。1
{"title":"Using IDoT Attributes for Secure Power Data Sharing Based on Blockchain Dynamic Access Control","authors":"Jaekyu Lee","doi":"10.21742/IJRIA.2019.7.2.02","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.02","url":null,"abstract":"Data collected through devices are stored in a single cloud and processed in Internet of Things (IoT) environment. Because IoT has a limitation of computing and storage space of devices. In order to solve the problem of reliability of centralized system, previous researches have been carried out to link blockchain to the Internet. However, user privacy protection is an indispensable factor for sharing data through the Internet. However, these limitations are not overcome. In this paper, the access control of the user is made flexible and robust through Dynamic Access Control Table (DACT) using the context attribute of IDentity of Things (IDoT). The system proposed in this paper can build a platform to securely share users’ power consumption data in the energy cloud. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114828229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
International Journal of Reliable Information and Assurance
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1