Network Security is one of the important concepts in data security as the data to he uploaded should be made secure. To make data secure, there exist number of algorithms like AES (Advanced Encryption Standard), IDEA ...
详细信息
ISBN:
(纸本)9789380544199
Network Security is one of the important concepts in data security as the data to he uploaded should be made secure. To make data secure, there exist number of algorithms like AES (Advanced Encryption Standard), IDEA (international Data Encryption Algorithm) etc. These techniques of making the data secure come under Cryptography. Involving internet of Things (IoT) in Cryptography is an emerging domain. IoT can be defined as controlling things located at any part of the world via internet. So, IoT involves data security i.e. Cryptography. Here, in this paper we discuss how data can he made secure for IoT using Cryptography.
internet of vehicles(IOV) is an application of internet of things in Intelligent Transport System, and has attracted high attention of researchers. IOV brings network connectivity to traditional vehicles, while also i...
详细信息
ISBN:
(纸本)9781509009466
internet of vehicles(IOV) is an application of internet of things in Intelligent Transport System, and has attracted high attention of researchers. IOV brings network connectivity to traditional vehicles, while also introduces security risks. This paper presents experimental analysis on the security of vehicles with internet connections and propose an approach to Controlling a Car Through OBD Injection. In the experiments, we successfully penetrated several types of cars in a wireless way. We also put out a multi-level safety model of cars, which divides cars into different groups and gives analysis and explanations of each group. All of these things are done for indicating a point of view that traditional cars are not safe enough on information security. It is surely risky to put a car without the ability to resist the attack of informational ways into the internet of vehicles.
In the current scenario, distributedcomputing systems play significant role for accessing the various kinds of internet services. The different handheld devices like palmtop, laptop, mobile, etc. can be connected acr...
详细信息
ISBN:
(纸本)9788132227557;9788132227533
In the current scenario, distributedcomputing systems play significant role for accessing the various kinds of internet services. The different handheld devices like palmtop, laptop, mobile, etc. can be connected across the distributed network. People enjoy social networking websites, online purchasing websites, and online transaction websites in the daily routine life. On the other hand, hackers are regularly watching the activities of the people who are categorized as the authorized users connected across the globe. The present work is related to propose a model which is based upon the object-oriented technology for occurring of cyber crime across the distributed network. A well known Unified Modeling Language is used and one can easily write the code for implementation of model in any object-oriented programming language. After that a UML model is proposed for filing the FIR online against the cyber crime. The activities in the above procedure are represented by the UML activity diagram which is finally validated through the concept of finite state machine.
The article discusses the possibility of using the internet for educational purposes. The features provide access to information resources of the internet and the feasibility of their use for educational purposes. Con...
详细信息
ISBN:
(纸本)9783319396903;9783319396897
The article discusses the possibility of using the internet for educational purposes. The features provide access to information resources of the internet and the feasibility of their use for educational purposes. Considered information interaction of the educational purpose in the conditions of realization of the internet. We describe the power of the internet for educational services for the certification of specialists for the organization distributed educational projects. It is shown as distributed learning projects are used to organize and conduct educational institutions (geographically distributed) joint educational activities related to collection, processing and analysis of information with the scientific-practical and educational purposes.
The internet of Things, often abbreviated as IoT, is a network of "things" like software, sensors, electronics, etc. that have the ability to exchange data with their operator, manufacturer, and/or other dev...
详细信息
ISBN:
(纸本)9789380544199
The internet of Things, often abbreviated as IoT, is a network of "things" like software, sensors, electronics, etc. that have the ability to exchange data with their operator, manufacturer, and/or other devices using an existing communication infrastructure. IoT is still in early stages. However, it is developing at a rapid rate. As more "things" start communicating, more data will be generated. This paper outlines the requirements of a general-purpose, open source platform that would enable these "things" to store and retrieve their data reliably over the network.
With the prosperous growth of cloud computing, it is being used widely in business as well as in researches today, considering its numerous advantages over traditional approaches. However, security and privacy concern...
详细信息
ISBN:
(纸本)9788132225294;9788132225287
With the prosperous growth of cloud computing, it is being used widely in business as well as in researches today, considering its numerous advantages over traditional approaches. However, security and privacy concerns are ascending day by days. Cloud is being utilized for not only to use software and platform over the internet, but also for storing confidential data. This paper presents a novel approach wherein multi-cloud environment is used to mitigate data privacy apprehensions. The viability and design of this method are described in the proposed paper.
internet of things (IoT) continues to the draw attention of academics and researchers across the globe, since it represents the future of ubiquitous computing. This is triggered by number of both digital and physical ...
详细信息
ISBN:
(纸本)9781509025763
internet of things (IoT) continues to the draw attention of academics and researchers across the globe, since it represents the future of ubiquitous computing. This is triggered by number of both digital and physical objects connecting to each other using ICT technologies, platforms and the internet to facilitate the whole processes of connectivity and services provision. With this massive connectivity of objects and devices forming the IoT, comes a great responsibility in terms of confronting new sets of challenges ranging from IoT security threats, ethics and privacy. In this paper we present the survey into the security aspect of IoT.
The Distribution Companies (DISCOs) encourage the electricity market by introducing distributed Generators (DGs) as the ancillary service for its significant benefits in loss reduction. The major issue in this process...
详细信息
ISBN:
(纸本)9781467392068
The Distribution Companies (DISCOs) encourage the electricity market by introducing distributed Generators (DGs) as the ancillary service for its significant benefits in loss reduction. The major issue in this process is the selection of appropriate size and location of DG in improving the performance of distribution systems. This means that the improper sizing and placing may reverse the beneficial factor of DG. Thus, the paper is proposed with a methodology to determine the optimal size and location of DG with an objective of reducing energy loss. The major contribution of this paper revolves with identifying location for DG based on Voltage Stability Index (VSI), impact of placing DG with random size in locations identified by VSI, identifying optimal DG size with feasible location using Particle Swarm Optimization (PSO) algorithm. Faults in the power distribution systems are considered to be the main contributor to the supply interruption and are responsible for poor service continuity indices. A methodology based on IMPEDANCE-BASED METHOD is presented for exact fault location. This proposed technique is tested and verified on IEEE 12 bus Radial Distribution System (rdS). The result shows the substantial reduction of total energy and importance of identifying optimal size and location for placing DG and also identifies the exact fault location.
Conventional computing techniques extensively diverge over large scale computing. In order to store and operate structured data, most data scientists suggest higher dimensional arrays, especially in linearization of h...
详细信息
ISBN:
(纸本)9781450346177
Conventional computing techniques extensively diverge over large scale computing. In order to store and operate structured data, most data scientists suggest higher dimensional arrays, especially in linearization of higher order data. However, with the developing size of datasets, the structures become prone to performance degradation for inability of maintaining expanded data velocity. Besides, reallocation of data is required. The index array is a dynamic storage scheme which allows the array to extend subjectively according to the bound of the dimensions. All the dimensions of index array scheme require placing index to maintain data velocity. In this paper, we propose a scalable storage scheme for index array that illustrates the dynamic expansion nature of array. This scheme entails only two indices for any number of dimensions. Hence, simple algorithms can be designed for array operations. The proposed scheme overtakes the conventional structure in terms of memory utilization, index cost and element access.
Geo-distributed mobile cloud computing (GMCC) integrates location information into mobile cloud computing, that has high potential for a large variety of applications. In a vehicular environment, a GMCC provides a lar...
详细信息
ISBN:
(纸本)9781509009466
Geo-distributed mobile cloud computing (GMCC) integrates location information into mobile cloud computing, that has high potential for a large variety of applications. In a vehicular environment, a GMCC provides a large number of resources to vehicles that are geographically close to them. However, there are few studies that focus on security and privacy issues in a GMCC scenario. Vehicles need sufficient pseudonyms to periodically change for privacy preservation. In this paper, we focus on pseudonym management in GMCC system for vehicular environment. We design a three-layer on-demand pseudonym system to manage the pseudonyms. Moreover, we propose a secure pseudonym distribution scheme for secure communication among vehicles. As the number of demanded pseudonyms varies with traffic loads in different clouds, we use a newsvendor model to address the optimal on-demand pseudonym distribution problem. Numerical results indicate our proposed schemes not only improve utility of the clouds, but also maximize utilization of the pseudonyms.
暂无评论