With the rapid development of web applications, and with the comfort provided by these web applications, internet users utilize this benefits to a great extent that they make almost all their day to day activities suc...
详细信息
ISBN:
(纸本)9781467392075
With the rapid development of web applications, and with the comfort provided by these web applications, internet users utilize this benefits to a great extent that they make almost all their day to day activities such as news paper reading, shopping, electricity bill payment, ticket booking and entertainment with the help of the internet. This phenomenon forces the users of the internet to get connected with the internet for a prolonged time and hence it increases the chances of the users to get caught in the web of phishing - an attack crafted by hackers to steal sensitive information by tempting the users with lucrative offers initially and then redirecting them to a fraudulent website(which the user may not suspect) where they can deceive the user by asking them to submit their credentials(usually users submit their credentials without knowing that these are fake offers created with a sole intention of stealing sensitive information). In spite of the alert and awareness given by the web community in this regard, more and more phishing artist succeed in their attack. Also these phishing artist develop novel attacks such as tab nabbing, website impersonation etc that attracts more and more internet user to be caught in the web of phishing. However many tools and methodologies have been developed to prevent phishing and to alert users orally and visually. But still the success rates of the phishing attack remains high and also the approaches related to phishing detection suffers high false positive and false negative ratio. In this paper various tools and methodologies used to prevent phishing has been analyzed and an efficient mechanism has been proposed to prevent phishing.
The internet of Things (IoT) comprises a complex network of smart devices, which frequently exchange data through the internet. Given the significant growth of IoT as a new technological paradigm, which may involve sa...
详细信息
ISBN:
(纸本)9781509021611
The internet of Things (IoT) comprises a complex network of smart devices, which frequently exchange data through the internet. Given the significant growth of IoT as a new technological paradigm, which may involve safety-critical operations and sensitive data to be put online, its security aspect is vital. This paper studies the network security matters in the smart home, health care and transportation domains. It is possible that the interruption might occur in IoT devices during operation causing them to be in the shutdown mode. Taxonomy of security attacks within IoT networks is constructed to assist IoT developers for better awareness of the risk of security flaws so that better protections shall be incorporated.
The Distribution Companies (DISCOs) encourage the electricity market by introducing distributed Generators (DGs) as the ancillary service for its significant benefits in loss reduction. The major issue in this process...
详细信息
ISBN:
(纸本)9781467392075
The Distribution Companies (DISCOs) encourage the electricity market by introducing distributed Generators (DGs) as the ancillary service for its significant benefits in loss reduction. The major issue in this process is the selection of appropriate size and location of DG in improving the performance of distribution systems. This means that the improper sizing and placing may reverse the beneficial factor of DG. Thus, the paper is proposed with a methodology to determine the optimal size and location of DG with an objective of reducing energy loss. The major contribution of this paper revolves with identifying location for DG based on Voltage Stability Index (VSI), impact of placing DG with random size in locations identified by VSI, identifying optimal DG size with feasible location using Particle Swarm Optimization (PSO) algorithm. Faults in the power distribution systems are considered to be the main contributor to the supply interruption and are responsible for poor service continuity indices. A methodology based on IMPEDANCE-BASED METHOD is presented for exact fault location. This proposed technique is tested and verified on IEEE 12 bus Radial Distribution System (rdS). The result shows the substantial reduction of total energy and importance of identifying optimal size and location for placing DG and also identifies the exact fault location.
The multimedia big data in multimedia sensing and other IoT (internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When compu...
详细信息
ISBN:
(纸本)9781509009473
The multimedia big data in multimedia sensing and other IoT (internet of Things) systems are high-volume, real-time, dynamic and heterogeneous. These characteristics lead to new challenges of data security. When computation and power resources in some IoT nodes are very scarce, these challenges become more serious that complex data security process on multimedia data is restricted by the aforementioned limited resources. Hence, the confidentiality of multimedia big data under resources constraints is investigated in this paper. Firstly, the growth trend of data volume compared with computational resources is discussed, and an analysis model for multimedia data encryption optimization is proposed. Secondly, a general-purpose lightweight speed tunable video encryption scheme is introduced. Thirdly, a series of intelligent selective encryption control models are proposed. Fourthly, the performance of proposed schemes is evaluated by experimental analyses and proves that schemes are effective enough to support real-time encryption of multimedia big data. Additionally, in the age of big data and cloud computing, the aforementioned analysis method can also be applied to other systems with limited resources.
Convergence of the IoT and cloud infrastructure will enable effective realization of the IoT systems and meet its high resource demands. However developing IoT cloud systems involves numerous challenges like ensuring ...
详细信息
ISBN:
(纸本)9781467394178
Convergence of the IoT and cloud infrastructure will enable effective realization of the IoT systems and meet its high resource demands. However developing IoT cloud systems involves numerous challenges like ensuring security, elasticity, etc. In this paper we have introduced the principles of engineering elasticity in IoT cloud systems and a conceptual model to realize them. By incorporating modules for application specific analytics, autonomous resource de/provisioning and monitoring the allocated resources we have demonstrated how elasticity can be ensured. The theoretical proof of concept along with a scenario of smart cars and a car manufacturing plant demonstrates the functioning and advantages of the aforementioned in a real-world IoT cloud system.
There is large amount of information available on the internet, which introduces difficulties in capturing and analyzing hotspot information. In this paper, we propose a novel hotspot information analysis system with ...
详细信息
Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the ...
详细信息
ISBN:
(纸本)9781467392075
Nowadays use of wireless technologies tremendously increased due to the continuous development of these technologies in various applications. One of the development in wireless technologies leads to deployment of the networks in which all mobile nodes will communicate via wireless links directly without use of any base station or predefined infrastructural support. These networks are self-organized networks called mobile ad hoc networks (MANETs) and architecture used for these networks will be either stand alone with one or few nodes communicating with base station or distributed. As communication is done through wireless links, these types of networks are more prone to several kinds of attacks. Authentication and encryption acts as first line of defense while an intrusion detection system (IDS) acts as a second line of defense. One of the intrusion detection system used in MANET is Enhanced Adaptive Acknowledgement (EAACK) which is based on acknowledgement packets for detection of malicious activities. This system increases the overhead of network significantly relative to other system such as watchdog. So, in this paper we adopt the hybrid cryptography to reduce the network overhead and enhance the security of networks significantly.
In order to improve the benefits of the mobile cloud computing network and the quality of the security service of the mobile cloud computing, this paper aims to make a design of the control framework of the cloud comp...
详细信息
In order to improve the benefits of the mobile cloud computing network and the quality of the security service of the mobile cloud computing, this paper aims to make a design of the control framework of the cloud computing resources of the cloud computing security service among its service domains, and design the optimal decision-making strategy of the allocation and management of the resources. The system, which combines the design of the decision mechanism of the access control, the analysis of the energy consumption and response time in view of the task execution, and the selection of the optimal access path, makes it possible for high security and low energy consumption.
The core technique for constructing oblivious database is to get efficient implementations of oblivious transfer. This paper studies universally composable 1-out-of-n oblivious transfer (OTn1) in the presence of malic...
详细信息
Extensive economic development and traditional industrial production processes had caused great waste on human resources and natural energy. In the view of this situation, the paper establishes a coupling information ...
详细信息
ISBN:
(纸本)9781509025367
Extensive economic development and traditional industrial production processes had caused great waste on human resources and natural energy. In the view of this situation, the paper establishes a coupling information system based on the internet of things and decision support system, expanding the research on the overall framework and design level of the integration system. First, from the macro level, the coupling system is built with the perception layer and decision-making layer as a whole, secondly, starting with complex network theory, the paper makes use of small-world network model to optimize perception layer topology network, finally, as the manufacturing is the core part of perception layer of the industrial enterprises, the technical framework of the active perception of critical events in IOMT based manufacturing process is established, which contributes to providing dynamic monitoring and decision-making to optimize the production process with a new model of support real-time information. Hence, the visual decision knowledge as well as realization of real-time intelligent management can be obtained by the coupling system.
暂无评论