International Journal of Reliable Information and Assurance最新文献

筛选
英文 中文
Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review 移动自组织网络中的协议、安全问题和挑战:广泛回顾
International Journal of Reliable Information and Assurance Pub Date : 2020-06-30 DOI: 10.21742/ijria.2020.8.1.04
N. Thirupathi Rao, D. Bhattacharyya
{"title":"Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.21742/ijria.2020.8.1.04","DOIUrl":"https://doi.org/10.21742/ijria.2020.8.1.04","url":null,"abstract":"In this article, an overview of secure specially appointed steering conventions for remote systems was presented. Impromptu system is a gathering of hubs that is associated through a remote medium framing quickly evolving topologies. Assaults on specially appointed system steering conventions disturb organize execution and unwavering quality with their arrangement. We quickly exhibit the most well-known conventions that take after the table-driven and the source-started on-request approaches. The association flanked by the proposed arrangements and parameters of specially appointed system demonstrates the execution as indicated by secure conventions. We talk about in this paper directing convention and challenges and furthermore examine verification in specially appointed system. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Performance Model of Controller Area Networks for Vehicles under Unsaturated Traffic 不饱和交通条件下车辆控制器区域网络的性能模型
International Journal of Reliable Information and Assurance Pub Date : 2020-06-30 DOI: 10.21742/ijria.2020.8.1.01
Jin-Yeong Um
{"title":"A Performance Model of Controller Area Networks for Vehicles under Unsaturated Traffic","authors":"Jin-Yeong Um","doi":"10.21742/ijria.2020.8.1.01","DOIUrl":"https://doi.org/10.21742/ijria.2020.8.1.01","url":null,"abstract":"This paper proposes a performance model of Controller Area Networks (CAN) to measure the effect of bit-error, especially on an identifier field of CAN messages over erroneous channels. CAN were introduced to allow various devices embedded inside cars to communicate in real-time over a shared channel. For resolving collisions in a real-time way, CAN adopt a contention-free protocol, namely a bit-map algorithm where messages are bitwise arbitrated based on their priority, precisely the identifier in CAN’s messages when multiple nodes contend for the shared channel. Contamination on the identifier, therefore, can severely degrade the performance of CAN since all senders recognizing errors immediately terminate their transmission and wait for a certain amount of time to resume competition. Furthermore, when the number of errors experienced exceeds the predetermined threshold, CAN stays at the bus-off mode where no messages are sent, requiring outside intervention to be back to the normal operational mode. To predict the performance deterioration of CAN over noisy channels, this paper builds a Markov chain model of CAN.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127835811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Methodology for Assessing Security Vulnerability of Cloud Services 一种云服务安全漏洞评估方法
International Journal of Reliable Information and Assurance Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.01
K. Seo
{"title":"A Methodology for Assessing Security Vulnerability of Cloud Services","authors":"K. Seo","doi":"10.21742/IJRIA.2019.7.2.01","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.01","url":null,"abstract":"Cloud services continue to change the business paradigm to use computing resources such as infrastructure, platform and application using the network access. They have created new security threats and challenges. When large amounts of data are saved in the cloud, the cloud is naturally exposed to attack. In cloud services, analysis and evaluation of security vulnerability should be made with protection plans that provide the objective data and information necessary to establish measures for information protection for each business of firms and take into account the impact on their respective responsibilities. This paper presents a framework to evaluate security vulnerability that reflects the business impacts. Through this framework, it is possible to evaluate vulnerability items of cloud services. Eventually, the proposed methodology will help establish security policies for both cloud service providers and users. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Detailed Review on Focus Areas of Cyber Security 网络安全重点领域综述
International Journal of Reliable Information and Assurance Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.05
N. Rao
{"title":"A Detailed Review on Focus Areas of Cyber Security","authors":"N. Rao","doi":"10.21742/IJRIA.2019.7.2.05","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.05","url":null,"abstract":"Security is one of the most important factor or point to be considered for everyone in their life. Providing security and breaking the security are two important points to be noted for everyone who can be using the gadgets in these days. The other important factor or the point to be considered was the cyber security. The attacks or the collection go data unethically without the knowledge of the user’s being stolen. The cases or the issues being under this trap are being increased from time to time and day to day in those days. The data to be stolen will be used for various reasons. Some may be using for money collection and some are using it for anti-social elements and unethical issues. Hence, in the current article an attempt has been made to provide a detailed idea of the types of attacks and types of issues and types of malwares that can be attacked and also some suggestions were provided. The important issues to be focused in the case of cyber security issues are given a thought and the details are given a light on it. The readers of this article can get the basic knowledge about the cyber security issues and threats and the steps to be followed such that to escape from these sorts of attacks. Also a focus was given on various aspects such that to escape from these types of security attacks.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Essential Strategies for Avoiding Cloud Data Leaks 避免云数据泄露的基本策略调查
International Journal of Reliable Information and Assurance Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.03
Ch. Sudhakar
{"title":"A Survey on Essential Strategies for Avoiding Cloud Data Leaks","authors":"Ch. Sudhakar","doi":"10.21742/IJRIA.2019.7.2.03","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.03","url":null,"abstract":"As of late, there has been a tremendous development from putting away information the customary route, as the cloud has developed and turned into the better answer and alternative for organizations and associations alike. Notwithstanding, this has additionally prompted a development in digital culprits and information breaks now that somebody can get to touchy archives from their lounge room love seat. In that capacity, cloud information spills have turned into a very regular issue for organizations. More news has examined approaches to counteract breaks, and you can discover a plenty of articles that discuss about huge and little organizations alike being assaulted. Therefore, knowing how to keep a cloud information spill is the initial phase in protecting your business and data. In this paper there are a couple of the best and most straightforward methodologies to maintain a strategic distance from cloud information spills.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using IDoT Attributes for Secure Power Data Sharing Based on Blockchain Dynamic Access Control 基于区块链动态访问控制的IDoT属性安全电力数据共享
International Journal of Reliable Information and Assurance Pub Date : 2019-12-30 DOI: 10.21742/IJRIA.2019.7.2.02
Jaekyu Lee
{"title":"Using IDoT Attributes for Secure Power Data Sharing Based on Blockchain Dynamic Access Control","authors":"Jaekyu Lee","doi":"10.21742/IJRIA.2019.7.2.02","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.02","url":null,"abstract":"Data collected through devices are stored in a single cloud and processed in Internet of Things (IoT) environment. Because IoT has a limitation of computing and storage space of devices. In order to solve the problem of reliability of centralized system, previous researches have been carried out to link blockchain to the Internet. However, user privacy protection is an indispensable factor for sharing data through the Internet. However, these limitations are not overcome. In this paper, the access control of the user is made flexible and robust through Dynamic Access Control Table (DACT) using the context attribute of IDentity of Things (IDoT). The system proposed in this paper can build a platform to securely share users’ power consumption data in the energy cloud. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114828229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信