{"title":"Protocol, Security Issues and Challenges in Mobile Ad Hoc Networks: An Extensive Review","authors":"N. Thirupathi Rao, D. Bhattacharyya","doi":"10.21742/ijria.2020.8.1.04","DOIUrl":"https://doi.org/10.21742/ijria.2020.8.1.04","url":null,"abstract":"In this article, an overview of secure specially appointed steering conventions for remote systems was presented. Impromptu system is a gathering of hubs that is associated through a remote medium framing quickly evolving topologies. Assaults on specially appointed system steering conventions disturb organize execution and unwavering quality with their arrangement. We quickly exhibit the most well-known conventions that take after the table-driven and the source-started on-request approaches. The association flanked by the proposed arrangements and parameters of specially appointed system demonstrates the execution as indicated by secure conventions. We talk about in this paper directing convention and challenges and furthermore examine verification in specially appointed system. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Model of Controller Area Networks for Vehicles under Unsaturated Traffic","authors":"Jin-Yeong Um","doi":"10.21742/ijria.2020.8.1.01","DOIUrl":"https://doi.org/10.21742/ijria.2020.8.1.01","url":null,"abstract":"This paper proposes a performance model of Controller Area Networks (CAN) to measure the effect of bit-error, especially on an identifier field of CAN messages over erroneous channels. CAN were introduced to allow various devices embedded inside cars to communicate in real-time over a shared channel. For resolving collisions in a real-time way, CAN adopt a contention-free protocol, namely a bit-map algorithm where messages are bitwise arbitrated based on their priority, precisely the identifier in CAN’s messages when multiple nodes contend for the shared channel. Contamination on the identifier, therefore, can severely degrade the performance of CAN since all senders recognizing errors immediately terminate their transmission and wait for a certain amount of time to resume competition. Furthermore, when the number of errors experienced exceeds the predetermined threshold, CAN stays at the bus-off mode where no messages are sent, requiring outside intervention to be back to the normal operational mode. To predict the performance deterioration of CAN over noisy channels, this paper builds a Markov chain model of CAN.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127835811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology for Assessing Security Vulnerability of Cloud Services","authors":"K. Seo","doi":"10.21742/IJRIA.2019.7.2.01","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.01","url":null,"abstract":"Cloud services continue to change the business paradigm to use computing resources such as infrastructure, platform and application using the network access. They have created new security threats and challenges. When large amounts of data are saved in the cloud, the cloud is naturally exposed to attack. In cloud services, analysis and evaluation of security vulnerability should be made with protection plans that provide the objective data and information necessary to establish measures for information protection for each business of firms and take into account the impact on their respective responsibilities. This paper presents a framework to evaluate security vulnerability that reflects the business impacts. Through this framework, it is possible to evaluate vulnerability items of cloud services. Eventually, the proposed methodology will help establish security policies for both cloud service providers and users. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Detailed Review on Focus Areas of Cyber Security","authors":"N. Rao","doi":"10.21742/IJRIA.2019.7.2.05","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.05","url":null,"abstract":"Security is one of the most important factor or point to be considered for everyone in their life. Providing security and breaking the security are two important points to be noted for everyone who can be using the gadgets in these days. The other important factor or the point to be considered was the cyber security. The attacks or the collection go data unethically without the knowledge of the user’s being stolen. The cases or the issues being under this trap are being increased from time to time and day to day in those days. The data to be stolen will be used for various reasons. Some may be using for money collection and some are using it for anti-social elements and unethical issues. Hence, in the current article an attempt has been made to provide a detailed idea of the types of attacks and types of issues and types of malwares that can be attacked and also some suggestions were provided. The important issues to be focused in the case of cyber security issues are given a thought and the details are given a light on it. The readers of this article can get the basic knowledge about the cyber security issues and threats and the steps to be followed such that to escape from these sorts of attacks. Also a focus was given on various aspects such that to escape from these types of security attacks.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115659067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Essential Strategies for Avoiding Cloud Data Leaks","authors":"Ch. Sudhakar","doi":"10.21742/IJRIA.2019.7.2.03","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.03","url":null,"abstract":"As of late, there has been a tremendous development from putting away information the customary route, as the cloud has developed and turned into the better answer and alternative for organizations and associations alike. Notwithstanding, this has additionally prompted a development in digital culprits and information breaks now that somebody can get to touchy archives from their lounge room love seat. In that capacity, cloud information spills have turned into a very regular issue for organizations. More news has examined approaches to counteract breaks, and you can discover a plenty of articles that discuss about huge and little organizations alike being assaulted. Therefore, knowing how to keep a cloud information spill is the initial phase in protecting your business and data. In this paper there are a couple of the best and most straightforward methodologies to maintain a strategic distance from cloud information spills.","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115923159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using IDoT Attributes for Secure Power Data Sharing Based on Blockchain Dynamic Access Control","authors":"Jaekyu Lee","doi":"10.21742/IJRIA.2019.7.2.02","DOIUrl":"https://doi.org/10.21742/IJRIA.2019.7.2.02","url":null,"abstract":"Data collected through devices are stored in a single cloud and processed in Internet of Things (IoT) environment. Because IoT has a limitation of computing and storage space of devices. In order to solve the problem of reliability of centralized system, previous researches have been carried out to link blockchain to the Internet. However, user privacy protection is an indispensable factor for sharing data through the Internet. However, these limitations are not overcome. In this paper, the access control of the user is made flexible and robust through Dynamic Access Control Table (DACT) using the context attribute of IDentity of Things (IDoT). The system proposed in this paper can build a platform to securely share users’ power consumption data in the energy cloud. 1","PeriodicalId":108805,"journal":{"name":"International Journal of Reliable Information and Assurance","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114828229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}