• Title/Summary/Keyword: Smart world security

Search Result 83, Processing Time 0.024 seconds

Securing the IoT Frontier: Exploring the Limitation and Future Directions in Cybersecurity

  • Moustafa Abdelrahman Mahmoud Ahmed;Nur Arzilawati Md Yunus
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.1-9
    • /
    • 2024
  • As the Internet of Things (IoT) continues to permeate every facet of modern life, the imperative to secure this vast and dynamic frontier becomes increasingly paramount. This presents a comprehensive exploration of the challenges and opportunities inherent in safeguarding the interconnected web of IoT devices. The research critically examines the limitations of current cybersecurity measures through an extensive review of diverse topics, including IoT network performance, smart grid security, and the escalating cyber threats against critical infrastructures. A meticulous analysis of research findings underscores the need for enhanced infrastructure and ongoing research to fortify the cybersecurity mechanisms surrounding IoT objects. We underline the imperative of relentless research efforts to parry the advancing threats and leverage the promise of nascent technologies. Our findings affirm the pivotal influence of robust cybersecurity measures in crafting a resiliently connected ecosystem. The paper underscores the importance of ongoing research to address evolving threats and harness the potential of emerging technologies, reaffirming the central role of cybersecurity in shaping a secure interconnected world. In conclusion, the study emphasizes the dynamic and ever-evolving nature of cybersecurity on the IoT frontier. It unveils a complex landscape of challenges, ranging from network performance intricacies to the security concerns of critical infrastructures.

A Trusted Sharing Model for Patient Records based on Permissioned Blockchain

  • Kim, Kyoung-jin;Hong, Seng-phil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.75-84
    • /
    • 2017
  • As there has been growing interests in PHR-based personalized health management project, various institutions recently explore safe methods of recording personal medical and health information. In particular, innovative medical solution can be realized when medical researchers and medical service institutes can generally get access to patient data. As EMR data is extremely sensitive, there has been no progress in clinical information exchange. Moreover, patients cannot get access to their own health data and exchange it with researchers or service institutions. It can be operated in terms of technology, yet policy environment are affected by state laws as well as Privacy and Security Policy. Blockchain technology-independent, in transaction, and under test-is introduced in the medical industry in order to settle these problems. In other words, medical organizations can grant preliminary approval on patient information exchange by using the safely encrypted and distributed Blockchain ledger and can be managed independently and completely by individuals. More apparently, medical researchers can gain access to information, thereby contributing to the scientific advance in rare diseases or minor groups in the world. In this paper, we focused on how to manage personal medical information and its protective use and proposes medical treatment exchange system for patients based on a permissioned Blockchain network for the safe PHR operation. Trusted Model for Sharing Medical Data (TMSMD), that is proposed model, is based on exchanging information as patients rely on hospitals as well as among hospitals. And introduce medical treatment exchange system for patients based on a permissioned Blockchain network. This system is a model that encrypts and records patients' medical information by using this permissioned Blockchain and further enhances the security due to its restricted counterfeit. This provides service to share medical information uploaded on the permissioned Blockchain to approved users through role-based access control. In addition, this paper presents methods with smart contracts if medical institutions request patient information complying with domestic laws by using the distributed Blockchain ledger and eventually granting preliminary approval for sharing information. This service will provide an independent information transaction and the Blockchain technology under test will be adopted in the medical industry.

Behavioral Factors Affecting Tourists' Smartphone Usage: Focus on Mobile Banking Service (관광객의 스마트폰 이용 행위 요인: 모바일 뱅킹 서비스 중심)

  • Qu, Xiaoqian;Kim, Mincheol
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.127-134
    • /
    • 2019
  • The purpose of this study was to investigate the factors affecting the behavior intention of smartphone mobile banking service among tourists. Currently, due to the development of mobile Internet technology and the spread of smartphone all over the world, interest and spread of smart phone based mobile banking is popularized. Thus, we analyzed the relationship among performance expectancy, social influence, facilitating conditions, perceived financial cost, perceived habit, perceived security level, and user's behavioral intention as a dependent variable. In this study, 203 respondents were interviewed about Chinese tourists at Jeju International Airport, and the influence of independent variables was determined by Smartpls 3.0. The results showed that the perceived security level and habit had a positive effect on the behavior intention. Especially, perceived security is a major issue of smartphone-based mobile banking in recent years. This study is meaningful in that it is an analysis of behavior factors of smartphone-based mobile banking service for tourists.

Environment and Development of the Weather Monitoring Application in Kosovo

  • Shabani, Milazim;Baftiu, Naim;Baftiu, Egzon;Maloku, Betim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.371-379
    • /
    • 2022
  • The environment in Kosovo is a topic of concern for the citizens and the state because of the temperatures that affect the health of the citizens and the climate around the world. Kosovo's climate is related to its geographical position. Stretching in the middle latitude, Kosovo's climate depends on the amount of heat coming from the Sun, the proximity of the Adriatic Sea, the Vardar valley, the openness to the north. In order to better understand the climatic features of Kosovo, one must know the elements of the climate such as: sunshine, temperature, precipitation, atmospheric pressure, winds. The Meteorological Institute of Kosovo is responsible for measuring temperatures in Kosovo since 2014 and until now 12 meteorological stations have been operationalized with automatic measurement and real-time data transfer to the central system for data collection and archiving. The hydrometeorological institute lacks an application for measuring temperatures in all the countries of Kosovo. Software applications are generally built to suit the requirements of different governments and clients in order to enable easier management of the jobs they operate on. One of the forms of application development is the development of mobile applications based on android. The purpose of the work is to create a mobile application based on the Android operating system that aims to display information about the weather, this type of application is necessary and important for users who want to see the temperature in different places in Kosovo, but also the world. This type of application offers many options such as maximum temperature, minimum temperature, humidity, and air pressure. The built application will have real and accurate data; this will be done by comparing the results with other similar applications. Such an application is necessary for everyone, especially for those people whose daily work is dependent on the weather or even for those who decide to spend their vacations, such as summer or winter. In this paper, comparisons are also made within android applications for tablets, televisions and smart watches.

Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity

  • Rashid, Md Mamunur;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1044-1058
    • /
    • 2021
  • Tempered electronic contents have multiplied in last few years, thanks to the emergence of sophisticated artificial intelligence(AI) algorithms. Deepfakes (fake footage, photos, speech, and videos) can be a frightening and destructive phenomenon that has the capacity to distort the facts and hamper reputation by presenting a fake reality. Evidence of ownership or authentication of digital material is crucial for combating the fabricated content influx we are facing today. Current solutions lack the capacity to track digital media's history and provenance. Due to the rise of misrepresentation created by technologies like deepfake, detection algorithms are required to verify the integrity of digital content. Many real-world scenarios have been claimed to benefit from blockchain's authentication capabilities. Despite the scattered efforts surrounding such remedies, relatively little research has been undertaken to discover where blockchain technology can be used to tackle the deepfake problem. Latest blockchain based innovations such as Smart Contract, Hyperledger fabric can play a vital role against the manipulation of digital content. The goal of this paper is to summarize and discuss the ongoing researches related to blockchain's capabilities to protect digital content authentication. We have also suggested a blockchain (smart contract) dependent framework that can keep the data integrity of original content and thus prevent deepfake. This study also aims at discussing how blockchain technology can be used more effectively in deepfake prevention as well as highlight the current state of deepfake video detection research, including the generating process, various detection algorithms, and existing benchmarks.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.

An Exploratory Research on the Effects for SMEs of the Technology Battle between the United States and China - A Focus on Information Security Issues of Huawei (미·중 기술 갈등에 따른 우리나라 중소기업의 파급효과에 관한 탐색적 연구 -화웨이 정보보안 이슈를 중심으로 -)

  • Park, Munsu;Son, Wonbae
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.43-56
    • /
    • 2020
  • The technology conflict between the U.S. and China is deepening recently. The U.S.-China battle began as a national security issue but is comprehending as a U.S.'s check for China's rapid technological advancement. China is rapidly growing in several indexes including R&D expenditure, patent application, and publications, and is challenging the U.S. in 5G and Artificial Intelligence. In 2018, Huawei became the largest 5G network/equipment provider and second largest smart phone manufacturer in the world. Now, Huawei is outperforming at AI chipset manufacturing, Bigdata analysis and cloud, positioning to become a critical player in the 4th industrial revolution. The purpose of this research is to analyze the effect of recent Huawei issues to Korean SMEs focusing on the relation between Huawei and Korean companies; the cooperation status from the Global Value Chain (GVC) perpsective, and Korean government's policies related to Huawei's information security issues will be the three main frames for the analysis. Then, this research proposes policy implications such as increasing Korea's competitiveness in manufacturing and information security.

The Business Model of IoT Information Sharing Open Market for Promoting IoT Service (IoT 서비스 활성화를 위한 IoT 정보공유 오픈 마켓 비즈니스 모델)

  • Kim, Woo Sung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.195-209
    • /
    • 2016
  • IoT (Internet of Things) is a collective term referring to application services that provide information through sensors/devices connected to the internet. The real world application of IoT is expanding fast along with growing number of sensors/devices. However, since IoT application relies on vertical combination of sensors/devices networks, information sharing within IoT services remains unresolved challenge. Consequently, IoT sensors/devices demand high construction and maintenance costs, rendering the creation of new IoT services potentially expensive. One solution is to launch an IoT open market for information sharing similar to that of App Store for smart-phones. Doing so will efficiently allow novel IoT services to emerge across various industries, because developers can purchase licenses to access IoT resources directly via an open market. Sharing IoT resource information through an open market will create an echo-system conducive for easy utilization of resources and communication between IoT service providers, resource owners, and developers. This paper proposes the new business model of IoT open market for information sharing, and the requirements for ensuring security and standardization of open markets.

The Technology of Personal Cloud Computing and Market Research (퍼스널 클라우드 컴퓨팅의 기술과 시장 분석)

  • Shim, Hyun-Bo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.239-251
    • /
    • 2014
  • The personal cloud is a service which approaches the personal contents scattering to all terminals and online space at the personal information-oriented age in which the person's digital device including the Smart-phone, MID, PC, IPTV and etc, increases and the personal online service including the blog, E-mail, UCC, social network service and ect, rapidly increasing for the cloud computing regardless of the terminal anywhere independently and can provide the high vale added personalization service through the analysis of the contents and processing. The future of the personal cloud market is prospected through the service and technology which enhances the understanding about the cloud computing, that is the next generation IT paradigm which the world IT companies pay attention to, and is provided and business strategy analysis of the security and normalizing and related companies.

Building of Remote Control Attack System for 2.4 GHz Wireless Keyboard Using an Android Smart Phone (안드로이드 스마트폰을 이용한 2.4 GHz 무선 키보드 원격제어 공격 시스템 구축)

  • Lee, Su-Jin;Park, Aesun;Sim, Bo-Yeon;Kim, Sang-su;Oh, Seung-Sup;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.871-883
    • /
    • 2016
  • It has been steadily increasing to use a wireless keyboard via Radio Frequency which is the input device. Especially, wireless keyboards that use 2.4 GHz frequency band are the most common items and their vulnerabilities have been reported since 2010. In this paper, we propose a 2.4 GHz wireless keyboard keystroke analysis and injection system based on the existing vulnerability researches of the Microsoft 2.4 GHz wireless keyboards. This system is possible to control on the remote. We also show that, via experiments using our proposed system, sensitive information of user can be revealed in the real world when using a 2.4 GHz wireless keyboard.