Search results

1 – 10 of 523
Article
Publication date: 19 February 2018

Sathya D. and Ganesh Kumar P.

This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor…

Abstract

Purpose

This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.

Design/methodology/approach

Nowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Boneh et al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.

Findings

The combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.

Practical implications

The secured data aggregation is useful in health-related applications, military applications, etc.

Originality/value

The new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.

Article
Publication date: 1 April 2003

Georgios I. Zekos

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…

86533

Abstract

Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.

Details

Managerial Law, vol. 45 no. 1/2
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 28 December 2021

Abdulla Alateeq, Wael Elmedany, Nedal Ababneh and Kevin Curran

The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a…

Abstract

Purpose

The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a higher security level compared to the existing one. One of the main security issues in WSNs is the security of routing protocols. A typical WSN consists of a large number of small size, low-power, low-cost sensor devices. These devices are very resource-constrained and usually use cheap short-range radios to communicate with each other in an ad hoc fashion thus, achieving security in these networks is a big challenge, which is open for research.

Design/methodology/approach

The route updates and data messages of the protocol are authenticated using Edwards-curves Digital Signature Algorithm (EdDSA). Routing protocols play an essential role in WSNs, they ensure the delivery of the sensed data from the remote sensor nodes to back-end systems via a data sink. Routing protocols depend on route updates received from neighboring nodes to determine the best path to the sink. Manipulating these updates by inserting rouge nodes in the network that advertise false updates can lead to a catastrophic impact on the compromised WSN performance.

Findings

As a result, a new secure energy-aware routing protocol (SEARP) is proposed, which uses security enhanced clustering algorithm and EdDSA to authenticate route advertisements and messages. A secure clustering algorithm is also used as part of the proposed protocol to conserve energy, prolong network lifetime and counteract wormhole attacks.

Originality/value

In this paper, a SEARP is proposed to address network layer security attacks in WSNs. A secure clustering algorithm is also used as part of the proposed protocol to conserve energy, prolong network lifetime and counteract wormhole attacks. A simulation has been carried out using Sensoria Simulator and the performance evaluation has been discussed.

Details

Journal of Engineering, Design and Technology , vol. 20 no. 3
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 16 March 2012

Guillermo Azuara, José Luis Tornos and José Luis Salazar

The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.

1956

Abstract

Purpose

The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.

Design/methodology/approach

First, the authors put forward a secure traceability system with a cryptographic operator that improves efficiency, saves costs and is adaptable to all types of supply chains. Second, the authors implement the system in a food manufacturing company, show the compatibility of the system with the initial production chain and demonstrate its improvement.

Findings

The authors have economically and technologically improved the detection of faked goods in the supply chain by means of a cheap and scalable system based on RFID.

Research limitations/implications

The system has been tested in a manufacturing point of the supply chain, not in the supply chain as a whole. As traceability is additive in character, the results can be generalized and applied to each part of the supply chain.

Practical implications

A prototype has been built and implemented for a food manufacturing company. It meets all the specifications required for detection of fakes in manufactured products.

Originality/value

Unlike other existing products used to detect fakes through traceability, this system identifies fakes and potential counterfeits, significantly reducing the cost of security management. Another important difference is that verification can be performed by a third party not involved in the system, without loss of security.

Details

Industrial Management & Data Systems, vol. 112 no. 3
Type: Research Article
ISSN: 0263-5577

Keywords

Book part
Publication date: 3 November 2014

Robin James Smith

This chapter critically discusses implications of working with ‘big data’ from the perspective of qualitative research and methodology. A critique is developed of the analytic…

Abstract

Purpose

This chapter critically discusses implications of working with ‘big data’ from the perspective of qualitative research and methodology. A critique is developed of the analytic troubles that come with integrating qualitative methodologies with ‘big data’ analyses and, moreover, the ways in which qualitative traditions themselves offer a challenge, as well as contributions, to computational social science.

Design/methodology/approach

The chapter draws on Interactionist understandings of social organisation as an ongoing production, tied to and accomplished in the actual practices of actual people. This is a matter of analytic priority but also points to a distinctiveness of sociological work which may be undermined in moving from the study of such actualities, suggesting an alternative coming crisis of empirical sociology.

Findings

A cautionary tale is offered regarding the contribution and character of sociological analysis within the ‘digital turn’. It is suggested that ‘big data’ analyses of traces abstracted from actual people and their practices not only miss and distort the relation of social practice to social product but, consequentially, can take on an ideological character.

Originality/value

The chapter offers an original contribution to current discussions and debates surrounding ‘big data’ by developing enduring critiques of sociological methodology and analysis. It concludes by pointing to contributions and interventions that such an empirical programme of qualitative research might make in the context of the ‘digital turn’ and is of value to those working at the interface of traditional and digital(ised) inquiries and methods.

Details

Big Data? Qualitative Approaches to Digital Research
Type: Book
ISBN: 978-1-78441-050-6

Keywords

Open Access
Article
Publication date: 26 December 2023

Christian Kowalkowski, Jochen Wirtz and Michael Ehret

Technology-enabled business-to-business (B2B) services contribute the largest share to GDP growth and are fundamental for an economy’s value creation. This article aims to…

1455

Abstract

Purpose

Technology-enabled business-to-business (B2B) services contribute the largest share to GDP growth and are fundamental for an economy’s value creation. This article aims to identify key service- and digital technology-driven B2B innovation modes and proposes a research agenda for further exploration.

Design/methodology/approach

This conceptual paper adopts a techno-demarcation view on service innovation, encompassing three core dimensions: service offering (the service product, or the “what”), service process (the “how”) and service ecosystem (the “who/for whom”). It delineates the implications of three digital technologies – the internet-of-things (IoT), intelligent automation (IA) and digital platforms – for service innovation across these core dimensions in B2B markets.

Findings

Digital technology has immense potential ramifications for value creation by reshaping all three core dimensions of service innovation. Specifically, IoT can transform physical resources into reconfigurable service products, IA can augment and automate a rapidly expanding array of service processes, while digital platforms provide the technical and organizational infrastructure for the integration of resources and stakeholders within service ecosystems.

Originality/value

This study suggests an agenda with six themes for further research, each linked to one or more of the three service innovation dimensions. They are (1) new recurring revenue models, (2) service innovation in the metaverse, (3) scaling up service innovations, (4) ecosystem innovations, (5) power dependency and lock-in effects and (6) security and responsibility in digital domains.

Details

Journal of Service Management, vol. 35 no. 2
Type: Research Article
ISSN: 1757-5818

Keywords

Article
Publication date: 1 June 1995

Din Ghani

With the current commercialization of the Internet, rapid development of mechanisms and systems to support commercial transactions over open, public networks can be seen. This…

Abstract

With the current commercialization of the Internet, rapid development of mechanisms and systems to support commercial transactions over open, public networks can be seen. This paper sets out to review the emerging technologies with a specific application scenario in mind: that of online access to commercially‐operated bibliographic information and full‐text document delivery services via the World‐Wide‐Web.

Details

Aslib Proceedings, vol. 47 no. 6
Type: Research Article
ISSN: 0001-253X

Book part
Publication date: 15 September 2022

Timotej Jagrič, Dušan Fister, Aleksandra Amon, Vita Jagrič and Sabina Taškar Beloglavec

Purpose: This chapter aims to lay out the issues regarding the world of digital currencies, private and central bank digital currency (CBDC). In that connection, the authors want…

Abstract

Purpose: This chapter aims to lay out the issues regarding the world of digital currencies, private and central bank digital currency (CBDC). In that connection, the authors want to, as much as possible, systematically present the terminology, examples of various digital currencies and the technology behind that phenomenon. The chapter also highlights the occurrence of CBDC and the possible implications of its introduction to day-to-day commercial banking practice, possibly taking the payment systems and transactions alternation, balance sheet and profits’ issues into consideration.

Need for the study: Digital currencies already have and are also soon going to have an enormous impact on society as such, where payments for everyday goods and services are taken on a whole new platform and level, in the sense of how the payments are made and payment systems are constructed, as also in the sense of quantity, as the number and sum-wise payments carried out via such platforms are growing.

Methodology: A triangulation method, a mixed qualitative methodological approach was implemented, so the research offers a synthesis of previously published contributions in this field, followed by deductive and inductive reasoning interconnected with descriptive and comparative analyses.

Findings: As digital currency already have a vast impact on payment systems and modes of payment, the CBDC, an imperative of today and not the matter of the future, will have implications for commercial banks, probably in the field of lowering banks’ commissions, no big customer data-selling ability, accumulating the deposits and deposit policies and credit policies due to higher funding costs for banks. There is an interwovenness among the central bank activities, bank customer’s behaviour and commercial bank activities. Therefore, the change of payment and spending behaviour of customers because of central banks’ introducing novelties will also have consequences for the banking industry.

Practical implications: The choice to handle cash or digital currency will be obsolete, and an individual’s or a firm’s financial knowledge must be upgraded in the field of new money using angles. The issue of digital currencies and CBDCs are no longer a matter of choice but are becoming a new reality. Therefore, it is necessary for the common public, economy and banking system, especially now carrying out most of payments and transfers of money, to study this field and foresee the possible consequences and risks emerging.

Details

The New Digital Era: Digitalisation, Emerging Risks and Opportunities
Type: Book
ISBN: 978-1-80382-980-7

Keywords

Article
Publication date: 2 November 2015

Nancy Ambritta P, Poonam N. Railkar and Parikshit N. Mahalle

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative…

196

Abstract

Purpose

This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack.

Design/methodology/approach

This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality.

Findings

The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI.

Research limitations/implications

Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose.

Originality/value

The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 March 2004

Christopher G. Reddick

This article examines the development of the Internet and electronic procurement or e-procurement in American state governments. I am interested in discerning the extent of…

Abstract

This article examines the development of the Internet and electronic procurement or e-procurement in American state governments. I am interested in discerning the extent of adoption of e-procurement, especially as it relates to the use of the Internet in the procurement function. Specifically, eprocurement is examined with data from a national survey of state procurement officers. The first part of this article demonstrates an e-government growth model as a way of modeling the development of e-procurement. The second part examines the existing literature on e-procurement development and challenges associated with its implementation. The third part constructs an eprocurement index, which measures the adoption rate of electronic procurement in each of the states. This e-procurement index is tested against management, organizational, and economic predictor variables. The results of the eprocurement model indicated positive support for electronic procurement on state management capacity and IT management capacity, indicating that high performing management is a critical catalyst for e-procurement development.

Details

Journal of Public Procurement, vol. 4 no. 2
Type: Research Article
ISSN: 1535-0118

1 – 10 of 523