Search results
1 – 10 of 523This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor…
Abstract
Purpose
This study aims to provide a secured data aggregation with reduced energy consumption in WSN. Data aggregation is the process of reducing communication overhead in wireless sensor networks (WSNs). Presently, securing data aggregation is an important research issue in WSNs due to two facts: sensor nodes deployed in the sensitive and open environment are easily targeted by adversaries, and the leakage of aggregated data causes damage in the networks, and these data cannot be retrieved in a short span of time. Most of the traditional cryptographic algorithms provide security for data aggregation, but they do not reduce energy consumption.
Design/methodology/approach
Nowadays, the homomorphic cryptosystem is used widely to provide security with low energy consumption, as the aggregation is performed on the ciphertext without decryption at the cluster head. In the present paper, the Paillier additive homomorphic cryptosystem and Boneh et al.’s aggregate signature method are used to encrypt and to verify aggregate data at the base station.
Findings
The combination of the two algorithms reduces computation time and energy consumption when compared with the state-of-the-art techniques.
Practical implications
The secured data aggregation is useful in health-related applications, military applications, etc.
Originality/value
The new combination of encryption and signature methods provides confidentiality and integrity. In addition, it consumes less computation time and energy consumption than existing methods.
Details
Keywords
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some…
Abstract
Aim of the present monograph is the economic analysis of the role of MNEs regarding globalisation and digital economy and in parallel there is a reference and examination of some legal aspects concerning MNEs, cyberspace and e‐commerce as the means of expression of the digital economy. The whole effort of the author is focused on the examination of various aspects of MNEs and their impact upon globalisation and vice versa and how and if we are moving towards a global digital economy.
Details
Keywords
Abdulla Alateeq, Wael Elmedany, Nedal Ababneh and Kevin Curran
The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a…
Abstract
Purpose
The purpose of this paper is to investigate the latest research related to secure routing protocols in Wireless Sensor Network (WSN) and propose a new approach that can achieve a higher security level compared to the existing one. One of the main security issues in WSNs is the security of routing protocols. A typical WSN consists of a large number of small size, low-power, low-cost sensor devices. These devices are very resource-constrained and usually use cheap short-range radios to communicate with each other in an ad hoc fashion thus, achieving security in these networks is a big challenge, which is open for research.
Design/methodology/approach
The route updates and data messages of the protocol are authenticated using Edwards-curves Digital Signature Algorithm (EdDSA). Routing protocols play an essential role in WSNs, they ensure the delivery of the sensed data from the remote sensor nodes to back-end systems via a data sink. Routing protocols depend on route updates received from neighboring nodes to determine the best path to the sink. Manipulating these updates by inserting rouge nodes in the network that advertise false updates can lead to a catastrophic impact on the compromised WSN performance.
Findings
As a result, a new secure energy-aware routing protocol (SEARP) is proposed, which uses security enhanced clustering algorithm and EdDSA to authenticate route advertisements and messages. A secure clustering algorithm is also used as part of the proposed protocol to conserve energy, prolong network lifetime and counteract wormhole attacks.
Originality/value
In this paper, a SEARP is proposed to address network layer security attacks in WSNs. A secure clustering algorithm is also used as part of the proposed protocol to conserve energy, prolong network lifetime and counteract wormhole attacks. A simulation has been carried out using Sensoria Simulator and the performance evaluation has been discussed.
Details
Keywords
Guillermo Azuara, José Luis Tornos and José Luis Salazar
The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.
Abstract
Purpose
The purpose of this paper is to develop an efficient tool to ensure traceability data entry based on RFID and improve the detection of fakes inside the supply chain.
Design/methodology/approach
First, the authors put forward a secure traceability system with a cryptographic operator that improves efficiency, saves costs and is adaptable to all types of supply chains. Second, the authors implement the system in a food manufacturing company, show the compatibility of the system with the initial production chain and demonstrate its improvement.
Findings
The authors have economically and technologically improved the detection of faked goods in the supply chain by means of a cheap and scalable system based on RFID.
Research limitations/implications
The system has been tested in a manufacturing point of the supply chain, not in the supply chain as a whole. As traceability is additive in character, the results can be generalized and applied to each part of the supply chain.
Practical implications
A prototype has been built and implemented for a food manufacturing company. It meets all the specifications required for detection of fakes in manufactured products.
Originality/value
Unlike other existing products used to detect fakes through traceability, this system identifies fakes and potential counterfeits, significantly reducing the cost of security management. Another important difference is that verification can be performed by a third party not involved in the system, without loss of security.
Details
Keywords
This chapter critically discusses implications of working with ‘big data’ from the perspective of qualitative research and methodology. A critique is developed of the analytic…
Abstract
Purpose
This chapter critically discusses implications of working with ‘big data’ from the perspective of qualitative research and methodology. A critique is developed of the analytic troubles that come with integrating qualitative methodologies with ‘big data’ analyses and, moreover, the ways in which qualitative traditions themselves offer a challenge, as well as contributions, to computational social science.
Design/methodology/approach
The chapter draws on Interactionist understandings of social organisation as an ongoing production, tied to and accomplished in the actual practices of actual people. This is a matter of analytic priority but also points to a distinctiveness of sociological work which may be undermined in moving from the study of such actualities, suggesting an alternative coming crisis of empirical sociology.
Findings
A cautionary tale is offered regarding the contribution and character of sociological analysis within the ‘digital turn’. It is suggested that ‘big data’ analyses of traces abstracted from actual people and their practices not only miss and distort the relation of social practice to social product but, consequentially, can take on an ideological character.
Originality/value
The chapter offers an original contribution to current discussions and debates surrounding ‘big data’ by developing enduring critiques of sociological methodology and analysis. It concludes by pointing to contributions and interventions that such an empirical programme of qualitative research might make in the context of the ‘digital turn’ and is of value to those working at the interface of traditional and digital(ised) inquiries and methods.
Details
Keywords
Christian Kowalkowski, Jochen Wirtz and Michael Ehret
Technology-enabled business-to-business (B2B) services contribute the largest share to GDP growth and are fundamental for an economy’s value creation. This article aims to…
Abstract
Purpose
Technology-enabled business-to-business (B2B) services contribute the largest share to GDP growth and are fundamental for an economy’s value creation. This article aims to identify key service- and digital technology-driven B2B innovation modes and proposes a research agenda for further exploration.
Design/methodology/approach
This conceptual paper adopts a techno-demarcation view on service innovation, encompassing three core dimensions: service offering (the service product, or the “what”), service process (the “how”) and service ecosystem (the “who/for whom”). It delineates the implications of three digital technologies – the internet-of-things (IoT), intelligent automation (IA) and digital platforms – for service innovation across these core dimensions in B2B markets.
Findings
Digital technology has immense potential ramifications for value creation by reshaping all three core dimensions of service innovation. Specifically, IoT can transform physical resources into reconfigurable service products, IA can augment and automate a rapidly expanding array of service processes, while digital platforms provide the technical and organizational infrastructure for the integration of resources and stakeholders within service ecosystems.
Originality/value
This study suggests an agenda with six themes for further research, each linked to one or more of the three service innovation dimensions. They are (1) new recurring revenue models, (2) service innovation in the metaverse, (3) scaling up service innovations, (4) ecosystem innovations, (5) power dependency and lock-in effects and (6) security and responsibility in digital domains.
Details
Keywords
With the current commercialization of the Internet, rapid development of mechanisms and systems to support commercial transactions over open, public networks can be seen. This…
Abstract
With the current commercialization of the Internet, rapid development of mechanisms and systems to support commercial transactions over open, public networks can be seen. This paper sets out to review the emerging technologies with a specific application scenario in mind: that of online access to commercially‐operated bibliographic information and full‐text document delivery services via the World‐Wide‐Web.
Timotej Jagrič, Dušan Fister, Aleksandra Amon, Vita Jagrič and Sabina Taškar Beloglavec
Purpose: This chapter aims to lay out the issues regarding the world of digital currencies, private and central bank digital currency (CBDC). In that connection, the authors want…
Abstract
Purpose: This chapter aims to lay out the issues regarding the world of digital currencies, private and central bank digital currency (CBDC). In that connection, the authors want to, as much as possible, systematically present the terminology, examples of various digital currencies and the technology behind that phenomenon. The chapter also highlights the occurrence of CBDC and the possible implications of its introduction to day-to-day commercial banking practice, possibly taking the payment systems and transactions alternation, balance sheet and profits’ issues into consideration.
Need for the study: Digital currencies already have and are also soon going to have an enormous impact on society as such, where payments for everyday goods and services are taken on a whole new platform and level, in the sense of how the payments are made and payment systems are constructed, as also in the sense of quantity, as the number and sum-wise payments carried out via such platforms are growing.
Methodology: A triangulation method, a mixed qualitative methodological approach was implemented, so the research offers a synthesis of previously published contributions in this field, followed by deductive and inductive reasoning interconnected with descriptive and comparative analyses.
Findings: As digital currency already have a vast impact on payment systems and modes of payment, the CBDC, an imperative of today and not the matter of the future, will have implications for commercial banks, probably in the field of lowering banks’ commissions, no big customer data-selling ability, accumulating the deposits and deposit policies and credit policies due to higher funding costs for banks. There is an interwovenness among the central bank activities, bank customer’s behaviour and commercial bank activities. Therefore, the change of payment and spending behaviour of customers because of central banks’ introducing novelties will also have consequences for the banking industry.
Practical implications: The choice to handle cash or digital currency will be obsolete, and an individual’s or a firm’s financial knowledge must be upgraded in the field of new money using angles. The issue of digital currencies and CBDCs are no longer a matter of choice but are becoming a new reality. Therefore, it is necessary for the common public, economy and banking system, especially now carrying out most of payments and transfers of money, to study this field and foresee the possible consequences and risks emerging.
Details
Keywords
Nancy Ambritta P, Poonam N. Railkar and Parikshit N. Mahalle
This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative…
Abstract
Purpose
This paper aims at providing a comparative analysis of the existing protocols that address the security issues in the Future Internet (FI) and also to introduce a Collaborative Mutual Identity Establishment (CMIE) scheme which adopts the elliptical curve cryptography (ECC), to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as denial-of-service (DoS) and replay attack.
Design/methodology/approach
This paper provides a comparative analysis of the existing protocols that address the security issues in the FI and also provides a CMIE scheme, by adopting the ECC and digital signature verification mechanism, to address the issues, such as content integrity, mutual authentication, forward secrecy, auditability and resistance to attacks such as DoS and replay attack. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI. Further, the algorithm is evaluated against Automated Validation of Internet Security Protocols and Application (AVISPA) tool to verify the security solutions that the CMIE scheme has claimed to address to have been effectively achieved in reality.
Findings
The algorithm is evaluated against AVISPA tool to verify the security solutions that the CMIE scheme has claimed to address and proved to have been effectively achieved in reality. The proposed scheme enables the establishment of secured interactions between devices and entities of the FI.
Research limitations/implications
Considering the Internet of Things (IoT) scenario, another important aspect that is the device-to-location (D2L) aspect has not been considered in this protocol. Major focus of the protocol is centered around the device-to-device (D2D) and device-to-server (D2S) scenarios. Also, IoT basically works upon a confluence of hundreds for protocols that support the achievement of various factors in the IoT, for example Data Distribution Service, Message Queue Telemetry Transport, Extensible Messaging and Presence Protocol, Constrained Application Protocol (CoAP) and so on. Interoperability of the proposed CMIE algorithm with the existing protocols has to be considered to establish a complete model that fits the FI. Further, each request for mutual authentication requires a querying of the database and a computation at each of the participating entities side for verification which could take considerable amount of time. However, for applications that require firm authentication for maintaining and ensuring secure interactions between entities prior to access control and initiation of actual transfer of sensitive information, the negligible difference in computation time can be ignored for the greater benefit that comes with stronger security. Other factors such as quality of service (QoS) (i.e. flexibility of data delivery, resource usage and timing), key management and distribution also need to be considered. However, the user still has the responsibility to choose the required protocol that suits one’s application and serves the purpose.
Originality/value
The originality of the work lies in adopting the ECC and digital signature verification mechanism to develop a new scheme that ensures mutual authentication between participating entities in the FI based upon certain user information such as identities. ECC provides efficiency in terms of key size generated and security against main-in-middle attack. The proposed scheme provides secured interactions between devices/entities in the FI.
Details
Keywords
This article examines the development of the Internet and electronic procurement or e-procurement in American state governments. I am interested in discerning the extent of…
Abstract
This article examines the development of the Internet and electronic procurement or e-procurement in American state governments. I am interested in discerning the extent of adoption of e-procurement, especially as it relates to the use of the Internet in the procurement function. Specifically, eprocurement is examined with data from a national survey of state procurement officers. The first part of this article demonstrates an e-government growth model as a way of modeling the development of e-procurement. The second part examines the existing literature on e-procurement development and challenges associated with its implementation. The third part constructs an eprocurement index, which measures the adoption rate of electronic procurement in each of the states. This e-procurement index is tested against management, organizational, and economic predictor variables. The results of the eprocurement model indicated positive support for electronic procurement on state management capacity and IT management capacity, indicating that high performing management is a critical catalyst for e-procurement development.