Search results

1 – 4 of 4
Article
Publication date: 28 October 2014

Arijit Ukil, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal and Tulika Bose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP)…

1457

Abstract

Purpose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained characteristics of IoT systems have ushered in compelling requirements for lightweight application protocol and security suites. CoAP has already been established as the candidate protocol for IoT systems. However, low overhead security scheme for CoAP is still an open problem. Existing security solutions like Datagram Transport Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process.

Design/methodology/approach

This paper proposes a lightweight security scheme in CoAP using Advanced Encryption Standard (AES) 128 symmetric key algorithm. The paper presents an object security (payload embedded)-based robust authentication mechanism with integrated key management. The paper introduces few unique modifications to CoAP header to optimize security operation and minimize communication cost.

Findings

It is resilient to number of security attacks like replay attack, meet-in-the-middle attack and secure under chosen plaintext attack. This scheme is generic in nature, applicable for gamut of IoT applications. The paper proves efficacy of our proposed scheme for vehicle tracking application in emulated laboratory setup. Specifically, it compares with DTLS-enabled CoAP to establish the lightweight feature of our proposed solution.

Research limitations/implications

This paper mainly focuses on implementing in-vehicle tracking systems as an IoT application and used CoAP as the application protocol.

Practical implications

Such a lightweight security scheme would provide immense benefit in IoT systems so that resource constraint-sensing devices and nodes can be made secure. This would impact IoT eco systems to a large extent.

Originality/value

Such kind of security suite that provides both robustness and lightweight feature is hitherto not known to the authors, particularly in CoAP for IoT applications.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 17 December 2018

Sheshadri Chatterjee, Arpan Kumar Kar, Yogesh K. Dwivedi and Hatice Kizgin

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

1183

Abstract

Purpose

The purpose of this paper is to identify the factors influencing the citizens of India to prevent cybercrimes in the proposed Smart Cities of India.

Design/methodology/approach

A conceptual model has been developed for identifying factors preventing cybercrimes. The conceptual model was validated empirically with a sample size of 315 participants from India. Data were analyzed using structural equation modeling with SPSS and AMOS softwares.

Findings

The study reveals that the “awareness of cybercrimes” significantly influences the actual usage of technology to prevent cybercrimes in Smart Cities of India. The study reveals that government initiative (GI) and legal awareness are less influential in spreading of the awareness of cybercrimes (AOC) to the citizens of the proposed smart cities.

Research limitations/implications

The conceptual model utilizes two constructs from the technology adoption model, namely, perceived usefulness and ease of use. The study employs other factors such as social media, word of mouth, GIs, legal awareness and organizations constituting entities spreading awareness from different related literature works. Thereby, a comprehensive theoretical conceptual model has been proposed which helps to identify the factors that may help in preventing cybercrimes.

Practical implications

This study provides an insight to the policy maker to understand several factors influencing the AOC of the citizens of the proposed Smart Cities of India for the prevention of cybercrimes.

Originality/value

There are few existing studies analyzing the effect of AOC to mitigate cybercrimes. Thus, this study offers a novel contribution.

Details

Information Technology & People, vol. 32 no. 5
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 1 April 1992

Dennis M. Sandler and David Shani

In the heated debate about marketing globalization, the issue ofbrand standardization has received much less attention compared withadvertising standardization. When both…

1786

Abstract

In the heated debate about marketing globalization, the issue of brand standardization has received much less attention compared with advertising standardization. When both issues have been addressed, empirically or conceptually, they have not been considered simultaneously. The current study develops and empirically tests a framework to simultaneously consider brand and advertising standardization strategies. A survey was conducted among brand managers in firms operating in Canada, with data collected on a brand level. The results revealed an independence of brand and advertising standardization practices. It was also found that brand standardization was practised to a much higher degree than advertising standardization, with the most used combined strategy involving brand name standardization and non‐standardization of advertising. Effects of product type and brand age were also investigated. The findings clearly indicate that companies tend to “brand globally, advertise locally”.

Details

International Marketing Review, vol. 9 no. 4
Type: Research Article
ISSN: 0265-1335

Keywords

Article
Publication date: 6 March 2017

Xiaodong Wang and Jianfeng Cai

For some specific multi-criteria decision-making (MCDM) problems, especially in emergency situations, because of the feature of criteria and other fuzzy factors, it is…

Abstract

Purpose

For some specific multi-criteria decision-making (MCDM) problems, especially in emergency situations, because of the feature of criteria and other fuzzy factors, it is more appropriate that values of different criteria are expressed in their correspondingly appropriate value types. The purpose of this paper is to build a multi-criteria group decision-making (MCGDM) model dealing with heterogeneous information based on distance-based VIKOR to solve emergency supplier selection in practice appropriately and flexibly, where a compromise solution is more acceptable and suitable.

Design/methodology/approach

This paper extends the classical VIKOR to a generalized distance-based VIKOR to handle heterogeneous information containing crisp number, interval number, intuitionistic fuzzy number and hesitant fuzzy linguistic value, and develops an MCGDM model based on the distance-based VIKOR to handle the multi-criteria heterogeneous information in practice. This paper also introduces a parameter called non-fuzzy degree for each type of heterogeneous value to moderate the computation on aggregating heterogeneous hybrid distances.

Findings

The proposed distance-based model can handle the heterogeneous information appropriately and flexibly because the computational process is directly operated on the heterogeneous information based on generalized distance without a transformation process, which can improve the decision-making efficiency and reduce information loss. An example of emergency supplier selection is given to illustrate the proposed method.

Originality/value

This paper develops an MCGDM model based on the distance-based VIKOR to handle heterogeneous information appropriately and flexibly. In emergency supplier selection situations, the proposed decision-making model allows the decision-makers to express their judgments on criteria in their appropriate value types.

1 – 4 of 4