Search results

1 – 10 of 189
Article
Publication date: 29 February 2024

Atefeh Hemmati, Mani Zarei and Amir Masoud Rahmani

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of…

Abstract

Purpose

Big data challenges and opportunities on the Internet of Vehicles (IoV) have emerged as a transformative paradigm to change intelligent transportation systems. With the growth of data-driven applications and the advances in data analysis techniques, the potential for data-adaptive innovation in IoV applications becomes an outstanding development in future IoV. Therefore, this paper aims to focus on big data in IoV and to provide an analysis of the current state of research.

Design/methodology/approach

This review paper uses a systematic literature review methodology. It conducts a thorough search of academic databases to identify relevant scientific articles. By reviewing and analyzing the primary articles found in the big data in the IoV domain, 45 research articles from 2019 to 2023 were selected for detailed analysis.

Findings

This paper discovers the main applications, use cases and primary contexts considered for big data in IoV. Next, it documents challenges, opportunities, future research directions and open issues.

Research limitations/implications

This paper is based on academic articles published from 2019 to 2023. Therefore, scientific outputs published before 2019 are omitted.

Originality/value

This paper provides a thorough analysis of big data in IoV and considers distinct research questions corresponding to big data challenges and opportunities in IoV. It also provides valuable insights for researchers and practitioners in evolving this field by examining the existing fields and future directions for big data in the IoV ecosystem.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 4 March 2024

Betul Gokkaya, Erisa Karafili, Leonardo Aniello and Basel Halak

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and…

Abstract

Purpose

The purpose of this study is to increase awareness of current supply chain (SC) security-related issues by providing an extensive analysis of existing SC security solutions and their limitations. The security of SCs has received increasing attention from researchers, due to the emerging risks associated with their distributed nature. The increase in risk in SCs comes from threats that are inherently similar regardless of the type of SC, thus, requiring similar defence mechanisms. Being able to identify the types of threats will help developers to build effective defences.

Design/methodology/approach

In this work, we provide an analysis of the threats, possible attacks and traceability solutions for SCs, and highlight outstanding problems. Through a comprehensive literature review (2015–2021), we analysed various SC security solutions, focussing on tracking solutions. In particular, we focus on three types of SCs: digital, food and pharmaceutical that are considered prime targets for cyberattacks. We introduce a systematic categorization of threats and discuss emerging solutions for prevention and mitigation.

Findings

Our study shows that the current traceability solutions for SC systems do not offer a broadened security analysis and fail to provide extensive protection against cyberattacks. Furthermore, global SCs face common challenges, as there are still unresolved issues, especially those related to the increasing SC complexity and interconnectivity, where cyberattacks are spread across suppliers.

Originality/value

This is the first time that a systematic categorization of general threats for SC is made based on an existing threat model for hardware SC.

Details

Benchmarking: An International Journal, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1463-5771

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Open Access
Article
Publication date: 17 August 2023

Shengnan Han, Shahrokh Nikou and Workneh Yilma Ayele

To improve the academic integrity of online examinations, digital proctoring systems have recently been implemented in higher education institutions (HEIs). The paper aims to…

1489

Abstract

Purpose

To improve the academic integrity of online examinations, digital proctoring systems have recently been implemented in higher education institutions (HEIs). The paper aims to understand how digital proctoring has been practised in higher education (HE) and proposes future research directions for studying digital proctoring in HE.

Design/methodology/approach

A systematic literature review was conducted. The PRISMA procedure was adapted for the literature search. The topics were identified by topic modelling techniques from 154 relevant publications in seven databases.

Findings

Seven widely discussed topics in literature were identified, including solutions for detecting cheating and student authentication, challenges/issues of uptakes and students' performance in different proctoring environments.

Research limitations/implications

This paper provides insights for academics, policymakers, practitioners and students to understand the implementation of digital proctoring in academia, its adoption by HEIs, impacts on students' and educators' performance and the rapid increase in its use for digital exams in HEIs, with particular emphasis on the impacts of the systems on digitalising examinations in HE.

Originality/value

This review paper has systematically and critically described the state-of-the-art literature on digital proctoring in HE and provides useful insights and implications for future research on digital proctoring, and how academic integrity in online examinations can be enhanced, along with digitalising HE.

Details

International Journal of Educational Management, vol. 38 no. 1
Type: Research Article
ISSN: 0951-354X

Keywords

Book part
Publication date: 18 January 2024

Tulsi Pawan Fowdur, Visham Hurbungs and Lavesh Babooram

Intelligent real-time systems are significantly impacting several of the UN Sustainable Development Goals (SDGs) by revolutionising processes in several areas such as Industry…

Abstract

Intelligent real-time systems are significantly impacting several of the UN Sustainable Development Goals (SDGs) by revolutionising processes in several areas such as Industry 4.0, smart cities, transportation, agriculture, renewable energy, climate change and other economic activities. Given that much of the work to achieve the SDGs relies on information and communication technology, cybersecurity has a potentially immense role to play towards achieving these outcomes. Moreover, cyberattacks have emerged as a new functional threat for interconnected, smart manufacturers and digital supply networks, employed in intelligent real-time systems for the Fourth Industrial Revolution. The effects of cyberattacks can be much more widespread than ever before due to the interconnected nature of Industry 4.0-driven operations. Blockchain can be really useful in such situations as it provides edge protection and allows authentication of the machine-to-machine and human–machine operations, stable data share, life cycle management, access control compliance of devices and self-sustaining operations. Moreover, blockchain can be applied for tracking and tracing transactions through devices, which are performed during the operation, as well as to encrypt and transmit data securely. It is vital to establish complete trust in a technology that is being adopted so that its full potential can be exploited. It is consequently critical that the organisational and information technology strategy fully integrates secure, vigilant and resilient cybersecurity strategies such as blockchain. This will ensure that cyber risks are properly managed in the age of Industry 4.0. This chapter, therefore, analyses the application of blockchain in intelligent real-time systems such as Industry 4.0 so that the opportunities these systems present for the SDGs can be exploited safely with minimum risks to society.

Details

Artificial Intelligence, Engineering Systems and Sustainable Development
Type: Book
ISBN: 978-1-83753-540-8

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 23 January 2024

Shreya Sangal, Gaurav Duggal and Achint Nigam

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud…

Abstract

Purpose

The purpose of this research paper is to review and synthesize the role of blockchain technology (BCT) in various types of illegal activities, including but not limited to fraud, money laundering, ransomware attacks, firearms, drug tracking, cyberattacks, identity theft and scams.

Design/methodology/approach

The authors conducted a review of studies related to illegal activities using blockchain from 2015 to 2023. Next, a thematic review of the literature was performed to see how these illegal activities were conducted using BCT.

Findings

Through this study, the authors identify the relevant themes that highlight the major illegal activities performed using BCT, its possible steps for prevention and the opportunities for future developments. Finally, the authors provide suggestions for future research using the theory, context and method framework.

Originality/value

No other research has synthesized the illegal activities using BCT through a thematic approach to the best of the authors’ knowledge. Hence, this study will act as a starting point for future research for academic and technical practitioners in this area.

Details

Journal of Information, Communication and Ethics in Society, vol. 22 no. 1
Type: Research Article
ISSN: 1477-996X

Keywords

Article
Publication date: 7 November 2023

Metin Sabuncu and Hakan Özdemir

This study aims to identify leather type and authenticity through optical coherence tomography.

Abstract

Purpose

This study aims to identify leather type and authenticity through optical coherence tomography.

Design/methodology/approach

Optical coherence tomography images taken from genuine and faux leather samples were used to create an image dataset, and automated machine learning algorithms were also used to distinguish leather types.

Findings

The optical coherence tomography scan results in a different image based on leather type. This information was used to determine the leather type correctly by optical coherence tomography and automatic machine learning algorithms. Please note that this system also recognized whether the leather was genuine or synthetic. Hence, this demonstrates that optical coherence tomography and automatic machine learning can be used to distinguish leather type and determine whether it is genuine.

Originality/value

For the first time to the best of the authors' knowledge, spectral-domain optical coherence tomography and automated machine learning algorithms were applied to identify leather authenticity in a noncontact and non-invasive manner. Since this model runs online, it can readily be employed in automated quality monitoring systems in the leather industry. With recent technological progress, optical coherence tomography combined with automated machine learning algorithms will be used more frequently in automatic authentication and identification systems.

Details

International Journal of Clothing Science and Technology, vol. 36 no. 1
Type: Research Article
ISSN: 0955-6222

Keywords

Article
Publication date: 9 May 2023

Ali Abdallah Alalwan, Abdullah M. Baabdullah, Mutaz M. Al-Debei, Ramakrishnan Raman, Hitmi Khalifa Alhitmi, Amjad A. Abu-ElSamen and Yogesh K. Dwivedi

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention…

Abstract

Purpose

There is always a need to discover how a paradox between a customer’s desire for a more personalized experience and their privacy and security concerns would shape their intention to continue using contactless payment methods. However, personalization–privacy paradox has not been well-covered over the area of contactless payment. Therefore, this study aims to empirically examine the impact of personalization–privacy paradox on the customers’ continued intention (CIN) to use contactless payment.

Design

/methodology/approach – The empirical part of the current study was conducted in Saudi Arabia by collecting the primary data using online questionnaire from a convenience sample size of 297 actual users of contactless payment methods.

Findings

Based on structural equation modeling, personalization and privacy invasion were approved to significantly impact perceived value of information disclosure (PVD). Strong causal associations were confirmed between perceived severity, structural assurance and response cost with privacy invasion. Finally, both PVD and privacy invasion significantly predict CIN.

Research limitations/implications

There are other important factors (i.e. technology interactivity, technology readiness, social influence, trust, prior experience, etc.) were not tested in the current study. Therefore, future studies would pay more attention regarding the impact of these factors. The current study data were also collected using a convenience sample of actual users of contactless payment methods. Therefore, there is a concern regarding the generalizability of the current study results to other kind of customers who have not used contactless payment.

Originality/value

This study has integrated both personalization–privacy paradox and protection motivation theory in one model. The current study holds value in providing a new and complete picture of the inhibitors and enablers of customers’ CIN to use contactless payment, including new types of inhibitors. Furthermore, personalization–privacy paradox has not been fully examined over the related area of Fintech and contactless payment in general. Therefore, this study was able to extend the theoretical horizon personalization–privacy paradox to new area (i.e. contactless payment) and new cultural context (Saudi Arabia).

Details

International Journal of Bank Marketing, vol. 42 no. 1
Type: Research Article
ISSN: 0265-2323

Keywords

Article
Publication date: 3 July 2023

Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini and Jamal El Kafi

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…

Abstract

Purpose

Ad hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military. However, because they operate mostly in open spaces, they are exposed to a variety of dangers. The purpose of this study is to introduce a novel method for detecting the MAC layer misbehavior.

Design/methodology/approach

The proposed novel approach is based on exponential smoothing for throughput prediction to address this MAC layer misbehavior. The real and expected throughput are processed using an exponential smoothing algorithm to identify this attack, and if these metrics exhibit a trending pattern, an alarm is then sent.

Findings

The effect of the IEEE 802.11 MAC layer misbehavior on throughput was examined using the NS-2 network simulator, as well as the approval of our novel strategy. The authors have found that a smoothing factor value that is near to 0 provides a very accurate throughput forecast that takes into consideration the recent history of the updated values of the real value. As for the smoothing factor values that are near to 1, they are used to identify MAC layer misbehavior.

Originality/value

According to the authors’ modest knowledge, this new scheme has not been proposed in the state of the art for the detection of greedy behavior in mobile ad hoc networks.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of 189