Search results

1 – 10 of 91
Article
Publication date: 24 June 2022

Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah and Kamal Gulati

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…

Abstract

Purpose

In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates endorsed through CA to substantiate users for the barter of encoded communications is one of the most significant constraints for the extensive recognition of PKC, as the technique takes too much time and susceptible to error. PKC’s certificate and key management operating costs are reduced with IBC. IBE is a crucial primeval in IBC. The thought behind presenting the IBE scheme was to diminish the complexity of certificate and key management, but it also gives rise to key escrow and key revocation problem, which provides access to unauthorised users for the encrypted information.

Design/methodology/approach

This paper aims to compare the result of IIBES with the existing system and to provide security analysis for the same and the proposed system can be used for the security in federated learning.

Findings

Furthermore, it can be implemented using other encryption/decryption algorithms like elliptic curve cryptography (ECC) to compare the execution efficiency. The proposed system can be used for the security in federated learning.

Originality/value

As a result, a novel enhanced IBE scheme: IIBES is suggested and implemented in JAVA programming language using RSA algorithm, which eradicates the key escrow problem through eliminating the need for a KGC and key revocation problem by sing sub-KGC (SKGC) and a shared secret with nonce. IIBES also provides authentication through IBS as well as it can be used for securing the data in federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 20 April 2023

Vamsi Desam and Pradeep Reddy CH

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and…

Abstract

Purpose

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and administration make symmetric encryption difficult. The purpose of this paper is to address these concerns, the novel hybrid partial differential elliptical Rubik’s cube algorithm is developed in this study as an asymmetric image encryption approach. This novel algorithm generates a random weighted matrix, and uses the masking method on image pixels with Rubik’s cube principle. Security analysis has been conducted, it enhances and increases the reliability of the proposed algorithm against a variety of attacks including statistical and differential attacks.

Design/methodology/approach

In this light, a differential elliptical model is designed with two phases for image encryption and decryption. A modified image is achieved by rotating and mixing intensities of rows and columns with a masking matrix derived from the key generation technique using a unique approach based on the elliptic curve and Rubik’s cube principle.

Findings

To evaluate the security level, the proposed algorithm is tested with statistical and differential attacks on a different set of test images with peak signal-to-noise ratio, unified average changed intensity and number of pixel change rate performance metrics. These results proved that the proposed image encryption method is completely reliable and enhances image security during transmission.

Originality/value

The elliptic curve–based encryption is hard to break by hackers and adding a Rubik’s cube principle makes it even more complex and nearly impossible to decode. The proposed method provides reduced key size.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 7 May 2024

Swathi Pennapareddy, Ramprasad Srinivasan and Natarajan K.

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one…

Abstract

Purpose

Automatic dependent surveillance-broadcast (ADS-B) is the foundational technology of the next generation air transportation system defined by Federal Aviation Authority and is one of the most precise ways for tracking aircraft position. ADS-B is intended to provide greater situational awareness to the pilots by displaying the traffic information like aircraft ID, altitude, speed and other critical parameters on the Cockpit Display of Traffic Information displays in the cockpit. Unfortunately, due to the initial proposed nature of ADS-B protocol, it is neither encrypted nor has any other innate security mechanisms, which makes it an easy target for malicious attacks. The system is vulnerable to various active and passive attacks like message ingestion, message deletion, eavesdropping, jamming, etc., which has become an area of concern for the aviation industry. The purpose of this study is to propose a method based on modified advanced encryption standard (AES) algorithm to secure the ADS=B messages and increase the integrity of ADS-B data transmissions.

Design/methodology/approach

Though there are various cryptographic and non-cryptographic methods proposed to secure ADS-B data transmissions, it is evident that most of these systems have limitations in terms of cost, implementation or feasibility. The new proposed method implements AES encryption techniques on the ADS-B data on the sender side and correlated decryption mechanism at the receiver end. The system is designed based on the flight schedule data available from any flight planning systems and implementing the AES algorithm on the ADS-B data from each aircraft in the flight schedule.

Findings

The suitable hardware was developed using Raspberry pi, ESP32 and Ra-02. Several runs were done to verify the original message, transmitted data and received data. During transmission, encryption algorithm was being developed, which has got very high secured transmission, and during the reception, the data was secured. Field test was conducted to validate the transmission and quality. Several trials were done to validate the transmission process. The authors have successfully shown that the ADS-B data can be encrypted using AES algorithm. The authors are successful in transmitting and receiving the ADS-B data packet using the discussed hardware and software methodology. One major advantage of using the proposed solution is that the information received is encrypted, and the receiver ADS-B system can decrypt the messages on the receiving end. This clearly proves that when the data is received by an unknown receiver, the messages cannot be decrypted, as the receiver is not capable of decrypting the AES-authenticated messages transmitted by the authenticated source. Also, AES encryption is highly unlikely to be decrypted if the encryption key and the associated decryption key are not known.

Research limitations/implications

Implementation of the developed solution in actual onboard avionics systems is not within the scope of this research. Hence, assessing in the real-time distances is not covered.

Social implications

The authors propose to extend this as a software solution to the onboard avionics systems by considering the required architectural changes. This solution can also bring in positive results for unmanned air vehicles in addition to the commercial aircrafts. Enhancement of security to the key operational and navigation data elements is going to be invaluable for future air traffic management and saving lives of people.

Originality/value

The proposed solution has been practically implemented by developing the hardware and software as part of this research. This has been clearly brought out in the paper. The implementation has been tested using the actual ADS-B data/messages received from using the ADS-B receiver. The solution works perfectly, and this brings immense value to the aircraft-to-aircraft and aircraft-to-ground communications, specifically while using ADS-B data for communicating the position information. With the proposed architecture and minor software updates to the onboard avionics, this solution can enhance safety of flights.

Details

Aircraft Engineering and Aerospace Technology, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1748-8842

Keywords

Article
Publication date: 11 January 2024

Denis Scott, Ling Ma and Tim Broyd

Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA…

Abstract

Purpose

Poor cash flow management and lack of profitability have plagued the construction industry for decades. In response, the UK Government published the project bank account (PBA) payment strategy in 2012 to mitigate main contractors unfairly withholding liabilities. However, PBAs suffer from adoption challenges, such as systems fragmentation and a lack of incentives for main contractors to adopt them effectively. This study aims to investigate how to reduce systems fragmentation in construction by integrating PBA procedures with existing management workflows to increase payment automation, resulting in improved cash liquidity and better incentives for using PBAs.

Design/methodology/approach

A PBA blockchain decentralised application is developed, presented and critically evaluated. Blockchain is the technology used because of its permissionless, license-free, open-source and immutability properties. It is a suitable general-purpose technology layer for building and testing applications without the limitations associated with centralised technologies, such as high proprietary fees, vendor lock and intellectual property restrictions.

Findings

The research demonstrates how a blockchain application can integrate siloed construction workflows such as cash flow scheduling, supply chain management and payment executions, reducing the management workload for implementing PBAs in construction projects. Furthermore, the proposed application is open-source and replicable, and its user interface is available for external testing here: https://console.atra.io/app/bf26f846-7f16-4f80-90a0-c5488ab6edd3.

Originality/value

PBA is a suitable test case because it enforces an auditable, transparent and neutral account, which are inbuilt properties of blockchains; thus, both systems are harmonious to integrate. PBA is mandated in UK public sector construction projects; therefore, the research has a solid practical foundation.

Details

Construction Innovation , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1471-4175

Keywords

Article
Publication date: 12 April 2023

Zijun Mao and Yuqian Zhu

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Abstract

Purpose

The study focuses on influential factors of collaboration on government data security by the Chinese government.

Design/methodology/approach

The article explores the case of e-government in the Chinese centralized unitary state system context, using a structured–pragmatic–situational (SPS) approach and the boundary theory as an analytical lens.

Findings

The findings indicate that e-government operates in highly interconnected environments where the safe flow of government data requires collaborative and cross-boundary strategies. Any organization is a potential “weakest link”. In addition, collaboration is fragmented by ambiguous accountability and organizational inertia across government departments, resources differences and limited visibility and measurability of security efforts across government levels and conflicts and uncertainties in principal–agent relationships. The solutions for those obstacles are also discussed from the multi-function, multi-level and multi-actor dimensions, respectively. A multi-dimensional overarching security model for the flow of government data is proposed.

Originality/value

The study advances the technology-oriented micro-analysis of previous studies on government data security to cross-organizational revealing at the macrolevel by connecting streams of research in information systems and public administration. These findings will contribute to making the safe flow of government data more resilient in the transformation of e-government.

Details

Aslib Journal of Information Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran and Kamal Gulati

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…

Abstract

Purpose

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with multiple gateways. It entails IoMT devices and wearables connecting to exchange sensitive data with a sensor node which performs the aggeration process and then communicates the data using a Fog server. If the aggregator sensor loses the connection from the Fog server, it will be unable to submit data directly to the Fog server. The node transmits encrypted information with a neighboring sensor and sends it to the Fog server integrated with federated learning, which encrypts data to the existing data. The fog server performs the operations on the measured data, and the values are stored in the local storage area and later it is updated to the cloud server.

Design/methodology/approach

SHDCT uses an Internet-of-things (IoT)-based monitoring network, making it possible for smart devices to connect and interact with each other. The main purpose of the monitoring network has been in the collection of biological data and additional information from mobile devices to the patients. The monitoring network is composed of three different types of smart devices that is at the heart of the IoT.

Findings

It has been addressed in this work how to design an architecture for safe data aggregation in heterogeneous IoT-federated learning-enabled wireless sensor networks (WSNs), which makes use of basic encoding and data aggregation methods to achieve this. The authors suggest that the small gateway node (SGN) captures all of the sensed data from the SD and uses a simple, lightweight encoding scheme and cryptographic techniques to convey the data to the gateway node (GWN). The GWN gets all of the medical data from SGN and ensures that the data is accurate and up to date. If the data obtained is trustworthy, then the medical data should be aggregated and sent to the Fog server for further processing. The Java programming language simulates and analyzes the proposed SHDCT model for deployment and message initiation. When comparing the SHDCT scheme to the SPPDA and electrohydrodynamic atomisation (EHDA) schemes, the results show that the SHDCT method performs significantly better. When compared with the SPPDA and EHDA schemes, the suggested SHDCT plan necessitates a lower communication cost. In comparison to EHDA and SPPDA, SHDCT achieves 4.72% and 13.59% less, respectively. When compared to other transmission techniques, SHDCT has a higher transmission ratio. When compared with EHDA and SPPDA, SHDCT achieves 8.47% and 24.41% higher transmission ratios, respectively. When compared with other ways it uses less electricity. When compared with EHDA and SPPDA, SHDCT achieves 5.85% and 18.86% greater residual energy, respectively.

Originality/value

In the health care sector, a series of interconnected medical devices collect data using IoT networks in the health care domain. Preventive, predictive, personalized and participatory care is becoming increasingly popular in the health care sector. Safe data collection and transfer to a centralized server is a challenging scenario. This study presents a mechanism for SHDCT. The mechanism consists of Smart healthcare IoT devices working on federated learning that link up with one another to exchange health data. Health data is sensitive and needs to be exchanged securely and efficiently. In the mechanism, the sensing devices send data to a SGN. This SGN uses a lightweight encoding scheme and performs cryptography techniques to communicate the data with the GWN. The GWN gets all the health data from the SGN and makes it possible to confirm that the data is validated. If the received data is reliable, then aggregate the medical data and transmit it to the Fog server for further process. The performance parameters are compared with the other systems in terms of communication costs, transmission ratio and energy use.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 9 January 2024

Gifty Kenetey and Boris Popesko

This study aimed to examine the adoption of consortium blockchain technology to ensure interoperability for the transparency of budgetary control in Ghanaian local government.

Abstract

Purpose

This study aimed to examine the adoption of consortium blockchain technology to ensure interoperability for the transparency of budgetary control in Ghanaian local government.

Design/methodology/approach

This study is based on the design science research (DSR) observational technique for developing a consortium blockchain budgetary control system for Ghana's local government.

Findings

The study resulted in the design of a consortium blockchain monitoring and evaluation system to set up a mechanism to monitor various budget projects, processes and transactions for Ghana's local government. The findings also proved Ghana is ideally positioned to gain an advantage from designed artefacts such as ours, given its digital financial service (DFS) policy. In addition, the evaluation of the designed artefact proves there will be a positive impact on budgetary processes by addressing transparency concerns; however, the success of this concern depends on how the local government organisation embraces the artefact.

Research limitations/implications

The study sheds light on budget monitoring and evaluation tied to peer-to-peer (P2P) participation in the public sector via an advanced administrative digitalised networking and communication algorithm (A Distributed Ledger Technology - blockchain). The difference between the designed artefact and the traditional M&E system is argued. The study is limited by the paradoxes and inefficiencies of the integration of blockchain into the Ghanaian local government but, at the same time, presents a high level of certainty and possibility.

Practical implications

The proposed artefact has presented relevance because it is a new solution to existing concerns like trust, transparency, accountability and compliance, thereby improving local government budget administration.

Originality/value

The study has offered unique and new methods, guidelines and designs for tracking various budget projects and processes beyond the conventional technology-driven approach via DSR, exhibiting a unique solution for solving budget transparency, trust, accountability, compliance and data accessibility concerns.

Details

International Journal of Public Sector Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0951-3558

Keywords

Open Access
Article
Publication date: 26 February 2021

Viktor Elliot, Jonas Floden, Conny Overland, Zeeshan Raza, Miroslaw Staron, Johan Woxenius, Abhinayan Basu, Trisha Rajput, Gerardo Schneider and Gunnar Stefansson

The purpose of this paper is to study current practices in adopting blockchain technology amongst export companies in West Sweden and to capture their CEOs’ knowledge of and…

1918

Abstract

Purpose

The purpose of this paper is to study current practices in adopting blockchain technology amongst export companies in West Sweden and to capture their CEOs’ knowledge of and attitudes towards blockchains.

Design/methodology/approach

Factors enabling or hindering the adoption of blockchains were identified from a comprehensive literature review and a survey of 72 chief executive officers (CEOs) of export-oriented firms in West Sweden, all with turnovers exceeding €2m, regarding their knowledge of and attitudes towards blockchains.

Findings

Blockchain technology is not currently perceived to provide benefits that would outweigh the costs of introducing it into West Sweden’s export firms. Nevertheless, the findings suggest that such technology, though currently too immature to meet today’s industrial requirements, could experience more widespread use if certain key factors (i.e. lower cost, traceability, improved security or trustworthiness and new blockchain-enabled business models) are prioritised.

Research limitations/implications

Answered by 72 CEOs, the survey achieved a response rate of 6%, meaning that the findings are only exploratory. Even so, they offer new insights into CEOs’ attitudes towards blockchain technology.

Practical implications

The CEOs reported comparatively limited knowledge of and experience with implementing blockchains, the lack of which has hampered their large-scale implementation in multi-actor supply chains.

Social implications

Negative sentiment amongst CEOs towards blockchain technology may lower on-the-job satisfaction amongst tech personnel aspiring to develop and implement blockchain applications in their firms.

Originality/value

Knowledge of and attitudes towards blockchain technology amongst top-level managers, as well as about factors enabling or hindering its adoption, guide managers in crafting strategies for implementing blockchains in their organisations and maximising the benefits therein. Unlike past studies focussing on technological aspects or views of experts and middle-management, the study was designed to capture the views of CEOs.

Details

Journal of Global Operations and Strategic Sourcing, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2398-5364

Keywords

Article
Publication date: 9 April 2024

Shuai Zhan and Zhilan Wan

The credit of agricultural product quality and safety reflects the ability of the main actors involved in the supply chain to provide reliable agricultural products to consumers…

Abstract

Purpose

The credit of agricultural product quality and safety reflects the ability of the main actors involved in the supply chain to provide reliable agricultural products to consumers. To fundamentally solve the problem of agricultural product quality and safety, it is worth studying how to make the credit awareness and integrity self-discipline of the supply chain agriculture-related subjects strengthened and the role and value of credit supervision given full play. Starting from the application of blockchain in the agricultural product supply chain, this paper aims to investigate the main factors affecting the credit regulation of agricultural product quality.

Design/methodology/approach

Using the DEMATEL-ISM (decision-making trial and evaluation laboratory–interpretative structural modeling) method, we analyze the credit influencing factors of agricultural quality and safety empowered by blockchain technology, find the causal relationship between the crucial influencing factors and deeply explore the hierarchical transmission relationship between the influencing factors. Then, the path analysis in structural equation modeling is utilized to verify and measure the significance and effect value of the transmission relationship among the crucial influencing factors of credit regulation.

Findings

The results show that the quality and safety credit regulation of agricultural products is influenced by a combination of direct and deep influencing factors. Long-term stable cooperative relationship, Quality and safety credit evaluation, Supply chain risk control ability, Quality and safety testing, Constraints of the smart contract are the main influence path of blockchain embedded in agricultural product supply chain quality and safety credit supervision.

Originality/value

Credit supervision is an important means to improve the ability and level of social governance and standardize the market order. From the perspective of blockchain embedded in the agricultural supply chain, the regulatory body is transformed from the product body to the supply chain body. Take the credit supervision of supply chain subjects as the basis of agricultural product quality supervision. With the help of blockchain technology to improve the effectiveness of agricultural product quality and safety credit supervision, credit supervision is used to constrain and incentivize the behavior of agricultural subjects.

Details

Industrial Management & Data Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0263-5577

Keywords

1 – 10 of 91