Search results

1 – 9 of 9
Article
Publication date: 30 April 2024

C. Bharanidharan, S. Malathi and Hariprasath Manoharan

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems…

Abstract

Purpose

The potential of vehicle ad hoc networks (VANETs) to improve driver and passenger safety and security has made them a hot topic in the field of intelligent transportation systems (ITSs). VANETs have different characteristics and system architectures from mobile ad hoc networks (MANETs), with a primary focus on vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. But protecting VANETs from malicious assaults is crucial because they can undermine network security and safety.

Design/methodology/approach

The black hole attack is a well-known danger to VANETs. It occurs when a hostile node introduces phony routing tables into the network, potentially damaging it and interfering with communication. A safe ad hoc on-demand distance vector (AODV) routing protocol has been created in response to this issue. By adding cryptographic features for source and target node verification to the route request (RREQ) and route reply (RREP) packets, this protocol improves upon the original AODV routing system.

Findings

Through the use of cryptographic-based encryption and decryption techniques, the suggested method fortifies the VANET connection. In addition, other network metrics are taken into account to assess the effectiveness of the secure AODV routing protocol under black hole attacks, including packet loss, end-to-end latency, packet delivery ratio (PDR) and routing request overhead. Results from simulations using an NS-2.33 simulator show how well the suggested fix works to enhance system performance and lessen the effects of black hole assaults on VANETs.

Originality/value

All things considered, the safe AODV routing protocol provides a strong method for improving security and dependability in VANET systems, protecting against malevolent attacks and guaranteeing smooth communication between cars and infrastructure.

Details

International Journal of Intelligent Unmanned Systems, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 5 April 2024

Lida Haghnegahdar, Sameehan S. Joshi, Rohith Yanambaka Venkata, Daniel A. Riley and Narendra B. Dahotre

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems…

19

Abstract

Purpose

Additive manufacturing also known as 3D printing is an evolving advanced manufacturing technology critical for the new era of complex machinery and operating systems. Manufacturing systems are increasingly faced with risk of attacks not only by traditional malicious actors such as hackers and cyber-criminals but also by some competitors and organizations engaged in corporate espionage. This paper aims to elaborate a plausible risk practice of designing and demonstrate a case study for the compromised-based malicious for polymer 3D printing system.

Design/methodology/approach

This study assumes conditions when a machine was compromised and evaluates the effect of post compromised attack by studying its effects on tensile dog bone specimens as the printed object. The designed algorithm removed predetermined specific number of layers from the tensile samples. The samples were visually identical in terms of external physical dimensions even after removal of the layers. Samples were examined nondestructively for density. Additionally, destructive uniaxial tensile tests were carried out on the modified samples and compared to the unmodified sample as a control for various mechanical properties. It is worth noting that the current approach was adapted for illustrating the impact of cyber altercations on properties of additively produced parts in a quantitative manner. It concurrently pointed towards the vulnerabilities of advanced manufacturing systems and a need for designing robust mitigation/defense mechanism against the cyber altercations.

Findings

Density, Young’s modulus and maximum strength steadily decreased with an increase in the number of missing layers, whereas a no clear trend was observed in the case of % elongation. Post tensile test observations of the sample cross-sections confirmed the successful removal of the layers from the samples by the designed method. As a result, the current work presented a cyber-attack model and its quantitative implications on the mechanical properties of 3D printed objects.

Originality/value

To the best of the authors’ knowledge, this is the original work from the team. It is currently not under consideration for publication in any other avenue. The paper provides quantitative approach of realizing impact of cyber intrusions on deteriorated performance of additively manufactured products. It also enlists important intrusion mechanisms relevant to additive manufacturing.

Details

Rapid Prototyping Journal, vol. 30 no. 4
Type: Research Article
ISSN: 1355-2546

Keywords

Article
Publication date: 19 July 2023

Hamid Reza Nikkhah, Varun Grover and Rajiv Sabherwal

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of…

Abstract

Purpose

This study aims to argue that user’s continued use behavior is contingent upon two perceptions (i.e. the app and the provider). This study examines the moderating effects of user’s perceptions of apps and providers on the effects of security and privacy concerns and investigate whether assurance mechanisms decrease such concerns.

Design/methodology/approach

This study conducts a scenario-based survey with 694 mobile cloud computing (MCC) app users to understand their perceptions and behaviors.

Findings

This study finds that while perceived value of data transfer to the cloud moderates the effects of security and privacy concerns on continued use behavior, trust only moderates the effect of privacy concerns. This study also finds that perceived effectiveness of security and privacy intervention impacts privacy concerns but does not decrease security concerns.

Originality/value

Prior mobile app studies mainly focused on mobile apps and did not investigate the perceptions of app providers along with app features in the same study. Furthermore, International Organization for Standardization 27018 certification and privacy policy notification are the interventions that exhibit data assurance mechanisms. However, it is unknown whether these interventions are able to decrease users’ security and privacy concerns after using MCC apps.

Details

Information & Computer Security, vol. 32 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

Open Access
Article
Publication date: 5 October 2023

Peter Dornheim and Ruediger Zarnekow

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated…

1072

Abstract

Purpose

The human factor is the most important defense asset against cyberattacks. To ensure that the human factor stays strong, a cybersecurity culture must be established and cultivated in a company to guide the attitudes and behaviors of employees. Many cybersecurity culture frameworks exist; however, their practical application is difficult. This paper aims to demonstrate how an established framework can be applied to determine and improve the cybersecurity culture of a company.

Design/methodology/approach

Two surveys were conducted within eight months in the internal IT department of a global software company to analyze the cybersecurity culture and the applied improvement measures. Both surveys comprised the same 23 questions to measure cybersecurity culture according to six dimensions: cybersecurity accountability, cybersecurity commitment, cybersecurity necessity and importance, cybersecurity policy effectiveness, information usage perception and management buy-in.

Findings

Results demonstrate that cybersecurity culture maturity can be determined and improved if accurate measures are derived from the results of the survey. The first survey showed potential for improving the dimensions of cybersecurity accountability, cybersecurity commitment and cybersecurity policy effectiveness, while the second survey proved that these dimensions have been improved.

Originality/value

This paper proves that practical application of cybersecurity culture frameworks is possible if they are appropriately tailored to a given organization. In this regard, scientific research and practical application combine to offer real value to researchers and cybersecurity executives.

Details

Information & Computer Security, vol. 32 no. 2
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 15 February 2024

Bokolo Anthony Jnr

Presently, existing electric car sharing platforms are based on a centralized architecture which are faced with inadequate trust and pricing issues as these platforms requires an…

Abstract

Purpose

Presently, existing electric car sharing platforms are based on a centralized architecture which are faced with inadequate trust and pricing issues as these platforms requires an intermediary to maintain users’ data and handle transactions between participants. Therefore, this article aims to develop a decentralized peer-to-peer electric car sharing prototype framework that offers trustable and cost transparency.

Design/methodology/approach

This study employs a systematic review and data were collected from the literature and existing technical report documents after which content analysis is carried out to identify current problems and state-of-the-art electric car sharing. A use case scenario was then presented to preliminarily validate and show how the developed prototype framework addresses the trust-lessness in electric car sharing via distributed ledger technologies (DLTs).

Findings

Findings from this study present a use case scenario that depicts how businesses can design and implement a distributed peer-to-peer electric car sharing platforms based on IOTA technology, smart contracts and IOTA eWallet. Main findings from this study unlock the tremendous potential of DLT to foster sustainable road transportation. By employing a token-based approach this study enables electric car sharing that promotes sustainable road transportation.

Practical implications

Practically the developed decentralized prototype framework provides improved cost transparency and fairness guarantees as it is not based on a centralized price management system. The DLT based decentralized prototype framework aids to orchestrate the incentivize monetization and rewarding mechanisms among participants that share their electric cars enabling them to collaborate towards lessening CO2 emissions.

Social implications

The findings advocate that electric vehicle sharing has become an essential component of sustainable road transportation by increasing electric car utilization and decreasing the number of vehicles on the road.

Originality/value

The key novelty of the article is introducing a decentralized prototype framework to be employed to develop an electric car sharing solution without a central control or governance, which improves cost transparency. As compared to prior centralized platforms, the prototype framework employs IOTA technology smart contracts and IOTA eWallet to improve mobility related services.

Details

Smart and Sustainable Built Environment, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2046-6099

Keywords

Article
Publication date: 22 February 2024

Ankit Suri, Yogesh Sharma, Lokesh Jindal and Rajeev Sijariya

The purpose of this study is to investigate the role of blockchain technology in reducing online fraud among Gen Y and Gen Z.

Abstract

Purpose

The purpose of this study is to investigate the role of blockchain technology in reducing online fraud among Gen Y and Gen Z.

Design/methodology/approach

This study uses a two-phase approach. Firstly, a systematic literature review is conducted to examine various aspects of blockchain technology and cyber security. Secondly, the Technology Adoption Model is used to study the adoption dynamics of blockchain-based platforms for online data exchange among 415 Gen Y and Z users.

Findings

The results indicate that efficiency and security, perceived ease of use, perceived usefulness, and trust have a positive effect on behavioral intention and attitude towards use. This is the first study to examine the role of blockchain technology to reduce fraud among Gen Y and Gen Z.

Originality/value

This study provides new insights into the adoption of blockchain-based platforms for online data exchange among Gen Y and Gen Z. The study highlights the critical areas of concern for the adoption of blockchain technology and provides managerial implications for fintech firms, banks, and e-commerce platforms. It is unique in its focus on the potential for blockchain technology to reduce fraud among Gen Y and Gen Z, which has not been previously explored in the literature.

Details

International Journal of Quality & Reliability Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0265-671X

Keywords

Article
Publication date: 24 July 2023

Aline Renda and Stefano Caneppele

Criminals have quickly discovered the advantage of crypto assets, with its pseudo-anonymity, untraceability and the ability to freely exchange crypto assets across borders, which…

Abstract

Purpose

Criminals have quickly discovered the advantage of crypto assets, with its pseudo-anonymity, untraceability and the ability to freely exchange crypto assets across borders, which makes it an ideal tool for money laundering activities. Switzerland has a technology-neutral framework, and crypto assets are regulated by the existing anti-money laundering (AML) legislation. The purpose of this paper is to gain insights into the industry adoption of measurements to prevent money laundering through crypto assets and if they are compliant with national and international AML regulations.

Design/methodology/approach

Semi-structured expert interviews were conducted with participants having expertise in compliance, AML and crypto assets with focus on Switzerland. The interviews were analyzed using the thematic analysis.

Findings

The experts have a general consensus that Switzerland is a pioneer when it comes to regulating crypto assets. It is perceived that legislations are released without industry consultation and that AML processes for fiat transactions also work for crypto assets, which is not the case. The results show that the industry wants a consortium to fight money laundering in crypto assets in Switzerland. The current measures to identify money laundering are not optimal, yet, it is the best solution and according to national and international regulations the businesses are perceived to be compliant.

Originality/value

This paper offers new insights on the challenges of AML regulations in crypto assets, given the limited information available. It also provides good practice examples for addressing these challenges, benefiting policymakers, regulators and practitioners in the crypto asset ecosystem.

Details

Journal of Money Laundering Control, vol. 27 no. 2
Type: Research Article
ISSN: 1368-5201

Keywords

Article
Publication date: 17 November 2023

Dien Van Tran, Phuong Van Nguyen, Anh Thi Chau Nguyen, Demetris Vrontis and Phuong Uyen Dinh

This study aims to investigate the impact of employees’ engagement in government social media (GSM) on their cybersecurity compliance attitude, protection motivation and…

Abstract

Purpose

This study aims to investigate the impact of employees’ engagement in government social media (GSM) on their cybersecurity compliance attitude, protection motivation and protective behavior, thereby contributing to effective cybersecurity practices at organizations.

Design/methodology/approach

A quantitative cross-sectional field survey was conducted to collect primary data in big cities and large provinces in Vietnam. The final data set of 323 responses was analyzed using the partial least squares-structural equation modeling approach to interpret the results and test research hypotheses.

Findings

Engagement in GSM positively influences employees’ cybersecurity compliance attitude (ATT). Perceived threat vulnerability and response efficacy also contribute to a positive compliance attitude, although self-efficacy has a negative impact. Moreover, the cybersecurity compliance ATT significantly explains the information protection motivation, which in turn influences employee protective behaviors. However, the relationship between compliance attitude and protective behaviors is weak, unlike previous studies that found a strong correlation.

Originality/value

Although recent studies have explored specific information security practices in corporate and home contexts, the influence of GSM on individuals’ cybersecurity behaviors has received limited attention because of its novelty. This study contributes to the existing body of knowledge by investigating the impact of GSM on cybersecurity behaviors. This study provides significant contributions to understanding social media’s effects of social media on individuals’ cultivation processes, by expanding upon the protective motivation theory and cultivation theory. The results lead to practical suggestions for organizational managers and policymakers so that they can enhance their understanding of the importance of cybersecurity, encourage the implementation of self-defense strategies and highlight the significance of threat and coping evaluations in influencing attitudes and motivations.

Details

Journal of Asia Business Studies, vol. 18 no. 1
Type: Research Article
ISSN: 1558-7894

Keywords

Article
Publication date: 16 January 2023

Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…

Abstract

Purpose

The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.

Design/methodology/approach

This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.

Findings

Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.

Originality/value

The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.

Details

International Journal of Pervasive Computing and Communications, vol. 20 no. 1
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 9 of 9