Search results

1 – 10 of over 45000
Article
Publication date: 2 November 2015

Michael Hölzl, Endalkachew Asnake, Rene Mayrhofer and Michael Roland

The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile…

Abstract

Purpose

The purpose of this paper is to design, implement and evaluate the usage of the password-authenticated secure channel protocol SRP to protect the communication of a mobile application to a Java Card applet. The usage of security and privacy sensitive systems on mobile devices, such as mobile banking, mobile credit cards, mobile ticketing or mobile digital identities has continuously risen in recent years. This development makes the protection of personal and security sensitive data on mobile devices more important than ever.

Design/methodology/approach

A common approach for the protection of sensitive data is to use additional hardware such as smart cards or secure elements. The communication between such dedicated hardware and back-end management systems uses strong cryptography. However, the data transfer between applications on the mobile device and so-called applets on the dedicated hardware is often either unencrypted (and interceptable by malicious software) or encrypted with static keys stored in applications.

Findings

To address this issue, this paper presents a solution for fine-grained secure application-to-applet communication based on Secure Remote Password (SRP-6a and SRP-5), an authenticated key agreement protocol, with a user-provided password at run-time.

Originality/value

By exploiting the Java Card cryptographic application programming interfaces (APIs) and minor adaptations to the protocol, which do not affect the security, the authors were able to implement this scheme on Java Cards with reasonable computation time.

Details

International Journal of Pervasive Computing and Communications, vol. 11 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 21 April 2022

Zuanbo Zhou, Wenxin Yu, Junnian Wang, Yanming Zhao and Meiting Liu

With the development of integrated circuit and communication technology, digital secure communication has become a research hotspot. This paper aims to design a five-dimensional…

Abstract

Purpose

With the development of integrated circuit and communication technology, digital secure communication has become a research hotspot. This paper aims to design a five-dimensional fractional-order chaotic secure communication circuit with sliding mode synchronous based on microcontroller (MCU).

Design/methodology/approach

First, a five-dimensional fractional-order chaotic system for encryption is constructed. The approximate numerical solution of fractional-order chaotic system is calculated by Adomian decomposition method, and the phase diagram is obtained. Then, combined with the complexity and 0–1 test algorithm, the parameters of fractional-order chaotic system for encryption are selected. In addition, a sliding mode controller based on the new reaching law is constructed, and its stability is proved. The chaotic system can be synchronized in a short time by using sliding mode control synchronization.

Findings

The electronic circuit is implemented to verify the feasibility and effectiveness of the designed scheme.

Originality/value

It is feasible to realize fractional-order chaotic secure communication using MCU, and further reducing the synchronization error is the focus of future work.

Details

Circuit World, vol. 49 no. 4
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 4 January 2021

Meiting Liu, Wenxin Yu, Junnian Wang, Yu Chen and Yuyan Bian

In this paper, a nine-dimensional chaotic system is designed and applied to secure communication.

Abstract

Purpose

In this paper, a nine-dimensional chaotic system is designed and applied to secure communication.

Design/methodology/approach

Firstly, the equilibrium characteristics, dissipativity, bifurcation diagram and Lyapunov exponent spectrum are used to analyze the relevant characteristics of the proposed nine-dimensional chaotic system. In the analysis of Lyapunov exponential spectrum, when changing the linear parameters, the system shows two states, hyperchaos and chaos. For secure communication, there is a large secret key space. Secondly, C0 complexity and SEcomplexity of the system are analyzed, which shows that the system has sequences closer to random sequences.

Findings

The proposed nine-dimensional system has a large key space and more complex dynamic characteristics

Originality/value

The results show that the proposed nine-dimensional hyperchaotic system has excellent encryption capabilities and can play an important role in the field of secure communication.

Details

Circuit World, vol. 48 no. 1
Type: Research Article
ISSN: 0305-6120

Keywords

Article
Publication date: 28 October 2014

Arijit Ukil, Soma Bandyopadhyay, Abhijan Bhattacharyya, Arpan Pal and Tulika Bose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained…

1507

Abstract

Purpose

The purpose of this paper is to study lightweight security scheme for Internet of Things (IoT) applications using Constrained Application Protocol (CoAP). Resource-constrained characteristics of IoT systems have ushered in compelling requirements for lightweight application protocol and security suites. CoAP has already been established as the candidate protocol for IoT systems. However, low overhead security scheme for CoAP is still an open problem. Existing security solutions like Datagram Transport Layer Security (DTLS) is not suitable, particularly due to its expensive handshaking, public key infrastructure (PKI)-based authentication and lengthy ciphersuite agreement process.

Design/methodology/approach

This paper proposes a lightweight security scheme in CoAP using Advanced Encryption Standard (AES) 128 symmetric key algorithm. The paper presents an object security (payload embedded)-based robust authentication mechanism with integrated key management. The paper introduces few unique modifications to CoAP header to optimize security operation and minimize communication cost.

Findings

It is resilient to number of security attacks like replay attack, meet-in-the-middle attack and secure under chosen plaintext attack. This scheme is generic in nature, applicable for gamut of IoT applications. The paper proves efficacy of our proposed scheme for vehicle tracking application in emulated laboratory setup. Specifically, it compares with DTLS-enabled CoAP to establish the lightweight feature of our proposed solution.

Research limitations/implications

This paper mainly focuses on implementing in-vehicle tracking systems as an IoT application and used CoAP as the application protocol.

Practical implications

Such a lightweight security scheme would provide immense benefit in IoT systems so that resource constraint-sensing devices and nodes can be made secure. This would impact IoT eco systems to a large extent.

Originality/value

Such kind of security suite that provides both robustness and lightweight feature is hitherto not known to the authors, particularly in CoAP for IoT applications.

Details

International Journal of Pervasive Computing and Communications, vol. 10 no. 4
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 13 November 2017

Kushal Anjaria and Arun Mishra

Nowadays, to design the information security mechanism for computing and communication systems, there are various approaches available like cryptographic approach, game-theoretic…

Abstract

Purpose

Nowadays, to design the information security mechanism for computing and communication systems, there are various approaches available like cryptographic approach, game-theoretic approach, quantitative–qualitative analysis-based approach, cognitive-behavioral approach, digital forensic-based approach and swarm computing-based approach. The contemporary research in these various fields is independent in nature. The purpose of this paper is to investigate the relationship between these various approaches to information security and cybernetics.

Design/methodology/approach

To investigate the relationship between information security mechanisms and cybernetics, Norbert Wiener’s concepts and philosophy of the cybernetics have been used in the present work. For a detailed study, concepts, techniques and philosophy of the cybernetics have been extracted from the books of Norbert Wiener titled “The human use of human beings” and “Cybernetics or control and communication in the animal and the machine”.

Findings

By revisiting the concepts of the cybernetics from the information security perspectives, it has been found that the aspects of information security and the aspects of cybernetics have great bonding.

Originality/value

The present paper demonstrates how bonding between cybernetics and information security can be used to solve some of the complex research challenges in information security area.

Details

Kybernetes, vol. 46 no. 10
Type: Research Article
ISSN: 0368-492X

Keywords

Article
Publication date: 11 October 2018

Ansgar Zerfass and Sophia Charlotte Volk

The purpose of this paper is to clarify and demonstrate the core contributions of communication departments to organizational success beyond traditional ideas of messaging or…

5034

Abstract

Purpose

The purpose of this paper is to clarify and demonstrate the core contributions of communication departments to organizational success beyond traditional ideas of messaging or information distribution. The main aim is to develop a better understanding of the different facets of value that the communication function delivers by introducing a distinction between strategic and operational contributions, following established management models.

Design/methodology/approach

The research is based on an extensive literature review at the nexus of communication management and strategic management research and ten qualitative case studies in large, internationally operating German organizations from different industries, combining in-depth interviews and document analyses.

Findings

The newly developed Communications Contributions Framework demonstrates that communications serve the corporation in four strategic and operational dimensions and emphasizes the critical role of communications in reflecting and adjusting organizational strategies, i.e. through identifying opportunities to innovate or securing intangible assets.

Practical implications

The paper outlines different application scenarios for how the new framework can be used in practice, i.e. as a multi-faceted rationale for explaining the impact of communication departments in the language of top management and reporting communication success in the logic of business.

Originality/value

The framework provides the first theoretically and empirically based “big picture” of communications’ contributions to corporate success, designed to lay ground for further discussions both in academia and in practice.

Details

Journal of Communication Management, vol. 22 no. 4
Type: Research Article
ISSN: 1363-254X

Keywords

Article
Publication date: 1 January 2006

Dan Eigeles

Aims to present intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement…

1398

Abstract

Purpose

Aims to present intelligent authentication, authorization, and administration (I3A), a new concept that enables trust and information security between involved sides by agreement, rather than by over‐exercised enforcement. In order to understand the needs and motivators for the concept, seeks to discuss the areas of technology, policies, law, and human mindsets.

Design/methodology/approach

Discussing two examples of possible solutions that would use the concept in e‐commerce.

Findings

Offers an open platform for enabling I3A of cryptographic keys, certificates, and privileges and integrating the use of such with secured applications on a wide variety of devices and environments.

Originality/value

Probably the first real exposition of the new concept I3A.

Details

Information Management & Computer Security, vol. 14 no. 1
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 10 July 2020

A.B. Feroz Khan and Anandharaj G

The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .

Abstract

Purpose

The purpose of the paper is to analyze the layer wise security issues in IoT and to obtain the effective security mechanism for jamming attack .

Design/methodology/approach

In this study, the authors proposed a multi layer security approach for the detection of DDoS in IoT environment, which protects the smart devices from DDoS, this scheme also reduces the computational cost in the network under mobility condition.

Findings

Even though many works have been done for the security of wireless sensor network (WSN), all works have focused on encryption which depends on the key management strategy. In this study, the authors proposed a multilayer approach to analyze the layer wise security issues and also proposed a threshold-based countermeasure (TBC) for replay attack in each layer.

Originality/value

The results indicate that the proposed algorithm lowers the computational costs and energy consumption than in modern schemes. Also, the proposed research work improves the scalability of sensor networks using the TBC.

Details

International Journal of Intelligent Unmanned Systems, vol. 9 no. 3
Type: Research Article
ISSN: 2049-6427

Keywords

Article
Publication date: 24 August 2023

Mustapha Hrouga and Abdelkader Sbihi

This study considers the potential of logistics 4.0 for supply chain (SC) optimization in French retail. The authors investigate the implementation of Industry 4.0 technologies to…

Abstract

Purpose

This study considers the potential of logistics 4.0 for supply chain (SC) optimization in French retail. The authors investigate the implementation of Industry 4.0 technologies to optimize SC performance in the retail sector and SC's role in the digital transformation in supply chain management (SCM).

Design/methodology/approach

The authors first carry out a comprehensive bibliographic taxonomy to highlight the different existing digital tools. Based on this, the authors posed three research questions (RQs) and hypotheses to examine the contribution of logistics 4.0 in improving the performance of retail logistics. Then, the authors considered a case study of retail in France based on qualitative and quantitative analysis to answer all the RQs and examine the hypotheses.

Findings

The results showed that digital tools such as Cyber Security Systems (CSS), Big Data Analytics (BDA) and Blockchain (BC) technology are the most effective and appropriate tools to optimize the SC performance in retail.

Practical implications

This research work showed that the implementation of these tools in retail can offer several benefits such as improved productivity, optimized delivery times, improved inventory management and secure real-time communication, which leads to improved profitability of the SC.

Originality/value

The study opens a door to develop practical roadmaps for companies that enable smart deliveries based on logistics 4.0.

Details

Business Process Management Journal, vol. 29 no. 6
Type: Research Article
ISSN: 1463-7154

Keywords

Book part
Publication date: 1 November 2007

Irina Farquhar and Alan Sorkin

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…

Abstract

This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.

Details

The Value of Innovation: Impact on Health, Life Quality, Safety, and Regulatory Research
Type: Book
ISBN: 978-1-84950-551-2

1 – 10 of over 45000