دانلود و نمایش مقالات مرتبط با Securing::صفحه 1
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Securing

تعداد مقالات یافته شده: 65
ردیف عنوان نوع
1 Intelligent authentication of 5G healthcare devices: A survey
احراز هویت هوشمند دستگاه های مراقبت بهداشتی 5G: یک مرور-2022
The dynamic nature of wireless links and the mobility of devices connected to the Internet of Things (IoT) over fifth-generation (5G) networks (IoT-5G), on the one hand, empowers pervasive healthcare applications. On the other hand, it allows eavesdroppers and other illegitimate actors to access secret information. Due to the poor time efficiency and high computational complexity of conventional cryptographic methods and the heterogeneous technologies used, it is easy to compromise the authentication of lightweight wearable and healthcare devices. Therefore, intelligent authentication, which relies on artificial intelligence (AI), and sufficient network resources are extremely important for securing healthcare devices connected to IoT- 5G. This survey considers intelligent authentication and includes a comprehensive overview of intelligent authentication mechanisms for securing IoT-5G devices deployed in the healthcare domain. First, it presents a detailed, thoughtful, and state-of-the-art review of IoT-5G, healthcare technologies, tools, applications, research trends, challenges, opportunities, and solutions. We selected 20 technical articles from those surveyed based on their strong overlaps with IoT, 5G, healthcare, device authentication, and AI. Second, IoT-5G device authentication, radiofrequency fingerprinting, and mutual authentication are reviewed, characterized, clustered, and classified. Third, the review envisions that AI can be used to integrate the attributes of the physical layer and 5G networks to empower intelligent healthcare devices. Moreover, methods for developing intelligent authentication models using AI are presented. Finally, the future outlook and recommendations are introduced for IoT-5G healthcare applications, and recommendations for further research are presented as well. The remarkable contributions and relevance of this survey may assist the research community in understanding the research gaps and the research opportunities relating to the intelligent authentication of IoT-5G healthcare devices.
keywords: اینترنت اشیا (IoT) | امنیت اینترنت اشیا | احراز هویت دستگاه | هوش مصنوعی | امنیت مراقبت های بهداشتی | شبکه های 5g | InternetofThings(IoT) | InternetofThingssecurity | Deviceauthentication | Artificialintelligence | Healthcaresecurity | 5Gnetworks
مقاله انگلیسی
2 Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications
اجرای کارآمد توابع هش سبک در GPU و کامپیوترهای کوانتومی برای کاربردهای اینترنت اشیا-2022
Secure communication is important for Internet of Things (IoT) applications, to avoid cybersecurity attacks. One of the key security aspects is data integrity, which can be protected by employing cryptographic hash functions. Recently, US National Institute of Standards and Technology (NIST) announced a competition to standardize lightweight hash functions, which can be used in IoT applications. IoT communication involves various hardware platforms, from low-end microcontrollers to high-end cloud servers with GPU accelerators. Since many sensor nodes are connected to the gateway devices and cloud servers, performing high throughput integrity check is important to secure IoT applications. However, this is a time consuming task even for high-end servers, which may affect the response time in IoT systems. Moreover, no prior work had evaluated the performance of NIST candidates on contemporary processors like GPU and quantum computers. In this study, we showed that with carefully crafted implementation techniques, all the finalist hash function candidates in the NIST standardization competition can achieve high throughput (up-to 1,000 Gbps) on a RTX 3080 GPU. This research output can be used by IoT gateway devices and cloud servers to perform data integrity checks at high speed, thus ensuring a timely response. In addition, this is also the first study that showcase the implementation of NIST lightweight hash functions on a quantum computer (ProjectQ). Besides securing the communication in IoT, these efficient implementations on a GPU and quantum computer can be used to evaluate the strength of respective hash functions against brute-force attack.
INDEX TERMS: Graphics processing units (GPU) | hash function | lightweight cryptography | quantum computer.
مقاله انگلیسی
3 Securing wireless communications from the perspective of physical layer: A survey
ایمن سازی ارتباطات بی سیم از دیدگاه لایه فیزیکی: یک مرور-2022
Ultra-reliability low-latency communication (uRLLC) is a new service category of the fifthgeneration (5G) mobile wireless networks, also plays a crucial role in the sixth-generation (6G) networks. Given the openness of the wireless environment, the security and confidentiality of uRLLC are of utmost important. Since traditional cryptography methods often feature significant complex designs and processing delays, physical layer security (PLS) technologies exploiting the inherent properties of the wireless medium have become a promising solution to secure wireless communications. However, most existing PLS methods assume a finite block-length regime, which cannot cater to uRLLC with short block-lengths. In this paper, the PLS technologies for uRLLC were comprehensively investigated. First, we reviewed the typical characteristics of the next-generation mobile networks and analyzed the threats faced by the physical layer. Then, we introduced the traditional solutions and performance metrics of PLS with a finite blocklength regime. Furthermore, we discussed several physical layer technologies and observed their influence on PLS. Additionally, this study also analyzed the impact of the unique characteristics of 5G networks on communication securit, such as the mobility.
Keywords: uRLLC | Wireless networks | Security and confidentiality | PLS | Finite block-length
مقاله انگلیسی
4 Deep Q learning based secure routing approach for OppIoT networks
رویکرد مسیریابی ایمن مبتنی بر یادگیری Q برای شبکه های OppIoT-2022
Opportunistic IoT (OppIoT) networks are a branch of IoT where the human and machines collaborate to form a network for sharing data. The broad spectrum of devices and ad-hoc nature of connections, further alleviate the problem of network and data security. Traditional approaches like trust based approaches or cryptographic approaches fail to preemptively secure these networks. Machine learning (ML) approaches, mainly deep reinforcement learning (DRL) methods can prove to be very effective in ensuring the security of the network as they are profoundly capable of solving complex and dynamic problems. Deep Q-learning (DQL) incorporates deep neural network in the Q learning process for dealing with high-dimensional data. This paper proposes a routing approach for OppIoT, DQNSec, based on DQL for securing the network against attacks viz. sinkhole, hello flood and distributed denial of service attack. The actor–critic approach of DQL is utilized and OppIoT is modeled as a Markov decision process (MDP). Extensive simulations prove the efficiency of DQNSec in comparison to other ML based routing protocols, viz. RFCSec, RLProph, CAML and MLProph.
Keywords: OppIoT | Reinforcement learning | Deep learning | Deep Q-learning | Markov decision process | Sinkhole attack | Hello flood attack | Distributed denial of service attack
مقاله انگلیسی
5 A comprehensive survey on the biometric systems based on physiological and behavioural characteristics
مرور جامع سیستم های بیومتریک بر اساس ویژگی های فیزیولوژیکی و رفتاری-2021
With the fast increasing of the electronic crimes and their related issues, deploying a reliable user authentication system became a significant task for both of access control and securing user’s private data. Human biometric characteristics such as voice, finger, iris scanning, face, signature and other features provide a dependable security level for both of the personal and the public use. Many biometric authentication systems have been approached for long time. Due to the uniqueness of human biometrics witch played a master role in degrading imposters’ attacks. Such authentication models have overcome other traditional security methods like passwords and PIN. This paper aims to briefly address the psychological biometric authentication techniques and a brief summary to the advantages, disadvantages of each method. Main contribution it found that used EEG signals, as biometrics is the best technique compare to with five other techniques.© 2021 Elsevier Ltd. All rights reserved. Selection and peer-review under responsibility of the scientific committee of the International Conference on Nanoelectronics, Nanophotonics, Nanomaterials, Nanobioscience & Nanotechnology.
Keywords: Biometrics | Physiological | Behavioral | Identification | Techniques
مقاله انگلیسی
6 Design of a fingerprint template protection scheme using elliptical structures
طراحی طرح محافظت از اثر انگشت با استفاده از ساختارهای بیضوی-2021
Although biometric authentication is viewed as more prominent than password or token-based methodology in identity verification, biometric templates are vulnerable to attacks. This paper proposes a new approach for securing fingerprint templates using elliptical structures generated from the fingerprint minutiae. Authors generate a feature vector from the ellipse and will be projected onto a 3D-space to compute a binary string. The resultant binary string is transformed to frequency domain (DFT) and multiplied with a user specific random matrix to make it permanently non-invertible and secure. The results show the efficacy of the proposed method for protecting the fingerprints. c 2021 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Fingerprint | Ellipse | Discrete Fourier transform | Template protection
مقاله انگلیسی
7 PlexNet: A fast and robust ECG biometric system for human recognition
PlexNet: یک سیستم بیومتریک ECG سریع و قوی برای تشخیص انسان-2021
Researchers have explored the potential of electrocardiogram (ECG) to use as biometrics from past two decades. ECG has the inherent feature of vitality for securing the biometric system from fraudulent attacks. This paper proposes a novel ensemble of the state-of-the- art pre-trained deep neural networks i.e., ResNet and DenseNet for ECG biometric recognition. The principle of transfer learning is utilized to prepare fine-tuned models. The gathered knowledge of four fine-tuned models is fused to prepare one stacking model i.e., ‘PlexNet’. The PlexNet takes advantage of transfer learning along with ensemble learning, thus making a novel model for ECG biometrics that is robust and secure than other met ods using deep networks. Two public datasets PTB and CYBHI are tested on the proposed ensemble for human identification. The experimental results demonstrate the efficacy of the model with identification accuracy reported the best as 99.66% on healthy and unhealthy subjects. Finally, the proposed ECG biometric method proves its robustness from signal acquisition methods, size of datasets, and subject health statuses.© 2021 Elsevier Inc. All rights reserved.
Keywords: Biometric Identification | Electrocardiogram | PlexNet | ResNet | DenseNet
مقاله انگلیسی
8 Touch-based continuous mobile device authentication: State-of-the-art, challenges and opportunities
احراز هویت پیوسته دستگاه تلفن همراه مبتنی بر لمس: آخرین فن آوری ، چالش ها و فرصت ها-2021
The advancement in the computational capability and storage size of a modern mobile device has evolved it into a multi-purpose smart device for individual and business needs. The increasing usage of this device has led to the need for a secure and efficient authentication mechanism. For securing mobile devices, password, PIN, and swipe patterns are commonly used for user authentication. Entry-point face and fingerprint recognition have also gained traction in the past years. However, these authentication schemes cannot authenticate a user after the initial-login session. This limitation might put the device exposed to information theft and leakage if an illegitimate user could bypass the initial-login session. Therefore, a mobile device needs a continuous authentication mechanism that can protect a user throughout the entire working session, which complements the initial-login authentication to provide more comprehensive security protection. Touch biometric is a behavioural biometric that represents the touch behaviour pattern of a user when interacting with the touchscreen of the device. Touch biometric has been proposed as a continuous authentication mechanism, where the device can collect touch biometric data transparently while a user is using the device. However, there are still plenty of challenges and obstacles in touch-based continuous mobile device authentication due to its challenges as a biometric modality. This paper provides a comprehensive overview of fundamental principles that underpin touch-based continuous mobile device authentication. Our work discusses state-of- the-art methods in touch data acquisition, behavioural feature extraction, user classification, and evaluation methods. This paper also discusses some challenges and opportunities in the current touch-based continuous mobile device authentication domain to obtain a broad research community and market acceptance.
Keywords: Biometrics | Mobile device security | Continuous authentication | Touch biometric
مقاله انگلیسی
9 Industrial smart and micro grid systems e A systematic mapping study
سیستم های هوشمند و ریز شبکه صنعتی و یک مطالعه نقشه برداری منظم-2020
Energy efficiency and management is a fundamental aspect of industrial performance. Current research presents smart and micro grid systems as a next step for industrial facilities to operate and control their energy use. To gain a better understanding of these systems, a systematic mapping study was conducted to assess research trends, knowledge gaps and provide a comprehensive evaluation of the topic. Using carefully formulated research questions the primary advantages and barriers to implementation of these systems, where the majority of research is being conducted with analysis as to why and the relative maturity of this topic are all thoroughly evaluated and discussed. The literature shows that this topic is at an early stage but already the benefits are outweighing the barriers. Further incorporation of renewables and storage, securing a reliable energy supply and financial gains are presented as some of the major factors driving the implementation and success of this topic.
Keywords: Industrial smart grid | Industrial micro grid | Systematic mapping study | Strategic energy management | Industrial facility optimization | Renewable energy resources
مقاله انگلیسی
10 Restricting alcohol outlet density through cumulative impact provisions in planning law: Challenges and opportunities for local governments
محدود کردن تراکم خروجی الکل از طریق مقررات تأثیر تجمعی در قانون برنامه ریزی: چالش ها و فرصت هایی برای دولت های محلی-2020
Introduction: There is international interest in how to limit growth in alcohol availability in areas of high outlet density in order to reduce alcohol-related harms. Town planning legislation in Victoria, Australia, allows local government officers to refuse planning permits for new licensed premises on ‘cumulative impact’ grounds (impacts from existing alcohol outlet density). State guidelines (PN61) outline how local government planners should approach cumulative impact assessments. This paper explores officers’ views and experience assessing cumulative impact in order to understand whether the legislation assists officers limit alcohol availability in areas of high outlet density. Methods: Interviews with 22 officers from 11 local governments who were recruited with purposive sampling to reflect a range of licensing environments. Interview transcripts were analysed inductively, and content categorized accordingly. Findings: Officers challenged the definition and relevance of the alcohol outlet density threshold provided in state guidelines. They faced problems securing relevant amenity data for assessing cumulative impact and pointed to the guidelines’ inadequacy for assessing off-premise licences. They pointed to the limits of cumulative impact assessments as a tool for planning and were unconvinced they would lead to reductions in permits granted. Conclusions: A single state-wide density threshold to guide cumulative impact assessments is unlikely to be a relevant measure for several local governments. A greater orientation towards municipal variation and alcohol outlet characteristics is needed. Further research is needed to investigate whether cumulative impact assessments increase restrictions on liquor licence planning permits and whether the adoption of local planning policies strengthens restrictive permit decision-making. International implications of the research are noted.
Keywords: Alcohol availability | Outlet density | Cumulative impact | Local government | Planning policy
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 11629 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 11629 :::::::: افراد آنلاین: 88