Abstract: Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.
Abstract: Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.
Abstract: Worldwide Interoperability for Microwave Access, is a broadband technology, which can effectively transmit a data across a group of users using Multicast and Broadcast Service. WiMAX belongs to a family of (IEEE 802.16) standards and is evolving as a fourth generation technology. WiMAX is the next generation technology that offers wireless access over long distances. MBS zone, which is a group of base stations that are broadcasting the same multicast packets which defines Multicast and Broadcast services. Handover is a process of transferring an ongoing call or data session from one channel connected to the core network to another channel. The handover causes authentication, delay, packet loss, jitter that mainly affects the communication. In this paper, we present a survey on handover security issues in WiMAX.
Abstract: Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.
Abstract: The security of the medical images and its related data is the major research area which is to be concentrated in today’s era. Security in the medical image indicates that the physician may hide patients’ related data in the medical image and transfer it safely to a defined location using reversible watermarking. Many reversible watermarking methods had proposed over the decade. This paper enhances the security level in brain tumor images to hide the patient’s detail, which has to be conferred with other physician’s suggestions. The details or the information will be hidden in Non-ROI area of the image by using the block cipher algorithm. The block cipher uses different keys to extract the details that are difficult for the intruder to detect all the keys and to spot the details, which are the key advantage of this method. The ROI is the tumor area and Non-ROI is the area rest of ROI. The Non-ROI should not be spoiled in any cause and the details in the Non-ROI should be extracted correctly. The reversible watermarking method proposed in this paper performs well when compared to existing methods in the process of extraction of an original image and providing information security.
Abstract: Privacy is sacred and would normally be expected and preserved by an individual. Online privacy is no longer about the right to be left alone, but also includes the right not to be monitored. However, with the revelations made by United States National Security Agency former employee Edward Snowden that the government is spying on internet communications, individuals’ privacy can no longer be expected. Therefore, this paper is intended to evaluate law related to privacy protection in the digital domain, who should govern it and whether invasion to a person’s privacy is a necessary justification to preserve national security.
Abstract: The paper is focused on the application of the security
audit method on the selected objects of the critical infrastructure. The
emphasis is put on security audit method to find gaps in the critical
infrastructure security. The theoretical part describes objects of the
critical infrastructure. The practical part describes using of the
security audit method. The main emphasis was put on the protection
of the critical infrastructure in the Czech Republic.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.
Abstract: The security of cloud services is the concern of cloud
service providers. In this paper, we will mention different
classifications of cloud attacks referred by specialized organizations.
Each agency has its classification of well-defined properties. The
purpose is to present a high-level classification of current research in
cloud computing security. This classification is organized around
attack strategies and corresponding defenses.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: The concept of national security in Iran is a
permanently effective factor in acceptance or rejection of many
international obligations. These obligations had been defined
according to the type of legislation of Iran in many aspects.
Therefore, there are several treaties at international level which
requires Iran’s security to come in contact with obligations in these
treaties in a way that an obstacle to join to them and their passage in
parliament. This issue is a typical category which every country pays
attention to be accepted in treaties or to include their national
security in that treaties and also they can see the related treaties from
this perspective, but this issue that 'what is the concept of Iran’s
national security', and 'To what extent it is changed in recent years,
especially after Islamic Revolution' are important issues that can be
criticized. Thus, this study is trying to assess singed treaties from the
perspective of Iran’s national security according of the true meaning
of treaty and to investigate how the international treaties may be in
conflict with Iran’s national security.
Abstract: This article focuses on the issue of airport emergency
plans, which are documents describing reactions to events with
impact on aviation safety or aviation security. The article specifically
focuses on the use and creation of emergency plans, where could be
found a number of disagreements between different stakeholders, for
which the airport emergency plan applies. Those are the friction
surfaces of interfaces, which is necessary to identify and ensure them
smooth process to avoid dangerous situations or delay.
Abstract: Livestock is one of the fastest-growing sectors in
agriculture. If carefully managed, have potential opportunities for
economic growth, food sovereignty and food security. In this study
we mainly analyse and compare long-term i.e. for year 2030 climate
variability impact on predicted productivity of meat i.e. beef, mutton
and poultry for the Kingdom of Saudi Arabia w.r.t three factors i.e. i)
climatic-change vulnerability ii) CO2 fertilization and iii) water
scarcity and compare the results with two countries of the region i.e.
Iraq and Yemen. We do the analysis using data from diverse sources,
which was extracted, transformed and integrated before usage. The
collective impact of the three factors had an overall negative effect on
the production of meat for all the three countries, with adverse impact
on Iraq. High similarity was found between CO2 fertilization
(effecting animal fodder) and water scarcity i.e. higher than that
between production of beef and mutton for the three countries
considered. Overall, the three factors do not seem to be favorable for
the three Middle-East countries considered. This points to possibility
of a vegetarian year 2030 based on dependency on indigenous livestock
population.
Abstract: The goal of this study is to identify success factors
that could influence the ISMS self-implementation in government
sector from qualitative perspective. This study is based on a case
study in one of the Malaysian government agency. Semi-structured
interviews involving five key informants were conducted to examine
factors addressed in the conceptual framework. Subsequently,
thematic analysis was executed to describe the influence of each
factor on the success implementation of ISMS. The result of this
study indicates that management commitment, implementer
commitment and implementer competency are part of the success
factors for ISMS self-implementation in Malaysian Government
Sector.
Abstract: The study of organisations’ information security
cultures has attracted scholars as well as healthcare services industry
to research the topic and find appropriate tools and approaches to
develop a positive culture. The vast majority of studies in Saudi
national health services are on the use of technology to protect and
secure health services information. On the other hand, there is a lack
of research on the role and impact of an organisation’s cultural
dimensions on information security. This research investigated and
analysed the role and impact of cultural dimensions on information
security in Saudi Arabia health service. Hypotheses were tested and
two surveys were carried out in order to collect data and information
from three major hospitals in Saudi Arabia (SA). The first survey
identified the main cultural-dimension problems in SA health
services and developed an initial information security culture
framework model. The second survey evaluated and tested the
developed framework model to test its usefulness, reliability and
applicability. The model is based on human behaviour theory, where
the individual’s attitude is the key element of the individual’s
intention to behave as well as of his or her actual behaviour. The
research identified a set of cultural and sub-cultural dimensions in SA
health information security and services.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: Since large part of electricity is generated by using
fossil based resources, energy is an important agenda for countries. In
this context, renewable energy sources are alternative to conventional
sources due to the depletion of fossil resources, increasing awareness
of climate change and global warming concerns. Solar, wind and
hydropower energy are the main renewable energy sources. Among
of them, since installed capacity of wind power has increased
approximately eight times between 2008 - November of 2014, wind
energy is a promising source for Turkey. Furthermore, signing of
Kyoto Protocol can be accepted as a milestone for Turkey's energy
policy. Turkish Government has announced Vision 2023 (energy
targets by 2023) in 2010-2014 Strategic Plan prepared by Ministry of
Energy and Natural Resources (MENR). Energy targets in this plan
can be summarized as follows: Share of renewable energy sources in
electricity generation is 30% of total electricity generation by 2023.
Installed capacity of wind energy will be 20 GW by 2023. Other
renewable energy sources such as solar, hydropower and geothermal
are encouraged with new incentive mechanisms. Dependence on
foreign energy is reduced for sustainability and energy security. On
the other hand, since Turkey is surrounded by three coastal areas,
wind energy potential is convenient for wind power application. As
of November of 2014, total installed capacity of wind power plants is
3.51 GW and a lot of wind power plants are under construction with
capacity 1.16 GW. Turkish government also encourages the locally
manufactured equipments. In this context, one of the projects funded
by private sector, universities and TUBİTAK names as MILRES is
an important project aimed to promote the use wind energy in
electricity generation. Within this project, wind turbine with 500 kW
power has been produced and will be installed at the beginning of the
2015. After that, by using the experience obtained from the first
phase of the project, a wind turbine with 2.5 MW power will be
manufactured in an industrial scale.
Abstract: Today’s modern interconnected power system is
highly complex in nature. In this, one of the most important
requirements during the operation of the electric power system is the
reliability and security. Power and frequency oscillation damping
mechanism improve the reliability. Because of power system
stabilizer (PSS) low speed response against of major fault such as
three phase short circuit, FACTs devise that can control the network
condition in very fast time, are becoming popular. But FACTs
capability can be seen in a major fault present when nonlinear models
of FACTs devise and power system equipment are applied. To realize
this aim, the model of multi-machine power system with FACTs
controller is developed in MATLAB/SIMULINK using Sim Power
System (SPS) blockiest. Among the FACTs device, Static
synchronous series compensator (SSSC) due to high speed changes
its reactance characteristic inductive to capacitive, is effective power
flow controller. Tuning process of controller parameter can be
performed using different method. But Genetic Algorithm (GA)
ability tends to use it in controller parameter tuning process. In this
paper firstly POD controller is used to power oscillation damping.
But in this station, frequency oscillation dos not has proper damping
situation. So FOD controller that is tuned using GA is using that
cause to damp out frequency oscillation properly and power
oscillation damping has suitable situation.
Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.