Search results for "Computer security"
showing 10 items of 433 documents
Blockchain based Device identification and authentication in a Smart Grid
2020
The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users
2003
Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.
Using continuous user authentication to detect masqueraders
2003
Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
Factorial structure of recklessness: To what extent are older drivers different?
2003
This study tests whether the original factorial structure of a recklessness questionnaire can be maintained for the current Spanish population of older drivers.Our recent interest in dedicating special attention to senior citizen mobility (Monterde, 2001), is due to the impending increase of the aging population in Western countries; this has led us to reinitiate the psychometric study of the construct validity, revising and including older drivers in the psychometric aspects of those evaluation instruments that will then be used in the Spanish psycho-medical check of drivers and in research.Factorial analysis was used to determine validity.There was an appearance of a different psychologic…
The eio proposal for a directive and mafia trials: Striving for balance between efficiency and procedural guarantees
2013
PD EIO could mark a turning point in the development of “European criminal procedure.” The Proposal will obtain evidence in cross-border cases and is particularly suitable for investigations on the subject of international organized crime. From the long gestation period and the contents of the Proposal emerges, however, the difficulty of making a balance between the investigation of crimes and the guarantees of the individuals involved. The use of collected of evidence from different legal systems is often an overly neglected aspect. Doubt surrounds the regulation of banking instruments, the rules on wiretapping, and all provisions for undercover investigations.
Q-Chem 2.0: a high-performanceab initio electronic structure program package
2000
ABSTRACT: Q-Chem 2.0 is a new release of an electronic structure programpackage, capable of performing first principles calculations on the ground andexcited states of molecules using both density functional theory and wavefunction-based methods. A review of the technical features contained withinQ-Chem 2.0 is presented. This article contains brief descriptive discussions of thekey physical features of all new algorithms and theoretical models, together withsample calculations that illustrate their performance. c 2000 John Wiley S electronic structure; density functional theory;computer program; computational chemistry Introduction A reader glancing casually at this article mightsuspect on t…
Tracing battery usage for second life market with a blockchain-based framework
2021
This work describes the design of a platform based on a permissioned blockchain for sharing relevant information among the actors involved in grid service provision programs. The information collected by a proprietary monitoring on-board system accessing the central unit of the Electric Vehicle, EV, is then sent to a dropbox folder owned by the car owner and then written on a blockchain platform. The platform could be supplied from similar data from the grid operator collected on the grid during the provision of services. In this way data can be validated and used for tracing the health status of the EV's battery. The design of customized smart contract allows to acquire the profiles of bat…
Offshore Assets in the Transition from ‘Traditional Business Practice’ to ‘Connected Business Eco-systems’
2020
In many industrial sectors we have already begun to see how new business ecosystems gradually emerge turning the traditional business practices upside down. Particularly within relatively conventional sectors, such as upstream oil and gas (O&G) and land-based process industry, we expect to see substantial changes in the years to come. In this paper, we elaborate on principal challenges related to major structural changes and core technology platforms for the oil industry identifying critical features and elaborating on emerging operational principles. This is based on a critical review of latest industry conditions and practices that are targeted towards the creation of new business models …