Search results for: information security behaviour
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14132

Search results for: information security behaviour

13772 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 105
13771 Gender Moderates the Association Between Symbolization Trait (But Not Internalization Trait) and Smoking Behaviour

Authors: Kuay Hue San, Muaz Haqim Shaharum, Nasir Yusoff

Abstract:

Gender plays a big role in psychosocial development. This study aimed to investigate whether gender moderates the relationship between moral identity (internalization and symbolization) and risk-smoking behavior. An online cross-sectional study was carried out on 388 (61% female) youths who fulfilled the study’s inclusion and exclusion criteria. While viewing images of smoking behavior, participants rated their emotional state, which ranged from unpleasant to pleasant. Participants were also asked to fill out the eight-item Moral Identity Scale and provide their socio-demographic information. Gender significantly moderated the relationship between symbolization and smoking behavior. However, the moderation effect was not shown by internalization Finding highlights the implication of gender on moral identity and smoking behavior and the importance of considering this in the public health intervention and program.

Keywords: smoking behaviour, gender, emotion, moral identity

Procedia PDF Downloads 89
13770 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 119
13769 Geo Spatial Database for Railway Assets Management

Authors: Muhammad Umar

Abstract:

Safety and Assets management is considering a backbone of every department. GIS in the Railway become very important to Manage Assets and Security through Digital Maps and Web based GIS Maps. It provides a complete frame of work to the organization for the management of assets. Pakistan Railway is the most common and safest mode of traveling in Pakistan. Due to ever-increasing demand of transporting huge amount of information generated from various sources and this information must be accurate. This creates problems for Passengers and Administration that causes finical and time loss. GIS Solve this problem by Digital Maps & Database. It provides you a real time Spatial and Statistical analysis that helps you to communicate and exchange the information in a sophisticated way to the users. GIS Based Web system provides a facility to different end user to make query at a time as per requirements. This GIS System provides an advancement in an organization for a complete Monitoring, Safety and Decision System for tracks, Stations and Junctions that further use for the Analysis of different areas i.e. analysis of tracks, junctions and Stations in case of reconstruction, Rescue for rail accidents and Natural disasters .This Research work helps to reduce the financial loss and reduce human mistakes helps you provide a complete security and Management system of assets.

Keywords: Geographical Information System (GIS) for assets management, geo spatial database, railway assets management, Pakistan

Procedia PDF Downloads 469
13768 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 342
13767 The Effect of Blue Lighting on Feeding Behaviour, Growth, and Corticosterone of Broiler Chickens

Authors: Sri Harimurti, Diah Reni Asih

Abstract:

This study was designated to investigate the effect of intermittent and continuous blue lighting on the feeding behaviour, growth and corticosterone hormone concentration of broiler. Two thousands and seven hundreds unsexed day-old broiler were divided into three groups of lighting treatment. Each treatment consisted of three replicates of 300 birds. The treatments were ordinary lighting (C), intermittent blue lighting (IBL) and continuous blue lighting (CBL). The data were collected in the study were feeding behaviour such as feeding duration and frequency of feeding, growth rate of birds and corticosterone hormone concentration. Results showed that the CBL have significant effect (P<0,05) on duration and frequency of feeding and growth rate of birds. The CBL have the highest feeding duration, the lowest frequency of feeding that those 290.33±1.52 minutes/day, 35.58±0.50 times/day at 15 to 28 days of age.The concentration of corticosterone hormone of IBL and CBL were a significant (P<0.05) decrease. The conclusion of this study indicated that continuous blue lighting may be a good tool for improving welfare management of broiler.

Keywords: blue light, broiler chickens, corticosterone hormone, feeding behaviour, growth rate

Procedia PDF Downloads 316
13766 Environmental Education for Sustainable Development in Bangladesh and Its Challenges

Authors: Md. Kamal Uddin

Abstract:

Bangladesh is trying to achieve Sustainable Development Goals (SDGs) by 2030. Environmental Education (EE) is very vital to reaching the agenda of SDGs. However, a lack of environmental awareness and gaps in theoretical knowledge and its practices still exists in Bangladesh. Therefore, this research aims to understand the students’ perceptions of whether and how their behaviour is environment-friendly to achieve SDGs. It also addresses teachers’ perceptions of what are the shortcomings of environmental education in Bangladesh. It uses the qualitative and quantitative techniques of data collection and analysis based on in-depth interviews, surveys among different categories of participants and classroom observation. The paper finds that the level of EE and students’ awareness of the environment is inadequate. Some teachers believe that the EE is not better in Bangladesh due to the absence of practical learning of EE, lack of the motivations and actions, institutional weakness, inadequate policies, poor implementation, and cultural and traditional beliefs. Thus, this paper argues that Bangladeshi EE is not adequate to change the behaviour of the students towards the environment, which makes it difficult for the country to ensure SD. Thus, this research suggests that there is a need to revise the environmental education policy to change the behaviour and structure of the country for sustainable development.

Keywords: environmental education, sustainable development, environmental practice, environmental behaviour, Bangladesh

Procedia PDF Downloads 172
13765 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System

Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra

Abstract:

This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.

Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction

Procedia PDF Downloads 68
13764 Exploring the Influence of Normative, Financial and Environmental Decision Frames in Nudging 'Green' Behaviour, and Increasing Uptake of Energy-Efficient Technologies

Authors: Rebecca Hafner, Daniel Read, David Elmes

Abstract:

The persuasive potential of normative and feedback (financial vs. environmental) information in ‘nudging’ people towards making environmentally sound decisions was explored in a hypothetical choice experiment. The research was specifically focused on determining how subtle variations in the decision frame could be used to increase the selection of energy efficient vs. standard technologies, using the context of home heating choice. Participants were given a choice of a standard heating system (a gas boiler) and a relatively more-energy efficient option (a heat pump). The experiment had a 2 (normative vs. no normative information) by 3 feedback type (financial, environmental, none) design. The last group constituted the control. Half of the participants were given normative information about what the majority of others in their neighbourhood had opted to do when faced with the same choice set, prior to making their decision. The other half received no such information. Varying feedback frames were incorporated by providing participants with information on either financial or environmental savings that could be achieved by choosing the heat pump. No such information was provided in the control group. A significant interaction was found between normative information and feedback frame type. Specifically, the impact of feedback frames was found to be reduced when normative information was provided; illustrating the overriding influence of normative information on option preference. Participants were significantly more likely to select the heat pump if they were vs. were not given normative information. Yet when no normative information was provided, the persuasive influence of the financial frame was increased – highlighting this as an effective means of encouraging uptake of new technologies in this instance. Conversely, the environmental frame was not found to differ significantly from the control. Marginal carryover effects were also found for stated future real-life decision-making behaviour, with participants who were versus were not given normative information being marginally more likely to state they would consider installing a heat pump when they next need to replace their heating system in real life. We conclude that normative and financial feedback framing techniques are highly effective in increasing uptake of new, energy efficient heating technologies involving significant upfront financial outlay. The implications for researchers looking to promote ‘green’ choice in the context of new technology adoption are discussed.

Keywords: energy-efficient technology adoption, environmental decision making, financial vs. environmental feedback framing techniques, social norms

Procedia PDF Downloads 290
13763 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 42
13762 Characterization of Shear and Extensional Rheology of Fibre Suspensions Prior to Atomization

Authors: Siti N. M. Rozali, A. H. J. Paterson, J. P. Hindmarsh

Abstract:

Spray drying of fruit juices from liquid to powder is desirable as the powders are easier to handle, especially for storage and transportation. In this project, pomace fibres will be used as a drying aid during spray drying, replacing the commonly used maltodextrins. The main attraction of this drying aid is that the pomace fibres are originally derived from the fruit itself. However, the addition of micro-sized fibres to fruit juices is expected to affect the rheology and subsequent atomization behaviour during the spray drying process. This study focuses on the determination and characterization of the rheology of juice-fibre suspensions specifically inside a spray dryer nozzle. Results show that the juice-fibre suspensions exhibit shear thinning behaviour with a significant extensional viscosity. The shear and extensional viscosities depend on several factors which include fibre fraction, shape, size and aspect ratio. A commercial capillary rheometer is used to characterize the shear behaviour while a portable extensional rheometer has been designed and built to study the extensional behaviour. Methods and equipment will be presented along with the rheology results. Rheology or behaviour of the juice-fibre suspensions provides an insight into the limitations that will be faced during atomization, and in the future, this finding will assist in choosing the best nozzle design that can overcome the limitations introduced by the fibre particles thus resulting in successful spray drying of juice-fibre suspensions.

Keywords: extensional rheology, fibre suspensions, portable extensional rheometer, shear rheology

Procedia PDF Downloads 185
13761 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development

Authors: Egboja Simon Oga

Abstract:

One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.

Keywords: food, governance, development, security

Procedia PDF Downloads 310
13760 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 155
13759 Evaluation of Stable Isotope in Life History and Mating Behaviour of Mediterranean Fruit Fly Ceratitis capitata (Diptera: Tephidae) in Laboratory Conditions

Authors: Hasan AL-Khshemawee, Manjree Agarwal, Xin Du, Yonglin Ren

Abstract:

The possibility use of stable isotopes to study Medfly mating and life history were investigated in these experiments. 13C6 glucose was incorporated in the diet of the Mediterranean fruit fly Ceratitis capitata (Diptera: Tephidae). Treatments included labelling and unlabelled of either the media or adult sugar water. The measured started from egg hatching till the adults have died. After mating, the adults were analysed for 13C6 glucose ratio using Liquid chromatography-mass spectrometry LC-MS in two periods of time immediately and after three days of mating. Results showed that stable isotopes were used successfully for labelling Medfly in laboratory conditions, and there were significant differences between labelled and unlabelled treatment in eggs hatching, larval development, pupae emergence, survival of adults and mating behaviour. Labelling during larval development and combined labelling of larvae and adults resulted in detectable values. The label glucose in larvae stage did not effect on mating behaviour, however, the label glucose in adults’ stage was affected by mating behaviour. We recommended that it is possible to label adults of Mediterranean fruit fly C. capitata and detected the label after mating. This method offers good tools to study mating behaviour in Medfly and other types of insects and could be providing useful tools in genetic studies, sterile insect technique (SIT) or agricultural pest management. Also, we recommended using this technique in the field.

Keywords: stable isotope, sterile insect technique (SIT), medfly, mating behaviour

Procedia PDF Downloads 236
13758 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 521
13757 Tribal Food Security Assessment and Its Measurement Index: A Study of Tribes and Particularly Vulnerable Tribal Groups in Jharkhand, India

Authors: Ambika Prasad Gupta, Harshit Sosan Lakra

Abstract:

Food security is an important issue that has been widely discussed in literature. However, there is a lack of research on the specific food security challenges faced by tribal communities. Tribal food security refers to the ability of indigenous or tribal communities to consistently access and afford an adequate and nutritious supply of food. These communities often have unique cultural, social, and economic contexts that can impact their food security. The study aims to assess the food security status of all thirty-two major tribes, including Particularly Vulnerable Tribal Groups (PVTG) people living in various blocks of Jharkhand State. The methodology of this study focuses on measuring the food security index of indigenous people by developing and redefining a new Tribal Food Security Index (TFSI) as per the indigenous community-level indicators identified by the Global Food Security Index and other indicators relevant to food security. Affordability, availability, quality and safety, and natural resources were the dimensions used to calculate the overall Tribal Food Security Index. A survey was conducted for primary data collection of tribes and PVTGs at the household level in various districts of Jharkhand with a considerable tribal population. The result shows that due to the transition from rural to urban areas, there is a considerable change in TFSI and a decrease in forest dependency of tribal communities. Socioeconomic factors like occupation and household size had a significant correlation with TFSI. Tribal households living in forests have a higher food security index than tribal households residing in urban transition areas. The study also shows that alternative methodology adopted to measure specific community-level food security creates high significant impact than using commonly used indices.

Keywords: indigenous people, tribal food security, particularly vulnerable tribal groups, Jharkhand

Procedia PDF Downloads 50
13756 Security Model for RFID Systems

Authors: John Ayoade

Abstract:

Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.

Keywords: RFID, security, mutual authentication, Kerberos

Procedia PDF Downloads 443
13755 Stressors Faced by Border Security Officers: The Singapore Experience

Authors: Jansen Ang, Andrew Neo, Dawn Chia

Abstract:

Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.

Keywords: border security, Singapore, stress, operations

Procedia PDF Downloads 306
13754 An Experimental Investigation on Mechanical Behaviour of Fiber Reinforced Polymer (FRP) Composite Laminates Used for Pipe Applications

Authors: Tasnim Kallel, Rim Taktak

Abstract:

In this experimental work, fiber reinforced polymer (FRP) composite laminates were manufactured using hand lay-up technique. The unsaturated polyester (UP) and vinylester (VE) were considered as resins reinforced with different woven fabrics (bidirectional and quadriaxial rovings). The mechanical behaviour of the resulting composites was studied and then compared. A focus was essentially done on the evaluation of the effect of E-Glass fiber and ply orientation on the mechanical properties such as tensile strength, flexural strength, and hardness of the studied composite laminates. Also, crack paths and fracture surfaces were examined, and failure mechanisms were analyzed. From the main results, it was found that the quadriaxial composite laminates (QA/VE and QA/UP) with stacking sequences of [0°, +45°, 90°, -45°] present a very ductile tensile behaviour. The other laminate samples (R500/VE, RM/VE, R500/UP and RM/UP) show a very brittle behaviour whatever the used resin. The intrinsic toughness KIC of QA/VE laminate, obtained in fracture tests, are found more important than that of RM/VE composite. Thus, the QA/VE samples, as multidirectional laminate, presents the highest interlaminar fracture resistance.

Keywords: crack growth, fiber orientation, fracture behavior, e-glass fiber fabric, laminate composite, mechanical behavior

Procedia PDF Downloads 227
13753 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 419
13752 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 43
13751 DCT and Stream Ciphers for Improved Image Encryption Mechanism

Authors: T. R. Sharika, Ashwini Kumar, Kamal Bijlani

Abstract:

Encryption is the process of converting crucial information’s unreadable to unauthorized persons. Image security is an important type of encryption that secures all type of images from cryptanalysis. A stream cipher is a fast symmetric key algorithm which is used to convert plaintext to cipher text. In this paper we are proposing an image encryption algorithm with Discrete Cosine Transform and Stream Ciphers that can improve compression of images and enhanced security. The paper also explains the use of a shuffling algorithm for enhancing securing.

Keywords: decryption, DCT, encryption, RC4 cipher, stream cipher

Procedia PDF Downloads 341
13750 Knowledge of Sexually Transmitted Infections and Socio-Demographic Factors Affecting High Risk Sex among Unmarried Youths in Nigeria

Authors: Obasanjo Afolabi Bolarinwa

Abstract:

This study assesses the levels of knowledge of sexually transmitted infections among unmarried youths in Nigeria; examines the pattern of high risk sex among unmarried youths in Nigeria; investigate the socio-demographic factors (age, place of residence, religion, level of education, wealth index and employment status) affecting the practice of high-risk sexual behaviour and ascertain the relationships between knowledge of sexually transmitted infections and practice of high risk sex. The goal of the study is to identify the factors associated with the practice of high risk sex among youth. These were with a view to identifying critical actions needed to reduce high risk sexual behaviour among youths. The study employed secondary data. The data for the study were extracted from the 2013 Nigeria Demographic and Health Survey (NDHS). The 2013 NDHS collected information from 38,948 Women ages 15-49 years and 17,359 men ages 15-49. A total of 7,744 female and 6,027 male respondents were utilized in the study. In order to adjust for the effect of oversampling of the population, the weighting factor provided by Measure DHS was applied. The data were analysed using frequency distribution and logistic regression. The results show that both male (92.2%) and female (93.6%) have accurate knowledge of sexually transmitted infections. The study also revealed that prevalence of high risk sexual behavior is high among Nigerian youths; this is evident as 77.7% (female) and 78.4% (male) are engaging in high risk sexual behavior. The bivariate analysis shows that age of respondent (χ2=294.2; p < 0.05), religion (χ2=136.64; p < 0.05), wealth index (χ2=17.38; p < 0.05), level of education (χ2=34.73; p < 0.05) and employment status (χ2=94.54; p < 0.05) were individual factors significantly associated with high risk sexual behaviour among male while age of respondent (χ2=327.07; p < 0.05), place of residence (χ2=6.71; p < 0.05), religion (χ2=81.04; p < 0.05), wealth index (χ2=7.41; p < 0.05), level of education (χ2=18.12; p < 0.05) and employment status (χ2=51.02; p < 0.05) were individual factors significantly associated with high risk sexual behaviour among female. Furthermore, the study shows that there is a relationship between knowledge of sexually transmitted infections and high risk sex among male (χ2=38.32; p < 0.05) and female (χ2=18.37; p < 0.05). At multivariate level, the study revealed that individual characteristics such as age, religion, place of residence, wealth index, levels of education and employment status were statistically significantly related with high risk sexual behaviour among male and female (p < 0.05). Lastly, the study shows that knowledge of sexually transmitted infection was significantly related to high risk sexual behaviour among youths (p < 0.05). The study concludes that there is a high level of knowledge of sexually transmitted infections among unmarried youths in Nigeria. The practice of high risk sex is high among unmarried youths but higher among male youths. The prevalence of high risk sexual activity is higher for males when they are at disadvantage and higher for females when they are at advantage. Socio-demographic factors like age of respondents, religion, wealth index, place of residence, employment status and highest level of education are factors influencing high risk sexual behaviour among youths.

Keywords: high risk sex, wealth index, sexual behaviour, knowledge

Procedia PDF Downloads 239
13749 The Influence of National Culture on Consumer Buying Behaviour: An Exploratory Study of Nigerian and British Consumers

Authors: Mohamed Haffar, Lombe Ngome Enongene, Mohammed Hamdan, Gbolahan Gbadamosi

Abstract:

Despite the considerable body of literature investigating the influence of National Culture (NC) dimensions on consumer behaviour, there is a lack of studies comparing the influence of NC in Africa with Western European countries. This study is intended to fill the vacuum in knowledge by exploring how NC affects consumer buyer behavior in Nigeria and the United Kingdom. The primary data were collected through in depth, semi-structured interviews conducted with three groups of individuals: British students, Nigerian students in the United Kingdom, and Nigerian-based students. This approach and new frontier to analyze culture and consumer behaviour could help understand residual cultural threads of people (that are ingrained in their being) irrespective of exposure to other cultures. The findings of this study show that Nigerian and British consumers differ remarkably in cultural orientations such as symbols, values and psychological standpoints. This ultimately affects the choices made at every stage of the decision building process, and proves beneficial for international retail marketing.

Keywords: national culture, consumer behaviour, international business, Nigeria

Procedia PDF Downloads 257
13748 Modeling Water Inequality and Water Security: The Role of Water Governance

Authors: Pius Babuna, Xiaohua Yang, Roberto Xavier Supe Tulcan, Bian Dehui, Mohammed Takase, Bismarck Yelfogle Guba, Chuanliang Han, Doris Abra Awudi, Meishui Lia

Abstract:

Water inequality, water security, and water governance are fundamental parameters that affect the sustainable use of water resources. Through policy formulation and decision-making, water governance determines both water security and water inequality. Largely, where water inequality exists, water security is undermined through unsustainable water use practices that lead to pollution of water resources, conflicts, hoarding of water, and poor sanitation. Incidentally, the interconnectedness of water governance, water inequality, and water security has not been investigated previously. This study modified the Gini coefficient and used a Logistics Growth of Water Resources (LGWR) Model to access water inequality and water security mathematically, and discussed the connected role of water governance. We tested the validity of both models by calculating the actual water inequality and water security of Ghana. We also discussed the implications of water inequality on water security and the overarching role of water governance. The results show that regional water inequality is widespread in some parts. The Volta region showed the highest water inequality (Gini index of 0.58), while the central region showed the lowest (Gini index of 0.15). Water security is moderately sustainable. The use of water resources is currently stress-free. It was estimated to maintain such status until 2132 ± 18, when Ghana will consume half of the current total water resources of 53.2 billion cubic meters. Effectively, water inequality is a threat to water security, results in poverty, under-development heightens tensions in water use, and causes instability. With proper water governance, water inequality can be eliminated through formulating and implementing approaches that engender equal allocation and sustainable use of water resources.

Keywords: water inequality, water security, water governance, Gini coefficient, moran index, water resources management

Procedia PDF Downloads 108
13747 The Social Perception of National Security Risks: A Comparative Perspective

Authors: Nicula Valentin, Andrei Virginia

Abstract:

Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.

Keywords: risk perception, Q-sort method, national security hazards, individual beliefs

Procedia PDF Downloads 285
13746 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 185
13745 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 535
13744 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 334
13743 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 434