Search results for: cyber security
2427 New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel
Abstract:
Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.Keywords: cloud, confidentiality, cryptography, security issues, trust issues
Procedia PDF Downloads 3772426 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 1192425 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 1022424 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics
Authors: Gizem Ertürk, Nursena Dinç
Abstract:
The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.Keywords: migration, biopolitics, Frontex, security, European union, securitization
Procedia PDF Downloads 1372423 Role of Agriculture Equipment toward Food Security: Case Study of Agriculture Equipment Assistance during President Joko Widodo Era in Indonesia
Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina
Abstract:
Indonesia is an agrarian country endowed by fertile soil, supportive weather, and natural resources which can support agricultural activities. There are commodities which produced by local farmers. Even though Indonesia had commodities, it still imports stocks of staple food. To reduce the dependency on imported staple food, President Joko Widodo wants to generate more locally-produced staple food by giving 69.000 tractors, free seeds, and fertilizers to the local farmers. In Indonesia, the problem revolves around the amount of food production especially rice derived from farmers who cannot afford technologies which can support the agricultural activities. Moreover, they cannot afford seeds and fertilizers which can make the production of commodities more effective and have high quality. Therefore, the paper would like to answer how agriculture equipment assistance during President Joko Widodo era can give significant impact towards food security. The purpose of this paper is to explore the role of agriculture equipment assistance and its impact towards Indonesia’s food security. This paper uses Boserup and Ruthenberg theory of agricultural intensification to link agriculture equipment and intensification of production which in the end will have impact towards food security through case study method. The paper affirms that the role of agricultural equipment assistance toward food security in Indonesia is significant toward Indonesia’s food production and security.Keywords: agricultural equipment, agricultural intensification, Boserup, Indonesia, Joko Widodo, Ruthenberg
Procedia PDF Downloads 1842422 BAN Logic Proof of E-passport Authentication Protocol
Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana
Abstract:
E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic
Procedia PDF Downloads 4352421 The Impact of Adopting Cross Breed Dairy Cows on Households’ Income and Food Security in the Case of Dejen Woreda, Amhara Region, Ethiopia
Authors: Misganaw Chere Siferih
Abstract:
This study assessed the impact of crossbreed dairy cows on household income and food security. The study area is found in Dejen Woreda, East Gojam Zone, and Amhara region of Ethiopia. Random sampling technique was used to obtain a sample of 80 crossbreed dairy cow owners and 176 indigenous dairy cow owners. The study employed food consumption score analytical framework to measure food security status of the household. No Statistical significant mean difference is found between crossbreed owners and indigenous owners. Logistic regression was employed to investigate crossbreed dairy cow adoption determinants , the result indicates that gender, education, labor number, land size cultivated, dairy cooperatives membership, net income and food security status of the household are statistically significant independent variables, which explained the binary dependent variable, crossbreed dairy cow adoption. Propensity score matching (PSM) was employed to analyze the impact of crossbreed dairy cow owners on farmers’ income and food security. The average net income of crossbreed dairy cow owners was found to be significantly higher than indigenous dairy cow owners. Estimates of average treatment effect of the treated (ATT) indicated that crossbreed dairy cow is able to impact households’ net income by 42%, 38.5%, 30.8% and 44.5% higher in kernel, radius, nearest neighborhood and stratification matching algorithms respectively as compared to indigenous dairy cow owners. However, estimates of average treatment of the treated (ATT) suggest that being an owner of crossbreed dairy cow is not able to affect food security significantly. Thus, crossbreed dairy cow enables farmers to increase income but not their food security in the study area. Finally, the study recommended establishing dairy cooperatives and advice farmers to become a member of them, attention to promoting the impact of crossbreed dairy cows and promotion of nutrition focus projects.Keywords: crossbreed dairy cow, net income, food security, propensity score matching
Procedia PDF Downloads 652420 Water Quality of Cengkareng Drain in Maritime Security Perspective
Authors: Febri Ramadhan, Sigid Hariyadi, Niken Tunjung Murti Pratiwi, Budiman Djoko Said
Abstract:
The scope about maritime security copes all of the problems emanating from maritime domain. Those problems can give such threats to national security of the state. One of threats taking place nowadays in maritime domain is about pollution. Pollution coming from many sources may increase water-borne disease risk that can cause the instability of national security. Pollution coming from many sources may increase water-borne disease risk. Hence the pollution makes an improper condition of environments for humans and others biota dwelling in the waters. One of the tools that can determine about pollution is by measuring about the water quality of its waters. In this case, what brings the waste and pollutants is there an activity of tidal waves introducing substances or energy into the natural environment. Cengkareng Drain is one of the water channels which is affected by tidal waves. Cengkareng Drain was become an observation area to examine the relation between water quality and tide waves. This research was conducted monthly from July to November 2015. Sampling of water was conducted every ebb and tide in every observation. Pollution index showed that the level of pollution on Cengkareng drain was moderately polluted, with the score about 7.7-8.6. Based on the results of t-test and analysis of similarity, the characteristic of water quality on rising tide does not significantly differ from the characteristic of water quality on ebbing tide. Therefore, we need a proper management as a means to control the pollutants in order to make good maritime security strategy.Keywords: maritime security, Cengkareng drain, water quality, tidal waves
Procedia PDF Downloads 2162419 A New Development Pathway And Innovative Solutions Through Food Security System
Authors: Osatuyi Kehinde Micheal
Abstract:
There is much research that has contributed to an improved understanding of the future of food security, especially during the COVID-19 pandemic. A pathway was developed by using a local community kitchen in Muizenberg in western cape province, cape town, south Africa, a case study to map out the future of food security in times of crisis. This kitchen aims to provide nutritious, affordable, plant-based meals to our community. It is also a place of diverse learning, sharing, empowering the volunteers, and growth to support the local economy and future resilience by sustaining our community kitchen for the community. This document contains an overview of the story of the community kitchen on how we create self-sustainability as a new pathway development to sustain the community and reduce Zero hunger in the regional food system. This paper describes the key elements of how we respond to covid-19 pandemic by sharing food parcels and creating 13 soup kitchens across the community to tackle the immediate response to covid-19 pandemic and agricultural systems by growing home food gardening in different homes, also having a consciousness Dry goods store to reduce Zero waste and a local currency as an innovation to reduce food crisis. Insights gained from our article and outreach and their value in how we create adaptation, transformation, and sustainability as a new development pathway to solve any future problem crisis in the food security system in our society.Keywords: sustainability, food security, community development, adapatation, transformation
Procedia PDF Downloads 772418 Nigeria Energy Security: The Role of Solar Batteries
Authors: Ihugba Okezie A., Oguzie Emeka E.
Abstract:
Nigeria's renewable energy market is expanding due to increased environmental awareness, supportive government policies, and the need for energy diversification. This paper examines the role of solar batteries in enhancing Nigeria's energy security. With growing energy demands and frequent power outages, integrating solar batteries presents a viable solution to stabilize the energy supply. The study investigates the current state of solar battery technology in Nigeria, its economic and environmental benefits, and the challenges to implementation. Through a literature review, case studies, and stakeholder interviews, the paper provides a comprehensive analysis of solar batteries' contribution to a resilient energy future. Key players include Engie SA, TotalEnergies SE, Starsight Energy, Enel SpA, and North-South Power Co. Ltd. Challenges include high upfront costs, inadequate policies, weak infrastructure, and security risks. The paper recommends that the government should strengthen policies and incentives to encourage investments through tax breaks, subsidies, and financial incentives.Keywords: renewable energy, solar batteries, energy security, Nigeria’s electricity generation, job creation
Procedia PDF Downloads 362417 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria
Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu
Abstract:
Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression
Procedia PDF Downloads 1732416 Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison between Central Processing Unit vs. Graphics Processing Unit Functions for Neural Networks
Authors: Mst Shapna Akter, Hossain Shahriar
Abstract:
Neural network approaches are machine learning methods used in many domains, such as healthcare and cyber security. Neural networks are mostly known for dealing with image datasets. While training with the images, several fundamental mathematical operations are carried out in the Neural Network. The operation includes a number of algebraic and mathematical functions, including derivative, convolution, and matrix inversion and transposition. Such operations require higher processing power than is typically needed for computer usage. Central Processing Unit (CPU) is not appropriate for a large image size of the dataset as it is built with serial processing. While Graphics Processing Unit (GPU) has parallel processing capabilities and, therefore, has higher speed. This paper uses advanced Neural Network techniques such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST-VGG16, and our proposed models to compare CPU and GPU resources. A system for classifying autism disease using face images of an autistic and non-autistic child was used to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It has been observed that GPU runs faster than the CPU in all tests performed. Moreover, the performance of the Neural Network models in terms of accuracy increases on GPU compared to CPU.Keywords: autism disease, neural network, CPU, GPU, transfer learning
Procedia PDF Downloads 1182415 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case
Authors: Azin Karami, Bahareh Heydari
Abstract:
There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.Keywords: human rights, human security, national sovereignty, irregular immigrants
Procedia PDF Downloads 1822414 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement
Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al
Abstract:
Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security
Procedia PDF Downloads 1282413 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture
Authors: Mirad Böhm, Diede De Kok
Abstract:
It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder
Procedia PDF Downloads 3312412 Leveraging Digital Cyber Technology for Self-Care and Improved Management of DMPA-SC Clients
Authors: Oluwaseun Adeleke, Grace Amarachi Omenife, Jennifer Adebambo, Mopelola Raji, Anthony Nwala, Mogbonjubade Adesulure
Abstract:
Introduction: The incorporation of digital technology in healthcare systems is instrumental in transforming the delivery, management, and overall experience of healthcare and holds the potential to scale up access through over 200 million active mobile phones used in Nigeria. Digital tools enable increased access to care, stronger client engagement, progress in research and data-driven insights, and more effective promotion of self-care and do-it-yourself practices. The Delivering Innovation in Self-Care (DISC) project 2021 has played a pivotal role in granting women greater autonomy over their sexual and reproductive health (SRH) through a variety of approaches, including information and training to self-inject contraception (DMPA-SC). To optimize its outcomes, the project also leverages digital technology platforms like social media: Facebook, Instagram, and Meet Tina (Chatbot) via WhatsApp, Customer Relationship Management (CRM) applications Freshworks, and Viamo. Methodology: The project has been successful at optimizing in-person digital cyberspace interaction to sensitize individuals effectively about self-injection and provide linkages to SI services. This platform employs the Freshworks CRM software application, along with specially trained personnel known as Cyber IPC Agents and DHIS calling centers. Integration of Freshworks CRM software with social media allows a direct connection with clients to address emerging issues, schedule follow-ups, send reminders to improve compliance with self-injection schedules, enhance the overall user experience for self-injection (SI) clients, and generate comprehensive reports and analytics on client interactions. Interaction covers a range of topics, including – How to use SI, learning more about SI, side-effects and its management, accessing services, fertility, ovulation, other family planning methods, inquiries related to Sexual Reproductive Health as well as uses an address log to connect them with nearby facilities or online pharmaceuticals. Results: Between the months of March to September, a total of 5,403 engagements were recorded. Among these, 4,685 were satisfactorily resolved. Since the program's inception, digital advertising has created 233,633,075 impressions, reached 12,715,582 persons, and resulted in 3,394,048 clicks. Conclusion: Leveraging digital technology has proven to be an invaluable tool in client management and improving client experience. The use of Cyber technology has enabled the successful development and maintenance of client relationships, which have been effective at providing support, facilitating delivery and compliance with DMPA-SC self-injection services, and ensuring overall client satisfaction. Concurrently, providing qualitative data, including user experience feedback, has enabled the derivation of crucial insights that inform the decision-making process and guide in normalizing self-care behavior.Keywords: selfcare, DMPA-SC self-injection, digital technology, cyber technology, freshworks CRM software
Procedia PDF Downloads 672411 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation
Procedia PDF Downloads 3822410 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model
Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek
Abstract:
Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.Keywords: optimum balance model, knowledge management, security environment, supporting peace
Procedia PDF Downloads 3972409 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4062408 Democracy and Security Challenge in Nigeria, 1999, Till Date
Authors: Abdulsalami M. Deji
Abstract:
Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.Keywords: democracy, interest, militia, security
Procedia PDF Downloads 3342407 Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare
Authors: Piret Pernik
Abstract:
Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict.Keywords: dual-use technology, cyber attacks, electromagnetic warfare, case studies of cyberattacks in armed conflicts
Procedia PDF Downloads 1022406 Applications of Multi-Path Futures Analyses for Homeland Security Assessments
Authors: John Hardy
Abstract:
A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning
Procedia PDF Downloads 1392405 The Utility and the Consequences of Counter Terrorism Financing
Authors: Fatemah Alzubairi
Abstract:
Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council
Procedia PDF Downloads 3242404 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 872403 Contingency Screening Using Risk Factor Considering Transmission Line Outage
Authors: M. Marsadek, A. Mohamed
Abstract:
Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed. In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time. To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor. The proposed technique is implemented on IEEE 24-bus system.Keywords: line overload, low voltage, probability, risk factor, severity
Procedia PDF Downloads 5452402 Multi Criteria Authentication Method in Cognitive Radio Networks
Authors: Shokoufeh Monjezi Kouchak
Abstract:
Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.Keywords: authentication, cognitive radio, security, radio networks
Procedia PDF Downloads 3922401 Household Food Security and Poverty Reduction in Cameroon
Authors: Bougema Theodore Ntenkeh, Chi-bikom Barbara Kyien
Abstract:
The reduction of poverty and hunger sits at the heart of the United Nations 2030 Agenda for Sustainable Development, and are the first two of the Sustainable Development Goals. The World Food Day celebrated on the 16th of October every year, highlights the need for people to have physical and economic access at all times to enough nutritious and safe food to live a healthy and active life; while the world poverty day celebrated on the 17th of October is an opportunity to acknowledge the struggle of people living in poverty, a chance for them to make their concerns heard, and for the community to recognize and support poor people in their fight against poverty. The association between household food security and poverty reduction is not only sparse in Cameroon but mostly qualitative. The paper therefore investigates the effect of household food security on poverty reduction in Cameroon quantitatively using data from the Cameroon Household Consumption Survey collected by the Government Statistics Office. The methodology employed five indicators of household food security using the Multiple Correspondence Analysis and poverty is captured as a dummy variable. Using a control function technique, with pre and post estimation test for robustness, the study postulates that household food security has a positive and significant effect on poverty reduction in Cameroon. A unit increase in the food security score reduces the probability of the household being poor by 31.8%, and this effect is statistically significant at 1%. The result further illustrates that the age of the household head and household size increases household poverty while households residing in urban areas are significantly less poor. The paper therefore recommends that households should diversify their food intake to enhance an effective supply of labour in the job market as a strategy to reduce household poverty. Furthermore, family planning methods should be encouraged as a strategy to reduce birth rate for an equitable distribution of household resources including food while the government of Cameroon should also develop the rural areas given that trend in urbanization are associated with the concentration of productive economic activities, leading to increase household income, increased household food security and poverty reduction.Keywords: food security, poverty reduction, SDGs, Cameroon
Procedia PDF Downloads 772400 Pakistan Nuclear Security: Threats from Non-State Actors
Authors: Jennifer Wright
Abstract:
The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism
Procedia PDF Downloads 2262399 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology
Authors: Bala Adamu Malami
Abstract:
The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.Keywords: electronic, GPS, GSM modem, communication, vehicle
Procedia PDF Downloads 992398 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 198