Search results for: food safety and authentication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6549

Search results for: food safety and authentication

6549 A Multilevel Authentication Protocol: MAP in VANET for Human Safety

Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed

Abstract:

Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.

Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay

Procedia PDF Downloads 261
6548 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 430
6547 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 198
6546 Food Safety Management in Riyadh’s Ministry of Health Hospitals

Authors: A. Alrasheed, I. Connerton

Abstract:

Providing patients with safe meals on a daily basis is one of the challenges in the healthcare sector. In Saudi Arabia matters related to food safety and hygiene have been the heart of the Ministry of Health (MOH) and Saudi Food and Drugs Authority (SFDA). The aim of this study is to examine the causes of inadequate implementation of food safety management systems such as HACCP in Riyadh’s MOH hospitals. By the law, food safety must be managed using a documented, HACCP based approach, and food handlers must be appropriately trained in food safety. Food handlers in Saudi Arabia are not required to provide a certificate or attend a food handling training course even in healthcare sectors. Since food safety and hygiene issues are of increasing importance for Saudi Arabian health decision makers, the SFDA has been established to apply food hygiene requirements in all food operations. It should be pointed out that the implications of food outbreaks on the whole society may potentially go beyond individual health impacts but also impact on the Nation’s health and bring about economic repercussions.

Keywords: food safety, patient, hospital, HACCP

Procedia PDF Downloads 841
6545 Food Consumer Protection in Moroccan Legal System: A Systematic Review

Authors: Bouchaib Gazzaz, Mounir Mehdi

Abstract:

In order to ensure consumer food protection, the food industry has a legal obligation to provide food products that comply with the requirements of the legislation in force. National regulations in this area occupy an important place in the food control system in terms of consumer protection. This article discusses the legal and regulatory framework of food safety and consumer protection in Moroccan law. We used the doctrinal research approach by analyzing the judicial normative and bibliographic legal research. As a result, we were able to present the basic principles of consumer food protection by showing to what extent the food safety law provides effective consumer protection in Morocco. We have concluded that there is an impact -in terms of consumer legal protection- of food law reform on the concept of food safety.

Keywords: food safety, Morocco, consumer protection, framework, food law

Procedia PDF Downloads 165
6544 Evaulation of Food Safety Management in Central Elementary School Canteens in Tuguegarao City, Philippines

Authors: Lea B. Milan

Abstract:

This descriptive study evaluated the existing Food Safety Management in Central Elementary School Canteens of Region 3. It made used of survey questionnaires, interview guide questions and validated knowledge test on food for data gathering. Results of the study revealed that school principals and canteen managers shared responsibilities in food safety management of school canteen. It also showed that the schools applied different methods of communication, monitoring and evaluation of food safety management. The study further revealed that implementation of monitoring and evaluation of food safety compliance are not being practiced in all elementary schools in the region. The study also showed that school canteens in the Region 3 do not have the thermometers and timers to use to conduct proper monitoring of foods during storage, preparation and serving. It was also found out from the study that canteen personnel lacks the basic knowledge and trainings on food safety. Potential source of physical, chemical and biological hazards that could contaminate foods were also found present in the canteen facilities of the elementary schools in the region. Moreover, evaluation showed that the existing implementation of food safety management in the Central Elementary School Canteens of Region 3 were below the expected level and the need to strengthen the appreciation and advocacy on food safety management in school canteens of Region 3 is still wanting.

Keywords: food safety management, food safety school catering, food safety, school food safety management

Procedia PDF Downloads 343
6543 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 318
6542 Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation

Authors: C. P. Autry, A. W. Roscoe, Mykhailo Magal

Abstract:

We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy).

Keywords: authentication, edge computing, industrial IoT, post-quantum resistance

Procedia PDF Downloads 166
6541 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability

Authors: Özlem Turan, Şule Turhan

Abstract:

About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.

Keywords: food, food safety, food systems, sustainability

Procedia PDF Downloads 352
6540 IT System in the Food Supply Chain Safety, Application in SMEs Sector

Authors: Mohsen Shirani, Micaela Demichela

Abstract:

Food supply chain is one of the most complex supply chain networks due to its perishable nature and customer oriented products, and food safety is the major concern for this industry. IT system could help to minimize the production and consumption of unsafe food by controlling and monitoring the entire system. However, there have been many issues in adoption of IT system in this industry specifically within SMEs sector. With this regard, this study presents a novel approach to use IT and tractability systems in the food supply chain, using application of RFID and central database.

Keywords: food supply chain, IT system, safety, SME

Procedia PDF Downloads 440
6539 A Review of Current Research and Future Directions on Foodborne Illness and Food Safety: Understanding the Risks and Mitigation Strategies

Authors: Tuji Jemal Ahmed

Abstract:

This paper is to provides a comprehensive review of current research works on foodborne illness and food safety, including the risks associated with foodborne illnesses, the latest research on food safety, and the mitigation strategies used to prevent and control foodborne illnesses. Foodborne illness is a major public health concern that affects millions of people every year. As foodborne illnesses have grown more common and dangerous in recent years, it is vital that we research and build upon methods to ensure food remains safe throughout consumption. Additionally, this paper will discuss future directions for food safety research, including emerging technologies, changes in regulations and standards, and collaborative efforts to improve food safety. The first section of the paper provides an overview of the risks of foodborne illness, including a definition of foodborne illness, the causes of foodborne illness, the types of foodborne illnesses, and high-risk foods for foodborne illness, Health Consequences of Foodborne Illness. The second section of the paper focuses on current research on food safety, including the role of regulatory agencies in food safety, food safety standards and guidelines, emerging food safety concerns, and advances in food safety technology. The third section of the paper explores mitigation strategies for foodborne illness, including preventative measures, hazard analysis and critical control points (HACCP), good manufacturing practices (GMPs), and training and education. Finally, this paper examines future directions for food safety research, including hurdle technologies and their impact on food safety, changes in food safety regulations and standards, collaborative efforts to improve food safety, and research gaps and areas for further exploration. In general, this work provides a comprehensive review of current research and future directions in food safety and understanding the risks associated with foodborne illness. The implications of the assessment for food safety and public health are discussed, as well as recommended for research scholars.

Keywords: food safety, foodborne illness, technologies, mitigation

Procedia PDF Downloads 58
6538 Nutrition and Food Safety as Strategic Assets

Authors: Daniel C. S. Lim, W. Y. Tan

Abstract:

The world is facing a growing food crisis. The concerns of food nutritional value, food safety and food security are becoming increasingly real. There is also a direct relationship to the risk of diseases, particularly chronic diseases, to the food we consume. So, there are increasing concerns about the modern day food ecosystem creating foods that can provide the nutritional components for organ function sustenance, as well as, taking a serious view on diet-related diseases. This paper addresses some of the above concerns and gives an overview of the current global situation relating to food nutrition and safety. The paper reviews nutritional aspects of food today compared to those of the last century, compares whole foods found in supermarkets versus those organically grown, as well as population behaviour towards food choices. It provides scientific insights into the effects of some of the global trends such as climate change and other changes environmental changes, and presents what individuals and corporations are doing to use the latest nutritional technologies as strategic assets. Finally, it briefly highlights some of the innovative solutions that are being applied to address several of the above concerns.

Keywords: food crisis, food safety, global trends, nutritional aspects

Procedia PDF Downloads 356
6537 Determining the Awareness Level of Chefs and Students on Food Safety and Allergens in Kano State, Nigeria and Ankara City in Turkey

Authors: Balarabe Bilyaminu Ismail, Osman Cavus, Fügen Durlu Özkaya

Abstract:

This study is aimed at determining the level of awareness of chefs and students of food science and technology on food safety in general and allergens in particular. To get appropriate data, a questionnaire comprising of 19 questions covering many food safety issues and allergens in foods were used to collect information for the study through face to face interviews. Interviews were conducted for 284 people in Nigeria and Turkey. Sixty-eight percent of respondents from Turkey; 31.3% were students and 68.7% were chefs. Thirty-one percent of respondents from Nigeria include 33.7% students and 66.3% chefs. The result of the study indicated that most of the findings of scientific studies on food safety issues have not been directly applied by the people working in the food sector. Additionally, the knowledge level of the gastronomy and culinary arts students on food safety and allergens are significantly higher than the restaurant chefs that prepare the food and serve it to the public. The study, therefore, concluded that proper training of food business operators is critical to ensuring the safety of foods and control of allergens.

Keywords: allergens, food safety, questionnaire survey, training

Procedia PDF Downloads 326
6536 Food Safety and Quality Assurance and Skills Development among Farmers in Georgia

Authors: Kakha Nadiardze, Nana Phirosmanashvili

Abstract:

The goal of this paper is to present the problems of lack of information among farmers in food safety. Global food supply chains are becoming more and more diverse, making traceability systems much harder to implement across different food markets. In this abstract, we will present our work for analyzing the key developments in Georgian food market from regulatory controls to administrative procedures to traceability technologies. Food safety and quality assurance are most problematic issues in Georgia as food trade networks become more and more complex, food businesses are under more and more pressure to ensure that their products are safe and authentic. The theme follow-up principles from farm to table must be top-of-mind for all food manufacturers, farmers and retailers. Following the E. coli breakout last year, as well as more recent cases of food mislabeling, developments in food traceability systems is essential to food businesses if they are to present a credible brand image. Alongside this are the ever-developing technologies in food traceability networks, technologies that manufacturers and retailers need to be aware of if they are to keep up with food safety regulations and avoid recall. How to examine best practice in food management is the main question in order to protect company brand through safe and authenticated food. We are working with our farmers to work with our food safety experts and technology developers throughout the food supply chain. We provide time by time food analyses on heavy metals, pesticide residues and different pollutants. We are disseminating information among farmers how the latest food safety regulations will impact the methods to use to identify risks within their products.

Keywords: food safety, GMO, LMO, E. coli, quality

Procedia PDF Downloads 475
6535 The Role of Gender and Socio-Demographics Variables on Food Safety Perceptions of Lebanese University Students

Authors: Lara Hanna-Wakim, Carine El Sokhn

Abstract:

The perception of the consumer in food safety plays an important role in reducing the incidence of foodborne diseases. Studies show that young adults aged between 18 and 25 years are more prone to foodborne illnesses than adults because of their lack of food safety knowledge. The aim of this study was to measure the degree of university students' awareness in food safety, as well as to explore whether there is a relationship or not between the demographic characteristics of university students and their knowledge and practices. A valid questionnaire divided into three parts was distributed to 938 university students, aged between 18-25 years, living alone or with their parents, from different majors and years of study. The data collected was analyzed using the SPSS program. The total scores of the students surveyed were 47.95% on their food safety knowledge and 56.45% on their practices in the matter. The final score of the food safety perception of university students in both genders was 52.2%. Female students scored higher (63.14%) than male students (39.69%), and students majoring in health related fields (67.45%) scored higher than those majoring in areas not related to public health (49.21%). These results showed an overall low level of food safety perception of university students. Educational interventions are needed to improve their food safety knowledge and practices as they will be responsible for their own family one day.

Keywords: food safety, gender, perception, practices, knowledge, lebanese university students

Procedia PDF Downloads 438
6534 Measuring Hazard Analysis and Critical Control Points Implementation in Riyadh Hospitals

Authors: A. Alrasheed, I. Connerton

Abstract:

Daily provision of high quality food and hygiene to patients is a challenging goal of the healthcare. In Saudi Arabia, matters related to food safety and hygiene are regulated by the Ministry of Health (MOH) and the Saudi Food and Drugs Authority (SFDA). The purpose of this research is to discuss the food safety management inconsistencies and flaws, in particular the ones related to Hazard Analysis and Critical Control Points (HACCP) in Riyadh’s MOH hospitals. As required by law, written HACCP regulations must be implemented, and food handlers need to receive the training accordingly. However, in Saudi hospitals, this is not a requirement, and the food handlers do not need to hold training certificates in food safety or HACCP. Nowadays, the matter of food safety and hygiene have become increasingly important since the decision makers want to align these regulations with the majority of the world and to implement HACCP fully and for this purpose, the SFDA was established. 

Keywords: food safety, patients, hospitals, HACCP, Saudi Arabia

Procedia PDF Downloads 239
6533 Positioning Food Safety in Halal Assurance

Authors: Marin Neio Demirci, Jan Mei Soon, Carol A. Wallace

Abstract:

Muslims follow the religion of Islam and the food they eat should be Halal, meaning lawful or permissible. Muslims are allowed to eat halal and wholesome food that has been provided for them. However, some of the main prohibitions are swine flesh, blood, carrion, animals not slaughtered according to Islamic laws and alcoholic drinks. At present Halal assurance is in a complicated state, with various Halal standards differing from each other without gaining mutual acceptance. The world is starting to understand the need for an influential globally accepted standard that would open doors to global markets and gain consumer confidence. This paper discusses issues mainly related to food safety in Halal assurance. The aim was to discover and describe the approach to food safety requirements in Halal food provision and how this is incorporated in the Halal assurance systems. The position of food safety regulation within Halal requirements or Halal standards’ requirements for food safety is still unclear. This review also considers whether current Halal standards include criteria in common with internationally accepted food hygiene standards and emphasizes the potential of using the HACCP system for Halal assurance.

Keywords: certification, GHP, HACCP, Halal standard

Procedia PDF Downloads 323
6532 Safety, Healthy, Intact, and Halal as New Indonesia Policy on Food Security and Safety to Support SDG'S: Sustainable Development Goals

Authors: Ramadhan Febriansyah, Sarah Novianti, Santi Agustini

Abstract:

Indonesia is a big country with Moslem population. The government must fulfill all needs of the people. However, we do not have a good policy yet especially on healthy, safety and halal food. We try to offer a new solution to overcome this with ASUH (Aman, Sehat, Utuh, Halal) or in English is SHIH (Safe, Healthy, Intact, Halal) as alternative Indonesian policy on food security. This policy is Indonesian Government’s commitment to support Sustainability Development Goals program for the zero hunger (end hunger, to achieve food security and improved nutrition for Indonesian people, of course, to promote sustainable agriculture). Hopefully, it not only can increasing quality on food especially on livestock goods (meat, egg, milk) but also to guarantee the halal food. However, this policy can be an example to others country especially Moslem countries to support SDG’s programs. This research conducted means of the descriptive method; the authors find compare the secondary data obtained from journals, textbook and scientific articles in order to determine the factors that influence food safety and food security. Relevant data used and contain a description of SDG’s as well as about the system food safety and food security that SHIH (Safe, Healthy, Intact and Halal) so these ideas can be implemented.

Keywords: food safety, food security, food sovereignty, halal SDG's

Procedia PDF Downloads 349
6531 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 397
6530 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 293
6529 Methodology for Obtaining Food Licenses in India

Authors: Rathna Malhotra Gaur

Abstract:

Owing to multiplicity and competition in the Indian food industry, it was always important for the government of India to bring in reforms that would protect the interest of the consumer and also the food operator. To further this objective, Food Safety, and Standards Act, 2006 (hereinafter referred to as FSSAI) was enacted for laying down science-based standards for articles and food and to regulate their storage, distribution, manufacture, same and import and to ensure safe food availability to the citizens of India. One of the safeguards towards consumer interest is the enactment of Food Safety and Standards (Licensing and Registration of Food Businesses, Regulation, 2011 within the mandate of FSSAI. It is mandatory for every food operator in India to get the registration certificate and procurement of food Licenses before starting operations in the country. All the nuances pertaining to the procurement of licenses are dealt with under these regulations. These regulations also lay down detailed provisions with regard to the conditions that the operator has to adhere to once the License is procured, going to the integrities of the safety and hygiene standards to be maintained by the food operators. This paper is an exhaustive effort to examine the provisions of obtaining the registration and License in India and the conditions that need to be fulfilled subsequently and further on the validity and renewal of these Food Licenses.

Keywords: food laws, food licenses, food registration, penalty

Procedia PDF Downloads 148
6528 Food Safety Aspects of Pesticide Residues in Spice Paprika

Authors: Sz. Klátyik, B. Darvas, M. Mörtl, M. Ottucsák, E. Takács, H. Bánáti, L. Simon, G. Gyurcsó, A. Székács

Abstract:

Environmental and health safety of condiments used for spicing food products in food processing or by culinary means receive relatively low attention, even though possible contamination of spices may affect food quality and safety. Contamination surveys mostly focus on microbial contaminants or their secondary metabolites, mycotoxins. Chemical contaminants, particularly pesticide residues, however, are clearly substantial factors in the case of given condiments in the Capsicum family including spice paprika and chilli. To assess food safety and support the quality of the Hungaricum product spice paprika, the pesticide residue status of spice paprika and chilli is assessed on the basis of reported pesticide contamination cases and non-compliances in the Rapid Alert System for Food and Feed of the European Union since 1998.

Keywords: spice paprika, Capsicum, pesticide residues, RASFF

Procedia PDF Downloads 356
6527 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 137
6526 Patient Safety of Eating Ready-Made Meals at Government Hospitals

Authors: Hala Kama Ahmed Rashwan

Abstract:

Ensuring the patient safety especially at intensive care units and those exposed to hospital tools and equipment is one of the most important challenges facing healthcare today. Outbreak of food poisoning as a result of food-borne pathogens has been reported in many hospitals and care homes all over the world due to hospital meals. Patient safety of eating hospital meals is a fundamental principle of healthcare; it is new healthcare disciplines that assure the food raw materials, food storage, meals processing, and control of kitchen errors that often lead to adverse healthcare events. The aim of this article is to promote any hospital in attaining the hygienic practices and better quality system during processing of the ready-to- eat meals for intensive care units patients according to the WHO safety guidelines.

Keywords: hospitals, meals, safety, intensive care

Procedia PDF Downloads 472
6525 Decentralised Edge Authentication in the Industrial Enterprise IoT Space

Authors: C. P. Autry, A.W. Roscoe

Abstract:

Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication.

Keywords: authentication, enterprise IoT cybersecurity, PKI/TTP, IoT space

Procedia PDF Downloads 134
6524 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes

Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He

Abstract:

This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.

Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography

Procedia PDF Downloads 52
6523 Enhancing Food Quality and Safety Management in Ethiopia's Food Processing Industry: Challenges, Causes, and Solutions

Authors: Tuji Jemal Ahmed

Abstract:

Food quality and safety challenges are prevalent in Ethiopia's food processing industry, which can have adverse effects on consumers' health and wellbeing. The country is known for its diverse range of agricultural products, which are essential to its economy. However, poor food quality and safety policies and management systems in the food processing industry have led to several health problems, foodborne illnesses, and economic losses. This paper aims to highlight the causes and effects of food safety and quality issues in the food processing industry of Ethiopia and discuss potential solutions to address these issues. One of the main causes of poor food quality and safety in Ethiopia's food processing industry is the lack of adequate regulations and enforcement mechanisms. The absence of comprehensive food safety and quality policies and guidelines has led to substandard practices in the food manufacturing process. Moreover, the lack of monitoring and enforcement of existing regulations has created a conducive environment for unscrupulous businesses to engage in unsafe practices that endanger the public's health. The effects of poor food quality and safety are significant, ranging from the loss of human lives, increased healthcare costs, and loss of consumer confidence in the food processing industry. Foodborne illnesses, such as diarrhea, typhoid fever, and cholera, are prevalent in Ethiopia, and poor food quality and safety practices contribute significantly to their prevalence. Additionally, food recalls due to contamination or mislabeling often result in significant economic losses for businesses in the food processing industry. To address these challenges, the Ethiopian government has begun to take steps to improve food quality and safety in the food processing industry. One of the most notable initiatives is the Ethiopian Food and Drug Administration (EFDA), which was established in 2010 to regulate and monitor the quality and safety of food and drug products in the country. The EFDA has implemented several measures to enhance food safety, such as conducting routine inspections, monitoring the importation of food products, and enforcing strict labeling requirements. Another potential solution to improve food quality and safety in Ethiopia's food processing industry is the implementation of food safety management systems (FSMS). An FSMS is a set of procedures and policies designed to identify, assess, and control food safety hazards throughout the food manufacturing process. Implementing an FSMS can help businesses in the food processing industry identify and address potential hazards before they cause harm to consumers. Additionally, the implementation of an FSMS can help businesses comply with existing food safety regulations and guidelines. In conclusion, improving food quality and safety policies and management systems in Ethiopia's food processing industry is critical to protecting public health and enhancing the country's economy. Addressing the root causes of poor food quality and safety and implementing effective solutions, such as the establishment of regulatory agencies and the implementation of food safety management systems, can help to improve the overall safety and quality of the country's food supply.

Keywords: food quality, food safety, policy, management system, food processing industry

Procedia PDF Downloads 48
6522 ACBM: Attention-Based CNN and Bi-LSTM Model for Continuous Identity Authentication

Authors: Rui Mao, Heming Ji, Xiaoyu Wang

Abstract:

Keystroke dynamics are widely used in identity recognition. It has the advantage that the individual typing rhythm is difficult to imitate. It also supports continuous authentication through the keyboard without extra devices. The existing keystroke dynamics authentication methods based on machine learning have a drawback in supporting relatively complex scenarios with massive data. There are drawbacks to both feature extraction and model optimization in these methods. To overcome the above weakness, an authentication model of keystroke dynamics based on deep learning is proposed. The model uses feature vectors formed by keystroke content and keystroke time. It ensures efficient continuous authentication by cooperating attention mechanisms with the combination of CNN and Bi-LSTM. The model has been tested with Open Data Buffalo dataset, and the result shows that the FRR is 3.09%, FAR is 3.03%, and EER is 4.23%. This proves that the model is efficient and accurate on continuous authentication.

Keywords: keystroke dynamics, identity authentication, deep learning, CNN, LSTM

Procedia PDF Downloads 124
6521 Consumer’ Knowledge, Attitude and Behavior on Food Safety Issues Related to Pesticide Residues in Cabbage

Authors: Dekie Rawung, Abdul L. Abadi, Toto Himawan, Siegfried Berhimpon

Abstract:

A case study on consumer' knowledge, attitude, and behavior on food safety issue related to pesticide residues in cabbage was conducted in the area of Manado and Tomohon city, North Sulawesi. A sample of 150 consumers were selected randomly on location (open market and supermarket) while they were purchasing vegetables. The data on consumers’ perception, knowledge, attitude and behavior on food safety issue regarding pesticide residues were collected using a 5-point, two-section Likert-Scale questionnaire, and the relationship of knowledge, attitude, and behavior on food safety issues were analyzed using Structural Equation Modeling (SEM). It was found that, among many food safety issues, the illegal, non-food chemical preservatives were considered the most important one (by more than 35% respondents), followed by high cholesterol content and textile coloring chemical (> 27% respondents). The pesticide residues issue was only in the 4th place. The same results were seen on the issue of quality factors that determine the product selection during purchasing. The pesticide-free and organic products labels were considered much less important quality factors as compared with freshness and nutrition value which were considered the most and the second most important quality factors (almost 65% of respondents). SEM analysis showed that only knowledge and attitude on food safety that had the significant relation (coefficient value of 0.38), whereas those with behaviors were not significant.

Keywords: cabbage, consumer, food safety, pesticide residues

Procedia PDF Downloads 390
6520 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 259