Current Issue : January - March Volume : 2018 Issue Number : 1 Articles : 5 Articles
Internet of Things (IoT) platforms are the key for the development of scalable IoT\napplications and services that connect real and virtual worlds between objects, systems, and people.\nHowever, as the IoT platform market represents a truly new market segment that was almost\nnon-existent a few years ago, the platforms are complex and changing quickly. These IoT platforms\nperform simple functions such as providing useful information, and others can provide services\nthrough collaborations with IoT devices. This situation needs a generic service interface, and results in\na range of IoT architectures through not only the configuration setting of IoT devices and resources but\nalso the varied environments of collaboration of each device. Due to these heterogeneities, it is quite\nchallenging to develop applications working with diverse IoT services, and it is even more difficult\nto maintain such applications. Therefore, this paper presents a security generic service interface\nwith the effective common characteristics of an IoT platform by defining a set of generic interfaces\nand adopting well-known design patterns. The generic interface solves the heterogeneity-driven\nproblems and makes it possible to effectively adopt a platform-independent Generic Interface that\ncould be operated in diverse IoT platforms....
Blockchain has drawn attention as the next-generation financial technology due to its\nsecurity that suits the informatization era. In particular, it provides security through the authentication\nof peers that share virtual cash, encryption, and the generation of hash value. According to the\nglobal financial industry, the market for security-based blockchain technology is expected to grow to\nabout USD 20 billion by 2020. In addition, blockchain can be applied beyond the Internet of Things\n(IoT) environment; its applications are expected to expand. Cloud computing has been dramatically\nadopted in all IT environments for its efficiency and availability. In this paper, we discuss the concept\nof blockchain technology and its hot research trends. In addition, we will study how to adapt\nblockchain security to cloud computing and its secure solutions in detail....
An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials\nare becoming increasingly popular as a means of authenticating people due to the wide range of advantages that they\nprovide with respect to classical authentication methods (e.g., password-based authentication). The most characteristic feature\nof this authentication method is the naturally strong bond between a user and her biometric credentials. This very same\nadvantageous property, however, raises serious security and privacy concerns in case the biometric trait gets compromised. In\nthis article, we present the most challenging issues that need to be taken into consideration when designing secure and privacypreserving\nbiometric authentication protocols. More precisely, we describe the main threats against privacy-preserving biometric\nauthentication systems and give directions on possible countermeasures in order to design secure and privacy-preserving biometric\nauthentication protocols....
The security of the Internet of Things (IoT) is receiving considerable interest as the low\npower constraints and complexity features of many IoT devices are limiting the use of conventional\ncryptographic techniques. This article provides an overview of recent research efforts on alternative\napproaches for securing IoT wireless communications at the physical layer, specifically the key\ntopics of key generation and physical layer encryption. These schemes can be implemented and are\nlightweight, and thus offer practical solutions for providing effective IoT wireless security. Future\nresearch to make IoT-based physical layer security more robust and pervasive is also covered....
Young generations make extensive use of mobile devices, such as smart-phones, tablets\nand laptops, for a variety of daily tasks with potentially critical impact, while the number of security\nbreaches via portable devices increases exponentially. A plethora of security risks associated with\nthese devices are induced by design shortcomings and vulnerabilities related to user behavior.\nTherefore, deploying suitable risk treatments requires the investigation of how security experts\nperceive the digital natives (young people, born in the digital era), when utilizing their user behavior\nmodels in the design and analysis of related systems. In this article, we present the results of a survey\nperformed across a multinational sample of security professionals, in comparison to our earlier\nstudy over the security awareness of digital natives. Through this study, we seek to identify\ndivergences between user behavior and the conceptual user-models that security experts utilise\nin their professional tasks. Our results indicate that the experts understanding over the user behaviour\ndoes not follow a solidified user-model, while influences from personal perceptions and randomness\nare also noticeable....
Loading....