-
Finnish Perspectives for the IOT
Issue:
Volume 2, Issue 2, April 2013
Pages:
23-27
Abstract: The Internet of Things (IOT) means connecting people, things, and devices in order to create an omnipresent computing world. One of the most important challenges in convincing users to adopt this kind of all-around network is the protection of security and privacy in different applications. This paper presents the results of interviews conducted in a Finnish study during 8/2012-2/2013. In this research, 11 Finnish people working with different aspects of IOT development and 11 ordinary Finnish people were interviewed. The goal was to investigate their feelings on the IOT and its applications, as well as personal opinions on security and individual privacy in the IOT. Most of the answerers in this study believed that we are heading towards the IOT in the future and many IOT applications were seen tempting. However, security and privacy issues, the lack of control, and the actual need for versatile IOT applications were questioned. The people working with the IOT were found to be more critical towards the IOT than the ordinary people. An introduction of the IOT, examples of potential applications, the conducted interviews and collected answers, as well as highlights of the collected free comments are presented in this paper.
Abstract: The Internet of Things (IOT) means connecting people, things, and devices in order to create an omnipresent computing world. One of the most important challenges in convincing users to adopt this kind of all-around network is the protection of security and privacy in different applications. This paper presents the results of interviews conducted in...
Show More
-
Defending WSNs Against Jamming Attacks
Issue:
Volume 2, Issue 2, April 2013
Pages:
28-39
Abstract: Wireless sensor networks WSNs consist of a group of distributed monitor nodes working autonomously together cooperatively to achieve a common goal. Generally they face many threats, threatening the security and integrity of such networks. Jamming attacks are one of the most common attacks used against WSNs. In this paper we discuss the jamming attack and defense mechanisms proposed by two papers and suggest improvements on those four approaches.
Abstract: Wireless sensor networks WSNs consist of a group of distributed monitor nodes working autonomously together cooperatively to achieve a common goal. Generally they face many threats, threatening the security and integrity of such networks. Jamming attacks are one of the most common attacks used against WSNs. In this paper we discuss the jamming atta...
Show More
-
Node Selection in P2P Content Sharing Service in Mobile Cellular Networks with Reduction Bandwidth
S. Uvaraj,
S. Suresh,
E. Mohan
Issue:
Volume 2, Issue 2, April 2013
Pages:
40-46
Received:
11 May 2013
Published:
10 June 2013
Abstract: The peer-to-peer service has entered the public limelight over the last few years. Several research projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available. Comparing to traditional server-client technology on the internet, the P2P technology has capabilities to realize highly scalable, extensible and efficient distributed applications. At the same time mobile networks such as WAP, wireless LAN and Bluetooth have been developing at breakneck speed. Demand for using peer-to-peer applications over PDAs and cellular phones is increasing. The purpose of this study is to explore a mobile peer-to-peer network architecture where a variety of devices communications each other over a variety of networks. In this paper, we propose the architecture well-adapted to mobile devices and mobile network. In P2P file sharing systems over mobile cellular networks, the bottleneck of file transfer speed is usually the downlink bandwidth of the receiver rather than the uplink bandwidth of the senders. In this paper we consider the impact of downlink bandwidth limitation on file transfer speed and propose two novel peer selection algorithms named DBaT-B and DBaT-N, which are designed for two different cases of the requesting peer’s demand respectively. Our algorithms take the requesting peer’s downlink bandwidth as the target of the sum of the selected peers’ uplink bandwidth. To ensure load balance on cells, they will first choose a cell with the lowest traffic load before choosing each peer.
Abstract: The peer-to-peer service has entered the public limelight over the last few years. Several research projects are underway on peer-to-peer technologies, but no definitive conclusion is currently available. Comparing to traditional server-client technology on the internet, the P2P technology has capabilities to realize highly scalable, extensible and...
Show More
-
Cryptography: Salvaging Exploitations against Data Integrity
A. A. Ojugo,
A. O. Eboka,
M. O. Yerokun,
I. J. B. Iyawa,
R. E. Yoro
Issue:
Volume 2, Issue 2, April 2013
Pages:
47-55
Received:
14 May 2013
Published:
10 June 2013
Abstract: Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) while altered text is ciphertext (CT). Conversion from PT to CT is called encoding/enciphering as codes that result from this process are called ciphers. The reverse operation is called decoding/deciphering. If a user tries to reverse the cipher by making meaning of it without prior knowledge of what method is used for encoding as the data was originally, not intended for the user, the process is called cracking, while such a user is a called a cryptanalyst. Cryptography is about communicating in the presence of an adversary (cryptanalyst) – and it embodies problems such as (encryption, authentication, key distribution to name a few). The field of cryptography and informatics provides a theoretical foundation based on which we may understand what exactly these problems are, how to evaluate protocols that purport to solve them, and how to build protocols in whose security we can have confidence. Thus, cryptography is the only practical means of sending and receiving data over an insecure channel from source to destination in such a way that other users cannot understand the message unless it was intended for them. Data sent over public network is not safe and the more ciphertext a cryptanalyst has, the easier it is to crack the ciphers. Thus, it is good to change the coding mechanism regularly – because, every coding scheme has a key set.
Abstract: Cryptography is the science and art of codes that makes it possible for two people to exchange data in such a way that other people cannot understand the message. In this study – we are concerned with methods of altering data such that its recipient can undo the alteration and discover the original text. The original text is called plaintext (PT) w...
Show More