scholarly journals Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 579
Author(s):  
Na-Eun Park ◽  
So-Hyun Park ◽  
Ye-Sol Oh ◽  
Jung-Hyun Moon ◽  
Il-Gu Lee

Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability of the work environment. In a conventional centralized network connection concept, a problem occurs because if either usability or security is strengthened, the other is weakened. In this study, we proposed a distributed authentication mechanism for secure network connectivity (DAM4SNC) technology in a distributed network environment that requires security and latency performance simultaneously to overcome the trade-off limitations of existing technology. By communicating with separated networks based on the authentication between distributed nodes, the inefficiency of conventional centralized network connection solutions is overcome. Moreover, the security is enhanced through periodic authentication of the distributed nodes and differentiation of the certification levels. As a result of the experiment, the relative efficiency of the proposed scheme (REP) was about 420% or more in all cases.

2015 ◽  
Vol 8 (1) ◽  
Author(s):  
Swati Ganeti ◽  
Rajat Agarwal ◽  
Murali Krishna Medudula ◽  
Mahim Sagar

Telecom industry is one of those industries which has changed dramatically during the past decade. With more and more players entering in this industry, competition is ever increasing. The war between these players is slowly shifting from the price to the augmentation. This paper aims at exploring such factors which influence a customers preference of one telecom service provider (TSP) over the other. It is a descriptive research where study has been conducted among the consumers of different telecom service providers (TSPs). By reviewing the existing literature in this domain, we explored different factors which affect the consumers decision to prefer one telecom service provider over the other. A consumer targeted questionnaire was designed where consumers were asked about the factors they consider (with their relative importance quantified using Likert scale), before buying a new network connection to know the relative importance of the various factors. Factor Analysis was performed to club various variables into distinct factors. Statistical techniques then helped in identifying the relative importance. From the Factor Loading matrix the following five factors were generated:- Overall service quality, Point of Purchase Differentiator, Promotion Measures, Tariff Plans and Size of the Network. Further study in the behavioural perceptions of consumer shows that the most important factor in influencing the customer buying behavior is Service Quality. The second most important factor is cost and various plans offered by the telecom service provider. Network connectivity was considered by almost all the respondents and consumers prefer the largest network player. The study also found that promotional measures dont influence the customers as expected.


2020 ◽  
Vol 245 ◽  
pp. 07010
Author(s):  
Marcelo Vogel ◽  
Mikhail Borodin ◽  
Alessandra Forti ◽  
Lukas Heinrich

This paper describes the deployment of the offline software of the ATLAS experiment at LHC in containers for use in production workflows such as simulation and reconstruction. To achieve this goal we are using Docker and Singularity, which are both lightweight virtualization technologies that can encapsulate software packages inside complete file systems. The deployment of offline releases via containers removes the interdependence between the runtime environment needed for job execution and the configuration of the computing nodes at the sites. Docker or Singularity would provide a uniform runtime environment for the grid, HPCs and for a variety of opportunistic resources. Additionally, releases may be supplemented with a detector’s conditions data, thus removing the need for network connectivity at computing nodes, which is normally quite restricted for HPCs. In preparation to achieve this goal, we have built Docker and Singularity images containing single full releases of ATLAS software for running detector simulation and reconstruction jobs in runtime environments without a network connection. Unlike similar efforts to produce containers by packing all possible dependencies of every possible workflow into heavy images (≈ 200GB), our approach is to include only what is needed for specific workflows and to manage dependencies efficiently via software package managers. This approach leads to more stable packaged releases where the dependencies are clear and the resulting images have more portable sizes ( 16GB). In an effort to cover a wider variety of workflows, we are deploying images that can be used in raw data reconstruction. This is particularly challenging due to the high database resource consumption during the access to the experiment’s conditions payload when processing data. We describe here a prototype pipeline in which images are provisioned only with the conditions payload necessary to satisfy the jobs’ requirements. This database-on-demand approach would keep images slim, portable and capable of supporting various workflows in a standalone fashion in environments with no network connectivity.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Abdulsalam Alammari ◽  
Salman Abdul Moiz ◽  
Atul Negi

AbstractThe reduced service cost offered by Sensing and Actuation as a Service paradigm, particularly in Internet of Things (IoT) era, has encouraged many establishments to start without worrying about having their own infrastructure. Such a paradigm is typically managed by a centralized cloud service provider. Fog paradigm has emerged as a mini-cloud that if designed with care to assist the cloud, together will achieve better performance. This article introduces a layered fog architecture called Sensors and Actuator Layered Fog Services Delivery (SALFSD) for IoT ecosystems. The significance of SALFSD is being fault resistant; it dynamically reassigns tasks of the failed node to the nearest active node to maintain the network connection. Besides, SALFSD monitors end users pre-specified cases closer to the physical devices hired by end users to fasten generating the actuation commands. Such node may offload its monitoring responsibility to its parent node in case it is overloaded. SALFSD is evaluated using Yet Another Fog Simulator in different scenarios (numbers of users, sensors, actuators, and areas). A comparison was made for Sensing and Actuating as a Service (SAaaS) with/without layered fog, and layered fog with/without (failure reassignment, pre-specified cases in fog nodes, and offloading). The comparison was conducted in terms of computing/communication latencies and the number of missed messages for both observations and actuation commands. Results show that failure reassignment prevented losing messages and maintained network connectivity. Also, wisely selecting the monitoring fog node per end user pre-specified cases and the offloading scheme decreased actuation latency.


Author(s):  
Lizzy Oluwatoyin Ofusori ◽  
Ncamiso Nkululeko Jahalenkhosi Dlamini ◽  
Prabhakar Rontala Subramaniam

Bring your own device (BYOD) has infiltrated the work environment and businesses are enjoying the benefits coupled with the adoption of the trend. At the same time, the adoption of BYOD has introduced a number of security threats that businesses are failing to match. In the pursuit of addressing security threats that are introduced by the adoption of this technology trend, this chapter recommends a three-dimensional (3-D) security framework that can be used to mitigate the risks emanating from a BYOD enabled environment. Data was collected from the employees of two banks in Africa that supported BYOD trend to measure individual and organizational practices. This chapter investigates further on these practices in addressing implications of BYOD. Three categories of security threats are delineated in this chapter. A review of existing security frameworks is presented in this chapter. The chapter concludes by outlining a 3-D security framework as a potential solution to protect BYOD enabled business environment.


2020 ◽  
Vol 43 (3) ◽  
pp. 135-142
Author(s):  
Yustian Ekky Rahanjani ◽  
Budhi Nugraha

This paper primarily is focusing on presenting the non-productive time overview and any kind of non-productive time that can be reduced by real-time data technology, real-time data transmission and visualization infrastructure which supports the processes of aggregation, transmission, and visualization; the example of multipurpose implementation and further innovation and improvements that can be made within the real-time data transmission and visualization, such as real-time reservoir footage calculation during geosteering and drill-time calculation to pick the formation tops and casing point; the challenges and limitation while using real-time data, such as VSAT and local network connectivity issue; and future target and improvement of real-time data usage especially to make an artifi cial intelligence system to predict the potential feature, such as formation or drilling problem while drilling. All of those stuff s could be found by literature study and direct professional experience while handling real-time data system. This technology will inspire the user to design their own solution for their operations. Despite the signifi cant advances on real-time data transmission and visualization, there is signifi cant room to fully use itspotential for advanced workfl ows and the usage of real-time data technology which was proven to reduce the Non-Productive Time that could save the operational cost. We believe that the utilization of real-time data transmission and visualization will defi nitely increase the effi ciency of the drilling operations, especially for multiple wells operations.


Wireless Sensor Network has become one of the most emerging areas of research in recent days. WSNs have been applied in a variety of application areas such as military, traffic surveillance, environment monitoring and so on. Since WSN is not a secure network and each sensor node can be compromised by the intruder. There are plenty of security threats in sensor networks like Black hole Attack, Wormhole attack, Sinkhole attack. Recently, there are so many algorithms are proposed to detect or to prevent attack by the researchers. Still, the research is continuing to evaluate sensor nodes' trust and reputation. At present to monitor nodes’ behavior direct and indirect trust values are used and most of the detection method uses additional nodes to detect an attack. These method increases the cost and also overhead. This paper proposed a method which detects the Black hole attack without using any additional node to monitor the network. The proposed work uses Attacker Detection metric (AD metric) to detect malicious node based on the average sequence number, time delay and reliability. OLSR protocol is used for routing which improves the network lifetime by minimizing the packet flooding. Besides, to ensure reliable data transmission Elliptical Curve Digital Signature Algorithm is used. Simulation results are obtained and show malicious nodes are eliminated using AD metrics


Author(s):  
Xianfei Zhou ◽  
Hongfang Cheng ◽  
Fulong Chen

Cross-border payment optimization technology based on block chain has become a hot spot in the industry. The traditional method mainly includes the block feature detection method, the fuzzy access method, the adaptive scheduling method, which perform related feature extraction and quantitative regression analysis on the collected distributed network connection access data, and combine the fuzzy clustering method to optimize the data access design, and realize the group detection and identification of data in the block chain. However, the traditional method has a large computational overhead for distributed network connection access, and the packet detection capability is not good. This paper constructs a statistical sequence model of adaptive connection access data to extract the descriptive statistical features of the distributed network block chain adaptive connection access data similarity. The performance of the strategy retrieval efficiency in the experiment is tested based on the strategy management method. The experiment performs matching query tests on the test sets of different query sizes. The different parameters for error rate and search delay test are set to evaluate the impact of different parameters on retrieval performance. The calculation method of single delay is the total delay or the total number of matches. The optimization effect is mainly measured by the retrieval delay of the strategy in the strategy management contract; the smaller the delay, the higher the execution efficiency, and the better the retrieval optimization effect.


Author(s):  
Shahuraje Nikam ◽  
Anshul Sarawagi

VANET plays important role while dealing with different vehicle communication. Security threats are always rising while working with heavy and public network. In past technique different dissemination techniques were introduced which deals with the security and proper communication in between the nodes and traffic. In this paper, previous approach over the data transmission is performed which deals with the lacking of security terms. Here a presentation of secure ECC with dynamic heuristic approach is presented which exhibit proper performance parameter while communicating in VANET network


Sign in / Sign up

Export Citation Format

Share Document