Browse Items (66 total)

  • Tags: Security

Smart devices in an Internet of Things (IoT) generate a massive amount of big data through sensors. The data is used to build intelligent applications through machine learning (ML). To build these applications, the data is collected from devices into…

The wide adoption of mobile devices poses an imminent threat to preserving privacy. In order to prevent the leakage of sensitive information (such as the contact list, or private pictures) raised by inappropriate access, we propose a secure access…

Cloud deployment architectures have become a preferable computation model of Big Data (BD) operations. Their scalability, flexibility, and cost-effectiveness motivated this trend. In a such deployment model, the data are no longer physically…

Security-critical software applications contain confidential information which has to be protected from leaking to unauthorized systems. With language-based techniques, the confidentiality of applications can be enforced. Such techniques are for…

Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change the way of human living and working. Many scientific, industrial and environmental applications require real time information related to physical events…

The Internet of Medical Things (IoMT) is a collection of smart healthcare devices, hardware infrastructure, and related software applications, facilitating to connect healthcare information technology system via the Internet. It is also called IoT in…

The paper presents a brief introduction to big data and its role in healthcare applications. It is observed that the use of big data architecture and techniques are continuously assisting in managing the expeditious data growth in healthcare…

Within any country, the safety of the citizens is a major concern. Since LPG is highly flammable and can create dangerous situations in life. To avoid such situations, this system modifies the existing safety system of LPG leakage detection. The…

Accurate and fast leak detection and leak localization are critical functions for pipelines. In addition to the economic reasons for leak detection, there are also environmental constraints. Fast acting and reliable leak detection and leak location…

With the rapid growth of the Internet-of-Things (IoT), security issues for the IoT are becoming increasingly serious. Memory leaks are a common and harmful software defect for IoT programs running on resource-limited devices. Static analysis is an…

As extreme weather events have become more frequent in recent years, improving the resilience and reliability of power systems has become an important area of concern. In this paper, a robust preventive-corrective security-constrained optimal power…

Resilience is defined as the ability of the power system to maintain a desirable level of performance against severe turbulence and restore over an appropriate period of time. Adverse weather conditions and natural disasters have always led to…

WSNs are multihop networks, which depend on the intermediate nodes to relay the data packet to the destination. These nodes are equipped with lesser memory, limited battery power, little computation capability, small range of communication and need a…

The success of blockchain-based solutions, not only on a large scale, but since the beginning of the pilot phase, depends on a set of key factors such as performance, efficiency, usability, scalability. In particular, security, privacy and trust are…

The digital transformation brought on by 5G is redefining current models of end-to-end (E2E) connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights…

This paper presents a risk assessment in a health IoT system by applying a methodology focused on privacy, security, safety, resilience and reliability. OCARIoT is an IoT system under development that comprehends a variety of components from the…

This paper presents an IIoT systems risk assessment methodology focused on privacy, security, safety, resilience and reliability. The methodology is composed of ten phases that comprehends the risks elements to calculate the probability of a threat…

The paper presents a theft-prevention system, called the “Security Sensor System” (SSS), currently deployed on 50+ experimental trucks for Liquid Petroleum Gas (LPG) bulk distribution, and integrated on an Oil &amp

Cloud computing technologies rely on powerful storage services to maintain massive data for users. Sensitive data are encrypted before outsourcing, but this limits the availability of data. Public-key encryption with keyword search (PEKS) contributes…

The articles in this special section focus on power system security. As the power industry moves from a capacity-limited to an energyconstrained generation mix, diverse situations impact energy security. Environmental considerations may prevent the…

As the rapid proliferation of Internet of Things (IoT) and edge computing, large amounts of data are needed to be stored and transmitted in the online storage system. Data deduplication can be adopted to improve communication efficiency and minimize…

Industrial automation and control systems (IACS) are tremendously employing supervisory control and data acquisition (SCADA) network. However, their integration into IACS is vulnerable to various cyber-attacks. In this article, we first present…

The remarkable growth of gas-fired units application has made natural gas the main fuel for power generation, so the supply of natural gas for electricity should be given enough attention. In addition, due to the increasing popularity of renewable…

The fifth-generation (5G) wireless network is commercialized. The need to integrate massive devices in 5G and wireless sensor networks (WSN) to provide several convenient services for network users becomes imperative. However, there are growing…

The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to the Internet of Things-supported drone networks (IoD), thereby enabling smooth communication among devices and…

Lightweight Cryptography (LWC) based Authenticated Encryption with Associative Data (AEAD) cryptographic primitives require fewer computational and energy resources than conventional cryptographic primitives as a single operation of an AEAD scheme…

The so-called Internet of Vehicle (IoV) systems will interconnect numerous vehicles to communicate significant information through an Internet of Things (IoT) enabled network. It has emerged as a promising system wherein various data authentication…

The Internet of things (IoT) has certainly become one of the hottest technology frameworks of the year. It is deep in many industries, affecting people’s lives in all directions. The rapid development of the IoT technology accelerates the process of…

In this article, we analyze the inherent characteristics of smart grids, and point out that some electricity consumption data are very sensitive and should be encrypted. However, once the corresponding private key is compromised, the content of…

The development of Intelligent Cyber-Physical Systems (ICPSs) in virtual network environment is facing severe challenges. On the one hand, the Internet of things (IoT) based on ICPSs construction needs a large amount of reasonable network resources…

Nowadays, the petrol bunks are facing severe problems about when it will get burst because of sudden external conditions. Due to these conditions, the society and management of petrol bunks are getting loss of lives as well as damage of both private…

Cloud computing technologies rely on powerful storage services to maintain massive data for users. Sensitive data are encrypted before outsourcing, but this limits the availability of data. Public-key encryption with keyword search (PEKS) contributes…

The distributed energy system is used as the prototype of the energy Internet, including a variety of forms of energy networks, plenty of distributed equipment and energy storage equipment composed of energy flow, and real-time communication and data…

The secure shutdown time of submarine oil pipeline must be determined before pipeline designed and put into production. Considering the actual operation situations, physical model of heat transfer was established for submarine oil pipelines, and…

Blockchain is an underlying technology for securing many real-time applications and their data. The automobile is one such sector in which auto-manufacturers are looking forward to accepting the advantages of distributed ledger technology in…

The paper presents a theft-prevention system, called the “Security Sensor System” (SSS), currently deployed on 50+ experimental trucks for Liquid Petroleum Gas (LPG) bulk distribution, and integrated on an Oil &amp

Due to the lack of improper access control policies and decentralized access controllers, security and privacy-aware peer-to-peer (P2P) energy trading among electric vehicles (EVs) and the smart grid is challenging. Most of the solutions reported in…

Cooperative Intelligent Transport System (C-ITS) is a promising technology that aims to improve the traditional transport management systems. In C-ITS infrastructure Autonomous Vehicles (AVs) communicate wirelessly with other AVs, Road Side Units…

With the development of Internet of Vehicles (IoV), the integration of Internet of Things (IoT) and manual vehicles becomes inevitable in Intelligent Transportation Systems (ITS). In ITS, the IoVs communicate wirelessly with other IoVs, Road Side…

With the development of China's economy, the nation's crude oil production is far from meeting the demand now. Therefore, China requires a large amount of crude oil imported from abroad to meet the domestic consumption demand. Except for small part…

Today's systems, approaches, and technologies leveraged for managing oil and gas supply chain operations fall short of providing operational transparency, traceability, audit, security, and trusted data provenance features. Also, a large portion of…

Today's systems, approaches, and technologies leveraged for managing oil and gas supply chain operations fall short of providing operational transparency, traceability, audit, security, and trusted data provenance features. Also, a large portion of…

Wireless Sensor Networks (WSNs) involve top potential technologies that will dramatically change the way of human living and working. Many scientific, industrial and environmental applications require real time information related to physical events…

Power-to-gas (P2G) can convert excessive renewable energy into hydrogen via electrolysis, which can then be transported by natural gas systems to bypass constrained electricity systems. However, the injection of hydrogen could impact gas security…

Accurate and fast leak detection and leak localization are critical functions for pipelines. In addition to the economic reasons for leak detection, there are also environmental constraints. Fast acting and reliable leak detection and leak location…

In view of the offshore oil&gas field facilities demand, China National Offshore Oil Corporation (CNOOC) conducted a pilot study on landing subsea pipeline safety&security system. By using various techniques, such as radar and AIS system, CNOOC…

The process of oil and gas pipeline route selection involves many complex decision-making problems which include quantitative factors as well as a large number of qualitative factors that cannot be quantified. These factors affect the oil and gas…

With the development of China's economy, the nation's crude oil production is far from meeting the demand now. Therefore, China requires a large amount of crude oil imported from abroad to meet the domestic consumption demand. Except for small part…

Ship to ship(STS) crude oil transfer at sea is universally recognized high-risk operation at sea. When incidents happen during crude oil transfer operations enormous oil spill accident and tremendous environmental damage will be caused, induced…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2