Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 11 de 11
Filtrar
Más filtros










Base de datos
Intervalo de año de publicación
1.
Sensors (Basel) ; 24(2)2024 Jan 22.
Artículo en Inglés | MEDLINE | ID: mdl-38276404

RESUMEN

Widespread and ever-increasing cybersecurity attacks against Internet of Things (IoT) systems are causing a wide range of problems for individuals and organizations. The IoT is self-configuring and open, making it vulnerable to insider and outsider attacks. In the IoT, devices are designed to self-configure, enabling them to connect to networks autonomously without extensive manual configuration. By using various protocols, technologies, and automated processes, self-configuring IoT devices are able to seamlessly connect to networks, discover services, and adapt their configurations without requiring manual intervention or setup. Users' security and privacy may be compromised by attackers seeking to obtain access to their personal information, create monetary losses, and spy on them. A Denial of Service (DoS) attack is one of the most devastating attacks against IoT systems because it prevents legitimate users from accessing services. A cyberattack of this type can significantly damage IoT services and smart environment applications in an IoT network. As a result, securing IoT systems has become an increasingly significant concern. Therefore, in this study, we propose an IDS defense mechanism to improve the security of IoT networks against DoS attacks using anomaly detection and machine learning (ML). Anomaly detection is used in the proposed IDS to continuously monitor network traffic for deviations from normal profiles. For that purpose, we used four types of supervised classifier algorithms, namely, Decision Tree (DT), Random Forest (RF), K Nearest Neighbor (kNN), and Support Vector Machine (SVM). In addition, we utilized two types of feature selection algorithms, the Correlation-based Feature Selection (CFS) algorithm and the Genetic Algorithm (GA) and compared their performances. We also utilized the IoTID20 dataset, one of the most recent for detecting anomalous activity in IoT networks, to train our model. The best performances were obtained with DT and RF classifiers when they were trained with features selected by GA. However, other metrics, such as training and testing times, showed that DT was superior.

2.
Heliyon ; 9(10): e20497, 2023 Oct.
Artículo en Inglés | MEDLINE | ID: mdl-37842607

RESUMEN

An effective internal auditor can support an organization in achieving its goals and protect its assets and funds. However, to be effective, the internal auditors need to be empowered with relevant resources. This study aims at probing the influence of the empowerments (management support, external auditors' collaboration, independence, size of internal audit units, and extrinsic rewards) on the internal auditors' effectiveness, and to examin whether extrinsic rewards moderate the association between respective empowerments and the effectiveness of Jordanian public sector internal auditors'. The current work relied on 117 surveys collected from Jordan's internal audit and financial managers in the public sectors. According to the Resource-Based View (RBV), the findings show that management support, external auditors cooperation, independence, and extrinsic rewards all have a significant influence on the effectiveness of internal auditor. The of the Internal Audit Department (IAD) size was discovered to be insignificant. Also, the results have revealed partial support for the influence of the extrinsic reward as a moderator. Because of the prominence of the public sector in the Jordanian market, this current research expands on the idea of enabling internal auditor (IA) to accomplish their assigned objectives. The findings might help authorities develop new norms and legislation for the internal audit profession. These empowering characteristics may also improve internal auditors' capacity to execute their duty in saving public monies and limiting corrupt practices inside public sector organizations.

3.
Artículo en Inglés | MEDLINE | ID: mdl-35742560

RESUMEN

The pandemic's context is rife with numerous dangerous threats and high fear levels, influencing human decision-making. Such characteristics are identified by investigating the acceptance of exposure detection apps from the technology acceptance model (TAM) perspective. This study purposed a model to investigate protection technology acceptance, specifically exposure detection apps in the context of COVID-19. Quantitative study approach and a cross-section design targeted 586 participants from Saudi Arabia. As the study model is complex, the study hypotheses were analysed using the structural equation modelling-partial least squares (SEM-PLS3) approach. The findings support the entire model hypothesis except the link between social media awareness and exposure detection apps' intention. Mediation of COVID-19 anxiety and influence was confirmed as well. The current paper contributes to the technologies acceptance domain by developing a context-driven model comprising the major pandemic characteristics that lead to various patterns of technology acceptance. This study also fills the literature gap regarding mediating effects of social influence and COVID-19 anxiety in the relationship between trust in government and exposure detection apps implementation, and between COVID-19 anxiety and exposure detection apps implementation, respectively. The results may assist government agencies, health policymakers, and health organisations in the wide world and specifically Saudi Arabia, in their attempts to contain the COVID-19 pandemic spread.


Asunto(s)
COVID-19 , Aplicaciones Móviles , Medios de Comunicación Sociales , COVID-19/epidemiología , Humanos , Intención , Pandemias , Arabia Saudita/epidemiología
4.
Comput Intell Neurosci ; 2022: 5112375, 2022.
Artículo en Inglés | MEDLINE | ID: mdl-35449734

RESUMEN

Data redundancy or fusion is one of the common issues associated with the resource-constrained networks such as Wireless Sensor Networks (WSNs) and Internet of Things (IoTs). To resolve this issue, numerous data aggregation or fusion schemes have been presented in the literature. Generally, it is used to decrease the size of the collected data and, thus, improve the performance of the underlined IoTs in terms of congestion control, data accuracy, and lifetime. However, these approaches do not consider neighborhood information of the devices (cluster head in this case) in the data refinement phase. In this paper, a smart and intelligent neighborhood-enabled data aggregation scheme is presented where every device (cluster head) is bounded to refine the collected data before sending it to the concerned server module. For this purpose, the proposed data aggregation scheme is divided into two phases: (i) identification of neighboring nodes, which is based on the MAC address and location, and (ii) data aggregation using k-mean clustering algorithm and Support Vector Machine (SVM). Furthermore, every CH is smart enough to compare data sets of neighboring nodes only; that is, data of nonneighbor is not compared at all. These algorithms were implemented in Network Simulator 2 (NS-2) and were evaluated in terms of various performance metrics, such as the ratio of data redundancy, lifetime, and energy efficiency. Simulation results have verified that the proposed scheme performance is better than the existing approaches.


Asunto(s)
Redes de Comunicación de Computadores , Tecnología Inalámbrica , Análisis por Conglomerados , Internet , Aprendizaje Automático
5.
Sensors (Basel) ; 22(6)2022 Mar 09.
Artículo en Inglés | MEDLINE | ID: mdl-35336282

RESUMEN

The Industrial Internet of Things (IIoT) is gaining importance as most technologies and applications are integrated with the IIoT. Moreover, it consists of several tiny sensors to sense the environment and gather the information. These devices continuously monitor, collect, exchange, analyze, and transfer the captured data to nearby devices or servers using an open channel, i.e., internet. However, such centralized system based on IIoT provides more vulnerabilities to security and privacy in IIoT networks. In order to resolve these issues, we present a blockchain-based deep-learning framework that provides two levels of security and privacy. First a blockchain scheme is designed where each participating entities are registered, verified, and thereafter validated using smart contract based enhanced Proof of Work, to achieve the target of security and privacy. Second, a deep-learning scheme with a Variational AutoEncoder (VAE) technique for privacy and Bidirectional Long Short-Term Memory (BiLSTM) for intrusion detection is designed. The experimental results are based on the IoT-Botnet and ToN-IoT datasets that are publicly available. The proposed simulations results are compared with the benchmark models and it is validated that the proposed framework outperforms the existing system.


Asunto(s)
Cadena de Bloques , Aprendizaje Profundo , Seguridad Computacional , Internet , Privacidad
6.
Artículo en Inglés | MEDLINE | ID: mdl-35329057

RESUMEN

This study aims to assess workers' perception of occupational and environmental risks and hazards using the psychometric paradigm. For this purpose, data were collected using survey questionnaires from 360 mineworkers recruited from mineral and sand mines. Respondents were asked to evaluate eight occupational and environmental risks and hazards on nine commonly used risk characteristics. The principal component analysis revealed that two components, "Dreaded" and "Unknown", explained 73% percent of the total variance in workers' risk perception. The results also showed that the risk of developing an occupational disease was perceived as the most dreaded and unknown type of risk, while landslide, occupational noise, and vibration exposure were the least familiar to the respondents. A practical implication of this research is that the results may offer an insight into the employees' perceptions of the hazards and risks associated with their working environment. This could help risk management develop and implement effective risk management and communications strategies.


Asunto(s)
Mineros , Enfermedades Profesionales , Exposición Profesional , Salud Laboral , Humanos , Percepción , Psicometría , Encuestas y Cuestionarios
7.
Sensors (Basel) ; 22(4)2022 Feb 13.
Artículo en Inglés | MEDLINE | ID: mdl-35214350

RESUMEN

Digital healthcare is a composite infrastructure of networking entities that includes the Internet of Medical Things (IoMT)-based Cyber-Physical Systems (CPS), base stations, services provider, and other concerned components. In the recent decade, it has been noted that the demand for this emerging technology is gradually increased with cost-effective results. Although this technology offers extraordinary results, but at the same time, it also offers multifarious security perils that need to be handled effectively to preserve the trust among all engaged stakeholders. For this, the literature proposes several authentications and data preservation schemes, but somehow they fail to tackle this issue with effectual results. Keeping in view, these constraints, in this paper, we proposed a lightweight authentication and data preservation scheme for IoT based-CPS utilizing deep learning (DL) to facilitate decentralized authentication among legal devices. With decentralized authentication, we have depreciated the validation latency among pairing devices followed by improved communication statistics. Moreover, the experimental results were compared with the benchmark models to acknowledge the significance of our model. During the evaluation phase, the proposed model reveals incredible advancement in terms of comparative parameters in comparison with benchmark models.


Asunto(s)
Seguridad Computacional , Internet de las Cosas , Comunicación , Atención a la Salud , Tecnología
8.
Sensors (Basel) ; 22(2)2022 Jan 12.
Artículo en Inglés | MEDLINE | ID: mdl-35062530

RESUMEN

The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchain-enabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system.


Asunto(s)
Cadena de Bloques , Registros de Salud Personal , Atención a la Salud , Humanos , Redes Neurales de la Computación , Reproducibilidad de los Resultados
9.
Comput Intell Neurosci ; 2021: 8016525, 2021.
Artículo en Inglés | MEDLINE | ID: mdl-34938329

RESUMEN

Smart health surveillance technology has attracted wide attention between patients and professionals or specialists to provide early detection of critical abnormal situations without the need to be in direct contact with the patient. This paper presents a secure smart monitoring portable multivital signal system based on Internet-of-Things (IoT) technology. The implemented system is designed to measure the key health parameters: heart rate (HR), blood oxygen saturation (SpO2), and body temperature, simultaneously. The captured physiological signals are processed and encrypted using the Advanced Encryption Standard (AES) algorithm before sending them to the cloud. An ESP8266 integrated unit is used for processing, encryption, and providing connectivity to the cloud over Wi-Fi. On the other side, trusted medical organization servers receive and decrypt the measurements and display the values on the monitoring dashboard for the authorized specialists. The proposed system measurements are compared with a number of commercial medical devices. Results demonstrate that the measurements of the proposed system are within the 95% confidence interval. Moreover, Root Mean Squared Error (RMSE), Mean Absolute Error (MAE), and Mean Relative Error (MRE) for the proposed system are calculated as 1.44, 1.12, and 0.012, respectively, for HR, 1.13, 0.92, and 0.009, respectively, for SpO2, and 0.13, 0.11, and 0.003, respectively, for body temperature. These results demonstrate the high accuracy and reliability of the proposed system.


Asunto(s)
Nube Computacional , Internet de las Cosas , Comunicación , Humanos , Saturación de Oxígeno , Reproducibilidad de los Resultados
10.
Educ Inf Technol (Dordr) ; 25(6): 5261-5280, 2020.
Artículo en Inglés | MEDLINE | ID: mdl-32837229

RESUMEN

The provision and usage of online and e-learning system is becoming the main challenge for many universities during COVID-19 pandemic. E-learning system such as Blackboard has several fantastic features that would be valuable for use during this COVID-19 pandemic. However, the successful usage of e-learning system relies on understanding the adoption factors as well as the main challenges that face the current e-learning systems. There is lack of agreement about the critical challenges and factors that shape the successful usage of e-learning system during COVID-19 pandemic; hence, a clear gap has been identified in the knowledge on the critical challenges and factors of e-learning usage during this pandemic. Therefore, this study aims to explore the critical challenges that face the current e-learning systems and investigate the main factors that support the usage of e-learning system during COVID-19 pandemic. This study employed the interview method using thematic analysis through NVivo software. The interview was conducted with 30 students and 31 experts in e-learning systems at six universities from Jordan and Saudi Arabia. The findings of this study offer useful suggestions for policy-makers, designers, developers and researchers, which will enable them to get better acquainted with the key aspects of the e-learning system usage successfully during COVID-19 pandemic.

11.
Sensors (Basel) ; 20(8)2020 Apr 18.
Artículo en Inglés | MEDLINE | ID: mdl-32325646

RESUMEN

Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper, an edge node scheme is proposed to address the issue of jamming attack in WSNs. Three edge nodes are used in the deployed area of WSN, which have different transmission frequencies in the same bandwidth. The different transmission frequencies and Round Trip Time (RTT) of transmitting signal makes it possible to identify the jamming attack channel in WSNs transmission media. If an attacker jams one of the transmission channels, then the other two edge nodes verify the media serviceability by means of transmitting information from the same deployed WSNs. Furthermore, the RTT of the adjacent channel is also disturbed from its defined interval of time, due to high frequency interference in the adjacent channels, which is the indication of a jamming attack in the network. The simulation result was found to be quite consistent during analysis by jamming the frequency channel of each edge node in a step-wise process. The detection rate of jamming attacks was about 94% for our proposed model, which was far better than existing schemes. Moreover, statistical analyses were undertaken for field-proven schemes, and were found to be quite convincing compared with the existing schemes, with an average of 6% improvement.

SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA
...