Cryptography,
Journal Year:
2024,
Volume and Issue:
8(4), P. 53 - 53
Published: Nov. 15, 2024
Implantable
medical
devices,
or
IMDs
for
short,
are
instruments
that
placed
into
the
human
body
through
surgery.
typically
used
treating
chronic
diseases.
Currently
available
capable
of
communicating
using
wireless
channels
with
other
either
in
close
proximity
even
connected
to
Internet,
making
part
Internet
Medical
Things.
This
capability
opens
possibility
developing
a
wide
range
services,
like
remote
patient
data
control,
localization
case
emergency,
telemedicine,
which
can
improve
patients’
lifestyle.
On
hand,
given
limited
resources
such
tiny
and
access
there
numerous
security
issues
be
considered
when
designing
deploying
their
support
infrastructures.
In
this
paper,
we
highlight
problems
related
Internet-connected
IMDs,
survey
some
solutions
have
been
presented
literature.
Sensors,
Journal Year:
2024,
Volume and Issue:
24(11), P. 3575 - 3575
Published: June 1, 2024
Internet
of
Things
(IoT)
technology
is
evolving
over
the
peak
smart
infrastructure
with
participation
IoT
devices
in
a
wide
range
applications.
Traditional
authentication
methods
are
vulnerable
to
threats
due
wireless
data
transmission.
However,
resource-
and
energy-constrained,
so
building
lightweight
security
that
provides
stronger
essential.
This
paper
proposes
novel,
two-layered
multi-factor
(2L-MFA)
framework
using
blockchain
enhance
user
security.
The
first
level
for
devices,
one
considers
secret
keys,
geographical
location,
physically
unclonable
function
(PUF).
Proof-of-authentication
(PoAh)
elliptic
curve
Diffie–Hellman
followed
low
latency
support.
Second-level
users,
which
sub-categorized
into
four
levels,
each
defined
by
specific
factors
such
as
identity,
password,
biometrics.
involves
matrix-based
password;
second
utilizes
digital
signature
algorithm
(ECDSA);
levels
3
4
secured
iris
finger
vein,
providing
comprehensive
robust
authentication.
We
deployed
fuzzy
logic
validate
make
system
more
robust.
2L-MFA
model
significantly
improves
performance,
reducing
registration,
login,
times
up
25%,
50%,
respectively,
facilitating
quicker
cloud
access
post-authentication
enhancing
overall
efficiency.
Future Internet,
Journal Year:
2024,
Volume and Issue:
16(6), P. 206 - 206
Published: June 11, 2024
Artificial
Intelligence
(AI)
and
Deep
Reinforcement
Learning
(DRL)
have
revolutionised
e-learning
by
creating
personalised,
adaptive,
secure
environments.
However,
challenges
such
as
privacy,
bias,
data
limitations
persist.
E-FedCloud
aims
to
address
these
issues
providing
more
agile,
experiences.
This
study
introduces
E-FedCloud,
an
AI-assisted,
adaptive
system
that
automates
personalised
recommendations
tracking,
thereby
enhancing
student
performance.
It
employs
federated
learning-based
authentication
ensure
private
access
for
both
course
instructors
students.
Intelligent
Software
Agents
(ISAs)
evaluate
weekly
engagement
using
the
Shannon
Entropy
method,
classifying
students
into
either
engaged
or
not-engaged
clusters.
utilises
status,
demographic
information,
innovative
DRL-based
early
warning
system,
specifically
ID2QN,
predict
performance
of
Based
on
predictions,
categorises
three
groups:
risk
dropping
out,
scoring
lower
in
final
exam,
failing
end
exam.
a
multi-disciplinary
ontology
graph
attention-based
capsule
network
automated,
recommendations.
The
also
integrates
tracking
enhance
engagement.
Data
are
securely
stored
blockchain
LWEA
encryption
method.
International Journal of Computers and Informatics,
Journal Year:
2024,
Volume and Issue:
3(3), P. 42 - 62
Published: March 31, 2024
The
aim
of
this
research
is
to
assess
the
Role
Cloud
Storage
in
Rebuilding
Governmental
Data
After
Conflict,
with
a
deeper
insight
into
Sudanese
case.
To
investigate
role
cloud
storage
rebuilding
governmental
data
after
conflict
Sudan,
study
employs
quantitative
methodology.
primary
collection
instrument
structured
questionnaire
designed
gather
insights
and
perspectives
from
80
participants
key
stakeholders
involved
adoption
reconstruction
efforts
including
(IT
professionals
management
experts,
Senior-level
government
officials
policymakers,
Representatives
service
providers,
End-users
consumers
various
agencies).
collected
underwent
accurate
statistical
analysis,
descriptive
inferential
techniques,
identify
patterns,
trends,
relationships
among
variables
under
investigation.
Quantitative
was
analyzed
using
"SPSS"
software.
findings
revealed
that,
total
18
representing
(22.5%)
agree
that
there
high
level
awareness
understanding
technologies
agencies
while
28
(35%)
disagree.
Which
indicates
need
spreading
Sudan.
Furthermore,
Pearson
Chi-Square
test
used
measure
significance
value
(0.021)
which
less
than
(p-value=.05)
suggests
significant
2022 IEEE Wireless Communications and Networking Conference (WCNC),
Journal Year:
2024,
Volume and Issue:
unknown, P. 1 - 6
Published: April 21, 2024
Permissionless
blockchain
technology
offers
numerous
potential
benefits
for
decentralised
applications,
such
as
security,
transparency,
and
openness.BFT-based
consensus
mechanisms
are
widely
adopted
in
the
permissioned
to
meet
high
scalability
requirements
of
network.Sybil
attacks
one
most
threats
when
applying
BFT-based
permissionless
due
lack
effective
verification
participants'
identities.This
paper
presents
a
novel
endorsement-based
bootstrapping
protocol
with
signature
algorithm
that
streamlined,
scalable
identity
endorsement
process.This
approach
effectively
safeguards
mechanism
against
Sybil
attacks.Using
our
proposed
method,
we
have
conducted
thorough
security
analyses
simulation
experiments
assess
robustness,
advantages
large-scale
networks.Our
results
demonstrate
scheme
can
address
challenges
blockchain.
Voprosy kiberbezopasnosti,
Journal Year:
2024,
Volume and Issue:
3 (61)
Published: Jan. 1, 2024
Цель
исследования:
формирование
алгоритма
оценки
доверия
к
процессу
аудита
информационной
безопасности,
состоящего
из
последовательного
многоэтапного
анализа
доказательств
по
иерархической
модели
«объект-критерии-метрики»