Authored by Nicholas Potteiger, Ankita Samaddar, Hunter Bergstrom, Xenofon Koutsoukos
The rise in autonomous Unmanned Aerial Vehicles (UAVs) for objectives requiring long-term navigation in diverse environments is attributed to their compact, agile, and accessible nature. Specifically, problems exploring dynamic obstacle and collision avoidance are of increasing interest as UAVs become more popular for tasks such as transportation of goods, formation control, and search and rescue routines. Prioritizing safety in the design of autonomous UAVs is crucial to prevent costly collisions that endanger pedestrians, mission success, and property. Safety must be ensured in these systems whose behavior emerges from multiple software components including learning-enabled components. Learning-enabled components, optimized through machine learning (ML) or reinforcement learning (RL) require adherence to safety constraints while interacting with the environment during training and deployment, as well as adaptation to new unknown environments. In this paper, we safeguard autonomous UAV navigation by designing agents based on behavior trees with learning-enabled components, referred to as Evolving Behavior Trees (EBTs). We learn the structure of EBTs with explicit safety components, optimize learning-enabled components with safe hierarchical RL, deploy, and update specific components for transfer to unknown environments. Safe and successful navigation is evaluated using a realistic UAV simulation environment. The results demonstrate the design of an explainable learned EBT structure, incurring near-zero collisions during training and deployment, with safe time-efficient transfer to an unknown environment.
Authored by Nicholas Potteiger, Xenofon Koutsoukos
The purpose of this article is to explore the use of wireless communication technology for network connectivity in ocean liner environments, which is different from the data security system of wired networks. The key work is based on data security practices in the ocean liner environment, including building a data security classification system and developing different security strategies in data collection, storage, transmission, processing, and other aspects. In addition, machine learning methods are introduced into security warning strategies to intelligently analyze data security risks and make decisions.
Authored by He Jing, Chen Ming-jun
With increased connectivity and the application of intelligent technologies, intelligent and connected vehicles are evolving rapidly, which offers new opportunities for vehicle data security risks. However, there are currently insufficient studies to comprehensively map the security risks throughout the life cycle of intelligent and connected vehicle data. The object of this paper is to identify the main data security risks at different data life cycle phases in the field of intelligent and connected vehicles, and the data security problems those risks may bring. The following are some of the techniques used to protect the security of data against risks. The test verification is implemented by using functional reproduction and data packet capture analysis. The results indicate that there are vehicle data security risks to personal information, including location and biometric information. This paper is useful for intelligent and connected vehicle data processors in their targeted application of technical and managerial measures to mitigate data security risks in the whole data life cycle.
Authored by Yujia Li, Yueyou Wang, Jue Wang, Hanbing Wu, Xianzhao Xia
This paper proposes a secure data storage scheme for protecting network privacy. In the system hardware design, it is divided into interface module, basic service module and storage module. The three functional modules work together to improve the security of personal privacy data on the Internet. Establish a personal privacy database in software to ensure the security of personal privacy data. Asymmetric cryptography is used to encrypt and decrypt the data. Finally, the encrypted privacy information data is processed centrally to realize the combined storage of privacy information in the computer network. By comparing the safety and operation effect of the system, it is proved that the system has great advantages in safety and efficiency. The simulation results show that the method is effective.
Authored by Lanshuang Li, Yuzhen Feng, Yuanbao Feng, Zhihong Lu, Xiangyang Gao, Chuican Chen
Online Social Network is a network communication platform where users have profiles that can be uniquely identified by the content sent. This content can be produced, consumed, and interacted with by other users. To connect with other users on social media, users must register by providing Personally Identifiable Information (PII) to social media platforms. PII is specific information that can identify or track individuals directly. This specific information may include your name, address, social security number, or other identifying code numbers such as telephone numbers, email addresses, and others. Personal identifiable information leakage is a problem in data security. Basically, every individual does not want their personal data to be known by anyone. Utilizing a sample size of 50 respondents, this study aims to ascertain the percentage of individuals who are aware of PII security on social media. This research will use quantitative methods by distributing questionnaires. The questionnaire in this study uses a social media attribute design. The results of the survey indicate that many respondents are unaware of the security of their data and have a limited understanding of how their personal data is managed by technology companies, particularly the 80\% of non-IT respondents.
Authored by Gabriel Christie, Ivan, Javier Trevan, Said Achmad, Franz Junior, Nadia
Heterogeneous wireless networks (HWNs) have security risks and challenges, and traditional network security monitoring methods are difficult to meet the security needs. This paper analyzes and researches the security monitoring algorithm of HWNs based on big data intelligent information technology, analyzes the security monitoring algorithm of HWNs based on big data intelligent information technology, which is able to dig out potential security threats from the massive network data and carry out real-time monitoring and early warning through the use of big data correlation algorithm and network security management algorithm. The experimental tests on HWNs show that big data intelligent information technology can reduce the risk of HWN environment. the accuracy and precision of HWNs events are improved, the accuracy rate is increased by about 1.2\% and the precision rate is increased by about 1.1\%. The feasibility and effectiveness of the HWNs safety monitoring algorithm based on big data intelligent information technology is verified, which lays the foundation for more research in this field
Authored by Xiaomeng Duan, Yun Zhou, Jiabin Guan
Problems such as the increase in the number of private vehicles with the population, the rise in environmental pollution, the emergence of unmet infrastructure and resource problems, and the decrease in time efficiency in cities have put local governments, cities, and countries in search of solutions. These problems faced by cities and countries are tried to be solved in the concept of smart cities and intelligent transportation by using information and communication technologies in line with the needs. While designing intelligent transportation systems (ITS), beyond traditional methods, big data should be designed in a state-of-the-art and appropriate way with the help of methods such as artificial intelligence, machine learning, and deep learning. In this study, a data-driven decision support system model was established to help the business make strategic decisions with the help of intelligent transportation data and to contribute to the elimination of public transportation problems in the city. Our study model has been established using big data technologies and business intelligence technologies: a decision support system including data sources layer, data ingestion/ collection layer, data storage and processing layer, data analytics layer, application/presentation layer, developer layer, and data management/ data security layer stages. In our study, the decision support system was modeled using ITS data supported by big data technologies, where the traditional structure could not find a solution. This paper aims to create a basis for future studies looking for solutions to the problems of integration, storage, processing, and analysis of big data and to add value to the literature that is missing within the framework of the model. We provide both the lack of literature, eliminate the lack of models before the application process of existing data sets to the business intelligence architecture and a model study before the application to be carried out by the authors.
Authored by Kutlu Sengul, Cigdem Tarhan, Vahap Tecim
Intelligent Systems for Personal Data Cyber Security is a critical component of the Personal Information Management of Medicaid Enterprises. Intelligent Systems for Personal Data Cyber Security combines components of Cyber Security Systems with Human-Computer Interaction. It also uses the technology and principles applied to the Internet of Things. The use of software-hardware concepts and solutions presented in this report is, in the authors’ opinion, some step in the working-out of the Intelligent Systems for Personal Data Cyber Security in Medicaid Enterprises. These concepts may also be useful for developers of these types of systems.
Authored by Alexey Zalozhnev, Vasily Ginz, Anatoly Loktionov
The introductory part of the research mainly focuses on the importance of using block chain facilities by using the 5G Network that can be useful for data privacy and security. It can be said that the research mainly focuses on all the benefits of using block chain technology in order to protect all the access of relevant data by implementing intelligent contracts for enhancing the security framework related to the use of 5G networks on the data protection activities. The Literature review of the research mainly concentrates on the benefits and merits of applying the block chain facilities for enhancing both the growth as well as the development of data protection and data privacy. All the merits, as well as demerits of using the block chain facility, have been also discussed throughout the overall research paper. On the other hand, various methods, as well as strategies for applying the block chain facilities, also have been analyzed throughout the literature review section of this research paper. A survey was conducted in this particular scenario to get a clear comprehension of the situation. A survey was conducted with fifty one random people that enable the researches to get a clear picture of the trend while fetching some real life data in this particular scenario.
Authored by Prabhakara Kapula, Gnana Jeslin, Gururaj Hosamani, Prashant Vats, Chetan Shelke, Surendra Shukla
The data of the government and enterprises, as the production factors are facing risks and problems of security violations, such as data leakage, data abuse and data tampering during quick circulation. This paper studies the security supervision architecture of data circulation (exchange, sharing, transaction) from the perspective of the whole life cycle, proposes and constructs the security supervision metadata model, which is used to represent the changes of users, behavior, data lineage, etc. during the whole life cycle of data; For massive data, based on the metadata model of security supervision, innovates the key technologies such as data security monitoring, tracing and ownership authentication; Per the verification need, a set of security supervision prototype showing security situation, tracing performance, ownership construction/authentication and low-level visual explorer is developed.
Authored by Hui Yang, Yang Cao
This article proposes a technique that establishes the procedure for evaluating the level of efficiency of the information security department (an employee performing information security functions). The technique uses performance evaluation criteria based on the apparatus of fuzzy logic, the composition of fuzzy relations. The technique describes the procedure for evaluating the effectiveness of the information security department (information security officer) during audits in the area of "Organization and state of work on information protection", self-assessment of the effectiveness of work. The method of assessing the level of efficiency consists in presenting with the help of a set of measurements (both at the quantitative and qualitative level) the features collected to build a classification of the effectiveness of the information security department (information security officer). Based on a set of measurements of signs, the decision-maker must determine (classify) the effectiveness of work using the criteria for assessing the quality of their work. In the future, the methodology can be expanded for additional purposes of predicting the level of security of informatization objects.
Authored by Viktor Belov, Nadezhda Belova, Tamara Pestunova, Dmitry Kosov
Questions of video information resource security assessment are considered in case of the video conferencing organization in systems of public administration. Is shown that for an assessment of information security it is necessary to make the analysis of potential security risks, to construct model of threats and to execute an assessment for specific conditions of functioning of a video conferencing. The most significant security risks are defined.
Authored by Tatyana Belikova, Andrii Vlasov, Pavlo Hurzhii, Natalia Korolyova, Oleksandra Voitsekhivska, Mykhailo Babenko
In response to the advent of software defined world, this Fast Abstract introduces a new notion, information gravitation, with an attempt to unify and expand two related ones, information mass (related to the supposed fifth force) and data gravitation. This is motivated by the following question: is there a new kind of (gravitational) force between any two distinct pieces of information conveying messages. A possibly affirmative answer to this question of information gravitation, which is supposed to explore the theoretically and/or experimentally justified interplay between information and gravitation, might make significant sense for the software defined world being augmented with artificial intelligence and virtual reality in the age of information. Information induces gravitation. Information gravitation should be related to Newton s law of universal gravitation and Einstein s general theory of relativity, and even to gravitational waves and the unified theory of everything.
Authored by Kai-Yuan Cai
Chaotic cryptography is structurally related to the concepts of confusion and diffusion in traditional cryptography theory. Chaotic cryptography is formed by the inevitable connection between chaos theory and pure cryptography. In order to solve the shortcomings of the existing research on information encryption security system, this paper discusses the realization technology of information security, the design principles of encryption system and three kinds of chaotic mapping systems, and discusses the selection of development tools and programmable devices. And the information encryption security system based on chaos algorithm is designed and discussed, and the randomness test of three groups of encrypted files is carried out by the proposed algorithm and the AES (Advanced Encryption Standard) algorithm. Experimental data show that the uniformity of P-value value of chaos algorithm is 0.714 on average. Therefore, it is verified that the information encryption security system using chaos algorithm has high security.
Authored by Xiya Liu
The role of information security in network accounting is very important, but there is a problem of inaccurate outcome evaluation. The one-way hash encryption algorithm cannot solve the information security problem in network accounting, and the evaluation is unreasonable. Therefore, this paper proposes an AES algorithm for network accounting information security analysis. First, the business operation theory is used to integrate the data, and the indicators are divided according to the information security requirements to reduce network accounting information s security in the interfering factor. Then, the business operation theory is used to form a network accounting scheme and synthesize the AES algorithm analysis results. MBAZ shows that under certain evaluation criteria, the AES algorithm is safe for the accounting information of network accounting the accuracy and time are better than the one-way hash encryption algorithm.
Authored by Dan Hu
To date, there are a lot of research works related to the application of game theory to model the interaction between a cyber attacker and defender. At the same time there are some challenges that prevent development and practical application of such approaches. One of the challenges is that at each point in time, the cyber attacker and the defender do not have accurate information about the adversary’s strategy, which results in an uncertainty in choosing their own strategy. The paper considers the application of hypergame theory to process this uncertainty. The authors use the attack graph is used to determine the possible strategies of the cyber attacker, while the graph of dependencies between the assets of the information system is used to determine the gain when applying a particular strategy. Thus, the result of the research is a proposed approach to security analysis and decision support for security incidents response based on the hypergame theory.
Authored by Elena Fedorchenko, Igor Kotenko, Boying Given, Yin Li
With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.
Authored by Ulyana Kuzmina, Oleg Kazakov, Bogdan Erushev
Information security construction is a social issue, and the most urgent task is to do an excellent job in information risk assessment. The bayesian neural network currently plays a vital role in enterprise information security risk assessment, which overcomes the subjective defects of traditional assessment results and operates efficiently. The risk quantification method based on fuzzy theory and Bayesian regularization BP neural network mainly uses fuzzy theory to process the original data and uses the processed data as the input value of the neural network, which can effectively reduce the ambiguity of language description. At the same time, special neural network training is carried out for the confusion that the neural network is easy to fall into the optimal local problem. Finally, the risk is verified and quantified through experimental simulation. This paper mainly discusses the problem of enterprise information security risk assessment based on a Bayesian neural network, hoping to provide strong technical support for enterprises and organizations to carry out risk rectification plans. Therefore, the above method provides a new information security risk assessment idea.
Authored by Zijie Deng, Guocong Feng, Qingshui Huang, Hong Zou, Jiafa Zhang
In today s society, with the continuous development of artificial intelligence, artificial intelligence technology plays an increasingly important role in social and economic development, and hass become the fastest growing, most widely used and most influential high-tech in the world today one. However, at the same time, information technology has also brought threats to network security to the entire network world, which makes information systems also face huge and severe challenges, which will affect the stability and development of society to a certain extent. Therefore, comprehensive analysis and research on information system security is a very necessary and urgent task. Through the security assessment of the information system, we can discover the key hidden dangers and loopholes that are hidden in the information source or potentially threaten user data and confidential files, so as to effectively prevent these risks from occurring and provide effective solutions; at the same time To a certain extent, prevent virus invasion, malicious program attacks and network hackers intrusive behaviors. This article adopts the experimental analysis method to explore how to apply the most practical, advanced and efficient artificial intelligence theory to the information system security assessment management, so as to further realize the optimal design of the information system security assessment management system, which will protect our country the information security has very important meaning and practical value. According to the research results, the function of the experimental test system is complete and available, and the security is good, which can meet the requirements of multi-user operation for security evaluation of the information system.
Authored by Song He, Xiaohong Shi, Yan Huang, Gong Chen, Huihui Tang
As technology has progressed, people have begun to perform various daily tasks by using different online applications and services, which has led to a large number of incidents of identity theft. These unpleasant events incur expensive costs for individuals, companies, and authorities, and as a result, identity theft concerns them greatly. Although scholars of information security have devoted their efforts to developing technology to prevent identity theft, it is not clear what factors influence an individual’s security protection motivation. Few empirical and behavioral studies on this topic have been conducted. To fill this gap, this study extends the protection motivation theory with anxiety, elucidating the influences of a future negative event (identity theft) on an individual’s current emotion, which in turn determines protection motivation. This study proposes a research model that explores the influences of threat appraisal (perceived severity and perceived susceptibility) and coping appraisal (response efficacy and self-efficacy) on anxiety, which affects protection motivation. The results in this study provide a more holistic comprehension of identity theft and protection motivation, and can be referred to when developing efficient security guidance and practices.
Authored by Hsiu-Hua Cheng
This paper conducts an evaluation of two IBM quantum systems: Quantum Eagle r3 (Sherbrooke, 127 qubits) and Falcon r8 (Peekskill, 27 qubits), with an emphasis on benchmarking these systems and their differing approaches to generating Greenberger-Horne-Zeilinger (GHZ) states, a specific type of multi-partite entangled quantum state. Our primary objective is to augment quantum fidelity via depth-reduction circuit designs. Sherbrooke s larger qubit capacity presents significant opportunities for implementing more complex algorithms, thus benefiting quantum cryptography [4], measurement-based quantum computing (MBQC) [5] and quantum simulation [6]. We introduce the Tree-based and Centred-tree-based approaches, enabling the exploitation of entangled states. Our strategies demonstrate promising potential for increasing quantum fidelity and broadening quantum applications. This work lays a firm foundation for subsequent advancements in quantum computing, highlighting the potential for heightened efficiency and versatility in future quantum systems.
Authored by Kuan-Cheng Chen
This paper offers a thorough investigation into quantum cryptography, a security paradigm based on the principles of quantum mechanics that provides exceptional guarantees for communication and information protection. The study covers the fundamental principles of quantum cryptography, mathematical modelling, practical applications, and future prospects. It discusses the representation of quantum states, quantum operations, and quantum measurements, emphasising their significance in mathematical modelling. The paper showcases the real-world applications of quantum cryptography in secure communication networks, financial systems, government and defence sectors, and data centres. Furthermore, it identifies emerging domains such as IoT, 5G networks, blockchain technology, and cloud computing as promising areas for implementing quantum cryptographic solutions. The paper also presents avenues for further research, including post-quantum cryptography, quantum cryptanalysis, multi-party quantum communication, and device-independent quantum cryptography. Lastly, it underscores the importance of developing robust infrastructure, establishing standards, and ensuring interoperability to facilitate widespread adoption of quantum cryptography. This comprehensive exploration of quantum cryptography contributes to the advancement of secure communication, information protection, and the future of information security in the era of quantum technology.
Authored by Atharva Takalkar, Bahubali Shiragapur
Hybrid authenticated key exchange combines cryptography key material from different sources (classical, quantum and post-quantum cryptography) to build protocols that are resilient to catastrophic failures, technology advances and future cryptanalytic attacks. In this work, we propose and implement a triple-hybrid version of the transport layer security network protocol TLS 1.3, combining classical and post-quantum cryptography, and quantum key distribution. We evaluate the performance of this triple-hybrid TLS in an experimental network scenario and our analysis shows that the quantum-resistant feature comes at an increased communication cost of approximately 68 \% over the total time of the composite handshakes. In exchange, our solution is an enhancement to the TLS 1.3 protocol by adding quantum-resistant cryptography schemes.
Authored by Carlos Garcia, Abraham Aguilera, Juan Olmos, Idelfonso Monroy, Simon Rommel
In this modern era, most cryptographic algorithms work on a basic principle to split integers into their primes. But the problem is that mathematics is also evolving at a very fast pace along with computing power so it is now more vulnerable to decryption, for example, one-way functions can be easily reversed along with factoring big integers. So, to solve this issue Quantum Physics gets involved with cryptography which further led to the concept of Quantum Cryptography. Quantum Cryptography is one of the fastest-growing technology in computer science. So, this paper is more focused on Quantum Cryptography technology and how it can be used to make our modern cryptographic era safeguard from top to bottom procedure related to getting more secure Key-transfer. This paper s scope is to cover all the vulnerabilities of the current cryptosystem, the uses of this technology in the real-world scenario, the limitations when used in real-world situations, and also what will be the future of Quantum Cryptography and the path it should head towards. We have tried to use tools and protocols which is modified to use the quantum key transfer by which the user s using it will not have access to each other s personal information, instead of sharing any private or public key in advance, we transfer an unordered quantum transmission which consists of a very little flash of polarized light.
Authored by Gurkirat Singh, Aman Singh, N Sreenarayanan