scholarly journals Towards a Formal IoT Security Model

Symmetry ◽  
2020 ◽  
Vol 12 (8) ◽  
pp. 1305 ◽  
Author(s):  
Tania Martin ◽  
Dimitrios Geneiatakis ◽  
Ioannis Kounelis ◽  
Stéphanie Kerckhof ◽  
Igor Nai Fovino

The heterogeneity of Internet of Things (IoT) systems has so far prevented the definition of adequate standards, hence making it difficult to compare meaningfully the security degree of diverse architectural choices. This task can be nonetheless achieved with formal methodologies. However, the dedicated IoT literature shows no evidence of a universal model allowing the security evaluation of any arbitrary system. Based on these considerations, we propose a new model that aims at being global and all-encompassing. Our model can be used to fairly analyse the security level of different IoT systems and compare them in a significant way. It is designed to be adaptive with realistic definitions of the adversary’s (1) actions of interacting with IoT systems; (2) capabilities of accessing the data generated by and exchanged in IoT systems with established rules; and (3) objectives of attacking IoT systems according to the four recognised security properties of confidentiality, integrity, availability and soundness. Such a design enables the straightforward characterization of new adversaries. It further helps in providing a fine-grained security evaluation of IoT systems by either accurately describing attacks against the analysed systems or formally proving their guaranteed level of security.

2021 ◽  
Vol 13 (18) ◽  
pp. 3603
Author(s):  
Joaquín Salas ◽  
Pablo Vera ◽  
Marivel Zea-Ortiz ◽  
Elio-Atenogenes Villaseñor ◽  
Dagoberto Pulido ◽  
...  

One of the challenges in the fight against poverty is the precise localization and assessment of vulnerable communities’ sprawl. The characterization of vulnerability is traditionally accomplished using nationwide census exercises, a burdensome process that requires field visits by trained personnel. Unfortunately, most countrywide censuses exercises are conducted only sporadically, making it difficult to track the short-term effect of policies to reduce poverty. This paper introduces a definition of vulnerability following UN-Habitat criteria, assesses different CNN machine learning architectures, and establishes a mapping between satellite images and survey data. Starting with the information corresponding to the 2,178,508 residential blocks recorded in the 2010 Mexican census and multispectral Landsat-7 images, multiple CNN architectures are explored. The best performance is obtained with EfficientNet-B3 achieving an area under the ROC and Precision-Recall curves of 0.9421 and 0.9457, respectively. This article shows that publicly available information, in the form of census data and satellite images, along with standard CNN architectures, may be employed as a stepping stone for the countrywide characterization of vulnerability at the residential block level.


2013 ◽  
Vol 422 ◽  
pp. 176-180
Author(s):  
Cheng Jiong Wang

TCSEC standard is defined by the U.S. Department of Defense as the operating system security evaluation criteria. Under this standard, Linux system has a higher security level, but there are still some dangers, such as the coarseness of file access granularity. In this paper, we have studied the file access mechanism of Linux, analyzed the security module of LinuxLSM, and then designed the file access mechanism ACL, achieved fine-grained access to files, thus improving the system security level of Linux.


Author(s):  
Imam Riadi ◽  
Iwan Tti Riyadi Yanto ◽  
Eko Handoyo

Safe academic services are the most important part of universities. The security of academic services is very important to maintain information optimally and safely. Along with the development of technology, academic information services are often misused by some irresponsible parties that can cause threats. To prevent these things from happening, it is necessary to know the extent of governance of higher education academic information system security by evaluating. So the research was conducted to determine the maturity of the security of Higher Education academic information service security by using the COBIT 5 framework in the DSS05 domain. The DSS05 domain in COBIT 5 is a good framework for use in implementing and evaluating the security of academic information services. Meanwhile, to determine the achievement of the evaluation of the security level of academic information systems, the Indonesian e-government ranking (PEGI) method is required. The combination of the COBIT 5 framework in the DSS05 domain using the PEGI method in academic information security service is able to provide a level of achievement in the form of Customer Value. The results of the COBIT 5 framework analysis of the DSS05 domain using the PEGI method get a score of 3.50 so that the quality of academic information service security evaluation achievement is at a very good level. At this level, universities are increasingly open to technological development. Higher education has applied the concept of quantification in every process, and has always been monitored and controlled for its performance in the security of academic information systems.


Materials ◽  
2021 ◽  
Vol 14 (9) ◽  
pp. 2313
Author(s):  
Maria Luisa Beconcini ◽  
Pietro Croce ◽  
Paolo Formichi ◽  
Filippo Landi ◽  
Benedetta Puccini

The evaluation of the shear behavior of masonry walls is a first fundamental step for the assessment of existing masonry structures in seismic zones. However, due to the complexity of modelling experimental behavior and the wide variety of masonry types characterizing historical structures, the definition of masonry’s mechanical behavior is still a critical issue. Since the possibility to perform in situ tests is very limited and often conflicting with the needs of preservation, the characterization of shear masonry behavior is generally based on reference values of mechanical properties provided in modern structural codes for recurrent masonry categories. In the paper, a combined test procedure for the experimental characterization of masonry mechanical parameters and the assessment of the shear behavior of masonry walls is presented together with the experimental results obtained on three stone masonry walls. The procedure consists of a combination of three different in situ tests to be performed on the investigated wall. First, a single flat jack test is executed to derive the normal compressive stress acting on the wall. Then a double flat jack test is carried out to estimate the elastic modulus. Finally, the proposed shear test is performed to derive the capacity curve and to estimate the shear modulus and the shear strength. The first results obtained in the experimental campaign carried out by the authors confirm the capability of the proposed methodology to assess the masonry mechanical parameters, reducing the uncertainty affecting the definition of capacity curves of walls and consequently the evaluation of seismic vulnerability of the investigated buildings.


2021 ◽  
pp. 1-10
Author(s):  
Narjes Firouzkouhi ◽  
Abbas Amini ◽  
Chun Cheng ◽  
Mehdi Soleymani ◽  
Bijan Davvaz

Inspired by fuzzy hyperalgebras and fuzzy polynomial function (term function), some homomorphism properties of fundamental relation on fuzzy hyperalgebras are conveyed. The obtained relations of fuzzy hyperalgebra are utilized for certain applications, i.e., biological phenomena and genetics along with some elucidatory examples presenting various aspects of fuzzy hyperalgebras. Then, by considering the definition of identities (weak and strong) as a class of fuzzy polynomial function, the smallest equivalence relation (fundamental relation) is obtained which is an important tool for fuzzy hyperalgebraic systems. Through the characterization of these equivalence relations of a fuzzy hyperalgebra, we assign the smallest equivalence relation α i 1 i 2 ∗ on a fuzzy hyperalgebra via identities where the factor hyperalgebra is a universal algebra. We extend and improve the identities on fuzzy hyperalgebras and characterize the smallest equivalence relation α J ∗ on the set of strong identities.


2021 ◽  
Vol 22 (9) ◽  
pp. 4707
Author(s):  
Mariana Lopes ◽  
Sandra Louzada ◽  
Margarida Gama-Carvalho ◽  
Raquel Chaves

(Peri)centromeric repetitive sequences and, more specifically, satellite DNA (satDNA) sequences, constitute a major human genomic component. SatDNA sequences can vary on a large number of features, including nucleotide composition, complexity, and abundance. Several satDNA families have been identified and characterized in the human genome through time, albeit at different speeds. Human satDNA families present a high degree of sub-variability, leading to the definition of various subfamilies with different organization and clustered localization. Evolution of satDNA analysis has enabled the progressive characterization of satDNA features. Despite recent advances in the sequencing of centromeric arrays, comprehensive genomic studies to assess their variability are still required to provide accurate and proportional representation of satDNA (peri)centromeric/acrocentric short arm sequences. Approaches combining multiple techniques have been successfully applied and seem to be the path to follow for generating integrated knowledge in the promising field of human satDNA biology.


Author(s):  
M. Ferrara ◽  
M. Trombetti

AbstractLet G be an abelian group. The aim of this short paper is to describe a way to identify pure subgroups H of G by looking only at how the subgroup lattice $$\mathcal {L}(H)$$ L ( H ) embeds in $$\mathcal {L}(G)$$ L ( G ) . It is worth noticing that all results are carried out in a local nilpotent context for a general definition of purity.


2012 ◽  
Vol 730-732 ◽  
pp. 569-574
Author(s):  
Marta Cabral ◽  
Fernanda Margarido ◽  
Carlos A. Nogueira

Spent Ni-MH batteries are not considered too dangerous for the environment, but they have a considerable economical value due to the chemical composition of electrodes which are highly concentrated in metals. The present work aimed at the physical and chemical characterisation of spent cylindrical and thin prismatic Ni-MH batteries, contributing for a better definition of the recycling process of these spent products. The electrode materials correspond to more than 50% of the batteries weight and contain essentially nickel and rare earths (RE), and other secondary elements (Co, Mn, Al). The remaining components are the steel parts from the external case and supporting grids (near 30%) containing Fe and Ni, and the plastic components (<10%). Elemental quantitative analysis showed that the electrodes are highly concentrated in metals. Phase identification by X-ray powder diffraction combined with chemical analysis and leaching experiments allowed advancing the electrode materials composition. The cathode is essentially constituted by 6% metallic Ni, 66% Ni(OH)2, 4.3% Co(OH)2 and the anode consists mainly in 62% RENi5 and 17% of substitutes and/or additives such as Co, Mn and Al.


2021 ◽  
Vol 13 (6) ◽  
pp. 3272
Author(s):  
Paúl Carrión-Mero ◽  
Maribel Aguilar-Aguilar ◽  
Fernando Morante-Carballo ◽  
María José Domínguez-Cuesta ◽  
Cristhian Sánchez-Padilla ◽  
...  

In the last decade, in the mining district of Zaruma-Portovelo, there has been significant land subsidence related to uncontrolled mining activity. The purpose of this work was to carry out a surface and underground geomechanical characterization of a mining sector north of the city of Zaruma that allows the definition of potentially unstable areas susceptible to the mass movement. The methodology used consists of the following stages: (i) compilation of previous studies; (ii) surface and underground characterization of rocky material to establish its susceptibility to mass movement; (iii) interpretation of results; and (iv) proposal of action measures. Among the most relevant results, it stands out that 26.1% of the 23 stations characterized on the surface present conditions that vary from potentially unstable to unstable. In underground galleries, the studied mean values of the 17 stations indicate that the rock has a medium to good quality, representing a medium susceptibility to gallery destabilization. The results obtained for the surface areas (depths up to 50 m, where altered materials predominate) and the underground areas (depths > 50 m, where the alterations are specific) can be used to identify the areas with a more significant potential for instability. For both cases, it has been possible to define specific monitoring, control, and planning actions for sensitive areas.


Sign in / Sign up

Export Citation Format

Share Document