Software defined networking (SDN) and network function virtualization (NFV) have attracted significant attention from both academia and industry. Fortunately, by virtue of unique advantages of programmability and cent...Software defined networking (SDN) and network function virtualization (NFV) have attracted significant attention from both academia and industry. Fortunately, by virtue of unique advantages of programmability and centralized control, SDN has been widely used in various scenarios, such展开更多
Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied...Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied in anything, from cellphones, coffee makers, cars, body sensors to smart surveillance, water distribution, energy management system, and environmental monitoring. However, the rapid growth of IoT has brought new and critical threats to the security and privacy of the users. Due to the millions of insecure IoT devices, an adversary can easily break into an application to make it unstable and steal sensitive user information and data. This paper provides an overview of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture. It then discusses the security solutions we can take to protect IoT devices against different kinds of security attacks. The main goal of this research is to enhance the development of IoT research by highlighting the different kinds of security challenges that IoT is facing nowadays, and the existing security solutions we can implement to make IoT devices more secure. In this study, we analyze the security solutions of IoT in three forms: secure authentication, secure communications, and application security to find suitable security solutions for protecting IoT devices.展开更多
Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situatio...Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences.展开更多
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio...To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection.展开更多
5G/Beyond 5G(B5G)networks provide connectivity to many heterogeneous devices,raising significant security and operational issues and making traditional infrastructure management increasingly complex.In this regard,new...5G/Beyond 5G(B5G)networks provide connectivity to many heterogeneous devices,raising significant security and operational issues and making traditional infrastructure management increasingly complex.In this regard,new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures,especially regarding policy-based security,abstraction,flexibility,and extensibility.This paper presents the design,workflow,and implementation of a security solution based on Unmanned Aerial Vehicles(UAVs),able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic areas.The proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic deployments and provisioning security Virtual Network Functions(VNFs)in the onboard Multi-access Edge Computing(MEC)node.A UAV has been ensembled from scratch to validate the proposal,and a raspberry-pi has been onboarded as compute node.The implementation provides a VNF for dynamic UAV management,capable of dynamically loading waypoints into the flight controller to address reactive autonomous flights,and anMLbased VNF capable of detecting image patterns.According to the security policies,the onboard VNFs can be dynamically configured to generate alerts to the framework and apply local reactions depending on the detection made.In our experiments,we measured the time it takes for the solution to be ready after receiving a security policy for detecting patterns in a specific geographical area.The time it takes for the solution to react automatically was also measured.The results show that the proactive flow configuration considering ten waypoints can be enforced in less than 3 s,and a local reactive flow can be enforced in around 1 s.We consider that the results are promising and aligned with other security enabler solutions as part of existing 5G/6G security frameworks.展开更多
The Internet of Things (IoT) represents a technologically optimistic future where objects will be connected to the internet and make intelligent collaborations with other objects anywhere, anytime. Although it makes a...The Internet of Things (IoT) represents a technologically optimistic future where objects will be connected to the internet and make intelligent collaborations with other objects anywhere, anytime. Although it makes appreciable development, there are still uncertainties about security concepts of its usage that is usually considered as a major concern in the design of IoT architectures. This paper presents a general survey of all the security issues in IoT along with an analysis of IoT architectures. The study defines security requirements and challenges that are common in IoT implementations and discusses security threats and related solutions on each layer of IoT architecture to make this technology secure and more widespread accordingly.展开更多
In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group dec...In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified.展开更多
The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Compan...The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> during the previous two decades;the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty</span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems.展开更多
Song of The Chu, a novel written by LAN Zi-- a Chinese Australian writer, recounts the struggle in Australia over 20 years (1988-2008) of a group of Chinese young people. Cultural difference or even conflict is one ...Song of The Chu, a novel written by LAN Zi-- a Chinese Australian writer, recounts the struggle in Australia over 20 years (1988-2008) of a group of Chinese young people. Cultural difference or even conflict is one of the inevitable issues in terms of migration. The Chinese (Han) culture which belongs to the continental civilization and the Australian (Western) culture which belongs to the maritime one are both mighty and cannot be conquered or assimilated by each other. This means that the Chinese immigrants to Australia, compared to the ones from a less mighty culture, are more sensitive and resistant to the impact of an alien culture, which leads to a conscious or unconscious sense of security of the mother culture. Cultural security, not unidirectional, also refers to the worry by the locals of the impact brought by the immigrants. The protagonist resorts to converting to Buddhism as a solution to the cultural schizophrenia展开更多
The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social s...The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social security system is maturing, but rural social security system is almost a blank, affecting the economic and political development, and the progress of the farmers, and restricting the process of service government construction.Service government is a new model of government, which orients the purpose of fundamental interests for the whole people. The rural and the farmers are the focus of our country, and the improvement of rural social security system is the key point for solving the problems. Therefore, it is really important to deal with the relationship between the improvement of rural social security system and the service government construction.In my essay, based on the analysis of the theory of rural social security system and the service government, I will put forward the ideas of the improvement of rural social security system and the service government construction.展开更多
文摘Software defined networking (SDN) and network function virtualization (NFV) have attracted significant attention from both academia and industry. Fortunately, by virtue of unique advantages of programmability and centralized control, SDN has been widely used in various scenarios, such
文摘Internet of Things (IoT) has become a prevalent topic in the world of technology. It helps billion of devices to connect to the internet so that they can exchange data with each other. Nowadays, the IoT can be applied in anything, from cellphones, coffee makers, cars, body sensors to smart surveillance, water distribution, energy management system, and environmental monitoring. However, the rapid growth of IoT has brought new and critical threats to the security and privacy of the users. Due to the millions of insecure IoT devices, an adversary can easily break into an application to make it unstable and steal sensitive user information and data. This paper provides an overview of different kinds of cybersecurity attacks against IoT devices as well as an analysis of IoT architecture. It then discusses the security solutions we can take to protect IoT devices against different kinds of security attacks. The main goal of this research is to enhance the development of IoT research by highlighting the different kinds of security challenges that IoT is facing nowadays, and the existing security solutions we can implement to make IoT devices more secure. In this study, we analyze the security solutions of IoT in three forms: secure authentication, secure communications, and application security to find suitable security solutions for protecting IoT devices.
文摘Non-traditional security issues have arisen since the 1960s,especially after the end of the Cold War,and are becoming a major issue in world security and politics.This reflects tremendous changes in the world situation.With diverse causes and plural referent objects,non-traditional security issues cover nearly all the problems in the world today and make development difficult to sustain.This raises the question of whether human society and the earth can survive.Power politics one-sidedly stresses the role of power,endangering the harmonious development of nations and the whole of human society.It is not at all conducive to the solution of non-traditional security issues.The solution of non-traditional security issues demands cooperation from all actors in the international community.Multiple means are needed to solve these issues.Equal dialogue between all the actors,which can easily be attained,will play an effective role,as long as all actors respect each other's differences.
基金the phased achievement of the major research project of the National Social Science Fund of China(Project Approval No.21VGQ010)supported by the 2021 Central University Basic Scientific Research Project of Lanzhou University(Project Approval No.21lzujbkyjd002).
文摘To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection.
基金supported by the ONOFRE-3 project,Grant Agreement PID2020-112675RB-C44,funded by MCIN/AEI/10.13039/501100011033funds from the Spanish Ministry of Economic Affairs and Digital Transformation and the European Union–nextGeneration EU[TSI-063000-2021-36,TSI-063000-2021-44,TSI-063000-2021-45,TSI-063000-2021-62].Antonio Skármeta received them.
文摘5G/Beyond 5G(B5G)networks provide connectivity to many heterogeneous devices,raising significant security and operational issues and making traditional infrastructure management increasingly complex.In this regard,new frameworks such as Anastacia-H2020 or INSPIRE-5GPlus automate the management of next-generation infrastructures,especially regarding policy-based security,abstraction,flexibility,and extensibility.This paper presents the design,workflow,and implementation of a security solution based on Unmanned Aerial Vehicles(UAVs),able to extend 5G/B5G security framework capabilities with UAV features like dynamic service provisioning in specific geographic areas.The proposed solution allows enforcing UAV security policies in proactive and reactive ways to automate UAV dynamic deployments and provisioning security Virtual Network Functions(VNFs)in the onboard Multi-access Edge Computing(MEC)node.A UAV has been ensembled from scratch to validate the proposal,and a raspberry-pi has been onboarded as compute node.The implementation provides a VNF for dynamic UAV management,capable of dynamically loading waypoints into the flight controller to address reactive autonomous flights,and anMLbased VNF capable of detecting image patterns.According to the security policies,the onboard VNFs can be dynamically configured to generate alerts to the framework and apply local reactions depending on the detection made.In our experiments,we measured the time it takes for the solution to be ready after receiving a security policy for detecting patterns in a specific geographical area.The time it takes for the solution to react automatically was also measured.The results show that the proactive flow configuration considering ten waypoints can be enforced in less than 3 s,and a local reactive flow can be enforced in around 1 s.We consider that the results are promising and aligned with other security enabler solutions as part of existing 5G/6G security frameworks.
文摘The Internet of Things (IoT) represents a technologically optimistic future where objects will be connected to the internet and make intelligent collaborations with other objects anywhere, anytime. Although it makes appreciable development, there are still uncertainties about security concepts of its usage that is usually considered as a major concern in the design of IoT architectures. This paper presents a general survey of all the security issues in IoT along with an analysis of IoT architectures. The study defines security requirements and challenges that are common in IoT implementations and discusses security threats and related solutions on each layer of IoT architecture to make this technology secure and more widespread accordingly.
基金Supported by the National Natural Science Foundation of China(No.60605019)
文摘In order to understand the security conditions of the incomplete interval-valued information system (IllS) and acquire the corresponding solution of security problems, this paper proposes a multi-attribute group decision- making (MAGDM) security assessment method based on the technique for order performance by similarity to ideal solution (TOPSIS). For IllS with preference information, combining with dominance-based rough set approach (DRSA), the effect of incomplete interval-valued information on decision results is discussed. For the imprecise judgment matrices, the security attribute weight can be obtained using Gibbs sampling. A numerical example shows that the proposed method can acquire some valuable knowledge hidden in the incomplete interval-valued information. The effectiveness of the proposed method in the synthetic security assessment for IIIS is verified.
文摘The amount of data that is traveling across the internet today, including very large and complex set of raw facts that are not only large, but also, complex, noisy, heterogeneous, and longitudinal data as well. Companies, institutions, healthcare system, mobile application capturing devices and sensors, traffic management, banking, retail, education etc., use piles of data which are further used for creating reports in order to ensure continuity regarding the services that they have to offer. Recently, Big data is one of the most important topics in IT industry. Managing Big data needs new techniques because traditional security and privacy mechanisms are inadequate and unable to manage complex distributed computing for different types of data. New types of data have different and new challenges also. A lot of researches treat with big data challenges starting from Doug Laney’s landmark paper</span><span style="font-family:Verdana;">,</span><span style="font-family:Verdana;"> during the previous two decades;the big challenge is how to operate a huge volume of data that has to be securely delivered through the internet and reach its destination intact. The present paper highlights important concepts of Fifty</span><span style="font-family:Verdana;">-</span><span style="font-family:Verdana;">six Big Data V’s characteristics. This paper also highlights the security and privacy Challenges that Big Data faces and solving this problem by proposed technological solutions that help us avoiding these challenging problems.
文摘Song of The Chu, a novel written by LAN Zi-- a Chinese Australian writer, recounts the struggle in Australia over 20 years (1988-2008) of a group of Chinese young people. Cultural difference or even conflict is one of the inevitable issues in terms of migration. The Chinese (Han) culture which belongs to the continental civilization and the Australian (Western) culture which belongs to the maritime one are both mighty and cannot be conquered or assimilated by each other. This means that the Chinese immigrants to Australia, compared to the ones from a less mighty culture, are more sensitive and resistant to the impact of an alien culture, which leads to a conscious or unconscious sense of security of the mother culture. Cultural security, not unidirectional, also refers to the worry by the locals of the impact brought by the immigrants. The protagonist resorts to converting to Buddhism as a solution to the cultural schizophrenia
文摘The establishment and improvement of the social system is an important indicator of a nation political cultures and social development, and is the basic guarantee of social harmony. In recent years, our urban social security system is maturing, but rural social security system is almost a blank, affecting the economic and political development, and the progress of the farmers, and restricting the process of service government construction.Service government is a new model of government, which orients the purpose of fundamental interests for the whole people. The rural and the farmers are the focus of our country, and the improvement of rural social security system is the key point for solving the problems. Therefore, it is really important to deal with the relationship between the improvement of rural social security system and the service government construction.In my essay, based on the analysis of the theory of rural social security system and the service government, I will put forward the ideas of the improvement of rural social security system and the service government construction.