Explore chapters and articles related to this topic
WoT-Enabled Delay-Tolerant Networks
Published in Aarti Jain, Rubén González Crespo, Manju Khari, Smart Innovation of Web of Things, 2020
Siddhant Banyal, Kartik Krishna Bhardwaj, Deepak Kumar Sharma
Given the nodes use the next hop procedure to forward the information, there is a possibility of passing the data to a malicious node created by perpetrators with intentions to intercept data. This is known as node spoofing and is a menacing security threat. Use of encryption will help secure the information in the event of data theft. In addition, the hopping protocols can be pre-empted by security checks between the transmitting and receiving nodes, leading to a secure gateway of information between the transmitting and receiving nodes, preventing node spoofing events. However, given the mobility of nodes, the window for information exchange might be small, and hence, such a call-receive security check system might not always be beneficial, leading to a trade-off between security and data delivery. Such situations can be prevented by the maintenance of node tables that shall be able to instantaneously verify the authenticity of the receiving node, though at a cost of extra memory capacities that must be added into the network capabilities [18]. Masquerading as authentic users and accessors of node-to-node hop-based architecture is an easier task due to lack of centralization and fixed path in DTN network topologies. This may lead to leakage of information during transmission and hence loss of information. This can be solved by usage of user registration systems with the use of personal keys as well as system-based authentication, like biometrics,
Cybersecurity Incident Response in the Enterprise
Published in Mohiuddin Ahmed, Nour Moustafa, Abu Barkat, Paul Haskell-Dowland, Next-Generation Enterprise Security and Governance, 2022
Nickson M. Karie, Leslie F. Sikos
Once the attacker has managed to move through all the steps described above and gained persistent access, the last step is to take action to achieve their original objectives. This may include data theft, encryption for ransom, data corruption, data exfiltration, or even data destruction. Typically, most attackers aim to violate either confidentiality, integrity, or availability or at times a combination of these.
Blood drones: using utopia as method to imagine future vital mobilities
Published in Mobilities, 2020
Stephanie Sodero, Richard Rackham
Blood is big business. The towering and remote HemoIkea facility gleams with glass and aluminium. The occasional human clad in white coat and booties takes readings from the machines, but is dwarfed by the scale of the enterprise. At this artificial intelligence (AI) facility, all types of blood are ‘hemo-pharmed’ from harvested embryonic stem cells. The resulting blood products are transported via a fleet of cargo drones – some the size of military helicopters, others the size of birds – to hospitals throughout Europe. Such a mega-facility exists on each continent. Blood supplies have never been safer from disease, nor more stable. Manufacturing blood reduces disease risk to almost zero and ensures a steady supply calibrated via a real-time digital panopticon to meet public health needs. There is a cyborg team of human and AI contingency planners who assess and manage a stream of external threats to the facility. These fall into two groups: climatic and digital. Global warming means that maintaining temperature control within the facility and en route through a cold-chain is a challenge. Severe weather continuously endangers delivery. Digital threats include malware and data theft. Humans no longer donate blood and there is an unquestioned assumption that blood of the specific type and volume will be available when and where needed. The public has no idea where transfused blood originates, how it is moved or the degree to which biological data are mined. Healthcare providers are increasingly sensitive to growing costs resulting from increasing climatic and digital threats and underpinned by the profit motive of a remote corporate elite.