The improvement of different data-sharing technology has increasingly permeated many industries as technology continues to improve. As a result, for the value of the data to be realized, data sharing and security are essential. However, a fundamental data sharing mechanism is difficult to check for electronic data usage traces. Furthermore, data providers' unwillingness to provide their data is a challenge. Taking use of the dispersed ledger, smart contract, data trust, and traceability aspects of blockchain technology. This research presents a data-sharing model based on blockchain technology optimizing to overcome the challenges in terms of security and control, of conventional centralized data sharing and management, enabling safe access to the data as a result. Moreover, the research assesses the prototype's usefulness and security. Additionally, this paper suggests a method for using blockchain technology to optimize the efficiency of data sharing. This study showed that data sharing via the blockchain technology paradigm proposed in this work is feasible, secure, controllable, and efficient. This was demonstrated in a novel way employing blockchain technology.
The security risk management framework is an essential part of strategic management for government agencies. It allows a government to systematically identify and address the risks associated with its activities to achieve sustainability for different activities of security risk management. The goal of security risk management is to add sustainable value to government activities and reduce the chance of security breaches. Applying security risk management techniques used to government projects can increase the chances of success, help achieve objectives, and assist in finding preventive solutions for future projects. The application of security risk management is profitable for government agencies because it sets specific risk management objectives that are based on the broader overall strategy. It contributes to the achievement of strategic objectives with mechanisms like Spearman's rank correlation coefficient and simple linear regression. These techniques can improve decision-making, planning and implementation of government activities, as well as reduce the negative consequences of present threats. It is recommended to apply the integrated security risk management framework proposed in this paper to increase the effectiveness of security risk management in government agencies. Also using quantitative and intelligent techniques in the analysis and estimation of security risks can help managers to make decisions regarding security issues in government agencies.
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
The fast growing in wireless communications and electronics have helped to develop wireless sensor networks. To understand and be able to implement wireless sensor networks several concepts are necessary such as network topology, communication network, communication protocols, and routing that are needed in any monitoring system. In this paper, the performance of WSN based on various topologies scenarios has been investigated. Some techniques useful for managing wireless sensor networks are communication protocols and routing. AODV (Ad-hoc On Demand Distance Vector Routing) routing algorithm is adopted in this work. Cluster-tree, mesh and star topologies are considered in two cases. The first case compares these three ZigBee topologies. The second case compares two scenarios for each ZigBee topologies where all devices in first scenario are fixed and all devices in second scenario are mobile. These cases are simulated by taking into account the specific features and recommendations of the IEEE 802.15.4/ZigBee standard by using OPNET Modeler 14.5.
Mobility is an important factor in cellular networks so handover should be used to avoid the termination of call when user signal travel from cell to another in UMTS network. In this paper, the OPNET modeler 14.5 was used to simulate two scenarios of UMTS network the first one with handover support and the second without and study the effect of handover on performance factors such data traffic sent and data traffic received on FTP, HTTP and E-mail and the results appear that handover is very important to use with mobile cellular networks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.