Faculty of Computing
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4202
Browse
7 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Embargo Privacy & Security in Mobile Devices, Social Network Services as Related to Business(IEEE, 2019-03-11) Harshanath, S. M. BMobile computing has made it extra easy to maintain contacts either away from home or office. These mobile computing devices are mostly meant to increase productivity in the place of work. Yet, the benefits can easily come along with a good amount of risks too. Business operations require human resources and systems and we cannot do without them in our business operations. Therefore, it is time for professionals engaged in security tasks to consider challenges to information security before considering awareness programs for workers to treat information security as a highly valuable attribute. These awareness raising programs could create attitudinal changes towards risk management with regular use of mobile devices. But, of course, rules and regulations require time to come into effect. Self-awareness brought in with attitudinal changes, takes no time. Nowadays, with the IoT (Internet of Things) it is possible to monitor use of mobile devices, moving around buildings and automobiles. This, in turn, demands robust security systems.Publication Embargo Privacy & Security in Mobile Devices, Social Network Services as Related to Business(IEEE, 2018-06-14) Harshanath, S. M. BuddhikaMobile computing has made it extra easy to maintain contacts either away from home or office. These mobile computing devices are mostly meant to increase productivity in the place of work. Yet, the benefits can easily come along with a good amount of risks too. Business operations require human resources and systems and we cannot do without them in our business operations. Therefore, it is time for professionals engaged in security tasks to consider challenges to information security before considering awareness programs for workers to treat information security as a highly valuable attribute. These awareness raising programs could create attitudinal changes towards risk management with regular use of mobile devices. But, of course, rules and regulations require time to come into effect. Self-awareness brought in with attitudinal changes, takes no time. Nowadays, with the IoT (Internet of Things) it is possible to monitor use of mobile devices, moving around buildings and automobiles. This, in turn, demands robust security systems.Publication Embargo Privacy & Security in Mobile Devices, Social Network Services and Social Reform(ttest, 2018-04) Harshanath, S. M. BuddhikaMobile computing devices and social networks have become very popular for contact away from home or in the office. Though meant for increased productivity in the workplace, the benefits are not without risks. Human resources and systems are recognized as essential to society and business operations. Challenges to information security professionals require, first of all, convincing management about the problem and then considering awareness programs for the workforce to inculcate information security as a highly valued attribute. Such awareness raising could be developed to transform attitudinal changes to follow risk management procedures for regular use with the use of mobile devices. Rules and restrictions take time to materialize. Self-control from an individual made aware of the risks takes no time. Now, with the Internet of Things (IoT) it is possible for various devices to hover around mobile users and make use of control features in buildings and automobiles as well. This makes the demand for robust security systems to ward off attacks, essentialPublication Embargo Improve the Efficiency and Security by Digitalizing the Sri Lankan Police Department(IEEE, 2021-12-09) Senaratne, A. N; Abeywardana, K. Y; Pathirathna, R. P. D.T. D; Priyamantha, Y. P. C. N; Dias, W. D. S; Katukithulgala, BPolice, as the main law enforcement organization in Sri Lanka, play a major role in preserving the public order, preventing criminal, terrorist activities, and enforcing the law. As a developing nation, Sri Lanka Police Department is moving forward with emerging technologies to effectively manage operations and rapidly respond to opportunities and challenges. Compared to developed countries, Police Department is still far more behind when working with modern technologies. Lack of coordination between departments, duplication of data, delay of services, unauthorized data modification, absence of data analysis and prediction systems, lack of transparency, and corruption were identified as the main issues that exist in the police department. In this paper, we propose 4 main improvements which help to overcome those issues and challenges. Improving the existing police clearance certificate system to issue digital certificates capable of verifying the authenticity, integrity of the document and providing efficient delivery and great user experience to the applicants. Implementing a Blockchain network to store confidential data securely by providing transparency and integrity. Developing a machine learning model to predict crimes geographically and predict fight crime action based on data gathered from a real-time camera system (CCTV).Publication Embargo NetBot-An Automated Router Hardening Solution for Small to Medium Enterprises(IEEE, 2021-12-09) Abeywardana, K. Y; Senaratne, A. N; Pathirathna, R. P. D. T. D; Priyamantha, Y. P. C. N; Dias, W. D. S; Katukithulgala, BPolice, as the main law enforcement organization in Sri Lanka, play a major role in preserving the public order, preventing criminal, terrorist activities, and enforcing the law. As a developing nation, Sri Lanka Police Department is moving forward with emerging technologies to effectively manage operations and rapidly respond to opportunities and challenges. Compared to developed countries, Police Department is still far more behind when working with modern technologies. Lack of coordination between departments, duplication of data, delay of services, unauthorized data modification, absence of data analysis and prediction systems, lack of transparency, and corruption were identified as the main issues that exist in the police department. In this paper, we propose 4 main improvements which help to overcome those issues and challenges. Improving the existing police clearance certificate system to issue digital certificates capable of verifying the authenticity, integrity of the document and providing efficient delivery and great user experience to the applicants. Implementing a Blockchain network to store confidential data securely by providing transparency and integrity. Developing a machine learning model to predict crimes geographically and predict fight crime action based on data gathered from a real-time camera system (CCTV).Publication Embargo SecAODV-Lightweight Authentication for AODV Protocol(International Journal of Computer Applications, 2016) Jayakody, A; Samarasinghe, R; Kodituwakku, S. RIn nature of the transmission medium the broadcast, Wireless sensor networks are vulnerable to security attacks. The nodes are placed in a hostile or dangerous environment where they are not tangibly safe in the MANETs. In many application, the data obtained from the sensing nodes need a false, or malicious node could intercept private information or could send false messages to nodes in the network. Among the major attacks Eavesdropping, Spoof Attack, Denial of Service, Wormhole attack, Sinkhole attack, Sybil attack, Selective Forwarding attack, Passive information gathering, Node capturing, and False or malicious node, Hello flood attack are common. In this paper, authors have proposed and implemented an efficient light weighted authentication secure routing protocol on top of an AODV. The focused area of the proposed routing protocol is increasing the network security of the MANET. Additionally, the paper evaluates the implemented protocol using NS2 simulator in different networks with SecAODV.Publication Embargo Cybersecurity and Network Performance Modeling in Cyber-Physical Communication for BigData and Industrial IoT Technologies(IEEE, 2019-07-26) Sen, S; Jayawardena, CThe information and networking technology have been revolutionized with the inception of recent evolution of Cyber-Physical Systems (CPS) and the Internet of Things (IoT). The next generation distributed computing systems i.e., CPS and IoT are highly interconnected and deeply embedded with the physical world. By capitalizing the advantages and opportunities of these technologies, Industrial-IoT has been fueling smart industrial processes. The execution and application of these processes generate huge amount of data, which leads the distributed computing systems to carefully consider information and data management reliably and securely; also facilitating the necessary automation as well as ensuring timely information exchange. But the current internet doesn't guarantee the network performance and secure transportation; in addition the physical systems are becoming more insecure when interconnected to the cyber systems. These bottlenecks are leading to the necessity of improving performance and security in the cyber-physical communication. Considering those pervasive requirements, this paper has modeled network performance as well as system security with a view to improve these components which could heel the reliable cyber-communication challenges.
