Next Issue
Volume 7, December
Previous Issue
Volume 7, June
 
 

Information, Volume 7, Issue 3 (September 2016) – 18 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
254 KiB  
Article
Efficient Software HEVC to AVS2 Transcoding
by Yucong Chen, Yun Zhou and Jiangtao Wen
Information 2016, 7(3), 53; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030053 - 19 Sep 2016
Cited by 7 | Viewed by 5387
Abstract
The second generation of Audio and Video coding Standard (AVS) is developed by the IEEE 1857 Working Group under project 1857.4 and was standardized in 2016 by the AVS Working Group of China as the new broadcasting standard AVS2. High Efficient Video Coding [...] Read more.
The second generation of Audio and Video coding Standard (AVS) is developed by the IEEE 1857 Working Group under project 1857.4 and was standardized in 2016 by the AVS Working Group of China as the new broadcasting standard AVS2. High Efficient Video Coding (HEVC) is the newest global video coding standard announced in 2013. More and more codings are migrating from H.264/AVC to HEVC because of its higher compression performance. In this paper, we propose an efficient HEVC to AVS2 transcoding algorithm, which applies a multi-stage decoding information utilization framework to maximize the usage of the decoding information in the transcoding process. The proposed algorithm achieves 11×–17× speed gains over the AVS2 reference software RD 14.0 with a modest BD-rate loss of 9.6%–16.6%. Full article
(This article belongs to the Special Issue Multimedia Information Compression and Coding)
Show Figures

Figure 1

2239 KiB  
Article
Packet-Forwarding Algorithm in DTN Based on the Pheromone of Destination Node
by Tiezhu Li, Lijuan Sun, Chong Han and Jian Guo
Information 2016, 7(3), 51; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030051 - 29 Aug 2016
Viewed by 3974
Abstract
The pheromone can be used for target tracking and, consequently, for packet forwarding to the destination node in delay-tolerant networking. In this study, an initiative community model is proposed by simulating pheromone production and diffusion, which contains all of the nodes that can [...] Read more.
The pheromone can be used for target tracking and, consequently, for packet forwarding to the destination node in delay-tolerant networking. In this study, an initiative community model is proposed by simulating pheromone production and diffusion, which contains all of the nodes that can receive the core node pheromone. We can set the distance of the edge node to the core to be less than five hops by establishing the appropriate spread coefficient ω . Packet forwarding is then converted into the process of tracing the pheromone of the destination node. A set of simulation results shows that the proposed initiative community model can effectively increase the delivery ratio and reduce delay when the community structure is relatively stable. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

3686 KiB  
Article
Optimal Threshold Determination for Discriminating Driving Anger Intensity Based on EEG Wavelet Features and ROC Curve Analysis
by Ping Wan, Chaozhong Wu, Yingzi Lin and Xiaofeng Ma
Information 2016, 7(3), 52; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030052 - 26 Aug 2016
Cited by 11 | Viewed by 7367
Abstract
Driving anger, called “road rage”, has become increasingly common nowadays, affecting road safety. A few researches focused on how to identify driving anger, however, there is still a gap in driving anger grading, especially in real traffic environment, which is beneficial to take [...] Read more.
Driving anger, called “road rage”, has become increasingly common nowadays, affecting road safety. A few researches focused on how to identify driving anger, however, there is still a gap in driving anger grading, especially in real traffic environment, which is beneficial to take corresponding intervening measures according to different anger intensity. This study proposes a method for discriminating driving anger states with different intensity based on Electroencephalogram (EEG) spectral features. First, thirty drivers were recruited to conduct on-road experiments on a busy route in Wuhan, China where anger could be inducted by various road events, e.g., vehicles weaving/cutting in line, jaywalking/cyclist crossing, traffic congestion and waiting red light if they want to complete the experiments ahead of basic time for extra paid. Subsequently, significance analysis was used to select relative energy spectrum of β band (β%) and relative energy spectrum of θ band (θ%) for discriminating the different driving anger states. Finally, according to receiver operating characteristic (ROC) curve analysis, the optimal thresholds (best cut-off points) of β% and θ% for identifying none anger state (i.e., neutral) were determined to be 0.2183 ≤ θ% < 1, 0 < β% < 0.2586; low anger state is 0.1539 ≤ θ% < 0.2183, 0.2586 ≤ β% < 0.3269; moderate anger state is 0.1216 ≤ θ% < 0.1539, 0.3269 ≤ β% < 0.3674; high anger state is 0 < θ% < 0.1216, 0.3674 ≤ β% < 1. Moreover, the discrimination performances of verification indicate that, the overall accuracy (Acc) of the optimal thresholds of β% for discriminating the four driving anger states is 80.21%, while 75.20% for that of θ%. The results can provide theoretical foundation for developing driving anger detection or warning devices based on the relevant optimal thresholds. Full article
Show Figures

Figure 1

5670 KiB  
Article
Smart Homes and Sensors for Surveillance and Preventive Education at Home: Example of Obesity
by Jacques Demongeot, Adrien Elena, Mariem Jelassi, Slimane Ben Miled, Narjès Bellamine Ben Saoud and Carla Taramasco
Information 2016, 7(3), 50; https://doi.org/10.3390/info7030050 - 08 Aug 2016
Cited by 5 | Viewed by 7970
Abstract
(1) Background: The aim of this paper is to show that e-health tools like smart homes allow the personalization of the surveillance and preventive education of chronic patients, such as obese persons, in order to maintain a comfortable and preventive lifestyle at home. [...] Read more.
(1) Background: The aim of this paper is to show that e-health tools like smart homes allow the personalization of the surveillance and preventive education of chronic patients, such as obese persons, in order to maintain a comfortable and preventive lifestyle at home. (2) Technologies and methods: Several types of sensors allow coaching the patient at home, e.g., the sensors recording the activity and monitoring the physiology of the person. All of this information serves to personalize serious games dedicated to preventive education, for example in nutrition and vision. (3) Results: We built a system of personalized preventive education at home based on serious games, derived from the feedback information they provide through a monitoring system. Therefore, it is possible to define (after clustering and personalized calibration) from the at home surveillance of chronic patients different comfort zones where their behavior can be estimated as normal or abnormal and, then, to adapt both alarm levels for surveillance and education programs for prevention, the chosen example of application being obesity. Full article
(This article belongs to the Special Issue Smart Home)
Show Figures

Figure 1

3424 KiB  
Article
The Role of Physical Layer Security in IoT: A Novel Perspective
by Tommaso Pecorella, Luca Brilli and Lorenzo Mucchi
Information 2016, 7(3), 49; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030049 - 02 Aug 2016
Cited by 61 | Viewed by 8878
Abstract
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. [...] Read more.
This paper deals with the problem of securing the configuration phase of an Internet of Things (IoT) system. The main drawbacks of current approaches are the focus on specific techniques and methods, and the lack of a cross layer vision of the problem. In a smart environment, each IoT device has limited resources and is often battery operated with limited capabilities (e.g., no keyboard). As a consequence, network security must be carefully analyzed in order to prevent security and privacy issues. In this paper, we will analyze the IoT threats, we will propose a security framework for the device initialization and we will show how physical layer security can effectively boost the security of IoT systems. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Show Figures

Figure 1

410 KiB  
Article
The Information Content of Accounting Reports: An Information Theory Perspective
by Jonathan F. Ross
Information 2016, 7(3), 48; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030048 - 29 Jul 2016
Cited by 7 | Viewed by 8088
Abstract
Is it possible to quantify the information content of accounting reports? If possible, then how? This study examines accounting as a classical communication system with the purpose of providing a framework with which to approach these fundamentally important questions. Information theory was established [...] Read more.
Is it possible to quantify the information content of accounting reports? If possible, then how? This study examines accounting as a classical communication system with the purpose of providing a framework with which to approach these fundamentally important questions. Information theory was established in the early-mid 20th century to describe the properties of classical communication systems. Applying concepts from this theory to an accounting context provides insight into the questions asked above. Specifically, a measure of the information content of financial statement numbers is developed from these information theory concepts. The measure is also applied to several large companies’ earnings numbers and aids in predicting their price movements. Full article
(This article belongs to the Section Information Theory and Methodology)
Show Figures

Figure 1

6626 KiB  
Article
An mHealth Tool Suite for Mobility Assessment
by Priyanka Madhushri, Armen Dzhagaryan, Emil Jovanov and Aleksandar Milenkovic
Information 2016, 7(3), 47; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030047 - 18 Jul 2016
Cited by 14 | Viewed by 12643
Abstract
The assessment of mobility and functional impairments in the elderly is important for early detection and prevention of fall conditions. Falls create serious threats to health by causing disabling fractures that reduce independence in the elderly. Moreover, they exert heavy economic burdens on [...] Read more.
The assessment of mobility and functional impairments in the elderly is important for early detection and prevention of fall conditions. Falls create serious threats to health by causing disabling fractures that reduce independence in the elderly. Moreover, they exert heavy economic burdens on society due to high treatment costs. Modern smartphones enable the development of innovative mobile health (mHealth) applications by integrating a growing number of inertial and environmental sensors along with the ever-increasing data processing and communication capabilities. Mobility assessment is one of the promising mHealth application domains. In this paper, we introduce a suite of smartphone applications for assessing mobility in the elderly population. The suite currently includes smartphone applications that automate and quantify the following standardized medical tests for assessing mobility: Timed Up and Go (TUG), 30-Second Chair Stand Test (30SCS), and 4-Stage Balance Test (4SBT). For each application, we describe its functionality and a list of parameters extracted by processing signals from smartphone’s inertial sensors. The paper shows the results from studies conducted on geriatric patients for TUG tests and from experiments conducted in the laboratory on healthy subjects for 30SCS and 4SBT tests. Full article
(This article belongs to the Special Issue Smart Health)
Show Figures

Graphical abstract

150 KiB  
Editorial
Introduction to the Special Issue on Evaluating the Security of Complex Systems
by Eduardo B. Fernandez
Information 2016, 7(3), 46; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030046 - 18 Jul 2016
Cited by 2 | Viewed by 3784
Abstract
Recent security breaches show the need to secure large, distributed, complex systems. A fundamental, but little discussed aspect of security is how to evaluate when a complete system is secure. Purely formal methods cannot handle this level of complexity. Code checking does not [...] Read more.
Recent security breaches show the need to secure large, distributed, complex systems. A fundamental, but little discussed aspect of security is how to evaluate when a complete system is secure. Purely formal methods cannot handle this level of complexity. Code checking does not consider the interaction of separate modules working together and is hard to scale. Model-based approaches, such as patterns and problem frames, can be effective for handling large systems. Their use in evaluating security appears promising. A few works in this direction exist, but there is a need for more ideas. This Special Issue focuses on global, model-based, architectural, and systems-oriented evaluation methods. Full article
(This article belongs to the Special Issue Evaluating the Security of Complex Systems)
2696 KiB  
Article
Visually Lossless JPEG 2000 for Remote Image Browsing
by Han Oh, Ali Bilgin and Michael Marcellin
Information 2016, 7(3), 45; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030045 - 15 Jul 2016
Cited by 20 | Viewed by 4936
Abstract
Image sizes have increased exponentially in recent years. The resulting high-resolution images are often viewed via remote image browsing. Zooming and panning are desirable features in this context, which result in disparate spatial regions of an image being displayed at a variety of [...] Read more.
Image sizes have increased exponentially in recent years. The resulting high-resolution images are often viewed via remote image browsing. Zooming and panning are desirable features in this context, which result in disparate spatial regions of an image being displayed at a variety of (spatial) resolutions. When an image is displayed at a reduced resolution, the quantization step sizes needed for visually lossless quality generally increase. This paper investigates the quantization step sizes needed for visually lossless display as a function of resolution, and proposes a method that effectively incorporates the resulting (multiple) quantization step sizes into a single JPEG 2000 codestream. This codestream is JPEG 2000 Part 1 compliant and allows for visually lossless decoding at all resolutions natively supported by the wavelet transform as well as arbitrary intermediate resolutions, using only a fraction of the full-resolution codestream. When images are browsed remotely using the JPEG 2000 Interactive Protocol (JPIP), the required bandwidth is significantly reduced, as demonstrated by extensive experimental results. Full article
(This article belongs to the Special Issue Multimedia Information Compression and Coding)
Show Figures

Figure 1

1475 KiB  
Article
IoT Privacy and Security Challenges for Smart Home Environments
by Huichen Lin and Neil W. Bergmann
Information 2016, 7(3), 44; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030044 - 13 Jul 2016
Cited by 267 | Viewed by 53493
Abstract
Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different [...] Read more.
Often the Internet of Things (IoT) is considered as a single problem domain, with proposed solutions intended to be applied across a wide range of applications. However, the privacy and security needs of critical engineering infrastructure or sensitive commercial operations are very different to the needs of a domestic Smart Home environment. Additionally, the financial and human resources available to implement security and privacy vary greatly between application domains. In domestic environments, human issues may be as important as technical issues. After surveying existing solutions for enhancing IoT security, the paper identifies key future requirements for trusted Smart Home systems. A gateway architecture is selected as the most appropriate for resource-constrained devices, and for high system availability. Two key technologies to assist system auto-management are identified. Firstly, support for system auto-configuration will enhance system security. Secondly, the automatic update of system software and firmware is needed to maintain ongoing secure system operation. Full article
(This article belongs to the Special Issue Preserving Privacy and Security in IoT)
Show Figures

Graphical abstract

1719 KiB  
Article
Real-Time Hybrid In-Station Bus Dispatching Strategy Based on Mixed Integer Programming
by Shi An and Xinming Zhang
Information 2016, 7(3), 43; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030043 - 13 Jul 2016
Cited by 4 | Viewed by 4306
Abstract
The actual bus headway often deviates from the planned departure frequency because of external factors, such as traffic conditions and public transport demand, leading to transit resource waste and reducing the quality of service. In view of the existing shortcomings of the current [...] Read more.
The actual bus headway often deviates from the planned departure frequency because of external factors, such as traffic conditions and public transport demand, leading to transit resource waste and reducing the quality of service. In view of the existing shortcomings of the current dispatching strategy, a mixed integer programming model, integrating a bus-holding and stop-skipping strategy, is constructed to improve transit service with a minimum cost. The real-time optimal holding and stop-skipping strategies can be obtained by solving the proposed model using the Lagrangian relaxation algorithm. A numerical example is conducted using real transit GPS (Global Position System) and IC (Intelligent Card) data in Harbin. The results show that compared to a single control strategy, the proposed hybrid model is a better trade-off between the quality of the transit service and the operation cost. Notably, such a strategy would produce a minimal passengers’ average travel time coefficient. It is a great help for promoting the transit service level and increasing competitiveness. Full article
(This article belongs to the Section Information Applications)
Show Figures

Figure 1

2244 KiB  
Article
Beamforming and Antenna Grouping Design for the Multi-Antenna Relay with Energy Harvesting to Improve Secrecy Rate
by Weijia Lei and Meihui Zhan
Information 2016, 7(3), 38; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030038 - 13 Jul 2016
Cited by 1 | Viewed by 4354
Abstract
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into [...] Read more.
The physical security strategy in the wireless network with a single-antenna eavesdropper is studied. The information transmits from a single-antenna source to a single-antenna destination, and an energy-limited multi-antenna relay is employed to forward information. The antennas of the relay are divided into two groups. One group receives and forwards information, and the other converts the received signal into energy. Beamforming is used by the relay to prevent the eavesdropper from intercepting confidential information. For the purpose of maximizing the secrecy rate, antenna grouping and beamforming vectors are designed. A low complexity scheme of antenna grouping is presented. The simulation results show that the secrecy rate can be significantly improved by arranging part of the antennas for energy harvesting, and part for forwarding and optimizing the beamforming vector at the relay. The antenna grouping scheme significantly reduces the computational complexity at the cost of acceptable performance loss. Full article
(This article belongs to the Special Issue Physical Layer Security in Wireless Networks)
Show Figures

Figure 1

2612 KiB  
Article
Investigation of Voltage Control at Consumers Connection Points Based on Smart Approach
by Artem Vanin, Sergey Aleshin, Rinat Nasirov, Dmitry Novikov and Vladimir Tulsky
Information 2016, 7(3), 42; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030042 - 12 Jul 2016
Cited by 11 | Viewed by 4399
Abstract
More and more functions are performed automatically with the use of various electrical appliances and sophisticated control systems in all spheres of human life. In this regard, the demand for reliable and quality power supply is increasing. To date, low power quality, in [...] Read more.
More and more functions are performed automatically with the use of various electrical appliances and sophisticated control systems in all spheres of human life. In this regard, the demand for reliable and quality power supply is increasing. To date, low power quality, in particular unacceptable voltage levels, is an important deterrent for introducing technologies of smart electricity consumers (smart homes, smart companies, smart cities). This paper presents a comprehensive solution of this problem with the use of a voltage control system in the distribution grids, which is oriented on grids with a large number of heterogeneous loads and low level of Information Technology (IT) penetration. It is proposed to be installed on distribution substation special devices that perform continuous measurements of voltage levels, produce short-term forecasts and transmit the permissible ranges of voltage control to the power supply centers. The computing unit at the primary substation analyzes the data received from all distribution substations, and determines the optimum control actions to meet the requirements of all consumers. The proposed system was compared with conventional voltage control methods. The results have proved the effectiveness of the proposed approach. Full article
(This article belongs to the Special Issue Smart Home)
Show Figures

Figure 1

785 KiB  
Article
Information and Meaning
by Paul Walton
Information 2016, 7(3), 41; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030041 - 09 Jul 2016
Cited by 5 | Viewed by 4451
Abstract
This paper considers the relationship between information and meaning through an analysis of a set of measures of information. Since meaning is expressed using information the analysis of the measures illuminates the relationship. The conventions that govern the production and exchange of information [...] Read more.
This paper considers the relationship between information and meaning through an analysis of a set of measures of information. Since meaning is expressed using information the analysis of the measures illuminates the relationship. The conventions that govern the production and exchange of information are the outcome of selection processes, so the quality of information (as expressed in the measures) is subject to limitations caused by selection. These limitations are analysed using a technique called viewpoint analysis that enables the measures and their relationship with meaning to be examined. Viewpoint analysis is applied to several logical paradoxes and resolves them in a manner consistent with common sense. Finally, the approach is used to address Floridi’s questions about the philosophy of information associated with meaning. Full article
Show Figures

Figure 1

2445 KiB  
Article
Lateral Cross Localization Algorithm Using Orientation Angle for Improved Target Estimation in Near-Field Environments
by Penghao Xu and Bing Yan
Information 2016, 7(3), 40; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030040 - 07 Jul 2016
Viewed by 4201
Abstract
Passive positioning systems with a small aperture array exhibit poor accuracy of target estimation under strong interference in near-field environments. To improve this accuracy, we propose a novel cross localization algorithm for direction-finding using the orientation angle. Improved geometric and numerical target-positioning models [...] Read more.
Passive positioning systems with a small aperture array exhibit poor accuracy of target estimation under strong interference in near-field environments. To improve this accuracy, we propose a novel cross localization algorithm for direction-finding using the orientation angle. Improved geometric and numerical target-positioning models are constructed after analyzing the mechanism of the conventional positioning algorithm. The target prediction equation is then derived using the constructed models, and the equation for nonlinear estimation is linearized using the Taylor series. An unbiased estimation of the target is obtained by optimizing the control of the iteration process, thus achieving an accurate positioning of the target. The performance of the proposed algorithm was evaluated in terms of its effectiveness and positioning accuracy under varying signal-to-noise conditions and orientation angle-measurement errors. Simulation results show that the proposed algorithm is capable of positioning the target effectively, and offers better positioning accuracy than traditional algorithms under the conditions of large orientation angle measurement errors or high-level background noise. Full article
Show Figures

Figure 1

3056 KiB  
Article
A Novel Global Path Planning Method for Mobile Robots Based on Teaching-Learning-Based Optimization
by Zongsheng Wu, Weiping Fu, Ru Xue and Wen Wang
Information 2016, 7(3), 39; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030039 - 07 Jul 2016
Cited by 16 | Viewed by 6401
Abstract
The Teaching-Learning-Based Optimization (TLBO) algorithm has been proposed in recent years. It is a new swarm intelligence optimization algorithm simulating the teaching-learning phenomenon of a classroom. In this paper, a novel global path planning method for mobile robots is presented, which is based [...] Read more.
The Teaching-Learning-Based Optimization (TLBO) algorithm has been proposed in recent years. It is a new swarm intelligence optimization algorithm simulating the teaching-learning phenomenon of a classroom. In this paper, a novel global path planning method for mobile robots is presented, which is based on an improved TLBO algorithm called Nonlinear Inertia Weighted Teaching-Learning-Based Optimization (NIWTLBO) algorithm in our previous work. Firstly, the NIWTLBO algorithm is introduced. Then, a new map model of the path between start-point and goal-point is built by coordinate system transformation. Lastly, utilizing the NIWTLBO algorithm, the objective function of the path is optimized; thus, a global optimal path is obtained. The simulation experiment results show that the proposed method has a faster convergence rate and higher accuracy in searching for the path than the basic TLBO and some other algorithms as well, and it can effectively solve the optimization problem for mobile robot global path planning. Full article
(This article belongs to the Section Information Applications)
Show Figures

Figure 1

3516 KiB  
Article
Design of Hybrid Wired/Wireless Fieldbus Network for Turbine Power Generation System
by Sheng Xu, Minrui Fei and Haikuan Wang
Information 2016, 7(3), 37; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030037 - 24 Jun 2016
Cited by 4 | Viewed by 6144
Abstract
Hybrid fieldbus network integrating wireless networks with existing wired fieldbuses has become new a research direction in industrial automation systems. In comparison to wired fieldbuses, the hybrid wired/wireless fieldbus network has a different system architecture, data transmission mechanism, communication protocol, etc. This leads [...] Read more.
Hybrid fieldbus network integrating wireless networks with existing wired fieldbuses has become new a research direction in industrial automation systems. In comparison to wired fieldbuses, the hybrid wired/wireless fieldbus network has a different system architecture, data transmission mechanism, communication protocol, etc. This leads to different challenges that need to be addressed. This paper proposes a hybrid wired/wireless fieldbus network which consists of a wireless industrial control network (WICN), a wired PROFIBUS-DP (Process Field Bus-Decentralized Periphery) fieldbus network, and a wired MODBUS/TCP (Mod Bus/Transmission Control Protocol) fieldbus network. They are connected by a new gateway which uses a shared data model to solve data exchange in different network protocols. In this paper, we describe the architecture of the proposed hybrid wired/wireless fieldbus network and data transmission mechanisms in detail, and then evaluate the performance of hybrid fieldbus network via a set of experiments. The experiment results confirm that the proposed hybrid wired/wireless fieldbus network can satisfy the performance requirement of industrial network control systems. Furthermore, in order to further investigate feasibility of the proposed hybrid wired/wireless fieldbus network, it is deployed at a steam turbine power generation system, and the performance figures obtained further verify its feasibility and effectiveness. Full article
Show Figures

Graphical abstract

809 KiB  
Article
Standard Compliant Hazard and Threat Analysis for the Automotive Domain
by Kristian Beckers, Jürgen Dürrwang and Dominik Holling
Information 2016, 7(3), 36; https://0-doi-org.brum.beds.ac.uk/10.3390/info7030036 - 23 Jun 2016
Cited by 5 | Viewed by 9052
Abstract
The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard [...] Read more.
The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard does not concern threat analysis for malicious attackers or how to select appropriate security countermeasures. We propose the application of ISO 27001 for this purpose and show how it can be applied together with ISO 26262. We show how ISO 26262 documentation can be re-used and enhanced to satisfy the analysis and documentation demands of the ISO 27001 standard. We illustrate our approach based on an electronic steering column lock system. Full article
(This article belongs to the Special Issue Evaluating the Security of Complex Systems)
Show Figures

Graphical abstract

Previous Issue
Next Issue
Back to TopTop