The rapid expansion of smart cities has led to the widespread deployment of Internet of Things (IoT) devices for real-time data collection and urban optimization. However, these interconnected systems face critical cybersecurity risks, including data tampering, unauthorized access, and privacy breaches. This paper proposes a blockchain-based framework designed to enhance the security, integrity, and resilience of IoT data in smart city environments. Leveraging a private blockchain, the system ensures decentralized, tamper-proof data storage, and transaction verification through digital signatures and a lightweight Proof of Work consensus mechanism. Smart contracts are employed to automate access control and respond to anomalies in real time. A Python-based simulation demonstrates the framework’s effectiveness in securing IoT communications. The system supports rapid transaction validation with minimal latency and enables timely detection of anomalous patterns through integrated machine learning. Evaluations show that the framework maintains consistent performance across diverse smart city components such as transportation, healthcare, and building security. These results highlight the potential of the proposed solution to enable secure, scalable, and real-time IoT ecosystems for modern urban infrastructures.
This paper presents an effective method for performing audio steganography, which would help in improving the security of information transmission. Audio steganography is one of the techniques for hiding secret messages within an audio file to maintain communication secrecy from unwanted listeners. Most of these conventional methods have several drawbacks related to distortion, detectability, and inefficiency. To mitigate these issues, a new scheme is presented which combines the techniques of image interpolation with LSB encoding. It selects non-seed pixels to allow reversibility and diminish distortion in medical images. Our technique also embeds a fragile watermarking scheme to identify any breach during transmission to recover data securely and reliably. A magic rectangle has also been used for encryption to enhance data security. This paper proposes a robust, low-distortion audio steganography technique that provides high data integrity with undetectability and will have wide applications in sectors like e-healthcare, corporate data security, and forensic applications. In the future, this approach will be refined for broader audio formats and overall system robustness.
The Malaysian government's efforts to promote solar photovoltaic (PV) usage among households face a challenge due to its low adoption rate. This study delves into the factors influencing the exponential adoption of solar PV electricity generation among landed residential property owners in Malaysia. The research aims to comprehensively examine the predictors influencing the adoption of solar PV systems among Malaysian households. Hence, the study employs an enhanced Theory of Planned Behavior framework, integrating sustainable energy security dimensions such as availability, affordability, efficiency, acceptability, regulation, and governance. The sample comprised 556 Malaysian residents who owned and resided in the landed properties. The home locations where at least one solar PV installation existed within a residential street. Snowball sampling was employed through referrals, leveraging social and community networks. Collected data was analyzed using the partial least squares structural equation modeling. Attitude, affordability, and acceptability emerged as pivotal factors significantly impacting the intention to use solar PV systems among Malaysian households. This research not only enriches academic discourse but also offers practical implications for policymakers, guiding the formulation of targeted strategies to promote sustainable energy practices and facilitate the widespread adoption of solar PV systems in Malaysia.
Global economic competition is leading companies to improve their competitiveness by increasing production and eliminating the main obstacles to the process of making products available. This approach concerns both SMEs and SMIs as well as multinationals. Thus, the Compagnie Minière de l’Ogooué (COMILOG), a subsidiary of the French group ERAMET, which until recently had a monopoly on manganese mining in Gabon, must now face competition from Asian operators. To export its ore, COMILOG must first transport it by rail for nearly 650 km, from the Moanda site (south-east of the country) to the port of Owendo. However, port operations, which until then took place exclusively during the day, limited the company’s export capacities and the profits made, while increasing the stopover time of ships and their operating costs. To remedy this, the French company introduced nighttime docking and departures. This work addresses the challenges of the performance of port operations at the Owendo ore terminal and the security and natural risks of night manoeuvres. The general objective of the study is to assess the impact of these night services on ship traffic, on the one hand, and to identify the related socio-economic and security issues, on the other hand. Data collection was carried out using documentary research in libraries and research centres, consultation of websites, semi-directed interviews, questionnaire surveys and participatory observation. The sample of 50 people surveyed took into account management staff, supervisors and line managers, integrating the diversity of actors involved in the processing of ships calling at the port of Owendo. Finally, the surveys attest to a clear reduction in the time spent by ships at the Owendo Ore Port and an increase in their number calling. They also confirm the improvement in tonnages embarked and the improvement in turnover achieved by COMILOG. This study led to the conclusion that the introduction of night manoeuvres at the port of Owendo allowed COMILOG to increase its exports and the number of ore carriers received in stopover and then improve its turnover.
The most important issue of economic development is the question of the real reasons for the growth of labor productivity based on innovative equipment and technologies or “closing technologies”, both directly and in the sphere of organization and management of economic systems. Organizational innovations can also be classified as “closing technologies”. For example, the creation of strategic institution, alliances and associations capable of changing the situation in the global economy, likely World Bank (WB), World Health Organization (WHO), International association Brazil, Russia, India, China, South Africa (BRICS) etc. This approach involves the formation of fundamental innovative solutions at all levels of the management hierarchy. The imperfection of the existing ideological and methodological paradigm, ignoring the mathematical constants of the Universe when designing economic supersystems or economic systems as integral distributed systems with complex dynamics similar to natural systems, the inefficiency of institutional intervention is the main reason for the impossibility of minimizing the structural and functional instability of the state economic system. The consequence of this is systemic violations and disproportions in the economy, risks associated with changes in the structure of the world economy and a colossal difference in the level of economic security of states and the phenomenon of crisis transfer.
Distributed Energy Resources (DERs), such as solar photovoltaic (PV) systems, wind turbines, and energy storage systems, offer many benefits, including increased energy efficiency, sustainability, and grid reliability. However, their integration into the smart grid also introduces new vulnerabilities to cyber threats. The smart grid is becoming more digitalized, with advanced technologies like Internet of Things (IoT) devices, communication networks, and automation systems that enable the integration of DER systems. While this enhances grid efficiency and control, it creates more entry points for attackers and thus expands the attack surface for potential cyber threats. Protecting DERs from cyberattacks is crucial to maintaining the overall reliability, security, and privacy of the smart grid. The adopted cybersecurity strategies should not only address current threats but also anticipate future dangers. This requires ongoing risk assessments, staying updated on emerging threats, and being prepared to adapt cybersecurity measures accordingly. This paper highlights some critical points regarding the importance of cybersecurity for Distributed Energy Resources (DERs) and the evolving landscape of the smart grid. This research study shows that there is need for a proactive and adaptable cybersecurity approach that encompasses prevention, detection, response, and recovery to safeguard these critical energy systems against cyber threats, both today and in the future. This work serves as a valuable tool in enhancing the cybersecurity posture of utilities and grid-connected DER owners and operators. It allows them to make informed decisions, protect critical infrastructure, and ensure the reliability and security of grid-connected DER systems in an evolving energy landscape.
Copyright © by EnPress Publisher. All rights reserved.