Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 96
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

The biggest software development companies conduct daily more than hundreds deployments which influence currently operating IT (Information Technology) systems. This is possible due to the availability of automatic mechanisms which are providing their functional testing and later applications deployment. Unfortunately, nowadays, there are no tools or even a set of good practices related to the problem on how to include IT security issues into the whole production and deployment processes. This paper describes how to deal with this problem in the large mobile telecommunication operator environment.

Go to article

Authors and Affiliations

Grzegorz Siewruk
Wojciech Mazurczyk
Andrzej Karpiński
Download PDF Download RIS Download Bibtex

Abstract

The paper presents a new ontology-based approach to the elaboration and management of evidences prepared by developers for the IT security evaluation process according to the Common Criteria standard. The evidences concern the claimed EAL (Evaluation Assurance Level) for a developed IT product or system, called TOE (Target of Evaluation), and depend on the TOE features and its development environment. Evidences should be prepared for the broad range of IT products and systems requiring assurance. The selected issues concerning the author’s elaborated ontology are discussed, such as: ontology domain and scope definition, identification of terms within the domain, identification of the hierarchy of classes and their properties, creation of instances, and an ontology validation process. This work is aimed at the development of a prototype of a knowledge base representing patterns for evidences.
Go to article

Authors and Affiliations

Andrzej Białas
Download PDF Download RIS Download Bibtex

Abstract

Paradoxically, Europe is now more secure than it was before the war in Ukraine, although challenges still abound.
Go to article

Authors and Affiliations

Roman Kuźniar
1

  1. Faculty of Political Science and International Studies, University of Warsaw
Download PDF Download RIS Download Bibtex

Abstract

Migration has always been present, as one of the forces behind the evolutionary success of the human species. But why do contemporary migrations stir such strong emotions?
Go to article

Authors and Affiliations

Witold Klaus
1
ORCID: ORCID

  1. PAS Institute of Law Studies in Warsaw
Download PDF Download RIS Download Bibtex

Abstract

Should Poland be fearful for its demographic security?
Go to article

Authors and Affiliations

Piotr Szukalski
1 2 3

  1. University of Łódź
  2. Committee on Demographic Sciences of the Polish Academy of Sciences
  3. Forecast Committee of the Polish Academy of Sciences
Download PDF Download RIS Download Bibtex

Abstract

In this paper a new security technique aiming to ensure safe and reliable communications between different nodes on an automotive Controller Area Network (CAN) is presented. The proposed method relies on a robust authentication code using Blake-3 as a hash algorithm within an adapted structure that includes a monitor node. A prototype is implemented and run effectively to perform hardware simulations of real case-based security problems of automotive embedded CAN systems. As a result, data transfer can take place on a newly enhanced CAN bus according to the standard protocol without being intercepted nor tampered with by unauthorized parties thereby highlighting the effectiveness of the proposed technique.
Go to article

Authors and Affiliations

Asmae Zniti
1
Nabih EL Ouazzani
1

  1. Faculty of Sciences and Technology (FST), University Sidi Mohamed Ben Abdellah, Signals Systems and Components Laboratory (LSSC), Fez, Morocco
Keywords WSN routing security
Download PDF Download RIS Download Bibtex

Abstract

With the continuous advances in mobile wireless sensor networks (MWSNs), the research community has responded to the challenges and constraints in the design of these networks by proposing efficient routing protocols that focus on particular performance metrics such as residual energy utilization, mobility, topology, scalability, localization, data collection routing, Quality of Service (QoS), etc. In addition, the introduction of mobility in WSN has brought new challenges for the routing, stability, security, and reliability of WSNs. Therefore, in this article, we present a comprehensive and meticulous investigation in the routing protocols and security challenges in the theory of MWSNs which was developed in recent years.
Go to article

Bibliography

[1] A. Forster, Introduction to wireless sensor networks, John Wiley & Sons, 2016.
[2] A. Dahane and N.-E. Berrached, Mobile, Wireless and Sensor Networks: A Clustering Algorithm for Energy Efficiency and Safety, Apple Academic Press, 2019.
[3] E. C. Whitman, "Sosus: The “secret weapon” of undersea surveillance," Undersea Warfare, vol. 7, no. 2, p. 256, 2005.
[4] V. Jindal, "History and architecture of Wireless sensor networks for ubiquitous computing," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 7, no. 2, pp. 214-217, February 2018.
[5] R. Silva, Z. Zinonos, J. S. Silva and V. Vassiliou, "Mobility in WSNs for critical applications," in 2011 IEEE Symposium on Computers and Communications (ISCC), 2011.
[6] D. Stevanovic and N. Vlajic, "Performance of IEEE 802.15. 4 in wireless sensor networks with a mobile sink implementing various mobility strategies," in 2008 33rd IEEE Conference on Local Computer Networks (LCN), 2008.
[7] V. Ramasamy, "Mobile Wireless Sensor Networks: An Overview," in Wireless Sensor Networks - Insights and Innovations, P. Sallis, Ed., IntechOpen, 2017.
[8] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, "A survey on sensor networks," IEEE Communications magazine, vol. 40, no. 8, pp. 102-114, 2002.
[9] T. P. Lambrou and C. G. Panayiotou, "A survey on routing techniques supporting mobility in sensor networks," in 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks, 2009.
[10] U. Burgos, U. Amozarrain, C. Gómez-Calzado and A. Lafuente, "Routing in mobile wireless sensor networks: A leader-based approach," Sensors, vol. 17, no. 7, p. 1587, 2017.
[11] M. Fonoage, M. Cardei and A. Ambrose, "A QoS based routing protocol for wireless sensor networks," in International Performance Computing and Communications Conference, 2010.
[12] J. N. Al-Karaki and A. E. Kamal, "Routing techniques in wireless sensor networks: a survey," IEEE wireless communications, vol. 11, no. 6, pp. 6-28, 2004.
[13] J. Sen, "Routing security issues in wireless sensor networks: attacks and defenses," in Sustainable Wireless Sensor Networks, InTech, 2010, pp. 279-309.
[14] M. Radi, B. Dezfouli, K. A. Bakar and M. Lee, "Multipath routing in wireless sensor networks: survey and research challenges," Sensors, vol. 12, no. 1, pp. 650-685, 2012.
[15] S. Varshney and R. Kuma, "Variants of LEACH routing protocol in WSN: A comparative analysis," in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (confluence), 2018.
[16] D.-S. Kim and Y.-J. Chung, "Self-organization routing protocol supporting mobile nodes for wireless sensor network," in First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), 2006.
[17] G. Renugadevi and M. Sumithra, "An analysis on LEACH-mobile protocol for mobile wireless sensor networks," International Journal of Computer Applications, vol. 65, no. 21, pp. 38-42, 2013.
[18] N. Sabor, S. Sasaki, M. Abo-Zahhad and S. M. Ahmed, "A comprehensive survey on hierarchical-based routing protocols for mobile wireless sensor networks: review, taxonomy, and future directions," Wireless Communications and Mobile Computing, vol. 2017, 2017
[19] G. S. Kumar, M. V. Paul, G. Athithan and K. P. Jacob, "Routing protocol enhancement for handling node mobility in wireless sensor networks," in TENCON 2008-2008 IEEE Region 10 Conference, 2008.
[20] Z. Qi and Y. Min, "A routing protocol for mobile sensor network based on leach," in 10th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2014), 2014.
[21] S. Mottaghi and M. R. Zahabi, "Optimizing LEACH clustering algorithm with mobile sink and rendezvous nodes," AEU-International Journal of Electronics and Communications, vol. 69, no. 2, pp. 507-514, 2015.
[22] B. Nazir and H. Hasbullah, "Mobile sink based routing protocol (MSRP) for prolonging network lifetime in clustered wireless sensor network," in 2010 International Conference on Computer Applications and Industrial Electronics, 2010.
[23] C. E. Perkins, Ad hoc networking, vol. 1, Addison-wesley Reading, 2001. [24] techopedia.com, "Definition - What does Ad Hoc On-Demand Distance Vector (AODV) mean?," 2019. [Online]. Available: https://www.techopedia.com/definition/2922/ad-hoc-on-demand-distance-vector-aodv. [Accessed November 2019].
[25] H. I. Sigiuk and A. A. Ihbeel, "Performance evaluation of dynamic source routing protocol (DSR) on WSN," International Journal of Computing and Digital Systems, vol. 1, no. 1, pp. 19-24, 2012.
[26] D. Karaboga and B. Basturk, "A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm," Journal of global optimization, vol. 39, no. 3, pp. 459-471, 2007.
[27] Y. Yue, J. Li, H. Fan and Q. Qin, "Optimization-based artificial bee colony algorithm for data collection in large-scale mobile wireless sensor networks," Journal of Sensors, vol. 2016, 2016.
[28] S. Cakici, I. Erturk, S. Atmaca and A. Karahan, "A novel cross-layer routing protocol for increasing packet transfer reliability in mobile sensor networks," Wireless personal communications, vol. 77, no. 3, pp. 2235-2254, 2014.
[29] S. A. Awwad, C. K. Ng, N. K. Noordin and M. F. A. Rasid, "Cluster based routing protocol for mobile nodes in wireless sensor network," in 2009 International Symposium on Collaborative Technologies and Systems, 2009.
[30] J. Shi, X. Wei and W. Zhu, "An efficient algorithm for energy management in wireless sensor networks via employing multiple mobile sinks," International Journal of Distributed Sensor Networks, vol. 12, no. 1, 2016.
[31] S. Deng, J. Li and L. Shen, "Mobility-based clustering protocol for wireless sensor networks with mobile nodes," IET Wireless Sensor Systems, vol. 1, no. 1, pp. 39-47, 2011.
[32] S. Lindsey and C. S. Raghavendra, "PEGASIS: Power-efficient gathering in sensor information systems," in Proceedings, IEEE Aerospace Conference, 2002.
[33] M. R. Jafri, N. Javaid, A. Javaid and Z. A. Khan, "Maximizing the lifetime of multi-chain pegasis using sink mobility," arXiv preprint arXiv:1303.4347, 2013.
[34] R. Velmani and B. Kaarthick, "An efficient cluster-tree based data collection scheme for large mobile wireless sensor networks," IEEE Sensors Journal, vol. 15, no. 4, pp. 2377-2390, 2014.
[35] R. Velmani and B. Kaarthick, "An energy efficient data gathering in dense mobile wireless sensor networks," ISRN Sensor Networks, vol. 2014, 2014.
[36] R. Anitha and P. Kamalakkannan, "Enhanced cluster based routing protocol for mobile nodes in wireless sensor network," in 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering, 2013.
[37] T. Hayes and F. H. Ali, "Proactive Highly Ambulatory Sensor Routing (PHASeR) protocol for mobile wireless sensor networks," Pervasive and Mobile Computing, vol. 21, pp. 47-61, 2015.
[38] C. Tunca, S. Isik, M. Y. Donmez and C. Ersoy, "Ring routing: An energy-efficient routing protocol for wireless sensor networks with a mobile sink," IEEE Transactions on Mobile Computing, vol. 14, no. 9, pp. 1947-1960, 2014.
[39] A. E. Kostin, Y. Fanaeian and H. Al-Wattar, "Anycast tree-based routing in mobile wireless sensor networks with multiple sinks," Wireless Networks, vol. 22, no. 2, pp. 579-598, 2016.
[40] S. Sarangi and S. Kar, "Genetic algorithm based mobility aware clustering for energy efficient routing in wireless sensor networks," in 2011 17th IEEE International Conference on Networks, 2011.
[41] J. Wang, Y.-Q. Cao, B. Li, S.-Y. Lee and J.-U. Kim, "A glowworm swarm optimization based clustering algorithm with mobile sink support for wireless sensor networks," Journal of Internet Technology , vol. 16, no. 5, pp. 825-832, 2015.
[42] D. W. Carman, P. S. Kruus and B. J. Matt, "Constraints and approaches for distributed sensor network security," 2000. [43] I. Kamel and H. Juma, "A lightweight data integrity scheme for sensor networks," Sensors, vol. 11, no. 4, pp. 4118-4136, 2011.
[44] C.-M. Chen, Y.-H. Lin, Y.-H. Chen and H.-M. Sun, "Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn," Journal of Information Hiding and Multimedia Signal Processing, vol. 4, no. 1, pp. 57-72, 2013.
[45] I. Silva, L. A. Guedes, P. Portugal and F. Vasques, "Reliability and availability evaluation of wireless sensor networks for industrial applications," Sensors, vol. 12, no. 1, pp. 806-838, 2012.
[46] R. Riaz, T.-S. Chung, S. S. Rizvi and N. Yaqub, "BAS: The Biphase Authentication Scheme for Wireless Sensor Networks," Security and Communication Networks, vol. 2017, 2017.
[47] S. A. Ch, Z. Mehmood, D. Rashid Amin, M. Alghobiri and T. A. Malik, "Ensuring Reliability & Freshness in Wireless Sensor Networks," in 2010 International Conference on Intelligent Network and Computing (ICINC 2010) , 2010.
[48] L. Lazos and R. Poovendran, "SeRLoc: Robust localization for wireless sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 1, no. 1, pp. 73-100, 2005.
[49] A. Srinivasan and J. Wu, "A survey on secure localization in wireless sensor networks," Encyclopedia of Wireless and Mobile communications, pp. 1-26, 2007.
[50] J. Hwang and Y. Kim, "Revisiting random key pre-distribution schemes for wireless sensor networks," in Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004.
[51] A.-S. K. Pathan, Security of self-organizing networks: MANET, WSN, WMN, VANET, CRC press, 2016.
[52] J. He, J. Chen, P. Cheng and X. Cao, "Secure Time Synchronization in WirelessSensor Networks: A MaximumConsensus-Based Approach," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 4, pp. 1055-1065, 2014.
[53] S. Ganeriwal, S. Čapkun, C.-C. Han and M. B. Srivastava, "Secure time synchronization service for sensor networks," in Proceedings of the 4th ACM workshop on Wireless security, 2005.
[54] G. Yang, L. Dai and Z. Wei, "Challenges, threats, security issues and new trends of underwater wireless sensor networks," Sensors, vol. 18, no. 11, p. 3907, 2018.
[55] M. Riaz, A. Buriro and A. Mahboob, "Classification of Attacks on Wireless Sensor Networks : A Survey," International Journal of Wireless and Microwave Technologies, vol. 8, pp. 15-39, 11 2018.
[56] S. Sudheendran, O. Bouachir, S. Moussa and A. O. Dahmane, "Review — Challenges of mobility aware MAC protocols in WSN," in 2018 Advances in Science and Engineering Technology International Conferences (ASET), 2018.
[57] H. Gong, X. Zhang, L. Yu, X. Wang and F. Yi, "A study on MAC protocols for wireless sensor networks," in 2009 Fourth International Conference on Frontier of Computer Science and Technology, 2009.
[58] K. Chelli, "Security issues in wireless sensor networks: Attacks and countermeasures," in Proceedings of the World Congress on Engineering, 2015.
[59] P. M. Jawandhiya, M. M. Ghonge, M. Ali and J. Deshpande, "A survey of mobile ad hoc network attacks," International Journal of Engineering Science and Technology, vol. 2, no. 9, pp. 4063-4071, 2010.
[60] D. R. Raymond and S. F. Midkiff, "Denial-of-service in wireless sensor networks: Attacks and defenses," IEEE Pervasive Computing, pp. 74-81, 2008.
[61] A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," computer, vol. 35, no. 10, pp. 54-62, 2002.
[62] R. W. Anwar, M. Bakhtiari, A. Zainal, A. H. Abdullah and K. N. Qureshi, "Security Issues and Attacks in Wireless Sensor Network," World Applied Sciences Journal, vol. 30, no. 10, pp. 1224-1227, 2014.
[63] T. H. Hadi, "MANET and WSN: WHAT MAKES THEM DIFFERENT?," IRACST – International Journal of Computer Networks and Wireless Communications (IJCNWC), vol. 7, no. 6, pp. 23-28, Nov-Dec 2017.
[64] M. L. Messai, "Classification of attacks in wireless sensor networks," in International Congress on Telecommunication and Application 2014 arXiv preprint arXiv:1406.4516, 2014.
Go to article

Authors and Affiliations

Ahmed Al-Nasser
1
Reham Almesaeed
1
Hessa Al-Junaid
1

  1. University of Bahrain College of Information Technology, Bahrain
Download PDF Download RIS Download Bibtex

Abstract

The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e. BLAKE, Grøstl, JH, Keccak, Skein. The aim of the analysis is to develop more secure and faster cryptographic algorithm compared to the current version of the SDEx method with SHA- 512 and the AES algorithm. When considering the speed of algorithms, mainly the software implementation will be taken into account, as it is the most commonly used.
Go to article

Authors and Affiliations

Artur Hłobaż
1

  1. Faculty of Physics and Applied Informatics, University of Lodz, Poland
Download PDF Download RIS Download Bibtex

Abstract

In its history, Poland was usually more oriented to land than to the sea. For many centuries we have not been able to see the opportunities and potential created by the coastal location of our country. In the current strategic documents in Poland, there are also no proper references to the maritime security of the state, although we are a member of both NATO and the European Union. The article presents the creation process in 2015–2017 and the content of a unique document devoted to this issue: Poland’s Strategic Concept for Maritime Security, which was born thanks to the efforts of “enthusiasts” of maritime affairs from the Naval Academy, Shipbuilding Council and the Institute of General Józef Haller under the leadership of the National Security Bureau. In the authors opinion, the document is to form the basis for work on the future maritime security strategy of our country, and also become the “engine” of public discussion in Poland on maritime security issues and the effective use of the coastal position of the state for economic development.

Go to article

Authors and Affiliations

Andrzej Makowski
Download PDF Download RIS Download Bibtex

Abstract

Today, ensuring energy security is becoming increasingly important. It has been proven that agricultural crops are currently the dominant feedstock for the production of biofuels and first-generation biofuels dominate both in Ukraine and around the world and can potentially pose a threat to food security. The research aims to analyze the state of food security in Ukraine in order to estimate the economic basis for the use of surplus food crops for biofuel production for substantiating the required areas for growing energy crops in the volumes that could ensure balance between the food and energy use of crops. An analysis of food security of Ukraine showed that the agricultural sector provides the population with most of the necessary food products, but it is advisable to modernize the food supply standards. It has been proven that crops that can be used for the production of first-generation biofuels in Ukraine are produced in sufficient quantities to ensure food security, and they are exported without compromising the food security of the state and export potential.
As calculated, Ukraine can use about 11–12 million hectares of arable land for growing energy crops with their subsequent processing into biofuels. It has been proven that in the future in Ukraine, it is recommended to develop the production of biofuels (biogas and solid biofuels) from crop and livestock waste, as well as organic waste from processing enterprises. This would not pose a threat to food security and would address a number of environmental issues related to waste disposal. Today, under the condition of war in Ukraine, food security and energy independence are priority issues and energy diversity, including the production and consumption of biofuels, is a top factor for further development.
Go to article

Authors and Affiliations

Dina Tokarchuk
1
ORCID: ORCID
Natalia Pryshliak
1
ORCID: ORCID
Sergiy Berezyuk
1
Andrii Shynkovych
1
ORCID: ORCID

  1. Vinnytsia National Agrarian University, Vunnytsia, Ukraine
Download PDF Download RIS Download Bibtex

Abstract

The specificities of the sowing and harvesting campaign of 2022–2023 in Ukraine and its impact on the world energy and food market in the conditions of the full-scale invasion of Ukraine by the Russian Federation are analyzed in this paper. The purpose of the study is to determine the role of Ukraine in ensuring energy and global food security, to analyse the situation regarding the possibility of conducting a sowing and harvesting campaign in Ukraine in the conditions of hostilities and to provide recommendations on preserving the potential of Ukraine in meeting the energy and food needs of Ukraine and other countries. The provided analysis of data of the Food and Agriculture Organization (FAO), the State Customs Service and the State Statistics Service of Ukraine has confirmed the role of Ukraine in ensuring energy and food safety of many countries in the Middle East and North Africa, which are the main importers of agricultural products from Ukraine. It has been found that the 2022–2023 sowing and harvesting campaign in Ukraine is facing a number of problems, including: military operations over a large area, which makes it impossible to conduct agrotechnical activities in a timely manner; a lack of seed material due to its systematic destruction by the Russian military; problems with the supply of fuel and lubricants (systematic shelling and destruction of oil bases throughout Ukraine); problems with the supply of fertilizers; bombing wheat fields and food warehouses; blocking Ukrainian sea ports; mobilization of a significant part of the population in the ranks of the Armed Forces of Ukraine; logistics problems. The study proposes recommendations to preserve the potential for meeting energy and food needs in Ukraine and for countries importing agricultural products from Ukraine.
Go to article

Authors and Affiliations

Natalia Pryshliak
1
ORCID: ORCID
Vitalii Dankevych
2
ORCID: ORCID
Dina Tokarchuk
1
ORCID: ORCID
Oleksandr Shpykuliak
3
ORCID: ORCID

  1. Department of Administrative Management and Alternative Energy Sources, Vinnytsia National Agrarian University, Vunnytsia, Ukraine
  2. Faculty of Law Public Administration and National Security, Polissya National University, Ukraine
  3. National Scientific Center “Institute of Agrarian Economics”, Ukraine
Download PDF Download RIS Download Bibtex

Abstract

The major challenge faced by electronic device designers is to defend the system from attackers and malicious modules called Hardware Trojans and to deliver a secured design. Although there are many cryptographic preventive measures in place adversaries find different ways to attack the device. Differential Power Analysis (DPA) attack is a type of Side Channel Attacks, used by an attacker to analyze the power leakage in the circuit, through which the functionality of the circuit is extracted. To overcome this, a lightweight approach is proposed in this paper using, Wave Dynamic Differential Logic (WDDL) technique, without incurring any additional resource cost and power. The primary objective of WDDL is to make the power consumption constant of an entire circuit by restricting the leakage power. The alternate strategy used by an adversary is to leak the information through reverse engineering. The proposed work avoids this by using a bit sequencer and a modified butterfly PUF based randomizing architecture. A modified version of butterfly PUF is also proposed in this paper, and from various qualitative tests performed it is evident that this PUF can prevent information leakage. This work is validated on ISCAS 85, ISCAS 89 benchmark circuits and the results obtained indicate that the difference in leakage power is found to be very marginal.
Go to article

Authors and Affiliations

Mohankumar N.
1
Jayakumar M.
1
Nirmala Devi M.
1

  1. Department of Electronics and Communication Engineering, Amrita School of Engineering, Coimbatore, Amrita Vishwa, Vidyapeetham, India
Download PDF Download RIS Download Bibtex

Abstract

In this paper, we describe secure gateway for Internet of Things (IoT) devices with internal AAA mechanism, implemented to connect IoT sensors with Internet users. Secure gateway described in this paper allows to (1) authenticate each connected device, (2) authorise connection or reconguration performed by the device and (3) account each action. The same applies to Internet users who want to connect, download data from or upload data to an IoT device. Secure Gateway with internal AAA mechanism could be used in Smart Cities environments and in other IoT deployments where security is a critical concern. The mechanism presented in this paper is a new concept and has been practically validated in Polish national research network PL-LAB2020.

Go to article

Authors and Affiliations

Dominik Samociuk
Błażej Adamczyk
Download PDF Download RIS Download Bibtex

Abstract

Energy security is one of the most frequently analysed phenomena in the energy markets. Great variety of scientifc efforts should have indicated clear definition of the phenomenon. However, those studies highlighted more than 80 different definitions of what energy security really is. Due to the fact, that energy security is analyzed by different scientific disciplines, studies have provided a comperehensive reflection on the phenomenon.

The main objective of this paper is of the theoretical nature and focuses on showing energy security externalities. Author delivers an integrative review focusing on existing literature referring to the analyzed phenomena. Energy security is though studied only from the perspective of economics therefore interdisciplinary studies are out of the study scope. The reason for such scientific procedure stem from a belief that each discipline approach is different in terms of concepts, research methods and though results that are obtained. Therefore without undermining high value of interdisciplinary approaches to energy security, author decided to concentrate solely on economic perspective, which in energy security studies seems to be underestimated. Such approach in author’s belief helps achieve theoretical clarity of the below given analysis.

Presented paper is of the theoretical nature and focuses on showing energy security externalities. Critical literature review shows the literature mainstream in which energy security externalities are

Go to article

Authors and Affiliations

Honorata Nyga-Łukaszewska
Download PDF Download RIS Download Bibtex

Abstract

The increasing threat of terrorist attacks in Europe and social demands for governmental actions towards facilitating an information exchange between the national authorities responsible for public security, lead to the spectacular shift towards collection of passengers’ data. Initially, the idea had concerned mainly aviation passengers’ data and was limited to international flights only. But soon it was extended in order to include the Passenger Name Records (PNR) from domestic transport. Recently, we can see tensions to expand the PNR collection scheme to other means of transport including maritime routes. The paper studies the most developed system created in Belgium and assesses its influence on possible all-European solutions. When presenting the main problems connected with profiling the passengers and data sharing between institutions, it discusses a lack of precise privacy impact assessment and the need for necessity and proportionality studies to be carried out both at the level of Member States and in the EU discussion on the implementation of the so called PNR Directive and on the new requirements for the digital registration of passengers and crew sailing on board European passenger ships included in 2017 amendments to Directive 98/41/EC.

Go to article

Authors and Affiliations

Iwona Zużewicz-Wiewiórowska
ORCID: ORCID
Wojciech Wiewiórowski
ORCID: ORCID
Download PDF Download RIS Download Bibtex

Abstract

Associate Professor Robert Balas of the PAS Institute of Psychology talks about how the traditional patterns of human behavior are breaking down, causing growing frustration.
Go to article

Authors and Affiliations

Robert Balas
1
ORCID: ORCID

  1. PAS Institute of Psychology
Download PDF Download RIS Download Bibtex

Abstract

Mobile Ad hoc Network (MANET) is a type of Ad hoc network. General properties of MANET open the network to various security threats. Network layer-based Active attacks are widespread and destructive. Available security solutions contain complex calculations. Therefore, the objective of this research is to propose a lightweight security mechanism to enhance the security of data communications between source and destination nodes in a MANET from network layer-based active attack. Blackhole is used as a network layer-based Active attack. The network performance is evaluated using Packet Delivery Ratio (PDR), Average End-to-End Delay (AEED), Throughput, and Simulation Processing Time at Intermediate Nodes (SPTIN). The controller network was used to compare the performance of each network. During the experiment due to the impact of the blackhole attack, compared to the controller network, the PDR was found to be 0.28%, AEED was infinity and Throughput was 0.33%. The performance of the proposed security mechanism was compared with that of the controller network, and the values of PDR, AEED, Throughput, and SPTIN were found to be 98.0825%, 100.9346%, 99.9988%, and 96.5660%, respectively. The data packet delivery ratio was 100.00% compared to that of the controller network. The network that was affected by a blackhole attack showed a higher amount of ADDR than the controller network and the lowest amount of PDR. The network that was affected by the blackhole showed underperformance compared to the controller network. The proposed security mechanism performs well in PDR, AEED, and Throughput compared to the controller network. The AEED and SPTIN values prove that the proposed solution is free from complex calculations. The scope of the solution can be expanded into a lightweight Intruder Detection System to handle different types of security attacks in MANETs.
Go to article

Authors and Affiliations

Uthumansa Ahamed
1
Shantha Fernando
2

  1. Faculty of Applied Sciences, Rajarata University of Sri Lanka, Mihintale, Sri Lanka
  2. University of Moratuwa, Colombo, Sri Lanka
Download PDF Download RIS Download Bibtex

Abstract

The paper presents brown coal as one of the two basic domestic energy raw materials apart from hard coal. Historically, the use of brown coal in Poland is primarily fuel for the power plants. It was used for the production of lignite briquettes in small quantities and as fuel for local boiler houses and as an addition to the production of fertilizers (Konin and Sieniawa). At present, after changes in the case of the quality of fuels used in local boiler plants, brown coal remains as a fuel for the power plants in almost 100%. Currently, the brown coal industry produces about 35% of the cheapest electricity. The cost of electricity production is more than 30% lower than the second basic fuel – hard coal. The existing fuel and energy complexes using brown coal, with the Bełchatów complex at the forefront, are now an important guarantor of Poland’s energy security. In contrast to the other fuels such as: oil, natural gas or hard coal, the cost of electricity production from brown coal is predictable in the long term and almost insensitive to fluctuations in global commodity and currency markets. Its exploitation is carried out using the high technological solutions and respecting all environmental protection requirements, both in the area of coal extraction and electricity generation. Importantly, the fuel and energy complexes using brown coal showed a positive profitability so far and generated surpluses enabling the financing of maintenance and development investments, also in other energy segments. In particular, the sector did not require and has yet not benefited from public aid in the form of, for example, subsidies or tax concessions. Polish brown coal mining has all the attributes necessary for long-term development to ensure the country’s energy security. The document which is a road map for the brown coal industry is the Program for the Brown Coal Mining Sector in Poland adopted by the Council of Ministers on May 30, 2018. The Program covers the years 2018–2030 with a perspective up to 2050 and presents the development directions of the brown coal mining sector in Poland together with the objectives and actions necessary to achieve them. The Program presents a strategy for the development of brown coal mining in Poland in the first half of the 21st century. Possible scenarios have developed in active mining and energy basins as well as in new regions with significant resources of this mineral. This is to enable the most efficient use of deposits in the Złoczew and Konin regions as well as the Gubin and Legnica brown coal basins, and then deposits located in the Rawicz region (Oczkowice) as well as other prospective areas that may eventually replace the existing active mining and energy areas. This will allow power plants to continue to produce inexpensive and clean electricity, using the latest global solutions in the field of clean coal technologies.

Go to article

Authors and Affiliations

Zbigniew Kasztelewicz
Miranda Ptak
Mateusz Sikora
Download PDF Download RIS Download Bibtex

Abstract

The article presents the author’s considerations on the significance of the investment package diversifying natural gas supplies as part of the Northern Gate in ensuring Poland’s energy security. Data found in literature concerning the possibilities of importing the raw material by sea (terminals, gas pipelines) includes investments at various stages of concept development and construction. However, these documents lack cohesive information about a full investment package being implemented. The author has thus attempted at creating variants concerning the diversification capacities of the Republic of Poland in reference to several key offshore and onshore projects. A problem has therefore been formulated: To what extend will the Northern Gate investment package increase Poland’s energy security as a result of increased supply of natural gas from the sea? To answer this questions, researchers were forced to verify their working hypothesis which assumed that Northern Gate investments including a comprehensive package of projects had the potential of significantly improving the level of energy security in Poland by extending the possibility of importing natural gas. To solve the problem and verify the hypothesis, the researchers applied systemic analysis, deduction and variant analysis, which were used to estimate the possible import capacities of the raw material by sea. As a result of the works, the researchers created four variants including various investment projects assuming the import of 7.75 m3 to 30,95 B m3 of natural gas a year by sea. The variant which was adopted as the most probable indicates the possibility of importing 17.75 through 22.75 B m3 of gas a year, which is 111% of the average annual demand in Poland.

Go to article

Authors and Affiliations

Andrzej Rafał Miętkiewicz
Download PDF Download RIS Download Bibtex

Abstract

The first Mineral Policy in Poland was prepared in 1938. In that time The Mineral Policy was primarily dedicated to preparing Poland for a defensive war. The Central Geology Authority (CGA) was created in 1991. The main task of this Authority was preparation plans (annual and multiannual) of geological-exploration. The CGA’s activities were focused on enhancing the resource base of mineral deposits. As of 1985 the coordination of geological tasks is the main duty of the Chief Geologist of the country. In 1996 the Council of Ministers adopted a document called State policy in the field of mineral resources, prepared at the Ministry of Environmental Protection, Natural Resources and Forestry as well as the Ministry of Industry and Trade. In 2015 a wide public discussion about the need to develop a mineral raw materials policy, initiated by the publication of three analytical documents prepared by the Demos Foundation, Professor J. Hausner and the Ministry of the Environment took place. Milestones in the development of a national mineral raw materials policy was the establishment of the special government’s plenipotentiary as well as the inter-ministerial team for mineral raw materials policy. In 2018, The Mineral Raw Materials Policy was transferred for public consultation. This document is the first document that is so comprehensive and holistic from the point of view of national mineral security interests. The Mineral Raw Materials Policy is based on 9 substantial pillars among them: economical and legal basis of mineral sector activities, investment risk, geological prospection and exploration, utilization of mineral wastes.

Go to article

Authors and Affiliations

Krzysztof Szamałek
Download PDF Download RIS Download Bibtex

Abstract

In this paper, selected aspects of the national technical level of electric energy supply security is shown. An analysis and assessment of the electric power infrastructure in area of generation, transmission and distribution in aspects of electric energy security is conducted. The profile of the generation sector and grid infrastructure in the area of transmission and distribution is shown. The present and future situation in a range of operation of electric power infrastructure in the area of generation, transmission and distribution in the frames of the National Electric Power System in the electric energy supply security context is determined. The level of national electric energy supply security in area of generation and grid infrastructure is assessed. Threats of electric energy supply security are described and the catalogue of essential actions for the assurance of electric energy supply security are proposed. In the area of electricity generation, at present there is no danger to the electricity supply security in normal load conditions, but there is a high probability that it will occur in the future (after 2025) when the forecasted increase in electricity demand takes place and the new stringent environment protection requirements (Directive IED, BAT conclusions, Winter Package) enter into force. The network infrastructure in area of transmission and distribution is admittedly adapted for presently occurred typical conditions of electric energy demand and the realization of internal tasks in normal conditions, but can create a potential threat for electric energy supply security. In the context of the forecasted increase of electric energy demand, inadequate power generation sources in the National Electric Power System and available through intersystem connections, their uneven location on the territory of Poland in the shortage of proper network transmission capacities, the necessity of improvement of the quality and electric energy supply reliability to final consumers and the intensive development of renewable energy sources, the present network infrastructure in area of transmission and distribution will be insufficient.

Go to article

Authors and Affiliations

Waldemar Dołęga
Download PDF Download RIS Download Bibtex

Abstract

The energy security of the European Union is still a concept, rather than the actual action. It was confirmed by legal regulations that give Member States the possibility of individual control of energy security. Furthermore, EU Member States can perform unilateral energy policy, which is often in the interest of the most powerful countries. The concept of energy solidarity, solidarity mechanisms of energy flows directly from the Treaty of Maastricht. This was intended to help to increase energy security, and above all, its construction at the EU level. The functioning of the European Communities and the European Union is showing that the goal of building energy security of the European Union is still in the process of creation and still remain a certain course of action. Following th energy crisis of 2009 we can observe discussion about the concept of energy union, as a way to build energy security of the European Union. Currently, its energy security is limited to the definition adopted by the European Commission and activities aimed at the development of energy infrastructure of Community interest, which contributes to improving EU energy security. The aim of this article is analyze the concept of energy union and attempt to answer the question whether it has a real chance of success, and whether the concept of the proposed shape will be effective and necessary. These questions are important because of we can observe discrepancies between the regulations, promotion of building a common energy security and the practical action of individual Member States of the European Union.

Go to article

Authors and Affiliations

Justyna Trubalska
Download PDF Download RIS Download Bibtex

Abstract

The present contribution pays tribute to the late Professor Janusz Symonides by examining the position of United Nations Security Council towards international terrorism. The analysis concentrates on how the phenomenon is perceived by the main political organ of the United Nations, and offers some cursory remarks on its reactions (both actual and potential).
Go to article

Authors and Affiliations

Bartłomiej Krzan
1
ORCID: ORCID

  1. Associate Professor (dr. hab.), Department of International Law, Faculty of Law, Administration and Economics, University of Wrocław
Download PDF Download RIS Download Bibtex

Abstract

This paper presents calculations of the economic indicators of the researched elements of the cultivation technology of corn for grain and vegetable crops in Ukraine, which indicate that the cultivation of these crops is cost-effective in all variants of the experiment. The research has established that the increase in the economic efficiency of the production of these crops when applying different rates of fertilizers is achieved due to a more significant positive effect of the increase in productivity compared to additional costs associated with the use of these farming practices, while additional costs caused by the use of fertilizers are paid off many times over. It has been proven that the use of mineral fertilizers and their combination with high rates of bio-organic fertilizer (digestate) when growing agricultural crops helps to increase productivity. There have been further developed theoretical and practical provisions regarding the ecological problem of livestock waste disposal, in particular those of pig farms, and agricultural farms, i.e. the provision of organic fertilizers to ensure the yield increase as well as improvement in the quality of agricultural and vegetable crops, so as to make it possible to obtain high-quality products of plant and vegetable production during livestock waste disposal. The proposed approach to the economic assessment of technologies for growing corn for grain and red beet depending on the fertilization system makes it possible to increase the level of productivity of agricultural and vegetable crops with the effective use of bio-organic fertilizers in the modern conditions of sharp increases in the costs of mineral fertilizers.
Go to article

Authors and Affiliations

Roman Lohosha
1
ORCID: ORCID
Vitalii Palamarchuk
1
ORCID: ORCID
Vadim Krychkovskyi
2
ORCID: ORCID

  1. Ministry of Education and Science of Ukraine, Vinnytsia National Agrarian University, Ukraine
  2. Vinnytsia National Agrarian University, Ukraine

This page uses 'cookies'. Learn more