Partners Universal International Innovation Journal https://puiij.com/index.php/research PU Publications en-US Partners Universal International Innovation Journal 2583-9675 IEC 62443 Wireless Security: Deploying OT Wireless Controllers in Industrial Factory Networks https://puiij.com/index.php/research/article/view/218 <p>With the global manufacturing processes gaining momentum in their conversion to Industry 4.0, wireless connectivity has ceased to be a luxury and become a necessity to carry out its operations. All automated guided vehicles, IIoT sensors, SCADA terminals, and robotic systems rely on the constant secure wireless communication to maintain production. However, security infrastructures that regulate these networks are often copied off the enterprise IT models which were not created to operate in the operational technology environment. The paper is a technical guide to the protection of industrial wireless infrastructure by installing Prime (On-Premises) Wireless LAN Controllers in factories, which are supposed to be in line with the requirements of the ISA/IEC 62443 standard on cybersecurity. Based on the available standards of industrial security, patterns of deployment in the real world, and protocol-level analysis, the paper considers ten baseline security controls: CAPWAP DTLS tunnel encryption, placement of RADIUS in the on-premises, WPA2-PSK non-compliance at Level 2 of security, isolation of the management plane, Management Frame Protection (802.11w), command authorization by TAC The article postulates that the architecturally correct solution to the factory floor is the Prime Controller and offers a hybrid deployment framework that ensures OT resilience and allows flexibility in the management of the IT-layer.</p> Dr. A. Shaji George Copyright (c) 2026 2026-04-25 2026-04-25 4 2 1 23 10.5281/zenodo.19428491 Orbital Mirrors and Earthly Needs: A Multidimensional Analysis of SpaceBased Sunlight Redirection as a Transformative Infrastructure Technology https://puiij.com/index.php/research/article/view/219 <p>One of the most conceptually ambitious infrastructural projects of the twenty-first century is space-based sunlight redirection. Reflect Orbital, a commercial space technology firm is working on a constellation of orbital mirrors that will capture solar energy that would otherwise entirely miss the Earth and redirect it as a configurable, on-demand light and energy service to authorized places on the ground. It is an analytical piece on the company, its technology, and roadmap, and it is explored in four critical analytical perspectives, which are societal utility, corporate business value, environmental sustainability, and geopolitical governance. Based on the published service specifications, constellation development schedule, and publicly announced uses in energy, disaster response, industrial operations, agriculture, and defense, this paper assesses both the transformative and substantive risks of orbital illumination at scale deployment. It is determined that although the technology holds real potential to tackle energy poverty, lengthen the renewable generation window and disaster response precision, unresolved environmental issues, governance, and dual-use risks present are raised that must be addressed through structured international engagement before the large-scale implementation can occur. The article wraps up by pointing out areas of priorities where research, policies, and cross-sector cooperation should focus to make sure that the demonstration satellites transition to a 50,000-satellite constellation can be used to the common good of humanity, not to serve commercial interests.</p> Dr. A. Shaji George Copyright (c) 2026 2026-04-25 2026-04-25 4 2 24 43 10.5281/zenodo.19501167 Cloud Security Architecture: A Comprehensive Guide to Zero Trust, Governance, and Operational Resilience https://puiij.com/index.php/research/article/view/220 <p>Cloud computing has changed the design, deployment, and management of technology infrastructure among the organizations in a fundamental manner. With the movement of core workloads to cloud environments based on both Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) and Software as a Service (SaaS) models, the formerly understood security perimeter has become permeable. Instead, it has a dynamic, identity-driven attack surface which requires radically different approach to security governance. This paper is a technically based, full-scale guide to cloud security practitioners, architects, and organization decision-makers. It looks into the entire range of cloud security fields, starting with the basic threat landscape analysis and shared responsibility model, then moving on to Cloud Access Security Brokers, Identity and Access Management, identity federation protocols, data encryption practices, Cloud Security Posture Management, continuous compliance monitoring, and cloud security auditing. The paper ends with the discussion of design of integrated security architecture, best practices in operations in the DevSecOps models, and new technologies such as Cloud-Native Application Protection Platforms, confidential computing, and AI-based threat detection. The main thesis is that most of the major cloud security breaches can be avoided by exercising a disciplined operation, structural integrity, and unrelenting automation. This source is intended to generate real knowledge, rather than product catalog.</p> Dr. A. Shaji George Dr. T. Baskar Dr. M. M. Karthikeyan Copyright (c) 2026 2026-04-25 2026-04-25 4 2 44 69 10.5281/zenodo.19551592 Multi-Vendor Firewall Strategy: IT, OT, and Edge Networks https://puiij.com/index.php/research/article/view/221 <p>The perennial belief that one firewall product is enough to safeguard all sections of a modern enterprise is not merely a fallacy that is based on budget constraint. It is an architectural disaster that has quantifiable effects. This paper has brought forward a domain specific model to comprehend why information technology (IT) networks, operational technology (OT) space, as well as internet-facing web edge infrastructure all need purpose-built, and often vendor-differentiated, firewall solutions. The article utilizes the Purdue Enterprise Reference Architecture, the principles of Zero Trust, the OWASP security standards, and the IEC 62443 compliance requirements and focuses on the specific threat landscapes, traffic characteristics, protocol constraints and availability requirements unique to each domain. It compares the categories of firewalls, such as next-generation firewalls (NGFWs), industrial security gateways, web application firewalls (WAFs), and Firewall-as-a-Service (FWaaS) against domain-specific selection criteria. The architectural arguments are based on real-world examples such as the Colonial Pipeline attack and Triton/TRISIS malware campaign and reported OWASP Top 10 exploitation patterns to base the architectural arguments on operational reality. Guidance on deployment sequencing, policy design, change management and continuous validation is given throughout. The article concludes that the choice of product is not the only factor that can lead to the creation of true security resilience or false confidence at high cost by enterprise firewall investments but rather architecture and disciplined management practice.</p> Dr. A. Shaji George Copyright (c) 2026 2026-04-25 2026-04-25 4 2 70 96 10.5281/zenodo.19630402 Geometric Expectation of Geometric Mean of Random Variables https://puiij.com/index.php/research/article/view/222 <p>An interesting property of geometric expectation, whose concept had been introduced on the basis of geometric mean, and which was consequently defined mathematically, has been identified in the current study. The property describes an interesting result on geometric expectation of geometric mean of random variables. Description of the property has been presented in this article.</p> Dhritikesh Chakrabarty Copyright (c) 2026 2026-04-25 2026-04-25 4 2 97 105 10.5281/zenodo.19635121 The Relevance of Sanskrit Ethical Tales and Their Moral Teachings in Contemporary Social Problems: A Critical Study https://puiij.com/index.php/research/article/view/223 <p>Ethical fables in Sanskrit constitute one of the most significant components of Indian cultural heritage. This genre of literature is distinguished by its unique capacity to communicate profound moral principles through simple narratives, allegorical expressions, and stories involving animals. Classical works such as the Panchatantra and the Hitopadesha have historically played a vital role in imparting ethical values, practical wisdom, and social awareness. These narratives encompass timeless teachings related to truthfulness, friendship, prudence, justice, leadership, and broader social ethics.</p> <p>In the contemporary era, various social challenges have emerged as a consequence of rapid development, technological advancement, and the transformation of socio-cultural values towards materialistic tendencies. Issues such as moral decline, lack of empathy, corruption, and social irresponsibility are increasingly evident. In this context, the ethical insights embedded in Sanskrit narrative literature can serve as effective tools for promoting moral education and encouraging responsible conduct within society.</p> <p>This study critically examines the relevance of ethical tales in Sanskrit literature in addressing present-day social problems. Through a detailed analysis of selected narratives from classical Sanskrit texts, the research evaluates how the moral dimensions of these stories contribute to value-based education and ethical development in the modern world. Furthermore, it explores the potential application of such narratives within contemporary educational frameworks.</p> <p>Thus, the study demonstrates that Sanskrit ethical tales are not merely historical artifacts but remain highly relevant, offering meaningful guidance and practical solutions to current social issues.</p> Amrut Sharan Mishra Copyright (c) 2026 2026-04-25 2026-04-25 4 2 106 113 10.5281/zenodo.19666224