Wireless body area networks (WBANs) are an exciting technology that will revolutionize physiological monitoring in the coming years. However, the widespread deployment of WBANs is restricted by steep energy limitation...
详细信息
Wireless body area networks (WBANs) are an exciting technology that will revolutionize physiological monitoring in the coming years. However, the widespread deployment of WBANs is restricted by steep energy limitations. Furthermore, they require acute security measures to protect user medical data. We aim to measure the energy consumption of a cellphone as it transmits and encrypts data in a mock WBAN scenario. We evaluated the impact of various design parameters in an effort to discover the ideal WBAN operational protocols. In conclusion, we recommend an optimal file size strategy, data communication network, and encryption algorithm that minimize energy consumption and enhance WBAN operation. Copyright (c) 2015John Wiley & Sons, Ltd.
The desire for new algebraic structures is always an interesting area of research for the design and development of new information confidentiality mechanisms. Confidentiality mechanism keeps information secure from u...
详细信息
Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains wi...
详细信息
Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.
Traditional chaotic image encryption methods have certain limitations in terms of processing high-dimensional data, computational complexity and attack resistance, which limits their widespread promotion and use in pr...
详细信息
Recently, multimedia has developed and become very important for transferring images securely through public networks. This paper uses the COOT optimization algorithm with compressive sensing (CS) for image encryption...
详细信息
The medical privacy of patients is protected by law. This paper briefly introduces the legal basis of medical privacy protection and the attribute-based encryption algorithm used for encrypting medical privacy data. A...
详细信息
With the development of economy, people's demand for high-quality and diversified educational resources increases. However, under the frequent occurrence of network attacks, data leakage and other events, network ...
详细信息
Matrix transformation has been successfully used in image encryption. However, conventional image encryption algorithms often employ fixed transformation matrices, which limits the randomness and versatility of image ...
详细信息
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or *** the increase in the use of...
详细信息
ISBN:
(纸本)9781467389792
iOS devices are steadily obtaining popularity of the majority of users because of its some unique advantages in recent *** can do many things that have been done on a desktop computer or *** the increase in the use of mobile devices by individuals,organizations and government,there are many problems with information security especially some sensitive data related to *** we all known,encryption algorithm play a significant role in data *** order to prevent data being intercepted and being leaked during communication, in this paper,we adopted DES encryption algorithm that is fast,simple and suitable for large amounts of data of encryption to encrypt the data of iOS client and adopted the ECC encryption algorithms that was used to overcome the shortcoming of exchanging keys in a securing way before *** addition, we should also consider the application isolation and security mechanism of iOS that these features also protect the data securing to some ***,we propose an encryption algorithm combined the strengths of DES and ECC and make full use of the advantages of hybrid ***,we tested and evaluated the performances of the suggested cryptography mechanism within the mobile platform of *** results show that the algorithm has fairly efficiency in practical applications and strong anti-attack ability and it also improves the security and efficiency in data transmission.
The demand on the security and reliability of the communication and data link of unmanned aerial vehicle (UAV) is much higher since the environment of the modern battlefield is becoming more and more complex. Since th...
详细信息
ISBN:
(纸本)9781728113395
The demand on the security and reliability of the communication and data link of unmanned aerial vehicle (UAV) is much higher since the environment of the modern battlefield is becoming more and more complex. Since the UAV communication link and its reliability evaluation represent an arduous field, we have concentrated our work on this topic. A UAV communication channel is a key factor that can affect the performance of the data link in terms of high data rate and reliable transmission of information. Moreover, the wireless communication channel opens up the door for several types of remote attacks. Therefore, the communication channel between the vehicle and ground control station (GCS) should be secure and has to provide an efficient data link. For this purpose, we have investigated the one-time pad (OTP) encryption technique for a UAV communication system. The comparative results present that OTP has better performance in terms of accuracy and execution time than other encryption algorithms.
暂无评论