Internet of Things (IoT) is considered as a trend nowadays. Devices connected to the internet interact with surrounding;this poses strong challenges in handling big data with a certain level of security. In this paper...
详细信息
ISBN:
(纸本)9781538644270
Internet of Things (IoT) is considered as a trend nowadays. Devices connected to the internet interact with surrounding;this poses strong challenges in handling big data with a certain level of security. In this paper IoT devices will be divided in to two categories high vulnerability devices and low vulnerability devices. The classification depends on the ease of attacks. In order to ensure the security of IoT devices, an agile approach is used to secure high vulnerability devices as first step and then low vulnerability devices by applying encryption algorithms.
Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem o...
详细信息
ISBN:
(纸本)9789881821065
Securing embedded systems is a challenging and important research topic due to limited computational and memory resources. Moreover, battery powered embedded systems introduce power constraints that make the problem of deploying security more difficult. This problem may be addressed by improving the trade-off between minimizing energy consumption and maintaining a proper security level. This paper proposes an energy-aware method to determine the security resources consistent with the requirements of the system. The proposed solution is based on a multi-criteria decision mechanism, the Weighted Product Model (WPM), used to evaluate the relations between different security solutions and to select the appropriate one based on variable runtime requirements.
Vehicular Ad-Hoc networks (VANET'S) represent a rapidly emerging research field and are considered essential for cooperative driving among vehicles on the road. It is a kind of special wireless ad hoc networks whi...
详细信息
ISBN:
(纸本)9781467327589;9781467327565
Vehicular Ad-Hoc networks (VANET'S) represent a rapidly emerging research field and are considered essential for cooperative driving among vehicles on the road. It is a kind of special wireless ad hoc networks which has characteristics of high node mobility and fast topology changes. To avoid accidents broadcasting of safety messages typically require to deliver the information to all vehicles travelling over geographical area with high reliability and low delay. Existing solutions for message verification are not efficient. Hence, a multilevel authentication scheme in Vehicular Ad-Hoc networks (VANET'S) using bilinear pairings method has been proposed. Here messages are signed and verified by MD5 and SHA-1. In this paper, we propose a one to one communications within a group in combination with multilevel authentication scheme. This scheme examines the accuracy of a Road Side Unit can concurrently verify multiple received signatures, thus by reducing total verification time compared with existing schemes.
The rapid development of mobile platform leads to growing demand for network communications, which suffer from increasingly severe security threats as well. Considering the urgent security demand and the limitation of...
详细信息
ISBN:
(纸本)9780769551593
The rapid development of mobile platform leads to growing demand for network communications, which suffer from increasingly severe security threats as well. Considering the urgent security demand and the limitation of battery capacity, the power consumption of the encryption algorithms plays a pivotal role for mobile device. Aiming at the above problem, this paper proposes a performance evaluation system on Android platform, which can evaluate the state parameters of device battery. Our work provides elaborate analysis and exploration of 10 security algorithms' energy consumption through extensive simulation results. With the popularity of mobile network and the rapid increase of related applications, it is significant to reduce the power consumption of security encryption algorithms on mobile devices in both academic field and industry.
This paper analyzes the processing of cryptographic confidentiality block cipher operation modes on "Advance encryption Standard" recommended by the National Institute of Standards and Technology. The block ...
详细信息
ISBN:
(纸本)9783030053451;9783030053444
This paper analyzes the processing of cryptographic confidentiality block cipher operation modes on "Advance encryption Standard" recommended by the National Institute of Standards and Technology. The block cipher operation modes that are under consideration for analysis are Electronic Code Book mode, Cipher Block Chaining mode, Cipher Feedback mode, Output Feedback mode, Counter mode, and XEX-based tweaked-codebook mode. The processing analysis of each block cipher operation modes are based on encryption time and decryption time with variable sizes of the data file when implemented in MATLAB. The result of each experiment of the operation mode is summarized in the graphical representation to help to make an instructional decision about operation mode processing when choosing for different applications with secret key ciphers.
One of the major challenges in mobile networks and digital technologies is maintaining the security of real time data. In this regard, the research community developed a lot of works to fulfill this goal by proposing ...
详细信息
ISBN:
(纸本)9781510636446
One of the major challenges in mobile networks and digital technologies is maintaining the security of real time data. In this regard, the research community developed a lot of works to fulfill this goal by proposing secure image encryption algorithms. However, some of these encryption schemes are not secure enough and lack robustness and security. In this paper, we succeed to reveal the weaknesses of a recently published encryption algorithm that is supposed to be secure and robust. We found that although the proposed network is unable to decrypt the ciphered image, it is able to perform classification on this image. We succeeded to build a deep neural network that can recognize encrypted images with an accuracy of 95.8%. Results demonstrate that our proposed approach is efficient for classifying ciphered images. These results could be valuable for further works into the topic of cryptanalysis using deep learning.
Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party at...
详细信息
ISBN:
(纸本)9781665426428
Steganography is necessary to encrypt data efficiently between different organizations. Steganography can have significant use in transmitting secret data through videos. However, this is susceptible to third party attacks such as video change, copyright change, security update changes etc. Numerous cryptographic algorithms have been proposed to be incorporated into data hiding techniques. As the number of sensitive data required is large, these models require powerful computer memory and high processing cycles to process. In that case, these cryptographic models could not be applied to large video data for integrity computation and encryption. In this paper, different video steganography approaches and their limitations are studied on the video databases.
With the entry of large-scale commercial power users into the market, the electricity trading retail market faces a surge in the number of users, agency relationships, and retail-side settlement. All these pose huge c...
详细信息
ISBN:
(纸本)9781665489577
With the entry of large-scale commercial power users into the market, the electricity trading retail market faces a surge in the number of users, agency relationships, and retail-side settlement. All these pose huge challenges to the support capability of the retail side business of power transactions, the system's ability to process concurrently with big data, and the compliance and electronization of business processes. block chain technology has technical characteristics such as anti-tampering and node sharing, which can well solve the difficulties and pain points in the process of electricity retail transactions. The block chain technology is integrated into the research and application of electricity market transactions, and the technology can not be tampered with., high reliability and advantages, and then properly solve the current problems of privacy protection, transaction security and low transaction efficiency, while reducing transmission costs.
Secure hash algorithm plays a major role to achieve the integrity in secure data communication. The SHA-3 is the recent crypto hash algorithm recognized by national institute of standards and technology. This paper pr...
详细信息
With increasing cyber threats, secure authentication of users in machine learning systems has never been more necessary. In this paper, we develop the CipherKeyX Algorithm: A novel cryptographic block cipher able to r...
详细信息
暂无评论