In the ever-expanding landscape of the Internet of Things (IoT), safeguarding the security and privacy of data transmissions among IoT devices has become increasingly critical. This research introduces an innovative a...
详细信息
This paper presents a technique for ensuring secure communication between interconnected devices using the Serial Peripheral Interface (SPI) protocol. The method combines the strengths of the Physical Unclonable Funct...
详细信息
The increasing necessity for secure communication in resource-constrained platforms those found in the Internet of Things (IoT), has drawn to a key spike in demand for lightweight symmetric cyphers. However, a number ...
详细信息
In the recent times, during COVID-19 statics tell, cyber-attacks have increased by up to 37%. While the lockdown all the companies are leveraging technologies accessible via internet to conduct their day to today work...
详细信息
In order to solve the problem of researching the distribution of returns on trustworthy "dual contribution" data assets, the authors propose a research on the distribution mechanism of returns on trustworthy...
详细信息
The new technology that is employed in 5G applications presents potential security vulnerabilities. In this study, the security needs for 5G applications are analysed, and hierarchical solutions for securing 5G apps a...
详细信息
The new technology that is employed in 5G applications presents potential security vulnerabilities. In this study, the security needs for 5G applications are analysed, and hierarchical solutions for securing 5G apps are presented for various stakeholders. This study analyses the process of vulnerability assessment in 5G networks and offers an optimised dynamic technique for precisely analysing the vulnerabilities that exist in 5G networks. Specifically, the research focuses on how 5G networks may be attacked. Combining fuzzy numbers with the method for order of preference by similarity to the ideal solution (TOPSIS) is what this approach does. The proposed technique considers both static and dynamic aspects of the 5G network, such as latency and accessibility, to discover the possible attack graph pathways along which an attack may spread across the network. In addition, we compare the enhanced technique to both the classic TOPSIS and the widely used susceptibility scanning application known as Nessus.
This article evaluates the possibility of using Russian Standardized Crypto algorithms (also known as GOST algorithms) in the QUIC transport protocol. The conclusion is that it is generally feasible to use these algor...
详细信息
This article evaluates the possibility of using Russian Standardized Crypto algorithms (also known as GOST algorithms) in the QUIC transport protocol. The conclusion is that it is generally feasible to use these algorithms in QUIC, provided that some additional tasks, identified in this article, are completed. The article also identifies potential problems with some GOST algorithms when used in QUIC.
With the continuous progress of communication technology, traditional encryption algorithms cannot meet the demands of modern wireless communication security. Secure communication based on physical layer encryption em...
详细信息
This paper uses reconfigurable hardware (Field-Programmable Gate Array (FPGA) board) for security implementation, which has less complexity, more flexibility, and yields more efficiency. The Data encryption Standard (...
详细信息
Cryptography is a cornerstone of power grid security, with the symmetry and asymmetry of cryptographic algorithms directly influencing the resilience of power systems against cyberattacks. Cryptographic algorithm iden...
详细信息
暂无评论