In recent years, application specific instruction set processor (ASIP) has attracted many researchers attention. These processors resemble application specific integrated circuits (ASICs) and digital signal processors...
详细信息
In recent years, application specific instruction set processor (ASIP) has attracted many researchers attention. These processors resemble application specific integrated circuits (ASICs) and digital signal processors (DSPs) from the performance and flexibility point of view, respectively. In other words, ASIP makes compromise between performance and flexibility criteria. The sha-3 hashing algorithm has been introduced as the safest and the newest algorithm in 2015 as a global standard. In this paper, a processor with specific instruction set is designed and implemented with regard to variant execution steps of this algorithm. In order to do the modelling and simulation of the processor, we have used the VHDL hardware description language and the ModelSim SE 6.1 tool. Moreover, in order to implement it on a field programmable gate array (FPGA) platform we have used the Xilinx ISE 10.1 tool. The implemented processor has 213.356 MHz operating frequency and 3.004 Mbps throughput.
Ad hoc network is sensitive to attacks because it has temporary nature and frequently recognized insecure environment. Both Ad hoc On-demand Distance Vector (AODV) and Ad hoc On-demand Multipath Distance vector (AOMDV...
详细信息
ISBN:
(纸本)9781538659069
Ad hoc network is sensitive to attacks because it has temporary nature and frequently recognized insecure environment. Both Ad hoc On-demand Distance Vector (AODV) and Ad hoc On-demand Multipath Distance vector (AOMDV) routing protocols have the strategy to take help from Wireless and mobile ad hoc networks. A mobile ad hoc network (MANET) is recognized as an useful internet protocol and where the mobile nodes are self-configuring and self-organizing in character. This research paper has focused on the detection and influence of black hole attack on the execution of AODV and AOMDV routing protocols and has also evaluated the performance of those two on-demand routing protocols in MANETs. AODV has the characteristics for discovering a single path in single route discovery and AOMDV has the characteristics for discovering multiple paths in single route discovery. Here a proposed method for both AODV and AOMDV routing protocol, has been applied for the detection of the black hole attack, which is the merge of both sha-3 and Diffie-Hellman algorithm. This merge technique has been applied to detect black hole attack in MANET. This technique has been applied to measure the performance matrices for both AODV and AOMDV and those performance matrices are Average Throughput, Average End to End delay and Normalized Routing Load. Both AODV and AOMDV routing protocol have been compared with each other to show that under black hole attack, AOMDV protocol always has better execution than AODV protocol. Here, NS-2.35 has been used as the Network Simulator tool for the simulation of these particular three types of performance metrics stated above.
The prospective studies on memcapacitor models and potential applications are of importance due to its dynamical behavior. For this purpose, a memcapacitor model and a corresponding circuit model have been designed, w...
详细信息
The prospective studies on memcapacitor models and potential applications are of importance due to its dynamical behavior. For this purpose, a memcapacitor model and a corresponding circuit model have been designed, whose characteristics have been investigated theoretically and experimentally. Based on the unique space conformation of DNA molecules and their unique information storage and processing ability, a memcapacitor chaotic image encryption algorithm combining with DNA sequence operations is proposed in the first time. DNA sequence operations and memcapacitor chaos iterations are used in the encryption process to strengthen the confusion and diffusion properties of the scheme. The simulation results and theoretical analysis show that the algorithm improves the sensitivity of key and the security of data transmission, and has better ability of the hacker attacks.
With the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation. In this process, it is important to ...
详细信息
With the international development of the medical service informatisation, medical information sharing has become the key standard to measure the degree of medical informatisation. In this process, it is important to ensure the security of patients' medical information such as patients' records, examination reports, images and so on. In this article, an image encryption scheme based on Secure Hash algorithm3 (sha-3), DNA coding and high dimensional chaos system is proposed to promote the security level of medical images in information sharing processes such as over the network. First, sha-3 algorithm is used to calculate the hash value of the input image, and the result is taken as the initial value of the hyper-chaotic system. Second, the intensity value of the input image is converted into a serial binary digital stream. Third, the pseudo-random sequence generated by a 4-dimensional hyper-chaotic system is used to perturb the bit stream globally so as to achieve the purpose of hiding the effective information of the input image. During the operation of hyper-chaotic sequence and DNA sequence, algebraic and complementary operations are performed on DNA encoding values to enhance encryption performance. Finally, simulations have been applied on an open-source medical image database, and the results demonstrate obvious encryption effectiveness and high security level of the proposed encryption algorithm in the robustness of noise and clipping attacks.
暂无评论