data encryption algorithms play a crucial role in information construction, effectively protecting data security. The problems in traditional research include a lack of targeting, a balance between efficiency and safe...
详细信息
This study enhances infrared communication security in nuclear power plants' secondary systems, addressing the risk of mechanical and cyber failures. A novel random address generator, employing an innovative S-box...
详细信息
This study enhances infrared communication security in nuclear power plants' secondary systems, addressing the risk of mechanical and cyber failures. A novel random address generator, employing an innovative S-box, was developed to secure IoT sensor data transmissions to gateway nodes, mitigating eavesdropping, interference, and replay attacks. We introduced a structured IR communication protocol, generating unique, encrypted addresses to prevent unauthorized access. Key-dependent S-boxes, based on a compound chaotic map system, significantly improved encryption, increasing data transmission randomness and uniqueness. Entropy analysis and reduced duplicated addresses confirmed the effectiveness of our method, with the Hash-CCM algorithm showing the highest entropy and fewest duplicates. Integrating advanced cryptographic techniques into IR systems significantly enhances nuclear power plants' security, contributing to the protection of critical infrastructure from cyber threats and ensuring operational integrity.
With the increasingly extensive application of networking technology, security of network becomes significant than ever before. encryptionalgorithm plays a key role in construction of a secure network system. However...
详细信息
With the increasingly extensive application of networking technology, security of network becomes significant than ever before. encryptionalgorithm plays a key role in construction of a secure network system. However, the encryptionalgorithm implemented on resource-constrained device is difficult to achieve ideal performance. The issue of power consumption becomes essential to performance of data encryption algorithm. Many methods are proposed to evaluate the power consumption of encryptionalgorithms yet the authors do not ensure which one is effective. In this study, they give a comprehensive review for the methods of power evaluation. They then design a series of experiments to evaluate the effectiveness of three main types of methods by implementing several traditional symmetric encryptionalgorithms on a workstation. The experimental results show that external measurement and software profiling are more accurate than that of uninterruptible power system battery. The improvement of power consumption is 27.44 and 33.53% which implies the method of external measurement and software profiling is more effective in power consumption evaluation.
This research has investigated the performance analysis of lightweight encryptionalgorithms, which are using in RFID applications. In the first part, the codes of the investigated ciphers are analyzed, and then, four...
详细信息
ISBN:
(纸本)9781467310468;9781467310444
This research has investigated the performance analysis of lightweight encryptionalgorithms, which are using in RFID applications. In the first part, the codes of the investigated ciphers are analyzed, and then, four encryptionalgorithms include TEA, HIGHT, KATAN, and KLEIN are implemented on AVR Microcontroller to evaluate the number of CPU clock cycle for each cipher. In the last part, the results of two previous parts are compared.
The data could be provided from the MAC Layer to the Security Sub Layer that is going to be designed & simulated. In this paper the security sub-layer will provide subscribers with total privacy across the fixed b...
详细信息
ISBN:
(数字)9783642157660
ISBN:
(纸本)9783642157653
The data could be provided from the MAC Layer to the Security Sub Layer that is going to be designed & simulated. In this paper the security sub-layer will provide subscribers with total privacy across the fixed broadband wireless network. This is done by encrypting connections between Subscriber Station (SS) and Base Station (BS). Also, strong protection from theft of service is provided through the BS protection to data transport services, by enforcing encryption of the associated service flows across the network. The data when entered into the security sub layer first will be certified. After the certification of the data, it could be encrypted through techniques like dataencryption Standard (DES), Advanced encryption Standard (AES) that we will call as the dataencryption. After the encryption, the data is again encrypted through Secure Hash algorithm (SHA-1) which is used for the message digest of that encrypted data. This operation will take place in the Integrity Unit (part).
暂无评论