security algorithms and protocols are typical essential upgrades that must be involved within systems and their structures to provide the best performance. The protocols and systems should go through verification and ...
详细信息
security algorithms and protocols are typical essential upgrades that must be involved within systems and their structures to provide the best performance. The protocols and systems should go through verification and testing processes in order to be more efficient and accurate. In the testing of software, traditional methods are used for accuracy check-up. However, this could not fulfill the measurement of all the testing requirements. The usage of formal verification approaches in checking security properties considers their best environment to be applied. The available literature discussed several approaches on developing the most robust formal verification methods for addressing and analyzing errors that face systems. This could be during the implantation process, unknown attacks, and nondeterministic adversary on the security protocols and algorithm. In this paper, a comprehensive review of the main formal verification approaches such as model checking and theorem approving has been conducted. Moreover, the use of verification tools was briefly presented and explained thoroughly. Those formal verification methods could be involved in the design, redesign of security protocols, and algorithms based on standards and determined sizes that is decided by these techniques' analysis. The critical analysis of the methods used in verifying the security of systems showed that model checking approaches and its tools were the most used approaches among all the reviewed methods.
This paper analyzed the security of a database considering the environment of distributed *** are several security mechanisms that are applied to the different types of data that are saved;this research identifies sev...
详细信息
This paper analyzed the security of a database considering the environment of distributed *** are several security mechanisms that are applied to the different types of data that are saved;this research identifies several problems for mitigating the security of a distributed *** objective is to define a basic scheme and an abstract algorithm through algorithms using flowchart techniques for a security process in a *** deductive method and the exploratory investigation were used to analyze the information of the articles of the *** resulted in a basic structure based on a three-level architecture,with 3 DES encryption algorithm applied to the request and response;SQL-based encryption for data processing;FPE encryption algorithm for storage in the database;the scheme was presented with its scope and possible limitations;and a prototype of an abstract algorithm expressed with flowchart techniques was *** was concluded that the basic scheme and abstract algorithm presented as an alternative to control access to resources,to provide improved security in a distributed database.
Computer systems security plays a critical role in ensuring the confidentiality, integrity and data protection of electronic resources in a workplace. However, most web information system developers employ algorithms ...
详细信息
ISBN:
(纸本)9781538608722
Computer systems security plays a critical role in ensuring the confidentiality, integrity and data protection of electronic resources in a workplace. However, most web information system developers employ algorithms which are inefficient and unsecured. Therefore, organizations adopt security measures that utilize strong encryption and decryption techniques to protect confidential corporate data that reside and are communicated over the Cloud. The purpose of this research is to analyze and compare the performance of selected algorithms namely: AES (Rijndael), Blowfish and RSA. The results show that Blowfish manifested a higher time efficiency ratio when subjected to various data loads and memory size as compared to AES and RSA.
In wireless medical devices, the patient's medical data are collected and wirelessly sent to the doctor. Nowadays, there is an increase in the online attackers on the wirelessly sent patient's data to exploit ...
详细信息
ISBN:
(纸本)9781509045563
In wireless medical devices, the patient's medical data are collected and wirelessly sent to the doctor. Nowadays, there is an increase in the online attackers on the wirelessly sent patient's data to exploit for their fun and profit. Hence, securing the patient's personal health data plays a vital role. In wireless communication, power consumption, security and execution time are the concerned parameters. For the purpose of security, the security algorithms are used. In this paper, several methods of securing wireless medical data and power efficient method for portable medical devices are analyzed. This survey concludes that Blowfish algorithm which is efficient in terms of low power consumption, as well as security, may be implemented in portable medical devices.
In cellular networks, security vulnerabilities often arise from misconfigurations and improper implementations of protection mechanisms. Typically, ensuring proper security configurations is the responsibility of netw...
详细信息
In cellular networks, security vulnerabilities often arise from misconfigurations and improper implementations of protection mechanisms. Typically, ensuring proper security configurations is the responsibility of network operators. The tool described in this paper, called 5GMap, empowers legitimate subscribers, equipped with software-defined radios (Ettus B210 or X310), with innovative means and methodologies for auditing security configurations of the access networks they are connecting to. Specifically, 5GMap allows to evaluate negotiable ciphers, predictability of temporary identifiers (TMSI), resilience against disclosure of privacy- sensitive identifiers (IMSI, IMEI), and susceptibility to downgrade attacks. 5GMap achieves this by iterating access and attach primitives using either carefully crafted signaling messages requiring specific cryptographic configuration, as well as custom methodologies such as using predictable TMSIs and querying the network with non-standard signaling message sequences to detect potential departures from the expected protocol specification. Extensive testing over four mobile network operators and three virtual network operators reveals significant security and privacy issues: many networks allow unencrypted or even unauthenticated communication, TMSI randomness and IMSI concealment are not consistently ensured across all operators tested, and many other fine-grained concerns emerge among different operators. We believe that our findings highlight the usefulness of tools like 5GMap to assess (and ultimately improve, through responsible disclosure) the security posture of 4G and 5G cellular networks in the wild.
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort ...
详细信息
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing-and in some cases improving-the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented.
The continuous digitization of healthcare services makes them more targeted by security attackers that attempt to steal the patients' confidential records and hijack their healthcare rights. Consequently, many exi...
详细信息
The continuous digitization of healthcare services makes them more targeted by security attackers that attempt to steal the patients' confidential records and hijack their healthcare rights. Consequently, many existing approaches were proposed to protect healthcare data and services. However, these current solutions lack efficiency, as indicated by the high number of security breaches in healthcare systems. Therefore, this research was motivated to introduce a more efficient algorithm that achieves several essential security requirements such as authentication, confidentiality, and integrity while preserving high resistance against a comprehensive set of different security threats. This proposed algorithm is a hybrid optical-based that utilizes effective hashing, steganography, and encryption techniques for the secure transmission of color or grayscale medical images, even over insecure channels. The input medical image is initially decomposed into three color components (red, green, and blue). Then, each one of these color components is forwarded to multiple sequential security stages. At the first security stage, the Discrete Wavelet Transform (DWT)-based compressive sensing technique is employed to compress the color components of the plaintext medical image to obtain the compressed image components. After that, the sigmoid function-based quantization process is applied to the compressed image components to generate the digital quantized image components. The digital pixels of these components will then be encrypted using Rubik's cube-based encryption algorithm to obtain the final ciphertext medical image. In parallel, to ensure the authentication and integrity of the transmitted medical image, the image phase component is extracted using the optical Double Random Phase Encoding (DRPE) technique. Then, it is quantized before concatenation with a secret key and forwarded to the SHA-256 hashing algorithm to generate the HMAC digest (Hash-based Message Authenticatio
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of in...
详细信息
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive from this technology, such as medical or industrial applications. However, just like any other technology, security is a huge concern. Given its distributed architecture and its processing limitations, programmable matter cannot handle the traditional security protocols and encryption algorithms. This article proposes a new security protocol optimized and dedicated for IoT programmable matter. This protocol is based on lightweight cryptography and uses the same encryption protocol as a hashing function while keeping the distributed architecture in mind. The analysis and simulation results show the efficiency of the proposed method and that a supercomputer will need about 5.93 x 10(25) years to decrypt the message.
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities do not exactly fit into the provision of existing security techniques due to their constrained nature. Classical security alg...
详细信息
Internet-of-Things (IoT) devices characterized by low power and low processing capabilities do not exactly fit into the provision of existing security techniques due to their constrained nature. Classical security algorithms that are built on complex cryptographic functions often require a level of processing that low-power IoT devices are incapable to effectively achieve due to limited power and processing resources. Consequently, the option for constrained IoT devices lies in either developing new security schemes or modifying existing ones to be more suitable for constrained IoT devices. In this work, an efficient security algorithm for constrained IoT devices, based on the advanced encryption standard, is proposed. We present a cryptanalytic overview of the consequence of complexity reduction together with a supporting mathematical justification, and provisioned a secure element (ATECC608A) as a tradeoff. The ATECC608A doubles for authentication and guarding against implementation attacks on the associated IoT device (ARM Cortex M4 micro-processor) in line with our analysis. The software implementation of the efficient algorithm for constrained IoT devices shows up to 35% reduction in the time it takes to complete the encryption of a single block (16 B) of plain text, in comparison to the currently used standard AES-128 algorithm, and in comparison to current results in literature at 26.6%.
Cryptography attempts to provide a private and secure transmission channel for communication between sender and receiver, through a secret key, so that, if an intruder manages to intercept this transmission, they cann...
详细信息
ISBN:
(纸本)9798400716577
Cryptography attempts to provide a private and secure transmission channel for communication between sender and receiver, through a secret key, so that, if an intruder manages to intercept this transmission, they cannot understand the content of the information. Cryptography is not a new or recent technology, it is as old as writing, which has adapted to the times, and to all the different means of communication such as the telephone, radio and current networks. At first, cryptography was only used in military environments to protect communications during war, but today with the development of multiple ways of communication, particularly the Internet, it became common for people to be more interested in protecting their information, from private information of an individual to protect information between communication channels to resolve government issues. In this work we will talk about cryptography application and its development, and how to apply all of this to a security system, which can be applied to locks, whether residential, cars or any other *** work will address the usability of this cybersecurity system, how it can help in our daily lives. And the focus it currently has on cybersecurity.
暂无评论