Several communication systems applications rely on state estimators for dynamic monitoring and control. Kalman Filters have been widely used for state estimation of stochastic processes. Low communication bandwidth ad...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Wireless communications are particularly vulnerable to eavesdropping attacks due to their broadcast nature. To effectively deal with eavesdroppers, existing security techniques usually require accurate channel state i...
详细信息
Quantum networks (QNs) enable secure distributed quantum computing and sensing over next-generation optical communication networks by distributing entangled states over optical channels. However, quantum switches (QSs...
详细信息
The recent development of advanced machine learning methods for hybrid models has greatly addressed the need for the correct prediction of electrical prices. This method combines AlexNet and LSTM algorithms, which are...
详细信息
The Internet of Drones (IoD) proliferation has catalyzed transformative changes across various industries, from agriculture to urban management. However, expanding drone networks also presents significant security cha...
详细信息
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques c...
详细信息
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our *** conduct research in this field,periodic comparative analysis is needed with the new techniques coming up *** purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way *** review follows Kitchenham’s review *** review has been divided into three main stages including planning,execution,and *** the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation *** risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation *** a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat *** review reveals that threat analysis and security testing are needed to develop automated tools for the *** estimation of effort required to prioritize potential security risks is a big challenge in software *** accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep *** is also imperative to validate these effort estimation methods to ensure all potential security threats are *** challenge is selecting the right model for each specific security *** achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
Rolling bearings are the main components of rotating machines which are mostly damaged. Therefore, correct and quick fault diagnosis of rolling bearings is very necessary for maintenance. Nowadays, machine learning ha...
详细信息
Renewable resource droughts, defined as significantly reduced wind and solar power generation periods, present challenges to power system reliability and stability. This study proposes two strategies and suggests thei...
详细信息
Private Information Retrieval (PIR) is a fundamental problem in the broader fields of security and privacy. In recent years, the problem has garnered significant attention from the research community, leading to achie...
详细信息
暂无评论