Braille Based Steganography System Using Dynamic Key Exchange

Author(s):  
Shreyas Sriram ◽  
Susheel Polani Sathishkumar ◽  
J. Bhuvana
Keyword(s):  
2002 ◽  
Vol 7 (2) ◽  
pp. 37-48 ◽  
Author(s):  
Uri Blumenthal ◽  
Milind M. Buddhikot ◽  
Juan A. Garay ◽  
Scott C. Miller ◽  
Sarvar Patel ◽  
...  

Author(s):  
Suherman Suherman ◽  
Deddy Dikmawanto ◽  
Syafruddin Hasan ◽  
Marwan Al-Akaidi

<span>Transmission control protocol provides reliable communication between two or more parties. Each transmitted packet is acknowledged to make sure successful deliveries. Transport layer security protocols send security information exchange as TCP loads. As results, the handshaking stage experiences longer delay as TCP acknowledgement process has already been delay prone. Furthermore, the security message transfers may have their own risks as they are not well protected yet. This paper proposes TCP-embedded three pass protocol for dynamic key exchange. The key exchange is embedded into TCP headers so that transmission delay is reduced, and message transfer is secured. The proposed protocol was assessed on self network by using socket programming in lossless environment. The assessments showed that the proposed protocol reduced three-pass protocol message transfer delay up to 25.8% on lossless channel. The assessment on security also showed that TCP-embedded three pass protocol successfully secured each transmitted TCP load using a unique key; that is much securer than the compared method.</span>


2018 ◽  
Vol 7 (2.4) ◽  
pp. 34
Author(s):  
Er Sharad ◽  
Savita Shiwani ◽  
Manish Suroliya

In the recent years, the advance wireless networks and Internet of Things (IoT) are becoming very prominent in assorted domains. In the traffic system, the problem of congestion control is very common, and it is classically handled by the global positioning systems by the drivers as well as traffic administrative authorities. But as the traffic density is increasing day by day, it is becoming difficult to handle and view all the possibilities in the prospective traffic area where the driver is willing to move. Moreover, the problem of security and integrity is also increasing rapidly as there are number of attacks in VANET and GPS systems being used by the crackers by sending the malicious code or fake packets. Ubiquitous computing is one of the recent technologies that is in the phase of implementation under Internet of Things (IoT). In this research manuscript, the approach to integrate the dynamic key exchange with the Elephant Herd Optimization (EHO) is presented to achieve the higher degree of energy optimization and overall lifetime of the network communication. The key concept of the cluster head shuffling using EHO and inner modules of key exchange are simulated in Contiki-Cooja that is open source simulator for advance wireless networks.


2006 ◽  
Vol 1 (2) ◽  
pp. 52-70
Author(s):  
Mohammed A. Tawfiq ◽  
◽  
Sufyan T. Faraj Al-janabi ◽  
Abdul-Karim A. R. Kadhim ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document