Entropy Transformation and Expansion with Quantum Permutation Pad for 5G Secure Networks

Author(s):  
Dafu Lou ◽  
Randy Kuang ◽  
Alex He
Keyword(s):  
2009 ◽  
Author(s):  
Paul C. Clark ◽  
Timothy E. Lavin ◽  
Cynthia E. Irvine ◽  
David J. Shifflett
Keyword(s):  

Author(s):  
Surya B. Yadav

The extent methods largely ignore the importance of integrating security requirements with business requirements and providing built-in steps for dealing with these requirements seamlessly. To address this problem, a new approach to secure network analysis and design is presented. The proposed method, called the SEACON method, provides an integrated approach to use existing principles of information systems analysis and design with the unique requirements of distributed secure network systems. We introduce several concepts including security adequacy level, process-location-security matrix, datalocation- security matrix, and secure location model to provide built-in mechanisms to capture security needs and use them seamlessly throughout the steps of analyzing and designing secure networks. This method is illustrated and compared to other secure network design methods. The SEACON method is found to be a useful and effective method.


2007 ◽  
Vol 122-123 ◽  
pp. 526-528 ◽  
Author(s):  
O. Guillot-Noël ◽  
Ph. Goldner ◽  
E. Antic-Fidancev ◽  
A. Louchet ◽  
J.L. Le Gouët ◽  
...  

2021 ◽  
Vol 10 (2) ◽  
pp. 38-45
Author(s):  
Saiida Lazaar

The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting confidentiality, integrity and authentication. The last two objectives are essentially built on hash functions which are the main components of many applications and secure networks. The purpose of this paper is to give recent advances of lightweight cryptographic solutions that meet the requirements of constrained systems, and to present a study, in terms of security, energy-consuming and efficiency, of the main hash functions standardized by NIST (National Institute of Standards and Technology). In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework.


2018 ◽  
Vol 2 (1) ◽  
pp. 49-57 ◽  
Author(s):  
Nabeela Ashraf ◽  
Waqar Ahmad ◽  
Rehan Ashraf

Due to the fast growth and tradition of the internet over the last decades, the network security problems are increasing vigorously. Humans can not handle the speed of processes and the huge amount of data required to handle network anomalies. Therefore, it needs substantial automation in both speed and accuracy. Intrusion Detection System is one of the approaches to recognize illegal access and rare attacks to secure networks. In this proposed paper, Naive Bayes, J48 and Random Forest classifiers are compared to compute the detection rate and accuracy of IDS. For experiments, the KDD_NSL dataset is used.


Author(s):  
Anusha Medavaka

The serious constraints and requiring deployment atmospheres of wireless sensor networks make safety for these systems extra difficult than for traditional networks Nevertheless, a number of residential or commercial properties of sensor networks may help address the challenge of building safe and secure networks. The distinct aspects of sensor networks may enable novel defenses not available in traditional networks.In this paper, we examine the security related concerns and also obstacles in wireless sensor networks. We identify the safety and security threats, testimonial suggested protection devices for wireless sensor networks.


Sign in / Sign up

Export Citation Format

Share Document