An Adversarial Neural Cryptography Approach to Integrity Checking: Learning to Secure Data Communications

Author(s):  
Korn Sooksatra ◽  
Pablo Rivas
2019 ◽  
Vol 18 (10) ◽  
pp. 4753-4767 ◽  
Author(s):  
Kazuya Sakai ◽  
Min-Te Sun ◽  
Wei-Shinn Ku ◽  
Jie Wu ◽  
Ten H. Lai

Author(s):  
Pep Canyelles-Pericas ◽  
Andrew Burton ◽  
Hoa Le-Minh ◽  
Zabih Ghassemlooy ◽  
Krishna Busawon

Telematika ◽  
2015 ◽  
Vol 7 (1) ◽  
Author(s):  
Dessyanto Boedi P

Ipsec (IP Security) and SSL (Secure Socket Layer) is the most widely used techniques to secure data communications over the Internet. Both of these techniques has advantages and disadvantages of each. The purpose of this study is to present an analysis of the two techniques above in terms of security and performance.


2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Wei Zhang ◽  
Shanyu Tang ◽  
Liping Zhang ◽  
Zhao Ma ◽  
Jun Song

Intelligent transportation systems (ITS) are advanced applications in which the transportation industry is adapted to the information technology revolution. As an important development direction of ITS, the electronic toll collection (ETC) subsystem, which enables an efficient and speedy toll collection, has gained widespread popularity in the world. In an ETC system, toll transaction data are transmitted over intelligent transportation networks, which is vulnerable to eavesdropping, interfering, and tampering attacks. To address the above security problems, we proposed a chaotic stream cipher-based cryptographic scheme to realise secure data communications over wireless sensor network (WSN), which is a part of ITS. The proposed cryptographic scheme allowed ITS to achieve key negotiation and data encryption between sensor nodes in the WSN, whileas reduced computational costs and power consumption. Security analysis and experimental results showed that the proposed scheme could protect data transmission between wireless sensor nodes from being attacked, and significantly reduced the communication overhead for the whole system compared to the existing ECC_AES scheme, thus satisfying the real-time data transmission requirement of ITS.


Sign in / Sign up

Export Citation Format

Share Document