Ubiquitous-trustworthy-secure data communication in hybrid cellular-internet networks

Author(s):  
A.K. Talukder ◽  
D. Das ◽  
B. Singh
2021 ◽  
Vol 174 ◽  
pp. 1-12
Author(s):  
Hui Xie ◽  
Zhengyuan Zhang ◽  
Qi Zhang ◽  
Shengjun Wei ◽  
Changzhen Hu

Author(s):  
Jasmin Ilyani Ahmad ◽  
Roshidi Din ◽  
Mazida Ahmad

<span>Cryptography is a method used to establish secure data communication. The goal of cryptography is to send data to satisfy the criteria of confidentiality, data integrity, authentication and non-repudiation. In line with the goals, the performance metrics is the important evaluation criteria to be analyzed. This paper presents the review of performance metrics of Public Key Cryptography (PKC) that had been analyzed based on the PKC scheme from the previous researchers’ effort since the last four decades. It also displayed the research pattern in different performance metrics over the years. The aim of this paper is to identify the key performance metrics which addressed by the researchers in previous studies. Finally, the critical concern of this paper which shows the overall PKC performance metrics also presented in this paper.</span>


2018 ◽  
Vol 77 (24) ◽  
pp. 32257-32273 ◽  
Author(s):  
G. Manikandan ◽  
R. Bala Krishnan ◽  
N. Rajesh Kumar ◽  
D. Narasimhan ◽  
A. Srinivasan ◽  
...  

2021 ◽  
Vol 18 (4) ◽  
pp. 1287-1293
Author(s):  
M. P. Haripriya ◽  
P. Venkadesh

The 5G mobile wireless network systems faces a lot of security issues due to the opening of network and its insecurity. The insecure network prone to various attacks and it disrupts secure data communications between legitimate users. Many works have addressed the security problems in 3G and 4G networks in efficient way through authentication and cryptographic techniques. But, the security in 5G networks during data communication was not improved. Subtractive Gradient Boost Clustered Node Authentication (SGBCNA) Method is introduced to perform secure data communication. The subtractive gradient boost clustering technique is applied to authenticate the mobile node as normal nodes and malicious nodes based on the selected features. The designed ensemble clustering model combines the weak learners to make final strong clustering results with minimum loss. Finally, the malicious nodes are eliminated and normal mobile nodes are taken for performing the secured communication in 5G networks. Simulation is carried out on factors such as authentication accuracy, computation overhead and security level with respect to a number of mobile nodes and data packets. The observed outcomes clearly illustrate that the SGBCNA Method efficiently improves node authentication accuracy, security level with minimum overhead than the state-of-the-art-methods.


Sign in / Sign up

Export Citation Format

Share Document