scholarly journals User Selective Encryption Method for Securing MANETs

Author(s):  
Amal Ahmad ◽  
Shereen Ismail

<span>Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As the MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigate the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.</span>

2020 ◽  
Vol 15 (7) ◽  
pp. 39-48
Author(s):  
I. E. Mikheeva

The paper is devoted to the analysis of the legal regulation and practice of issuing digital banking guarantees using blockchain technology in Russia and the Republic of Belarus. The author concludes that the blockchain technology allows us to reduce the time necessary to issue digital bank guarantees in comparison with other ways of issuing bank guarantees. Higher security level can be provided due to the special properties of the technology used to carry out data transfer, its reporting and storage. The paper also deals with the characteristics of blockchain technology that improve protection of participants from unscrupulous actions that can take place during such actions as data encryption, the use of encryption keys and recording in the block chain. The paper examines the experience of the National Bank of the Republic of Belarus regarding the use of blockchain technology to issue and record bank guarantees. The author investigates cases when Russian banks issued bank guarantees using the Masterchain platform and prospects of development of a digital form for guarantees. In addition, the paper concludes that maintaining a ledger working on the basis of blockchain technology for accounting digital bank guarantees will minimize unfair behavior in case of their counterfeiting.


2014 ◽  
Vol 11 (3) ◽  
pp. 905-924 ◽  
Author(s):  
Yi-Li Huang ◽  
Fang-Yie Leu ◽  
Jian-Hong Chen ◽  
Chu Cheng-Chung

In January 1999, distributed.net collaborated with the Electronic Frontier Foundation to break a DES (i.e., Data Encryption Standard) key, spending 22 hours and 15 minutes, and implying that the DES is no longer a secure encryption method. In this paper, we propose a more secure one, called the True Random Number Encryption Method (TRNEM for short), which employs current time, true random numbers and system security codes as parameters of the encryption process to increase the security level of a system. The same plaintext file encrypted by the TRNEM at different time points generates different ciphertext files. So these files are difficult to be cracked. We also analyze the security of the DES, AES (i.e., Advanced Encryption Standard) and TRNEM, and explain why the TRNEM can effectively defend some specific attacks, and why it is safer than the DES and AES.


2011 ◽  
Vol 7 (3) ◽  
pp. 241-269 ◽  
Author(s):  
Yi-Fu Ciou ◽  
Fang-Yie Leu ◽  
Yi-Li Huang ◽  
Kangbin Yim

In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme (HaKMA for short), which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method (DiHam for short) improving its key generation flow and adding a handover authentication scheme to respectively speed up the handover process and increase the security level for mobile stations (MSs). AAA server supported authentication is also enhanced by invoking an improved extensible authentication protocol (EAP). According to the analyses of this study the HaKMA can effectively and efficiently provide user authentication and balance data security and system performance during handover.


In recent era security is very much desired for the messages transmitted through the network. The study shows that, even though many approaches have been proposed towards security till date, still the security loopholes also emerging, so constant advancement is crucial for data security. Since all nodes in the network work together as a team to transmit the data, the network may prone to active or passive attacks such as Eavesdropping, Jamming, traffic analysis, Denial of Service, monitoring etc. The research paper introduces a new selective encryption method termed as Selective Significant Data Encryption (SSDE). The SSDE presents adequate protection to the data encryption process by picking up only the significant content from the complete message by referring Natural Language Processing (NLP). As a result, the encryption time overhead will get reduced, and overall performance will improve. Symmetric key algorithms are generally proficient and quick cryptosystem compared to other techniques, so Blowfish system is used for encryption/decryption process. The proposed research work is compared with many conventional methods and found that this approach is more superior to other traditional means.


Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6137
Author(s):  
Hayotjon Aliev ◽  
HyungWon Kim ◽  
Sunghyun Choi

Safety applications based on vehicle-to-everything (V2X) communications can significantly enhance road safety and reduce traffic fatalities. Ensuring the security and privacy of the vehicular network is essential for the widespread adoption of V2X communications for commercial use. V2X safety and service applications require periodic broadcast communications among all the vehicles. However, compared to unicast communication, it is extremely challenging to provide broadcast communication with network security requirements such as confidentiality, in infotainment contents distribution, sensor data sharing, and security credentials management services. To address the providing confidentiality of vehicle-to-vehicle (V2V) broadcasting, we propose a group key management and message encryption method that is secure, lightweight, and scalable. The proposed group key management method can efficiently handle various scenarios like a node joining or leaving the group, with scalable rekeying algorithms. It employs a distributed and scalable architecture that offers several advantages such as the reduction of the key management overhead and the enhancement of the security level by keeping the key sizes with large networks. In addition, the proposed method employs a lightweight matrix-based encryption algorithm that can be easily applicable with the proposed group key management method. Further, we have implemented the proposed method and evaluated the performance using a V2V network simulator with several networks of highly dynamic group members. The simulation results show that the proposed method can reduce computation time for group key generation and message encryption by more than 80% compared to existing methods.


2021 ◽  
Author(s):  
Jian Qu ◽  
Xin Zhang ◽  
Zhong-Jie Wang ◽  
Shuyan Zhang ◽  
Yejian Yu ◽  
...  

Time-dependent evolutive afterglow materials can increase the security level by providing additional encryption modes in anti-counterfeiting and data encryption. The design of carbon-based materials with dynamic afterglow colors is attractive...


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 4
Author(s):  
Bayan Alabdullah ◽  
Natalia Beloff ◽  
Martin White

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


Sign in / Sign up

Export Citation Format

Share Document