scholarly journals An advance encryption standard cryptosystem in IoT transaction

Author(s):  
Zolidah Kasiran ◽  
Shapina Abdullah ◽  
Normazlie Mohd Nor

IoT create an ecosystem that can be useful to the world with its various services. That make the security of IoT is more important. This paper presents a proposed technique to secure data transaction from IoT device to other node using cryptography technique. AES cryptography and IoT device model ESP8266 is used as a client to send data to a server via HTTP protocol. Security performance matrices used eavesdropping attack with Wireshark sniffing and brute-force attack. will be simulated to the proposed method in order to ensure if there is any possibility it can be cracked using those attacks and to evaluate the performance of ESP8266, several experiments were be conducted. Result gather from this experiment was evaluated based on processing time to see the effectiveness of the platform compare to different data size used while adapting this technique.

2016 ◽  
Vol 42 (1) ◽  
pp. 28-58
Author(s):  
Marina Ansaldo

The study of the representation of the interrelated notions of Fortune andOccasioin Shakespeare’sTroilus and Cressidahas been largely neglected by critics. This is particularly surprising because this play, where all that takes place is nothing “but the chance of war,” and characters’ efforts and expectations are often contradicted by the turns of events, seems to invite us to meditate upon what determines a successful outcome. This article shows that considering the concepts of Fortune and Occasion, and the imagery traditionally associated with them, can provide original critical perspectives on this play. The manner in which the characters refer to Fortune/Occasioreveals the extent to which each of them is willing and capable of exercising agency. Sheer opportunism and brute force are what is required to win in the world of the play, where valor, honor and chivalry have become obsolete vestiges of a lost mythical past.


2021 ◽  
Vol 297 ◽  
pp. 01046
Author(s):  
Zhour Oumazouz ◽  
Driss Karim

The main objective of the study conducted in this article is to introduce a new algorithm of encryption and decryption of a sensitive message after transforming it into a binary message. Our proposed encryption algorithm is based on the study of a particular graph constructed algebraically from the quadratic residues. We have exploited the Paley graph to introduce an abstract way of encryption of such message bit according to the other message bits by the intermidiate study of the neighborhood of a graph vertex. The strong regularity of the Paley graphs and the unknown behavior of the quadratic residues will play a very important role in the cryptanalysis part which allows to say that the brute force attack remains for the moment the only way to obtain the set of possible messages.


2019 ◽  
Vol 2019 ◽  
pp. 1-13 ◽  
Author(s):  
Deris Stiawan ◽  
Mohd. Yazid Idris ◽  
Reza Firsandaya Malik ◽  
Siti Nurmaini ◽  
Nizar Alsharif ◽  
...  

Internet of Things (IoT) devices may transfer data to the gateway/application server through File Transfer Protocol (FTP) transaction. Unfortunately, in terms of security, the FTP server at a gateway or data sink very often is improperly set up. At the same time, password matching/theft holding is among the popular attacks as the intruders attack the IoT network. Thus, this paper attempts to provide an insight of this type of attack with the main aim of coming up with attack patterns that may help the IoT system administrator to analyze any similar attacks. This paper investigates brute force attack (BFA) on the FTP server of the IoT network by using a time-sensitive statistical relationship approach and visualizing the attack patterns that identify its configurations. The investigation focuses on attacks launched from the internal network, due to the assumption that the IoT network has already installed a firewall. An insider/internal attack launched from an internal network endangers more the entire IoT security system. The experiments use the IoT network testbed that mimic the internal attack scenario with three major goals: (i) to provide a topological description on how an insider attack occurs; (ii) to achieve attack pattern extraction from raw sniffed data; and (iii) to establish attack pattern identification as a parameter to visualize real-time attacks. Experimental results validate the investigation.


2015 ◽  
Vol 13 (1) ◽  
Author(s):  
Zhenghong Guo ◽  
Jie Yang ◽  
Yang Zhao

AbstractIn this paper, we introduce a new image encryption scheme based on fractional chaotic time series, in which shuffling the positions blocks of plain-image and changing the grey values of image pixels are combined to confuse the relationship between the plain-image and the cipher-image. Also, the experimental results demonstrate that the key space is large enough to resist the brute-force attack and the distribution of grey values of the encrypted image has a random-like behavior.


2010 ◽  
Vol 171-172 ◽  
pp. 299-304 ◽  
Author(s):  
Zhuo Hui Xian ◽  
Shi Liang Sun

Due to some features of images, traditional encryption algorithms are not suitable for practical image encryption. Considering this problem, a novel feistel network image encryption algorithm is proposed in this paper. Taking advantage of the desirable properties of mixing and sensitivity to initial parameters of chaotic maps, a sub key generator with couple chaotic maps is presented in this scheme. Meanwhile, the encryption algorithm includes a new mixing algorithm which is designed with thirty s-boxes of AES. To enhance the security of the new scheme, the encryption processes were combined in feistel network. The results of analysis and simulation experiments indicate that the scheme is secure and performed well in preventing attacks, such as brute force attack, entropy attack and statistics attack.


2016 ◽  
Vol 9 (18) ◽  
pp. 6379-6385
Author(s):  
P Dharshini ◽  
J Arokia Renjith ◽  
P Mohan Kumar

Sign in / Sign up

Export Citation Format

Share Document