RSA encrypted FSK RF transmission powered by an innovative microwave technique for invulnerable security

Author(s):  
Prashnatita Pal ◽  
Bikash Chandra Sahana ◽  
Jayanta Poray

Ensuring the secure communication is the prime concern for all kinds of data communication infrastructure. Several data encryption techniques are in use for secure communication. There is a scope for further improvement in the security level, as well as for the received signal quality. The selection of a proper combination of encryption and modulation techniques can improve the overall effectiveness of both the security level and the received signal quality. The combination of asymmetric cryptography (here use RSA (Rivest–Shamir–Adleman) algorithm) algorithm with the proposed reflex klystron-based frequency shift keying (FSK) modulation technique provides a high level of secure communication system. The performance of the proposed technique is experimentally verified. The conventional FSK modulation technique operates in the low-frequency band, but the proposed FSK modulation technique is powered by high-power microwave devices, which operate in the X band. The experimental result has been demonstrated and successfully verified for secured communication using the X band.

2020 ◽  
Vol 18 (1) ◽  
pp. 55-63
Author(s):  
Antony Cynthia ◽  
V. Saravanan

Wireless sensor network (WSN) comprises the group of sensor nodes distributed to sense and monitor the environments and collects the data. Due to the distributed nature of the sensor nodes, security is a major role to access the confidential data and protect the unauthorized access. In order to improve the secure communication, authentication is essential process in WSN. A Tango Binary Search Tree based Schmidt Cryptographic Sensor Node Authentication (TBST-SCSNA) technique is introduced for secured data communication in WSN with higher authentication accuracy. Initially, the trust values for each sensor nodes are calculated for increasing the security in data communication. The sensor nodes in WSN are arranged in tango binary search tree based on the trust value. The nodes in tree are inserted or removed based on their deployment. After that, the Schmidt-Samoa cryptographic technique is applied for node authentication and secure data communication. The cryptographic technique comprises three processes key generation, encryption and decryption. In key generation phase, the public key (i. e., node_ID) are generated and distributed for the sensor nodes and private key is kept secret using Schmidt-Samoa algorithm. The root node is embedded with a key during the deployment and it is controlled the entire the sensor nodes in the path. A Parent node generates the keys for child node based on the ID of parent node. After the key generation, the sender node encrypts the data packet and transmits to receiver node in the tree with the receiver node ID. After that, the receiver node enters their private key and verifies it with already stored key at the time of key generation. If both keys are same, then the node is said to be authentic node. Otherwise, the sensor node is said to be a malicious node. The authentic node only receives the original data packets. This process gets repeated till all the nodes in the path verify their identities and performs the secure communication. Simulation is carried out with different parameters such as authentication accuracy, authentication time and security level with respect to a number of sensor nodes and a number of data packets. The results observed that the TBST-SCSNA technique efficiently improves the node authentication accuracy, security level with minimum time than the state-of-the-art-methods.


With an advent of IoT (Internet of Things), number of networked devices increases day by day and will reach its peak by the end of 2020. IoT plays an important role in smart automation, medical informatics, computer vision and even in wearable device engineering. Since IoT transfers the huge data from the machine to machines, achieving the compact size, low power and overcoming the security breaches remains the real challenge among the researchers. With the integration of Nanotechnology, IoT has reached its new dimension to meet the above constraints but still requires much more lime light of research. To meet the above criteria, the paper proposes the new algorithm HEENA (Hybrid Energy Efficient Nano Architecture) which uses the memristors based modelling for data encryption process. The proposed system overcomes the existing CMOS /Nano transistor-based modelling and has following contributions 1) Design of memristor based chaotic non -linear system 2) Generation of Initial conditions using ECG waveforms 3) Generation of High complex Cipher Keys using Diffusion process. The test bed has been developed using BCM2578 SoC and the proposed architecture has been evaluated on the above test bed in terms of sensitivity, and entropy Moreover, the energy consumption is calculated at various cases and results shows that the proposed architecture consumes the less power along with the secured data communication.


2020 ◽  
pp. 1-26
Author(s):  
Qinwen Hu ◽  
Muhammad Rizwan Asghar ◽  
Nevil Brownlee

HTTPS refers to an application-specific implementation that runs HyperText Transfer Protocol (HTTP) on top of Secure Socket Layer (SSL) or Transport Layer Security (TLS). HTTPS is used to provide encrypted communication and secure identification of web servers and clients, for different purposes such as online banking and e-commerce. However, many HTTPS vulnerabilities have been disclosed in recent years. Although many studies have pointed out that these vulnerabilities can lead to serious consequences, domain administrators seem to ignore them. In this study, we evaluate the HTTPS security level of Alexa’s top 1 million domains from two perspectives. First, we explore which popular sites are still affected by those well-known security issues. Our results show that less than 0.1% of HTTPS-enabled servers in the measured domains are still vulnerable to known attacks including Rivest Cipher 4 (RC4), Compression Ratio Info-Leak Mass Exploitation (CRIME), Padding Oracle On Downgraded Legacy Encryption (POODLE), Factoring RSA Export Keys (FREAK), Logjam, and Decrypting Rivest–Shamir–Adleman (RSA) using Obsolete and Weakened eNcryption (DROWN). Second, we assess the security level of the digital certificates used by each measured HTTPS domain. Our results highlight that less than 0.52% domains use the expired certificate, 0.42% HTTPS certificates contain different hostnames, and 2.59% HTTPS domains use a self-signed certificate. The domains we investigate in our study cover 5 regions (including ARIN, RIPE NCC, APNIC, LACNIC, and AFRINIC) and 61 different categories such as online shopping websites, banking websites, educational websites, and government websites. Although our results show that the problem still exists, we find that changes have been taking place when HTTPS vulnerabilities were discovered. Through this three-year study, we found that more attention has been paid to the use and configuration of HTTPS. For example, more and more domains begin to enable the HTTPS protocol to ensure a secure communication channel between users and websites. From the first measurement, we observed that many domains are still using TLS 1.0 and 1.1, SSL 2.0, and SSL 3.0 protocols to support user clients that use outdated systems. As the previous studies revealed security risks of using these protocols, in the subsequent studies, we found that the majority of domains updated their TLS protocol on time. Our 2020 results suggest that most HTTPS domains use the TLS 1.2 protocol and show that some HTTPS domains are still vulnerable to the existing known attacks. As academics and industry professionals continue to disclose attacks against HTTPS and recommend the secure configuration of HTTPS, we found that the number of vulnerable domain is gradually decreasing every year.


2021 ◽  
Author(s):  
Jian Qu ◽  
Xin Zhang ◽  
Zhong-Jie Wang ◽  
Shuyan Zhang ◽  
Yejian Yu ◽  
...  

Time-dependent evolutive afterglow materials can increase the security level by providing additional encryption modes in anti-counterfeiting and data encryption. The design of carbon-based materials with dynamic afterglow colors is attractive...


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 4
Author(s):  
Bayan Alabdullah ◽  
Natalia Beloff ◽  
Martin White

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.


2021 ◽  
Author(s):  
Ali Durdu ◽  
Yılmaz Uyaroğlu

Abstract Many studies have been introduced in the literature showing that two identical chaotic systems can be synchronized with different initial conditions. Secure data communication applications have also been made using synchronization methods. In the study, synchronization times of two popular synchronization methods are compared, which is an important issue for communication. Among the synchronization methods, active control, integer, and fractional-order Pecaro Carroll (P-C) method was used to synchronize the Burke-Shaw chaotic attractor. The experimental results showed that the P-C method with optimum fractional-order is synchronized in 2.35 times shorter time than the active control method. This shows that the P-C method using fractional-order creates less delay in synchronization and is more convenient to use in secure communication applications.


Author(s):  
Hamza Sajjad Ahmad ◽  
Muhammad Junaid Arshad ◽  
Muhammad Sohail Akram

To send data over the network, devices need to authenticate themselves within the network. After authentication, the device will be able to send the data in-network. After authentication, secure communication of devices is an important task that is done with an encryption method. IoT network devices have a very small circuit with low resources and low computation power. By considering low power, less memory, low computation, and all the aspect of IoT devices, an encryption technique is needed that is suitable for this type of device. As IoT networks are heterogeneous, each device has different hardware properties, and all the devices are not on one scale. To make IoT networks secure, this paper starts with the secure authentication mechanism to verify the device that wants to be a part of the network. After that, an encryption algorithm is presented that will make the communication secure. This encryption algorithm is designed by considering all the important aspects of IoT devices (low computation, low memory, and cost).


2017 ◽  
Vol 27 (04) ◽  
pp. 1850057 ◽  
Author(s):  
Uğur Erkin Kocamaz ◽  
Serdar Çiçek ◽  
Yılmaz Uyaroğlu

This work deals with the passive control-based chaos synchronization with circuit design for secure communication. First, the numerical simulation and electronic circuit design of a simple five-term chaotic system are performed. The numerical simulation and electronic circuit design outputs have confirmed each other. Then, the passive control method is applied for synchronizing two identical five-term chaotic systems using only one state control signal. After the synchronization study, design and analysis for secure communication by chaotic masking method are conducted in Matlab–Simulink platform. Finally, an electronic circuit design is performed for the designed communication system. In the designed communication system with Matlab–Simulink platform and electronic circuit design, information signal which is sent from the transmitter unit is successfully retrieved at the receiver unit. As a result, the electronic circuit design has shown that a single state passivity-based synchronization signal can be effectively used for secure data communication applications for the real environment.


Sign in / Sign up

Export Citation Format

Share Document