scholarly journals Secure and Guarantee QoS in a Video Sequence: A New Approach Based on TLS Protocol to Secure Data and RTP to Ensure Real-Time Exchanges

2021 ◽  
Vol 11 (1) ◽  
pp. 59-68
Author(s):  
Hamza Touil ◽  
Nabil El Akkad ◽  
Khalid Satori

Much of the Internet's communication is encrypted, and its content is only accessible at two endpoints, a client and a server. However, any encryption requires a key that must be negotiated without being revealed to potential attackers. The so-called TLS (Transport Layer Security) handshake is often used for this task without obviating that many fundamental parameters of TLS connections are transmitted explicitly. Thus, third parties have access to metadata, including information about the endpoints, how the connection is used. On the other hand, QoS is considered the central part of the communication used to judge the deliverable quality through several parameters (latency, jitter ...). This document describes a secure approach and meets mainly the requirements of quality of service on a communication channel (free, loaded, congested ...), using the robustness and flexibility of the TLS protocol represented on the characteristics of existing encryption keys on its list of "ciphers suites." We focused more particularly on the AES key (Advanced Encryption Standard), including the different sizes (128,192,256), given its resistance to various classical attacks (differential, linear, ...) and its lightness compared to other protocols such as DES, 3DES ... This method is useful in continuous communications in a time axis (video sequence, VOIP call...).

2021 ◽  
Vol 20 ◽  
pp. 52-62
Author(s):  
Hamza Touil ◽  
Nabil El Akkad ◽  
Khalid Satori

The continued development of networks has significantly contributed to increasing the quantity of information available to replace old intelligence-gathering methods faster and more efficiently. For this, it is necessary to implement services that meet the consumers' requirements and measure precisely the factors that can generate obstacles to any communication, among these causes we can cite strong security and high quality of services. In this work, we implement a secure approach useful in continuous communications in a time axis (video sequence, VOIP call...), the process consists in establishing a well-secured connection between two interlocutors (the server that broadcasts the video sequence and a client) using an AES encryption key of size 256. A step of jitter check (latency variation) periodically is essential for the customer in order to make a decision: If the jitter is within the standards (compared to the tolerable value), we continue to encrypt with the AES256 key, if no, both ends must go through an automatic and uninterrupted fast renegotiation of the video to switch to a small AES key (192,128) to reduce the bandwidth on the channel, this operation must be repeated in an alternative way until the end of the communication.


2021 ◽  
Vol 11 (1) ◽  
pp. 6-11
Author(s):  
Achmad Sudrajat ◽  
Yoyok Heru Prasetyo ◽  
Mila Kusumawardani

Robot humanoid adalah robot yang memiliki bentuk seperti manusia yaitu memiliki tubuh dan kepala, dua tangan dan dua kaki yang memungkinkan dapat bergerak dan berinteraksi dengan lingkungan yang dibuat oleh manusia [1]. Pada sistem robot sepak bola humanoid yang digunakan saat ini masih menggunakan sistem Robot Operating System (ROS) saja, yang pada dasarnya di dalam sistem tersebut tanpa ada enkripsi atau pengaman data setiap kali komunikasi dilakukan dengan pengiriman dan permintaan atau yang biasa disebut Publish dan Subscribe. Dalam rangka pengembangan robot sepak bola humanoid, penelitian ini dirancang untuk “Implementasi Enkripsi Advanced Encryption Standard (AES-128) Mode Cipher Block Chaining (CBC) Sebagai Keamanan Komunikasi Pergerakan Robot Humanoid KRSBI”. Yang didesain untuk beroperasi pada konektivitas dengan kualitas yang rendah, dengan network bandwidth yang mengamankan setiap node yang berjalan di dalam ROS yang didalamnya terdapat fitur untuk subscribe topik dan juga publish topik. Kemudian dengan tambahan kriptografi dapat menjaga agar data atau pesan tetap aman saat dikirimkan, dari pengirim ke penerima tanpa mengalami gangguan dari pihak ketiga. Menurut Bruce Scheiner dalam bukunya "Applied Cryptography", kriptografi adalah ilmu pengetahuan dan seni menjaga message- message agar tetap aman (secure). [2] Maka semua komunikasi dienkripsi dengan menggunakan Secure Sockets Layer (SSL), atau lebih spesifiknya Transport Layer Security (TLS).


Electronics ◽  
2021 ◽  
Vol 10 (24) ◽  
pp. 3180
Author(s):  
Joonseo Ha ◽  
Heejun Roh

In parallel with the rapid adoption of transport layer security (TLS), malware has utilized the encrypted communication channel provided by TLS to hinder detection from network traffic. To this end, recent research efforts are directed toward malware detection and malware family classification for TLS-encrypted traffic. However, amongst their feature sets, the proposals to utilize the sequential information of each TLS session has not been properly evaluated, especially in the context of malware family classification. In this context, we propose a systematic framework to evaluate the state-of-the-art malware family classification methods for TLS-encrypted traffic in a controlled environment and discuss the advantages and limitations of the methods comprehensively. In particular, our experimental results for the 10 representations and classifier combinations show that the graph-based representation for the sequential information achieves better performance regardless of the evaluated classification algorithms. With our framework and findings, researchers can design better machine learning based classifiers.


2021 ◽  
Vol 30 (7) ◽  
pp. 416-421
Author(s):  
Phillip Correia Copley ◽  
John Emelifeonwu ◽  
Pasquale Gallo ◽  
Drahoslav Sokol ◽  
Jothy Kandasamy ◽  
...  

This article reports on the journey of a child with an inoperable hypothalamic-origin pilocytic astrocytoma causing hydrocephalus, which was refractory to treatment with shunts, and required a new approach. With multidisciplinary support, excellent nursing care and parental education, the child's hydrocephalus was managed long term in the community with bilateral long-tunnelled external ventricular drains (LTEVDs). This article describes the patient's journey and highlights the treatment protocols that were created to achieve this feat. Despite the difficulties in initially setting up these protocols, they proved successful and thus the team managing the patient proposed that LTEVDs are a viable treatment option for children with hydrocephalus in the context of inoperable tumours to help maximise quality of life.


Molecules ◽  
2021 ◽  
Vol 26 (13) ◽  
pp. 3832
Author(s):  
Rubén Agregán ◽  
Noemí Echegaray ◽  
María López-Pedrouso ◽  
Radwan Kharabsheh ◽  
Daniel Franco ◽  
...  

Proteomics is a new area of study that in recent decades has provided great advances in the field of medicine. However, its enormous potential for the study of proteomes makes it also applicable to other areas of science. Milk is a highly heterogeneous and complex fluid, where there are numerous genetic variants and isoforms with post-translational modifications (PTMs). Due to the vast number of proteins and peptides existing in its matrix, proteomics is presented as a powerful tool for the characterization of milk samples and their products. The technology developed to date for the separation and characterization of the milk proteome, such as two-dimensional gel electrophoresis (2DE) technology and especially mass spectrometry (MS) have allowed an exhaustive characterization of the proteins and peptides present in milk and dairy products with enormous applications in the industry for the control of fundamental parameters, such as microbiological safety, the guarantee of authenticity, or the control of the transformations carried out, aimed to increase the quality of the final product.


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Mustafa B. Al-Deen ◽  
Mazin Ali A. Ali ◽  
Zeyad A. Saleh

Abstract This paper presents a new approach to discover the effect of depth water for underwater visible light communications (UVLC). The quality of the optical link was investigated with varying water depth under coastal water types. The performance of the UVLC with multiple input–multiple output (MIMO) techniques was examined in terms of bit error rate (BER) and data rate. The theoretical result explains that there is a good performance for UVLC system under coastal water.


2020 ◽  
pp. 1-16
Author(s):  
Meriem Khelifa ◽  
Dalila Boughaci ◽  
Esma Aïmeur

The Traveling Tournament Problem (TTP) is concerned with finding a double round-robin tournament schedule that minimizes the total distances traveled by the teams. It has attracted significant interest recently since a favorable TTP schedule can result in significant savings for the league. This paper proposes an original evolutionary algorithm for TTP. We first propose a quick and effective constructive algorithm to construct a Double Round Robin Tournament (DRRT) schedule with low travel cost. We then describe an enhanced genetic algorithm with a new crossover operator to improve the travel cost of the generated schedules. A new heuristic for ordering efficiently the scheduled rounds is also proposed. The latter leads to significant enhancement in the quality of the schedules. The overall method is evaluated on publicly available standard benchmarks and compared with other techniques for TTP and UTTP (Unconstrained Traveling Tournament Problem). The computational experiment shows that the proposed approach could build very good solutions comparable to other state-of-the-art approaches or better than the current best solutions on UTTP. Further, our method provides new valuable solutions to some unsolved UTTP instances and outperforms prior methods for all US National League (NL) instances.


Sign in / Sign up

Export Citation Format

Share Document