Restoring the Order of Information Packets Based on Hash Sequence Analysis

2020 ◽  
Vol 24 (1) ◽  
pp. 175-188
Author(s):  
M. O. Tanygin

Purpose of research. Currently, various technologies and methods are used to control the integrity and authenticity of data transmitted through open communication channels. One of them is the technology for transmitting sequences of information packets connected to each other in chains using certain cryptographic algorithms. Similar approaches are used in the well-known blockchain technology and are focused on large volumes of transmitted and protected information and large sizes of additional service information fields. The purpose of this article is to study the characteristics of systems, transmission of small information packets in comparison with traditional size frames of TCP/IP stack, in which the broken packet sequence order is restored using the chain method, by analyzing hash sequences available in each of such packets.Methods. In this article, simulation modeling, system analysis method, method of systematization and ranking of the obtained results are used.Results. It is shown that increasing the size of the additional field with the hash of the previous message from 4 to 6 bits has a significant effect on reducing the probability of erroneous restore of the order of information packets. Further increasing the length of the hash field reduces the probability of error by only 2 to 5 % for each additional bit of the hash field for any length of the chain being restored. It is shown that the coefficient of the usage of the communication channel (the ratio of useful chain of packets to the volume of information transmitted through the communication channel) is maximum when the length of the hash field is 6 in the whole range of sizes of the field information part of the data packet.Conclusion. The paper shows that the chain method is applicable for restoring the original sequence of information packets transmitted from the source to the receiver in systems where the preservation of the sequence of packets is not guaranteed. The obtained values of the transmission system parameters allow us to ensure acceptable reliability of data transmission with a minimum amount of additional service information, and achieve information redundancy less than that in similar ones by 10-15.

Author(s):  
N. V. Bezverkhniy ◽  
M. V. Nikitina

The article solves a problem of developing a scheme to provide a secret key exchange over an open communication channel. The basic idea of creating such a scheme is well known. It is based on a concept of the one-way function. This refers to the functions whose values are calculated much easier than the inverse function values. When developing the one-way functions a recognition algorithm of words equality in groups with conditions of small cancellation C (3) - T (6) is used. In this case, the group is represented by a set of its generating and determining relations. All the work to accomplish development of algorithms and evaluate their complexity is carried out using the group diagrams of equality. The existence of such diagrams is proved in the well-known van Campen lemma. The paper result is that the proposed scheme for the exchange of secret keys has the following properties. Direct algorithms have a linear complexity, and a complexity of the inverse algorithms is exponential. It should be noted that the algorithms complexity was estimated by the areas of the corresponding group diagrams, which are determined by the number of areas they include. The constructed secret key represents some element of a pre-selected group with conditions C (3) – T (6). It can be represented in an infinite number of ways by words in the alphabet from the generators of the group. Thus, the remaining obstacle to the practical application of the key exchange scheme developed is the ambiguity of the secret key record. Finding a common representative as the lexicographically shortest word in the class of equal words turns out to be too difficult. Thus, this question remains open. Although the task of exchanging secret keys itself can be formally considered as solved.


Author(s):  
Rohit M. Thanki ◽  
Surekha Borra ◽  
Komal R. Borisagar

Today, an individual's health is being monitored for diagnosis and treatment of diseases upon analyzing various medical data such as images and signals. Modifications of this medical data when it is transferred over an open communication channel or network leads to deviations in diagnosis and creates a serious health issue for any individual. Digital watermarking techniques are one of the solutions for providing protection to multimedia contents. This chapter gives requirements and various techniques for the security of medical data using watermarking. This chapter also demonstrates a novel hybrid watermarking technique based on fast discrete curvelet transform (FDCuT), redundant discrete wavelet transform (RDWT), and discrete cosine transform (DCT). This watermarking technique can be used for securing medical various types of medical images and ECG signals over an open communication channel.


Author(s):  
Yu Lei ◽  
Duan Yucong

Data, information, knowledge, and wisdom forms a progressive relationship. Information is formed by data collation. Knowledge is filtered, refined, and processed from relevant information. Wisdom is based on knowledge and is accumulated through experience. This paper uses the progressive relationship of service data, information, knowledge, and wisdom to explain the expression of service knowledge graph. It is an increasingly challenging demand to discover trusted Cloud service providers with service data, information, and knowledge. We propose an efficient method of trusted service provider discovery based on service knowledge graphs, called PDG (Provider Discovery based on Graphs), to ensure that each service instance of composite services in Cloud systems is trustworthy. PDG evaluates the outputs of service providers in service classes with the help of additional service information. According to the additional service information, service knowledge is generated and trusted service providers can be found easily. PDG improves the accuracy of processing results by automatically replacing data provided by untrusted service providers with results provided by trusted service providers.


Author(s):  
Rohit M. Thanki ◽  
Surekha Borra ◽  
Komal R. Borisagar

Today, an individual's health is being monitored for diagnosis and treatment of diseases upon analyzing various medical data such as images and signals. Modifications of this medical data when it is transferred over an open communication channel or network leads to deviations in diagnosis and creates a serious health issue for any individual. Digital watermarking techniques are one of the solutions for providing protection to multimedia contents. This chapter gives requirements and various techniques for the security of medical data using watermarking. This chapter also demonstrates a novel hybrid watermarking technique based on fast discrete curvelet transform (FDCuT), redundant discrete wavelet transform (RDWT), and discrete cosine transform (DCT). This watermarking technique can be used for securing medical various types of medical images and ECG signals over an open communication channel.


2022 ◽  
Author(s):  
Maninderpal Singh ◽  
Gagangeet Singh Aujla ◽  
Rasmeet Singh Bali

AbstractInternet of Drones (IoD) facilitates the autonomous operations of drones into every application (warfare, surveillance, photography, etc) across the world. The transmission of data (to and fro) related to these applications occur between the drones and the other infrastructure over wireless channels that must abide to the stringent latency restrictions. However, relaying this data to the core cloud infrastructure may lead to a higher round trip delay. Thus, we utilize the cloud close to the ground, i.e., edge computing to realize an edge-envisioned IoD ecosystem. However, as this data is relayed over an open communication channel, it is often prone to different types of attacks due to it wider attack surface. Thus, we need to find a robust solution that can maintain the confidentiality, integrity, and authenticity of the data while providing desired services. Blockchain technology is capable to handle these challenges owing to the distributed ledger that store the data immutably. However, the conventional block architecture pose several challenges because of limited computational capabilities of drones. As the size of blockchain increases, the data flow also increases and so does the associated challenges. Hence, to overcome these challenges, in this work, we have proposed a derived blockchain architecture that decouples the data part (or block ledger) from the block header and shifts it to off-chain storage. In our approach, the registration of a new drone is performed to enable legitimate access control thus ensuring identity management and traceability. Further, the interactions happen in the form of transactions of the blockchain. We propose a lightweight consensus mechanism based on the stochastic selection followed by a transaction signing process to ensure that each drone is in control of its block. The proposed scheme also handles the expanding storage requirements with the help of data compression using a shrinking block mechanism. Lastly, the problem of additional delay anticipated due to drone mobility is handled using a multi-level caching mechanism. The proposed work has been validated in a simulated Gazebo environment and the results are promising in terms of different metrics. We have also provided numerical validations in context of complexity, communication overheads and computation costs.


2021 ◽  
Vol 1 (1) ◽  
pp. 68
Author(s):  
Fitriyani Hidayah ◽  
Rumadi Hartawan ◽  
Zulhalim Zulhalim ◽  
Asih Septia Rini

Perkembangan dunia internet sekarang ini sangat pesat telah menuntut banyak orang untuk memanfaatkan dunia maya dalam setiap kegiatan di dunia nyata, situs website dan internet merupakan media penyampaian informasi atau sebagai media pelayanan yang efektif dan efisien, dengan jaringan internet kita dapat menjelajah tanpa batas ruang waktu menggunakan jaringan internet. Sistem Informasi Komputerisasi berperan penting dalam segala bidang, misalnya dalam informasi pelayanan suatu lembaga, sistem komputerisasi ini bertujuan untuk mengelola data secara mudah, cepat, dan akurat. Selain itu harus didukung pula oleh sumber daya yang bermutu, yang dapat mengelola data dengan baik. Namun kenyataannya masih banyak lembaga kursus yang masih menggunakan sistem manual, seperti yang penulis temukan pada saat riset di Lembaga Kursus Mengemudi Ar’rahman Jakarta dalam mengelola data pendaftaran peserta kursus baru. Sehingga menjadi kurang efektif dan menumpuknya kertas-kertas dokumen peserta, serta lambatnya proses pembuatan laporan. Namun apabila proses tersebut diperbaharui menjadi suatu sistem yang terkomputerisasi maka akan menjadi jauh lebih baik. Untuk itulah penulis mencoba membuat perancangan mengenai Perancangan Sistem Informasi Peserta Kursus Mengemudi Ar’Rahman Jakarta. Untuk mencapai tujuan tersebut, penulis melakukan analisa sistem lebih mendalam dengan cara obsevasi dan wawancara secara mendetail kepada staff untuk selanjutnya penulis kelola dan paparkan. Dengan memanfaatkan perkembangan teknologi berbasis website ini diharapkan dapat membantu dan meningkatkan pelayanan yang lebih efektif, melakukan penyimpanan dokumen melalui database sistem agar tidak penumpukan arsip yang menyebabkan rusak atau hilang. Perancangan sistem informasi ini merupakan solusi terbaik untuk memecahkan permasalahan yang ada, serta dengan sistem yang terkomputerisasi dapat tercapai suatu kegiatan yang efektif dan efisien serta dapat lebih kondusif dibandingkan dengan sistem yang terdahulu. The development of the internet today is very fast, it has demanded many people to take advantage of the virtual world in every activity in the real world, websites and the internet are media for delivering information or as an effective and efficient service medium, with the internet network we can browse indefinitely using space and time. Internet Network. Computerized Information Systems play an important role in all fields, for example in the service information of an institution, this computerized system aims to manage data easily, quickly, and accurately. In addition, it must also be supported by quality resources who can manage data well. However, in reality there are still many course institutions that still use the manual system, as the author found during research at the Ar'rahman Driving Course Institute Jakarta in managing registration data for new course participants. So that it becomes ineffective, efficient and the accumulation of participant documents and the slow process of making reports. However, if the process is updated into a computerized system it will be much better. For this reason, the author tries to make a design regarding the Design of Information Systems for Participants in the Ar'Rahman Jakarta Driving Course. To achieve this goal, the authors conducted a more in-depth system analysis by means of observation and detailed interviews with staff for further management and explanation. By utilizing the development of website-based technology, it is hoped that it can help and improve services that are more effective, storing documents through the system database so that there is no accumulation of archives that cause damage or loss. The design of this information system is the best solution to solve existing problems, and with a computerized system, an activity that is effective and efficient can be achieved and can be more conducive than the previous system.


Author(s):  
Priyanka Bhardwaj ◽  
Aadi Jain ◽  
Manveen . ◽  
Richita Kamal ◽  
Rishab Chittlangia

Noise in the communication channel is well established to be a threat to digital bit transmission, resulting in many mistakes at the bit level. Different modulation methods are studied in terms of BER, probability of error and SNR to better comprehend this. In the presence of specific levels of noise in the communication channel, this analysis yields an interesting conclusion that advises the employment of particular modulation methods. A comprehensive analysis of several modulation schemes has been considered. Those include On-Off Key modulation (OOK), Binary Phase Shift Key (BPSK), Quadrature Phase Shift Key (QPSK), Pulse Amplitude Modulation (PAM) and 8-Phase Shift Key (8-PSK). This analysis can aid in the selection of a modulation approach based on the channel condition.


2021 ◽  
pp. 864-868
Author(s):  
D.A. Gura ◽  
E.S. Shulga ◽  
N.M. Kiryunikova ◽  
K.B. Baranova

At the moment, one of the country’s most valuable resources is real estate. Real estate has a special economic and social status, and the legislators of some countries impose special requirements for the real estate registration. On the basis of the documents on the completed transaction, the transfer of ownership is carried out by making changes to the real estate register. The article describes in detail the procedures for the state registration or rights as well as Blockchain technology based on the cadastral accounting procedure for real estate objects. English version of the article on is available at URL: https://panor.ru/articles/system-analysis-of-the-real-estate-accounting-procedure-using-blockchain-technology/73672.html


2021 ◽  
pp. 54-62
Author(s):  
Chernykh A. M. ◽  

. Improving the electronic document management system of the judicial system requires the use of new information technologies. Conducting trials with guaranteed protection of documentary data of all participants in the trial from changes or loss will reduce the corruption component, increase mutual confidence of the parties involved in the litigation in documents. An system analysis was made of the possibility of using a distributed registry of databases and building on its basis a secure document exchange network using blockchain technology. The work defines the directions of interaction of information resources of federal state systems and the information system of justice on the blockchain platform in the interests of solving the problems of ensuring the openness of user services of the judicial system and the security of legal data of participants in the trial. A conceptual-logical model of interaction of information resources of the parties with increased requirements for mutual trust based on blockchain technology for maintaining a distributed data register and the ability to process multidimensional data (numerical, text, graphic, coordinate, etc.) with a high degree of information security for a long time.


Sign in / Sign up

Export Citation Format

Share Document