Open and Secure Communication - EDI is not enough

Author(s):  
Thomas Abdallah ◽  
Ralph Holbein ◽  
Patrick Scheidegger ◽  
Dr. Stephanie Teufel

From the 1994 CAIS Conference:The Information Industry in TransitionMcGill University, Montreal, Quebec. May 25 - 27, 1994.Information is becoming an important production factor. Businesses are being forced to communicate and exchange information with each other because of market pressures such as increased competition, the internationalization of markets, and specialization of production processes. To survive, businesses must streamline both in-house and external communications while at the same time ensuring the quality, timeliness, and availability of information. Information Technology (IT), in the form of open office communication systems, provides a means for supporting this exchange of information. These systems provide a means for hardware- and software-independent communications within the organization as well as communication between organizations. Organizations depend on both the availability of information and the use of IT system. Together called as the electronic information interchange. Since information is primarily represented in the form of documents, open office communication relies on the use of document standards. This paper examines document standards focusing on the difference between loosely and highly structured information exchange and also the role of security which is an important issue for organizations depending on open eletronic information exchange.

Electronics ◽  
2018 ◽  
Vol 7 (7) ◽  
pp. 113 ◽  
Author(s):  
Marco Migliore ◽  
Daniele Pinchera ◽  
Mario Lucido ◽  
Fulvio Schettino ◽  
Gaetano Panariello

Recently there has been an increasing interest toward unconditionally secure communication systems in which the mechanism assuring the secrecy of the message is physical and not computational. An interesting approach proposed in the information theory literature for unconditionally secure communication is based on the use of artificial noise at a rate related to the difference between the mutual information in perfect secrecy. Since the mechanism assuring the secrecy of the message is physical and not computational, the unauthorized receiver cannot obtain information from the received signal, regardless of how much computational power is available. For this reason, such a cryptographic system is called unconditionally secure. The aim of this paper is to investigate an electromagnetic approach to the noise-based wireless communication systems stressing the important role of the electromagnetic propagation and antenna design. In particular, the concept of the number of degrees of freedom of the field is used to clarify the physical mechanism that allows for a decrease in the mutual information of the unauthorized channel compared to the eavesdropper channel. Numerical examples regarding both free-space propagation and rich scattering environments are shown, confirming the importance of the role of the electromagnetic propagation and antenna design.


2011 ◽  
Vol 145 ◽  
pp. 149-153
Author(s):  
Kuang Ya Lu ◽  
Wei Tai Hsu ◽  
Pi Cheng Tung ◽  
Chien Jung Tseng ◽  
Norden E. Huang ◽  
...  

nformation security has become a major issue in recent years, as new ways of information exchange arise due to the rapid development of computing, communication and internet technologies. We propose the image communication systems to secure the information by using a steganographic system and empirical mode decomposition method. The concealed message between the sender and receiver is important in the steganographic system. The encrypted message is further decomposed by using the empirical mode decomposition. The information is transmitted via the public channel and secure channel. At the receiver side the weak message can be retrieved back effectively. The retrieved message carries the same characteristics as the original message. Simulation results have confirmed that this combination model is highly robust against various signal processing operations and geometric attacks. The system increases the security of information data given a variety of constraints and conditions. Our methods have been proven effective for application in various fields which require secure communication, such as mobile telephone, internet and others. By means of this method, researchers can better understand the characteristics of the secure communication.


Author(s):  
Fawzan Galib Abdul Karim Bawahab ◽  
Elvan Yuniarti ◽  
Edi Kurniawan

Abstrak. Pada penelitian ini, telah dilakukan analisa karakterisasi pada teknologi Direct Sequence Spread Spectrum dan Frequency Hopping Spread Spectrum, sebagai salah satu teknik multiple-access pada sistem komunikasi. Karakterisasi dilakukan untuk mencari bagaimana cara meningkatkan keoptimalan kedua sistem tersebut, dalam mengatasi masalah interferensi dengan sistem dan channel yang sama. Dan juga untuk menentukan veriabel apa yang mempengaruhi keoptimalan kedua sistem tersebut. Karakterisasi dilakukan dengan menentukan variabel-variabel yang mempengaruhi keoptimalan keduanya. Hasil dari karakterisasi, diketahui variabel-variabel yang mempengaruhi kemampuan sistem DSSS yaitu nilai frekuensi spreading (). Sedangkan untuk sistem FHSS yaitu nilai frekuensi spreading ( dan ) dan selisih antara frekuensi hopping data dengan frekuensi hopping interferensi . Kata Kunci: BER, DSSS, FHSS, Interference, Spread spectrum. Abstract. In this study, characterization of Direct Sequence Spread Spectrum and Frequency Hopping Spread Spectrum technologies have been done, as one of the multiple-access techniques in communication systems. Characterization is done to find out how to improve the ability of the two systems, in solving interference problems with the same system and channel. And also to determine what veriabel affects the ability of the two systems. Characterization is done by determining the variables that affect the ability of both. The results of the characterization, known variables that affect the ability of the DSSS system are the spreading frequency value (). As for the FHSS system, the spreading frequency value ( and ) and the difference between frequency hopping data with frequency hopping interference .


2021 ◽  
pp. 1-13 ◽  
Author(s):  
Bhabendu Kumar Mohanta ◽  
Debasish Jena ◽  
Niva Mohapatra ◽  
Somula Ramasubbareddy ◽  
Bharat S. Rawal

Smart city has come a long way since the development of emerging technology like Information and communications technology (ICT), Internet of Things (IoT), Machine Learning (ML), Block chain and Artificial Intelligence. The Intelligent Transportation System (ITS) is an important application in a rapidly growing smart city. Prediction of the automotive accident severity plays a very crucial role in the smart transportation system. The main motive behind this research is to determine the specific features which could affect vehicle accident severity. In this paper, some of the classification models, specifically Logistic Regression, Artificial Neural network, Decision Tree, K-Nearest Neighbors, and Random Forest have been implemented for predicting the accident severity. All the models have been verified, and the experimental results prove that these classification models have attained considerable accuracy. The paper also explained a secure communication architecture model for secure information exchange among all the components associated with the ITS. Finally paper implemented web base Message alert system which will be used for alert the users through smart IoT devices.


2007 ◽  
Vol 22 (4) ◽  
pp. 315-347 ◽  
Author(s):  
JUAN YE ◽  
LORCAN COYLE ◽  
SIMON DOBSON ◽  
PADDY NIXON

AbstractPervasive computing is by its nature open and extensible, and must integrate the information from a diverse range of sources. This leads to a problem of information exchange, so sub-systems must agree on shared representations. Ontologies potentially provide a well-founded mechanism for the representation and exchange of such structured information. A number of ontologies have been developed specifically for use in pervasive computing, none of which appears to cover adequately the space of concerns applicable to application designers. We compare and contrast the most popular ontologies, evaluating them against the system challenges generally recognized within the pervasive computing community. We identify a number of deficiencies that must be addressed in order to apply the ontological techniques successfully to next-generation pervasive systems.


2021 ◽  
Author(s):  
Nisar Ahmad ◽  
Muhammad Usman Younus ◽  
Muhammad Rizwan Anjum ◽  
Gulshan Saleem ◽  
Zaheer Ahmed Gondal ◽  
...  

Abstract Digital data must be compressed and encrypted to maintain confidentiality and efficient bandwidth usage. These two parameters are essential for information processing in most communication systems. Image compression and encryption may result in reduced restoration quality and degraded performance. This study attempts to provide a compression and encryption scheme for digital data named as Secure-JPEG. This scheme is built on the JPEG compression format, the most widely used lossy compression scheme. It extends the standard JPEG compression algorithm to encrypt data during compression. Secure-JPEG scheme provides encryption along with the process of compression, and it could be altered easily to provide lossless compression. On the other hand, the lossless compression provides less compression ratio and is suitable only in specific scenarios. The paper address the problem of security lacks due to the use of a simple random number generator which can not be cryptographically secure. The improved security characteristics are provided through Generalized Bernoulli Shift Map, which has a chaotic system with demonstrated security. The algorithm's security is tested by several cryptographic tests and the chaotic system’s behavior is also analyzed.


Author(s):  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Specifying a security policy (SP) is a challenging task in the development of secure communication systems since it is the bedrock of any security strategy. Paradoxically, this specification is error prone and can lead to an inadequate SP regarding the security needs. Therefore, it seems necessary to define an environment allowing one to “trust” the implemented SP. A testing task aims verifying whether an implementation is conforming to its specification. Test is generally achieved by generating and executing test cases. Some automated testing tools can be used from which model checkers. In fact, given a system modeling and a test objective, the model checker can generate a counterexample from which test cases can be deduced. The main proposition of this chapter is then a formal environment for SP test cases generation based on a system modeling, a SP specification (test purpose), and the use of a model checker. Once generated, these test cases must be improved in order to quantify their effectiveness to detect SP flaws. This is made through the generation of mutants.


Sign in / Sign up

Export Citation Format

Share Document