scholarly journals Resource Optimized Security Coding In Light Weight Security Protocol

The overhead for resource utilization in the round coding operation of security coding is large. Though lightweight protocols are used as a measure of provisioning, higher level of security in many real time applications, the need of key scheduling, key generation and s-box operation leads to large resource utilization. This resource consumption intern leads to large power consumption and area overhead. To minimize the resource utilization in this paper, a new resource optimization technique following resource reutilization scheme is proposed. The resource utilization is synchronized by the delay term instruction application in cryptography coding.

Sensors ◽  
2020 ◽  
Vol 20 (19) ◽  
pp. 5719
Author(s):  
Shimaa A. Abdel Hakeem ◽  
Mohamed A. Abd El-Gawad ◽  
HyungWon Kim

Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.


2014 ◽  
Vol 23 (04) ◽  
pp. 1450050
Author(s):  
ZOHRE MOHAMMADI-ARFA ◽  
ALI JAHANIAN

Clock distribution has been a major limitation on delay, power and routing resources in ultra-large nanoscale circuits. Some emerging technologies are proposed to use RF instruments for on-chip clock routing in large chips but they suffer from large power and area overheads. In this paper, a hybrid radio frequency (RF) and metal clock networking architecture corresponding with an efficient RF and metal clock routing is presented which combines the benefits of RF/wireless interconnect and metal/wired connections to reach a reasonable trade-off between RF and metal interconnect technologies. Our experiments show that clock network delay and clock tree congestion is improved by 61% and 40% on average. Moreover, sensitivity of attempted benchmarks to process variation of interconnects is reduced considerably. These improvements are gained at a cost of less than 2% of area overhead and less than 10% power consumption overhead for large circuits. It is shown that overheads are very small for large circuits such that this technology will be completely feasible and reasonable for too large and complex circuits.


Author(s):  
Kuppusamy Krishnamoorthy ◽  
Mahalakshmi Jeyabalu

Security of images in transmission medium is most prime issue found in literature. Encryption of images is a way to secure it from unauthorized access. The authors in this chapter insist on the encryption of images via block ciphers. Block ciphers works simultaneously as well as on chunks. In this chapter, an encryption method using improved cipher block chaining is proposed to encrypt RGB color images. For every encryption methodology, key generation process is the most important phase. The authors proposed sub-optimal key generation algorithm and this nature inspired optimization technique reveals complex keys, remains very useful for decision making in dynamic environment. Key generation is crafted as complex with this mathematical model that overcomes the predicament key problem exists in existing methods and upgrades quality of encryption. Results of the proposed algorithm show the efficiency and its resistance against various cryptanalytic attacks.


2020 ◽  
Vol 10 (7) ◽  
pp. 2592
Author(s):  
Zhixiong Chen ◽  
Nan Xiao ◽  
Dongsheng Han

Unmanned aerial vehicle (UAV)-assisted relay mobile edge computing (MEC) network is a prominent concept, where network deployment is flexible and network coverage is wide. In scenarios such as emergency communications and low-cost coverage, optimization of offloading methods and resource utilization are important ways to improve system effectiveness due to limited terminal and UAV energy and hardware equipment. A multilevel edge computing network resource optimization model on the basis of UAV fusion that provides relay forwarding and offload services is established by considering the initial energy state of the UAV, the green energy charging function, and the reliability of computing offload. With normalized system utility function maximization as the goal, a Markov decision process algorithm meets the needs of the practical application scene and provides a flexible and effective unloading mode. This algorithm is adopted to solve the optimal offloading mode and the optimal resource utilization scheme. Simulations verify the effectiveness and reliability of the proposed multilevel offloading model. The proposed model can optimize system resource allocation and effectively improve the utility function and user experience of computing offloading systems.


2015 ◽  
Vol 22 (4) ◽  
pp. 1343-1353 ◽  
Author(s):  
Kolla Raja Sekhar ◽  
T. S. Ravi Chandra ◽  
Salecha Pooja ◽  
S. Tapaswi

Sign in / Sign up

Export Citation Format

Share Document