scholarly journals Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones

2021 ◽  
Vol 15 (23) ◽  
pp. 89-103
Author(s):  
Muneer Ahmad Dar ◽  
Aadil Askar ◽  
Daliya Alyahya ◽  
Sameer Ahmad Bhat

Open networks enable data communication between different types of mobile devices that showcase the need to enforce elevated security measures. Securing sensitive or confidential data in mobile phones is accomplished by implementing a diverse range of cryptographic techniques. While encryption algorithms, such as Rivest–Shamir–Adleman (RSA) may offer secure solutions that are often difficult to compromise, these in turn prerequisite high speed computational resources for effective operation. Elliptical curve cryptography (ECC) is well thought-out standard that offers a workable and feasible methods of encryption/decryption, whilst being applicable to resource constraint devices. This paper implements a novel key exchange mechanism that helps to secure exchange of data between the communicating mobile devices. The study aims to address the limitation of Elliptic Curve Deffie Hellman, which is susceptible to Man-in-the-Middle attack and proposes an enhanced Elliptic Curve Deffie Hellman (ECDH) technique for secure data communication in open networks. The study results reveal, how the implementation of ECDH allows exchange of keys between the two communicating devices with limited resources.

2021 ◽  
Vol 13 (6) ◽  
pp. 19-39
Author(s):  
Padmashree M G ◽  
Mallikarjun J P ◽  
Arunalatha J S ◽  
Venugopal K R

The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.


2009 ◽  
pp. 451-458
Author(s):  
Zakaria Maamar ◽  
Qusay H. Mahmoud

Mobile information systems (MISs) are having a major impact on businesses and individuals. No longer confined to the office or home, people can use devices that they carry with them, along with wireless communication networks, to access the systems and data that they need. In many cases MISs do not just replace traditional wired information systems or even provide similar functionality. Instead, they are planned, designed, and implemented with the unique characteristics of wireless communication and mobile client use in mind. These unique characteristics feature the need for specific design and development methodologies for MISs. Design methods allow considering systems independently of the existing information technologies, and thus enable the development of lasting solutions. Among the characteristics that a MIS design method needs to consider, we cite: unrestricted mobility of persons, scarcity of mobile devices’ power-source, and frequent disconnections of these devices. The field of MISs is the result of the convergence of high-speed wireless networks and personal mobile devices. The aim of MISs is to provide the ability to compute, communicate, and collaborate anywhere, anytime. Wireless technologies for communication are the link between mobile clients and other system components. Mobile client devices include various types, for example, mobile phones, personal digital assistants, and laptops. Samples of MIS applications are mobile commerce (Andreou et al., 2002), inventory systems in which stock clerks use special-purpose mobile devices to check inventory, police systems that allow officers to access criminal databases from laptops in their patrol cars, and tracking information systems with which truck drivers can check information on their loads, destinations, and revenues using mobile phones. MISs can be used in different domains and target different categories of people. In this article, we report on the rationale of having a method for designing and developing mobile information systems. This method includes a conceptual model, a set of requirements, and different steps for developing the system. The development of a method for MISs is an appropriate response to the need of professionals in the field of MISs. Indeed, this need is motivated by the increased demand that is emerging from multiple bodies: wireless service providers, wireless equipment manufacturers, companies developing applications over wireless systems, and businesses for which MISs are offered. Besides all these bodies, high-speed wireless data services are emerging (e.g., GPRS, UMTS), requiring some sort of new expertise. A design and development method for MISs should support professionals in their work.


Author(s):  
Ahmed Kamal ◽  
Esam Hagras ◽  
H.A. El-Kamchochi

In this paper, a Modular Fractional Chaotic Sine Map (MFC-SM) has been introduced to achieve high Lyapunov exponent values and completely chaotic behavior of the bifurcation diagram for high level security. The proposed MFC-SM is compared with the conventional non MFC-SM and it has an excellent chaotic analysis. In addition, the randomness test results indicate that the proposed MFC-SM shows better performance and satisfy all randomness tests. Due to the excellent chaotic properties and good randomization results for the proposed MFC-SM, it is used to be cooperated with the biometric digital identity to achieve dynamic chaotic biometric digital identity. Also, for real time image encryption, both Discrete Wavelet Transform (DWT) partial image encryption and Isomorphic Elliptic Curve (IEC) key exchange are used. In addition, the biometric digital identity is extracted from the user fingerprint image as fingerprint minutia data incorporated with the proposed MFC-SM and hence, a new Dynamic Fractional Chaotic Biometric Digital Identity IEC (DFC-BID-IEC) has been introduced. Dynamic Fractional Chaotic Key Generator (DFC-KG) is used to control the key schedule for all encryption and decryption processing. The encryption process consists of the confusion and diffusion steps. In the confusion step, the 2D Arnold Cat Map (ACM) is used with secret parameters taken from DFC-KG. Also, the diffusion step is based on the dynamic chaotic self-invertible secret key matrix which can be generated from the proposed MFC-SM. The IEC key exchange secret parameters are generated based on Elliptic Curve Diffie-Hellman (ECDH) key exchange and the isomorphism parametre. Statistical analysis, differential analysis and key sensitivity tests are performed to estimate the security strengths of the proposed DFC-BID-IEC system. The experimental results show that the proposed algorithm is robust against common signal processing attacks and provides a high security level and high speed for image encryption application.


Author(s):  
Gongxun Deng ◽  
Yong Peng ◽  
Chunguang Yan ◽  
Boge Wen

To adapt to the rapid growth of the logistics market and further improve the competitiveness of railway transportation, the high-speed freight train with a design speed of 350 km/h is being developed in China. The safety of the train under great axle load of 17 t and dynamic load is unknown. This paper is aimed to study the running safety of the high-speed freight train coupled with various cargo loading conditions negotiating a sharp curve at high velocity. A numerical model integrated a fluid-structure coupled container model and the nonlinear high-speed freight train was set up by the software of LS-DYNA. The fluid-structure interaction model between the container and fluid cargo was established using the Arbitrary Lagrangian-Eulerian (ALE) method. Two influencing parameters, including the cargo state in the container and the fill level, were selected. The study results showed that the wheelset unloading ratio and overturning coefficient could be significantly affected by the liquid sloshing, while the influence of sloshing on the risk of derailment was slight. In general, increasing the cargo filling rate would contribute to vehicle operation safety. In conclusion, this study would provide theoretical help for the running safety of the newly designed high-speed freight train.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Sujen Man Maharjan ◽  
Anubhuti Poudyal ◽  
Alastair van Heerden ◽  
Prabin Byanjankar ◽  
Ada Thapa ◽  
...  

Abstract Background Passive sensor data from mobile devices can shed light on daily activities, social behavior, and maternal-child interactions to improve maternal and child health services including mental healthcare. We assessed feasibility and acceptability of the Sensing Technologies for Maternal Depression Treatment in Low Resource Settings (StandStrong) platform. The StandStrong passive data collection platform was piloted with adolescent and young mothers, including mothers experiencing postpartum depression, in Nepal. Methods Mothers (15–25 years old) with infants (< 12 months old) were recruited in person from vaccination clinics in rural Nepal. They were provided with an Android smartphone and a Bluetooth beacon to collect data in four domains: the mother’s location using the Global Positioning System (GPS), physical activity using the phone’s accelerometer, auditory environment using episodic audio recording on the phone, and mother-infant proximity measured with the Bluetooth beacon attached to the infant’s clothing. Feasibility and acceptability were evaluated based on the amount of passive sensing data collected compared to the total amount that could be collected in a 2-week period. Endline qualitative interviews were conducted to understand mothers’ experiences and perceptions of passive data collection. Results Of the 782 women approached, 320 met eligibility criteria and 38 mothers (11 depressed, 27 non-depressed) were enrolled. 38 mothers (11 depressed, 27 non-depressed) were enrolled. Across all participants, 5,579 of the hour-long data collection windows had at least one audio recording [mean (M) = 57.4% of the total possible hour-long recording windows per participant; median (Mdn) = 62.6%], 5,001 activity readings (M = 50.6%; Mdn = 63.2%), 4,168 proximity readings (M = 41.1%; Mdn = 47.6%), and 3,482 GPS readings (M = 35.4%; Mdn = 39.2%). Feasibility challenges were phone battery charging, data usage exceeding prepaid limits, and burden of carrying mobile phones. Acceptability challenges were privacy concerns and lack of family involvement. Overall, families’ understanding of passive sensing and families’ awareness of potential benefits to mothers and infants were the major modifiable factors increasing acceptability and reducing gaps in data collection. Conclusion Per sensor type, approximately half of the hour-long collection windows had at least one reading. Feasibility challenges for passive sensing on mobile devices can be addressed by providing alternative phone charging options, reverse billing for the app, and replacing mobile phones with smartwatches. Enhancing acceptability will require greater family involvement and improved communication regarding benefits of passive sensing for psychological interventions and other health services. Registration International Registered Report Identifier (IRRID): DERR1-10.2196/14734


Safety ◽  
2021 ◽  
Vol 7 (1) ◽  
pp. 17
Author(s):  
Miroslava Mikusova ◽  
Joanna Wachnicka ◽  
Joanna Zukowska

The topic of the use of mobile devices and headphones on pedestrian crossings is much less explored in comparison to the use of the mobile phone while driving. Recent years have seen many discussions on this issue, especially in foreign countries. The Slovak Republic, however, has not been giving it enough attention (and it is not mentioned in the National Road Safety Plan for the Slovak Republic from 2011 to 2020). This paper aims to draw attention to this issue. It presents basic outputs of a pilot study on pedestrian safety, with a focus on the use of mobile devices and headphones at selected non-signalized pedestrian crossings in three Slovak cities. Overall, 9% of pedestrians used headphones or mobile devices at observed pedestrian crossings (4% of them used headphones, 1% used headphones and at same time used their mobile phone, 2% made phone calls and 2% used their mobile phones). While these numbers can be considered relatively low, the study proved that during weekdays every 2 min someone was using the crossing without fully focusing on crossing the road safely. Another main finding was that although the safety risk at pedestrian crossings is increased by factors such as rush hour traffic or reduced visibility, pedestrian behavior related to the use of mobile phones and headphones does not change. A safety assessment was also carried out at the crossings. The results show that pedestrian behavior is not affected by the level of safety of the crossing (e.g., visibility of the crossing for drivers). The results of the presented analysis suggest that action is needed to change that. Due to the lack of information about accidents involving pedestrians using mobile phones and headsets when crossing the road, no relevant statistical data could be analyzed. The dataset collected can be used as a basis for further investigation or comparisons with other countries of the relevant indicators. In future work, we would like to include a pedestrian–driver interaction factor focusing on driver speed behavior in relation to pedestrians (who are on or are about to step onto a pedestrian crossing) and identify critical situations caused by improper behavior of drivers and/or pedestrians. This will help to understand speed adjustment problems related to pedestrian crossings.


2012 ◽  
Vol 580 ◽  
pp. 155-159
Author(s):  
Xiang Ming Wang ◽  
Jin Chao Wang ◽  
Dong Hua Sun

In this paper, the real-time EtherCAT technology is introduced in detail, which including operating principle, communication protocol and the superiority performance of EtherCAT i.e. synchronicity, simultaneousness and high speed. To show how to design a slave system that considering the characteristics of application, the method of developing systems based no EtherCAT technology are proposed. Finally, a data acquisition system based on EtherCAT technology is designed. Application of EtherCAT technology can improve the real-time characteristics of data communication in wind power system.


1994 ◽  
Vol 40 (1) ◽  
pp. 20-27 ◽  
Author(s):  
Tay-Her Tsaur ◽  
Kwang-Cheng Chen ◽  
Chenhsin Lien ◽  
Ming-Tang Shih ◽  
C.P.J. Tzeng

Sign in / Sign up

Export Citation Format

Share Document