communication security
Recently Published Documents


TOTAL DOCUMENTS

327
(FIVE YEARS 123)

H-INDEX

13
(FIVE YEARS 5)

2021 ◽  
Author(s):  
Fan He ◽  
Zhengquan Ang ◽  
Guanglun Yang ◽  
Qingqin Fu ◽  
Ling Yi ◽  
...  

This paper analyzes the disadvantages of the traditional method of data security between the master station and the terminal, and proposes a new method of data exchange between the master station and the terminal. This method improves the security of data interaction. In the process of using it, symmetric algorithm and asymmetric algorithm are combined, involving security mechanisms such as signature, certificate, MAC and symmetric encryption, so as to establish a secure link between the master station and the terminal, so as to protect the communication security between them.


2021 ◽  
Vol 1 (2) ◽  
pp. 75-92
Author(s):  
Nana Nana ◽  
Puguh Wahyu Prasetyo

Message security is must be managed seriously. Therefore, to maintain the confidentiality of any message, cryptography is needed. Cryptography is a science that uses mathematics to encrypt and decrypt messages. Cryptography is used as a tool to protect messages, for example, national secrets and strategies.  The method of this research is qualitative research with a literature review. This research implements a hybrid cryptographic algorithm by combining Hill cipher and 3x3x3 Rubik's cube methods with Python software simulation.


Author(s):  
Malika Sader ◽  
Fuyong Wang ◽  
Zhongxin Liu ◽  
Zengqiang Chen

Abstract In this paper, the general decay projective synchronization of a class of memristive competitive neural networks with time delay is studied. Firstly, a nonlinear feedback controller is designed, which does not require any knowledge about the activation functions. Then, some new and applicable conditions dependent on the Lyapunov function and the inequality techniques are obtained to guarantee the general decay projective synchronization of the considered systems under the developed controller. Unlike other forms of synchronization, projective synchronization can improve communication security due to the scaling constant’s unpredictability. In addition, the polynomial synchronization, asymptotical synchronization, and exponential synchronization can be seen as the special cases of the general decay projective synchronization. Finally, a numerical example is given to demonstrate the effectiveness of the proposed control scheme.


2021 ◽  
Vol 2136 (1) ◽  
pp. 012043
Author(s):  
Jian Zhang ◽  
Liting Niu

Abstract Elliptic Curve Encryption (ECC) has been widely used in the field of digital signatures in communication security. ECC standards and the diversification of application scenarios put forward higher requirements for the flexibility of ECC processors. Therefore, it is necessary to design a flexible and reconfigurable processor to adapt to changing standards. The cryptographic processor chip designed in this paper supports the choice of prime and binary fields, supports the maximum key length of 576 bits, uses microcode programming to achieve reconfigurable function, and significantly improves the flexibility of the dedicated cryptographic processor. At the same time, the speed of modular multiplication and modular division can be greatly improved under the condition of keeping the low level of hardware resources through a carefully designed modular unit of operation. After using FPGA for hardware implementation, it is configured into a 256-bit key length. The highest clock frequency of this design can reach 55.7MHz, occupying 12425LUTS. Compared with a similar design, the performance is also greatly improved. After MALU module optimization design, modular multiplication module division also has significant advantages in computing time consumption.


2021 ◽  
Vol 13 (6) ◽  
pp. 85-103
Author(s):  
Lenin Leines-Vite ◽  
Juan Carlos Pérez-Arriaga ◽  
Xavier Limón

Security has become paramount in modern software services as more and more security breaches emerge, impacting final users and organizations alike. Trends like the Microservice Architecture bring new security challenges related to communication, system design, development, and operation. The literature presents a plethora of security-related solutions for microservices-based systems, but the spread of information difficult practitioners' adoption of novel security related solutions. In this study, we aim to present a catalogue and discussion of security solutions based on algorithms, protocols, standards, or implementations; supporting principles or characteristics of information security, considering the three possible states of data, according to the McCumber Cube. Our research follows a Systematic Literature Review, synthesizing the results with a meta-aggregation process. We identified a total of 30 primary studies, yielding 75 security solutions for the communication of microservices.


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Yifeng He ◽  
Nan Ye ◽  
Rui Zhang

Nowadays, the development of information technology can be described as extremely rapid, especially with the widespread use of the Internet; the security of communications in the network has become an important issue we are facing. The purpose of this article is to solve the problems in today’s network security data encryption algorithms. Starting from the computer network communication security data encryption algorithm, we discuss the effects of several different encryption methods on improving network security. The research results show that it is known that the application of link encryption algorithm in network communication security encryption algorithm can increase the security index by 25%, the node encryption algorithm can increase the security index by 35%, and the end-to-end encryption algorithm can make the cyber activity safety index to increase by 40%. Among them, RSA algorithm and DES algorithm are two very representative algorithms; they represent different encryption systems. From the perspective of network data link, there are three methods of encryption algorithm, namely, link encryption algorithm, node encryption algorithm, and end-to-end encryption algorithm.


2021 ◽  
Vol 2108 (1) ◽  
pp. 012014
Author(s):  
Yong Tang ◽  
Linghao Zhang ◽  
Juling Zhang ◽  
Siyu Xiang ◽  
He Cai

Abstract In view of the current lack of unified security authentication and control for the power Internet of Things terminal equipment, at the perception level of the power Internet of Things, the perception layer terminal access control, front-end authentication technology realization and terminal equipment abnormal behavior detection methods are proposed. This method enhances the communication security between power equipment and edge nodes, and ensures the safe and stable operation of the power Internet of Things.


Sign in / Sign up

Export Citation Format

Share Document