data transmission security
Recently Published Documents


TOTAL DOCUMENTS

31
(FIVE YEARS 17)

H-INDEX

2
(FIVE YEARS 1)

2021 ◽  
Vol 180 ◽  
pp. 126-133
Author(s):  
SuYu Zhang ◽  
Margarita Lagutkina ◽  
Kevser Ovaz Akpinar ◽  
Mustafa Akpinar

2021 ◽  
Vol 14 (1) ◽  
pp. 376-386
Author(s):  
Eko Riyadi ◽  
◽  
Tri Priyambodo ◽  
Agfianto Putra ◽  
◽  
...  

Most of the communication protocols in the Industrial Control System (ICS) are vulnerable to cyber-attacks. Initially, the network protocol was designed for reliable performance, and thus did not incorporate data transmission security features. Therefore, ICS requires adequate data transmission security. This paper suggests improving the security of data transmission through a dynamic symmetric four-key-generators system, wherein the system anticipates cyberattacks by generating four keys before encryption. It involves four generators: a random initial key generator, a keystream generator, a key scheduling algorithm generator, and a pseudo-random number algorithm generator. In the receiver section, the system generates three keys before decryption to ensure data confidentiality and to avoid cyberattacks. The test results show that the proposed system keyspace is ≈22048 bits, meaning that the key is more secure from brute force attacks. As a result, the cipher data have a correlation value of 0.00007. The entropy value is 7.99, indicating that the cipher data is more secure. Also, speed tests show that the processing time still qualifies as realtime.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Teh-Lu Liao ◽  
Chih-Yung Chen ◽  
Hsin-Chieh Chen ◽  
Yung-Yi Chen ◽  
Yi-You Hou

A novel technique for transmission of information through visible light communication (VLC) is developed in this study. A light-emitting diode is used as the light source at the transmitting side to send the encrypted information. At the receiving side, a light sensor, OPT-101, is used to receive the light signals that carry the encrypted information. The Arduino Due microcontroller board is used for digital signal processing at both the transmitting and receiving sides. Furthermore, to prevent the transmitted message from being intercepted, two chaotic systems, a master and a slave, with a synchronization controller are designed to obtain the transmitted audio signals. The design enables not only a VLC system with the light transmission path as a straight line (so that data cannot be stolen) but also the encryption of the audio signals with the chaotic system (Rössler system) to enhance data transmission security. The effectiveness of this system is then experimentally verified.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Shuai Zhang ◽  
Liqun Huang ◽  
Mingxu Zhu

In order to effectively solve the problem of data transmission security and peak-to-average ratio (PAPR) in an orthogonal frequency division multiplexing passive optical network (OFDM-PON) transmission system, in this paper, a joint encryption scheme of discrete cosine transform (DCT) and selective mapping (SLM) based on chaotic mapping is proposed. In this scheme, the chaotic sequence of a 3D Lorenz chaotic system is used as the row and column index of the DCT matrix and the phase factor of SLM to resist selective plaintext attack, and the system encryption is realized while reducing PAPR. The theoretical analysis and numerical simulation show that the common OFDM-PON, the proposed algorithm, can obtain a PAPR suppression gain of ∼4.8 dB and improve the receiver sensitivity by ∼4 dB BER @ 10 − 3 . In addition, it shows that, with the increase of row/column index mismatch of the DCT matrix, the bit error rate of the system increases gradually. An encrypted data transmission of 8 GB/s 16-QAM optical OFDM signals is successfully simulated over a 20 km standard single-mode fiber, which proves the excellent confidentiality of the proposed secure transmission.


2021 ◽  
Vol 252 ◽  
pp. 01027
Author(s):  
Yanrong Jing ◽  
Wenqian Zhang ◽  
Lin Ge ◽  
Nanfang Li ◽  
Xiyuan Shang ◽  
...  

In order to ensure the effect of network data transmission in scientific research institutions and avoid network information from being attacked and damaged, a secure sharing method of network data transmission based on multi-layer encryption technology is proposed. Combined with multi-layer encryption technology, the network data transmission security protocol is constructed to ensure the security and integrity of the initial file. The network information transmission security evaluation system is further constructed. The network transmission path security of scientific research institutions is tracked, evaluated and tested in real time. The network data transmission security sharing platform is constructed to ensure the safe sharing of massive and complex data Experiments have proved that the security and sharing processing effect of the network data transmission security sharing method based on multi-layer encryption technology are significantly improved compared with the traditional methods, and fully meet the research requirements.


Sign in / Sign up

Export Citation Format

Share Document