security algorithm
Recently Published Documents


TOTAL DOCUMENTS

187
(FIVE YEARS 67)

H-INDEX

9
(FIVE YEARS 2)

2022 ◽  
Author(s):  
Liang Wang ◽  
Hailong Ma ◽  
Ziyong Li ◽  
Jinchuan Pei ◽  
Tao Hu ◽  
...  

Abstract Facing the untrusted threats of network elements and PKI/CA faced by SR-BE/TE(Segment Routing-BE/TE) data plane in the zero-trust network environment, firstly, this paper refines it into eight specific security issues. Secondly, an SR-BE/TE data plane security model ZbSR(ZTA-based SR) based on zero-trust architecture is proposed, which reconstructs the original SR control plane into a "trust-agent" two-layer plane based on 4 components of the controller, agent, cryptographic center and information base. On one hand, we distinguish between the two segment list generation modes and proposes corresponding data exchange security algorithms, by introducing north-south security verification based on identity authentication, trust evaluation, and key agreement before the terminal device establishes an east-west access connection, so reliable data exchange between terminal devices can be realized. On the other hand, for the network audit lacking SR-BE/TE, a network audit security algorithm based on solid authentication is proposed. By auditing the fields, behaviors, loops, labels, paths, and SIDs of messages, threats such as stream path tampering, SID tampering, DoS attacks, and loop attacks can be effectively detected. Finally, through the simulation test, the proposed model can provide security protection for the SR data plane with a 19.3% average incremental delay overhead for various threat scenarios.


Author(s):  
Nuniek Fahriani ◽  
Indah Kurniawati

At HOTSPODT (Hospital Ship for Covid Disaster) there are no stages regarding the application of the use of information technology systems, especially for securing patient data which includes personal data and patient medical records. Confidential patient data collected during the current pandemic, including the patient’s name, address, diagnosis, family history and medical records without the patient’s consent, may pose a risk to the individual concerned. The concept of patient data security is adjusted to the user’s position on the importance of data. Access to patient data authorization is one of the security gaps that the security system needs to pay attention to and guard against. So, in this case applied a data security algorithm in the form of cryptography. The algorithm used is the Blowfish Algorithm. The test results of the scenario in the application prove that it can be successfully processed from the encrypted file to ciphertext until it is returned as the original file.


2021 ◽  
Vol 2136 (1) ◽  
pp. 012044
Author(s):  
Yuxi Zhou ◽  
Mingjie Ma ◽  
Zenghui Jiang

Abstract As the focus of the development of the whole society in the era of big data, information security is also the main direction of the practice and development of technological innovation. On the basis of understanding the current information transmission security and its algorithm research, this paper analyzes how to use this technology to guarantee information security according to the block encryption principle.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 2034
Author(s):  
Aitizaz Ali ◽  
Hasliza A. Rahim ◽  
Muhammad Fermi Pasha ◽  
Rafael Dowsley ◽  
Mehedi Masud ◽  
...  

According to the security breach level index, millions of records are stolen worldwide on every single day. Personal health records are the most targeted records on the internet, and they are considered sensitive, and valuable. Security and privacy are the most important parameters of cryptography and encryption. They reduce the availability of data on patients and healthcare to the appropriate personnel and ultimately lead to a barrier in the transfer of healthcare into a digital health system. Using a permission blockchain to share healthcare data can reduce security and privacy issues. According to the literature, most healthcare systems rely on a centralized system, which is more prone to security vulnerabilities. The existing blockchain-based healthcare schemes provide only a data-sharing framework, but they lack security and privacy. To cope with these kinds of security issues, we have designed a novel security algorithm that provides security as well as privacy with much better efficiency and a lower cost. Hence, in this research, we have proposed a patient healthcare framework that provides greater security, reliability, and authentication compared to existing blockchain-based access control.


Author(s):  
Rana M. Zaki ◽  
Hala Bahjat Abdul wahab

<p class="0abstractCxSpFirst">Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.</p><p class="0abstractCxSpLast"><strong> </strong></p>


2021 ◽  
Vol 1995 (1) ◽  
pp. 012033
Author(s):  
Guilan Luo ◽  
Yuanbo Zhu ◽  
Shuailin Wang ◽  
Zhongmu Li ◽  
Mei Zhang ◽  
...  

Author(s):  
Dr. K. Sai Manoj

For privacy and security, a digital transactional record method plays a major role for its excellent nature of work. This digital method used to solve the check the problems like privacy and protection of data. It also had some unfit things like high bandwidth, computation complexity, latency and restricted scalability which are inadequate for internet of things. This research paper focuses on Efficient Lightweight Integrated Block chain model which is expanded to show the development of internet of things. Especially, this paper presents a model of a digital home which is attempted to prove the various applications used by internet of things. The benefits of this smart home are information transmission, activity of outgoing and incoming in every action. Efficient Lightweight Integrated Block chain model connected with digital transactional method with powerful provided sources to prove privacy and security. Algorithm, Certificate less Cryptography, Distributed Throughput Management schemes and Lightweight Consensus are used to present the Efficient Lightweight Integrated Block Chain model. Various methods are used to prove this model by using time processing, usage of energy and so on. This model saves 60% of time processing while consuming the energy of 0.08 Jm. Many parameters are used to show outcome done by this method.


Sign in / Sign up

Export Citation Format

Share Document