secure data transmission
Recently Published Documents


TOTAL DOCUMENTS

390
(FIVE YEARS 192)

H-INDEX

12
(FIVE YEARS 6)

Drones ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 10
Author(s):  
Tsu-Yang Wu ◽  
Xinglan Guo ◽  
Yeh-Cheng Chen ◽  
Saru Kumari ◽  
Chien-Ming Chen

At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.


Author(s):  
Dr. J. Suguna ◽  
◽  
G. Keerthana ◽  

Cloud computing is a network access concept that provides simple, on-demand network access to a shared pool of customizable computing resources (such as networks, servers, storage, applications, and services) that can be quickly provided and released with minimal administrative effort or service provider involvement. The idea of having a communication node on-board a vehicle that may make wireless connections with other adjacent communication nodes visible in the radio range is referred to as a Vehicular Adhoc Network (VANET). The main focus of this paper is to design lightweight Vehicular Adhoc Network architecture for efficient secure data transmission. An improved Ciphertext Policy Attribute Based Encryption scheme and Identity Based offline/online Signature scheme are proposed to reduce the computational cost, storage overhead and communication overhead in vehicular ad-hoc network. Finally, concluded that the proposed work yields high performance than the existing work.


2021 ◽  
Vol 11 (1) ◽  
pp. 2
Author(s):  
Sam Banani ◽  
Surapa Thiemjarus ◽  
Kitti Wongthavarawat ◽  
Nattapong Ounanong

Pervasive sensing with Body Sensor Networks (BSNs) is a promising technology for continuous health monitoring. Since the sensor nodes are resource-limited, on-node processing and advertisement of digested information via BLE beacon is a promising technique that can enable a node gateway to communicate with more sensor nodes and extend the sensor node’s lifetime before requiring recharging. This study proposes a Dynamic Light-weight Symmetric (DLS) encryption algorithm designed and developed to address the challenges in data protection and real-time secure data transmission via message advertisement. The algorithm uses a unique temporal encryption key to encrypt each transmitting packet with a simple function such as XOR. With small additional overhead on computational resources, DLS can significantly enhance security over existing baseline encryption algorithms. To evaluate its performance, the algorithm was utilized on beacon data encryption over advertising channels. The experiments demonstrated the use of the DLS encryption algorithm on top of various light-weight symmetric encryption algorithms (i.e., TEA, XTEA, PRESENT) and a MD5 hash function. The experimental results show that DLS can achieve acceptable results for avalanche effect, key sensitivity, and randomness in ciphertexts with a marginal increase in the resource usage. The proposed DLS encryption algorithm is suitable for implementation at the application layer, is light and energy efficient, reduces/removes the need for secret key exchange between sensor nodes and the server, is applicable to dynamic message size, and also protects against attacks such as known plaintext attack, brute-force attack, replaying attack, and differential attack.


Mathematics ◽  
2021 ◽  
Vol 9 (23) ◽  
pp. 3131
Author(s):  
Ahmed A. Abd El-Latif ◽  
Abdullah M. Iliyasu ◽  
Bassem Abd-El-Atty

Smart systems and technologies have become integral parts of modern society. Their ubiquity makes it paramount to prioritise securing the privacy of data transferred between smart devices. Visual encryption is a technique employed to obscure images by rendering them meaningless to evade attention during transmission. However, the astounding computing power ascribed to quantum technology implies that even the best visually encrypted systems can be effortlessly violated. Consequently, the physical realisation quantum hardware portends great danger for visually encrypted date on smart systems. To circumvent this, our study proposes the integration of quantum walks (QWs) as a cryptographic mechanism to forestall violation of the integrity of images on smart systems. Specifically, we use QW first to substitute the original image and to subsequently permutate and embed it onto the reference image. Based on this structure, our proposed quantum walks visually meaningful cryptosystem facilities confidential transmission of visual information. Simulation-based experiments validate the performance of the proposed system in terms of visual quality, efficiency, robustness, and key space sensitivity, and by that, its potential to safeguard smart systems now and as we transition to the quantum era.


2021 ◽  
Author(s):  
Ra. Kamalaeswari ◽  
V. Ceronmani Sharmila

The main aim of this project is to propose a threat modeling framework that promotes the security of health care services. The threat model is used to analyze the cyber threats that makes the electronic health monitoring devices vulnerable to a cyber-attack. The model also helps in strengthening the security of the software-based web applications like EMR and EHR used in a health care organization. The information assets are identified and the threat agents are eliminated considering the software, web application and monitoring devices as attack surface. The major goal of this threat model is to analyze and establish the trust boundaries in the OpenEMR that render a secure data transmission. We use a STRIDE threat model and a DFD based approach using the OWASP threat modeling tool. The SIEM tools provide a continuous security methodology to document the process and result.


2021 ◽  
Vol 13 (23) ◽  
pp. 13128
Author(s):  
Naveed Islam ◽  
Majid Altamimi ◽  
Khalid Haseeb ◽  
Mohammad Siraj

In modern years, the Internet of Things (IoT) has gained tremendous growth and development in various sectors because of its scalability, self-configuring, and heterogeneous factors. It performs a vital role in improving multimedia communication and reducing production costs. The multimedia data consist of various types and formats (text, audio, videos, etc.), which are forwarded in the form of blocks of bits in the network layer of TCP/IP. Due to limited resources available to IoT-built devices, most of the Multimedia Internet of Things (MIoT)-based applications are delay constraints, especially for big data content. Similarly, multimedia-based applications are more vulnerable to security burdens and lower the trust of data processing. In this paper, we present a secure and sustainable prediction framework for MIoT data transmission using machine learning, which aims to offer intelligent behavior of the system with information protection. Firstly, the network edges exploit a regression analysis for a real-time multimedia routing scheme and achieve precise delivery towards the media servers. Secondly, an efficient and low-processing asymmetric process is proposed to provide secure data transmission between the IoT devices, edges, and data servers. Extensive experiments are performed over the OMNET++ network simulator, and its significance is achieved by an average for energy consumption by 71%, throughput by 30.5%, latency by 22%, bandwidth by 34.5%, packets overheads by 38.5%, computation time by 12.5%, and packet drop ratio by 35% in the comparison of existing schemes.


2021 ◽  
Vol 3 (2) ◽  
pp. 66-73
Author(s):  
I. M. Zhuravel ◽  
◽  
L. Z. Mychuda ◽  
Yu. I. Zhuravel ◽  
◽  
...  

The development of computer and digital technology contributes to the growth of information flows transmitted through open and closed communication channels. In many cases, this information is confidential, financial, or commercial in nature and is of value to its owners. This requires the development of mechanisms to protect information from unauthorized access. There are two fundamental areas of secure data transmission over the open communication channels – cryptography and steganography. The fundamental difference between them is that cryptography hides from others the content of the message, and steganography hides the very fact of the message transmission. This paper is devoted to steganographic methods of data concealment, which are less researched than cryptographic, but have significant potential for use in a variety of applications. One of the important characteristics of most methods is their effectiveness. In general, efficiency is assessed in the context of solving specific problems. However, the most common criteria for the effectiveness of steganographic methods are the amount of hidden data and the method of transmitting the secret key to the receiving party, which will not allow the attacker to intercept it. Because media files make up a significant portion of network traffic, a digital image is chosen as the stegocontainer. It is proposed to determine the coordinates of the embedding location on the basis of iterative functions. The advantage of their use is the compactness of the description of the coordinates of the pixels in which the data will be hidden. In addition, it is proposed to use the Diffie-Gellman algorithm to transfer the parameters of iterative functions to the receiving side. This method of key distribution makes the steganographic method less vulnerable to being stolen by an attacker. The second performance criterion is the amount of hidden data. The paper found that the moderate addition of multiplicative noise makes it possible to increase the amount of hidden data without significantly reducing the visual quality of the stegocontainer. To analyze the distortions in the image-stegocontainer, which are due to the influence of noise and modification of the lower bits of pixels, the method of a quantitative assessment of visual quality is used, which is based on the laws of visual perception. Keywords: steganographic data hiding; hiding efficiency; iterative functions; Diffie-Gelman algorithm.


Sign in / Sign up

Export Citation Format

Share Document