In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial. Key management schemes for MANETs are mainly based on identity-based public key cryptography (IDPKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC has the key escrow problem and certificate based cryptography have a high computational costs of certificates deployment. In this paper, we present a distributed key management scheme, in which a combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed. The scheme proposed in this paper not only achieves several enhanced security attributes for key management in MANET but also eliminates the need for certificate-based public key distribution and the key escrow problem efficiently.
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services including digital certificates, authentication and encryption. In the proposed scheme, a secure identity-based key management scheme is proposed for networks in environments without any PKI. This scheme solved the security problem in the MANET and is suitable for application to other wired network structures
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
Key organization and protect routing are two major subjects for Mobile Ad-hoc Networks nonetheless preceding explanations tend to contemplate them distinctly. This indicates to Key organization and protects routing inters dependency cycle problem. In this paper, we recommend a Key organization and protection of routing integrated scheme that speeches Key organization and protection of routing inter dependency cycle problem. By using identity based cryptography this scheme delivers produced including confidentiality, honesty, verification, cleanness, and non-repudiation. Connected to symmetric cryptography and conventional asymmetric cryptography as well as preceding IBC arrangements, this arrangement has developments in many features. We deliver hypothetical resistant of the refuge of the scheme and validate the efficiency of the scheme with applied simulation.
Identity-Based Key Management in MANETs Using Public Key CryptographyCSCJournals
Wireless mobile Ad Hoc Networks (MANETs) are an emerging area of mobile computing. MANETs face serious security problems due to their unique characteristics such as mobility, dynamic topology and lack of central infrastructure support. In conventional networks, deploying a robust and reliable security scheme such as Public Key Infrastructure (PKI) requires a central authority or trusted third party to provide fundamental security services including digital certificates, authentication and encryption. In the proposed scheme, a secure identity-based key management scheme is proposed for networks in environments without any PKI. This scheme solved the security problem in the MANET and is suitable for application to other wired network structures
Advanced Data Protection and Key Organization Framework for Mobile Ad-Hoc Net...AM Publications,India
Key organization and protect routing are two major subjects for Mobile Ad-hoc Networks nonetheless preceding explanations tend to contemplate them distinctly. This indicates to Key organization and protects routing inters dependency cycle problem. In this paper, we recommend a Key organization and protection of routing integrated scheme that speeches Key organization and protection of routing inter dependency cycle problem. By using identity based cryptography this scheme delivers produced including confidentiality, honesty, verification, cleanness, and non-repudiation. Connected to symmetric cryptography and conventional asymmetric cryptography as well as preceding IBC arrangements, this arrangement has developments in many features. We deliver hypothetical resistant of the refuge of the scheme and validate the efficiency of the scheme with applied simulation.
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
This article presents a new signcryption scheme which is based on the Schnorr digital signature
algorithm. The new scheme represents my personal contribution to signcryption area. I have been
implemented the algorithm in a program and here are provided the steps of the algorithm, the results and
some examples. The paper also contains the presentation of the original Signcryption scheme, based on
ElGamal digital signature and discusses the practical applications of Signcryption in real life.
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data again authentication. We describe new public-key cryptosystems that produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts is possible. Cryptosystem or cryptographic system is any sort of methodology for encoding and accessing that information. In this technique the master key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, one can aggregate any set of secret keys and make them compact as a single key but encompassing the power of all the keys being aggregated.
Cost effective authentic and anonymousnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
More Related Content
Similar to CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
Three Party Authenticated Key Distribution using Quantum CryptographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
A Review on Key-Aggregate Cryptosystem for Climbable Knowledge Sharing in Clo...Editor IJCATR
The Data sharing is an important functionality in cloud storage. In this article, we show how to securely, efficiently, and
flexibly share data with others in cloud storage. We describe new public-key cryptosystems which produce constant-size ciphertexts
such that efficient delegation of decryption rights for any set of ciphertexts are possible. The novelty is that one can aggregate any set
of secret keys and make them as compact as a single key, but encompassing the power of all the keys being aggregated. In other
words, the secret key holder can release a constant-size aggregate key for flexible choices of ciphertext set in cloud storage, but the
other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in
a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also
describe other application of our schemes. In particular, our schemes give the first public-key patient controlled encryption for flexible
hierarchy, which was yet to be known.
Smart Card technology is the emerging technology which is developing among
common masses in our culture and widely used in the sectors of banking and industries.
Many research works are undergoing in this area to provide highly confidential data
transmission. Existing Scheme provides a security against offline attack for the lost Smart
Card using Elliptic Curve Cryptography (ECC) but it requires more communication and
computation overhead with higher key length. To overcome this limitation, DNA based
Password authentication using Hyper Elliptic Curve Cryptography (HECC) scheme is
proposed. It provides more security than existing system which allows server and smartcard
to exchange the generated password and verify each other. This system exploits the
advantages of Hyperelliptic Curve Cryptography (HECC) technique which is having lesser
key size, less communication and computation overhead for Password generation and
signature verification process.
Improving Efficiency of Security in Multi-CloudIJTET Journal
Abstract--Due to risk in service availability failure and the possibilities of malicious insiders in the single cloud, a movement towards “Multi-clouds” has emerged recently. In general a multi-cloud security system there is a possibility for third party to access the user files. Ensuring security in this stage has become tedious since, most of the activities are done in network. In this paper, an enhanced security methodology has been introduced in order to make the data stored in cloud more secure. Duple authentication process introduced in this concept defends malicious insiders and shields the private data. Various disadvantages in traditional systems like unauthorized access, hacking have been overcome in this proposed system and a comparison made with the traditional systems in terms of performance and computational time have shown better results.
SIGNCRYPTION SCHEME BASED ON SCHNORR DIGITAL SIGNATUREijp2p
This article presents a new signcryption scheme which is based on the Schnorr digital signature
algorithm. The new scheme represents my personal contribution to signcryption area. I have been
implemented the algorithm in a program and here are provided the steps of the algorithm, the results and
some examples. The paper also contains the presentation of the original Signcryption scheme, based on
ElGamal digital signature and discusses the practical applications of Signcryption in real life.
A Review Paper on Secure authentication and data sharing in cloud storage usi...ijsrd.com
Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data again authentication. We describe new public-key cryptosystems that produce constant-size cipher texts such that efficient delegation of decryption rights for any set of cipher texts is possible. Cryptosystem or cryptographic system is any sort of methodology for encoding and accessing that information. In this technique the master key holder can release a constant-size aggregate key for flexible choices of cipher text set in cloud storage, but the other encrypted files outside the set remain confidential. This compact aggregate key can be conveniently sent to others or be stored in a smart card with very limited secure storage. We provide formal security analysis of our schemes in the standard model. We also describe other application of our schemes. In particular, one can aggregate any set of secret keys and make them compact as a single key but encompassing the power of all the keys being aggregated.
Cost effective authentic and anonymousnexgentech15
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Cost-Effective Authentic and Anonymous Data Sharing with Forward Securitynexgentechnology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYNexgen Technology
bulk ieee projects in pondicherry,ieee projects in pondicherry,final year ieee projects in pondicherry
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Mutual query data sharing protocol for public key encryption through chosen-c...IJECEIAES
In this paper, we are proposing a mutual query data sharing protocol (MQDS) to overcome the encryption or decryption time limitations of exiting protocols like Boneh, rivest shamir adleman (RSA), Multi-bit transposed ring learning parity with noise (TRLPN), ring learning parity with noise (Ring-LPN) cryptosystem, key-Ordered decisional learning parity with noise (kO-DLPN), and KD_CS protocol’s. Titled scheme is to provide the security for the authenticated user data among the distributed physical users and devices. The proposed data sharing protocol is designed to resist the chosen-ciphertext attack (CCA) under the hardness solution for the query shared-strong diffie-hellman (SDH) problem. The evaluation of proposed work with the existing data sharing protocols in computational and communication overhead through their response time is evaluated.
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN MANET USING THRESHOLD CRYPTOGRAPHY
1. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
DOI : 10.5121/ijnsa.2015.7204 55
CERTIFICATE LESS KEY MANAGEMENT SCHEME IN
MANET USING THRESHOLD CRYPTOGRAPHY
Shaheena Khatoon1
and Balwant Singh Thakur2
1
School of Studies in Mathematics, Pt. Ravishankar Shukla University, Raipur, India
2
School of Studies in Mathematics, Pt. Ravishankar Shukla University, Raipur, India
ABSTRACT
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is extremely crucial.
Key management schemes for MANETs are mainly based on identity-based public key cryptography (ID-
PKC) or certificate-based public key cryptography, both of which has their inherit problem. The ID-PKC
has the key escrow problem and certificate based cryptography have a high computational costs of
certificates deployment. In this paper, we present a distributed key management scheme, in which a
combination of certificate less public key cryptography (CL-PKC) and threshold cryptography is employed.
The scheme proposed in this paper not only achieves several enhanced security attributes for key
management in MANET but also eliminates the need for certificate-based public key distribution and the
key escrow problem efficiently.
.
KEYWORDS
Key Management, MANETs, Key Escrow, Certificate less Cryptography, Threshold Cryptography.
1.INTRODUCTION
Key management are mainly based on public key infrastructure (PKI) [ [1]- [4]] and identity-
based public key cryptography (ID-PKC) [ [5]- [7]]. But they both have some inherent
drawbacks. In an ID-based cryptography system, users private keys are generated by a key
generation center (KGC), which means the KGC knows every users' keys this is known as the key
escrow problem while in the public key cryptography system, a certificate authority is required to
issue certificates between users public keys and private keys to ensure their authenticity, thus
increasing computational cost. To avoid these problems in the existing key management system,
Satttam et al proposed [8] certificate less cryptography systems which eliminate both the problem
i.e. the KGC does not know users' keys the public keys do not need to be certified. Essentially,
certificate less cryptography relies between the public key cryptography and ID-based
cryptography. In this paper, to implement CL-PKE over MANET and to make it practical, we
incorporate the ideas of Shamir’s secret sharing scheme [9] , Threshold Cryptography [10]and
Satttam et al [8]. Our contribution is to apply the existing certificate less cryptography into
MANET using a threshold secret sharing scheme to obtain an efficient and secure MANET
scheme.
2. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
56
2. RELATED WORK
In the year 1999, Zhou and Hass [1] describe a partially distributed PKI based solution of key
management in MANETs which used certificate-based cryptography and (t, n) threshold
cryptography. They used Shamir’s [9] threshold cryptography which can distribute trust among a
set of servers to build a highly available and secure key management service. Then in the year
2002 Luo et al [3] proposed a fully distributed authority scheme which is a modification of
partially distributed certificate authority scheme. The fully distributed authority scheme also
makes use of the threshold secret sharing scheme like the partially distributed scheme.
Then in the year 2009, Khalili et al .in [5] provided a key distribution mechanism which
combines the use of ID-PKC and threshold cryptography. The advantage of this scheme is this
that it avoids the need for users to generate their own public keys and distribute these keys
throughout the network, since the user's identity acts as her public key. Besides that, users only
need to propagate their identities instead of the certificates. This can lead to huge savings in
bandwidth. However, the usage of ID-PKC instead of certificates also results in a few
weaknesses. One major weakness is that the key escrow problem since distributed PKG knows all
user's private keys. The compromise of the PKG's master key could be disastrous in an ID-PKC
system and usually more severe than the compromise of a CA's signing key in a traditional public
key cryptography. For these reasons, for these reason in this paper we propose CL-PKC the KGC
in CL-PKC supplies a user with a partial private key that the KGC computes from the users
identity and a master key. The user then combines the partial private key with some secret
information to generate the actual private key. Consequently the KGC does not have access to the
user’s entire private key.
3. PRELIMINARIES
3.1. Certificate less Public Key Cryptography
The idea of CL-PKC is proposed by Al-Riyami and Peterson [8] with the original motivation of
eliminating the inherent key escrow problem of ID-PKC. In CL-PKC, the KGC supplies a user
with a partial secret key which the KGC computes from the user's identity and a master key, and
then the user combines its partial secret key and the KGC's public parameters with some secret
information to generate its actual secret key and public key respectively. In this way, a user's
secret key is not available to the KGC.
3.2. Threshold Secret Sharing
Secret sharing scheme allows a secret to be shared among a group of users which are also called
shareholders. The secret is shared in such a way that no single user can deduce the secret from his
share alone. In order to construct the secret, a user needs to combine a sufficient number of
shares. (t, n) threshold secret sharing represents that the secret is distributed to n share holders,
and any t or more users can reconstruct the secret from their shares, but t-1 or fewer users cannot
get any information about the secret. Here, k is the threshold parameter such that 1 ≤ t ≤n. The
first threshold secret sharing scheme Identity based security schemes for ad hoc routing network
was proposed by Shamir [9] in 1979, which is based on polynomial interpolation. To distribute a
secret S among n users, a trusted authority chooses a large prime q, and randomly selects a
polynomial f(x) = S + a1x…. + at-1xt-1
(modq); where Li a1,……, at-1 ϵ Zq. The trusted authority
3. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
57
computes each user's share by Si =f(i) and securely sends the share Si to user i. Then any k users
can reconstruct the secret by computing:
,
Where, Li = .
4. PROPOSED SCHEME
We incorporate the work of Satttam et al [8] and adopt it to MANET key management with CL-
PKE. The scheme is as follows:
4.1. Set up
1. Run the IG generator on an input k, it outputs (G1, G2, e) where G1 and G2 are groups of
prime order q, is a pairing.
2. Choose an arbitrary generator .
3. Select a master private key s uniformly at random from and set .
4. Choose a cryptographic hash function .
Finally, the KGC publishes the public parameters as: (G1, G2, p, q, P, Ppub, and H1).
4.2. Key Generation
To obtain the public key and corresponding private key a user A select its partial secret
and presents the identity to key generation service. A gets its partial private key
where , and then A calculates its full private key as
.The corresponding public key is where . A verifies
the algorithm by
4.3. Key Agreement
Suppose node A and B wants to securely communicate with each other, since IDA, IDB public key
of A and B are all known information node A randomly choose a value and sends
to B.Simalarly B randomly choose a value and sends to A. After the
above messages are exchanged both entities checks the validity of other public key. A checks
and B checks .Then A calculates the KAB =
e(QB,YB)a
e(SA,TB)(xAPpub, XB) and B calculates .It is
easy to verify KAB = KBA
KAB = e(QB,YB)a
e(SA,TB)e(xAPpub,XB)
= e(QB,xBsP)a
e(SA,TB)e(xAsP, xBP)
= e(QB,P)x
B
sa
e(SA,TB)e(P,P)x
A
sx
B
= e(xBsQB, aP)e(SA,TB)e(xBsP, xAP)
=e(SB, TA) e(SA,TB)e(XBPpub, XA)
KBA = e (QA,YA)b
e(SB,TA)e(xBPpub,XA)
= e(QA,xAsP)b
e(SB,TA)e(xBPpub,XA)
= e(QA,P)x
A
sb
e(SB,TA)e(xBPpub,XA)
= e(xAsQA, bP) e(SB,TA)e(xBPpub,XA)
=e(SA, TB) e(SB,TA)e(xBPpub,XA).
4. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
58
Hence KAB = KBA
4.4.Key Revocation
Key revocation is the process by which compromised node is removed from the network without
effecting the working of network. Suppose a node A is detected abnormal in the network then
any t of n D-KGCs jointly execute key revocation process against the node A in the following
way
1) The t D-KGCs generate a partial revocation sQA .
2) The leader constructs a complete revocation through Lagrange interpolation as:
Where, Li = .
3) The leader informs other nodes in the network than A has been corrupted by sending
.
4) Nodes verify the equation , if it holds node A is recorded in
the memory any future communication is denied with it.
5.CONCLUSIONS
In mobile adhoc networks (MANETs) an efficient and secure key management scheme is
extremely crucial. In this paper we proposed a new approach for key management which uses
both certificate less public key cryptography, which reduces the computational cost and threshold
secret sharing schemes for enhancing the security of network. Certificate less public key
cryptography has two benefits ,firstly it exclude the need of certificating authority for certificate
deployments, secondly it preserves the desirable properties of identity-based key management
scheme and eliminates key escrow problem. In addition to this we completely removed a trusted
third party to distribute the public keys, hence increasing the tolerance of the network to
compromised nodes and also saving network bandwidth.
ACKNOWLEDGEMENTS
We would like to thank the anonymous reviewers for their valuable comments and suggestions.
5. International Journal of Network Security & Its Applications (IJNSA) Vol.7, No.2, March 2015
59
REFERENCES
[1] Zhou, L.D and Hass Z.H, 1999 Securing ad hoc networks. IEEE Networks Vol.13, pp. 24-30.
[2] Kong, J.J., Zerfos, P., Luo, H.Y., Lu, S.W., and Zhang, L.X. 2001, Providing robust and ubiquitous
support for mobile ad hoc networks. International Conference on Network Protocols.
[3] Luo, H.Y., Zerfos, P., Kong, J.J., Lu, S.W., and Zhang, L.X., 2002, Self-securing ad hoc wireless
networks. International symposium on computers and communications
[4] Capkun, S., Buttyan, L., and Hubaux, P., 2003, Self organized public key management for mobile
adhoc networks. IEEE Transaction on mobile computing.
[5] Khalili, A. Katz, J. and Arbaugh, W.A., 2003,Toward secure key distribution in truly ad hoc
networks. Symposium on application and the Internet Workshops.
[6] Deng, H.M., Mukerjee, A, and Agrawal, D.P., 2004 Threshold and identity based key management
and authentication for wireless ad hoc networks. International conference on information technology:
coding and computing.
[7] Deng, H.M., and Agrawal, D.P., 2004. TIDS: threshold and identity based security scheme for
wireless adhoc networks. Ad hoc networks.
[8] Sattam, S. Al- Riyami and Paterson, K.G., 2003, Certificate less public key cryptography. Advances
on Cryptology Asia crypt.
[9] Shamir, A., 1979. How to Share a Secret, Comm. ACM, vol. 22.
[10] Desmedt, Y. and Frankel, Y.,1989,Threshold cryptosystems, Advances on Cryptology-crypto,
vol.435.
Authors
Shaheena Khatoon received the B.Sc.,M.Sc. and MPhil degree in Mathematics form
Pt.Ravishankar Shukla University, Raipur.Chhattisgarh, India in 2005, 2007 and 2009.
She joined School of Studies in Mathematics, Pt.Ravishankar Shukla University, Raipur,
India for her research work.
Balwant Singh Thakur Professor, School of Studies in Mathematics, Pt. Ravishankar
Shukla University Raipur (C. G.) India. His field of interest are Non Linear Operator
Theory and public key Cryptography. He and his research scholars are recently working on
many branches of public key cryptography.