This document summarizes an article from the International Journal of Computer Engineering and Technology. The article proposes using an FPGA-based hardware dongle to securely implement RSA cryptography and prevent secret software information from being extracted. It describes using the FPGA to perform half of the RSA encryption process, with the other half decrypted on the software side. The document provides details on the RSA encryption algorithm, FPGA programming, a design for interfacing between a computer and the FPGA dongle, and results of encrypting data with the proposed system. It concludes the approach provides a way to wrap the RSA layer and restrict applications from running without a connected dongle.
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
This UL white paper discusses some of the many issues and challenges that must be addressed in the future deployment of wireless technology for the processing
of secure transactions. It begins with a discussion of the strengths and limitations of both contactless and wireless technologies. The white paper then reviews and assesses internal system risks, as well as external security concerns, for both technologies. The paper concludes with some thoughts on the future use of wireless technology in secure transactions, and how manufacturers can provide assurances to both system providers and users regarding the security of their private data.
This document discusses using a hierarchical certificate authority with elliptic curve cryptography to improve security in ZigBee networks. It begins with an overview of the Internet of Things and wireless sensor networks. It then discusses ZigBee protocols and vulnerabilities in key distribution and management. The document proposes a solution using a hierarchical certificate authority to calculate, store, and distribute certificates with elliptic curve cryptography to nodes in the network. This is intended to provide a more secure, reliable, and scalable approach for authentication in 802.15.4 networks.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
This document proposes using certificate authorities and elliptic curve cryptography to improve security in Zigbee wireless sensor networks. It summarizes Zigbee vulnerabilities like insecure key distribution and lack of key revocation. It then describes a proposed solution where a key distribution center uses ECC to establish session keys between nodes, improving security over the standard Zigbee approach. Finally, it recommends an innovative hybrid solution combining certificate authorities and ECC to further reduce vulnerabilities when nodes enter or exit large-scale IoT networks.
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
Combined technologies create a virtualized security gateway with real-time processing even for small packets associated with IP voice applications.
The future of wireless is ultra-broadband packet throughput, with 4G/LTE speeds hitting 25 Mbps to 50 Mbps¹ and 5G technologies targeting even faster speeds. But the IP mobile networks that are serving up this throughput have new security risks for MNOs that can negatively impact their infrastructure, operations, customer services, and data.
Utilizing security gateways (SeGW) in every base station and small cell is the proven way to secure the network against hackers. But legacy gateways don’t offer the performance or flexibility to scale for cost-effective deployment at a macrocell or at a small cell. Casa Systems worked with Intel and Intel® Network Builders ecosystem members Advantech and Wind River to build a complete virtual SeGW system with the performance and flexibility for these edge locations—even for demanding IP voice applications that transmit floods of small packets that typically have overwhelmed legacy gateways.
A novel architecture for lightweight block cipher, piccoloeSAT Journals
This document summarizes a novel architecture for the Piccolo lightweight block cipher that is optimized for constrained devices like RFID tags and wireless sensors. Piccolo has a 64-bit block size and supports 80-bit or 128-bit keys. The proposed architecture shares the key scheduling block for two plaintext blocks concurrently to improve throughput and speed compared to the conventional Piccolo architecture. The new architecture is implemented using Matlab simulation software.
This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
This document proposes a software defined network (SDN) based architecture for internet of things (IoT) devices on a manufacturing shop floor. It aims to achieve high availability, security, and real-time data transfer. The SDN architecture separates the control plane from the data plane, allowing for centralized, programmable network management. IoT sensors, actuators, and mobile devices are integrated with machines to collect and transmit production data. The proposed system uses SDN to securely connect IoT devices to cloud servers via an IoT controller, addressing challenges around IoT security, scalability, and data handling on the manufacturing network.
Moving From Contactless to Wireless Technologies in Secure, Over-the-Air Tran...Underwriters Laboratories
This UL white paper discusses some of the many issues and challenges that must be addressed in the future deployment of wireless technology for the processing
of secure transactions. It begins with a discussion of the strengths and limitations of both contactless and wireless technologies. The white paper then reviews and assesses internal system risks, as well as external security concerns, for both technologies. The paper concludes with some thoughts on the future use of wireless technology in secure transactions, and how manufacturers can provide assurances to both system providers and users regarding the security of their private data.
This document discusses using a hierarchical certificate authority with elliptic curve cryptography to improve security in ZigBee networks. It begins with an overview of the Internet of Things and wireless sensor networks. It then discusses ZigBee protocols and vulnerabilities in key distribution and management. The document proposes a solution using a hierarchical certificate authority to calculate, store, and distribute certificates with elliptic curve cryptography to nodes in the network. This is intended to provide a more secure, reliable, and scalable approach for authentication in 802.15.4 networks.
Review on AES Algorithm Based Secure Data Transmission for Wireless Sensor Ne...EECJOURNAL
Due to vast development of information technology the need of the protection of data also increases for that purpose encryption is done. The security requirements include four major aspect data confidentiality, data integrity, data authentication and data freshness. WSNs have produced enormous enthusiasm among analysts these years in view of their potential utilization in a wide assortment of uses. Sensor hubs are cheap compact gadgets with restricted handling force and vitality assets. Sensor hubs can be utilized to gather data from the earth, locally process this information and transmit the detected information back to the client. For securing that data from attack many algorithms came in existence for cryptography purpose. Be that as it may, the outstanding amongst other existing symmetric security calculation to give information security utilized these days is Advanced encryption standard (AES).
This document proposes using certificate authorities and elliptic curve cryptography to improve security in Zigbee wireless sensor networks. It summarizes Zigbee vulnerabilities like insecure key distribution and lack of key revocation. It then describes a proposed solution where a key distribution center uses ECC to establish session keys between nodes, improving security over the standard Zigbee approach. Finally, it recommends an innovative hybrid solution combining certificate authorities and ECC to further reduce vulnerabilities when nodes enter or exit large-scale IoT networks.
Virtual security gateways at network edge are key to protecting ultra broadba...Paul Stevens
Combined technologies create a virtualized security gateway with real-time processing even for small packets associated with IP voice applications.
The future of wireless is ultra-broadband packet throughput, with 4G/LTE speeds hitting 25 Mbps to 50 Mbps¹ and 5G technologies targeting even faster speeds. But the IP mobile networks that are serving up this throughput have new security risks for MNOs that can negatively impact their infrastructure, operations, customer services, and data.
Utilizing security gateways (SeGW) in every base station and small cell is the proven way to secure the network against hackers. But legacy gateways don’t offer the performance or flexibility to scale for cost-effective deployment at a macrocell or at a small cell. Casa Systems worked with Intel and Intel® Network Builders ecosystem members Advantech and Wind River to build a complete virtual SeGW system with the performance and flexibility for these edge locations—even for demanding IP voice applications that transmit floods of small packets that typically have overwhelmed legacy gateways.
A novel architecture for lightweight block cipher, piccoloeSAT Journals
This document summarizes a novel architecture for the Piccolo lightweight block cipher that is optimized for constrained devices like RFID tags and wireless sensors. Piccolo has a 64-bit block size and supports 80-bit or 128-bit keys. The proposed architecture shares the key scheduling block for two plaintext blocks concurrently to improve throughput and speed compared to the conventional Piccolo architecture. The new architecture is implemented using Matlab simulation software.
This document summarizes a research paper that proposes a design for a secure, Wi-Fi integrated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM consists of a sophisticated meter with additional security features compared to traditional meters. It uses Wi-Fi communication, a microcontroller, and a centralized monitoring and control unit. Random number addressing cryptography (RAC) is chosen as the most secure encryption technique. The meter in each home connects via a wireless network to a server that calculates billing amounts and sends updates to be displayed on the home meter, reducing labor while increasing transparency. The design aims to provide secure communication at high speeds with an advanced metering system and unique database backend.
Software Defined Network Based Internet on thing Eco System for ShopfloorIRJET Journal
This document proposes a software defined network (SDN) based architecture for internet of things (IoT) devices on a manufacturing shop floor. It aims to achieve high availability, security, and real-time data transfer. The SDN architecture separates the control plane from the data plane, allowing for centralized, programmable network management. IoT sensors, actuators, and mobile devices are integrated with machines to collect and transmit production data. The proposed system uses SDN to securely connect IoT devices to cloud servers via an IoT controller, addressing challenges around IoT security, scalability, and data handling on the manufacturing network.
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
This document summarizes a research paper that proposes an enhanced encryption algorithm called Enhanced SIT for securing data in embedded systems and IoT devices. The algorithm is designed to be lightweight and suitable for resource-constrained devices. It operates on 64-bit blocks using a 128-bit key and incorporates a Feistel network structure. Simulation results showed the algorithm provided security within 10 encryption rounds. When implemented on a microcontroller, it had low code size and memory usage. The paper compares the performance of the proposed algorithm to other common algorithms like AES. In conclusion, Enhanced SIT is presented as an efficient and secure encryption method suitable for embedded applications and IoT security.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
Device to device (D2D) communications facilitate proximal devices to directly communicate with each other, by passing cellular base stations or access points, and bring many benefits such as improvement in both spectral efficiency and energy efficiency. Among existing D2D enabling techniques, the recently released Wi-Fi Direct is one promising protocol that offers high data rate D2D communications in local areas.
Dual Authentication For Bluetooth ConnectionIJERA Editor
Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the protocol thwarts the passive and active eavesdropping attacks which exist during SSP. These attacks are defeated by avoiding the exchange of passwords and public keys in plain text between the Master and the Slave. Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection.
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
This document discusses security aspects of internet of things (IoT) devices and proposes solutions. It summarizes 3 existing approaches:
1) An IoT reference model that includes authorization, encryption, and authentication mechanisms at each layer independently.
2) A protocol for IoT security using elliptic curve cryptography to allow encryption and decryption of messages between devices and gateways.
3) A mechanism using elliptic curve cryptography to provide security for communication between IPv4 and IPv6 networks, translating addresses and incorporating encryption.
The document also motivates the need for lightweight cryptographic algorithms for resource-constrained IoT devices and surveys existing schemes to provide confidentiality, integrity, and availability while addressing vulnerabilities.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
This document discusses using JavaScript for Internet of Things (IoT) applications. It describes IoT as physical objects embedded with electronics, software and sensors that can collect and exchange data. It provides examples of IoT use cases and discusses common IoT protocols, sensors, embedded software tools and platforms. It also covers topics like security, communicating with microcontrollers using Firmata and building IoT projects with Johnny-Five and Node-RED.
The document compares OPC UA and DDS, two key protocols for industrial IoT. OPC UA is object-oriented and client-server, targeting simpler systems with device interchangeability needs. DDS is data-centric and peer-to-peer, more suitable for systems with primary software integration challenges. Both communities are working to ensure their technologies can work together, preserving investments as architectures evolve.
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and
availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN
integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS)
attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared
to Kumar et al. protocol.
The document proposes a security model for wireless sensor networks using zero knowledge protocol. It addresses security threats like cloning attacks, man-in-the-middle attacks, and replay attacks. The model uses a unique fingerprint for each node based on its neighboring nodes to detect cloning. It also uses zero knowledge protocol for sensor nodes to verify authenticity without transmitting cryptographic information, preventing man-in-the-middle and replay attacks. The paper analyzes the performance and security of the proposed model.
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
This document summarizes research analyzing side channel attacks on cryptographic algorithms. It analyzes the RSA and IDEA algorithms under normal conditions and when subjected to side channel timing attacks. The researchers implemented a side channel attack method by connecting computers over a network and recording timing data leaked during encryption. They also attempted to strengthen the algorithms against such attacks by using elliptic curve cryptography to generate large random integers as inputs, but this was not effective for RSA due to the rarity of large prime numbers produced. For IDEA, integrating elliptic curve cryptography in this way showed more positive results by introducing randomness into the timing data.
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
This document proposes a double stage encryption algorithm to securely store multimedia content like images, audio, and video in the cloud. In the first stage, multimedia content is encrypted into ciphertext using AES symmetric encryption. The ciphertext is then encrypted again in the cloud using a randomly generated symmetric key for added security. This makes it difficult for attackers to extract the encryption key and recover the original multimedia content even if they obtain the ciphertext. The algorithm aims to provide security against side channel attacks in cloud computing through its use of random key generation and double encryption. It is described as having low complexity and wide applicability for safeguarding multimedia content in the cloud.
Learn how artificial intelligence impacts performance, security, compute, and resources within the network.
Speakers:
“Ali” Osamah Mohammed Ali and Wes Jensen, Netrolix
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
This document discusses a proposed hybrid technique that combines Fast Fourier Transform (FFT) and Deoxyribonucleic acid (DNA) sequence operations to improve security in Radio Frequency Identification (RFID) authentication protocols. The technique encrypts data using both FFT and DNA encryption methods instead of relying on a single encryption technique. Experimental results show the hybrid technique provides stronger security and faster transmission speeds compared to existing elliptic curve cryptography techniques. It can resist man-in-the-middle, replay, and impersonation attacks. The hybrid technique applies FFT and DNA encryption to the RFID authentication process between a tag and reader.
Privacy & Security Aspects in Mobile NetworksDefCamp
This document summarizes a presentation on privacy and security aspects in mobile networks from 1G to 5G. It discusses how mobile network architectures and security have evolved with each generation, from basic access control and authentication in 2G to longer encryption keys, mutual authentication, and new key hierarchies in 4G and 5G. It provides examples of past attacks on mobile networks and how they have become easier to carry out as tools have become more widely available. Specifically, it discusses how subscriber identification methods have changed from sending IMSI in cleartext in 2G to concealed SUPI in 5G. The presentation emphasizes that securing systems is difficult and that we must learn from past mistakes as new technologies are developed.
IEI has for decades been dedicated to industrial automation. IEI smart transportation solutions focus on railway, vehicle, and marine intelligent solutions. Smart transportation helps enterprise and people to improve efficiency during the journey from varied data acquisition, analysis, and precise prediction. Furthermore, with real-time streaming NVR (Network Video Recorder) logs, critical moments can be recorded when accident happens, therefore enhancing safety of drivers and passengers on the move.
IEI has a complete line of transportation products which are fanless and designed to resist vibration, shock, and extreme temperatures. IEI's transportation products support iRIS solution which is an easy way to remotely control and manage all your devices.
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
Proposed value projection hierarchy model for fibreglassiaemedu
This document discusses a proposed value projection hierarchy model for fibreglass reinforced plastic (FRP) products. The model consists of 5 steps: 1) understanding the product knowledge of FRP products, 2) understanding customer information by studying customers in Himachal Pradesh, 3) understanding the product value of FRP products, 4) understanding the customer value, and 5) matching customer values with product values. The document provides details about each step and uses FRP products and customers in Himachal Pradesh as examples to explain how the model can be applied. It discusses understanding both the product and customer to effectively position value and communicate how FRP products can provide value to customers.
Creative services and tools for guiding multimediaiaemedu
This document summarizes tools and processes for developing multimedia applications. It discusses the importance of creative services in multimedia development. The two main processes covered are pre-production and motion capture. Pre-production involves planning content, breaking down scripts, and designing characters and storyboards. Popular tools for character design discussed include 3DS Max 2013, Poser Pro 2012, and Autodesk Maya 2013. The document also provides examples of using storyboards to plan and organize a multimedia project.
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
This document summarizes a study on modeling temperature distribution in workpieces during surface grinding using finite element analysis. It begins by discussing how thermal damage from grinding is caused by high temperatures and residual stresses. It then presents a finite element thermal model to calculate grinding temperatures and their distribution in the workpiece. The model considers the grinding wheel as a moving heat source on the workpiece surface. Results from the model show that maximum temperature occurs at the trailing edge of the contact area and just below the surface. The study concludes the model provides a good understanding of the grinding process and can be used to determine optimal process parameters.
IRJET- Enhanced SIT Algorithm for Embedded SystemsIRJET Journal
This document summarizes a research paper that proposes an enhanced encryption algorithm called Enhanced SIT for securing data in embedded systems and IoT devices. The algorithm is designed to be lightweight and suitable for resource-constrained devices. It operates on 64-bit blocks using a 128-bit key and incorporates a Feistel network structure. Simulation results showed the algorithm provided security within 10 encryption rounds. When implemented on a microcontroller, it had low code size and memory usage. The paper compares the performance of the proposed algorithm to other common algorithms like AES. In conclusion, Enhanced SIT is presented as an efficient and secure encryption method suitable for embedded applications and IoT security.
Protocols for Wireless Sensor Networks and Its SecurityIJERA Editor
This paper proposes a protocol for Wireless Sensor Networks and its security which are characterized by severely constrained computational and energy resources, and an ad hoc operational environment. The paper first introduces sensor networks, and discusses security issues and goals along with security problems, threats, and risks in sensor networks. It describes crippling attacks against all of them and suggests countermeasures and design considerations. It gives a brief introduction of proposed security protocol SPINS whose building blocks are SNEP and μTESLA which overcome all the important security threats and problems and achieves security goals like data confidentiality, freshness, authentication in order to provide a secure Wireless Sensor Network
This document discusses lightweight cryptography. It begins by defining lightweight cryptography as cryptographic primitives designed for devices with limited resources like memory, speed and power consumption. It then outlines various lightweight cryptographic mechanisms like block ciphers, hash functions, stream ciphers and authenticated ciphers. For each mechanism, it discusses their desirable properties and design principles. It also discusses implementation issues like decryption costs and resistance to related key attacks. Finally, it mentions the Fair Evaluation of Lightweight Cryptographic Systems (FELICS) benchmarking tool for evaluating and comparing the performance of lightweight cryptographic algorithms on different platforms.
Device to device (D2D) communications facilitate proximal devices to directly communicate with each other, by passing cellular base stations or access points, and bring many benefits such as improvement in both spectral efficiency and energy efficiency. Among existing D2D enabling techniques, the recently released Wi-Fi Direct is one promising protocol that offers high data rate D2D communications in local areas.
Dual Authentication For Bluetooth ConnectionIJERA Editor
Recently, Bluetooth technology is widely used by organizations and individuals to provide wireless personal area network (WPAN). This is because the radio frequency (RF) waves can easily penetrate obstacles and can propagate without direct line-of-sight (LoS). These two characteristics have led to replace wired communication by wireless systems. However, there are serious security challenges associated with wireless communication systems because they are easier to eavesdrop, disrupt and jam than the wired systems. Bluetooth technology started with a form of pairing called legacy pairing prior to any communication. However, due to the serious security issues found in the legacy pairing, a secure and simple pairing called SPP was announced with Bluetooth 2.1 and later since 2007. SPP has solved the main security issue which is the weaknesses of the PIN code in the legacy pairing, however it has been found with some vulnerabilities such as eavesdropping and man-in-the-middle (MITM) attacks. Since the discovery of these vulnerabilities, some enhancements have been proposed to the Bluetooth Specification Interest Group (SIG) which is the regulatory body of Bluetooth technology; nevertheless, some proposed enhancements are ineffective or are not yet implemented by Manufacturers. Therefore, an improvement of the security authentication in Bluetooth connection is highly required to overcome the existing drawbacks. This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. The result was verified on a Graphical User Interface (GUI) built in Microsoft Visual Studio 2010 with C sharp as default environment. It has shown that the proposed scheme works perfectly with the used hardware and software. In addition, the protocol thwarts the passive and active eavesdropping attacks which exist during SSP. These attacks are defeated by avoiding the exchange of passwords and public keys in plain text between the Master and the Slave. Therefore, this protocol is expected to be implemented by the SIG to enhance the security in Bluetooth connection.
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...IRJET Journal
This document discusses security aspects of internet of things (IoT) devices and proposes solutions. It summarizes 3 existing approaches:
1) An IoT reference model that includes authorization, encryption, and authentication mechanisms at each layer independently.
2) A protocol for IoT security using elliptic curve cryptography to allow encryption and decryption of messages between devices and gateways.
3) A mechanism using elliptic curve cryptography to provide security for communication between IPv4 and IPv6 networks, translating addresses and incorporating encryption.
The document also motivates the need for lightweight cryptographic algorithms for resource-constrained IoT devices and surveys existing schemes to provide confidentiality, integrity, and availability while addressing vulnerabilities.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Determining an Optimal Number of Access Points Using GPS data to Secure a Wir...CSCJournals
Determination of the position enables location awareness for mobile computers in any place and persistent wireless computing. In addition utilizing location information, location aware computers can render location based services possible for mobile users. In order to design and implement a technique to identify the source network interface card, a feasibility study should be done to keep the project within the budget; also tracking of new technologies will enhance the methodology of choosing these techniques. Wireless Local Area Network (WLAN) is vulnerable to malicious attacks due to their shared medium in unlicensed frequency spectrum, thus requiring security features for a variety of applications. This paper will discuss a technique that helps in determining the best location for access points using GPS system, in order to choose the optimal number of them; which guide to localize and identify attacks with optimal IDS method and cheapest price. The other thing is to locate the intruder within the monitored area by using a hybrid technique, which came from exist techniques, by focusing on the advantages of these techniques and come with a new one to give more accurate results with less price by using available resources
This document discusses using JavaScript for Internet of Things (IoT) applications. It describes IoT as physical objects embedded with electronics, software and sensors that can collect and exchange data. It provides examples of IoT use cases and discusses common IoT protocols, sensors, embedded software tools and platforms. It also covers topics like security, communicating with microcontrollers using Firmata and building IoT projects with Johnny-Five and Node-RED.
The document compares OPC UA and DDS, two key protocols for industrial IoT. OPC UA is object-oriented and client-server, targeting simpler systems with device interchangeability needs. DDS is data-centric and peer-to-peer, more suitable for systems with primary software integration challenges. Both communities are working to ensure their technologies can work together, preserving investments as architectures evolve.
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...IJCNCJournal
Radio Frequency IDentification (RFID) and Wireless Sensor Networks (WSN) are the two most prominent wireless technologies for implementing a complete smart environment for the Internet of Things (IoT). Both RFID and WSN are resource constraint devices, which forces us to go for lightweight cryptography for security purposes. Security in terms of confidentiality, integrity, authentication, authorization, and
availability. Key management is one of the major constraints for resource constraint mobile sensor devices. This work is an extension of the work done by Kumar et al. using efficient error prediction and limit of agreement for anomaly score. This work ensures cryptographic property, availability, in RFID-WSN
integrated network through outlier detection mechanism for 50 to 5000 nodes network. Through detection ratios and anomaly scores system is tested against outliers. The proposed outlier detection mechanism identifies the inliers and outliers through anomaly score for protection against Denial-of-Service (DoS)
attack. Intruders can be detected in few milliseconds without giving any conflict to the access rights. In terms of throughput, a minimum improvement of 6.2% and a maximum of 219.9% is observed for the proposed protocol as compared to Kumar et al. Protocol and in terms of percentage of Packet Delivery Ratio (PDR), a minimum improvement of 8.9% and a maximum of 19.5% is observed for the proposed protocol as compared
to Kumar et al. protocol.
The document proposes a security model for wireless sensor networks using zero knowledge protocol. It addresses security threats like cloning attacks, man-in-the-middle attacks, and replay attacks. The model uses a unique fingerprint for each node based on its neighboring nodes to detect cloning. It also uses zero knowledge protocol for sensor nodes to verify authenticity without transmitting cryptographic information, preventing man-in-the-middle and replay attacks. The paper analyzes the performance and security of the proposed model.
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMSJournal For Research
This document summarizes research analyzing side channel attacks on cryptographic algorithms. It analyzes the RSA and IDEA algorithms under normal conditions and when subjected to side channel timing attacks. The researchers implemented a side channel attack method by connecting computers over a network and recording timing data leaked during encryption. They also attempted to strengthen the algorithms against such attacks by using elliptic curve cryptography to generate large random integers as inputs, but this was not effective for RSA due to the rarity of large prime numbers produced. For IDEA, integrating elliptic curve cryptography in this way showed more positive results by introducing randomness into the timing data.
IRJET- Multimedia Content Security with Random Key Generation Approach in...IRJET Journal
This document proposes a double stage encryption algorithm to securely store multimedia content like images, audio, and video in the cloud. In the first stage, multimedia content is encrypted into ciphertext using AES symmetric encryption. The ciphertext is then encrypted again in the cloud using a randomly generated symmetric key for added security. This makes it difficult for attackers to extract the encryption key and recover the original multimedia content even if they obtain the ciphertext. The algorithm aims to provide security against side channel attacks in cloud computing through its use of random key generation and double encryption. It is described as having low complexity and wide applicability for safeguarding multimedia content in the cloud.
Learn how artificial intelligence impacts performance, security, compute, and resources within the network.
Speakers:
“Ali” Osamah Mohammed Ali and Wes Jensen, Netrolix
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFI...IRJET Journal
This document discusses a proposed hybrid technique that combines Fast Fourier Transform (FFT) and Deoxyribonucleic acid (DNA) sequence operations to improve security in Radio Frequency Identification (RFID) authentication protocols. The technique encrypts data using both FFT and DNA encryption methods instead of relying on a single encryption technique. Experimental results show the hybrid technique provides stronger security and faster transmission speeds compared to existing elliptic curve cryptography techniques. It can resist man-in-the-middle, replay, and impersonation attacks. The hybrid technique applies FFT and DNA encryption to the RFID authentication process between a tag and reader.
Privacy & Security Aspects in Mobile NetworksDefCamp
This document summarizes a presentation on privacy and security aspects in mobile networks from 1G to 5G. It discusses how mobile network architectures and security have evolved with each generation, from basic access control and authentication in 2G to longer encryption keys, mutual authentication, and new key hierarchies in 4G and 5G. It provides examples of past attacks on mobile networks and how they have become easier to carry out as tools have become more widely available. Specifically, it discusses how subscriber identification methods have changed from sending IMSI in cleartext in 2G to concealed SUPI in 5G. The presentation emphasizes that securing systems is difficult and that we must learn from past mistakes as new technologies are developed.
IEI has for decades been dedicated to industrial automation. IEI smart transportation solutions focus on railway, vehicle, and marine intelligent solutions. Smart transportation helps enterprise and people to improve efficiency during the journey from varied data acquisition, analysis, and precise prediction. Furthermore, with real-time streaming NVR (Network Video Recorder) logs, critical moments can be recorded when accident happens, therefore enhancing safety of drivers and passengers on the move.
IEI has a complete line of transportation products which are fanless and designed to resist vibration, shock, and extreme temperatures. IEI's transportation products support iRIS solution which is an easy way to remotely control and manage all your devices.
A secure intrusion detection system against ddos attack in wireless mobile ad...vishnuRajan20
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
Proposed value projection hierarchy model for fibreglassiaemedu
This document discusses a proposed value projection hierarchy model for fibreglass reinforced plastic (FRP) products. The model consists of 5 steps: 1) understanding the product knowledge of FRP products, 2) understanding customer information by studying customers in Himachal Pradesh, 3) understanding the product value of FRP products, 4) understanding the customer value, and 5) matching customer values with product values. The document provides details about each step and uses FRP products and customers in Himachal Pradesh as examples to explain how the model can be applied. It discusses understanding both the product and customer to effectively position value and communicate how FRP products can provide value to customers.
Creative services and tools for guiding multimediaiaemedu
This document summarizes tools and processes for developing multimedia applications. It discusses the importance of creative services in multimedia development. The two main processes covered are pre-production and motion capture. Pre-production involves planning content, breaking down scripts, and designing characters and storyboards. Popular tools for character design discussed include 3DS Max 2013, Poser Pro 2012, and Autodesk Maya 2013. The document also provides examples of using storyboards to plan and organize a multimedia project.
Model for prediction of temperature distribution in workpiece for surface gri...iaemedu
This document summarizes a study on modeling temperature distribution in workpieces during surface grinding using finite element analysis. It begins by discussing how thermal damage from grinding is caused by high temperatures and residual stresses. It then presents a finite element thermal model to calculate grinding temperatures and their distribution in the workpiece. The model considers the grinding wheel as a moving heat source on the workpiece surface. Results from the model show that maximum temperature occurs at the trailing edge of the contact area and just below the surface. The study concludes the model provides a good understanding of the grinding process and can be used to determine optimal process parameters.
Optimization of cutting parameters in dry turning operation of mild steeliaemedu
This document summarizes an experiment that optimized cutting parameters for dry turning of mild steel. 27 turning experiments were conducted using Taguchi's L27 orthogonal array to examine the effects of depth of cut, feed rate, and spindle speed on surface roughness. Analysis of variance found that depth of cut was the only significant factor. The optimal parameters to minimize surface roughness were a depth of cut of 0.5mm, feed rate of 0.02mm/rev, and spindle speed of 25.12rpm. These results show that depth of cut has the greatest influence on surface roughness in dry turning of mild steel.
Design and experimental investigations of pressureiaemedu
This document describes the design and experimental testing of a pressure swirl atomizer nozzle for a 20 kW gas turbine engine. It details the design process for the nozzle, which is designed to produce a 30° spray cone angle for atomizing kerosene fuel. Experimental investigations are conducted to measure the spray penetration length and cone angle produced by the nozzle. A test setup is developed that allows for measurement of these spray characteristics, which are important parameters for combustion chamber design. The droplet size produced by the nozzle is also measured using scanning electron microscopy. The design and experimental work presented in this document aims to optimize engine performance by matching the nozzle spray properties to the combustion chamber geometry.
Extraction of qrs complexes using automated bayesian regularization neural ne...iaemedu
This document summarizes a research paper that presents an algorithm for detecting QRS complexes in ECG signals using a Bayesian regularization neural network. The algorithm preprocesses the ECG data using a bandpass filter and differentiation to remove noise and baseline drift. It then trains a feedforward neural network using Bayesian regularization to learn the characteristics of QRS complexes and detect R peaks. When tested on a standard ECG database, the algorithm achieved high detection performance with a detection rate of 98.5%, sensitivity of 98.41% and positive predictivity of 98.6%.
An analytical study on investors’ awareness and perception towards the hedge ...iaemedu
The document is a research paper that analyzes the status of public healthcare management across Indian states using a multi-criteria decision making (MCDM) approach. It ranks the states based on 30 indicators related to healthcare outcomes and resources. The paper uses the Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) MCDM method, which identifies ideal and negative-ideal solutions to rank the states based on their distance from these solutions while accounting for the relative weight of each indicator. The paper concludes that states in South India rank higher in terms of public healthcare management compared to other parts of the country.
The effect of geometrical parameters on mixing and parallel jets mixing in a ...iaemedu
The document summarizes an experimental study on the mixing of parallel liquid jets in a static mixer. Key findings from computational fluid dynamics (CFD) analysis and experimental investigations using a conductivity probe technique are presented. The experiments and CFD analysis revealed that mixing efficiency increases with the opening of parallel ports and as the primary fluid nozzle is positioned 50mm from the throat entrance with mixing inserts. Geometrical parameters like the position of inlet ports, cone angle of the suction nozzle, and position of the driving nozzle were found to influence mixing.
High performance parallel prefix adders with fast carry chain logiciaemedu
This document discusses and compares different types of parallel prefix adders. It begins by introducing binary adders and describing the three stages of prefix addition: pre-computation, prefix-computation, and post-computation. It then describes several types of carry tree adders, including Brent-Kung, Kogge-Stone, Ladner-Fischer, and Han-Carlson adders. While Kogge-Stone and Han-Carlson adders have the fastest delay for ASIC implementation, carry chain structures on FPGAs make simple adders faster for FPGA implementation. The document proposes modifying the Kogge-Stone adder with fast carry logic to make it more suitable for FPGAs. Simulation results show that the
Job satisfaction and contributing variables among the bank employees in cudda...iaemedu
This document summarizes a study on job satisfaction and contributing variables among bank employees in Cuddalore District, India. The study found that the majority (65.7%) of employees reported high job satisfaction, while 16% reported low satisfaction and 18.3% reported medium satisfaction. A regression analysis showed that job involvement, organizational climate, and organizational commitment significantly contributed to job satisfaction. Job involvement had the highest influence on satisfaction. The study provides suggestions for improving job satisfaction, such as ensuring job security, improving relationships among coworkers and supervisors, and fulfilling employees' needs.
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
This document discusses various cryptographic techniques for securing data shared over cloud computing. It begins with an introduction to cloud computing and the types of cloud services. It then discusses some critical threats to cloud security like unauthorized access, lack of integrity checks, and denial of service attacks. The document analyzes popular encryption algorithms like RSA, AES, DES, Blowfish and IDEA that can be applied for cloud data security. It provides details on how each algorithm works and compares their characteristics. The document concludes that a multilevel security architecture applying multiple encryption algorithms is needed to securely transmit data over the cloud.
4.report (cryptography & computer network)JIEMS Akkalkuwa
This document discusses network security and cryptography. It begins by defining network security and explaining the key areas of secrecy, authentication, non-repudiation, and integrity control. It then discusses what cryptography is, explaining that it uses mathematics to encrypt and decrypt data to provide security. The document provides an overview of symmetric and asymmetric key encryption techniques as well as hash functions. It also discusses some existing network security systems and their use of symmetric encryption with periodic key distribution and refresh.
This document summarizes a research paper that designed and implemented a Quality of Security Service (QoSS)-compliant Advanced Encryption Standard (AES) processor for use in multimedia applications. The processor uses a reconfigurable architecture that can provide up to 12 different AES cipher schemes with reasonable hardware costs. It allows users to specify security requirements through a security vector. Evaluation showed the QoSS-AES processor can provide high security for multimedia communications like MPEG video with low latency. Implementation on FPGAs demonstrated competitive speed, area and power performance compared to other FPGA-based AES designs.
The Internet of Things (IoT) offers many industries significant new opportunities, but it also exposes them and their customers to a host of security issues. Securing the IoT requires new ways of thinking that can defend the enterprise and its customers against attackers and privacy abuses.
Implementation of the advanced encryption standard algorithm on an FPGA for ...IJECEIAES
Communication among end users can be based either on wired or wireless technology. Cryptography plays a vital role in ensuring data exchange is secure among end users. Data can be encrypted and decrypted using symmetric or asymmetric key cryptographic techniques to provide confidentiality. In wireless technology, images are exchanged through low-cost wireless peripheral devices, such as radio frequency identification device (RFID), nRF, and ZigBee, that can interface with field programmable gate array (FPGA) among the end users. One of the issues is that data exchange through wireless devices does not offer confidentiality, and subsequently, data can be lost. In this paper, we propose a design and implementation of AES-128 cipher algorithm on an FPGA board for image processing through the universal asynchronous receiver transmitter (UART) protocol. In this process, the advanced encryption standard (AES) algorithm is used to encrypt and decrypt the image, while the transmitter and receiver designs are implemented on two Xilinx BASYS-3 circuits connected with a ZigBee RF module. The encrypted image uses less memory, such as LUTs (141), and also consumes less chip power (0.0291 w), I/O (0.003), block RAM (0.001 w), data, and logic to provide much higher efficiency than wired communication technology. We also observe that images can be exchanged through the UART protocol with different baud rates in run time.
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET Journal
This document describes encrypting communication between two ESP32 IoT devices using RSA-256 cryptography. It begins with an introduction to RSA cryptography and its applications. It then discusses the ESP32 device and why it is well-suited for consumer IoT applications due to features like WiFi/Bluetooth connectivity, dual-core processing, and an integrated TCP/IP stack. The document presents the RSA encryption/decryption process at a high level and provides a simple numerical example. It then outlines the proposed system workflow where an ESP32 hub encrypts messages using RSA before transmitting to ESP32 nodes, which decrypt the messages. Flash encryption is also discussed to further improve security.
This document summarizes a research paper that proposes a design for a secure and sophisticated electricity meter called an Impregnable Device for Secured Metering (IDSM). The IDSM uses a microcontroller integrated with a smart meter to securely transmit power consumption data via a legacy Wi-Fi system. Random number addressing cryptography (RAC) is used for encryption due to its high speed, low power usage, and security. The IDSM system connects individual household meters to a centralized server that calculates billing amounts and sends updates back to the meters for display. The goal is to provide secure metering and billing that reduces human error and electricity theft while lowering costs.
This document summarizes and compares the performance of three asymmetric cryptographic algorithms (RSA, ECC, and MQQ) on ARM processor-based embedded systems. It provides background on each algorithm, including how they work and their computational complexities. The document then describes simulations conducted using the SimpleScalar tool to analyze the processing time, memory usage, and processor usage of each algorithm. The results showed that the MQQ algorithm performed better than ECC and RSA on embedded systems in terms of these metrics.
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
Smart Grid (SG) communication has recently received significant attentions to facilitate intelligent and distributed electric power transmission systems. The advent of the smart grid promises to user in an era that will bring intelligence, efficiency, and optimality to the power grid. Most of these challenges will occur as an Internet-like communications network is super imposed on top of the current power grid using wireless mesh network technologies with the 802.15.4, 802.11 and WiMAX Standards. Each of these will expose the power grid to security threats. Wireless communication offers the benefits of low cost, rapid deployment, shared communication medium, and mobility. It causes many security and privacy challenges. The concept of dynamic secret is applied to design an encryption scheme for smart grid in wireless communication. Between two parties of communication, the previous packets are coded as retransmission sequence, where retransmitted packet is marked as ―1‖ and the other is marked as ―0‖.During the communication, the retransmission sequence is generated at both sides to update the dynamic encryption key. Any missing or misjudging sequence would prevent the adversary from achieving key. A Smart Grid platform is built, employing the ZigBee protocol for wireless communication. The Simulation results show that the retransmission and packet loss in ZigBee communication are inevitable and unpredictable and it is impossible of the adversary to track the updating of dynamic encryption key. Even though the DES scheme can protect the encryption key from attackers, the hackers can obtain the keys some time, due to the block size 64 bits used by DES that makes the adversary (hacker) to hack the data. It introduces vulnerabilities and liner crypt analysis; this can be achieved by using AES scheme. The AES uses 128 bits block size for a single encryption key a data of 256 billion gigabytes can be transmitted thus its provide much more safety to user from hacker and it reduces the end to end delay and increases packet transmission rate.
Design of programmable hardware security modules for enhancing blockchain bas...IJECEIAES
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP) creation, authentication of provenance, and confidential data storage. However, blockchain encounters major security challenges due to its decentralized nature of ledgers that contain sensitive data. The research objective is to design a dedicated programmable hardware security modules scheme to safeguard and maintain sensitive information contained in the blockchain networks in the context of the IC supply chain. Thus, the blockchain framework could rely on the proposed hardware security modules and separate the entire cryptographic operations within the system as stand-alone hardware units. This work put forth a novel approach that could be considered and utilized to enhance blockchain security in real-time. The critical cryptographic components in blockchain secure hash algorithm-256 (SHA-256) and the elliptic curve digital signature algorithm are designed as separate entities to enhance the security of the blockchain framework. Physical unclonable functions are adopted to perform authentication of transactions in the blockchain. Relative comparison of designed modules with existing works clearly depicts the upper hand of the former in terms of performance parameters.
This document provides an overview of edge computing, including its evolution, driving factors, architectures, applications, trends, challenges, and device management. Edge computing aims to process data closer to where it is generated in order to reduce latency and bandwidth usage. The document outlines architectures like fog computing, cloudlet computing, and multi-access edge computing. It also discusses embedded hardware platforms, applications, and presents challenges of edge computing such as network bandwidth, security, and device management.
IRJET - Multimedia Security on Cloud Computing using CryptographyIRJET Journal
This document presents a research paper that proposes a two-stage encryption algorithm to improve security of multimedia content stored in the cloud. The first stage encrypts multimedia content into ciphertext-1 using an asymmetric private key that is randomly generated. The ciphertext-1 is then encrypted again in the cloud using a symmetric public key. During decryption, the encrypted ciphertext is first decrypted using the randomly generated key to retrieve ciphertext-1, which is then decrypted using traditional encryption methods to recover the original multimedia content. The randomly generated key makes it difficult to extract the encryption key and access the encrypted information without authorization. The proposed algorithm aims to enhance security against negligent third parties and side channel attacks in cloud computing.
Advancements in Network Infrastructure: Replication, Expansion, and Security ...IRJET Journal
This document describes research that replicates and expands on a previous paper about implementing a cloud-based middlebox solution to manage network infrastructure. The researchers established a client-server model redirecting traffic through a locally hosted middlebox to an AWS server. They validated that this replication achieved similar results to the original in terms of latency and bandwidth. Additionally, the researchers enhanced security by implementing multiple tunneling protocols, firewall configurations, and load balancing to provide improved performance and network security beyond the original paper's scope.
This document discusses techniques for remote operating system fingerprinting. It begins by explaining that remote OS fingerprinting is an important part of network surveying for attackers to determine the operating system of a remote host. It then describes how accurate remote OS fingerprinting can help attackers narrow down potential exploits to use. The document outlines the goals of an effective remote OS fingerprinting tool and discusses active vs. passive fingerprinting. It also briefly explains the roles of black hat and white hat hackers in relation to remote OS fingerprinting.
This document summarizes a research paper that proposes a new block cipher cryptographic symmetric key algorithm called the "TACIT Encryption Technique." The algorithm uses a unique mathematical logic approach along with a new key distribution system. It is implemented in a hardware chip using VHDL programming language on a Network-on-Chip model for secure data transmission. Experimental results show encryption and decryption of 128-bit blocks using an 8-bit key through simulation in Modelsim. The algorithm aims to provide better security, speed and flexibility than existing algorithms like DES, AES and RSA.
Review on security techniques for field programmable gate arrayIAEME Publication
This document summarizes previous work on using ring oscillators for FPGA security. Ring oscillators exploit manufacturing process variations between chips to generate unique identifiers. Several papers are discussed that proposed using ring oscillators and other PUFs to authenticate FPGAs and protect against hardware attacks. The document also provides an overview of FPGA manufacturing processes and applications of ring oscillators for FPGA security including generating secret keys and device authentication.
This document summarizes a research paper that proposes implementing and analyzing cryptography techniques for 5G applications using Xilinx. It discusses how lightweight cryptography plays an important role in securing data for devices with limited resources in IoT and 5G networks. The research aims to develop an efficient VLSI architecture for a lightweight encryption algorithm and compare its performance to existing algorithms. It will simulate the design using Verilog code in Xilinx and evaluate performance metrics like latency, area, power consumption and throughput.
IRJET - Data Security in Cloud Computing using Homomorphic AlgorithamIRJET Journal
This document discusses using homomorphic encryption to securely store and process data in the cloud. It begins with an introduction to cloud computing and data security challenges. The proposed system would encrypt user data before transferring it to the cloud server using homomorphic encryption. This allows computations to be performed on the encrypted data without decrypting it first, protecting data privacy. The document reviews related work on authentication schemes and secure file storage using encryption. It presents the proposed system architecture and concludes that homomorphic encryption can help address cloud computing security issues by allowing operations on encrypted user data.
Малоресурсная криптография - Сергей МартыненкоHackIT Ukraine
Презентация с форума http://hackit-ukraine.com/
Сергей Мартыненко
Ст.преп. кафедры комп. систем и сетей, ХАИ
Малоресурсная криптография
О спикере: Ст. преподаватель кафедры компьютерных сетей и систем. Опыт в области криптографической защиты информации и критических систем более 5 лет. Занимается защитой информации в малоресурсных системах.
HYBRID MODEL IN THE BLOCK CIPHER APPLICATIONS FOR HIGH-SPEED COMMUNICATIONS N...IJCNCJournal
The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one
developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.
Similar to Wrapped rsa cryptography check on window (20)
Tech transfer making it as a risk free approach in pharmaceutical and biotech iniaemedu
Tech transfer is a common methodology for transferring new products or an existing
commercial product to R&D or to another manufacturing site. Transferring product knowledge to the
manufacturing floor is crucial and it is an ongoing approach in the pharmaceutical and biotech
industry. Without adopting this process, no company can manufacture its niche products, let alone
market them. Technology transfer is a complicated, process because it is highly cross functional. Due
to its cross functional dependence, these projects face numerous risks and failure. If anidea cannot be
successfully brought out in the form of a product, there is no customer benefit, or satisfaction.
Moreover, high emphasis is in sustaining manufacturing with highest quality each and every time. It
is vital that tech transfer projects need to be executed flawlessly. To accomplish this goal, risk
management is crucial and project team needs to use the risk management approach seamlessly.
Integration of feature sets with machine learning techniquesiaemedu
This document summarizes a research paper that proposes a novel approach for spam filtering using selective feature sets combined with machine learning techniques. The paper presents an algorithm and system architecture that extracts feature sets from emails and uses machine learning to classify emails and generate rules to identify spam. Several metrics are identified to evaluate the efficiency of the feature sets, including false positive rate. An experiment is described that uses keyword lists as feature sets to train filters and compares the proposed approach to other spam filtering methods.
Effective broadcasting in mobile ad hoc networks using gridiaemedu
This document summarizes a research paper that proposes a new grid-based broadcasting mechanism for mobile ad hoc networks. The paper argues that flooding approaches to broadcasting are inefficient and cause network congestion. The proposed approach divides the network into a hierarchical grid structure. When a node needs to broadcast a message, it sends the message to the first node in the appropriate grid, which is then responsible for updating and forwarding the message within that grid. Simulation results showed the grid-based approach outperformed other broadcasting protocols and was more reliable, efficient and scalable.
Effect of scenario environment on the performance of mane ts routingiaemedu
The document analyzes the effect of scenario environment on the performance of the AODV routing protocol in mobile ad hoc networks (MANETs). It studies AODV performance under different scenarios varying network size, maximum node speed, and pause time. The performance is evaluated based on packet delivery ratio, throughput, and end-to-end delay. The results show that AODV performs best in some scenarios and worse in others, indicating that scenario parameters significantly impact routing protocol performance in MANETs.
Adaptive job scheduling with load balancing for workflow applicationiaemedu
This document discusses adaptive job scheduling with load balancing for workflow applications in a grid platform. It begins with an abstract that describes grid computing and how scheduling plays a key role in performance for grid workflow applications. Both static and dynamic scheduling strategies are discussed, but they require high scheduling costs and may not produce good schedules. The paper then proposes a novel semi-dynamic algorithm that allows the schedule to adapt to changes in the dynamic grid environment through both static and dynamic scheduling. Load balancing is incorporated to handle situations where jobs are delayed due to resource fluctuations or overloading of processors. The rest of the paper outlines the related works, proposed scheduling algorithm, system model, and evaluation of the approach.
This document summarizes research on transaction reordering techniques. It discusses transaction reordering approaches based on reducing resource conflicts and increasing resource sharing. Specifically, it covers:
1) A "steal-on-abort" technique that reorders an aborted transaction behind the transaction that caused the abort to avoid repeated conflicts.
2) A replication protocol that attempts to reorder transactions during certification to avoid aborts rather than restarting immediately.
3) Transaction reordering and grouping during continuous data loading to prevent deadlocks when loading data for materialized join views.
The document discusses semantic web services and their challenges. It provides an overview of semantic web technologies like WSDL, SOAP, UDDI, and OIL which are used to build semantic web services. The semantic web architecture adds semantics to web services through ontologies written in OWL and DAML+OIL. Key approaches to semantic web services include annotation, composition, and addressing privacy and security. However, semantic web services still face challenges in achieving their full potential due to issues in representation, reasoning, and a lack of real-world applications and data.
Website based patent information searching mechanismiaemedu
This document summarizes a research paper on developing a website-based patent information searching mechanism. It discusses how patent information can be used for technology development, rights acquisition and utilization, and management information. It describes different types of patent searches including novelty, validity, infringement, and state-of-the-art searches. It also evaluates and compares two major patent websites, Delphion and USPTO, in terms of their search capabilities and features.
Revisiting the experiment on detecting of replay and message modificationiaemedu
This document summarizes a research paper that proposes methods for detecting message modification and replay attacks in ad-hoc wireless networks. It begins with background on security issues in wireless networks and types of attacks. It then reviews existing intrusion detection systems and security techniques. Related work that detects attacks using features from the media access control layer or radio frequency fingerprinting is also discussed. The paper aims to present a simple, economical, and platform-independent system for detecting message modification, replay attacks, and unauthorized users in ad-hoc networks.
1) The document discusses the Cyclic Model Analysis (CMA) technique for sequential pattern mining which aims to predict customer purchasing behavior.
2) CMA calculates the Trend Distribution Function from sequential patterns to model purchasing trends over time. It then uses Generalized Periodicity Detection and Trend Modeling to identify periodic patterns and construct an approximating model.
3) The Cyclic Model Analysis algorithm is applied to further analyze the patterns, dividing the domain into segments where the distribution function is increasing or decreasing and applying the other techniques recursively to fully model the cyclic behavior.
Performance analysis of manet routing protocol in presenceiaemedu
This document analyzes the performance of different routing protocols in a mobile ad hoc network (MANET) under hybrid traffic conditions. It simulates a MANET with 50 nodes moving at speeds up to 20 m/s using the AODV, DSDV, and DSR routing protocols. Traffic included both constant bit rate and variable bit rate sources. Results found that AODV had lower average end-to-end delay and higher packet delivery ratios than DSDV and DSR as the percentage of variable bit rate traffic increased. AODV also performed comparably under both low and high node mobility scenarios with hybrid traffic.
Performance measurement of different requirements engineeringiaemedu
This document summarizes a research paper that compares the performance of different requirements engineering (RE) process models. It describes three RE process models - two existing linear models and the authors' iterative model. It also reviews literature on common RE activities and issues with descriptive models not reflecting real-world practices. The authors conducted interviews at two Indian companies to model their RE processes and compare them to the three models. They found the existing linear models did not fully capture the iterative nature of observed RE processes.
This document proposes a mobile safety system for automobiles that uses Android operating system. The system has two main components: a safety device and an automobile base unit. The safety device allows users to monitor the vehicle's location on a map, check its status, and control functions remotely. It communicates with the base unit in the vehicle using GPRS. The base unit collects data from sensors, determines the vehicle's GPS location, and can execute control commands like activating the brakes or switching off the engine. The document provides details on the design and algorithms of both components and includes examples of Java code implementation. The goal is to create an intelligent, secure and easy-to-use mobile safety system for vehicles using embedded systems and Android
Efficient text compression using special character replacementiaemedu
The document describes a proposed algorithm for efficient text compression using special character replacement and space removal. The algorithm replaces words with non-printable ASCII characters or combinations of characters to compress text files. It uses a dynamic dictionary to map words to their symbols. Spaces are removed from the compressed file in some cases to further reduce file size. Experimental results show the algorithm achieves better compression ratios than LZW, WinZip 10.0 and WinRAR 3.93 for various text file types while allowing lossless decompression.
The document discusses agile programming and proposes a new methodology. It provides an overview of existing agile methodologies like Scrum and Extreme Programming. Scrum uses short sprints to define tasks and deadlines. Extreme Programming focuses on practices like test-first development, pair programming, and continuous integration. The document notes drawbacks like an inability to support large or multi-site projects. It proposes designing a new methodology that combines the advantages of existing methods while overcoming their deficiencies.
Adaptive load balancing techniques in global scale grid environmentiaemedu
The document discusses various adaptive load balancing techniques for distributed applications in grid environments. It first describes adaptive mesh refinement algorithms that partition computational domains using space-filling curves or by distributing grids independently or at different levels. It also discusses dynamic load balancing using tiling and multi-criteria geometric partitioning. The document then covers repartitioning algorithms based on multilevel diffusion and the adaptive characteristics of structured adaptive mesh refinement applications. Finally, it discusses adaptive workload balancing on heterogeneous resources by benchmarking resource characteristics and estimating application parameters to find optimal load distribution.
A survey on the performance of job scheduling in workflow applicationiaemedu
This document summarizes a survey on job scheduling performance in workflow applications on grid platforms. It discusses an adaptive dual objective scheduling (ADOS) algorithm that takes both completion time and resource usage into account for measuring schedule performance. The study shows ADOS delivers good performance in completion time, resource usage, and robustness to changes in resource performance. It also describes the system architecture used, which includes a planner and executor component. The planner focuses on scheduling to minimize completion time while considering resource usage, and can reschedule if needed. The executor enacts the schedule on the grid resources.
A survey of mitigating routing misbehavior in mobile ad hoc networksiaemedu
This document summarizes existing methods to detect misbehavior in mobile ad hoc networks (MANETs). It discusses how routing protocols assume nodes will cooperate fully, but misbehavior like packet dropping can occur. It describes several techniques to detect misbehavior, including watchdog, ACK/SACK, TWOACK, S-TWOACK, and credit-based/reputation-based schemes. Credit-based schemes use virtual currencies to provide incentives for nodes to forward packets, while reputation-based schemes track nodes' past behaviors. The document aims to survey approaches for mitigating the impact of misbehaving nodes in MANET routing.
A novel approach for satellite imagery storage by classifyiaemedu
This document presents a novel approach for classifying and storing satellite imagery by detecting and storing only non-duplicate regions. It uses kernel principal component analysis to reduce the dimensionality and extract features of satellite images. Fuzzy N-means clustering is then used to segment the images into blocks. A duplication detection algorithm compares blocks to identify duplicate and non-duplicate regions. Only the non-duplicate regions are stored in the database, improving storage efficiency and updating speed compared to completely replacing existing images. Support vector machines are used to categorize the non-duplicate blocks into the appropriate classes in the existing images.
A self recovery approach using halftone images for medical imageryiaemedu
This document summarizes a proposed approach for securely transferring medical images over the internet using visual cryptography and halftone images. The approach uses error diffusion techniques to generate a halftone host image from the grayscale medical image. Shadow images are then created from the halftone host image using visual cryptography algorithms. When stacked together, the shadow images reveal the secret medical image. The halftone host image also contains an embedded logo that can be extracted to verify the integrity of the reconstructed image without a trusted third party.