• Title/Summary/Keyword: secure transmission

Search Result 431, Processing Time 0.025 seconds

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Secure Performance Analysis Based on Maximum Capacity

  • Zheng, Xiuping;Li, Meiling;Yang, Xiaoxia
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1261-1270
    • /
    • 2020
  • The physical security layer of industrial wireless sensor networks in the event of an eavesdropping attack has been investigated in this paper. An optimal sensor selection scheme based on the maximum channel capacity is proposed for transmission environments that experience Nakagami fading. Comparing the intercept probabilities of the traditional round robin (TRR) and optimal sensor selection schemes, the system secure performance is analyzed. Simulation results show that the change in the number of sensors and the eavesdropping ratio affect the convergence rate of the intercept probability. Additionally, the proposed optimal selection scheme has a faster convergence rate compared to the TRR scheduling scheme for the same eavesdropping ratio and number of sensors. This observation is also valid when the Nakagami channel is simplified to a Rayleigh channel.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

Lightweight Individual Encryption for Secure Multicast Dissemination over WSNs (무선 센서네트워크에서 경량화 개인별 암호화를 사용한 멀티캐스트 전송기법)

  • Park, Taehyun;Kim, Seung Young;Kwon, Gu-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.115-124
    • /
    • 2013
  • In this paper, we suggest a secure data dissemination by Lightweight Individual Encryption Multicast scheme over wireless sensor networks using the individual encryption method with Forward Error Correction instead of the group key encryption method. In wireless sensor networks, a sink node disseminates multicast data to the number of sensor nodes to update the up to date software such as network re-programming and here the group key encryption method is the general approach to provide a secure transmission. This group key encryption approach involves re-key management to provide a strong secure content distribution, however it is complicated to provide group key management services in wireless sensor networks due to limited resources of computing, storage, and communication. Although it is possible to control an individual node, the cost problem about individual encryption comes up and the individual encryption method is difficult to apply in multicast data transmission on wireless sensor networks. Therefore we only use 0.16% of individually encrypted packets to securely transmit data with the unicast to every node and the rest 99.84% non-encrypted encoded packets is transmitted with the multicast for network performance.

High-Availability Virtual Communication for Cloud Access

  • Sirisutthidecha, Suthee;Maichalernnukul, Kiattisak
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3455-3473
    • /
    • 2016
  • Cloud computing is a paradigm in which information is permanently stored in servers on the Internet and cached temporarily on clients. Virtual private network (VPN) is the most widely used technology for secure cloud access. Unfortunately, VPN-based cloud services become unavailable when a VPN failure occurs. In this paper, we propose a new scheme to improve the availability of VPN connections against such failures, called high-availability virtual communication (HAVC). Unlike most of the multipath transmission schemes in the literature, the proposed scheme is implemented by using a virtualization technique, and its protocol functions are independent of existing networks - potential clients are not required to modify their applications or operating systems. Simulation results show that the HAVC can not only tolerate VPN failures but also achieve high transmission performance.

Intergenerational Transmission of Attachment: Mother's Internal Working Model of Relationships and Infant Attachment Patterns (애착의 세대간 전이 - 어머니의 내적 실행모델과 영아의 애착유형 -)

  • Jang, Mi Ja;Choi, Bok Hee
    • Korean Journal of Child Studies
    • /
    • v.20 no.1
    • /
    • pp.147-164
    • /
    • 1999
  • The purpose of this study was to investigate (1) intergenerational transmission from mother's internal working model of relationships formed in her childhood and infant's attachment patterns and (2) the associations among maternal working models, maternal sensitivity, and infant attachment patterns. The subjects were twenty 12- to 20-month-old infants and their mothers. The Adult Attachment Interview (1996) was used to assess mother's internal work model of relationships. Interviews were audio-recorded and transcribed verbatim. Each dyad was videotaped in the modified Ainsworth Strange Situation(1978) and filmed for 3 minutes in the Questionaire Situation of Smith and Pederson (1988). Mothers were classified as autonomous(F), dismissing(Ds), preoccupied(E), or unresolved/disorganized(Ud). Infants were classified as secure(B), insecure-avoidant(A), or insecure-resistant(C). Exact A/B/C/D and Ds/F/E/Ud agreement was observed in 55% of the dyads. Maternal sensitivity was related to infant attachment patterns but not to maternal working models.

  • PDF

Research on the Development Direction of Wireless Charging Technology Using Patent Analysis (특허분석을 통한 무선충전 기술방향 분석)

  • Yang, Dong Won;Lee, Haeng Byoung
    • Journal of Information Technology Services
    • /
    • v.19 no.3
    • /
    • pp.89-100
    • /
    • 2020
  • The wireless power transmission market is growing at an average annual rate of 51.5% from $ 16.4 billion in 2015 to $ 131.1 billion in 2020. However, there are limitations to commercialization due to the development of standards and technologies. Thus, this study identified trends in standards and regulations by market and by country. The research collected and filtered a total of 69,488 worldwide wireless power transfer patents by June 2019 and extracted a total of 28,555 patents. Based on this, technology development status was analyzed and predicted. In this study, long-distance and short-range technology development with high technology development difficulty and low technology development ratio could lead to growth of the entire wireless charging market. It is analyzed that investment and policy preparation are necessary to secure source technology for long-distance / near technology development than China, Japan and Europe.

Optimal Allocation of FACTS Devices Considering both Corrective and Prevenvite Mode (수정모드를 고려한 예방모드에서의 유연송전기기 최적투입계획 관한 연구)

  • Lim, Nam-Kyu;Song, Hwa-Chang;Lee, Byong-Jun
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.23-25
    • /
    • 2000
  • In recent deregulation and competitive power market environment, electric utilities plan and operate their systems for economic benefit with secure system condition. Flexible AC transmission system(FACTS) technology opens up new opportunities of controlling power and enhancing the usable capacity of present transmission system. This paper presents a method for security constrained optimal allocation of FAETS considering contingencies for the purpose of enhanced system operation. The proposed scheme uses Benders decomposition to account of both corrective and preventive mode.

  • PDF

Chaos Synchronization Using Chua's Circuit (Chua 회로를 이용한 카오스 동기화)

  • Bae, Yeong-Chul;Ko, Jae-Ho;Lee, Kwang-Won;Suh, Sam-Moon;Yim, Wha-Yeong
    • Proceedings of the KIEE Conference
    • /
    • 1996.07b
    • /
    • pp.1086-1088
    • /
    • 1996
  • A number of recent paper have investigated the feasibility of synchronizing chaotic system. In this paper we proposed the chaotic synchronization of the canonical. Chua's circuit with RLCG transmission line by drive-response system. We expect that proposed method is available to secure communication with RLCG transmission line.

  • PDF

Physical Layer Technique to Assist Authentication Based on PKI for Vehicular Communication Networks

  • Wen, Hong;Ho, Pin-Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.440-456
    • /
    • 2011
  • In this paper, we introduce a novel Public Key Infrastructure (PKI) based message authentication scheme that takes advantage of temporal and spatial uniqueness in physical layer channel responses for each transmission pair in vehicular communication networks. The proposed scheme aims at achieving fast authentication and minimizing the packet transmission overhead without compromising the security requirements, in which most messages can be authenticated through an extreme fast physical-layer authentication mechanism. We will demonstrate that the proposed secure authentication scheme can achieve very short message delay and reduced communication overhead through extensive analysis and simulation.