Explore chapters and articles related to this topic
The Future of Security
Published in Marcus K. Weldon, The Future X Network, 2018
The increasing use of end-to-end encryption is an attempt to protect the privacy of user data in transit between two points. Perversely, this also makes it difficult for security tools to effectively monitor networks for evidence of infiltration and compromised devices. Thus, a great irony of our age is that the very mechanisms consumers and web services are using to protect our data and privacy may actually put our information at greater risk. In the future, we will need approaches that allow users to provide multiple levels of encryption and permit limited access of information by explicitly agreed-upon, trusted parties. This will form one component of a comprehensive end-to-end security architecture that encompasses endpoint (device and server) and network-based cloud security functions, which we will discuss further in this chapter.
Data Aggregation in Wireless Sensor Networks
Published in Vidushi Sharma, Anuradha Pughat, Energy-Efficient Wireless Sensor Networks, 2017
Prashant Shukla, Vidushi Sharma, Anuradha Pughat
Privacy preservation has only two concerns, i.e., internal and external. Solution of maintaining internal privacy lies in securing the network and making all the nodes as trusted nodes. To maintain external privacy, privacy-preserving data aggregation (PPDA) is implied (He et al. 2007; Erkin 2013; Xu et al. 2015). PPDA is basically categorized into two types of protocols: homogeneous protocols and heterogeneous protocols. This categorization is based on the types of nodes in the network. If all the nodes have the very same resource, then homogeneous protocols are applied; if there is more than one type of nodes in the network such as aggregator nodes and leaf nodes, then heterogeneous protocols are applied. Further, the classification is based on the type of network, cluster, tree based, centralized, or in-network. At the end, they have been divided into two types, i.e., end-to-end and hop-by-hop. In end-to-end encryption, the entire communication is encrypted. Apart from the sink and node, no one can decrypt the packets. This makes the aggregation difficult to perform, but decreases communication overhead and guarantees privacy preservation. On the other hand, in a hop-by-hop scheme, the sensor sends encrypted data packets to aggregators and over their aggregator decrypts; it aggregates data, re-encrypts the aggregated data, and sends it to the sink. This technique does not guarantee privacy preservation because the data can be read at aggregators as they have the key to decrypt packet; also, this approach increases communication overhead, but performs the aggregation in a much better manner.
Analysis of Security Issues in IoT System
Published in Asis Kumar Tripathy, Chiranji Lal Chowdhary, Mahasweta Sarkar, Sanjaya Kumar Panda, Cognitive Computing Using Green Technologies, 2021
Likhet Kashori Sahu, Sudibyajyoti Jena, Sambit Kumar Mishra, Sonali Mishra
Encryption is necessary to secure the data; in no end-to-end encryption mechanism, during the data transmission from one protocol to another, there is a need to decrypt the data at gateways level. In the end-to-end encryption mechanism, only the client or the service provider can decrypt the data, making it much more secure [73].
Feeling Moodie: Insights from a Usability Evaluation to Improve the Design of mHealth Apps
Published in International Journal of Human–Computer Interaction, 2023
Gerry Chan, Alaa Alslaity, Richard Wilson, Rita Orji
The Feeling Moodie App (Feeling Moodie: Mind Fitness by Moodie Inc., 2022) (Moodie for short) design follows a client-server architecture implemented using a Model-View-View-Model (MVVM) architecture. The system is comprised of a 3-tier architecture: (1) presentation tier, (2) business tier, and (3) data tier (Figure 1). We developed Moodie using SwiftUI (Swift-Apple Developer, n.d.), while the web server runs on a Virtual Private Server, and the data is captured by a MySQL database. The app is PIPEDA2 and HIPAA3 compliant and uses end-to-end encryption using a hash algorithm, and JSON files. The login controller at the presentation layer checks whether the user has an account or not. The system provides two login options: Email login, and Apple login. Moodie has three main components: Login, Home Screen, and Main Menu. The login accepts the user’s credentials and uses them to authenticate the user. If the authentication process is successful, the app provides access to several resources for users, as shown in Figure 1. The purpose of these resources is to help users improve their mental health individually and provide detailed longitudinal reports to health practitioners.
Investigation of Si 1−X GeX source dual material stacked gate oxide pocket doped hetero-junction TFET for low power and RF applications
Published in International Journal of Electronics, 2023
Kaushal Kumar Nigam, Piyush Yadav, Amit Kumar
To achieve highly efficient ICs, MOSFETs have been downsized to sub-50 nanometre dimensions (Woerlee et al. 2001). Therefore, for the rapid scaling of wireless communication systems and radio-frequency integrated circuits (RFICs), MOS devices with minimal distortion and a high cut-off frequency are required. During the reception of the weak signal at the receiver, it is crucial to make the operation linear so that undesirable signals can be masked out. Next, intermodulation distortion (IMD) is one of the challenging issues that must be reduced as it causes a lot of noise in communication systems. IMD may emerge from the and order intermodulation products caused by the device’s non-linear behaviour. In digital communication systems, a lot of research work is ongoing to lower the distortion factor to assure the linearity of the wireless devices (Vellas et al. 2002). Therefore, highly efficient and advanced equipment is required in modern communication systems to offer end-to-end encryption and linear transmission. This requires improving transconductance, analog and RF characteristics, and linearity of FOMs.
Software-Defined Networking Techniques to Improve Mobile Network Connectivity: Technical Review
Published in IETE Technical Review, 2018
Secure communication link between switch and controller can be susceptible although Transport Layer Security is available and optional to be used. Namal et al. [24] introduced an OpenFlow host identity protocol (HIP) layer to handle mobility with global identities in order to address current OpenFlow's security bottleneck. New security threats such as TCP-level attacks are generated from the current OpenFlow connection that uses Secure Sockets Layer (SSL)/ Transport Layer Security (TLS) over TCP. Thus, OpenFlow Host Identity Protocol (OFHIP) integrates existing OpenFlow with diet version of HIPv1 layer for substituting SSL/TLS based mutual authentication to achieve similar security level with enhanced mobility support while providing secure key exchange, mutual authentication, and end-to-end encryption. With the proposed scheme, a host can be identified by host identifier with public key of asymmetric key-pair or host identity tag (HIT). Besides, flow rules are built on top of the cryptographic global identifiers that remained unchanged over time would reduce control traffic and processing overhead caused by dynamic address configuration; thus, flow processing. Furthermore, Internet Protocol Security (IPsec) encapsulating security payload (ESP) secure associations, which are bounded to HITs, are used by OFHIP to map HIT with incoming ESP packets. Security parameter index (SPI) value in packet is used to select an interface and source address according to SPI value set by ESP. Although different IP address will be given to MN after handoff, data will remain to be streaming inside ESP tunnel with same SPI value.