Explore chapters and articles related to this topic
Information Security and Management System
Published in Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala, A Comprehensive Guide to Information Security Management and Audit, 2023
Rajkumar Banoth, Narsimha Gugulothu, Aruna Kranthi Godishala
It can be defined as “measures adopted to prevent the unauthorized use, misuse, modification, or denial of use of knowledge, facts, data or capabilities”. Three aspects of IS are as follows:Security attack: Any action that comprises the security of information.Security service: It is a processing or communication service that enhances the security of the data processing systems and information transfer. The services are intended to counter security attacks by making use of one or more security mechanisms to provide the service.Security mechanism: A mechanism that is designed to detect, prevent, or recover from security.
Very-Large-Scale Integration Implementations of Cryptographic Algorithms
Published in Tomasz Wojcicki, Krzysztof Iniewski, VLSI: Circuits for Emerging Applications, 2017
Today secure storage and transfer of information as well as communication over Internet and mobile networks has become very critical. Cryptographic algorithms have been developed to provide various security services such as confidentiality, user authentication, data origin authentication, data integrity, nonrepudiation, privacy, and so on. Cryptographic algorithms are divided into two categories: symmetric-key or secret-key algorithms and asymmetric-key or public-key algorithms. Symmetric-key cryptography refers to cryptographic mechanisms in which both the sender and receiver share the same key or keys that are related in an easily computable way. In asymmetric-key cryptography, two different but mathematically related keys (not in an easily computable way) called public and private keys are used. A public-key cryptosystem is constructed in such a way that calculation of the private key is computationally infeasible from the public key.
Attacks and Security Mechanisms
Published in Yan Zhang, Jun Zheng, Honglin Hu, Security in Wireless Mesh Networks, 2008
Anjum Naveed, Salil S. Kanhere, Sanjay K. Jha
ITU-T Recommendation X.800 [29]—Security Architecture for OSI—defines the required security services for communication networks. The security services have been broadly categorized into five groups: authentication, access control or authorization, confidentiality, integrity, and non-repudiation. Security management services have also been defined aimed at ensuring availability, accountability, and event management. The security services can be categorized into two broad categories: intrusion prevention and intrusion detection. In case of intrusion prevention, measures are taken to stop the attacker from intruding into the network and launching the attack on the network. The protection can be from external as well as internal intruders. Security services of authentication, access control, data confidentiality, data integrity, and non-repudiation lead to intrusion prevention. However, intrusion prevention is insufficient to protect the network from all attacks because no prevention technique can ensure complete protection.
SDTS: Security Driven Task Scheduling Algorithm for Real-Time Applications Using Fog Computing
Published in IETE Journal of Research, 2021
In this study, real-time systems are developed to fulfill the robust security needs of a wide range of users. The basic security services are integrated to enhance the security of real-time tasks. The baseline security services are divided into three categories, i.e. confidentiality, integrity, and authentication. The Security Manager (SM) is responsible to integrate these security services along with their respective category weight, subject to only one security service from a category that can be selected at a time. And the sum of all category weight equals 1 (see Table 1). This security service value is called an evaluated security service value (), which is greater than or equal to minimum security need (). For example, a confidentiality algorithm (3DES) can be used in combination with an authentication algorithm (HMAC-MD5) to enhance the security service of a real-time task (for more detail, see [31]). However, knowledge of various security categories is required to combine them. It is the responsibility of a programmer or developer. The SM uses a modified quadratic search algorithm to select optimal security value along with their respective category weight from each category and then uses Equation (1) to evaluate the final optimal security value. The modified quadratic search algorithm is described as follows.
A secure cluster-based authentication and key management protocol for machine-type communication in the LTE network
Published in International Journal of Computers and Applications, 2022
K. Krishna Jyothi, Shilpa Chaudhari
Singh et al. [4] have proposed a dynamic group-based access AKA protocol for MTC called the EMTC-AKA protocol. This protocol ensures strong mutual authentication between the MTC entities and identity protection of the MTCDs. Unlike, the other approaches, the projected approach ensures confidentiality and integrity of the user/control plane data transmitted over the wireless interface and optimizes the need of group key update on each group membership update. The security services in mobile networks such as authentication, data confidentiality, and data integrity are mostly performed using cryptographic techniques. However, most of the standardized solutions already adopted by 3GPP depend on encryption algorithms which possess high computational complexity which in turn contributes to consuming further energy at the different network communication parties. EMTC-AKA [4] is proposed for MTC-LTE like future generation communication system. The EMTC-AKA protocol minimizes bandwidth consumption, transmission cost, and transmission delay. However, the EMTC-AKA protocol is affected by energy consumption due to inefficient group formation and the leader selection process. Main contributions of the proposed secure cluster-based authentication, key management (SCAKM) protocol is summarized as follows: In SCAKM, efficient clustering is achieved by an optimal spiral dynamic algorithm and the CH selections designed by the different constraints are communication link quality, communication capability, and energy consumption.Authentication is done by the signcryption algorithm that enhances the security between the MTC devices and the core network.The key management is done by the updated dynamic group membership management scheme.