Explore chapters and articles related to this topic
Introduction to the SD-WAN Solution
Published in Cheng Sheng, Jie Bai, Qi Sun, Software-Defined Wide Area Network Architectures and Technologies, 2021
The management channel is implemented as follows: The SDN controller delivers configurations to network devices through NETCONF over Secure Shell (SSH), safeguarding data transmission. Network devices use HTTP/2 to report performance data and use NETCONF to report alarms to the controller. Bidirectional certificate authentication is mandatory for network device login and registration. The system software and signature database of network devices are transmitted using Hypertext Transfer Protocol Secure (HTTPS). HTTPS and HTTP/2 packets are encrypted using Transport Layer Security (TLS) to ensure data transmission security. Tenants or MSPs log in to the SDN controller through HTTPS and establish connections with the controller, ensuring that tenants and MSPs can securely access the controller.
WoT-Enabled Smart Cities
Published in Aarti Jain, Rubén González Crespo, Manju Khari, Smart Innovation of Web of Things, 2020
The building management systems are integrated and analyzed via iBMS. iBMS software runs on a different computing environment integrated with gateway software components. The gateway process message based on some predefined rules. The rules are divided between the gateway and the back-end server. When the data is calculated on the gateway, it is further transferred to the cloud platform over the MQTT communication protocol. The data is generated by sensors and is distributed across IoT gateways. To protect data from intruders, various network topologies and security policies are designed via the sensor network. The firewall is used to protect the software running on the server and no internet connection outside the firewall is permitted. Data transmission security is guaranteed by open SSL (secure socket layer v2/v3) and transport layer security (TSL V1). The gateway bears a trusted platform module chip to scramble the application and security conveyance. The gateway security is ensured by means of secure boot and application whitelisting software. Secure boot checks the gateway working framework condition and application whitelisting guarantee that only specific set of application are allowed to run on the gateway (Figure 7.6).
An SMVQ compressed data hiding scheme based on multiple linear regression prediction
Published in Connection Science, 2021
Hengxiao Chi, Chin-Chen Chang, Yanjun Liu
With the rapid development of science and technology, digital media has become people’s preferred communication method. This has led to an increasing number of digital objects (for example, text, image, video, and audio) that people transmit over the Internet every day. As a result, data transmission privacy and security are becoming increasingly important. In order to increase data transmission security, researchers have developed various encryption algorithms that can convert data into an unrecognisable form using a key, which we call ciphertext. Since the ciphertext can only be decrypted with the corresponding key, the sender can safely send the encrypted information on the insecure channel. However, because the ciphertext cannot be identified, these unrecognisable ciphertexts will be particularly prominent on the channel, and people can easily discover the encrypted data, which will cause some people to pay close attention to these ciphertexts. Unauthorised and malicious users can easily monitor, intercept, interrupt, and tamper with the transmission of these ciphertexts. To solve this problem, researchers have developed various data hiding algorithms that embed the sender’s secret message into digital objects (for example, text, image, video, and audio), which then generate stego objects (that is, modified digital objects with confidential messages). Because stego objects are very similar to the original digital objects, when malicious users find stego objects on the channel, they will consider them to be ordinary digital objects. As a result, those users will not pay much attention to these stego objects and will naturally not notice the secret data.
Intelligent analysis of irregular physical factors for panic disorder using quantum probability
Published in Journal of Experimental & Theoretical Artificial Intelligence, 2022
Ankush Manocha, Yasir Afaq, Munish Bhatia
Several communication protocols, such as Wi-fi, Ethernet, and Bluetooth are utilised to transfer the captured data to the dew and cloud platform for event analysis. As healthcare is considered one of the most sensitive domains, data transmission security is maintained by using elliptic curve cryptography and secure socket layer techniques (Alrawais et al., 2017). Moreover, Credential Mapping and User Authentication solutions are utilised for maintaining data security at dew nodes (Zhang et al., 2018).