Explore chapters and articles related to this topic
Challenges in VANET
Published in Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde, VANET, 2021
Sonali P. Botkar, Sachin P. Godse, Parikshit N. Mahalle, Gitanjali R. Shinde
Mitigation techniques used for bogus information attack: This attack is detected or prevented by elliptic curve digital signature algorithm (ECDSA). ECDSA is message authentication scheme variant of digital signature algorithm (DSA). It uses hashing techniques for message security. In this technique, two keys are used: public key and private key. Public key is making available to each vehicle, and private key is a secret key with vehicle. Source and destination vehicles are agreed upon elliptic curve domain parameter for private key generation. Transmissions of message source node encrypt the message by using hash function and private key, and send to the destination node. At the destination node, message is decrypted using public key. It is stronger technique to avoid bogus information.
A Comparative Analysis of Classical Cryptography versus Quantum Cryptography for Web of Medical Things (WoMT)
Published in Aboul Ella Hassanien, Nilanjan Dey, Surekha Borra, Medical Big Data and Internet of Medical Things, 2018
K. Anitha Kumari, G. Sudha Sadasivam
The asymmetric key technique uses two keys, namely, private and public. The public key and the private key are used in the encryption and decryption process. Albeit different, the keys are mathematically connected and ascertaining the private key from the public key is infeasible. Most of the public key algorithms are based on discrete logarithm/integer factorization/elliptic curve relationships for which no efficient solution exists till now. Due to this, it is commonly applied in authentication protocols, key exchange processes and in sharing secrets. Diffie–Hellman (DH) key exchange protocol, digital signature standard (DSS), digital signature algorithm (DSA), ElGamal cryptosystem, ECC schemes, Rivest–Shamir–Adleman (RSA) scheme and Cramer–Shoup cryptosystem are some examples of public key cryptography. To perform the key exchange process, asymmetric key cryptography is highly preferred as it is robust against attacks. To transmit data effectively, the symmetric key algorithm is commonly used. Combining the advantages of a public key cryptosystem for key encapsulation and symmetric key cryptosystem for data encapsulation is referred to as a hybrid cryptosystem. Pretty good privacy (PGP) and secure sockets layer (SSL)/transport layer security (TLS) schemes utilize this procedure.
Real-Time Grid Management
Published in Stuart Borlase, Smart Grids, 2018
Stuart Borlase, Jiyuan Fan, Xiaoming Feng, Jay Giri, Douglas Wilson, Gerald R. Gray, Zhenyu (Henry) Huang, Walter Sattinger, Bo Yang, Bo Zeng, Stuart Borlase, Jiyuan Fan, Jay Giri, Zhenyu (Henry) Huang, Rajat Majumder, Rui Menezes de Moraes, Thomas Morris, Reynaldo Nuqui, Manu Parashar, Walter Sattinger, Tim Taylor, Jean-Charles Tournier
The security clouds in the network architecture shown in Figure 5.46 can digitally sign network traffic. Bump-in-the-wire solutions exist that can capture network traffic as it leaves an electronic security perimeter and appends it with a digital signature. The security cloud in a receiving electronic security perimeter can validate the digital signature before forwarding the traffic to cyber systems inside the electronic security perimeter. The digital signatures can be based on multiple algorithms. FIPS 186 (the NIST Federal Information Processing Standards publications for the Digital Signature Standard) specifies the NIST-recommended DSA. DSA uses public key cryptography techniques to sign network traffic. This method is often considered too slow and resource intensive for grid management systems; however, if cryptographic processors are used in place of the security clouds in Figure 5.46, it is likely that DSA signing and validation can meet required latency targets for grid management applications. The elliptic curve digital signature algorithm (ECDSA) is an alternative approach for network traffic authentication. The ECDSA is considered faster, uses smaller keys, and therefore has fewer storage requirements than DSA. ECDSA is patented by CERTICOM, RSA, the U.S. National Security Agency, and Hewlett-Packard. This may slow the adoption of ECDSA. A third alternative for authentication is the keyed-Hash Message Authentication (HMAC). HMAC is the least resource-intensive DSA of the three discussed here.
Integrate the hierarchical cluster elliptic curve key agreement with multiple secure data transfer modes into wireless sensor networks
Published in Connection Science, 2022
Elliptic Curve Diffie-Hellman (ECDH) is a native of the renowned Diffie-Hellman (DH). The main difference is that ECDH employs the elliptic curve cryptography to create a common secret key known as a session key, which is responsible for secure transmitted data in open environments between two parties. Subsequently, they adopt the session key to cipher or decipher succeeding transmissions through a symmetric key mechanism. However, ECDH uses only 160-bit keys to achieve the same level of security as the DH secret sharing system. But, the raw DH agreement reaches an appropriate security level at least needing a 1024-bit key length, and hence consumes more memory capabilities and computing resources to execute exponential operations. Regrettably, sensors only have limited resources and a few computing power to deal with extra overheads. This study compares the key length of ECC with RSA under the same security levels. Table 1 indicates that the ECC has a key size of less than 160 bits to reach secure levels, which is equivalent to 1024 bits RSA. Besides, in ECC operations, there are only use addition and multiplication and thus can reduce the operational complexity and increase the operational performance. On the contrary, RSA, DH and DSA all need exponential operations. That is why ECC outperforms RSA, DH and DSA algorithms. This study adopts ECC as the cryptosystem is certainly workable for WSNs without sufficient computing sources. Consequently, ECDH is well adequate for WSNs.
A Security Model for Web-Based Fuzzy-Logic Direct Torque Control of Induction Motor Drive
Published in IETE Journal of Research, 2022
The essential technology contributing virtually to all automated network and computer security applications is known as encryption. Encryption was primarily used for military, espionage, and in e-commerce industry. Some of the uses of encryption of information are: Encryption protects data integrity from being hacked or modified. Data integrity is to be maintained while transferring data. Checksum and hash-function techniques provide data integrity.Users are authenticated by RSA and Digital Signature Algorithm (DSA) methods.Secrecy is retained by algorithms such as Triple-DES and Blowfish algorithm for maintaining confidentiality.
Data provenance collection and security in a distributed environment: a survey
Published in International Journal of Computers and Applications, 2021
Wolali Ametepe, Changda Wang, Selasi Kwame Ocansey, Xiaowei Li, Fida Hussain
There are enormous security implications in providing data provenance. For instance, when presented with a data provenance record for a Ph.D thesis received via the Internet, how do we acknowledge its legitimacy? How do you guarantee a safe binding amongst data and records that it describes? The adoption of message authentication codes (MAC) was introduced [35]. MAC works like HMAC-SHA1, which runs a number of orders of magnitude quicker than digital signature tasks like DSA, but MAC function needs a shared key between the verifier and originator of MAC. There are different security areas in distributed data provenance stores [36]. Therefore, users that are authorized and recognized for peculiar actions on a data provenance store in one area may be granted different access levels or unrecognized in a data provenance store of a different area. In this case, an associated identity management infrastructure is installed and operated in order to permit a lawful user to follow the track of relations and recover all pertinent distributed p-assertions[37,38].