Chongqing, China. *Corresponding author. Keywords: Wireless body area network, Privacy protection, Data aggregation.
|
|
- Emily Garrett
- 5 years ago
- Views:
Transcription
1 2016 International Conference on Computer, Mechatronics and Electronic Engineering (CMEE 2016) ISBN: The Data Aggregation Privacy Protection Algorithm of Body Area Network Based on Data Partitioning Yi-long CHEN 1,*, Jian LIU 2, Xin-rong WEN 3, Juan LEI 4 and Zhu ZHU 5 1,2,3 State Grid Chongqing Electric Power Co. Information and Telecommunication Branch, Chongqing, China 4,5 State Grid Chongqing Electric Power Co. Electric Power Research Institute, Chongqing, China *Corresponding author Keywords: Wireless body area network, Privacy protection, Data aggregation. Abstract. As a new network, the body area network is widely used in the field of health care, emergency rescue and so on. In the practical application, a large number of data collected by the body area network are closely related to user's personal privacy. However the body area network is an open environment. When transmitted in the network, the user's privacy data is vulnerable to the attacker's eavesdropping, tampering and other security threats. At the present stage, the research of the body area network mainly focuses on the system architecture and node energy consumption, the studies of security aspect of user privacy data is relatively few. This paper puts forward The data aggregation privacy protection algorithm of body area network based on data partitioning based on the above problem, this algorithm uses data partitioning strategy to deal with privacy data, and combines encryption theory to achieve security aggregation of user privacy data of the body area network security aggregation. The result not only improves effectively the privacy protection of the user data of body area network, but also reduces data redundancy and the traffic of the nodes. Introduction Wireless body area networks (referred to as WBAN or BAN) are the wireless networks that are in the body. The word was first proposed by Van with others [1], and has attracted the interest of some researchers. It is a branch of wireless sensor network (WSN). Multiple WBAN can form the Health Care System. The intelligent sensor nodes are integrated into the user's body and body surface to achieve the purpose of monitoring the relevant data information of the user. Every sensor node has a certain data processing capacity, it can send the collected user data to the medical data center for further diagnosis and treatment. However, various kinds of attacks and hacking technology have become complex and diverse, they bring great challenges to the traditional data privacy protection mechanism. The openness of WBAN in wireless space makes the privacy data vulnerable to be eavesdropped, tampered and so on. These data plays a very important role in the diagnosis and treatment of patients, and it is directly related to the patient's health and life. In order to give the patient an efficient and valuable help, the protection of security and privacy must be provided. This paper puts forward the Body Area Network (BAN) data aggregation privacy protection algorithm based on data partitioning for the view of the above problems. The algorithm uses data partitioning strategy to deal with the privacy data, and it combines encryption theory to achieve the security aggregation of user s privacy data in BAN. The result not only effectively improves the privacy protection of the user data of BAN, but also reduces the data redundancy and the traffic of the nodes. The rest of the paper is organized as follows: the second part is the related work; the third part describes the algorithm implementation process; the fourth part is the analysis of the performance of the algorithm; the fifth part is the summary of this paper and the future work. Related Work The categories of existing wireless body area network data privacy protection method can be divided into two types: one is the wireless body area network data privacy protection based on the
2 traditional cryptography, and the other method is the wireless body area network data privacy protection method based on a unique physiological signal. The first method is mostly based on the improvement and optimization of the cryptographic techniques. The literature[2] had analyzed and summarized the security threats and requirements of WBAN,and also proposed the security system architecture for wireless body area network application. In literature[3] proposed an encryption algorithm based on identity policy which makes the process of key management simplified. Although these schemes have some generality, all of these excessively depend on the traditional cryptography technology, which leads to their limited performance. The second method is to make full use of the WBAN data, that is, the true identity of the user is authenticated by user physiological information which is obtained by the acquisition node, so as to achieve the purpose of user data information security protection. For the similarity of the user's physiological information collected by the sensor nodes in WBAN in the literature [4], it used fuzzy theory to realize the key negotiation, and proposed a key agreement scheme based on physiological signals, the scheme can not only effectively complete the key agreement, but also realize the identity authentication of users. Through the analysis of the above research status, it can found that the wireless body area network user data privacy security research is relatively few at the present stage. It comes down to two main reasons: one is medical application facing to the wireless body area network system architecture is not perfect and need to be analyzed in the future; on the other hand, many users do not realize the importance of the security of personal data privacy. So it is necessary to study the wireless body area network data privacy protection scheme which is application of pervasive medical. Algorithm Specific Implementation The body area network data fusion privacy protection algorithm based on data slice is referred to as data aggregation privacy protection mechanism (DAPP). The specific implementation includes five stages: (1) the key establishment stage; (2) the key update stage; (3) the data partitioning stage (4) the data classification and transmission stage; (5) the data decryption and integrity testing stage. In the key establishment stage, in order to ensure the security of the user's privacy data transmission, we assume that the original data collected by all nodes is safe. In order to make full use of symmetric encryption and asymmetric encryption advantages, it uses symmetric encryption algorithm to protect user privacy data of the first layer in the acquisition node of the perception layer, and uses non symmetric encryption algorithm in the medical data center of application layer, and then disclosures the public key. The node key generation process can be transformed into flow chart as shown in Figure 1. In the key update stage, the key changes in the program mainly with the acquisition of data showing a dynamic change. There are two kinds of nodes in the wireless body area network: one is the active node, and the other one is the sleeping node. When the acquisition nodes to collect new data, first determine data content and is the same as before, if the latest data to extract characteristic values, and then the random number with the private key to get an update after treatment. When the acquisition nodes collect new data, firstly it determines whether the content of the data is the same with the previous data. If it is the new data, extracting characteristic values from it. And then it can be processed with random number to get a new private key. The specific update process as shown in Figure 2. Acquisition node Random number Characteris tic value Hash function Hash function Figure 1. Key generation process. Symmetric key
3 Start No Node dormancy No Active node Yes Collecting data Data update Random number H( ) Yes Mode 2 operation H( ) The secret key update End Figure 2. Key updating process. In the data partitioning stage, after each data acquisition node key is established, in order to prevent the node from being captured by the attacker, the integrity of the data is tampered with the data injection means. It deals with the data collected by each node using the technology of segmentation and reorganization, the basic idea is: each data acquisition node divides the original data into n data partitioning (pieces) randomly, and then the node private key is used to encrypt n 1 data partitioning, after that they are sent to the adjacent n 1 acquisition nodes, each acquisition node will seek the sum of all the partitioning and send them to the cluster head (PDA) for classification and processing, finally PDA sends all data encrypted by the public key to the remote terminal. It assumes that the number of acquisition nodes is n 5 ( n represents the number of all the acquisition nodes in the body area network), and the data partitioning of acquisition nodes is J 3. The specific implementation process is shown in Figure 3. After mixing, each node forwards all the data locally stored to the cluster head, which is further processed by the cluster head. Specific mixing and sending process as shown in Figure 4. PDA d 11 1 d 12 d 21 2 d 22 d 32 d 33 3 d 41 d 14 4 d 42 d 52 d 25 d 35 Figure 3. The data partitioning process. 5 d 53 d44 d55 f f1 f2 f3 f4 f5 PDA 1 f1 d11 d d f2 d12 d d d d f d d f d d f5 d d d Figure 4. Data mixing and transmission. In the data classification and transmission stage, the sensor nodes send the collected data to the mobile phone/pda, mobile phone/pda as the access point outside classify the received data, then it transmits the processing results encrypted by the public key to a remote processing center, that is classifying the encryption data partitioning of the first layer of WBAN to restore the original data for each node and then transmitting the encrypted original data directly to the remote information processing center. The specific classification process is shown in Figure 5.
4 Figure 5. The classification and transmission of the data. In the data decryption and integrity testing stage, decryption principle: the data decryption processing is completed by the powerful performance of the medical data processing center. Firstly, the non symmetric encryption mechanism is used to decrypt the received data blocks, and finally, the private key of each node is obtained. Secondly, to obtain the private key, it uses the symmetric encryption mechanism decrypt the obtained user's privacy data, and then to get the real data of each acquisition node. Since it has done a hash of each node's privacy data, so it can perform integrity testing in the medical data processing center to ensure the integrity of the node privacy data. Performance Analysis of Algorithms The analysis will be further on the performance, this section mainly from two aspects of analysis, including: privacy protection analysis, data traffic analysis, and compared with the CPDA (private data aggregation cluster-based) protocol proposed by He W. et al[5]. The first is privacy protection analysis. For data aggregation privacy protection, in WBAN environment, when aggregated data transmission in the network, they are vulnerable to monitor communication link or the collusion attack by malicious attackers. In order to protection of privacy and making analysis, it is necessary to carry out the relevant setting, in particular: the probability of the safety communication link between the two sides of communication attacked by the attacker is q which is equivalent to the local collection node key is guessed; when the node key is guessed, then the probability of the user's privacy data collected by the node is Pq ( ). It will calculate and analyze the privacy protection of DAPP algorithm and CPDA algorithm and then it can get the results as shown in figure 6. It can be seen from the figure, the guessed probability Pq ( ) of the user privacy data of the two algorithms increases with the increasing of the value of the probability q that the security of the communication link is broken, but it can see that the growth of the value Pq ( ) of the CPDA algorithm is significantly bigger than the value Pq ( ) of the DAPP algorithm. In general, the value of the probability q that the security of the communication link is broken are the same, the user data privacy protection of the DAPP algorithm is better than the CPDA algorithm. The second is data traffic analysis. Comprehensive analyzing of the data traffic of the two algorithms, it can get the results shown in figure 7. As it can be seen from the graph, the data communication of the two algorithms is increasing with the increasing of the number of nodes in the sensing layer, however, the growth rate of DAPP algorithm is relatively balanced, which shows
5 P(q): probability of private data being captured Data traffic of all nodes that the energy consumption of the algorithm is relatively stable, while the CPDA algorithm is obviously an increasing trend, indicating that the energy consumption is restricted by the number of nodes. And when the acquisition node number less than 5, two kinds of algorithm of energy consumption don't have a big difference when the number of nodes is greater than 5, the amount of communication traffic of CPDA algorithm is higher than that of DAPP algorithm CPDA DAPP 300 CPDA DAPP q: probability of a secure link being cracked n: acquisition node number Figure 6. Comparison of data privacy protection. Figure 7. Comparison of data traffic. Summary According to the wireless body area network security requirements, this paper designs body area network data fusion privacy protection method based on data partitioning. The main method is combined with the use of symmetric key and asymmetric key to encrypt user data, and in the process of data transmission, the data is processed by the segmentation and recombination technology. This technology can defend node capture attack more effective, finally to realize safe aggregation of user data under the privacy of data acquisition node condition. And it also analyzes the privacy protection and data traffic of the method. But when extracting the biometric signal, the sign considered parameters are too single, it is necessary to consider various parameters of the human body signs in the latter part of the work; due to the limitations of experimental conditions, when analyzing performance, it only has carried on the analysis of traffic data and privacy protection, ignores the verification of data accuracy. It needs to be improved at the later work. Acknowledgement The authors acknowledgement support from the Science Technology Project of State Grid Chongqing Electric Power Company (No.2016 Yudiankeji 18). References [1] Van Dam K, Pitchers S, Barnard M, Body area networks: Towards a wearable future, Proc. WWRF kick off meeting, Munich, Germany, 2001, pp [2] Kai Zhu. Research on authentication method of wireless body area network, Xi'an Electronic and Science University, Xi'an, [3] Jang C, Lee D G, Han J. A proposal of security framework for wireless body area network, Security Technology, SECTECH'08. International Conference on. IEEE, 2008, pp [4] Paterson K G, Price G. A comparison between traditional public key infrastructures and identity-based cryptography, ISTR, 8(2003) [5] He Wen Bo, Liu Xue, Nguyen H, et al. PDA: Privacy-preserving data aggregation in wireless sensor networks INFOCOM th IEEE International Conference on Computer Communications. IEEE, 2007, pp
Integration of information security and network data mining technology in the era of big data
Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The
More informationComputer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack
Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:
More informationUse of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks
Use of Symmetric And Asymmetric Cryptography in False Report Filtering in Sensor Networks Aleksi Toivonen Helsinki University of Technology Aleksi.Toivonen@tkk.fi Abstract Sensor networks are easily deployable
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Study on secure data storage based on cloud computing ABSTRACT KEYWORDS
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 22 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(22), 2014 [13778-13783] Study on secure data storage based on cloud computing
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationThe Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1, a, Zhong Liang 2, b, Chen Yue 3, c
5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) The Research and Application of the Fingerprint Key based USB-Key Pin Number Protection System Yu Lu 1,
More informationLOAD BALANCING AND DEDUPLICATION
LOAD BALANCING AND DEDUPLICATION Mr.Chinmay Chikode Mr.Mehadi Badri Mr.Mohit Sarai Ms.Kshitija Ubhe ABSTRACT Load Balancing is a method of distributing workload across multiple computing resources such
More informationEfficient Secret Key Delivery Using Heartbeats
Efficient Secret Key Delivery Using Heartbeats Kwantae Cho 1,*, and Byungho Chung 2 1, 2 Information Security Research Division, Electronics and Telecommunications Research Institute, Republic of Korea
More informationLIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS
LIGHTWEIGHT KEY MANAGEMENT SCHEME FOR HIERARCHICAL WIRELESS SENSOR NETWORKS Mohammed A. Al-taha 1 and Ra ad A. Muhajjar 2 1 Department of Computer Science, College of Science, Basrah University, Iraq 2
More informationBody Sensor Network Security
1 Body Sensor Network Security Close coupling of BSNs and security why network security is important information is sensitive, what it takes to protect it, how its different from WSNs how encryption is
More informationSource Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network
Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,
More informationSTUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS
STUDY & DESIGN OF ADVANCED DATA AGGREGATION TECHNIQUE IN WIRELESS SENSOR NETWORKS Soumyasri S M 1, Dr. Rajkiran Ballal 2 and Ramakrishna Hegde 3 1,2 Computer Science, SDM College, Ujire, Electrical & Electronics,
More informationThe Cryptographic Sensor
The Cryptographic Sensor Libor Dostálek and Václav Novák {libor.dostalek, vaclav.novak}@prf.jcu.cz Faculty of Science University of South Bohemia České Budějovice Abstract The aim is to find an effective
More informationSecuring Internet of things Infrastructure Standard and Techniques
Securing Internet of things Infrastructure Standard and Techniques Paper Author : Zubair A. Baig Name: Farooq Abdullah M.Sc Programming and Networks University of Oslo. Security internet of Things Standards
More informationApplication of Redundant Backup Technology in Network Security
2018 2nd International Conference on Systems, Computing, and Applications (SYSTCA 2018) Application of Redundant Backup Technology in Network Security Shuwen Deng1, Siping Hu*, 1, Dianhua Wang1, Limin
More informationA Two-Fold Authentication Mechanism for Network Security
Asian Journal of Engineering and Applied Technology ISSN 2249-068X Vol. 7 No. 2, 2018, pp. 86-90 The Research Publication, www.trp.org.in A Two-Fold for Network Security D. Selvamani 1 and V Selvi 2 1
More informationMULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY
ISSN: 0976-3104 SPECIAL ISSUE Jayanthi and Prabadevi RESEARCH OPEN ACCESS MULTI - KEYWORD RANKED SEARCH OVER ENCRYPTED DATA SUPPORTING SYNONYM QUERY Jayanthi M.* and Prabadevi School of Information Technology
More informationFramework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm
Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information
More informationResearch on WSN Secure Communication Method Based on Digital Watermark for the Monitoring of Electric Transmission Lines
DOI: 10.23977/acss.2019.31002 EISSN 2371-8838 Advances in Computer, Signals and Systems (2019) 3: 8-14 Clausius Scientific Press, Canada Research on WSN Secure Communication Method Based on Digital Watermark
More informationSecuring WMSN using SHAREMIND
Securing WMSN using SHAREMIND Prof. Dhanshri Patil 1, Priyanka Kanse 2, Priyanka Kakade 3, Ketaki Sortur 4, Akshata Nalawade 5 1, 2,3,4,5 UG Student Department of Computer Engineering, PCET s Nutan Maharashtra
More informationS. Indirakumari, A. Thilagavathy
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 2 ISSN : 2456-3307 A Secure Verifiable Storage Deduplication Scheme
More informationA Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data
An Efficient Privacy-Preserving Ranked Keyword Search Method Cloud data owners prefer to outsource documents in an encrypted form for the purpose of privacy preserving. Therefore it is essential to develop
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 Asymmetric Key Based Encryption
More informationauthentication will be required between roaming user, visited network and home network.
Classification of Security Authentication for Roaming User in Mobile Networks Ja afer AL-Saraireh & Sufian Yousef j.al-saraireh@anglia.ac.uk, s.yousef@anglia.ac.uk Anglia Ruskin University Chelmsford UK
More informationKey establishment in sensor networks
Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks
More informationAvailable online at ScienceDirect. IERI Procedia 4 (2013 ) 2 7
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 4 (2013 ) 2 7 2013 International Conference on Electronic Engineering and Computer Science The Web Security Password Authentication
More informationChapter 18 Privacy Enhancing Technologies for Wireless Sensor Networks
Chapter 18 Privacy Enhancing Technologies for Wireless Sensor Networks Chi-Yin Chow, Wenjian Xu and Tian He Abstract Since wireless sensor networks (WSNs) are vulnerable to malicious attacks due to their
More informationA Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks
Journal of Computing and Information Technology - CIT 22, 2014, 1, 1 20 doi:10.2498/cit.1002318 1 A Survey on Privacy Preserving Data Aggregation Protocols for Wireless Sensor Networks Joyce Jose, Josna
More informationLink-Based Wormhole Detection in Wireless Sensor Networks
Link-Based Wormhole Detection in Wireless Sensor Networks Xiaoyuan Zhou, Lijun Chen National Key Laboratory for Novel Software Technology Nanjing University Nanjing, P.R. China, 2123 zxy@smail.nju.edu.cn,
More informationThe Application Analysis and Network Design of wireless VPN for power grid. Wang Yirong,Tong Dali,Deng Wei
Applied Mechanics and Materials Online: 2013-09-27 ISSN: 1662-7482, Vols. 427-429, pp 2130-2133 doi:10.4028/www.scientific.net/amm.427-429.2130 2013 Trans Tech Publications, Switzerland The Application
More informationA New Method Of VPN Based On LSP Technology
2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing
More informationDesign and Implementation of Dual-Mode Wireless Video Monitoring System
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Design and Implementation of Dual-Mode Wireless Video Monitoring System BAO Song-Jian, YANG Shou-Liang ChongQing University
More information2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN:
2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN: 978-1-60595-415-8 Design and Implementation of a Mobile Healthcare Management Platform Based on
More informationComputer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University
Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two
More informationChapter 5 Ad Hoc Wireless Network. Jang Ping Sheu
Chapter 5 Ad Hoc Wireless Network Jang Ping Sheu Introduction Ad Hoc Network is a multi-hop relaying network ALOHAnet developed in 1970 Ethernet developed in 1980 In 1994, Bluetooth proposed by Ericsson
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationMobile Health Monitoring Based On New Power Management Approach
Mobile Health Monitoring Based On New Power Management Approach R.Kanimozhi 1, M.Suguna 2 Department of Information Technology, SNS College of Technology, Coimbatore, Tamilnadu, India 1, 2 ABSTRACT- Mobile
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationDesign and Implementation of Remote Medical Monitoring System for. Homecare
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016) Design and Implementation of Remote Medical Monitoring System for Homecare Juan Zhong1, a, * Hua Liao2, b 1 College
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationDynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks
Dynamic Key Ring Update Mechanism for Mobile Wireless Sensor Networks Merve Şahin Sabancı University Istanbul, Turkey mervesahin@sabanciuniv.edu Abstract Key distribution is an important issue to provide
More informationA Proposed Method for Cryptography using Random Key and Rotation of Text
Volume 6, No.2, March - April 2017 Mousumi Ghanti et al., International Journal of Advanced Trends in Computer Science and Engineering, 6(2), March - April 2017, 18-22 Available Online at http://www.warse.org/ijatcse/static/pdf/file/ijatcse03622017.pdf
More informationA Review on Security in Smart Grids
International Journal of Allied Practice, Research and Review Website: www.ijaprr.com (ISSN 2350-1294) A Review on Security in Smart Grids Jeetu Sharma, Partha Pratim Bhattacharya and V K Jain College
More informationReliable Broadcast Message Authentication in Wireless Sensor Networks
Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric
More informationResearch on System Login Security Encryption Method Based on MD5
2016 International Conference on Control and Automation (ICCA 2016) ISBN: 978-1-60595-329-8 Research on System Login Security Encryption Method Based on MD5 Xi-mei ZHANG 1, Ying LI 2,Yi-Zhen CAO 3 and
More informationThe Mobile Terminal Security Access System Based on IPSec VPN Di Zhao1,a, Xin He2,b and Yunjun Li1,c*
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) The Mobile Terminal Security Access System Based on IPSec VPN Di Zhao1,a, Xin He2,b and Yunjun
More informationBased on The DES_RSA Encryption Algorithm Improvement and Implementation
Based on The DES_RSA Encryption Algorithm Improvement and Implementation Abstract Hao Wang Changchun University of science and technology with the rapid development of information technology and net work,our
More informationA SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS
ISSN 1392 124X INFORMATION TECHNOLOGY AND CONTROL, 2012, Vol.41, No.1 A SECURE PASSWORD-BASED REMOTE USER AUTHENTICATION SCHEME WITHOUT SMART CARDS Bae-Ling Chen 1, Wen-Chung Kuo 2*, Lih-Chyau Wuu 3 1
More informationAmorphic Encryption. Egger Mielberg
Amorphic Encryption Egger Mielberg egger.mielberg@gmail.com 27.01.2019 Abstract. As a symmetric as an asymmetric scheme requires a key (session or private) to be hidden. In this case, an attacker gets
More informationResearch on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1, a
5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Research on Two - Way Interactive Communication and Information System Design Analysis Dong Xu1,
More informationSecuring V2X communications with Infineon HSM
Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security
More informationL13. Reviews. Rocky K. C. Chang, April 10, 2015
L13. Reviews Rocky K. C. Chang, April 10, 2015 1 Foci of this course Understand the 3 fundamental cryptographic functions and how they are used in network security. Understand the main elements in securing
More informationResearch on Full-text Retrieval based on Lucene in Enterprise Content Management System Lixin Xu 1, a, XiaoLin Fu 2, b, Chunhua Zhang 1, c
Applied Mechanics and Materials Submitted: 2014-07-18 ISSN: 1662-7482, Vols. 644-650, pp 1950-1953 Accepted: 2014-07-21 doi:10.4028/www.scientific.net/amm.644-650.1950 Online: 2014-09-22 2014 Trans Tech
More informationA Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang
A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts
More informationSECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA
Research Manuscript Title SECURE MULTI-KEYWORD TOP KEY RANKED SEARCH SCHEME OVER ENCRYPTED CLOUD DATA Dr.B.Kalaavathi, SM.Keerthana, N.Renugadevi Professor, Assistant professor, PGScholar Department of
More information1-7 Attacks on Cryptosystems
1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from
More informationA Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua CHEN
2017 International Conference on Computer, Electronics and Communication Engineering (CECE 2017) ISBN: 978-1-60595-476-9 A Power Attack Method Based on Clustering Ruo-nan ZHANG, Qi-ming ZHANG and Ji-hua
More informationDETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM
DETECTING, DETERMINING AND LOCALIZING MULTIPLE ATTACKS IN WIRELESS SENSOR NETWORK - MALICIOUS NODE DETECTION AND FAULT NODE RECOVERY SYSTEM Rajalakshmi 1, Umamaheswari 2 and A.Vijayaraj 3 1 Department
More informationSession key establishment protocols
our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session
More informationProtecting Sink Location Against Global Traffic Monitoring Attacker
016 International Conference on Computing, Networking and Communications, Wireless Ad Hoc and Sensor Networks Protecting Sink Location Against Global Traffic Monitoring Attacker Juan Chen Dept. of Information
More informationDOTNET PROJECTS. DOTNET Projects. I. IEEE based IOT IEEE BASED CLOUD COMPUTING
DOTNET PROJECTS I. IEEE based IOT 1. A Fuzzy Model-based Integration Framework for Vision-based Intelligent Surveillance Systems 2. Learning communities in social networks and their relationship with the
More informationSession key establishment protocols
our task is to program a computer which gives answers which are subtly and maliciously wrong at the most inconvenient possible moment. -- Ross Anderson and Roger Needham, Programming Satan s computer Session
More informationA Scheme of Multi-path Adaptive Load Balancing in MANETs
4th International Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Multi-path Adaptive Load Balancing in MANETs Yang Tao1,a, Guochi Lin2,b * 1,2 School of Communication
More informationPrivacy Preserving Ranked Multi-Keyword Search for Multiple Data Owners in Cloud Computing
S.NO PROJECT CODE IEEE JAVA PROJECT TITLES DOMAIN 1 NEO1501 A Hybrid Cloud Approach for Secure Authorized Deduplication 2 NEO1502 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More informationA Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by Using the Security Profiles
6th WSEAS International Conference on Information Security and Privacy, Tenerife, Spain, December 14-16, 2007 146 A Static or Dynamic Reconfiguration Method of Security Functions for Mobile Devices by
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationDelegation Scheme based on Proxy Re-encryption in Cloud Environment
Vol.133 (Information Technology and Computer Science 2016), pp.122-126 http://dx.doi.org/10.14257/astl.2016. Delegation Scheme based on Proxy Re-encryption in Cloud Environment You-Jin Song Department
More informationAPPLICATION OF DYNAMIC CLUSTERING ALGORITHM IN MEDICAL SURVEILLANCE
APPLICATION OF DYNAMIC CLUSTERING ALGORITHM IN MEDICAL SURVEILLANCE Zhuohui Ren 1 and Cong Wang 2 1 Department of Software Engineering, Beijing University of Posts and Telecommunications, BeiJing City,
More informationA Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.
A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R
More informationKey establishment in sensor networks
Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;
More informationISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :
ISACA CISA ISACA CISA ( Certified Information Systems Auditor ) Download Full Version : http://killexams.com/pass4sure/exam-detail/cisa QUESTION: 390 Applying a digital signature to data traveling in a
More informationPseudonym Based Security Architecture for Wireless Mesh Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network
More informationSecure Smart Card Based Remote User Authentication Scheme for Multi-server Environment
Secure Smart Card Based Remote User Authentication Scheme for Multi-server Environment Archana P.S, Athira Mohanan M-Tech Student [Cyber Security], Sree Narayana Gurukulam College of Engineering Ernakulam,
More informationKeywords security model, online banking, authentication, biometric, variable tokens
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Authentication
More informationANALYSIS OF AES ENCRYPTION WITH ECC
ANALYSIS OF AES ENCRYPTION WITH ECC Samiksha Sharma Department of Computer Science & Engineering, DAV Institute of Engineering and Technology, Jalandhar, Punjab, India Vinay Chopra Department of Computer
More informationStrongly Anonymous Communications in Mobile Ad Hoc Networks
Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer
More informationStudy on data encryption technology in network information security. Jianliang Meng, Tao Wu a
nd International Workshop on Materials Engineering and Computer Sciences (IWMECS 05) Study on data encryption technology in network information security Jianliang Meng, Tao Wu a School of North China Electric
More informationMultisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong YinDi 1, Liu ChengJun 1
4th International Conference on Computer, Mechatronics, Control and Electronic Engineering (ICCMCEE 2015) Multisource Remote Sensing Data Mining System Construction in Cloud Computing Environment Dong
More informationSmart Grid Communications and Networking
Smart Grid Communications and Networking EKRAM HOSSAIN University of Manitoba, Canada ZHU HAN University of Houston, Texas H. VINCENT POOR Princeton University, New Jersey CAMBRIDGE UNIVERSITY PRESS Contents
More informationA Novel Identification Approach to Encryption Mode of Block Cipher Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c
th International Conference on Sensors, Mechatronics and Automation (ICSMA 16) A Novel Approach to Encryption Mode of Block Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c 1 Science and Technology on Communication
More informationGP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data
GP 2 S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data Wensheng Zhang, Chuang Wang and Taiming Feng Department of Computer Science, Iowa State University, IA 50011 Email:
More informationPDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks
PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks Wenbo He Xue Liu Hoang Nguyen Klara Nahrstedt Tarek Abdelzaher Department of Computer Science University of Illinois at Urbana-Champaign
More informationCyber Security and Privacy Issues in Smart Grids
Cyber Security and Privacy Issues in Smart Grids Acknowledgement: Slides by Hongwei Li from Univ. of Waterloo References Main Reference Liu, J. and Xiao, Y. and Li, S. and Liang, W. and Chen, C. Cyber
More informationThe nominative data coming from the population registry and used to generate the voting cards are never stored in the evoting system database.
System overview Legal compliance CHVote complies to the swiss federal chancellery ordinance on Electronic Voting (VEleS) for an evoting system offered up to 30% of the resident voters. The election process
More informationEnhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal *
Enhancing the Security in WSN using Three Tier Security Architecture Chanchal G. Agrawal * SCOE, Pune University Prof. J. B. Kulkarni SCOE, Pune University Abstract Security is the main issue while setting
More informationHOST Authentication Overview ECE 525
Authentication Overview Authentication refers to the process of verifying the identity of the communicating principals to one another Usually sub-divided into Entity authentication Authentication in real-time
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationThe Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI
2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing
More informationRotation-based Privacy-preserving Data Aggregation in Wireless Sensor Networks
Rotation-based Privacy-preserving Data Aggregation in Wireless Sensor Networks Xiaoying Zhang, Hong Chen, Ke Wang, Hui Peng, Yongjian Fan, Deying Li Key Laboratory of Data Engineering and Knowledge Engineering
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationSecurity Handshake Pitfalls
Security Handshake Pitfalls Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr 1 Cryptographic Authentication Password authentication is subject to eavesdropping Alternative: Cryptographic challenge-response
More informationCryptography and Network Security
Security Sixth Edition Chapter 1 Introduction Dr. Ahmed Y. Mahmoud Background Information Security requirements have changed in recent times traditionally provided by physical and administrative mechanisms
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationCryptography and Network Security Overview & Chapter 1. Network Security. Chapter 0 Reader s s Guide. Standards Organizations.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 0 Reader s s Guide The art of war teaches us to rely
More informationAttribute Based Encryption with Privacy Protection in Clouds
Attribute Based Encryption with Privacy Protection in Clouds Geetanjali. M 1, Saravanan. N 2 PG Student, Department of Information Technology, K.S.R College of Engineering, Tiruchengode, Tamilnadu, India
More informationA Survey on Cryptography Based QR code authentication
A Survey on Cryptography Based QR code authentication Ronak M. Parmar 1, Krunal J. Panchal 2 1 Student, Computer Engineering Department, L.J. Institute of Engineering & Technology, Gujarat, India 2 Assistant
More informationCryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks
Cryptanalysis of An Advanced Temporal Credential- Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks Chandra Sekhar Vorugunti 1, Mrudula Sarvabhatla 2 1 Dhirubhai
More informationTo Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing
International Journal of Emerging Trends in Science and Technology To Enhance Homomorphic Encryption scheme for Key Management and Key Sharing in Cloud Computing Author Preeti Ahuja Punjabi University
More informationSmart Card and its Application in Software Protection
Smart Card and its Application in Software Protection William Xie wxie007@ec.auckland.ac.nz Department of Computer Science The University of Auckland Lecturers: Prof Clark Thomborson, Prof Jim Goodman
More information