International Security Related Conferences |
The following pages provide highlights on Science of Security related research presented at the following International Conferences.
(ID#: 16-9545)
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
International Conference: Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) 2015, Shanghai, China |
The 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) 2015 was held 5–7 August 2015 in Shanghai, China. Focused on cyber-physical systems and security, the work cited here has much of interest to the Science of Security community. Citations were recovered on December 14, 2015.
Wang, P.; Ali, A.; Kelly, W., “Data Security and Threat Modeling for Smart City Infrastructure,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245322
Abstract: Smart city opens up data with a wealth of information that brings innovation and connects government, industry and citizens. Cyber insecurity, on the other hand has raised concerns among data privacy and threats to smart city systems. In this paper, we look into security issues in smart city infrastructure from both technical and business operation perspectives and propose an approach to analyze threats and to improve data security of smart city systems. The assessment process takes hundreds of features into account. Data collected during the assessment stage are then imported into an algorithm that calculates the threat factor. Mitigation strategies are provided to help reducing risks of smart city systems from being hacked into and to protect data from being misused, stolen or identifiable. Study shows that the threat factor can be reduced significantly by following this approach. Experiments show that this comprehensive approach can reduce the risks of cyber intrusions to smart city systems. It can also deal with privacy concerns in this big data arena.
Keywords: Big Data; data protection; security of data; smart cities; big data; cyber insecurity; cyber intrusions; data privacy; data protection; data security; smart city infrastructure; threat modeling; Business; Encryption; Firewalls (computing); Malware; cyber physical; data security; smart city; threat modeling (ID#: 15-8133)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245322&isnumber=7245317
Akhriza, T.M.; Yinghua Ma; Jianhua Li, “A Novel Fibonacci Windows Model for Finding Emerging Patterns over Online Data Stream,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–8, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245323
Abstract: Patterns i.e. the itemsets whose frequency increased significantly from one class to another are called emerging patterns (EP). Finding EP in a massive online data streaming is a tough yet complex task. On one hand the emergence of patterns must be examined at different time stamps since no one knows when the patterns may be emerging; on another hand, EP must be found in a given limited time and memory resources. In this work a novel method to accomplish such task is proposed. The history of itemsets and their support is kept in a novel data window model, called Fibonacci windows model, which shrinks a big number of data historical windows into a considerable much smaller number of windows. The emergence of itemsets being extracted from online transactions is examined directly with respect to the Fibonacci windows. Furthermore, as the historical windows are recorded, EP can be found both in online and offline mode.
Keywords: data mining; transaction processing; EP; Fibonacci windows model; data window model; emerging patterns; historical windows; itemsets; offline mode; online data streaming; online mode; online transactions; time stamps; Computer security; Data mining; Data models; History; Itemsets; Merging; Data Window Model; Emerging Patterns; Online Data Stream (ID#: 15-8134)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245323&isnumber=7245317
Xiaohe Fan; Kefeng Fan; Yong Wang; Ruikang Zhou, “Overview of Cyber-Security of Industrial Control System,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no.,
pp. 1–7, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245324
Abstract: With the development of information technology, the network connection of industrial control system (ICS) and information technology (IT) is becoming more and more closely. What’s more, the security issues of traditional IT systems in industrial control system are also more prominent. Early industrial control system mainly uses physical isolation approach to protect security. In this paper, we review the characteristics and reference models of industrial control system and analyze the current security status of industrial control system. Moreover, we propose a defense-in-depth system, security policies of active protection and passive monitoring for these security issues. Besides, we also discuss the key technologies and summarize the full text.
Keywords: control engineering computing; data protection industrial control; production engineering computing; security of data; ICS; IT systems; active protection security policy; cyber-security; defense-in-depth system; industrial control system; information technology; passive monitoring; physical isolation approach; security policy; security protection; Control systems; Information security; Process control; Production; Safety; Anomaly detection; Industrial Control System (ICS); Information security; Risk assessment (ID#: 15-8135)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245324&isnumber=7245317
Zongshuai Hu; Yong Wang; Chunhua Gu; Dejun Mengm; Xiaoli Yang; Shuai Chen, “Malicious Data Identification in Smart Grid Based on Residual Error Method,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–5, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245325
Abstract: Most of methods on malicious data identification are based on the residual in power system applications. Residual error method, which is an effective method to identify a single malicious data can be basically divided into weighted residual error method and normalized residual error method. In this paper the states and measurement estimated value can be calculated firstly by the traditional weighted least squares state estimation algorithm. Then the measurement residual and the objective function value can be also calculated. The algorithm of weighted residual error method is tested on IEEE5 bus system by MATLAB and the analysis on the results of calculation example shows that this method is an effective one which a single malicious data can be effectively dealt with, and it can be applied to malicious data identification. In this paper the largest weighted residues in the case of single malicious data are 8.361 and correspond to real power injection at bus2, which are far above the threshold to improve the efficiency of malicious data identification.
Keywords: least squares approximations; power system measurement; power system state estimation; smart power grids; IEEE5 bus system; MATLAB; malicious data identification; normalized residual error method; smart grid; weighted least squares state estimation algorithm; weighted residual error method; MATLAB; Measurement uncertainty; Pollution measurement; Power systems; State estimation; Transmission line measurements; Weight measurement; malicious data identification; measurement residual Introduction; residual error method; smart grid; the states; weighted least squares state estimation (ID#: 15-8136)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245325&isnumber=7245317
Vasseur, M.; Xiuzhen Chen; Khatoun, R.; Serhrouchni, A., “Survey on Packet Marking Fields and Information for IP Traceback,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–8, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245326
Abstract: Not all header fields in IP packets are used simultaneously during transmissions. Some fields may provide traceback services, especially for the defense against DDoS attacks. In this paper, we analyze which IP header fields may be used without impacting the other services provided by the IP protocol. We also analyze how unused fields can be filled for the purpose of traceback, and with what probability can a router mark packets. Finally we compare the different existing methods for packet marking based on the fields used and marking information.
Keywords: IP networks; computer network security; probability; DDoS attack; IP traceback; packet marking field; probability; Computer security; Industrial control; Quality of service; Routing protocols; DDoS attacks; IP header fields; Packet marking (ID#: 15-8137)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245326&isnumber=7245317
Yanan Wang; Xiuzhen Chen; Jianhua Li, “A New Genetic-Based Rumor Diffusion Model for Social Networks,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no.,
pp. 1–5, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245327
Abstract: The spreading process of rumor is different from that of general messages because two special factors: reason of individual and rumor refuting, affect the process of rumor dissemination besides conventional factor, i.e. information amount. In this paper, we propose a genetics-based rumor diffusion model (GRDM) which regards an individual with multiple rumors in a network as a ‘chromosome’ which is composed by a set of genes. The GRDM specifies a rule for interactions between chromosomes to model the rumor interactions between individuals. A series of experiments are done on the dynamic social network dataset collected from Sina-Weibo with 9299 users and 215386 pieces of following relationship information between them. The experimental results show that the genetic-algorithm-based rumor diffusion model is reasonable and feasible in demonstrating the diffusion of rumor in social networks and some key factors, i.e. starting node, individual reason and rumor refuting, would affect the propagation process.
Keywords: genetic algorithms; social networking (online); social sciences computing; GRDM; Sina Weibo; genetic algorithm; genetic-based rumor diffusion model; rumor dissemination process; rumor spreading process; social networks; Biological cells; Computational modeling; Mathematical model; Media; Social network services; Sociology; Statistics; rumor diffusion; social network (ID#: 15-8138)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245327&isnumber=7245317
Khatoun, R.; Gut, P.; Doulami, R.; Khoukhi, L.; Serhrouchni, A., “A Reputation System for Detection of Black Hole Attack in Vehicular Networking,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–5, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245328
Abstract: In recent years, vehicular networks has drawn special attention as it has significant potential to play an important role in future smart city to improve the traffic efficiency and guarantee the road safety. Safety in vehicular networks is crucial because that it affects the life of humans. It is essential like that the vital information cannot be modified or deleted by an attacker and must be also determine the responsibility of drivers while maintaining their privacy. The Black hole attack is a well-known and critical threat of network availability in vehicular environment. In this paper we present a new reputation system for vehicular networks, where each vehicle reports the packet transmission with its neighbours and the Trust Authority (TA) classifies the reliability of players based on the reports. This reputation system can quickly detect the malicious players in the network, prevent the damage caused by the Black hole attack and improve the effectiveness of routing process.
Keywords: mobile radio; road safety; smart cities; telecommunication network routing; black hole attack detection; malicious player detection; packet transmission; reputation system; road safety; routing process; smart city; trust authority; vehicular networking; Ad hoc networks; Packet loss; Protocols; Routing; Vehicles; Black hole attack; Intrusion detection; Smart City; Vehicular Networking (ID#: 15-8139)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245328&isnumber=7245317
Yue Wu; Fanchao Meng; Guanghao Wang; Ping Yi, “A Dempster-Shafer Theory Based Traffic Information Trust Model in Vehicular Ad Hoc Networks,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–7, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245329
Abstract: Road congestion has troubled hundreds of thousands of drivers for a long time. In recent years, an application named dynamic routing, in which vehicles reroute themselves around congested areas with road information received, is proposed to deal with traffic jam. Due to lack of trust for traffic information data in vehicular ad hoc networks (VANETs), malicious vehicles can easily disseminate false road information and mislead other vehicles to choose the wrong route. This paper proposes a new data centric trust model for traffic information in VANETs, which is based on data trust rather than entity trust to verify road information, and utilizes Dempster-Shafer theory in general voting algorithm to increase robustness. Simulation results show that our model avoids malicious fake road information and effectively improves the vehicle’s travelling time performance without additional information exchange.
Keywords: inference mechanisms; intelligent transportation systems; road traffic; uncertainty handling; vehicular ad hoc networks; Dempster-Shafer theory; VANET; dynamic routing; information exchange; road congestion; road information; traffic information data; traffic information trust model; traffic jam; vehicle travelling time; voting algorithm; Data models; Error analysis; Roads; Routing; Uncertainty; Vehicle dynamics; Vehicles; Data Centric Trust; Dempster-Shafer Theory; Dynamic Routing (ID#: 15-8140)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245329&isnumber=7245317
Drias, Z.; Serhrouchni, A.; Vogel, O., “Analysis of Cyber Security for Industrial Control Systems,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–8, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245330
Abstract: Industrial control systems (ICS) are specialized information systems that differs significantly form traditional information systems used in the IT world. The main use of ICS is to manage critical infrastructures such as, Oil and Natural Gas facilities, nuclear plants, smart grids, water and waste water ... etc. ICS have many unique functional characteristics, including a need for real-time response and extremely high availability, predictability, reliability, as well as distributed intelligence. Which for, many advanced computing, communication and internet technologies were integrated to the ICS to cover more costumers requirements such as mobility, data analytics, extensibility ... etc. The integration of these technologies makes from the ICS open systems to the external world; this openness exposes the critical infrastructures to several Cyber security critical issues. Nowadays, cyber security emerges to be one of the most critical issues because of the immediate impact and the high cost of cyber-attacks. In this paper, we present a comprehensive analysis of cyber security issues for ICS. Specifically we focus on discussing and reviewing the different types and architectures of an ICS, security requirements, different threats attacks, and existing solutions to secure Industrial control systems. By this survey, we desire to provide a clear understanding of security issues in ICS and clarify the different research issues to solve in the future.
Keywords: control engineering computing; industrial control; information systems; open systems; production engineering computing; security of data; ICS open systems; IT world; critical infrastructures; cyber security analysis; cyber-attacks; distributed intelligence; natural gas facilities; nuclear plants; oil facilities; secure Industrial control systems; security requirements; smart grids; specialized information systems; threats attacks; wastewater; Computer security; Internet; Process control; Protocols; Servers; Cyber security; DCS; ICS; SCADA (ID#: 15-8141)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245330&isnumber=7245317
Guenane, F.A.; Serhrouchni, A., “Secure Access & Authentication for Collaborative Intercloud Exchange Service,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no.,
pp. 1–5, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245331
Abstract: Recent advances in information technology make remote collaboration and resource sharing easier for next generation of distributed systems. The Intercloud is an interconnection system of several cloud provider infrastructures that allows the dynamic coordination of the deployment of applications and the distribution of the load across multiple data centers. In this paper, we propose a new design to establish a new generation of secure collaborative cloud services where several companies are patially or fully pooling their resources to optimize their operating costs and increase the availability of their services in a secure way by performing secure access & authentication for collaborative interCloud exchange services.
Keywords: authorisation; cloud computing; computer centres; groupware; authentication; cloud provider infrastructures; collaborative intercloud exchange service; data centers; information technology; operating costs; remote collaboration; resource sharing; secure access; secure collaborative cloud services; Authentication; Cloud computing; Collaboration; Computational modeling; Computer architecture; Servers; Access Control; Collaborative Internet; Identity Management; Intercloud; Security As A Service (ID#: 15-8142)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245331&isnumber=7245317
Begriche, Youcef; Khatoun, Rida; Khoukhi, Lyes; Chen Xiuzhen, “Bayesian-Based Model for a Reputation System in Vehicular Networks,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245332
Abstract: Vehicular ad hoc networks (VANETs) are a cost-effective technology to enhance driving safety and traffic efficiency. In such promising networks, security is of prime concern because an attack by a malicious vehicle might have disastrous impact leading to loss of life. Reputation trust management has been proposed in the recent years as a novel way to tackle some of those not yet solved threats in VANETs. In this paper, we propose a robust distributed reputation model based on Bayesian filter. The model allows nodes to establish profiles (e.g., malicious, honest) on their neighbors and to detect malicious behaviors (e.g., black hole, gray hole). The simulation results proved that intentionally dropping packets in VANETs can be fully detected, with our proposed Bayesian filter, with high level of accuracy.
Keywords: Bayes methods; radiofrequency filters; road safety; road traffic; vehicular ad hoc networks; Bayesian filter; Bayesian-based model; VANET; driving safety enhancement; reputation system; reputation trust management; robust distributed reputation model; traffic efficiency enhancement; vehicular ad hoc network; Computer security; Monitoring; Safety; Sensitivity; Vehicles (ID#: 15-8143)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245332&isnumber=7245317
Huangmiao Chen; Xiuzhen Chen; Lei Fan; Changsong Chen, “Classified Security Protection Evaluation for Vehicle Information System,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245673
Abstract: This paper firstly analyzes security vulnerabilities, threats and special security requirements of current vehicle information system. And further referring to the classified security protection evaluation standards of traditional information system, we establish classified security protection evaluation system for vehicle information system. This system summarizes typical information assets in car system, divides vehicle information system into two classes/levels: family and business, and defines target and requirement of security protection for two kinds of vehicle information system, respectively. Finally, a series of feasible evaluation methods and tools are presented for evaluation practice. A big contribution of this paper is to explore classified security protection evaluation for vehicle information system and fills up the gap of evaluating security state of automotive information system all over the world.
Keywords: automobiles; security of data; traffic information systems; automotive information system; business; car system; classified security protection evaluation standards; classified security protection evaluation system; family; information assets; security requirements; security threats; security vulnerabilities; vehicle information system; Access control; Authentication; Bluetooth; Information systems; Monitoring; Vehicles; classified security protection; evaluation system; security vulnerability and threat (ID#: 15-8144)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245673&isnumber=7245317
Gantsou, D., “On the Use of Security Analytics for Attack Detection in Vehicular Ad Hoc Networks,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245674
Abstract: A vehicular ad hoc network (VANET) is a special kind of mobile ad hoc network built on top of the IEEE802.11p standard for a better adaptability to the wireless mobile environment. As it is used for both supporting vehicle-to-vehicle (V2V) as well as vehicle-to-infrastructure (V2I) communications, and connecting vehicles to external resources including cloud services, Internet, and user devices while improving the road traffic conditions, VANET is a Key component of intelligent transportation systems (ITS). As such, VANET can be exposed to cyber attacks related to the wireless environment, and those of traditional information technologies systems it is connected to. However, when looking at solutions that have been proposed to address VANET security issues, it emerges that guaranteeing security in VANET essentially amounts to resorting to cryptographic-centric mechanisms. Although the use of public key Infrastructure (PKI) fulfills most VANET’ security requirements related to physical properties of the wireless transmissions, simply relying on cryptography does not secure a network. This is the case for vulnerabilities at layers above the MAC layer. Because of their capability to bypass security policy control, they can still expose VANET, and thus, the ITS to cyber attacks. Thereby, one needs security solutions that go beyond cryptographic mechanisms in order cover multiple threat vectors faced by VANET. In this paper focusing on attack detection, we show how using an implementation combining observation of events and incidents from multiple sources at different layers Sybil nodes can be detected regardless of the VANET architecture.
Keywords: intelligent transportation systems; telecommunication security; vehicular ad hoc networks; IEEE802.11p standard; VANET; attack detection; cryptographic-centric mechanisms; cyber attacks; mobile ad hoc network; security analytics; wireless mobile environment; Communication system security; Cryptography; IP networks; Vehicles; Vehicular ad hoc networks; Intelligent Transportation Systems (ITS); Vehicular ad hoc network (VANET) security (ID#: 15-8145)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245674&isnumber=7245317
Rmayti, M.; Begriche, Y.; Khatoun, R.; Khoukhi, L.; Gaiti, D., “Flooding Attacks Detection in MANETs,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245675
Abstract: Flooding attacks are well-known security threats that can lead to a denial of service (DoS) in computer networks. These attacks consist of an excessive traffic generation, by which an attacker aim to disrupt or interrupt some services in the network. The impact of flooding attacks is not just about some nodes, it can be also the whole network. Many routing protocols are vulnerable to these attacks, especially those using reactive mechanism of route discovery, like AODV. In this paper, we propose a statistical approach to defense against RREQ flooding attacks in MANETs. Our detection mechanism can be applied on AODV-based ad hoc networks. Simulation results prove that these attacks can be detected with a low rate of false alerts.
Keywords: computer network security; mobile ad hoc networks; routing protocols; statistical analysis; telecommunication traffic; AODV; DoS; MANET; RREQ flooding attacks; ad hoc on-demand distance vector; computer networks; denial of service; flooding attack detection; route discovery; routing protocols; security threats; traffic generation; Ad hoc networks; Computer crime; IP networks; Routing; Routing protocols (ID#: 15-8146)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245675&isnumber=7245317
Xiao Chen; Liang Pang; Yuhuan Tang; Hongpeng Yang; Zhi Xue, “Security in MIMO Wireless Hybrid Channel with Artificial Noise,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–4, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245676
Abstract: Security is an important issue in the field of wireless channel. In this paper, the security problem of Gaussian MIMO wireless hybrid channel is considered where a transmitter with multiple antennas sends information to an intended receiver with one antenna in the presence of an eavesdropper with multiple antennas. Through utilizing some of the power to produce ‘artificial noise’, the transmitter can only degrade the eavesdropper’s channel to ensure the security of the communication. But there is an inherent weakness in this scheme. Then a Hybrid Blind Space Elimination (HBSE) scheme is proposed and proved to fix the design flaw in order to strengthen the original scheme.
Keywords: Gaussian channels; MIMO communication; wireless channels; Gaussian MIMO wireless hybrid channel; HBSE scheme; artificial noise; hybrid blind space elimination scheme; security problem; Communication system security; Noise; Receiving antennas; Security; Transmitting antennas; Wireless communication; HBSE; MIMO-WHC; Security; secrecy capacity; wireless hybrid channel (ID#: 15-8147)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245676&isnumber=7245317
Tan Heng Chuan; Jun Zhang; Ma Maode; Chong, P.H.J.; Labiod, H., “Secure Public Key Regime (SPKR) in Vehicular Networks,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–7, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245678
Abstract: Public Key Regime (PKR) was proposed as an alternative to certificate based PKI in securing Vehicular Networks (VNs). It eliminates the need for vehicles to append their certificate for verification because the Road Side Units (RSUs) serve as Delegated Trusted Authorities (DTAs) to issue up-to-date public keys to vehicles for communications. If a vehicle’s private/public key needs to be revoked, the root TA performs real time updates and disseminates the changes to these RSUs in the network. Therefore, PKR does not need to maintain a huge Certificate Revocation List (CRL), avoids complex certificate verification process and minimizes the high latency. However, the PKR scheme is vulnerable to Denial of Service (DoS) and collusion attacks. In this paper, we study these attacks and propose a pre-authentication mechanism to secure the PKR scheme. Our new scheme is called the Secure Public Key Regime (SPKR). It is based on the Schnorr signature scheme that requires vehicles to expend some amount of CPU resources before RSUs issue the requested public keys to them. This helps to alleviate the risk of DoS attacks. Furthermore, our scheme is secure against collusion attacks. Through numerical analysis, we show that SPKR has a lower authentication delay compared with the Elliptic Curve Digital Signature (ECDSA) scheme and other ECDSA based counterparts.
Keywords: mobile radio; public key cryptography; certificate revocation list; collusion attack; complex certificate verification process; delegated trusted authorities; denial of service attack; lower authentication delay; preauthentication mechanism; road side units; secure public key regime; vehicular networks; Authentication; Computer crime; Digital signatures; Public key; Vehicles; Collusion Attacks; Denial of Service Attacks; Schnorr signature; certificate-less PKI (ID#: 15-8148)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245678&isnumber=7245317
Msahli, M.; Hammi, M.T.; Serhrouchni, A., “Safe Box Cloud Authentication Using TLS Extension,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245679
Abstract: Although the great success and the popularity of Cloud computing, an important number of challenges and threats are inherent to this new computing paradigm. One of the serious challenges in Cloud service architecture is managing authentication. Our goal in this paper is to present a flexible authentication solution based on TLS standard and asynchronous one time password mechanism. Our purpose is to be as close as possible to the TLS standard treatment and calculation of different security settings. The addition of a strong password (HOTP) preserves a maximum of operational reliability to TLS protocol. We also offer the same strength client authentication method as digital certificate. In this paper we will also demonstrate the efficiency of the proposed framework as an authentication alternative in case of private Safe Box Cloud Service.
Keywords: cloud computing; message authentication; protocols; software architecture; Safe Box Cloud service authentication; TLS protocol; cloud service architecture; transport layer security; Authentication; Cloud computing; Protocols; Servers; Standards; Synchronization; Cloud; GNUTLS; HOTP; TLS; security (ID#: 15-8149)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245679&isnumber=7245317
Memmi, G.; Kapusta, K.; Han Qiu, “Data Protection: Combining Fragmentation, Encryption, and Dispersion,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no.,
pp. 1–9, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245680
Abstract: In this paper, we first present a general description of what is a fragmentation system including a number of high level requirements. Then, we focus on fragmentation of two kinds of data. First, a bitmap image is split in two parts a public one and a private one. We describe two processes and address the question of performance. Then, we survey works on fragmentation of text: in a brute force manner then considering data stored in a structured database.
Keywords: cryptography; data protection; database management systems; image processing; text analysis; bitmap image; data fragmentation; dispersion; encryption; structured database; text fragmentation; Computer security; Discrete cosine transforms; Encryption; Frequency-domain analysis; Graphics processing units; Portable computers; Data protection; GPU; data dispersion; database; defragmentation; encryption; fragmentation; image encryption; information protection; privacy; selective encryption
(ID#: 15-8150)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245680&isnumber=7245317
Zheng Li-xiong; Xu Xiao-lin; Li Jia; Zhang Lu; Pan Xuan-chen; Ma Zhi-yuan; Zhang Li-hong, “Malicious URL Prediction Based on Community Detection,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–7, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245681
Abstract: Traditional Anti-virus technology is primarily based on static analysis and dynamic monitoring. However, both technologies are heavily depended on application files, which increase the risk of being attacked, wasting of time and network bandwidth. In this study, we propose a new graph-based method, through which we can preliminary detect malicious URL without application file. First, the relationship between URLs can be found through the relationship between people and URLs. Then the association rules can be mined with confidence of each frequent URLs. Secondly, the networks of URLs was built through the association rules. When the networks of URLs were finished, we clustered the date with modularity to detect communities and every community represents different types of URLs. We suppose that a URL has association with one community, then the URL is malicious probably. In our experiments, we successfully captured 82% of malicious samples, getting a higher capture than using traditional methods.
Keywords: computer viruses; data mining; graph theory; program diagnostics; association rule; community detection; dynamic monitoring; graph-based method; malicious URL prediction; network bandwidth; static analysis; traditional anti-virus technology; Association rules; Malware; Mobile communication; Monitoring; Uniform resource locators; Anti-Virus; Association Rules; Community Detection; Malicious URL (ID#: 15-8151)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245681&isnumber=7245317
Brauchli, A.; Depeng Li, “A Solution Based Analysis of Attack Vectors on Smart Home Systems,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245682
Abstract: The development and wider adoption of smart home technology also created an increased requirement for safe and secure smart home environments with guaranteed privacy constraints. After a short survey of privacy and security in the more broad smart-world context this paper lists, analyzes and ranks possible attack vectors or entry points into a smart home system and proposes solutions to remedy or diminish the risk of compromised security or privacy. Further, we evaluate the usability impacts resulting from the proposed solutions. The smart home system used for the analysis in this paper is a digital STROM installation, a home-automation solution that is quickly gaining popularity in central Europe, the findings, however, aim to be as solution independent as possible.
Keywords: data privacy; home automation; security of data; attack vector solution based analysis; central Europe; digital STROM installation; home-automation solution; privacy constraints; secure smart home systems; Decision support systems; Home appliances; Privacy; Security; Servers; Smart homes; Smart phones (ID#: 15-8152)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245682&isnumber=7245317
Singh, P.; Garg, S.; Kumar, V.; Saquib, Z., “A Testbed for SCADA Cyber Security and Intrusion Detection,” in Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on, vol., no., pp. 1–6, 5–7 Aug. 2015. doi:10.1109/SSIC.2015.7245683
Abstract: Power grid is an important element of the cyber physical systems. Attacks on such infrastructure may have catastrophic impact and hence the mitigation solutions for the attacks are necessary. It is impractical to test attacks and mitigation strategies on real networks. A testbed as a platform bridges the cyber-physical divide by bringing in the physical system inside the cyber domain, and test the attack scenarios. We are proposing such a testbed here that can simulate power systems Supervisory Control and Data Acquisition (SCADA). The testbed consists of traffic generator, simulated devices like Remote Terminal Units (RTUs), Master Terminal Unit (MTU), Human Machine Interface (HMI) etc. and the communication channel wrapped around industrial communication protocols such as IEC-60870-5-101 and DNP3. The proposed testbed includes with a comparator module which helps in detecting potential intrusions at RTU. A compromised RTU can be manipulated to send fabricated commands in the grid or to send polled responses from the grid. Detecting compromised systems at early stages helps in reducing damage to Industrial Control System (ICS) and providing higher security measures.
Keywords: SCADA systems; human computer interaction; power grids; security of data; HMI; ICS; MTU; RTU; SCADA; SCADA cyber security; cyber physical systems; cyber-physical divide; human machine interface; industrial control system; intrusion detection; master terminal unit; power grid; remote terminal units; supervisory control and data acquisition; Computer security; Generators; Process control; Protocols; SCADA systems; Industrial Control Systems; Intrusion Detection; Power System Simulation; SCADA Security; Test-bed (ID#: 15-8153)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7245683&isnumber=7245317
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
International Conferences: Communications and Signal Processing (ICCSP) India, 2015 |
The 2015 International Conference on Communications and Signal Processing (ICCSP) was held 2–4 April 2015 in Melmaruvathur, Tamilnadu, India. This very large conference featured more than four hundred papers and presentations. The work cited here is related to the Science of Security.
Awasthi, D.; Madhe, S., “Evaluation of Wavelet Based ECG Steganography System by Using Percentage Residual Difference (PRD) Measurements,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0559–0563, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322548
Abstract: Remote healthcare monitoring and Point of Care (PoC) based systems are widely used for managing diagnostic information of patients. These systems introduce many threats such as privacy, security data integrity, reliability, accuracy, etc. issues. In this paper, a new technique is introduced for solving the problem of privacy and security issues. In proposed method, ECG steganography technique using Discrete Wavelet Transforms (DWT) is implemented. This method is based on encryption and decryption techniques. Encryption method is used to hide the patient information inside the ECG signal by using scrambling matrix and shared key and produces the watermarked ECG signal. Decryption method is used to extract the patient secret information from the ECG signal by using same shared key and scrambling matrix. For evaluating the diagnosability, Percentage Residual Difference (PRD) and extracted PRD measurements are analyzed. From the results, tables are calculated that there is no difference between PRD of original ECG and extracted ECG so watermarked ECG is also used for diagnosis purpose. In this paper, Signal to Noise Ratio (SNR) of normal PRD and extracted PRD are calculated using different wavelets and we have concluded that sym20 wavelet gives better response from the results than any other wavelet.
Keywords: cryptography; data privacy; discrete wavelet transforms; electrocardiography; health care; medical computing; patient monitoring; steganography; ECG steganography technique; PRD measurements; decryption technique; encryption method; encryption technique; percentage residual difference; percentage residual difference measurements; point-of-care based systems; privacy issues; remote healthcare monitoring; scrambling matrix; security data integrity; security issues; signal-to-noise ratio; watermarked ECG signal; wavelet based ECG steganography system; Distortion measurement; Electrocardiography; Encryption; Medical services; Signal to noise ratio; Wavelet coefficients; Confidentiality; DWT; ECG; PRD; SNR; decryption; encryption; energy; wavelets (ID#: 15-8108)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322548&isnumber=7322423
T.V.S. Gowtham Prasad.; Varadarajan, S., “A Novel Hybrid Audio Steganography for Imperceptible Data Hiding,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0634–0638, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322565
Abstract: In recent years, extensive research has been taken for hiding data into digital audio signal because of advantages of psycho acoustical masking phenomenon of human auditory system [HAS]. This paper presents a novel method based on audio steganography by integrating optimal steganography and two level cryptographic methods. Improvement of imperceptibility of data hiding and increased security level for the secret data has been provided. In optimal steganography the random positions of the samples in audio signal are generated by a polynomial expression as a function of cover media to improve the data hiding capability. Imperceptibility of proposed method is validated using subjective and objective measures. Experimental results show that the proposed method is best suitable for hiding data in audio.
Keywords: audio signal processing; steganography; cover media function; data hiding imperceptibility improvement; digital audio signal; human auditory system; hybrid audio steganography; polynomial expression; psycho acoustical masking phenomenon; two level cryptographic method; Ciphers; Instruments; Mathematical model; Payloads; Robustness; Speech; Audio Steganography; Cryptography; Human Auditory System [HAS] (ID#: 15-8109)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322565&isnumber=7322423
A.P. Anusha Naidu; Joshi, Poorvi K., “FPGA Implementation of Fully Pipelined Advanced Encryption Standard,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0649–0653, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322568
Abstract: With worldwide communication of the private and confidential data over the computing networks or internet, there is always a chance of threat of data confidentiality, data integrity and also of data availability. Information has become one of the most important assets in growing demand of need to store every single importance of events in everyday of our life. Encipherment is one of the important security mechanisms to protect the data from public access. Encryption will convert the data in such a manner that only a person who has special knowledge of reading it can be able to read it. The Advanced Encryption Standard (AES) is considered to be the strongest encryption technique in cryptography. Advanced Encryption Standard (AES) is a symmetric key block cipher which will encrypt as well as decrypt the data block. Advanced Encryption Standard (AES) can be implemented in both software and hardware. As compared to software implementation hardware implementation of AES has an advantage of increased throughput and more security. In this paper we have presented the FPGA based implementation of 128-bit Advanced Encryption Standard (AES) using fully pipelined architecture. Our proposed architecture can deliver higher throughput at both encryption and decryption operations. Xilinx ISE design suite 13.1 is used for design and Spartan-3 for implementation.
Keywords: cryptography; field programmable gate arrays; pipeline processing; AES; FPGA implementation; Internet; Xilinx ISE design; computing networks; data availability; data block; data confidentiality; data integrity; decryption operations; encryption operations; pipelined advanced encryption standard; pipelined architecture; public access; security mechanism; symmetric key block cipher; worldwide communication; Algorithm design and analysis; Computer architecture; Encryption; Hardware; Software; Standards; Cipher; Decryption; PGA; Pipelining; VHDL (ID#: 15-8110)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322568&isnumber=7322423
D. Anita Daniel; S. Emalda Roslin, “A Review on Existing Security Frameworks with Efficient Energy Preservation Techniques in Wireless Sensor Networks,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0658–0662, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322571
Abstract: Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications like military, nuclear power plant, health care etc., where security is a critical issue. However WSN possess various constraints like low computation capability, limited memory, reduced battery life, lack of infrastructure which imposes security as an additional challenging task. In this paper a detailed investigation on the security related issues and challenges in WSN are made. Also an overview on various security frameworks with efficient energy preservation techniques is given.
Keywords: energy conservation; telecommunication power management; telecommunication security; wireless sensor networks; WSN security issues; efficient energy preservation techniques; energy preservation technique; wireless sensor network security framework; Computational efficiency; Encryption; Indexes; Jamming; Wireless sensor networks; energy efficient; frameworks; security; survey (ID#: 15-8111)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322571&isnumber=7322423
Kadar, M.M.A.; Ananthalakshmi, A.V., “An Energy Efficient Montgomery Modular Multiplier for Security Systems Using Reversible Gates,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no.,
pp. 0071–0074, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322580
Abstract: Recently, Security requirements for electronic transactions have become an important concern. RSA is the widely adopted public key algorithms. The RSA public key cryptography uses modular exponentiation operation both for encryption and decryption. A famous approach is Montgomery modular multiplication decreases the multiplication period dramatically. Today’s system loses information after every logic operation. The amount of energy dissipated for every lost bit is KTln2. Reversible logic has gained much interest in recent years due to its ability in preserving the information without any energy loss. Therefore Montgomery modular multiplier designed using reversible logic gates gives better energy efficiency in terms of number of gates used, number of garbage outputs produced and quantum costs.
Keywords: digital arithmetic; logic gates; multiplying circuits; power aware computing; public key cryptography; RSA public key cryptography; decryption; electronic transactions; encryption; energy efficiency; energy efficient Montgomery modular multiplier; modular exponentiation operation; quantum costs; reversible logic gates; security systems; Algorithm design and analysis; Cryptography; Lead; Logic gates; Registers; CSA; MUX; Reversible gates; Shift register (ID#: 15-8112)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322580&isnumber=7322423
Vishvaksenan, K.S.; Mithra, K., “Performance of Coded Joint Transmit Scheme Aided MIMO-IDMA System for Secured Medical Image Transmission,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0799–0803, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322603
Abstract: In this paper, we investigate the performance of multiple-input multiple-output aided coded interleave division multiple access (IDMA) system for secured medical image transmission through wireless communication. We realize the MIMO profile using four transmit antennas at the base station and three receive antennas at the mobile station. We achieve bandwidth efficiency using discrete wavelet transform (DWT). Further we implement Arnold’s Cat Map (ACM) encryption algorithm for secured medical transmission. We consider celulas as medical image which is used to differentiate between normal cell and carcinogenic cell. In order to accommodate more users’ image, we consider IDMA as accessing scheme. At the mobile station (MS), we employ non-linear minimum mean square error (MMSE) detection algorithm to alleviate the effects of unwanted multiple users image information and multi-stream interference (MSI) in the context of downlink transmission. In particular, we investigate the effects of three types of delay-spread distributions pertaining to Stanford university interim (SUI) channel models for encrypted image transmission of MIMO-IDMA system. From our computer simulation, we reveal that DWT based coded MIMO-IDMA system with ACM provides superior picture quality in the context of DL communication while offering higher spectral efficiency and security.
Keywords: MIMO communication; antenna arrays; code division multiple access; discrete wavelet transforms; interleaved codes; least mean squares methods; medical image processing; transmitting antennas; Arnold’s Cat Map encryption algorithm; DWT; Stanford University Interim channel models; carcinogenic cell; coded joint transmit scheme aided MIMO-IDMA system; discrete wavelet transform; medical image transmission; mobile station; multiple-input multiple-output aided coded interleave division multiple access system; multistream interference; nonlinear minimum mean square error detection algorithm; normal cell; unwanted multiple users image information; Antennas; Biomedical imaging; Europe; Interference; MIMO; Streaming media; Yttrium; Double space-time transmit diversity (DSTTD); LTE channel model; multi Stream interference (MSI) SUI channel model; multi-user detection (MUD); multiple access interference (MAI); multiple input multiple output (MIMO) (ID#: 15-8113)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322603&isnumber=7322423
Brumancia, E.; Sylvia, A., “A Profile Based Scheme for Security in Clustered Wireless Sensor Networks,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0823–0827, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322608
Abstract: Data aggregation in WSN is usually done by simple methods such as averaging; these methods are vulnerable to certain attacks. To make trust of data and reputation of sensor nodes will be capable of performing more sophisticated data aggregation algorithm, thus making less vulnerable. Iterative filtering algorithm holds great promise for this purpose. To protect WSN from security issue, we introduce an improved iterative filtering technique. This technique makes them not only collusion robust, but also more accurate and faster converging. Trust and reputation systems have a significant role in supporting the operation of a wide range of distributed systems, from wireless sensor networks and e-commerce infrastructure to social networks, by providing an assessment of trustworthiness of participants in a distributed system. We assume that the stochastic components of sensor errors are independent random variables with a Gaussian distribution; however, our experiments show that our method works quite well for other types of errors without any modification. Moreover, if the error distribution of sensors is either known or estimated, our algorithms can be adapted to other distributions to achieve an optimal performance. In the first stage we provide an initial estimate of two noise parameters for sensor nodes, bias and variance; details of the computations for estimating bias and variance of sensors. We provide an initial estimate of the reputation vector calculated using the MLE, the detailed computation operations. In the third stage of the proposed framework, the initial reputation vector provided in the second stage is used to estimate the trustworthiness of each sensor based on the distance of sensor readings to such initial reputation vector.
Keywords: Gaussian distribution; filtering theory; iterative methods; maximum likelihood estimation; telecommunication security; wireless sensor networks; Gaussian distribution; Iterative filtering algorithm; MLE; WSN protection; clustered wireless sensor network security; data aggregation algorithm; distributed system; e-commerce infrastructure; profile based scheme; reputation vector estimation; social network; trust and reputation system; Atmospheric measurements; Detectors; Indexes; Monitoring; Particle measurements; Wireless networks; Wireless sensor networks; Cluster Head (CH); Cluster Member (CM); Data Aggregation; Wireless Sensor Network (WSN)}, (ID#: 15-8114)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322608&isnumber=7322423
Sonawane, H.A.; Pattewar, T.M., “A Comparative Performance Evaluation of Intrusion Detection Based on Neural Network and PCA,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0841–0845,
2–4 April 2015. doi:10.1109/ICCSP.2015.7322612
Abstract: Security is the biggest challenge for the digital data of information systems and computer networks. Some systems are used for providing security to this data. Like these systems intrusion detection system (IDS) is used for providing security to computer networks and information systems. In IDS many systems uses number of techniques for providing accuracy by selecting complete features of dataset but they lagged in terms of time and memory. For real time applications time and memory is critical issue. So, there is a need of such systems which will minimize time and memory parameters. This paper presents IDS using two Methods. These both methods based on neural network. First method uses less features of dataset using Principal component Analysis (PCA) technique and second method uses complete features of dataset. Experiments are performed on these two methods using KDD Cup 99 dataset. The results simulate the effect of less featured based incomplete learning technique and complete feature based learning technique. According to the obtained results when the system usage the less features of KDD Cup 99 dataset with incomplete instances of data then the classification accuracy of model becomes less efficient as compared to the entire dataset training but it is efficient for time and memory parameters. So, Method I is beneficial for real time applications. These both systems are developed using Java technology.
Keywords: learning (artificial intelligence); neural nets; pattern classification; principal component analysis; security of data; software performance evaluation; IDS; Java technology; KDD Cup 99 dataset; PCA technique; comparative performance evaluation; complete feature based learning technique; computer networks; dataset training; digital data; featured based incomplete learning technique; information systems; intrusion detection system; neural network; principal component analysis; Accuracy; Computational modeling; Cryptography; Image edge detection; Indexes; Neural networks; Principal component analysis; Backpropagation; Intrusion Detection System (IDS); KDD Cup 99 Dataset; Neural Network; Principal Component Analysis (PCA) (ID#: 15-8115)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322612&isnumber=7322423
Patil, M.A.; Karule, P.T., “Design and Implementation of Keccak Hash Function for Cryptography,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0875–0878, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322620
Abstract: Security has become a very demanding parameter in today’s world of speed communication. It plays an important role in the network and communication fields where cryptographic processes are involved. These processes involve hash function generation which is a one-way encryption code used for security of data. The main examples include digital signatures, MAC (message authentication codes) and in smart cards. Keccak, the SHA-3 (secure hash algorithm) has been discussed in this paper which consists of padding and permutation module. This is a one way encryption process. High level of parallelism is exhibited by this algorithm. This has been implemented on FPGA. The implementation process is very fast and effective. The algorithm aims at increasing the throughput and reducing the area.
Keywords: cryptography; digital signatures; field programmable gate arrays; smart cards; telecommunication security; FPGA; Keccak Hash function implementation; MAC; SHA-3; cryptographic process; cryptography; data security; digital signature; message authentication code; one-way encryption code; smart card; Algorithm design and analysis; Cryptography; Hardware; Registers; Software; Cryptography; encryption; hash function; permutation; security (ID#: 15-8116)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322620&isnumber=7322423
Kavitha, R.J.; Caroline, B.E., “Hybrid Cryptographic Technique for Heterogeneous Wireless Sensor Networks,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp.1016–1020, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322653
Abstract: The wireless sensor networks are always deployed in hostile and pervasive environment. They are prone to security threats and they do have a wide range of applications like military, environmental monitoring, health care, etc... traditional network security methods are not up to the mark due to limited resources. Several key management schemes have been proposed security in HSN. In this paper, we propose a key distribution scheme based on random key pre-distribution for heterogeneous sensor networks to achieve better security and performance compared to homogeneous networks, which is suffer from high communication overhead, computation overhead and high storage requirements. A combination of symmetric and asymmetric keys were tried (hybrid), where the cluster head and BS use public key encryption based on ECC, while using symmetric key encryption between the adjacent nodes in the cluster.
Keywords: public key cryptography; telecommunication computing; ubiquitous computing; wireless sensor networks; BS; asymmetric key encryption; cluster head; heterogeneous wireless sensor network security method; high communication overhead; high computation overhead; high storage requirements; hostile environment; hybrid cryptographic technique; key distribution scheme; key management scheme; pervasive environment; public key encryption; random key pre-distribution scheme; security threats; symmetric key encryption; Elliptic curve cryptography; Encryption; ISO Standards; Wireless sensor networks; Yttrium; Heterogeneous wireless sensor network; elliptic curve cryptography (ECC); key management; symmetric encryption (ID#: 15-8117)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322653&isnumber=7322423
Shriram, R.R.; Mujawar, I.I., “Performance Evaluation of Quantized Table Based Data Hiding,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1138–1142, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322682
Abstract: Security to data can be provided using encryption techniques or by hiding it into some cover. Data hiding provides a means for covert type of communication. Performance of a data hiding technique based on quantization table is evaluated. An image is divided into 16×16 non-overlapping blocks instead of conventional 8×8 block size. Two-dimensional discrete cosine transform is applied on each block. The obtained frequency coefficients are then used to hide the secret data. Different parameters are chosen to evaluate the quality of image produced after hiding the data. Chosen data can be provided security to the extent up to which the opponent is unable of detecting the secret message by perception. The more the stego-image resembles the carrier image, more secure is the data hiding technique.
Keywords: cryptography; data encapsulation; discrete cosine transforms; performance evaluation; carrier image; data hiding technique; data security; encryption technique; frequency coefficient; quantization table; stego-image; two-dimensional discrete cosine transform; DCT; Data Hiding; Image; Quantization Table (ID#: 15-8118)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322682&isnumber=7322423
Prathima, P.; Kishore Rajendiran; G. Shri Ranjani; Preethi Kurian ; Swarupa, S., “Simple and Flexible Authentication Framework for Vehicular Ad Hoc NETworks,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1176–1180, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322690
Abstract: Vehicular Adhoc NETwork (VANET) provides a variety of applications for road safety, traffic efficiency and driver assistance. VANET enables two types of communication. The communication among vehicles is called as Vehicle-to-Vehicle (V2V) communication and the communication between the vehicle and the infrastructure is called as Vehicle-to-Infrastructure (V2I) communication. This can help to build safer and smart roads by providing timely information to the vehicles. In such scenarios there is a possibility of wide variety of attacks and hence there is a need for a security framework that will protect the network from different types of security attacks. The major security issues in VANET include jamming, forgery, in-transit traffic tampering, impersonation, privacy violation, on-board tampering. To address some of these issues a proper authentication scheme is required. The objective is to reduce the computational burden in authentication between vehicles in a heavy traffic scenario. In the proposed system, the Road Side Units (RSU) takes the responsibility to check for message integrity and authenticate the users which reduce the burden of individual vehicles from authenticating each other. The performance is evaluated in terms of average end-to-end delay, packet delivery ratio. The results show that the performance of the proposed system is better when compared to the performance of the traditional way of allowing the individual vehicles to authenticate each other.
Keywords: road safety; road traffic; telecommunication security; vehicular ad hoc networks; RSU; V2I communication; V2V communication; VANET; authentication scheme; driver assistance; end-to-end delay; flexible authentication framework; forgery; impersonation; in-transit traffic tampering; jamming; on-board tampering; packet delivery ratio; privacy violation; road side unit; security attack; smart road; traffic efficiency; vehicle-to-infrastructure communication; vehicle-to-vehicle communication; vehicular ad hoc network; Privacy; Read only memory; Roads; Schedules; Security; Vehicles; Vehicular ad hoc networks; Authentication; Average end-to-end delay; Packet delivery ratio; Vehicular Adhoc NETwork (ID#: 15-8119)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322690&isnumber=7322423
Gayathri, R.; Nagarajan, V., “Secure Data Hiding Using Steganographic Technique with Visual Cryptography and Watermarking Scheme,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no.,
pp. 0118-0123, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322691
Abstract: The Visual cryptography scheme (VCS) is a secure method that encrypts a secret image into shares. The key idea behind the proposed approach deals with information hiding in image using Zig-Zag scanning pattern which is more complex algorithm in Steganography again encrypted as shares by VC technique for embedding in separate host images to provide authentication for the VC shares which makes these secret shares invisible by embedding them into host images. The secret shares generated from VC encryption are watermarked into some host images using digital watermarking. Digital watermarking is used for providing the double security of image shares. The share is embedded into the host image using Least Significant Bit Insertion Technique (LSB). The scheme provides more secure and meaningful secret shares that are robust against a number of attacks. The performance of the proposed system is evaluated using peak signal to noise ratio (PSNR), histogram analysis and also numerical experimentation suggests that embedding time varies linearly with message length. The simulation results show that, the proposed system provides high level of security.
Keywords: cryptography; image watermarking; steganography; LSB; PSNR; VC encryption; VCS; digital watermarking scheme; histogram analysis; information hiding; least significant bit insertion technique; peak signal-to-noise ratio; secret image encryption; secure data hiding; steganographic technique; visual cryptography scheme; zig-zag scanning pattern; Authentication; Encryption; Image coding; Visualization; Watermarking; Host images; secret shares; Visual cryptography; Watermarking; Zig-Zag}, (ID#: 15-8120)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322691&isnumber=7322423
Nagdeve, S.H.; Ghodeswar, U.S., “Synthesis of Advanced Encryption Standards Using Xilinx 13.4,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1204-1208, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322697
Abstract: Secure System is significant part in the data communication. Randomization in the secret keys give raises to the security and complexity of the cryptography algorithms. However, the algorithms are compensating memory spaces and execution time. In Nov 2001 NIST select Advanced Encryption Standards (AES). Field programmable gate arrays (FPGAs), are reconfigurable in nature, low in price and. This paper proposes FPGA implementation of the 128-bits AES which is used to encrypt/decrypt block data using cipher key. This method is experimentally simulated by using 8 bit data path in VHDL using Xilinx ISE 13.4 based on FPGA technology.
Keywords: data communication; field programmable gate arrays; hardware description languages; private key cryptography; telecommunication security; AES; FPGA; Field programmable gate array; NIST; VHDL; Xilinx 13.4; advanced encryption standard; cipher key; cryptography algorithm; encrypt-decrypt block data; memory space compensation; secret key; secure system; Clocks; Cryptography; Delays; Field programmable gate arrays; Indexes; Niobium; Silicon; Advanced Encryption Standard (AES); Decryption; Encryption; FPGA implementation; Xilinx ISE 13.1 (ID#: 15-8121)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322697&isnumber=7322423
Kainalakaiinan, V.; Tamilselvaii, S., “An Efficient Cryptography Protocol Using Matrix Mapping Technique,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0134–0138, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322724
Abstract: Elliptic curve cryptography (ECC) is a new technique for public key cryptography like RSA, it offers same security level but with smaller key size. Steganography on the other hand, hides the existence of a message and in the best case nobody can see that both parties are communicating in secret. Developing Crypto-Steg model for security enhancement in wireless network is performed by encrypting the message using Elliptic curve Glyptography, and steganography technique. This paper propose FPGA implementations of the elliptic curve cryptography using matrix mapping concept as well as Steganography using LSB technique. Analysis, design and simulation of the elliptic curve and LSB module is done using XILEsX.
Keywords: field programmable gate arrays; matrix algebra; public key cryptography; Crypto-Steg model; ECC; FPGA implementations; LSB technique; RSA; cryptography protocol; elliptic curve cryptography; matrix mapping concept; matrix mapping technique; public key cryptography; security enhancement; steganography; wireless network; Companies; Encryption; Indexes; Cryptography; Elliptical Curve Cryptography; Matrix Mapping Methodology; Steganography (ID#: 15-8122)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322724&isnumber=7322423
Abbinaya, S.; Kumar, M.S., “Software Effort and Risk Assessment Using Decision Table Trained By Neural Networks,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp.1389–1394, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322738
Abstract: Software effort estimations are based on prediction properties of system with attention to develop methodologies. Many organizations follow the risk management but the risk identification techniques will differ. In this paper, we focus on two effort estimation techniques such as use case point and function point are used to estimate the effort in the software development. The decision table is used to compare these two methods to analyze which method will produce the accurate result. The neural network is used to train the decision table with the use of back propagation training algorithm and compare these two effort estimation methods (use case point and function point) with the actual effort. By using the past project data, the estimation methods are compared. Similarly risk will be evaluated by using the summary of questionnaire received from the various software developers. Based on the report, we can also mitigate the risk in the future process.
Keywords: decision tables; learning (artificial intelligence); neural nets; risk management; software engineering; decision table; neural networks; risk assessment; risk identification techniques; software development; software effort; Algorithm design and analysis; Lead; Security; artificial neural network; back propagation; decision table; feed forward neural networks; function point; regression; risk evaluation; software effort estimation; use case point (ID#: 15-8123)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322738&isnumber=7322423
Gawande, P.D.; Suryavanshi, Y., “Cryptography Based Secured Advanced on Demand Routing Protocol in MANET’s,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1478–1481, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322760
Abstract: Networks are being used in various areas and the mobile ad-hoc network (MANET) is the network in Laptops, smart phones. MANET is a dynamic network without the fixed infrastructure due to their wireless nature and topology and changes due to their dynamic nature. In MANET various routing protocols are used, AODV routing protocol is one of them and the AODV has the different characteristics, AODV is the reactive routing protocol and disadvantages of DSDV routing protocol is overcome by AODV. The failure of the link will degrade its characteristics as when the error message is sent back to source and the process get repeated. In this chapter, we are proposing a method when nodes or links fails to receive the data packets. Cryptography technique RC6 is used secure the network.
Keywords: computer network security; cryptography; data communication; electronic messaging; laptop computers; mobile ad hoc networks; radio links; routing protocols; smart phones; AODV routing protocol; DSDV routing protocol; Laptop; MANET; cryptography technique; data packet receival; demand routing protocol; error message; link failure; mobile ad hoc network; reactive routing protocol; smart phone; Cryptography; Mobile ad hoc networks; Mobile communication; Routing; Routing protocols; Mobile ad-hoc network; NS2; RC6; Routing protocol; Security (ID#: 15-8124)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322760&isnumber=7322423
Narmadha, R.; Malarkkan, S., “Random Number Based Authentication for Heterogeneous Networks,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1492–1496, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322763
Abstract: To deal with the increasing demand for heterogeneity, a new authentication protocol have been proposed to increase the efficiency of interworking wireless security; they enable mutual authentication among users in inter and intra domain networks. However, to expand inequitable distribution of heterogeneous networks, an intruder may impersonate a legitimate user’s signal. Therefore, a secure legitimate user detection method that can distinguish an allowed user’s gesture from an attacker’s gesture is needed. To generate a trust relationship between user, base station and home network, a novel approach for authenticating protocol which kowtow heterogeneity requirements. It integrates cryptographic credentials, public/private key of base station, random number challenges to facilitate user detection in the presence of intruders. The random number serves as an association, to enable a home network to verify equivalent certificate carried by the base station per user’s request. A key involvement in this paper is a new physical layer authentication technique that enables the base station authentication signals from its associated users.
Keywords: cryptographic protocols; radio networks; telecommunication security; authenticating protocol; authentication protocol; base station; base station authentication signals; cryptographic credentials; heterogeneous networks; home network; inter domain networks; interworking wireless security; intra domain networks; legitimate user signal; mutual authentication; physical layer authentication technique; public-private key; random number; secure legitimate user detection method; Authentication; Heterogeneous networks; Mobile communication; Mobile computing; Protocols; Radio networks; Yttrium; Authentication; Base station; Intrusion detection (ID#: 15-8125)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322763&isnumber=7322423
Jayaprakash, R.; Murugappan, S., “Intrusion Detection Based on KELM with Levenberg-Marquardt Optimization,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0154–0156, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322769
Abstract: Intrusion is an illegitimate event that can either be active or passive in a network. In this work, we propose an Intrusion Detection System (IDS) on the basis of Kernel Extreme Learning Machine (KELM) clubbed with Levenberg-Marquardt optimization technique. We incorporate KELM in this work, because of its efficiency in pattern recognition. Levenberg-Marquardt optimization technique is employed because of its efficiency over other gradient descent techniques. The proposed system is compared with several existing works and the results obtained are satisfactory.
Keywords: learning (artificial intelligence); optimisation; security of data; KELM; Levenberg-Marquardt optimization; intrusion detection; kernel extreme learning machine; Accuracy; Electronic mail; Indexes; Kernel; Mobile communication; Optimization; Support vector machines; IDS (ID#: 15-8126)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322769&isnumber=7322423
Rao, A.; Borkar, P., “A Review on Heuristic Approaches for Mobile Sensors in Sensor Networks,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1569–1573, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322781
Abstract: The sensing field may contain obstacles of any shape and size. As the number of wireless sensor network applications continues to grow, the need for specialized task scheduling mechanisms, aware of the sensor devices capabilities and real time resource availability, is becoming more and more apparent. How to efficiently dispatch the mobile sensor to find an obstacle-avoiding shortest path is a big confront. WSN consists of two important categories of sensors. Static sensors monitor the environment and report where events appear in the sensing field. Whereas, mobile sensors are dispatched to these event locations to perform in-depth analysis. A proficient scheduling technique of the mobile sensors, which aims to prolong the lifetime of the hybrid WSN in presence of obstruction as long as possible must be implemented. Current approaches to energy conservation reduce the energy consumption of the wireless interface either for a given communication task or during idling while considering the complexity of the system, we only consider the one-to-one shortest path problem. That is why a single mobile sensor is sent out to a single event location. Path efficiency of sensors is our goal as well as energy optimization is our another goal therefore they must be scheduled to reduce and balance the moving distances. Therefore various heuristic approaches or schemes are considered for better optimal solutions.
Keywords: optimisation; wireless sensor networks; WSN; energy optimization; mobile sensors; one-to-one shortest path problem; static sensors; wireless interface; wireless sensor network; Monitoring; Security; Wireless sensor networks; Dispatch; Heuristic; Optimization (ID#: 15-8127)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322781&isnumber=7322423
Kirutiga, M.C.; Narayan, K.; Chinmayi, A., “Correlation Delay Shift Keying Based Chaos MIMO Communication System,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1690-1694, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322807
Abstract: In recent years chaos communication systems have emerged as an alternative solution to conventional spread spectrum systems. The security of chaos communication system is superior to other digital communication system, because it has characteristics such as non-periodic, wide-band, non- predictability, easy implementation and sensitive initial condition. This paper makes a primary contribution to evaluate the BER performance of Chaos MIMO Communication system. The different maps that have been considered are Tent map, Boss map, Henon map and logistic map. The modulation scheme that has been considered is CDSK in presence of AWGN channel.
Keywords: AWGN channels; MIMO communication; chaotic communication; error statistics; spread spectrum communication; AWGN channel; BER performance; Boss map; Henon map; Tent map; chaos MIMO communication system; correlation delay shift keying; digital communication system; logistic map; sensitive initial condition; spread spectrum systems; AWGN; Chaotic communication; Fading; MIMO; Silicon; Chaos maps; Logistic map; Rayleigh channel CDSK (correlation delay shift keying) (ID#: 15-8128)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322807&isnumber=7322423
Thejdeep, G.; Shiva Sagar, B.; Siddartha, L.K.; Chandavarkar, B.R., “Detecting Rogue Access Points Using Kismet,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0172–0175, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322813
Abstract: As large scale organisations tend to expand their wired network infrastructure with the help of access points, increase in the threat to the security of the organisation also occurs. One of the main concerns is that of Rogue Access Points (RAP). In this paper, we discuss about detecting such access points using a Network Sniffing and Intrusion Detection tool called as Kismet.
Keywords: computer network security; Kismet; RAP; intrusion detection tool; network sniffing; rogue access points; wired network infrastructure; Reactive power; Access Points; Network Security (ID#: 15-8129)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322813&isnumber=7322423
Bele, Y.V.; Suryavanshi, Y.A.; “Design High Security AES with Fault Detection Countermeasure,” in Communications
and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1777–1781, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322828
Abstract: Cryptography is a method that has been developed to ensure security of messages and transfer of data. Advanced Encryption Standard (AES) is the first choice for many critical applications. The AES is a Federal Information Processing Standard (FIPS) which is cryptographic algorithm used to protect electronic data. Implementations of the Advanced Encryption Standard (AES) have rapidly grown in various applications including telecommunications, finance and networks that require low power consumptions, low cost design, less delay and especially it should be more secured. In this paper, the implementation details of the AES 128-bit Encryption and Decryption are presented. Area required, Delay, Power for conventional Encryption and Decryption is calculated. To reduce area required and Delay, We have done the parallel implementation of S-box and Area, Delay is compared with the conventional Encryption. We conduct a fault injection attack and fault detection. To protect AES, We apply Proposed Fault Detection scheme to AES Encryption structure and compare its Area, Throughput and Frequency and Results show that the parameters like Area, Throughput, Frequency have been improved.
Keywords: cryptography; FIPS; advanced encryption standard; conventional encryption; cryptographic algorithm; design high security AES; electronic data protection; fault detection; fault detection countermeasure; fault injection attack; federal information processing standard; parallel implementation; Cryptography; Delays; Information processing; Standards; Table lookup; Throughput; Advanced Encryption Standard (AES); Countermeasure; Decryption; Encryption (ID#: 15-8130)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322828&isnumber=7322423
Kait, V.S.; Chauhan, B., “BPCS Steganography for Data Security Using FPGA Implementation,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 1887–1891, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322852
Abstract: There are several techniques to conceal the secret information inside Cover objects; steganography is the one of them. Steganography is the art of invisible communication by concealing information inside other information. Images are the most popular cover objects for steganography. The BPCS steganography which stands for bit-plane complexity segmentation is the technique to hide secret information in some other data (carrier) with better visual imperceptibility. This technique uses the “noise-like” regions in the bit planes of the cover image to hide secret data without deteriorating the image quality. With this technique we can hide 50–60% of secrete data in the cover image. To embed the secret information inside images requires intensive computations, and therefore, the technique is implemented in an FPGA to increase the processing speed. This work presents a hardware implementation of bit-plane complexity segmentation (BPCS) steganography technique in Xilinx Spartan 3E FPGA family. To access the bit wise data on FPGA Baud rate can cause the delay.
Keywords: field programmable gate arrays; image segmentation; security of data; steganography; BPCS steganography technique; FPGA hardware implementation; Xilinx Spartan 3E FPGA family; bit-plane complexity segmentation technique; cover image; cover object; data security; image quality; invisible communication; secret information concealing; secret information hiding; visual imperceptibility; Atmospheric modeling; Computers; Cryptography; Degradation; Field programmable gate arrays; Fractals; Universal Serial Bus; BPCS; Bit Plane; Cover Image; Data Hiding; FPGA; Steganography (ID#: 15-8131)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322852&isnumber=7322423
George Thomas; Jashim Jamaludheen K.; Levin Sibi; Maneesh P.; Mufeedh, “A Novel Mathematical Model for Group Communication with Trusted Key Generation and Distribution Using Shamir’s Secret Key and USB Security,” in Communications and Signal Processing (ICCSP), 2015 International Conference on, vol., no., pp. 0435–0438, 2–4 April 2015. doi:10.1109/ICCSP.2015.7322925
Abstract: Authentication and confidentiality are two sides of a coin. A group communication is said to be secure only if it preserve both authentication and confidentiality. A group communication is secure if every member of the group is a trusted person. Hence, individual security leads to group security. This paper proposes a new method for secure group communication by providing individual security, in which each group is assigned with a one-time session key. In order to maximize individual security each user uses USB key together with his user name and password. This paper make use of shamir’s secret sharing algorithm for creation of the share for each member of the participating group in communication, and Lagrangs interpolation formula for construction of key for the share by each member in the group. The proposed protocol is able to resist both insider and outsider attack.
Keywords: cryptographic protocols; interpolation; private key cryptography; public key cryptography; Lagrangs interpolation formula; Shamir secret key sharing algorithm; USB security; insider attack; mathematical model; one-time session key; outsider attack; protocol; secure group communication; trusted key distribution; trusted key generation; Computers; Cryptography; Gold; Postal services; KGC; Lagrange’s; Shamir’s secret key; Trusted key; USB (ID#: 15-8132)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7322925&isnumber=7322423
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.
International Conferences: Computing and Communications Technologies (ICCCT’15) Chennai, India, 2015 |
The International Conference on Computing and Communications Technologies (ICCCT’15) was organized by the Department of Information Technology, Sri Sai Ram Engineering College and was held in Chennai, Madras, India on 26–27 February 2015. More than seventy papers were presented. The ones cited here are deemed by the editors to be of most direct interest to the Science of Security community.
Roopashree, H.R.; Kanavalli, A., “STREE: A Secured Tree based Routing with Energy Efficiency in Wireless Sensor Network,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 25–30,
26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292714
Abstract: The Wireless Sensor Network (WSN) applications are today not only limited to the research stage rather it has been adopted practically in many defense as well as general civilians applications. It has been witness that extensive research have been conducted towards energy efficient routing and communication protocols and it has been reached to an acceptable stages, but without having a secure communications wide acceptance of the application is not likely. Due to unique characteristics of WSN, the security schemes suggested for other wireless networks are not applicable to WSN. This paper introduces an novel tree based technique called as Secure Tree based Routing with Energy Efficiency or STREE using clustering approximation along with lightweight key broadcasting mechanism in hierarchical routing protocol. The outcome of the study was compared with standard SecLEACH to find that proposed system ensure better energy efficiency and security.
Keywords: cryptography; routing protocols; trees (mathematics); wireless sensor networks; STREE; WSN; clustering approximation; energy efficiency; energy efficient routing protocols; hierarchical routing protocol; lightweight key broadcasting mechanism; secured tree based routing; wireless sensor network; Algorithm design and analysis; Approximation methods; Batteries; Energy efficiency; Reactive power; Security; Wireless sensor networks; Clustering Approximation; SecLEACH; Sybil Attack; Tree Based approach; Wireless Sensor Network (ID#: 15-8154)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292714&isnumber=7292708
D.I. George Amalarethinam; Geetha, J.S., “Image Encryption and Decryption in Public Key Cryptography Based on MR,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 133-138, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292733
Abstract: In the past decade, image encryption is given much attention in research of information security and a lot of image encryption algorithms have been introduced. Due to some intrinsic features of images like bulk data capacity and high data redundancy, the encryption of image is different from that of text; therefore it is difficult to handle them by traditional encryption methods. In the proposed work, a new image encryption algorithm based on Magic Rectangle (MR) is being applied. To begin with, the plain-image is converted into blocks of single bytes and then the block is replaced as the value of MR. Further, the control parameters of Magic Rectangle (MR) are selected randomly by the user. Subsequently the image is being encrypted with public key cryptography algorithms such as RSA, ElGamal etc. The experimental result shows that the proposed algorithm can successfully encrypt/decrypt the images with separate secret keys, and the algorithm has good encryption effect. Cipher text developed by this method will be entirely different when compared to the original image file and will be suitable for the secured transmission over the internet. Thus, this model provides an additional level of security to public key algorithm and efficient utilization of memory.
Keywords: Internet; image processing; public key cryptography; ElGamal; Internet; MR method; RSA; cipher text; image decryption; image encryption; information security; magic rectangle method; Arrays; m Ciphers; Encryption; Image coding; Public key cryptography; Communication Security; Image Encryption and Decryption; Magic Rectangle; Public Key Cryptography; Public key; Secret key (ID#: 15-8155)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292733&isnumber=7292708
Nirmal, K.; Janet, B.; Kumar, R., “Phishing — The Threat That Still Exists,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 139–143, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292734
Abstract: Phishing is an online security attack in which the hacker aims in harvesting sensitive information like passwords, credit card information etc. from the users by making them to believe what they see is what it is. This threat has been into existence for a decade and there has been continuous developments in counter attacking this threat. However, statistical study reveals how phishing is still a big threat to today’s world as the online era booms. In this paper, we look into the art of phishing and have made a practical analysis on how the state of the art anti-phishing systems fail to prevent Phishing. With the loop-holes identified in the state-of-the-art systems, we move ahead paving the roadmap for the kind of system that will counter attack this online security threat more effectively.
Keywords: authorisation; computer crime; antiphishing systems; online security attack; online security threat; phishing attack; sensitive information harvesting; statistical analysis; Browsers; Computer hacking; Electronic mail; Google; Radiation detectors; Uniform resource locators; Computer Fraud; Cyber Security; Password theft; Phishing (ID#: 15-8156)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292734&isnumber=7292708
Sathiamoorthy, J.; Ramakrishnan, B.; Usha, M., “A Reliable and Secure Data Transmission in CEAACK MANETs Using Distinct Dynamic Key with Classified Digital Signature Cryptographic Algorithm,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 144–151, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292735
Abstract: CEAACK MANETs are vulnerable to attacks and this can be reduced by employing a cluster mechanism which ensures that packet transmission occurs without unnecessary delay. Clustering can be made effective in CEAACK MANETs by opting for a cluster head mechanism which ensures that control rests with a single powerful node within a cluster. This cluster head takes on the responsibility of routing the packets efficiently by coordinating with the base station. Cluster heads are also prone to malicious attacks and is affected more than a normal network. In this paper we try to incorporate a new approach in CEAACK MANETs by implementing a cryptographic technique to tackle the vulnerabilities of the network. This cryptographic is highly secure which uses a distinct classified digital key which can be generated dynamically using the Advanced Encryption Standard (AES) Algorithm. This technique can ensure that data is securely transmitted in a reliable manner. This scheme aims at transmission efficiency and also tries to reduce the intrudes in CEAACK MANETs.
Keywords: cryptography; digital signatures; mobile ad hoc networks; pattern clustering; telecommunication network routing; telecommunication security; AES algorithm; CEAACK MANET; advanced encryption standard algorithm; base station; classified digital signature cryptographic algorithm; cluster head mechanism; clustered enhanced adaptive acknowledgment; data transmission security; distinct dynamic key; mobile ad hoc network; network vulnerability; packet routing; Ad hoc networks; Authentication; Digital signatures; Encryption; Heuristic algorithms; Mobile computing; Advanced Encryption Standard (AES); Authentication; Clustered Enhanced Adaptive Acknowledgment (CEAACK); Distinct Dynamic Key (DKey); Mobile Ad hoc NETwork (MANET); secret secure digital signature number (ID#: 15-8157)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292735&isnumber=7292708
Priya, L.; Chatterjee, K., “A Secure Authentication Scheme in Ad Hoc Network Using Threshold Cryptography,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 152–155, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292736
Abstract: Adhoc network is very popular due to their infrastructure less architecture. One main challenge in such networks is to provide security in communication where the hosts rely on each other to keep the network connected. This types of network suffers in passive eavesdropping, impersonation, replay attacks. To resist this type of attack we use secret sharing techniques based on CRT. In this paper we have proposed a two level key distribution scheme for adhoc networks. In the first level we use Knapsack algorithm for key distribution among the cluster heads and in the second level we use Chinese remainder theorem (CRT) to share the secret among the nodes of the cluster.
Keywords: ad hoc networks; cryptography; knapsack problems; CRT; Chinese remainder theorem; adhoc network; authentication scheme security; impersonation; knapsack algorithm; passive eavesdropping; replay attacks; secret sharing technique; threshold cryptography; two level key distribution scheme; Authentication; Computer architecture; Computer science; Public key; Resists; Asmuth-bloom secret sharing; Chinese remainder theorem (CRT); Knapsack-public key cryptography (ID#: 15-8158)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292736&isnumber=7292708
Chahar, U.S.; Chatterjee, K., “A Novel Differential Phase Shift Quantum Key Distribution Scheme for Secure Communication,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no.,
pp. 156–159, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292737
Abstract: Quantum key distribution is used for secure communication between two parties for generation of secret key. Differential Phase Shift Quantum Key Distribution is a new and unique QKD protocol that is different from traditional ones, providing simplicity and practicality. This paper presents Delay Selected DPS-QKD scheme in which it uses a weak coherent pulse train, and features simple configuration and efficient use of the time domain. All detected photon participate to form a secure key bits and resulting in a higher key creation efficiency.
Keywords: cryptographic protocols; differential phase shift keying; quantum cryptography; telecommunication security; time-domain analysis; QKD protocol; coherent pulse train; delay selected DPS-QKD scheme; differential phase shift quantum key distribution scheme; secret key generation; secure communication; secure key bits; time domain analysis; Delays; Detectors; Differential phase shift keying; Photonics; Protocols; Security; Differential Phase Shift; Differential phase shift keying protocol; Quantum Key Distribution (ID#: 15-8159)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292737&isnumber=7292708
Hindusree, M.; Sasikumar, R.; “Preventing Shoulder Surfing in Secure Transactions,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 160–163, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292738
Abstract: Information and computer security are supported largely by passwords which are the principle part of the authentication process. The personal identification number (PIN) is common authentication method used in various devices like ATM’s, mobile devices and electronic door locks. This PIN entry method is harmed to shoulder surfing attack (SSA). When user enters their pin number in populous place, attacker observes the pin number over their shoulder. This is called shoulder surfing attack. In this paper we will propose a method to prevent this SSA attack. We do this through the use of advanced BW (Black White) method and session key method by changing the layout of the keypad.
Keywords: security of data; transaction processing; BW method; PIN entry method; SSA; authentication process; black white method; computer security; information security; passwords; personal identification number; secure transactions; session key method; shoulder surfing attack; Authentication; Color; Complexity theory; Computer science; Layout; Smart phones; authentication; security (ID#: 15-8160)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292738&isnumber=7292708
Vijayalakshmi, N.; Sasikumar, R., “An ID-Based Privacy Preservation for VANET,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 164–167, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292739
Abstract: VANET (Vehicular Ad-Hoc Network) is a special kind of message network. Authentication is an important security service for both vehicles to vehicle communications (V2V) and vehicle to roadside communications (V2R). The most Challenges and issues in the Vehicular Ad hoc network (VANET) are security and integrity. Vehicles will be threatened from misuse of their remote data and attack their private information, and capable of being reviewed form accidents or problems. In the proposed scheme, asymmetric key concept and PKC (Public Key Cryptography) were used. In ID Based Privacy Preservation for VANET, we use the Public Key Cryptography (PKC) to the pseudonym generation, which ensure authentic third party to achieve non repudiation of vehicles by obtaining vehicles Identity (IDs). PKC-based Pseudonyms are self generated also using as an identifier instead of vehicle Ids for the privacy preservation validation, while the update of the pseudonyms depends on vehicular demands. In this paper two schemes are used for authentication, Id-Based Signature (IBS) and Id-Based Online/Offline Signature (IBOOS), for the authentication between Road Side Unit (RSU) and vehicle. In the proposed system, we are increasing the safety and security in VANET environment.
Keywords: digital signatures; public key cryptography; telecommunication security; vehicular ad hoc networks; IBOOS; ID-based online-offline signature; ID-based privacy preservation; ID-based signature; PKC-based pseudonym generation; RSU; VANET; Vehicular Ad-Hoc Network; asymmetric key concept; authentic third party; message network; public key cryptography; remote data; road side unit; security service; vehicle-to-roadside communications; vehicles identity; vehicles-to-vehicle communications; vehicular demands; Authentication; Privacy; Receivers; Vehicles; Vehicular ad hoc networks; Identity-base Cryptography; Privacy preservation; Pseudonym; Vehicular Ad Hoc Network (ID#: 15-8161)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292739&isnumber=7292708
Logeshwari, R.; Karthikayani, K.; Sindhuja, A.; Ashok, D., “Designing a Bio-Capsule Secure Authentication System,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 168–173, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292740
Abstract: In this modern world, especially on the Internet, user might have more and more usernames or IDs and passwords, which contains his/her private information. There are too many for a user to remember and it is unsafe to write them down on the notebook. To solve this problem, this paper proposes a novel design of User data Management System (UMS), by which user can manage his/her private information’s efficiently. With the fast evolution in sensor technology biometric authentication system becomes more popular in daily lives. The biometrics is improving the capability to recognize the persons. The construction of Bio-Capsule from biometrics is used generally to secure the system. The biometrics used in this paper is fingerprint and iris. These two features are combined with the help of fusion algorithm. From the combined features, Bio-Capsule is generated which used for authenticating User data Management Systems.
Keywords: Internet; biometrics (access control); data privacy; security of data; Internet; UMS; bio-capsule secure authentication system; biometrics; private information; user data management system; usernames; Authentication; Cryptography; Feature extraction; Fingerprint recognition; Iris; Iris recognition; Bio-Capsule Generation; Biometrics; Histogram Equalization; Minutiae Points; Morphological operation; Weiner filtering; fusion algorithm (ID#: 15-8162)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292740&isnumber=7292708
Rani; Jayakumar, C.; Divya, “Trust Aware Systems in Wireless Sensor Networks,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 174-179, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292741
Abstract: Sensor network is an adaptable technology for perceiving environmental criterions and hence finds its pivotal role in a wide range of applications. The applications range from mission critical like military or patient monitoring systems to home surveillance systems where the network may be prone to security attacks. The network is vulnerable to attack as it may be deployed in hostile environments. In addition it may be exposed to attacks due to the inherent feature of not incorporating security mechanisms into the nodes. Hence additional programs for security may be added in the network. One such scheme is making the network a trust ware system. The trust computation serves as a powerful tool in the detection of unexpected node behaviour. In this paper we propose a trust mechanism to determine the trustworthiness of the sensor node. Most of the existing trust aware systems are centralised and suffer from single head failure. In this paper we propose a dynamic and decentralized system.
Keywords: telecommunication security; trusted computing; wireless sensor networks; decentralized system; dynamic system; environmental criterion; hostile environment; network security; network vulnerability; sensor node trustworthiness determination; trust aware system; unexpected node behaviour detection; wireless sensor network; Base stations; Energy efficiency; Monitoring; Reliability; Routing; Security; Wireless sensor networks; security; trust evaluation; wireless sensor network (ID#: 15-8163)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292741&isnumber=7292708
Zhangqing He; Bangmin Yang; Xingran Deng; Kui Dai; Xuecheng Zou, “A SCA-Resistant Processor Architecture Based on Random Delay Insertion,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 278–281, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292760
Abstract: Random delay insertion is a simple and efficient approach to counter side-channel attacks, but previous methods do not have the ideal protective effect. In this article, based on random delay insertion, an effective processor architecture resistant to side-channel attacks was proposed. It used a combination of randomized scheduling, randomized instruction insertion and randomized pipeline-delay to resist side-channel attacks. On the base of ARM7 processor, we implemented this architecture and the implementation results showed that this processor has increased approximate 24.3% in hardware area than the original ARM7 processor. The CPA attack experiment results suggested that our new secure processor have high capacity to resist side-channel attacks and thus could be used in USBKEY, Smart CARD and other application scenarios which require extremely high security level.
Keywords: scheduling; security of data; ARM7 processor; CPA attack experiment; SCA-resistant processor architecture; USBKEY; random delay insertion; randomized instruction insertion; randomized pipeline-delay; randomized scheduling; security level; side-channel attack resistance; side-channel attacks; smart CARD; Central Processing Unit; Cryptography; Delays; Generators; Pipelines; Registers; Signal processing algorithms; ARM7; random delay (ID#: 15-8164)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292760&isnumber=7292708
Vinothini, S.; Subha, T., “An Efficient CRL Authentication Scheme for Vehicular Communications,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 282–285, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292761
Abstract: A vehicular ad hoc network (VANET) is a type of network that is used to create mobile nodes. It treats vehicles as mobile nodes and provides the means to communicate between vehicles for driving safely. Addressing the security requirements of inter-vehicle and vehicle-roadside communication plays an important role. In VANET, the vehicle nodes consist of On Board Unit (OBU) and Road Side Units (RSU). The RSU’s are installed along the road. Vehicles communicate with each other and as well as with RSUs through wireless communications. VANET adopt Certificate Revocation Lists (CRLs) for their security. The sender certificate is included in the current CRL to verify the authenticity and signature of the sender. A trusted authority (TA) performs registration to vehicle users during which vehicles pseudonyms and secrets are updates and stored in the vehicles OBU. Secure communication and anonymous protocol is important in VANET. We propose an efficient CRL based secure communication protocol which focuses on detecting malicious node in vehicular communications.
Keywords: on-board communications; protocols; telecommunication security; vehicular ad hoc networks; CRL authentication scheme; OBU; RSU; VANET; certificate revocation list; mobile node; on board unit; road side unit; secure communication protocol; trusted authority; vehicle-roadside communication; vehicles pseudonym; vehicular ad hoc network; vehicular communication; wireless communication; Authentication; Protocols; Vehicles; Vehicular ad hoc networks; Wireless communication; CRL; Trusted Authority; VANET; Vehicles; ad hoc (ID#: 15-8165)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292761&isnumber=7292708
Gera, T.; Thakur, D.; Singh, J., “Identifying Deceptive Reviews Using Networking Parameters,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 322–327, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292769
Abstract: Nowadays, client likes to take suggestions before spending on a new product. For this they go to online item review Web page for perusing other’s encounters and saying for that item. A real issue which was disregarded so far is the investigation of review spammers. However, numerous scientists gave their productive commitment in this field of exploration from 2007. The situation now asks for, conspicuous verification and ID of fake reviews and fake reviewers; as this has transformed into a colossal social issue. Those studies have the limit perceive certain sorts of spammers, e.g., the people who post various practically identical reviews around one target component. In any case, in fact, there are distinctive sorts of spammers who can control their practices to act much the same as certified users. This has transformed into a gigantic social issue. From various years, email spam and Web spam were the two essential highlighted social issues. In the meantime nowadays, on account of reputation of customers’ energy to Web shopping and their dependence on the online reviews, it transformed into a true center for review spammers to misdirect customers by making sham overviews for target things. To the best of our insight, very little study is accounted for in regards to this issue reliability of online reviews. To begin with paper was distributed in 2007 by Nitin Jindal & Bing Liu in regards to review Spam detection. In the past few years, variety of techniques has been recommended by researchers to accord with this trouble. This paper intends to identify suspicious review, review spammers and their group using rule based classification methods along with networking parameters.
Keywords: IP networks; Web sites; computer network security; online front-ends; unsolicited e-mail; Web shopping; Web spam; deceptive review identification; email spam; fake review ID; fake reviewer ID; networking parameters; online item review Web page; online review reliability; review spammers; rule based classification methods; social issue; suspicious review identification; target component; Classification algorithms; Computers; Data mining; Unsolicited electronic mail; Browser-id; IP Address; Review Matrix; Rule Coverage Graph; Rule Matrix; Rule based classification; Suspicious Review Classifier (SRC) (ID#: 15-8166)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292769&isnumber=7292708
Vidya, K.; Abinaya, A., “Secure Data Access Control for Multi-Authority Quantum Based Cloud Storage,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 387–391, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292781
Abstract: An efficient way of ensuring security in cloud is to give secure data access control among untrusted cloud server. Hence to improve the security, a new system could be introduced such as Quantum Security Scheme which invokes Quantum gates for encryption purpose. Quantum cryptography has been rapidly developing these days due to its efficient service which is provided by means of key generation and key distribution. Quantum Ciphertext-Policy Attribute Based Encryption (QCP-ABE) is a promising technique for data access control on encrypted data. This scheme also achieves mutual authentication among those authorities involving in the system and it also achieves both forward and backward security.
Keywords: authorisation; cloud computing; message authentication; quantum cryptography; quantum gates; storage management; QCP-ABE; backward security; cloud security; data access control security; forward security; key distribution; key generation; multiauthority quantum based cloud storage; mutual authentication; quantum ciphertext-policy attribute based encryption; quantum security scheme; untrusted cloud server; Cloud computing; Encryption; Logic gates; Quantum computing; Servers; Attribute based encryption; Quantum cryptography; data access control (ID#: 15-8167)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292781&isnumber=7292708
Poorvadevi, R.; Rajalakshmi, S., “A Cluster Based Signature Evaluation Mechanism for Protecting the User Data in Cloud Environment Through Fuzzy Ordering Approach,” in Computing and Communications Technologies (ICCCT), 2015 International Conference on, vol., no., pp. 392–397, 26–27 Feb. 2015. doi:10.1109/ICCCT2.2015.7292782
Abstract: A Fuzzy set techniques which perhaps eliminate the several ambiguities on the particular issue to take right decision. Users may prefer the fuzzy approaches for their internal computation conflicts or manipulation to access boundless of data from cloud. Even though we have many security approaches, users are facing massive difficulties to safeguard their owning data in cloud environment. Protecting the confidential data from various hackers is the tedious problem in the current trend. So, possibly we will achieve the efficient security outcome by applying the different set of security principles. This proposed model is well suitable for securing the user confidential information’s from the attackers in any situation. It focuses on clustering the different sort of input factors of customer validation attributes and evaluates these attributes to ensure the authenticity of unique users in cloud environment by ranking the distinguished threshold levels to prove user authentication function.
Keywords: cloud computing; computer crime; fuzzy set theory; message authentication; cloud environment; cluster based signature evaluation mechanism; confidential data protection; customer validation attributes; fuzzy ordering approach; fuzzy set techniques; hackers; internal computation conflicts; security approaches; user authentication function; user data protection; Authentication; Clustering algorithms; Communications technology; Computational modeling; Data models; Image segmentation; Cloud service provider; Cloud vendor; Cloudlet; Fuzzy clusters; Fuzzy decision maker; Fuzzy ordering set; Signature evaluator
(ID#: 15-8168)
URL: http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7292782&isnumber=7292708
Note:
Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to news@scienceofsecurity.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.