Recently, many researches showing that the Elliptic Curve Cryptography (ECC) has many advantages especially in wireless communication due to the small size of the keys comparing to other public key cryptography algorithms and the mathematic difficulty to brake the key. The proposed method developed the previous method which is used to secure the output of ECC, by decreasing the size of ECC point to 6bit. This study depends on the base of 6 when converting each digit to the sequence, and finally leads to eliminate the number of bits. Therefore, the implementation of this study which is based on the ECC with the idea of data sequence, provides better performance in terms of energy exhausting, memory size, and the processing time in the comparing to the another method.
The key target of Distributed Denial-of-Service (DDoS) attacks is to interrupt and suspend any available online services either executed for professional or personal gains. These attacks originate from the fast advancement in the number of insecure technologies. The attacks are caused due to the easy access to internet and advent of technology resulting to exponential growth of traffic volumes. DDoS attack remains most leading security risks to provisioning services. Also, the current embraced security mechanism for defense lacks flexibility and adequate resources to combat these attacks. Hence, there is need to embrace various other critical resources, where they can share the problem of mitigation. In addition, emerging technologies for instance smart contracts and blockchain offers for the sharing of these potential attacks information in an entirely automated and distributed manner. This paper recommends for a blockchain design which combines smart contracts and Machine Learning (ML) technologies, by presenting new ideal opportunities towards efficient DDoS mitigation solutions in variety of cooperative domains. Furthermore, the key advantage and benefits of this structure is deployment of still existing distributed and public infrastructure to blacklisted IP address or even advertise white, and the application of such an infrastructure with further defense mechanisms to current attacks of DDoS, deprived of considering distribution mechanisms or specialized registries, which facilitates the implementation of procedures across diverse domains. This paper further presents the demonstration and implementation features of this blockchain structure, discussion and study findings over these smart contracts and ML technologies. The study further concludes by recommending use of smart contract in collaborative block-chain design with ML for mitigating future attack of DDoS.Povzetek: Ta dokument priporoča zasnovo blockchain, ki združuje nastajajoča orodja s pametnimi pogodbami in tehnologijami strojnega učenja, ki predstavlja nove idealne priložnosti za učinkovite rešitve za ublažitev DDoS-jev na različnih področjih sodelovanja.
<p>The wireless technology is in consistent and rapid development in this century such that it produces fast data rate and strong connectivity. Mobile ad hoc network (MANET) is an independent network wherein nodes function as both host and router. Routing protocols in MANET are prone to different attacks. Malicious nodes usually interfere the process of establishing routes and make it hard to build a valid route. In the literature, different mechanisms proposed to prohibit black hole attacks in which an adversary node blindly drops data packets. In this paper, a study is fulfilled of the advantages and disadvantages of some of the protocols presented in the literature and a novel method proposed that detects black hole attacks. A thorough, precise, and theoretical analysis is presented to show how the proposed method can prevent malicious nodes from impersonating benign nodes. A theoretical compareison conducted between the proposed method and some of the other methods presented in the literature. The comparison shows that the attacks exist on these protocols are detected and prevented by the proposed protocol.</p>
Cryptography is a significant study area at present since it can be vital to protect exceedingly sensitive and secret information from illegal fraud during network transmission. One of the basic cryptographic algorithms is the Vigenere cipher, which is a very easy encryption method to be used as an alternative to Caesar cipher for encrypting the text of the message. In this paper, we enhance the Vigenere algorithm and propose a new method by shifting the key in each message to prevent repeating the messages. Also, it converts the messages into binary form rather than an alphabet. Furthermore, it adds a few bits of random padding to each block of outputs to send a series of bits. The proposed algorithm is named “Circular-Left-Shift Key-based Vigener Algorithm using MSB Binary (CLS-V-MSB)”. Finally, this technique slightly raises the size of the ciphertext, but substantially increases the cipher's protection, achieves the security objectives (authentication, confidentiality, integrity, freshness, and non-repudiation), and avoids Kasiski and Friedman.
The wireless sensor can be considered as one of the most major technologies through using it in different application such as environmental applications, military applications, commercial applications, health applications and agriculture applications. Due to the sensor networks may be deployed in open area (uncontrolled area), especially in military applications. In such situations, the nodes are vulnerable to be captured. Moreover, data/control packets may be intercepted and/or modified due to the transmission nature. Consequently, security services such as authentication and encryption done by key management which is not trivial task. The key management is important to maintain the network operations. The proposed scheme the nodes based on spatial information with data sequence then sends encryption message to each other in secure way by HMAC for providing safe links between the nodes in the network and forming the clusters. Consequently, the proposed scheme covers the security goals and authentication of each node.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.