2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016
DOI: 10.1109/iciccs.2016.7542357
|View full text |Cite
|
Sign up to set email alerts
|

Carrier data security using public key steganography in ZigBee

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In our review, we observed that quite a large number of countermeasures are either not evaluated at all ( [23], [40], [45] , [48] , [49] , [62] , [75] , [88] , [91] , [67] , [92] , [105] , [110], [111], [114], [137], [141], [154], , [160], [174], , [175]) or evaluated weakly ( [60], [70], [100], [109], [132], [138], [147], [158], [161], [165], [171]). We consider an evaluation as weak evaluation when the system is evaluated with a small dataset (e.g.…”
Section: Discussionmentioning
confidence: 99%
“…Instead of detecting steganographic contents, Hussain and Pandey [110] present an approach that uses public key steganography to alert communicating parties if carrier data comes under an attack on its way. Once alerted, communicating parties can take the required measures to stop the attack or mitigate its effects.…”
Section: Inspecting Steganographic Trafficmentioning
confidence: 99%
See 1 more Smart Citation
“…However, WSNs usually depend on sensor nodes implemented using microcontrollers with low processing power and storage capacity, thus severely restricting data encryption capabilities. Consequently, instead of using computationally expensive techniques such as public key steganography [ 63 ], advanced encryption standard [ 64 ], or secure hash algorithms [ 65 ], we can opt for encryption models with simpler algorithms and less complex computations. For instance, XOR encryption can be applied to the method known as one-time pad [ 66 ].…”
Section: Methodsmentioning
confidence: 99%
“…Steganography Public key principle Two or more parties who have never met or shared a secret may use the public-key steganography protocol informally to communicate secret messages over a public channel without the adversary being able to discern their existence [9,10]. : Party Alice can hide a message using Bob's public key if he wants to interact with Party Bob confidentially.…”
Section: 3mentioning
confidence: 99%