1,791 research outputs found
Pay as You Go: A Generic Crypto Tolling Architecture
The imminent pervasive adoption of vehicular communication, based on
dedicated short-range technology (ETSI ITS G5 or IEEE WAVE), 5G, or both, will
foster a richer service ecosystem for vehicular applications. The appearance of
new cryptography based solutions envisaging digital identity and currency
exchange are set to stem new approaches for existing and future challenges.
This paper presents a novel tolling architecture that harnesses the
availability of 5G C-V2X connectivity for open road tolling using smartphones,
IOTA as the digital currency and Hyperledger Indy for identity validation. An
experimental feasibility analysis is used to validate the proposed architecture
for secure, private and convenient electronic toll payment
Secure Data Transmission over Insecure Radio Channel in Wireless of Things (WoT) Network
Potential capacity of processors is enhancing rapidly which leads to the
increase of computational ability of the adversary. As a result, the required
key size for conventional encryption techniques is growing everyday for complex
unbreakable security communication systems. The Public Key Cryptography (PKC)
techniques which use larger keys cannot be fitted in tiny resource constrained
Wireless of Things (WoT) devices. Some Symmetric Key Cryptosystems (SKC) use
smaller keys, which can be fitted in the tiny devices. But in large networks
where the number of nodes is in the order of 103, the memory constraint does
not allow the system to do so. The existing secure data communication in
insecure medium uses various conventional encryption methods like Public Key
Cryptography (PKC) and Symmetric Key Cryptosystems (SKC). Generally, modern
encryption methods need huge processing power, memory and time. Also in some
cases, Key Pre-distribution System (KPS) is used among different communicating
devices. With the growing need for larger key size in the conventional secure
communication system, the existing resources in the communicating devices
suffer from resource starvation. Hence, the need of a novel mechanism for
secure communication is inevitable. But the existing secure communication
mechanisms like PKC, SKC or KPS do not ensure elimination of resource
starvation issue in tiny devices during communication. In these existing
conventional mechanisms, the plain text is generally converted into cipher text
with greater size than the plain text at the device level, which leads to
resource starvation. At the time of transmission, the cipher text at the device
end requires more bandwidth than the plain text which puts bandwidth overhead
on the broadcast channel (BC)
Blockchain: A Graph Primer
Bitcoin and its underlying technology Blockchain have become popular in
recent years. Designed to facilitate a secure distributed platform without
central authorities, Blockchain is heralded as a paradigm that will be as
powerful as Big Data, Cloud Computing and Machine learning. Blockchain
incorporates novel ideas from various fields such as public key encryption and
distributed systems. As such, a reader often comes across resources that
explain the Blockchain technology from a certain perspective only, leaving the
reader with more questions than before. We will offer a holistic view on
Blockchain. Starting with a brief history, we will give the building blocks of
Blockchain, and explain their interactions. As graph mining has become a major
part its analysis, we will elaborate on graph theoretical aspects of the
Blockchain technology. We also devote a section to the future of Blockchain and
explain how extensions like Smart Contracts and De-centralized Autonomous
Organizations will function. Without assuming any reader expertise, our aim is
to provide a concise but complete description of the Blockchain technology.Comment: 16 pages, 8 figure
Secure Authentication Scheme for the Internet of Things
The Internet of Things (IoT) is based on an extensive and wide range of interconnected heterogeneous units’ general applications, including healthcare systems, environmental monitoring, household automation, and business automation. This work presents an approach variant of the elliptic curve; The cryptography approach is implemented to provide more security with fewer key sizes and with protocol enhancements to perform an efficient authentication process. In the process of authenticating the device, we use the Electronic Product Code (EPC) as a key to authentication, where the overhead of giving input is removed. Mention the methods followed to meet all your performance metrics (minimum execution time; low energy consumption, and qualitative comparison). This proposed scheme (i.e., the energy consumption of 0.27 mJ, the reduction in end delay of 0.058 sec., the reduction in the computation cost, and being more resistant to attack) is compared with other recent authentication protocols. The proposed system creates a secure network to lessen the damage if there is an attack in the IoT environment. The performance evaluation results indicate that the proposed scheme has a lower energy consumption and a more resistant authentication scheme, and we observe a trade-off between security and the lightweight factor
Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation
The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics
- …