20 research outputs found

    Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

    Get PDF
    One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely used technique on which key exchange systems around the world depend. This protocol is simple and uncomplicated, and its robustness is based on the Discrete Logarithm Problem (DLP). Despite this, he is considered weak against the man-in-the-middle attack. This article presents a completely different version of the DHP protocol. The proposed version is based on two verification stages. In the first step, we check if the pseudo-random value α that Alice sends to Bob has been manipulated! In the second step, we make sure that the random value β that Bob sends to Alice is not manipulated. The man-in-the-middle attacker Eve can impersonate neither Alice nor Bob, manipulate their exchanged values, or discover the secret encryption key

    Secure Key Exchange Against Man-in-the-Middle Attack: Modified Diffie-Hellman Protocol

    Get PDF
    One of the most famous key exchange protocols is Diffie-Hellman Protocol (DHP) which is a widely used technique on which key exchange systems around the world depend. This protocol is simple and uncomplicated, and its robustness is based on the Discrete Logarithm Problem (DLP). Despite this, he is considered weak against the man-in-the-middle attack. This article presents a completely different version of the DHP protocol. The proposed version is based on two verification stages. In the first step, we check if the pseudo-random value α that Alice sends to Bob has been manipulated! In the second step, we make sure that the random value β that Bob sends to Alice is not manipulated. The man-in-the-middle attacker, Eve, can impersonate neither Alice nor Bob, manipulate their exchanged values, or discover the secret encryption key

    A compute and wait in pow (Cw-pow) consensus algorithm for preserving energy consumption

    Get PDF
    Several trusted tasks use consensus algorithms to solve agreement challenges. Usually, consensus agreements are used to ensure data integrity and reliability in untrusted environments. In many distributed networking fields, the Proof of Work (PoW) consensus algorithm is commonly used. However, the standard PoW mechanism has two main limitations, where the first is the high power consumption and the second is the 51 % attack vulnerability. In this paper, we look to improve the PoW consensus protocol by introducing several proof rounds. Any given consensus node should resolve the game of the current round Roundi before participating in the next round Roundi+1 . Any node that resolves the game of Roundi can only pass to the next round if a predetermined number of solutions has been found by other nodes. The obtained evaluation results of this technique show significant improvements in terms of energy consumption and robustness against the 51 % and Sybil attacks. By fixing the number of processes, we obtained an energy gain rate of 15.63 % with five rounds and a gain rate of 19.91 % with ten rounds

    Association Between Glucose Level And Prevalence of Headache Among Saudi Population: A Cross-Sectional Study

    Get PDF
    Objective: To investigate the association between glucose levels and the prevalence of headaches among the adult Saudi population. Methods: This research will employ a cross-sectional study design, which involves collecting data from a sample of the Saudi population at a single point in time. This design allows for the investigation of the association between glucose levels and headache prevalence in a cost-effective and time-efficient manner. Results: The study included 574 participants. The most frequent weight among them was 51-65 kg (n= 196, 34.1%), followed by 66-75 kg (n= 130, 22.6%). The most frequent height among study participants was 151-160 cm (n= 229, 39.9%), followed by 161-170 cm (n= 195, 34%). The most frequent age among study participants was less than 25 years (n= 203, 35.4%), followed by 25-30 years (n= 143, 24.9%). The most frequent nationality among study participants was Saudi (n= 547, 95.3%), followed by non-Saudi (n= 27, 4.7%). The most frequent gender among study participants was female (n= 351, 61.1%), followed by male (n= 223, 38.9%). The perceived blood sugar level intake varied among study participants, with most having normal blood sugar levels. Participants were asked if they smoked. Most were not smoking (n=482, 84%), and non-smoking were (n=92, 26%). Participants were asked about the nature of the headache. The most frequent were they don’t have (n= 345, 60.1%), followed by sharp (n= 116, 20.2%), and the least was continuous (n=113, 19.7%). Participants were asked about a kind of headache. The most frequent were they don’t have (n= 367, 63.9%), followed by stress headaches (n= 116, 20.2%), and the lowest cluster (n=15, 2.6%). Conclusion: The results of the study showed that most of the participants were Saudis. Most of them are women. In addition, the majority of people have normal fasting blood sugar levels. Their physical activity is moderate and the majority are non-smokers. In addition, most of the study participants had good and effective social communication

    A P2P multi-path routing algorithm based on Skyline operator for data aggregation in IoMT environments

    Get PDF
    The integration of Internet of Things (IoT) technologies, particularly the Internet of Medical Things (IoMT), with wireless sensor networks (WSNs) has revolutionized the healthcare industry. However, despite the undeniable benefits of WSNs, their limited communication capabilities and network congestion have emerged as critical challenges in the context of healthcare applications. This research addresses these challenges through a dynamic and on-demand route-finding protocol called P2P-IoMT, based on LOADng for point-to-point routing in IoMT. To reduce congestion, dynamic composite routing metrics allow nodes to select the optimal parent based on the application requirements during the routing discovery phase. Nodes running the proposed routing protocol use the multi-criteria decision-making Skyline technique for parent selection. Experimental evaluation results show that P2P-IoMT protocol outperforms its best rivals in the literature in terms of residual network energy and packet delivery ratio. The network lifetime is extended by 4% while achieving a comparable packet delivery ratio and communication delay compared to LRRE. These performances are offered on top of the dynamic path selection and configurable route metrics capabilities of P2P-IoMT

    A Novel CT Scan Images Watermarking Scheme in DWT Transform Coefficients

    No full text
    International audienc
    corecore