3 research outputs found

    Energy Efficient Encryption Algorithm for Low Resources Devices

    Full text link
    Saving energy is one of the most challenging aspects in the wireless network devices. Such devices are connected together to perform a certain task. A well-known example of these structures is the Wireless Sensor Network (WSN). Distributed WSN consists of several spread nodes in a harsh area. Therefore, once network has been established sensors replacement is not a possible option before at least five years which called network lifetime. So, it is a necessity to develop specific energy aware algorithms that could save battery lifetime as much as possible. Security and Privacy are the vital elements which need to be addressed to hold up to the trust of users in WSN environment. Because the majority of modern cryptographic algorithms were designed for desktop/server environments, many of these algorithms cannot be implemented in the constrained devices used by these networks. Symmetric key algorithms are a typically efficient and fast cryptosystem, so it has significant applications in many realms. For a WSN with constraint computational resources, the cryptosystem based on symmetric key algorithms is extremely suitable for such an agile and dynamic environment. Therefore, a Simple Lightweight Encryption Algorithm (SLEA) based on addition and subtraction operations and compact Substitution-boxes (S-boxes) is proposed for wireless networks due to its low energy consumption, simple hardware requirements and suitable level of security. In addition, the algorithm tries to overcome the limitations of both public- and symmetric-key protocols. It relies on a smart version of Feistel structure

    Developing Trusted IoT Healthcare Information-Based AI and Blockchain

    Full text link
    The Internet of Things (IoT) has grown more pervasive in recent years. It makes it possible to describe the physical world in detail and interact with it in several different ways. Consequently, IoT has the potential to be involved in many different applications, including healthcare, supply chain, logistics, and the automotive sector. IoT-based smart healthcare systems have significantly increased the value of organizations that rely heavily on IoT infrastructures and solutions. In fact, with the recent COVID-19 pandemic, IoT played an important role in combating diseases. However, IoT devices are tiny, with limited capabilities. Therefore, IoT systems lack encryption, insufficient privacy protection, and subject to many attacks. Accordingly, IoT healthcare systems are extremely vulnerable to several security flaws that might result in more accurate, quick, and precise diagnoses. On the other hand, blockchain technology has been proven to be effective in many critical applications. Blockchain technology combined with IoT can greatly improve the healthcare industry’s efficiency, security, and transparency while opening new commercial choices. This paper is an extension of the current effort in the IoT smart healthcare systems. It has three main contributions, as follows: (1) it proposes a smart unsupervised medical clinic without medical staff interventions. It tries to provide safe and fast services confronting the pandemic without exposing medical staff to danger. (2) It proposes a deep learning algorithm for COVID-19 detection-based X-ray images; it utilizes the transfer learning (ResNet152) model. (3) The paper also presents a novel blockchain-based pharmaceutical system. The proposed algorithms and systems have proven to be effective and secure enough to be used in the healthcare environment

    Cybersecurity and Countermeasures at the Time of Pandemic

    Full text link
    With the emergence of one of this century’s deadliest pandemics, coronavirus disease (COVID-19) has an enormous effect globally with a quick spread worldwide. This made the World Health Organization announce it as a pandemic. COVID-19 has pushed countries to follow new behaviors such as social distancing, hand washing, and remote work and to shut down organizations, businesses, and airports. At the same time, white hats are doing their best to accommodate the pandemic. However, while white hats are protecting people, black hats are taking advantage of the situation, which creates a cybersecurity pandemic on the other hand. This paper discusses the cybersecurity issues at this period due to finding information or finding another related research that had not been discussed before. This paper presents the cybersecurity attacks during the COVID-19 epidemic time. A lot of information has been collected from the World Health Organization (WHO), trusted organizations, news sources, official governmental reports, and available research articles. This paper then classifies the cybersecurity attacks and threats at the period of COVID-19 and provides recommendations and countermeasures for each type. This paper surveys the cybersecurity attacks and their countermeasures and reports the ongoing cybersecurity attacks and threats at this period of time. Moreover, it is also a step towards analyzing the efficiency of the country’s infrastructure as well as hackers and criminals’ social behavior at the time of the pandemic
    corecore