31 research outputs found
A novel multi-agent and multilayered game formulation for Intrusion Detection in Internet of Things (IoT)
The current era of smart computing and enabling technologies encompasses the Internet of Things (IoT) as a network of connected, intelligent objects where objects range from sensors to smartphones and wearables. Here, nodes or objects cooperate during communication scenarios to accomplish effective throughput performance. Despite the deployment of large-scale infrastructure-based communications with faster access technologies, IoT communication layers can still be affected with security vulnerabilities if
nodes/objects do not cooperate and intend to take advantage of other nodes for fulfilling their malevolent interest. Therefore, it is essential to formulate an intrusion detection/prevention system that can effectively identify the malicious node and restrict it from further communication activitiesโthus, the throughput, and energy performance can be maximized to a significant extent. This study introduces a combined multi-agent and multilayered game formulation where it incorporates a trust model to assess each node/object, which is participating in IoT communications from a security perspective. The experimental test scenarios are numerically evaluated, where it is observed that the proposed approach attains significantly improves intrusion detection accuracy, delay, and throughput performance as compared to the existing baseline approaches
A Comprehensive Insight into Game Theory in relevance to Cyber Security
The progressively ubiquitous connectivity in the present information systems pose newer challenges tosecurity. The conventional security mechanisms have come a long way in securing the well-definedobjectives of confidentiality, integrity, authenticity and availability. Nevertheless, with the growth in thesystem complexities and attack sophistication, providing security via traditional means can beunaffordable. A novel theoretical perspective and an innovative approach are thus required forunderstanding security from decision-making and strategic viewpoint. One of the analytical tools whichmay assist the researchers in designing security protocols for computer networks is game theory. Thegame-theoretic concept finds extensive applications in security at different levels, including thecyberspace and is generally categorized under security games. It can be utilized as a robust mathematicaltool for modelling and analyzing contemporary security issues. Game theory offers a natural frameworkfor capturing the defensive as well as adversarial interactions between the defenders and the attackers.Furthermore, defenders can attain a deep understanding of the potential attack threats and the strategiesof attackers by equilibrium evaluation of the security games. In this paper, the concept of game theoryhas been presented, followed by game-theoretic applications in cybersecurity including cryptography.Different types of games, particularly those focused on securing the cyberspace, have been analysed andvaried game-theoretic methodologies including mechanism design theories have been outlined foroffering a modern foundation of the science of cybersecurity
ECM-GT: design of efficient computational modelling based on game theoretical approach towards enhancing the security solutions in MANET
Game Theory is a useful tool for exploring the issues
concerning Mobile Ad-Hoc Network (or MANET) security. In
MANETs, coordination among the portable nodes is more
significant, which encompasses their vulnerability challenges to
several security assaults and the inability to run securely, when
storing its resources and manage secure routing between the
nodes. Hence, it is imperative to design an efficient routing
protocol to secure all nodes from unknown behaviors. In the
current research study, the game-theory approach is utilized for
analytical purpose and addresses the security problems in
MANETs. The game-theoretic approach is mainly adopted to find
the malicious activities in the networks. In the proposed work, a
Bayesian-Signaling game model is proposed which analyses the
behavior of both regular/normal and malicious nodes. The game
model proposed also provides the finest actions of autonomous
tactics for every node. A Bayesian-Equilibrium (BE) offers the
best solution for games to resolve the incomplete information by
joining strategies and players payoff which form an equilibrium.
By exploiting the BE mechanism, the system can detect the
behavior of regular as well as malicious nodes. Therefore,
Efficient ComputationalModelling based on Game Theory or
ECM-GT methodology will reduce the utility of malicious nodes
and increase the utility of regular nodes. Also, it stimulates the
best co-operation among the nodes by exploiting the reputation
system. On comparing our results with the existing systems, it was
found that the proposed algorithm performed better in the
detection of malicious nodes, throughput, false positive rate and
detection of attacks
RFDA: Reliable framework for data administration based on split-merge policy
Emerging technologies in cloud environment have not only increased its use but also posed some severe issues. These issues can cause considerable harm not only to data storage but also to the large amount of data in distributed file structure which are being used in collaborative sharing. The data sharing technique in the cloud is prone to many flaws and is easily attacked. The conventional cryptographic mechanism is not robust enough to provide a secure authentication. In this paper, we overcome this issue with our proposed Reliable Framework for Data Administration (RFDA) using split-merge policy, developed to enhance data security. The proposed RFDA performs splitting of data in a unique manner using 128 AES encryption key. Different slots of the encrypted key are placed in different places of rack servers of different cloud zones. The effectiveness and efficiency of the proposed system are analyzed using comparative analysis from which it is seen that the proposed system has outperformed the existing and conventional security standard
Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs
Mobile Adhoc Network (MANET) has been a core topic of research since the last decade.
Currently, this form of networking paradigm is increasingly being construed as an integral part of upcoming
urban applications of Internet-of-Things (IoT), consisting of massive connectivity of diverse types of nodes.
There is a significant barrier to the applicability of existing routing approaches in conventional MANETs
when integrated with IoT. This routing mismatch can lead to security risks for the MANET-based application
tied with the IoT platform. This paper examines a pragmatic scenario as a test case wherein the mobile nodes
must exchange multimedia signals for supporting real-time streaming applications. There exist two essential
security requirements viz. i) securing the data packet and ii) understanding the unpredictable behavior of the
attacker. The current study considers sophistication on the part of attacker nodes. They are aware of each
otherโs identity and thereby collude to conduct lethal attacks, which is rarely reflected in existing security
modeling statistics. This research harnesses the potential modeling aspect of game theory to model the
multiple-collusion attacker scenario. It contributes towards i) modeling strategies of regular/malicious nodes
and ii) applying optimization principle using novel auxiliary information to formulate the optimal strategies.
The model advances each regular nodeโs capability to carry out precise computation about the opponent
playerโs strategy prediction, i.e., malicious node. The simulation outcome of the proposed mathematical
model in MATLAB ascertains that it outperforms the game theoryโs baseline approach
Evolution and analysis of securehash algorithm (sha) family
With the rapid advancement of technologies and proliferation of intelligent devices, connecting to the internet challenges have grown manifold, such as ensuring communication security and keeping user credentials secret. Data integrity and user privacy have become crucial concerns in any ecosystem of advanced and interconnected communications. Cryptographic hash functions have been extensively employed to ensure data integrity in insecure environments. Hash functions are also combined with digital signatures to offer identity verification mechanisms and non-repudiation services. The federal organization National Institute of Standards and Technology (NIST) established the SHA to provide security and optimal performance over some time. The most well-known hashing standards are SHA-1, SHA-2, and SHA-3. This paper discusses the background of hashing, followed by elaborating on the evolution of the SHA family. The main goal is to present a comparative analysis of these hashing standards and focus on their security strength, performance and limitations against common attacks. The complete assessment was carried out using statistical analysis, performance analysis and extensive fault analysis over a defined test environment. The study outcome showcases the issues ofSHA-1 besides exploring the security benefits of all the dominant variants of SHA-2 and SHA-3. The study also concludes that SHA-3 is the best option to mitigate novice intruders while allowing better performance cost-effectivel
Securing electronic transactions via payment gateways: a systematic review
This study focuses on the means to ensure the security and success of electronic payments which form part and parcel of e-commerce. This paper also highlights the primary functions, purpose, and benefits attached with
payment gateways besides discussing the essential pre-requisites for payment gateways to be qualified as strong payment gateways. This is necessary to securely process, authorise and route local and international monetary
exchanges carried out by clients utilising different alternative delivery channels (ADCs). In this paper, payment gateways most popularly used have been studied, and their comparison has been performed on criteria such as security, cost, customer support, etc. Based on the gathered information, the security concerns related to payment gateways have been taken up that need to be
mitigated. Several recommendations have been presented after analysing the security limitations in payment gateway structure for the customers before accepting and while using such a means of payment for their transactions online
Achieving Performance Speed-up in FPGA Based Bit-Parallel Multipliers using Embedded Primitive and Macro support
Modern Field Programmable Gate Arrays (FPGA) are fast moving into the consumer market and their domain has expanded from prototype designing to low and medium volume productions. FPGAs are proving to be an attractive replacement for Application Specific Integrated Circuits (ASIC) primarily because of the low Non-recurring Engineering (NRE) costs associated with FPGA platforms. This has prompted FPGA vendors to improve the capacity and flexibility of the underlying primitive fabric and include specialized macro support and intellectual property (IP) cores in their offerings. However, most of the work related to FPGA implementations does not take full advantage of these offerings. This is primarily because designers rely mainly on the technology-independent optimization to enhance the performance of the system and completely neglect the speed-up that is achievable using these embedded primitives and macro support. In this paper, we consider the technology-dependent optimization of fixed-point bit-parallel multipliers by carrying out their implementations using embedded primitives and macro support that are inherent in modern day FPGAs. Our implementation targets three different FPGA families viz. Spartan-6, Virtex-4 and Virtex-5. The implementation results indicate that a considerable speed up in performance is achievable using these embedded FPGA resources
High Efficiency Generalized Parallel Counters for Look-Up Table Based FPGAs
Generalized parallel counters (GPCs) are used in constructing high speed compressor trees. Prior work has focused on utilizing the fast carry chain and mapping the logic onto Look-Up Tables (LUTs). This mapping is not optimal in the sense that the LUT fabric is not fully utilized. This results in low efficiency GPCs. In this work, we present a heuristic that efficiently maps the GPC logic onto the LUT fabric. We have used our heuristic on various GPCs and have achieved an improvement in efficiency ranging from 33% to 100% in most of the cases. Experimental results using Xilinx 5th-, 6th-, and 7th-generation FPGAs and Stratix IV and V devices from Altera show a considerable reduction in resources utilization and dynamic power dissipation, for almost the same critical path delay. We have also implemented GPC-based FIR filters on 7th-generation Xilinx FPGAs using our proposed heuristic and compared their performance against conventional implementations. Implementations based on our heuristic show improved performance. Comparisons are also made against filters based on integrated DSP blocks and inherent IP cores from Xilinx. The results show that the proposed heuristic provides performance that is comparable to the structures based on these specialized resources