scholarly journals ASC Performance Prediction for Medical IoT Communication Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Fagen Yin ◽  
Pingping Xiao ◽  
Zefeng Li

Wearable devices are gradually entering the medical health field. Medical Internet of Things (IoT) has been widely used in all walks of medical health. With the complexity of medical health application scenarios, the medical IoT communication networks face complex environments. The secure communication issue is very important for medical IoT communication networks. This paper investigates the secrecy performance of medical IoT communication networks. To improve the secrecy performance, we adopt a cooperative communication strategy. We also use the average secrecy capacity (ASC) as a metric, and the expressions are first derived. Then, a secrecy performance intelligent prediction algorithm is proposed. The extensive simulations are used to verify the proposed method. Compared with other methods, the proposed algorithm realizes a better prediction precision.

Author(s):  
Lei Chen ◽  
Wen-Chen Hu ◽  
Ming Yang ◽  
Lei Zhang

E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a channel of accessing interlinked hypermeida via the World Wide Web. As these two methods of network communications turn into the most popular services over the Internet, applied cryptography and secure authentication protocols become indispensable in securing confidential data over public networks. In this chapter, we first review a number of cryptographic ciphers widely used in secure communication protocols. We then discuss and compare the popular trust system Web of Trust, the certificate standard X.509, and the standard for public key systems Public Key Infrastructure (PKI). Two secure e-mail standards, OpenPGP and S/MIME, are examined and compared. The de facto standard cryptographic protocol for e-commerce, Secure Socket Layer (SSL) / Transport Layer Security (TLS), and XML Security Standards for secure web services are also discussed.


2021 ◽  
Author(s):  
Qingcheng Zhu ◽  
Yazi Wang ◽  
Lu Lu ◽  
Yongli Zhao ◽  
Xiaosong Yu ◽  
...  

As quantum computers with sufficient computational power are becoming mature, the security of classical communication and cryptography may compromise, which is based on the mathematical complexity. Quantum communication technology is a promising solution to secure communication based on quantum mechanics. To meet the secure communication requirements of multiple users, multipoint-interconnected quantum communication networks are specified, including quantum key distribution networks and quantum teleportation networks. The enabling technologies for quantum communication are the important bases for multipoint-interconnected quantum communication networks. To achieve the better connection, resource utilization, and resilience of multipoint-interconnected quantum communication networks, the efficient network architecture and optimization methods are summarized, and open issues in quantum communication networks are discussed.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Félicien Appas ◽  
Florent Baboux ◽  
Maria I. Amanti ◽  
Aristide Lemaítre ◽  
Fabien Boitier ◽  
...  

AbstractQuantum communication networks enable applications ranging from highly secure communication to clock synchronization and distributed quantum computing. Miniaturized, flexible, and cost-efficient resources will be key elements for ensuring the scalability of such networks as they progress towards large-scale deployed infrastructures. Here, we bring these elements together by combining an on-chip, telecom-wavelength, broadband entangled photon source with industry-grade flexible-grid wavelength division multiplexing techniques, to demonstrate reconfigurable entanglement distribution between up to 8 users in a resource-optimized quantum network topology. As a benchmark application we use quantum key distribution, and show low error and high secret key generation rates across several frequency channels, over both symmetric and asymmetric metropolitan-distance optical fibered links and including finite-size effects. By adapting the bandwidth allocation to specific network constraints, we also illustrate the flexible networking capability of our configuration. Together with the potential of our semiconductor source for distributing secret keys over a 60 nm bandwidth with commercial multiplexing technology, these results offer a promising route to the deployment of scalable quantum network architectures.


2021 ◽  
Author(s):  
Gayathri VM ◽  
Supraja p ◽  
Razia Sulthana A ◽  
Mukunthan P

Abstract Security plays a vital role in communication networks. Since the nodes are mobile in Mobile Ad-hoc Networks (MANET), they are vulnerable to different types of attacks. Because of its mobility nature any node can enter the network at any time based on the coverage of the network. No centralized mechanism is found to verify or authenticate the nodes that are arriving/leaving the network. An algorithm is proposed for secure communication between source and destination based on the QoS parameters is called Modified Device Key Generation Algorithm (MDKGA). This algorithm elects an agent node based on the QoS parameters. Agent node is responsible for secure key generation and distribution of keys among the nodes. The neighboring node selection is based on trust value which acts as a heuristic function to select the node using A* algorithm.Various performance metrics are also analyzed. Comparison study has been carried out between the protocols of MANET.


2019 ◽  
Vol 56 (04) ◽  
pp. 799-808
Author(s):  
Muhammad Asim Nawaz

Almost after investing 25 years in research and development, China has reached to the decisional stage to either continue or discontinue or at least reduce the introductory speed of the genetically modified (GM) food production. The current study integrates the Benefit-Risk Analysis (BRA) framework and trust to study the consumer willingness to consume GM food. A structured survey conducted in nine major cities of China among 345 qualified samples analyzed through structural equational modeling-smart partial least square (SEM-Smart PLS). The statistical results lead to the following conclusions: The proposed psychological-persuasive model highlights the “trust in institutions” holds the least explanatory power while communicating about GM food-related risks in society. In the case of mapping perceived benefits, the trust in technology should be improved; as in the overall view of BRA, the perceived benefits hold less explanatory abilities in contrast to perceived risks. In other words, a secure communication strategy can change the public acceptance trend of GM food in China


Sign in / Sign up

Export Citation Format

Share Document