scholarly journals A Novel Pseudonym Assignment and Encryption Scheme for Preserving the Privacy of Military Vehicles

2021 ◽  
Vol 71 (2) ◽  
pp. 192-199
Author(s):  
Righa Tandon ◽  
P. K. Gupta

In this digital era, security has become one of the important topics of concern, and things become more critical for military vehicles where safety plays a vital role. In this paper, we have discussed a pseudonym-based approach that preserves the real identity of military vehicles. This paper also focuses on military vehicles’ location privacy by deploying a novel pseudonym assignment and encryption schemes. The proposed security scheme is based on a hybrid approach of matrix array symmetric key and the intelligent water drop scheme. After implementing the proposed security scheme, each military vehicle will obtain its pseudonym for hiding their original identities. The proposed algorithm effectively manages pseudonym generation and change requests for the local region and inter-region environment. The proposed security scheme not only provides secure communication and preservation of location privacy of military vehicles but also ensures their security against various attacks. Finally, the time efficiency of proposed algorithms is obtained for both local and inter-region requests. Comparative analysis shows that the proposed scheme is more efficient than other existing techniques.

Author(s):  
Amira Kchaou ◽  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Vehicular ad-hoc networks (VANETs) allow communication among vehicles using some fixed equipment on roads called roads side units. Vehicular communications are used for sharing different kinds of information between vehicles and RSUs in order to improve road safety and provide travelers comfort using exchanged messages. However, falsified or modified messages can be transmitted that affect the performance of the whole network and cause bad situations in roads. To mitigate this problem, trust management can be used in VANET and can be distributive for ensuring safe and secure communication between vehicles. Trust is a security concept that has attracted the interest of many researchers and used to build confident relations among vehicles. Hence, the authors propose a secured clustering mechanism for messages exchange in VANET in order to organize vehicles into clusters based on vehicles velocity, then CH computes the credibility of message using the reputation of vehicles and the miner controls the vehicle's behavior for verifying the correctness of the message.


Author(s):  
Kehui Sun

Chaos is characterized by aperiodic, wideband, random-like, and ergodicity. Chaotic secure communication has become one of the hot topics in nonlinear dynamics since the early 1990s exploiting the technique of chaos synchronization. As distinguished by the type of information being carried, chaos-based communication systems can be categorized into analogy and digital, including four popular techniques such as Chaos Masking, Chaos Shift Keying, Chaos Modulation, and Chaos Spreading Spectrum. In this chapter, the principles of these schemes and their modifications are analyzed by theoretical analysis as well as dynamic simulation. In addition, chaos-based cryptography is a new approach to encrypt information. After analyzing the performances of chaotic sequence and designing an effective chaotic sequence generator, the authors briefly presented the principle of two classes of chaotic encryption schemes, chaotic sequence encryption and chaotic data stream encryption.


Author(s):  
Manas Ranjan Lenka ◽  
Amulya Ratna Swain ◽  
Biraja Prasad Nayak

In Wireless Sensor Networks(WSNs), collision handling during transmission of data is an important challenge. MAC protocol plays a vital role in handling those collisions. Among different types of MAC protocols, schedule based MAC protocol is one where a valid schedule is prepared to handle the collision. The existing schedule based MAC protocols focus on preparing either a feasible schedule or an optimal schedule. In order to satisfy both feasibility as well as optimality feature, in this paper, we proposed a hybrid approach for slot scheduling that prepares a feasible schedule in a distributed manner and at the same time reduces the number of feasible schedule to achieve optimality. In this paper, we named this algorithm as Distributed hybrid Slot Scheduling(DHSS) algorithm. The proposed DHSS algorithm initially prepares a feasible schedule which is furthertuned in quick time to prepare a valid schedule with a reducednumber of slots. The reduction of the number of slots in theschedule improves the efficiency of data transmission in termsof latency. The simulation results show that the DHSS algorithmoutperforms RD-TDMA with respect to both the number of slotsallotted for a feasible schedule as well as the data transmissionlatency.


2020 ◽  
Vol 2020 ◽  
pp. 1-18
Author(s):  
Aisha Kanwal Junejo ◽  
Nikos Komninos

In this paper, a lightweight attribute-based security scheme based on elliptic curve cryptography (ECC) is proposed for fog-enabled cyber physical systems (Fog-CPS). A novel aspect of the proposed scheme is that the communication between Fog-CPS entities is secure even when the certification authority (CA) is compromised. This is achieved by dividing the attributes into two sets, namely, secret and shared, and subsequently generating two key pairs, referred to as the partial and final key pairs, for each entity of the Fog-CPS system. Unlike existing attribute-based encryption (ABE) and identity-based encryption schemes, in the proposed scheme, each entity calculates the final public key of the communicating CPS devices without the need of generating and transmitting digital certificates. Moreover, the proposed security scheme considers an efficient and secure key pair update approach in which the calculation overhead is limited to one group element. To show the effectiveness of the proposed scheme, we have calculated and compared the memory and processing complexity with other bilinear and elliptic curve schemes. We have also implemented our scheme in a Raspberry Pi (3B+ model) for CPS simulations. The proposed scheme guarantees the confidentiality, integrity, privacy, and authenticity in Fog-CPS systems.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
M. A. Mohamed ◽  
Ahmed Shaaban Samrah ◽  
Mohamed Ismail Fath Allah

Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, optical encryption has played a vital role in information security. Many optical encryption schemes have been proposed but most of them suffer from poor robustness. In this paper six proposed algorithms will be presented for optical encryption to be robust to severe attacks: composite attack. Three of these approaches are based on one level Discrete Wavelet Transform (DWT) and the others are based on Wavelet Packet (WP). Not only will new techniques be presented but also a new proposed chaotic map has been developed as random keys for all algorithms. After extensive comparative study with some traditional techniques, it has been found that the novel algorithms have achieved better performance versus conventional ones. Also it has been found that WP based algorithms have achieved better performance than DWT based ones against severe composite attacks.


2018 ◽  
Vol 68 (2) ◽  
pp. 183 ◽  
Author(s):  
M. Justin Sagayaraj ◽  
Jithesh V. ◽  
J.B. Singh ◽  
Dange Roshani ◽  
K.G. Srinivasa

In many engineering domains, cognition is emerging to play vital role. Cognition will play crucial role in radar engineering as well for the development of next generation radars. In this paper, a cognitive architecture for radars is introduced, based on hybrid cognitive architectures. The paper proposes deep learning applications for integrated target classification based on high-resolution radar range profile measurements and target revisit time calculation as case studies. The proposed architecture is based on the artificial cognitive systems concepts and provides a basis for addressing cognition in radars, which is inadequately explored for radar systems. Initial experimental studies on the applicability of deep learning techniques under this approach provided promising results.


Author(s):  
Ahmed Subhi Abdalkafor ◽  
Khattab M. Ali Alheeti

Cloud computing plays an important role in our daily life. It has direct and positive impact on share and update data, knowledge, storage and scientific resources between various regions. Cloud computing performance heavily based on job scheduling algorithms that are utilized for queue waiting in modern scientific applications. The researchers are considered cloud computing a popular platform for new enforcements. These scheduling algorithms help in design efficient queue lists in cloud as well as they play vital role in reducing waiting for processing time in cloud computing. A novel job scheduling is proposed in this paper to enhance performance of cloud computing and reduce delay time in queue waiting for jobs. The proposed algorithm tries to avoid some significant challenges that throttle from developing applications of cloud computing. However, a smart scheduling technique is proposed in our paper to improve performance processing in cloud applications. Our experimental result of the proposed job scheduling algorithm shows that the proposed schemes possess outstanding enhancing rates with a reduction in waiting time for jobs in queue list.


2018 ◽  
Vol 26 (2) ◽  
pp. 280-294
Author(s):  
ZAID A. ABOD

This paper proposes a hybrid system for secretly embedding images into the dithered multilevelimage. Confident hybridizations between steganography and quantum encryptions are either rare inliterature or suffer a poor effectiveness in secure communication. This paper scrambles and divides thesecret image into groups to be embedded in the blocks of the cover image using three chaos algorithms.These are Lorenz map, Henon map, and Logistic map algorithms. The encryption of embedded imagesconducted using the quantum one-time pad. Results showed that the proposed hybrid system succeeded inembedding and combining images with quantum cryptography algorithms.


Sign in / Sign up

Export Citation Format

Share Document