Academia.eduAcademia.edu

Secure Communication

3,068 papers
107 followers
AI Powered
Secure communication refers to the methods and protocols used to protect the confidentiality, integrity, and authenticity of information exchanged between parties. It involves the use of cryptographic techniques and security measures to prevent unauthorized access, interception, or alteration of data during transmission.
With the advent into the 20 th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai... more
The future of the automotive industry mainly depended on renewable energy because of the lack of fossil fuel. Due to the lack of fossil fuel and pollution arises due to fossil fuel; introduce a new path for the automotive world. The... more
Wireless sensor networks (WSN) are large scale networks of unattended devices, aimed at monitoring environmental parameters. Their extremely scarce hardware resources constitute a huge limitation to the use of standard security protocols... more
A nontraditional mechanism of tunneling at macroscopic distances is proposed for a wave packet localized in a one-dimensional disordered potential with mirror symmetry, V͑-x͒ = V͑x͒. Unlike quantum tunneling through a regular potential... more
This paper presents a security scheme for a medium access control protocol in a new wireless local area network AULWAN (Aden University laboratory WLAN). The design objective has been to develop a security scheme that will be scalable for... more
Face-to-Face (F2F) Auth is a multi-party environmental authentication system designed to safeguard highly sensitive operations by leveraging smartphone communication capabilities and environmental conditions. This paper presents the... more
Multi-robot systems (MRS) are groups of robots that coordinate to complete a given task. In communication-based systems, the integrity of the information shared between robots becomes highly important as any security threat due to a... more
Secure communication requires message authentication. In this paper we address the problem of how to authenticate quantum information sent through a quantum channel between two communicating parties with the minimum amount of resources.... more
Privacy is gaining importance since more and more data becomes digitalized. There is also a growing interest from the security community because of the existing synergy between security and privacy. Unfortunately, the privacy development... more
Internet of Things (IoT) provides an imminent floor to exchange information and enhance communication technology using embedded devices that are too sophisticated daily and deployed in diverse fields of life. The colossal volume of... more
The web of things is one of the most important innovations of modern technology. It aims to connect billions of devices, resulting in a vast number of contacts between devices and a huge volume of data. On the other hand, there are many... more
Quantum key distribution (QKD) is a revolutionary communication technology that promises ultimate security assurance by exploiting the fundamental principles of quantum mechanics. In this work, we report design and development of a fully... more
In recent years, chaotic synchronization has received a lot of interest in applications in different fields, including in the design of private and secure communication systems. The purpose of this paper was to achieve the synchronization... more
Abstract - In an age of swift progress in data collection and analysis, ethical considerations are crucial for maintaining the integrity and accountability of research practices. To prevent skewed results and misinformation among... more
This paper describes enhancing secure communication-based on secret sharing using Chinese remainder theorem and integral transform. Some of the secure electronic devices are trying to combine a different kind of services through this... more
Stealthiness can be described as a disposition to be sly and to do things surreptitiously. This paper presents a new architecture for flexible and secure networking in battlefields that enables stealthy and covert communication in the... more
In this article we present a survey of secure ad hoc routing protocols for mobile wireless networks. A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The... more
One of the critical security issues of Vehicular Ad Hoc Networks (VANETs) is the revocation of misbehaving vehicles. While essential, revocation checking can leak potentially sensitive information. Road Side Units (RSUs) receiving the... more
We present a practical and provably-secure multinode communication scheme in the presence of a passive eavesdropper. The scheme is based on a random scheduling approach that hides the identity of the transmitter from the eavesdropper.... more
Long Term Evolution (LTE) prevails as the next 4 th generation of mobile communications. Hybrid satellite and terrestrial LTE network takes advantages from the large satellite coverage for several emergency applications, such as providing... more
In this study, two coupled chaotic oscillators composed of RC circuits are investigated. We carry out computer simulations and circuit experiments and observe both in-phase synchronization and anti-phase synchronization. Moreover, when we... more
It has been recently investigated that the jerk dynamical systems are the simplest ever systems, which possess variety of dynamical behaviors including chaotic motion. Interestingly, the jerk dynamical systems also describe various... more
With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Real-world deployments of WSN... more
This paper provides a holistic perspective of security and governance in large microservices setups with a comprehensive view into securing your APIs. The growth of microservices architectures has made API security management critical for... more
The Cloud-Based Secured Connection Management Model (CS-CMM) for high-density fog networks is a novel approach that leverages cloud resources and the proliferation of computing power at the edge of networks. The model seeks to address the... more
For corporations or individuals who wish to protect the confidentiality of their data across computer networks, network-layer encryption offers an efficient and proven method for preserving data privacy. Network layer encryption such as... more
Free-Space Optical (FSO) communication provides very large bandwidth, relatively low cost, low power, low mass of implementation, and improved security when compared to conventional Free-Space Radio-Frequency (FSRF) systems. In this... more
Edge computing has significantly enhanced the capabilities of cloud computing. Edge data-centres are used for storing data of the end-user devices. Secure communication between the legitimate edge data-centres during the load balancing... more
The work proposed in this paper discusses improving the performance of Electric Vehicles (EVs). EVs use Permanent Magnet Synchronous motors, which are driven by the rechargeable batteries. Lithium-ion batteries are used in EVs. The... more
In this digital era, a huge amount of digital data is being generated, transmitted, and stored over the network. Images are widely searched, shared and uploaded which make them more vulnerable to the attackers. Therefore, image encryption... more
Signal processing applications dealing with secure transmission are enjoying increasing attention lately. This paper provides some theoretical insights as well as a practical solution for transmitting a hash of an image to a central... more
Time-reversal methods have attracted increasing interest recently. The so-called computational time-reversal approach creates an image of the illuminated scene by computing the back-propagated field and is useful for detecting and... more
When developing security and privacy policy, technical solutions, and research for end users, assumptions about end users' financial means and technology use situations often fail to take users' income status into account. This means that... more
Wireless Sensor Network is a network consisting of tiny and limited power sensor nodes communicate wirelessly and being deployed at any random places. The unique feature of Wireless Sensor Networks that enable continuous data collection... more
Security problems related to Wireless Sensor Networks (WSN) has directly influenced the credibility of WSN applications and its services. With the advancement and demand in the WSN applications such as in military, structural health... more
Our society is hugely dependent on encryption of messages for secure transactions, such as in banking. However, most popular key-based encryption schemes are vulnerable to interception. If the interceptor is equipped with adequate... more
Data security and secure communication is one of the most important issues of today. In this study, a quantum-based method for secure communication is proposed. In the proposed method, the necessary secret key in communication is... more
This paper presents a behavioral model for noisy Lorenz chaotic synchronization systems. This simple simulation-based model can be used for accurate noise voltage derivation of the chaotic oscillators and the investigation of chaotic... more
This paper presents a security scheme for a medium access control protocol in a new wireless local area network AULWAN (Aden University laboratory WLAN). The design objective has been to develop a security scheme that will be scalable for... more
Currently, access to Grid services is limited to resourceful devices such as desktop PCs but most mobile devices (with wireless network connections) cannot access the Grid network directly because of their resource limitations. Yet,... more
Chaos theory was originally developed by mathematicians and physicists. The theory deals with the behaviors of nonlinear dynamic systems. Chaos theory has desirable features, such as deterministic, nonlinear, irregular, long-term... more
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum... more
The diminishing size and battery requirements of mobile devices restrict the scope of computations possible on such devices and motivate approaches that support the selective offloading of computations to remote resources. With a variety... more
Security communication systems composed of highly reliable components may have few if any failures while undergoing heavy testing or field-usage. This paper combines (i) analysis of randomized pulse modulation schemes based on finite... more
Because of the high complexities issues in the Internet of Things and its applications, there is a need to propose an appropriate security model that would help in managing and controlling it. This paper critically examined Rijndael’s... more
Advancements in the field of wireless and mobile communication motivate academia, industry, and standardization organizations to explore new technologies to improve overall efficiency, spectrum utilization, power consumption, and... more
Advancements in the field of wireless and mobile communication motivate academia, industry, and standardization organizations to explore new technologies to improve overall efficiency, spectrum utilization, power consumption, and... more