Design and Analysis of Security Protocol for Communication
Inbunden, Engelska, 2020
Av Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng, O. P. Verma, O P Verma
3 099 kr
Produktinformation
- Utgivningsdatum2020-03-20
- Mått10 x 10 x 10 mm
- Vikt454 g
- SpråkEngelska
- Antal sidor368
- FörlagJohn Wiley & Sons Inc
- EAN9781119555643
Du kanske också är intresserad av
Empowering Artificial Intelligence Through Machine Learning
Nedunchezhian Raju, M. Rajalakshmi, Dinesh Goyal, S. Balamurugan, Ahmed A. Elngar, Bright Kesawn, India) Raju, Nedunchezhian (Coimbatore Institute of Technology, India) Rajalakshmi, M. (Coimbatore Institute of Technology, Egypt) Elngar, Ahmed A. (Beni-Suef University, India) Kesawn, Bright (Suresh Gyan Vihar University
1 509 kr
Tillhör följande kategorier
Dinesh Goyal received his PhD in 2014 on "Secure Video Transmission in a Cloud Network" and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing Information Science and Technology University of China, a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.
- Preface xiii1 History and Generations of Security Protocols 1Bright Keswani, Poonam Keswani and Rakhi Purohit1.1 Introduction 21.2 Network Security 21.3 Historical Background of Network Security and Network Timeline 41.4 Internet Architecture and Security Aspects 51.4.1 IPv4 and IPv6 Architecture 61.4.1.1 Structure of IPv4 61.4.1.2 IPv6 Architecture 71.4.2 Attack Through IPv4 81.4.2.1 Internet Attacks Common Methods 81.4.2.2 Internet Security Technology 101.4.3 IPv6 IP Security Issues 111.5 Different Aspects of Security of the Network 121.6 Evolution of Security Protocols for Network 131.6.1 Understanding the Key Components of Network Security 131.6.2 A Deep Defense Strategy 141.6.3 How Does the Next Generation Network Security System Work Best 151.7 Network Security Protocols 171.7.1 Application Layer 171.7.1.1 Good Privacy (PGP) 171.7.1.2 Email/Multipurpose Security (S/MIME) 181.7.1.3 HTTP Secure (S-HTTP) 181.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer 191.7.1.5 Secure E-Commerce (SET) 191.7.1.6 Kerberos 191.7.2 Transport Layer 201.7.2.1 Secure Sockets Layer (SSL) 201.7.2.2 Transport Layer Security (TLS) 211.7.3 Network Layer 211.7.3.1 Internet Protocol Security (IPSec) 221.7.3.2 Virtual Private Network (VPN) 231.7.4 Data Link Layer 241.7.4.1 Point-to-Point Protocol (PPP) 241.7.4.2 Remote Authentication User Service (RADIO) 241.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) 251.8 Current Evolution of Red Security 251.8.1 Hardware Development 251.8.2 Software Development 271.9 Future Security Trends 27References 272 Evolution of Information Security Algorithms 29Anurag Jagetiya and C. Rama Krishna2.1 Introduction to Conventional Encryption 302.2 Classical Encryption Techniques 312.2.1 Substitution Based 322.2.1.1 Caesar Cipher 322.2.1.2 Monoalphabetic Cipher 322.2.1.3 Playfair Cipher 332.2.1.4 Polyalphabetic Cipher 352.2.2 Transposition Based 362.2.2.1 Simple Columnar 362.2.2.2 Rail Fence Cipher 372.3 Evolutions of Modern Security Techniques 382.3.1 Stream Cipher Algorithms 382.3.1.1 One Time Pad (OTP) 402.3.1.2 RC-4 412.3.1.3 A5/1 432.3.2 Block Cipher Algorithms 442.3.2.1 Feistel Cipher Structure 462.3.2.2 Data Encryption Standard (DES) 482.3.2.3 Triple Data Encryption Standard (TDES) 562.3.2.4 International Data Encryption Algorithm (IDEA) 582.3.2.5 Blowfish 602.3.2.6 CAST-128 622.4 Conclusion 66References 67Practice Set 67Review Questions and Exercises 703 Philosophy of Security by Cryptostakes Schemes 79Hemant Kumar Saini3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) 793.2 RSA Algorithm 813.3 Security Analysis of RSA 843.4 Exponentiation in Modular Arithmetic 853.5 Distribution of Public Keys 873.6 Distribution of Secret Keys Using Public Key Cryptosystems 893.7 Discrete Logarithms 913.8 Diffie–Hellman Key Exchange 913.9 Review Exercise 93References 944 Zero-Share Key Management for Secure Communication Across a Channel 95P. R. Mahalingam and K. A. Fasila4.1 Introduction 954.2 Background 964.3 Zero-Share Key Management System 984.4 Simulation 1004.5 Complexity and Analysis 1034.6 Conclusion and Future Trends 106References 1075 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate 109Dharmendra G. Bhatti and Paresh V. Virparia5.1 Introduction 1095.1.1 Soft Computing for Intrusion Detection 1115.1.2 False Positive 1125.1.3 Reasons of False Positive 1135.2 Existing Technology and Its Review 1155.3 Research Design 1185.3.1 Conceptual Framework 1185.3.2 Preprocessing Module 1215.3.3 Alert Monitoring Module 1235.4 Results With Implications 1245.4.1 Preprocessing Module Benchmark 1265.4.2 Alert Monitoring Module Benchmark 1295.4.3 Overall Benchmark 1305.4.4 Test Bed Network Benchmark 1315.5 Future Research and Conclusion 133References 1356 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis 141Rajdeep Chakraborty and J.K. Mandal6.1 Introduction 1416.2 Recursively Paired Arithmetic Technique (RPAT) 1426.2.1 An Example of RPAT 1446.2.2 Options of RPAT 1456.2.3 Session Key Generation 1466.3 Implementation and Simulation 1476.4 Cryptanalysis 1506.5 Simulation Based Results 1526.6 Applications 1526.7 Conclusion 153Acknowledgment 153References 1537 Security Protocol for Multimedia Streaming 155N. Brindha, S. Deepa and S. Balamurugan7.1 Introduction 1567.1.1 Significance of Video Streaming 1567.2 Existing Technology and Its Review 1627.3 Methodology and Research Design 1667.4 Findings 1677.5 Future Research and Conclusion 169References 1698 Nature Inspired Approach for Intrusion Detection Systems 171Mohd Shahid Husain8.1 Introduction 1718.1.1 Types of Intrusion Detection Systems 1728.2 Approaches Used for Intrusion Detection Systems 1738.2.1 Intrusion Detection and Prevention Systems 1738.2.2 Performance Criteria of Intrusion Detection Systems 1748.3 Intrusion Detection Tools 1758.4 Use of Machine Learning to Build Dynamic IDS/IPS 1768.5 Bio-Inspired Approaches for IDS 1788.6 Conclusion 179References 1819 The Socio-Behavioral Cipher Technique 183Harshit Bhatia, Rahul Johari and Kalpana Gupta9.1 Introduction 1839.2 Existing Technology 1849.3 Methodology 1869.3.1 Key Arrangement 1879.3.2 Key Selection 1889.3.3 Mathematical Operations 1899.3.4 Algorithm 1919.3.5 Encryption Operation 1929.3.6 Decryption Operation 1939.3.7 Mathematical Modeling 2019.4 Conclusion: Future Scope and Limitations 205References 20810 Intrusion Detection Strategies in Smart Grid 211P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan10.1 Introduction 21210.2 Role of Smart Grid 21210.3 Technical Challenges Involved in Smart Grid 21310.4 Intrusion Detection System 21610.5 General Architecture of Intrusion Detection System 21710.6 Basic Terms in IDS 21810.7 Capabilities of IDS 21910.8 Benefits of Intrusion Detection Systems 21910.9 Types of IDS 22010.10 IDS in a Smart Grid Environment 22210.10.1 Smart Meter 22310.10.2 Metering Module 22310.10.3 Central Access Control 22410.10.4 Smart Data Collector 22410.10.5 Energy Distribution System 22510.10.6 SCADA Controller 22510.11 Security Issues of Cyber-Physical Smart Grid 22510.12 Protecting Smart Grid From Cyber Vulnerabilities 22710.13 Security Issues for Future Smart Grid 22910.14 Conclusion 230References 23011 Security Protocol for Cloud-Based Communication 235R. Suganya and S. Sujatha11.1 Introduction 23611.2 Existing Technology and Its Review 23711.3 Methodology (To Overcome the Drawbacks of Existing Protocols) 23811.4 Findings: Policy Monitoring Techniques 23811.5 Future Research and Conclusion 240Reference 24112 Security Protocols for Mobile Communications 243Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S.12.1 Introduction 24412.2 Evolution of Mobile Communications 24612.3 Global System for Mobiles (GSM) 24812.4 Universal Mobile Telecommunications System (UMTS) 25012.5 Long Term Evolution (LTE) 25112.6 5G Wireless Systems 25412.7 LoRA 25712.8 5G Integrated With LoRA 25812.9 Physical Layer Security and RFID Authentication 25912.10 Conclusion 259References 26013 Use of Machine Learning in Design of Security Protocols 265M. Sundaresan and D. Boopathy13.1 Introduction 26613.2 Review of Related Literature 26913.3 Joint and Offensive Kinetic Execution Resolver 27113.3.1 Design of JOKER Protocol 27313.3.2 Procedure 27613.3.3 Procedure 27813.3.4 Simulation Details and Parameters 27913.3.4.1 Packet Delivering Ratio Calculation 27913.3.4.2 Packet Loss Ratio Calculation 27913.3.4.3 Latency (Delay) Calculation 27913.3.4.4 Throughput Calculation 28013.4 Results and Discussion 28013.5 Conclusion and Future Scope 283References 28314 Privacy and Authentication on Security Protocol for Mobile Communications 287Brajesh Kumar Gupta “Mewadev”14.1 Introduction 28814.2 Mobile Communications 28914.3 Security Protocols 29114.4 Authentication 29414.5 Next Generation Networking 29814.6 Conclusion 302References 30315 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing 305Anjana Sangwan15.1 Introduction 30515.2 Need of Cloud Communication 30615.3 Application 30915.4 Cloud Communication Platform 31015.5 Security Measures Provided by the Cloud 31015.6 Achieving Security With Cloud Communications 31215.7 Cryptographic Protocols for Secure Cloud Computing 31415.8 Security Layer for the Transport Protocol 31515.9 Internet Protocol Security (IPSec) 31715.9.1 How IPsec Works 31815.10 Kerberos 32015.11 Wired Equivalent Privacy (WEP) 32615.11.1 Authentication 32615.12 WiFi Protected Access (WPA) 32715.13 Wi-Fi Protected Access II and the Most Current Security Protocols 32815.13.1 Wi-Fi Protected Access 32915.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages 32915.14 Wired Equivalent Privacy (WEP) 32915.15 Wi-Fi Protected Access (WPA) 33015.16 Conclusions 330References 331Index 333