期刊文献+
共找到50篇文章
< 1 2 3 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 data encryption data decryption Communication security data storage encryption Key management
在线阅读 下载PDF
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
2
作者 Li-Woei Chen Kun-Lin Tsai +2 位作者 Fang-Yie Leu Wen-Cheng Jiang Shih-Ting Tseng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2779-2794,共16页
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G... Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices. 展开更多
关键词 Mobile application security AES data encryption time parameter mobile device
在线阅读 下载PDF
Fluorescence Behavior and Emission Mechanisms of Poly(ethylene succinamide)and Its Applications in Fe^(3+)Detection and Data Encryption 被引量:3
3
作者 Xubao Jiang Qinghui Wang +2 位作者 Bin Li Shusheng Li Xiang Zheng Kong 《Chinese Journal of Polymer Science》 SCIE EI CAS CSCD 2023年第1期129-142,共14页
Conventional fluorescent polymers are featured by large conjugation structures.In contrast,a new class of fluorescent polymers without any conjugations is gaining great interest in immerging applications.Polyamide is ... Conventional fluorescent polymers are featured by large conjugation structures.In contrast,a new class of fluorescent polymers without any conjugations is gaining great interest in immerging applications.Polyamide is a typical member of the conjugation-free fluorescent polymers.However,studies on their electrophotonic property are hardly available,although widely used in many fields.Herein,poly(ethylene succinamide),PA24,is synthesized;its chemical structure confirmed through multiple techniques(NMR,FTIR,XRD,etc.).PA24 is highly emissive as solid and in its solution at room temperature,and the emission is excitation and concentration dependant,with an unusual blue shift under excitation from 270 nm to 320 nm,a hardly observed phenomenon for all fluorescent polymers.Quite similar emission behavior is also observed under cryogenic condition at 77 K.Its emission behavior is thoroughly studied;the ephemeral emission blue-shift is interpreted through Förster resonance energy transfer.Based on its structures,the emission mechanism is ascribed to cluster-triggered emission,elucidated from multianalyses(NMR,FTIR,UV absorbance and DLS).In presence of a dozen of competitive metal ions,PA24 emission at 450 nm is selectively quenched by Fe^(3+).PA24 is used as probe for Fe^(3+)and H_(2)O_(2) detections and in data encryption.Therefore,this work provides a novel face of polyamide with great potential applications as sensors in different fields. 展开更多
关键词 POLYAMIDE Fluorescent emission Cluster formation Ferric ion detection data encryption
原文传递
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
4
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
在线阅读 下载PDF
Novel Approach to Data Encryption Based on Matrix Computations 被引量:1
5
作者 Rosilah Hassan Selver Pepic +2 位作者 Muzafer Saracevic Khaleel Ahmad Milan Tasic 《Computers, Materials & Continua》 SCIE EI 2021年第2期1139-1153,共15页
In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square He... In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse. 展开更多
关键词 SECURITY data encryption matrix computations cloud computing machine learning
在线阅读 下载PDF
Data encryption based on a 9D complex chaotic system with quaternion for smart grid
6
作者 张芳芳 黄哲 +3 位作者 寇磊 李扬 曹茂永 马凤英 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期217-226,共10页
With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large a... With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid. 展开更多
关键词 9-dimensional complex chaotic system data encryption QUATERNION smart grid REAL-TIME
原文传递
Application of Data Encryption Technology in Computer Network Communication Security
7
作者 LIUBoting JIANGYu 《外文科技期刊数据库(文摘版)自然科学》 2022年第7期010-014,共5页
When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current ... When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current network environment, clarify the types and application characteristics of security protection technology, improve the security management mode, and prevent people from using computers. The current security management scheme is gradually improved, so that the application advantages of data encryption technology can be fully highlighted and peoples information security can be maintained. 展开更多
关键词 data encryption COMPUTER network communication security application
原文传递
Data encryption based on field effect transistors and memristors 被引量:1
8
作者 Rumeng Yang Huiqian Hu +2 位作者 Jianyuan Zhang Donghui Wang Weiguo Huang 《Moore and More》 2025年第1期1-23,共23页
Information security is a critical requirement across military affairs,business,and daily life.Compared to traditional encryption methods,non-volatile memory offers significant advantages for data encryption due to it... Information security is a critical requirement across military affairs,business,and daily life.Compared to traditional encryption methods,non-volatile memory offers significant advantages for data encryption due to its high-density storage,reli-ability,rewrite capability,fast data transport,robust handleability,and ease of integration into electrical circuits.This review comprehensively summarizes the latest advancements in functional materials design and fabrication for data storage and encryption.It highlights innovative techniques that leverage the stimulus including optical,electrical,magnetic,and humid-ity properties,covering both single-stimulus and multi-stimulus synergistic effect.This review also systematically explores notable progress in the field of encryption.Future research directions will focus on developing ultra-low power devices for data encryption,implementing multiple coordinated encryption techniques,and efficiently integrating advanced devices with algorithms to meet evolving security demands.By offering insights into future trends and challenges,this review aims to deepen understanding and inspire innovative perspectives for the ongoing development of advanced encryption devices. 展开更多
关键词 Field effect transistors MEMRISTORS data encryption Communication encryption Multi-level encryption
在线阅读 下载PDF
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
9
作者 Muhammad Usama Arshad Aziz +2 位作者 Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev 《Computer Modeling in Engineering & Sciences》 2025年第4期1029-1048,共20页
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da... Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and misuse.With the exponential growth of digital data,robust security measures are essential.Data encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key control.Despite their individual benefits,both require significant computational resources.Additionally,performing them separately for the same data increases complexity and processing time.Recognizing the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and efficiency.Thealgorithmoperates on 128-bit block sizes and a 256-bit secret key length.It combines Huffman coding for compression and a Tent map for encryption.Additionally,an iterative Arnold cat map further enhances cryptographic confusion properties.Experimental analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field. 展开更多
关键词 Chaotic maps SECURITY data compression data encryption integrated compression and encryption
在线阅读 下载PDF
Ultralong Organic Phosphorescence of Triazatruxene Derivatives for Dynamic Data Encryption and Anti-counterfeiting 被引量:1
10
作者 Baoshuai Liang Wei An +3 位作者 Jie Liu Yu Dong Shiyu Feng Weiguo Huang 《Chinese Journal of Chemistry》 SCIE CAS CSCD 2023年第18期2261-2268,共8页
Comprehensive Summary,Organic luminogens with persistent room temperature phosphorescence(RTP)have drawn tremendous attentions due to their promising potentials in optoelectronic devices,information storage,biological... Comprehensive Summary,Organic luminogens with persistent room temperature phosphorescence(RTP)have drawn tremendous attentions due to their promising potentials in optoelectronic devices,information storage,biological imaging,and anti-counterfeiting.In this work,six triazatruxene-based lumiogens with different peripheral substituents and configurations are synthesized and systematically studied.The results show that their fluorescence quantum yields in solid states range from 15.73%to 37.58%.Dispersing the luminogens as vip into the host(PPh_(3))could turn on the persistent RTP,where PPh_(3)acts as not only a rigid matrix to suppress the non-radiative transitions of the vip,but also provides energy transfer channels to the vip.The maximum phosphorescence efficiency and the longest lifetime could reach 29.35%and 0.99 s in co-crystal films of 6-TAT-CN/PPh_(3)and 5-TAT-H/PPh_(3),respectively.Moreover,these host-vip co-crystalline films exhibit great potentials in advanced dynamic data encryption and anti-counterfeiting.This work deepens the insight for low cost,halogen-free,and facile fabrication of all-organic persistent RTP materials. 展开更多
关键词 Room temperature phosphorescence Host-vip systems Energy transfer data encryption ANTI-COUNTERFEITING FLUOROPHORES
原文传递
Hadoop-based secure storage solution for big data in cloud computing environment 被引量:2
11
作者 Shaopeng Guan Conghui Zhang +1 位作者 Yilin Wang Wenqing Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期227-236,共10页
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose... In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average. 展开更多
关键词 Big data security data encryption HADOOP Parallel encrypted storage Zookeeper
在线阅读 下载PDF
Physical layer data encryption using two-level constellation masking in 3D-CAP-PON
12
作者 Shuaidong Chen Bo Liu +9 位作者 Yaya Mao Jianxin Ren Xiumin Song Rahat Ullah Delin Zhao Lei Jiang Shun Han Jianye Zhao Jiajia Shen Xueyang Liu 《Chinese Optics Letters》 SCIE EI CAS CSCD 2021年第1期1-6,共6页
A novel physical layer data encryption scheme using two-level constellation masking in three-dimensional(3D)carrier-less amplitude and phase modulation(CAP)passive optical network(PON)is proposed in this Letter.The ch... A novel physical layer data encryption scheme using two-level constellation masking in three-dimensional(3D)carrier-less amplitude and phase modulation(CAP)passive optical network(PON)is proposed in this Letter.The chaotic sequence generated by Chua’s circuit model realizes two-level encryption of displacement masking and constellation rotation for3 D constellations.We successfully conduct an experiment demonstrating 8.7 Gb/s 3 D-CAP-8 data transmission over25 km standard single-mode fiber.With two-level constellation masking,a key space size of 2.1×1085 is achieved to bring about high security and good encryption performance,suggesting broad application prospects in future short-range secure communications. 展开更多
关键词 physical layer data encryption constellation masking carrier-less amplitude and phase modulation passive optical network
原文传递
Analysis of Secured Cloud Data Storage Model for Information
13
作者 Emmanuel Nwabueze Ekwonwune Udo Chukwuebuka Chigozie +1 位作者 Duroha Austin Ekekwe Georgina Chekwube Nwankwo 《Journal of Software Engineering and Applications》 2024年第5期297-320,共24页
This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hac... This paper was motivated by the existing problems of Cloud Data storage in Imo State University, Nigeria such as outsourced data causing the loss of data and misuse of customer information by unauthorized users or hackers, thereby making customer/client data visible and unprotected. Also, this led to enormous risk of the clients/customers due to defective equipment, bugs, faulty servers, and specious actions. The aim if this paper therefore is to analyze a secure model using Unicode Transformation Format (UTF) base 64 algorithms for storage of data in cloud securely. The methodology used was Object Orientated Hypermedia Analysis and Design Methodology (OOHADM) was adopted. Python was used to develop the security model;the role-based access control (RBAC) and multi-factor authentication (MFA) to enhance security Algorithm were integrated into the Information System developed with HTML 5, JavaScript, Cascading Style Sheet (CSS) version 3 and PHP7. This paper also discussed some of the following concepts;Development of Computing in Cloud, Characteristics of computing, Cloud deployment Model, Cloud Service Models, etc. The results showed that the proposed enhanced security model for information systems of cooperate platform handled multiple authorization and authentication menace, that only one login page will direct all login requests of the different modules to one Single Sign On Server (SSOS). This will in turn redirect users to their requested resources/module when authenticated, leveraging on the Geo-location integration for physical location validation. The emergence of this newly developed system will solve the shortcomings of the existing systems and reduce time and resources incurred while using the existing system. 展开更多
关键词 CLOUD data Information Model data Storage Cloud Computing Security System data encryption
在线阅读 下载PDF
Enhanced Triple Layered Approach for Mitigating Security Risks in Cloud
14
作者 Tajinder Kumar Purushottam Sharma +3 位作者 Xiaochun Cheng Sachin Lalar Shubham Kumar Sandhya Bansal 《Computers, Materials & Continua》 2025年第4期719-738,共20页
With cloud computing,large chunks of data can be handled at a small cost.However,there are some reservations regarding the security and privacy of cloud data stored.For solving these issues and enhancing cloud computi... With cloud computing,large chunks of data can be handled at a small cost.However,there are some reservations regarding the security and privacy of cloud data stored.For solving these issues and enhancing cloud computing security,this research provides a Three-Layered Security Access model(TLSA)aligned to an intrusion detection mechanism,access control mechanism,and data encryption system.The TLSA underlines the need for the protection of sensitive data.This proposed approach starts with Layer 1 data encryption using the Advanced Encryption Standard(AES).For data transfer and storage,this encryption guarantees the data’s authenticity and secrecy.Surprisingly,the solution employs the AES encryption algorithm to secure essential data before storing them in the Cloud to minimize unauthorized access.Role-based access control(RBAC)implements the second strategic level,which ensures specific personnel access certain data and resources.In RBAC,each user is allowed a specific role and Permission.This implies that permitted users can access some data stored in the Cloud.This layer assists in filtering granular access to data,reducing the risk that undesired data will be discovered during the process.Layer 3 deals with intrusion detection systems(IDS),which detect and quickly deal with malicious actions and intrusion attempts.The proposed TLSA security model of e-commerce includes conventional levels of security,such as encryption and access control,and encloses an insight intrusion detection system.This method offers integrated solutions for most typical security issues of cloud computing,including data secrecy,method of access,and threats.An extensive performance test was carried out to confirm the efficiency of the proposed three-tier security method.Comparisons have been made with state-of-art techniques,including DES,RSA,and DUAL-RSA,keeping into account Accuracy,QILV,F-Measure,Sensitivity,MSE,PSNR,SSIM,and computation time,encryption time,and decryption time.The proposed TLSA method provides an accuracy of 89.23%,F-Measure of 0.876,and SSIM of 0.8564 at a computation time of 5.7 s.A comparison with existing methods shows the better performance of the proposed method,thus confirming the enhanced ability to address security issues in cloud computing. 展开更多
关键词 Cloud security:data encryption AES access control intrusion detection systems(IDS) role-based access control(RBAC)
在线阅读 下载PDF
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System 被引量:20
15
作者 Mamta Brij B.Gupta +3 位作者 Kuan-Ching Li Victor C.M.Leun Kostas E.Psannis Shingo Yamaguchi 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1877-1890,共14页
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved... The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality.The privacy of health data can only be preserved by keeping it in an encrypted form,but it affects usability and flexibility in terms of effective search.Attribute-based searchable encryption(ABSE)has proven its worth by providing fine-grained searching capabilities in the shared cloud storage.However,it is not practical to apply this scheme to the devices with limited resources and storage capacity because a typical ABSE involves serious computations.In a healthcare cloud-based cyber-physical system(CCPS),the data is often collected by resource-constraint devices;therefore,here also,we cannot directly apply ABSE schemes.In the proposed work,the inherent computational cost of the ABSE scheme is managed by executing the computationally intensive tasks of a typical ABSE scheme on the blockchain network.Thus,it makes the proposed scheme suitable for online storage and retrieval of personal health data in a typical CCPS.With the assistance of blockchain technology,the proposed scheme offers two main benefits.First,it is free from a trusted authority,which makes it genuinely decentralized and free from a single point of failure.Second,it is computationally efficient because the computational load is now distributed among the consensus nodes in the blockchain network.Specifically,the task of initializing the system,which is considered the most computationally intensive,and the task of partial search token generation,which is considered as the most frequent operation,is now the responsibility of the consensus nodes.This eliminates the need of the trusted authority and reduces the burden of data users,respectively.Further,in comparison to existing decentralized fine-grained searchable encryption schemes,the proposed scheme has achieved a significant reduction in storage and computational cost for the secret key associated with users.It has been verified both theoretically and practically in the performance analysis section. 展开更多
关键词 Cloud-based cyber-physical systems(CCPS) data encryption healthcare information search and retrieval keyword search public-key cryptosystems searchable encryption
在线阅读 下载PDF
A Joint Encryption and Error Correction Method Used in Satellite Communications 被引量:3
16
作者 LINing LIN Kanfeng LIN Wenliang DENG Zhongliang 《China Communications》 SCIE CSCD 2014年第3期70-79,共10页
Due to the ubiquitous open air links and complex electromagnetic environment in the satellite communications,how to ensure the security and reliability of the information through the satellite communications is an urg... Due to the ubiquitous open air links and complex electromagnetic environment in the satellite communications,how to ensure the security and reliability of the information through the satellite communications is an urgent problem.This paper combines the AES(Advanced Encryption Standard) with LDPC(Low Density Parity Check Code) to design a secure and reliable error correction method — SEEC(Satellite Encryption and Error Correction).This method selects the LDPC codes,which is suitable for satellite communications,and uses the AES round key to control the encoding process,at the same time,proposes a new algorithm of round key generation.Based on a fairly good property in error correction in satellite communications,the method improves the security of the system,achieves a shorter key size,and then makes the key management easier.Eventually,the method shows a great error correction capability and encryption effect by the MATLAB simulation. 展开更多
关键词 data encryption error correctingcipher advanced encryption standard LDPCchannel coding satellite communications
在线阅读 下载PDF
Key-insulated encryption based group key management for wireless sensor network 被引量:2
17
作者 邱卫东 周耀伟 +2 位作者 朱博 郑燕飞 龚征 《Journal of Central South University》 SCIE EI CAS 2013年第5期1277-1284,共8页
The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen... The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes. 展开更多
关键词 wireless sensor network data encryption group key management forward security key-insulated encryption
在线阅读 下载PDF
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
18
作者 Muhammad Fahad Khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi Muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True Random Number Generators(TRNG) heuristic optimization genetic algorithm
在线阅读 下载PDF
Pipeline Defect Detection Cloud System Using Role Encryption and Hybrid Information
19
作者 Ce Li Xinyu Shang +3 位作者 Liguo Zhang Feng Yang Jing Zheng Xianlei Xu 《Computers, Materials & Continua》 SCIE EI 2019年第9期1245-1260,共16页
Pipeline defect detection systems collect the videos from cameras of pipeline robots,however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats.Th... Pipeline defect detection systems collect the videos from cameras of pipeline robots,however the systems always analyzed these videos by offline systems or humans to detect the defects of potential security threats.The existing systems tend to reach the limit in terms of data access anywhere,access security and video processing on cloud.There is in need of studying on a pipeline defect detection cloud system for automatic pipeline inspection.In this paper,we deploy the framework of a cloud based pipeline defect detection system,including the user management module,pipeline robot control module,system service module,and defect detection module.In the system,we use a role encryption scheme for video collection,data uploading,and access security,and propose a hybrid information method for defect detection.The experimental results show that our approach is a scalable and efficient defection detection cloud system. 展开更多
关键词 Defect detection cloud computing data encryption hybrid information
在线阅读 下载PDF
Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data
20
作者 Taek-Young Youn Nam-Su Jho 《Computers, Materials & Continua》 SCIE EI 2022年第10期151-164,共14页
Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services th... Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services that were difficult to provide in the past.One of the services made possible through this change is cloud-based collaboration.In order to support secure collaboration over cloud,encryption technology to securely manage dynamic data is essential.However,since the existing encryption technology is not suitable for encryption of dynamic data,a new technology that can provide encryption for dynamic data is required for secure cloudbased collaboration.In this paper,we propose a new encryption technology to support secure collaboration for dynamic data in the cloud.Specifically,we propose an encryption operation mode which can support data updates such as modification,addition,and deletion of encrypted data in an encrypted state.To support the dynamic update of encrypted data,we invent a new mode of operation technique named linked-block cipher(LBC).Basic idea of our work is to use an updatable random value so-called link to link two encrypted blocks.Due to the use of updatable random link values,we can modify,insert,and delete an encrypted data without decrypt it. 展开更多
关键词 data encryption cloud-based collaboration dynamic data update
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部