Security Field

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Fei Chen - One of the best experts on this subject based on the ideXlab platform.

  • A Review of Compressive Sensing in Information Security Field
    IEEE Access, 2016
    Co-Authors: Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen
    Abstract:

    The applications of compressive sensing (CS) in the Field of information Security have captured a great deal of researchers’ attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information Security Field from two aspects: theoretical Security and application Security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of Security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.

Anurag Jain - One of the best experts on this subject based on the ideXlab platform.

  • an ids scheme against black hole attack to secure aomdv routing in manet
    arXiv: Networking and Internet Architecture, 2015
    Co-Authors: Sonal Shrivastava, Chetan Agrawal, Anurag Jain
    Abstract:

    In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver data in between source and destination. In this research we work on Security Field in MANET and proposed a novel Security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as compare to single path routing protocol. The attacker is affected all the possible paths that is selected by sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS) scheme is identified the attacker information through hop count mechanism. The routing information of actual data is reached to which intermediate node and the next hop information is exist at that node is confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in future attacker is not participating in routing procedure. The proposed Security scheme detects and provides the deterrence against routing misbehavior through malicious attack. Here we compare the routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme and recovers 95 % of data as compare to normal routing. Keywords- -AOMDV, MANET, IDS, Black hole attack, Routing misbehavior.

  • an ids scheme against black hole attack to secure aomdv routing in manet
    International Journal on AdHoc Networking Systems, 2015
    Co-Authors: Sonal Shrivastava, Chetan Agrawal, Anurag Jain
    Abstract:

    In Mobile Ad hoc Network (MANET) all the nodes are freely moves in the absence of without ant centralized coordination system. Due to that the attackers or malicious nodes are easily affected that kind of network and responsible for the routing misbehavior. The routing is network is mandatory to deliver data in between source and destination. In this research we work on Security Field in MANET and proposed a novel Security scheme against routing misbehavior through Black hole attack. The Ad hoc On demand Multipath Routing (AOMDV) protocol is consider for routing and also to improves the routing quality as compare to single path routing protocol. The attacker is affected all the possible paths that is selected by sender for sending data in network. The malicious nodes are forward optimistic reply at the time of routing by that their identification is also a complex procedure. The proposed Intrusion Detection System (IDS) scheme is identified the attacker information through hop count mechanism. The routing information of actual data is reached to which intermediate node and the next hop information is exist at that node is confirm by IDS scheme. The black hole attacker node Identification (ID) is forward in network by that in future attacker is not participating in routing procedure. The proposed Security scheme detects and provides the deterrence against routing misbehavior through malicious attack. Here we compare the routing performance of AOMDV, Attack and IDS scheme. The performance of normal multipath routing and proposed IDS scheme is almost equal. The attacker has degrades the whole routing performance but observed that in presence of attacker, routing misbehavior is completely block by the proposed IDS scheme and recovers 95 % of data as compare to normal routing.

Woo Hyoung Lee - One of the best experts on this subject based on the ideXlab platform.

  • How to identify emerging research Fields using scientometrics: An example in the Field of Information Security
    Scientometrics, 2008
    Co-Authors: Woo Hyoung Lee
    Abstract:

    In the highly competitive world, there has been a concomitant increase in the need for the research and planning methodology, which can perform an advanced assessment of technological opportunities and an early perception of threats and possibilities of the emerging technology according to the nation’s economic and social status. This research is aiming to provide indicators and visualization methods to measure the latest research trend and aspect underlying scientific and technological documents to researchers and policy planners using “co-word analysis”. Information Security Field is a highly prospective market value. In this paper, we presented an analysis Information Security. Co-word analysis was employed to reveal patterns and trends in the Information Security Fields by measuring the association strength of terms representatives of relevant publications or other texts produced in the Information Security Field. Data were collected from SCI and the critical keywords could be extracted from the author keywords. These extracted keywords were further standardized. In order to trace the dynamic changes in the Information Security Field, we presented a variety of technology mapping. The results showed that the Information Security Field has some established research theme and also rapidly transforms to embrace new themes.

Yushu Zhang - One of the best experts on this subject based on the ideXlab platform.

  • A Review of Compressive Sensing in Information Security Field
    IEEE Access, 2016
    Co-Authors: Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen
    Abstract:

    The applications of compressive sensing (CS) in the Field of information Security have captured a great deal of researchers’ attention in the past decade. To supply guidance for researchers from a comprehensive perspective, this paper, for the first time, reviews CS in information Security Field from two aspects: theoretical Security and application Security. Moreover, the CS applied in image cipher is one of the most widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption of an image or multiple images. With respect to this application, the basic framework designs and the corresponding analyses are investigated. Specifically, the investigation proceeds from three aspects, namely, image ciphers based on chaos and CS, image ciphers based on optics and CS, and image ciphers based on chaos, optics, and CS. A total of six frameworks are put forward. Meanwhile, their analyses in terms of Security, advantages, disadvantages, and so on are presented. At last, we attempt to indicate some other possible application research topics in future.

Wang Huiqiang - One of the best experts on this subject based on the ideXlab platform.

  • dynamic awareness of network Security situation based on stochastic game theory
    International Conference on Software Engineering, 2010
    Co-Authors: Liang Ying, Li Bingyang, Wang Huiqiang
    Abstract:

    Stochastic game theory is proposed to apply in the research on network Security situational awareness (NSSA), which is a research focus in network Security Field at present. A novel dynamic awareness method of network Security situation (NSS) based on analyses of network service states is proposed in this paper. Realizing situation awareness is a dynamic process, and the diverse states of network services are just direct mirrors of the whole network Security situation. Network Security situation reflects what is happening in the network, including both the offense and defense behaviors in it. Stochastic game model of network Security system is constructed in this paper, and network Security situation is quantified by the game mathematical formulation, costs or rewards of attackers and defenders are established, and finally non-linear programming is used to compute the Nash equilibrium points, at which point both of the two sides get a balance between their benefits. Network Security situation can then be dynamically achieved by visualizing the diverse metrics information of network services at Nash equilibrium during the operating of network system.