Security Method

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 197787 Experts worldwide ranked by ideXlab platform

Khalid S Aloufi - One of the best experts on this subject based on the ideXlab platform.

  • a lightweight cryptography lwc framework to secure memory heap in internet of things
    alexandria engineering journal, 2021
    Co-Authors: Mahmoud Khalifa, Fahad Algarni, Mohammad Ayoub Khan, Azmat Ullah, Khalid S Aloufi
    Abstract:

    Abstract The extensive networking of devices and the large amount of data generated from the Internet of Things (IoT) has brought Security issues to the attention of the researcher. Java is the most common platform for embedded applications such as IoT, Wireless Sensors Networks (WSN), Near Field Communications (NFC) and Radio Frequency Identification (RFID). The object programming languages such as Java, SWIFT, PHP and C++ use garbage collection after any object run which creates Security loophole for attacks such as Next Memory Address Occupation (NMAO), memory replay, Learning Tasks Behaviors (LTB). The Security risk increases in IoT when attacks exceeds the target device to the surrounding connected devices. Inappropriate or wrong operations causes energy loss and increased costs. In this paper, a Security Method to protect IoT system operation from memory heap penetration and address modification attack is proposed. The proposed Method prevents directed attack by encrypting the object Garbage Collection at run time. To form a unique signature mechanism, the Cryptographic Hash Function (CHF) which employs a specific one-way hash algorithm. The proposed framework uses L-function based ECC and one-time Key (OTK) to secure the memory heap. Our Method is used with open system where the effect on the operating system is not considered. The proposed Method proved to be powerful and efficient which can help in achieving higher levels of Security across several IoT applications, by enabling better detection of malicious attacks.

Peng Ruxiang - One of the best experts on this subject based on the ideXlab platform.

  • fine grained big data Security Method based on zero trust model
    International Conference on Parallel and Distributed Systems, 2018
    Co-Authors: Yang Tao, Zhu Lei, Peng Ruxiang
    Abstract:

    With the rapid development of big data technology, the requirement of data processing capacity and efficiency result in failure of a number of legacy Security technologies, especially in the data Security domain. Data Security risks became extremely important for big data usage. We introduced a novel Method to preform big data Security control, which comprises three steps, namely, user context recognition based on zero trust, fine-grained data access authentication control, and data access audit based on full network traffic to recognize and intercept risky data access in big data environment. Experiments conducted on the fine-grained big data Security Method based on the zero trust model of drug-related information analysis system demonstrated that this Method can identify the majority of data Security risks.

M Abhiram - One of the best experts on this subject based on the ideXlab platform.

  • improving the performance of secure cloud infrastructure with machine learning techniques
    International Conference on Cloud Computing, 2016
    Co-Authors: Subrahmanya M Sarma, Y Srinivas, N Ramesh, M Abhiram
    Abstract:

    Security is one of the key concerns of the cloud user community. Most important ask from cloud users is to provide quality of services to manage Security end-to-end. The quality of Services (QoS) for securing cloud images were proposed in the earlier papers [2][3]. However, the key concern that still remains is how to balance performance and Security. In this paper, a new and an intelligent model of QoS is being proposed which determines the files to be decrypted, without decrypting the entire file list in the secure wallet. Smart QoS is proposed as an extension to the Security Method proposed and presented in CCEM 2015[5] to improve the performance of Secure Cloud. The Smart QoS is capable of addressing some of the Security concerns of cloud user community ensuring Security and performance as well. Machine learning techniques have been used to design and develop the Smart Quality of Services. Solutions to ensure end-to-end Security in cloud environments were proposed by us in the earlier paper [5]. In this paper, we have extended the Security Method proposed in [5] to ensure Security and performance. Proposed Model is experimented in HPE Helion Cloud on two real time scenarios and results are attached to this paper.

Mario Gerla - One of the best experts on this subject based on the ideXlab platform.

  • comparisons of zigbee personal area network pan interconnection Methods
    International Symposium on Wireless Communication Systems, 2007
    Co-Authors: Sewook Jung, A Chang, Mario Gerla
    Abstract:

    ZigBee's low power consumption, built-in Security Method and ratified specifications make it very suitable to be used with medical sensor devices. Medical sensors in a human body self organize in a ZigBee Personal Area Network (PAN). At a higher level, these PANs are interconnected in a Healthnet. To this end, a ZigBee PAN detects the existence of another PAN with beacon detection or active channel scan and selects proper target based on the peak energy (when energy detection channel scan is used). Different ZigBee interconnection schemes are then possible. PAN bridge Method uses special bridge node that works for different PANs with time division Method. PAN merge Method changes PAN coordinator's role as bridge node and merges two PANs. Peer-to-peer network can be used when all PANs use the same channel and operates as an ad-hoc network. In this paper, we perform extensive evaluations using NS-2 simulations to compare PAN interconnection Methods. Results show that the PAN bridge is the most useful Method because it is not affected by router/node ratio and is applicable to different channel and user scenarios.

  • temporary interconnection of zigbee personal area network pan
    International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2007
    Co-Authors: Sewook Jung, A Chang, Mario Gerla
    Abstract:

    ZigBee is popular for Wireless Sensor Network (WSN) devices because of its low power consumption, built-in Security Method and ratified specifications. With these features, it is also suitable to be used with medical sensor devices. Medical sensors in a human body self organize a ZigBee Personal Area Network (PAN). These PANs are interconnected and form a HealthNet. For the interconnection, a ZigBee PAN detects existence of another PAN with beacon detection or active channel scan. Different ZigBee interconnection schemes are used after detection. PAN bridge Method uses special bridge node that works for different PANs with time division Method. PAN merge Method temporarily changes PAN coordinator's role as bridge node and merges two PANs. Peer-to-peer network temporarily share all resources when two PANs are met, but all PANs have to use the same channel and operate as an ad-hoc network. In this paper, we perform extensive evaluations using NS-2 simulations to compare PAN interconnection Methods. Results show that the PAN bridge is the most useful Method because it is not affected by router/node ratio and is applicable to different channel usages.

Mahmoud Khalifa - One of the best experts on this subject based on the ideXlab platform.

  • a lightweight cryptography lwc framework to secure memory heap in internet of things
    alexandria engineering journal, 2021
    Co-Authors: Mahmoud Khalifa, Fahad Algarni, Mohammad Ayoub Khan, Azmat Ullah, Khalid S Aloufi
    Abstract:

    Abstract The extensive networking of devices and the large amount of data generated from the Internet of Things (IoT) has brought Security issues to the attention of the researcher. Java is the most common platform for embedded applications such as IoT, Wireless Sensors Networks (WSN), Near Field Communications (NFC) and Radio Frequency Identification (RFID). The object programming languages such as Java, SWIFT, PHP and C++ use garbage collection after any object run which creates Security loophole for attacks such as Next Memory Address Occupation (NMAO), memory replay, Learning Tasks Behaviors (LTB). The Security risk increases in IoT when attacks exceeds the target device to the surrounding connected devices. Inappropriate or wrong operations causes energy loss and increased costs. In this paper, a Security Method to protect IoT system operation from memory heap penetration and address modification attack is proposed. The proposed Method prevents directed attack by encrypting the object Garbage Collection at run time. To form a unique signature mechanism, the Cryptographic Hash Function (CHF) which employs a specific one-way hash algorithm. The proposed framework uses L-function based ECC and one-time Key (OTK) to secure the memory heap. Our Method is used with open system where the effect on the operating system is not considered. The proposed Method proved to be powerful and efficient which can help in achieving higher levels of Security across several IoT applications, by enabling better detection of malicious attacks.