secure transmission
Recently Published Documents


TOTAL DOCUMENTS

789
(FIVE YEARS 346)

H-INDEX

32
(FIVE YEARS 11)

Author(s):  
Renusree Varma Mudduluri ◽  
◽  
Akhila Golla ◽  
Sushanth Raghava ◽  
Tammana Jyothi Sai ◽  
...  

The world changing at a fast pace and more than ever there’s this need to secure data and preserve one’s privacy. Advanced algorithms and technologies that can be used for secure transmission of texts, images and videos are being tried and tested. We have used the Rubik’s Cube Technology for secure encryption and decryption of colored images.


2022 ◽  
Vol 130 (3) ◽  
pp. 1309-1324
Author(s):  
Rizwan Taj ◽  
Feng Tao ◽  
Shahzada Khurram ◽  
Ateeq Ur Rehman ◽  
Syed Kamran Haider ◽  
...  

2022 ◽  
Vol 70 (3) ◽  
pp. 4657-4673
Author(s):  
Hesham Alhumyani ◽  
Ibrahim Alrube ◽  
Sameer Alsharif ◽  
Ashraf Afifi ◽  
Chokri Ben Amar ◽  
...  

2021 ◽  
Author(s):  
A. K. JAITHUNBI ◽  
S. SABENA ◽  
L. SAIRAMESH

Abstract Today’s internet world is moves to cloud computing to maintain their public data privately in a secure way. In cloud scenario, many security principles are implemented to maintain the secure transmission of data over the internet. And still, the main concern is about maintaining the integrity of our own data in public cloud. Mostly, research works concentrates on cryptographic techniques for secure sharing of data but there is no such mentioned works are available for data integrity. In this paper, a data masking technique called obfuscation is implemented which is used to protect the data from unwanted modification by data breaching attacks. In this work, enhanced Vigenere encryption is used to perform obfuscation that maintains the privacy of the user’s data. Enhanced Vigenere encryption algorithm combined with intelligent rules to maintain the dissimilarity between the data masking for perform encryption with different set of rules. This work mainly concentrates on data privacy with reduced time complexity for encryption and decryption.


Author(s):  
Mehrunnisa Saleem

The ability to check the location of both static and dynamic devices is improving increasingly with each passing day. To track locations of both static and dynamic machines, Global Positioning System (GPS) is used to exchange the location between the sender and the receiver. However, there are still challenges in the sage and secure transmission and reception of GPS location. The most common challenge is spoofing attacks data. This paper proposes the implementation of a Pretty Good Privacy (PGP) encryption algorithm to ensure the safety of GPS packets shared across the communication channels. The GPS location is first encrypted and subsequently sent across a communication channel, which is strong encryption and cannot be decrypted by an unauthorized user.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Donghui Yang

In recent years, the process of industrial modernization has intensified, traditional industrial control has been improved and rapidly developed, industrial automation and intelligent unmanned production lines have become a new development trend, and the Internet of Things has become the basic direction of industrial development. In order to improve the effect of safe transmission and industrial IoT traffic detection, this study uses a neural network to improve the industrial IoT traffic detection algorithm. In order to improve the visualization effect of monitoring, this study uses computer vision technology to construct a traffic detection system of secure transmission industrial Internet of Things and builds an intelligent detection model. Finally, this study combines experimental research to verify the performance of the system. From the statistical point of view, it can be seen that the system’s security detection and traffic detection effects are very good.


2021 ◽  
Author(s):  
Shu Xu ◽  
Chen Liu ◽  
Hong Wang ◽  
Mujun Qian ◽  
Wenfeng Sun

Abstract Secure transmission is essential for future non-orthogonal multiple access (NOMA) system. This paper investigates relay-antenna selection (RAS) to enhance physical-layer security (PLS) of cooperative NOMA system in the presence of an eavesdropper, where multiple antennas are deployed at the relays, the users, and the eavesdropper. In order to reduce expense on radio frequency (RF) chains, selection combining (SC) is employed at both the relays and the users, whilst the eavesdropper employs either maximal-ratio combining (MRC) or selection combining (SC) to process the received signals. Under the condition that the channel state information (CSI) of the eavesdropping channel is available or unavailable, two e↵ective relay-antenna selection schemes are proposed. Additionally, the closed-form expressions of secrecy outage probability (SOP) are derived for the proposed relay-antenna selection schemes. In order to gain more deep insights on the derived results, the asymptotic performance of the derived SOP is analyzed. In simulations, it is demonstrated that the theoretical results match well with the simulation results and the SOP of the proposed schemes is less than that of the conventional orthogonal multiple access (OMA) scheme obviously.


Sign in / Sign up

Export Citation Format

Share Document