Muutke küpsiste eelistusi

Design and Analysis of Security Protocol for Communication [Kõva köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Hardback, 368 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 20-Mar-2020
  • Kirjastus: Wiley-Scrivener
  • ISBN-10: 1119555647
  • ISBN-13: 9781119555643
  • Formaat: Hardback, 368 pages, kõrgus x laius x paksus: 10x10x10 mm, kaal: 454 g
  • Ilmumisaeg: 20-Mar-2020
  • Kirjastus: Wiley-Scrivener
  • ISBN-10: 1119555647
  • ISBN-13: 9781119555643

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

Preface xiii
1 History and Generations of Security Protocols 1(28)
Bright Keswani
Poonam Keswani
Rakhi Purohit
1.1 Introduction
2(1)
1.2 Network Security
2(2)
1.3 Historical Background of Network Security and Network Timeline
4(1)
1.4 Internet Architecture and Security Aspects
5(7)
1.4.1 IPv4 and IPv6 Architecture
6(2)
1.4.1.1 Structure of IPv4
6(1)
1.4.1.2 IPv6 Architecture
7(1)
1.4.2 Attack Through IPv4
8(3)
1.4.2.1 Internet Attacks Common Methods
8(2)
1.4.2.2 Internet Security Technology
10(1)
1.4.3 IPv6 IP Security Issues
11(1)
1.5 Different Aspects of Security of the Network
12(1)
1.6 Evolution of Security Protocols for Network
13(4)
1.6.1 Understanding the Key Components of Network Security
13(1)
1.6.2 A Deep Defense Strategy
14(1)
1.6.3 How Does the Next Generation Network Security System Work Best
15(2)
1.7 Network Security Protocols
17(8)
1.7.1 Application Layer
17(3)
1.7.1.1 Good Privacy (PGP)
17(1)
1.7.1.2 Email/Multipurpose Security (S/MIME)
18(1)
1.7.1.3 HTTP Secure (S-HTTP)
18(1)
1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer
19(1)
1.7.1.5 Secure E-Commerce (SET)
19(1)
1.7.1.6 Kerberos
19(1)
1.7.2 Transport Layer
20(1)
1.7.2.1 Secure Sockets Layer (SSL)
20(1)
1.7.2.2 Transport Layer Security (TLS)
21(1)
1.7.3 Network Layer
21(3)
1.7.3.1 Internet Protocol Security (IPSec)
22(1)
1.7.3.2 Virtual Private Network (VPN)
23(1)
1.7.4 Data Link Layer
24(1)
1.7.4.1 Point-to-Point Protocol (PPP)
24(1)
1.7.4.2 Remote Authentication User Service (RADIO)
24(1)
1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +)
25(1)
1.8 Current Evolution of Red Security
25(2)
1.8.1 Hardware Development
25(2)
1.8.2 Software Development
27(1)
1.9 Future Security Trends
27(1)
References
27(2)
2 Evolution of Information Security Algorithms 29(50)
Anurag Jagetiya
C. Rama Krishna
2.1 Introduction to Conventional Encryption
30(1)
2.2 Classical Encryption Techniques
31(7)
2.2.1 Substitution Based
32(4)
2.2.1.1 Caesar Cipher
32(1)
2.2.1.2 Monoalphabetic Cipher
32(1)
2.2.1.3 Playfair Cipher
33(2)
2.2.1.4 Polyalphabetic Cipher
35(1)
2.2.2 Transposition Based
36(2)
2.2.2.1 Simple Columnar
36(1)
2.2.2.2 Rail Fence Cipher
37(1)
2.3 Evolutions of Modern Security Techniques
38(28)
2.3.1 Stream Cipher Algorithms
38(6)
2.3.1.1 One Time Pad (OTP)
40(1)
2.3.1.2 RC-4
41(2)
2.3.1.3 A5/1
43(1)
2.3.2 Block Cipher Algorithms
44(23)
2.3.2.1 Feistel Cipher Structure
46(2)
2.3.2.2 Data Encryption Standard (DES)
48(8)
2.3.2.3 Triple Data Encryption Standard (TDES)
56(2)
2.3.2.4 International Data Encryption Algorithm (IDEA)
58(2)
2.3.2.5 Blowfish
60(2)
2.3.2.6 CAST-128
62(4)
2.4 Conclusion
66(1)
References
67(1)
Practice Set
67(12)
Review Questions and Exercises
70(9)
3 Philosophy of Security by Cryptostakes Schemes 79(16)
Hemant Kumar Saini
3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
79(2)
3.2 RSA Algorithm
81(3)
3.3 Security Analysis of RSA
84(1)
3.4 Exponentiation in Modular Arithmetic
85(2)
3.5 Distribution of Public Keys
87(2)
3.6 Distribution of Secret Keys Using Public Key Cryptosystems
89(2)
3.7 Discrete Logarithms
91(1)
3.8 Diffie-Hellman Key Exchange
91(2)
3.9 Review Exercise
93(1)
References
94(1)
4 Zero-Share Key Management for Secure Communication Across a Channel 95(14)
P.R. Mahalingam
K.A. Fasila
4.1 Introduction
95(1)
4.2 Background
96(2)
4.3 Zero-Share Key Management System
98(2)
4.4 Simulation
100(3)
4.5 Complexity and Analysis
103(3)
4.6 Conclusion and Future Trends
106(1)
References
107(2)
5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate 109(32)
Dharmendra G. Bhatti
Paresh V. Virparia
5.1 Introduction
109(6)
5.1.1 Soft Computing for Intrusion Detection
111(1)
5.1.2 False Positive
112(1)
5.1.3 Reasons of False Positive
113(2)
5.2 Existing Technology and Its Review
115(3)
5.3 Research Design
118(6)
5.3.1 Conceptual Framework
118(3)
5.3.2 Preprocessing Module
121(2)
5.3.3 Alert Monitoring Module
123(1)
5.4 Results With Implications
124(9)
5.4.1 Preprocessing Module Benchmark
126(3)
5.4.2 Alert Monitoring Module Benchmark
129(1)
5.4.3 Overall Benchmark
130(1)
5.4.4 Test Bed Network Benchmark
131(2)
5.5 Future Research and Conclusion
133(2)
References
135(6)
6 Recursively Paired Arithmetic Technique (RPAT): An FPGA- Based Block Cipher Simulation and Its Cryptanalysis 141(14)
Rajdeep Chakraborty
J.K. Mandal
6.1 Introduction
141(1)
6.2 Recursively Paired Arithmetic Technique (RPAT)
142(5)
6.2.1 An Example of RPAT
144(1)
6.2.2 Options of RPAT
145(1)
6.2.3 Session Key Generation
146(1)
6.3 Implementation and Simulation
147(3)
6.4 Cryptanalysis
150(2)
6.5 Simulation Based Results
152(1)
6.6 Applications
152(1)
6.7 Conclusion
153(1)
Acknowledgment
153(1)
References
153(2)
7 Security Protocol for Multimedia Streaming 155(16)
N. Brindha
S. Deepa
S. Balamurugan
7.1 Introduction
156(6)
7.1.1 Significance of Video Streaming
156(6)
7.2 Existing Technology and Its Review
162(4)
7.3 Methodology and Research Design
166(1)
7.4 Findings
167(2)
7.5 Future Research and Conclusion
169(1)
References
169(2)
8 Nature Inspired Approach for Intrusion Detection Systems 171(12)
Mohd Shahid Husain
8.1 Introduction
171(2)
8.1.1 Types of Intrusion Detection Systems
172(1)
8.2 Approaches Used for Intrusion Detection Systems
173(2)
8.2.1 Intrusion Detection and Prevention Systems
173(1)
8.2.2 Performance Criteria of Intrusion Detection Systems
174(1)
8.3 Intrusion Detection Tools
175(1)
8.4 Use of Machine Learning to Build Dynamic IDS/IPS
176(2)
8.5 Bio-Inspired Approaches for IDS
178(1)
8.6 Conclusion
179(2)
References
181(2)
9 The Socio-Behavioral Cipher Technique 183(28)
Harshit Bhatia
Rahul Johari
Kalpana Gupta
9.1 Introduction
183(1)
9.2 Existing Technology
184(2)
9.3 Methodology
186(19)
9.3.1 Key Arrangement
187(1)
9.3.2 Key Selection
188(1)
9.3.3 Mathematical Operations
189(2)
9.3.4 Algorithm
191(1)
9.3.5 Encryption Operation
192(1)
9.3.6 Decryption Operation
193(8)
9.3.7 Mathematical Modeling
201(4)
9.4 Conclusion: Future Scope and Limitations
205(3)
References
208(3)
10 An Energy Efficient Scheme for Real-Time Transmissions Using Mobile Coordinated Wireless Sensor Network 211(12)
E. Udayakumar
S. Balamurugan
P. Vetrivelan
10.1 Introduction
212(1)
10.2 System Design
212(5)
10.3 Results and Discussion
217(3)
10.4 Conclusion
220(1)
References
221(2)
11 Intrusion Detection Strategies in Smart Grid 223(24)
P. Ponmurugan
C. Venkatesh
M. Divya Priyadharshini
S. Balamurugan
11.1 Introduction
224(1)
11.2 Role of Smart Grid
224(1)
11.3 Technical Challenges Involved in Smart Grid
225(3)
11.4 Intrusion Detection System
228(1)
11.5 General Architecture of Intrusion Detection System
229(1)
11.6 Basic Terms in IDS
230(1)
11.7 Capabilities of IDS
231(1)
11.8 Benefits of Intrusion Detection Systems
231(1)
11.9 Types of IDS
232(2)
11.10 IDS in a Smart Grid Environment
234(3)
11.10.1 Smart Meter
235(1)
11.10.2 Metering Module
235(1)
11.10.3 Central Access Control
236(1)
11.10.4 Smart Data Collector
236(1)
11.10.5 Energy Distribution System
237(1)
11.10.6 SCADA Controller
237(1)
11.11 Security Issues of Cyber-Physical Smart Grid
237(2)
11.12 Protecting Smart Grid From Cyber Vulnerabilities
239(2)
11.13 Security Issues for Future Smart Grid
241(1)
11.14 Conclusion
242(1)
References
242(5)
12 Security Protocol for Cloud-Based Communication 247(8)
R. Suganya
S. Sujatha
12.1 Introduction
248(1)
12.2 Existing Technology and Its Review
249(1)
12.3 Methodology (To Overcome the Drawbacks of Existing Protocols)
250(1)
12.4 Findings: Policy Monitoring Techniques
250(2)
12.5 Future Research and Conclusion
252(1)
Reference
253(2)
13 Security Protocols for Mobile Communications 255(22)
Divya Priyadharshini M.
Divya R.
Ponmurugan P.
Balamurugan S.
13.1 Introduction
256(2)
13.2 Evolution of Mobile Communications
258(2)
13.3 Global System for Mobiles (GSM)
260(2)
13.4 Universal Mobile Telecommunications System (UMTS)
262(1)
13.5 Long Term Evolution (LTE)
263(3)
13.6 5G Wireless Systems
266(3)
13.7 LoRA
269(1)
13.8 5G Integrated With LoRA
270(1)
13.9 Physical Layer Security and RFID Authentication
271(1)
13.10 Conclusion
271(1)
References
272(5)
14 Use of Machine Learning in Design of Security Protocols 277(22)
M. Sundaresan
D. Boopathy
14.1 Introduction
278(3)
14.2 Review of Related Literature
281(2)
14.3 Joint and Offensive Kinetic Execution Resolver
283(9)
14.3.1 Design of JOKER Protocol
285(3)
14.3.2 Procedure
288(2)
14.3.3 Procedure
290(1)
14.3.4 Simulation Details and Parameters
291(38)
14.3.4.1 Packet Delivering Ratio Calculation
291(1)
14.3.4.2 Packet Loss Ratio Calculation
291(1)
14.3.4.3 Latency (Delay) Calculation
291(1)
14.3.4.4 Throughput Calculation
292(1)
14.4 Results and Discussion
292(3)
14.5 Conclusion and Future Scope
295(1)
References
295(4)
15 Privacy and Authentication on Security Protocol for Mobile Communications 299(18)
Brajesh Kumar Gupta
15.1 Introduction
300(1)
15.2 Mobile Communications
301(2)
15.3 Security Protocols
303(3)
15.4 Authentication
306(4)
15.5 Next Generation Networking
310(4)
15.6 Conclusion
314(1)
References
315(2)
16 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing 317(28)
Anjana Sangwan
16.1 Introduction
317(1)
16.2 Need of Cloud Communication
318(3)
16.3 Application
321(1)
16.4 Cloud Communication Platform
322(1)
16.5 Security Measures Provided by the Cloud
322(2)
16.6 Achieving Security With Cloud Communications
324(2)
16.7 Cryptographic Protocols for Secure Cloud Computing
326(1)
16.8 Security Layer for the Transport Protocol
327(2)
16.9 Internet Protocol Security (IPSec)
329(3)
16.9.1 How IPsec Works
330(2)
16.10 Kerberos
332(6)
16.11 Wired Equivalent Privacy (WEP)
338(1)
16.11.1 Authentication
338(1)
16.12 WiFi Protected Access (WPA)
339(1)
16.13 Wi-Fi Protected Access II and the Most Current Security Protocols
340(1)
16.13.1 Wi-Fi Protected Access
341(1)
16.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages
341(1)
16.14 Wired Equivalent Privacy (WEP)
341(1)
16.15 Wi-Fi Protected Access (WPA)
342(1)
16.16 Conclusions
342(1)
References
343(2)
Index 345
Dinesh Goyal received his PhD in 2014 on "Secure Video Transmission in a Cloud Network" and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.

S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.

Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing Information Science and Technology University of China, a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.

O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.