Preface |
|
xiii | |
1 History and Generations of Security Protocols |
|
1 | (28) |
|
|
|
|
|
2 | (1) |
|
|
2 | (2) |
|
1.3 Historical Background of Network Security and Network Timeline |
|
|
4 | (1) |
|
1.4 Internet Architecture and Security Aspects |
|
|
5 | (7) |
|
1.4.1 IPv4 and IPv6 Architecture |
|
|
6 | (2) |
|
1.4.1.1 Structure of IPv4 |
|
|
6 | (1) |
|
1.4.1.2 IPv6 Architecture |
|
|
7 | (1) |
|
1.4.2 Attack Through IPv4 |
|
|
8 | (3) |
|
1.4.2.1 Internet Attacks Common Methods |
|
|
8 | (2) |
|
1.4.2.2 Internet Security Technology |
|
|
10 | (1) |
|
1.4.3 IPv6 IP Security Issues |
|
|
11 | (1) |
|
1.5 Different Aspects of Security of the Network |
|
|
12 | (1) |
|
1.6 Evolution of Security Protocols for Network |
|
|
13 | (4) |
|
1.6.1 Understanding the Key Components of Network Security |
|
|
13 | (1) |
|
1.6.2 A Deep Defense Strategy |
|
|
14 | (1) |
|
1.6.3 How Does the Next Generation Network Security System Work Best |
|
|
15 | (2) |
|
1.7 Network Security Protocols |
|
|
17 | (8) |
|
|
17 | (3) |
|
1.7.1.1 Good Privacy (PGP) |
|
|
17 | (1) |
|
1.7.1.2 Email/Multipurpose Security (S/MIME) |
|
|
18 | (1) |
|
1.7.1.3 HTTP Secure (S-HTTP) |
|
|
18 | (1) |
|
1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer |
|
|
19 | (1) |
|
1.7.1.5 Secure E-Commerce (SET) |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
1.7.2.1 Secure Sockets Layer (SSL) |
|
|
20 | (1) |
|
1.7.2.2 Transport Layer Security (TLS) |
|
|
21 | (1) |
|
|
21 | (3) |
|
1.7.3.1 Internet Protocol Security (IPSec) |
|
|
22 | (1) |
|
1.7.3.2 Virtual Private Network (VPN) |
|
|
23 | (1) |
|
|
24 | (1) |
|
1.7.4.1 Point-to-Point Protocol (PPP) |
|
|
24 | (1) |
|
1.7.4.2 Remote Authentication User Service (RADIO) |
|
|
24 | (1) |
|
1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) |
|
|
25 | (1) |
|
1.8 Current Evolution of Red Security |
|
|
25 | (2) |
|
1.8.1 Hardware Development |
|
|
25 | (2) |
|
1.8.2 Software Development |
|
|
27 | (1) |
|
1.9 Future Security Trends |
|
|
27 | (1) |
|
|
27 | (2) |
2 Evolution of Information Security Algorithms |
|
29 | (50) |
|
|
|
2.1 Introduction to Conventional Encryption |
|
|
30 | (1) |
|
2.2 Classical Encryption Techniques |
|
|
31 | (7) |
|
|
32 | (4) |
|
|
32 | (1) |
|
2.2.1.2 Monoalphabetic Cipher |
|
|
32 | (1) |
|
|
33 | (2) |
|
2.2.1.4 Polyalphabetic Cipher |
|
|
35 | (1) |
|
2.2.2 Transposition Based |
|
|
36 | (2) |
|
|
36 | (1) |
|
2.2.2.2 Rail Fence Cipher |
|
|
37 | (1) |
|
2.3 Evolutions of Modern Security Techniques |
|
|
38 | (28) |
|
2.3.1 Stream Cipher Algorithms |
|
|
38 | (6) |
|
2.3.1.1 One Time Pad (OTP) |
|
|
40 | (1) |
|
|
41 | (2) |
|
|
43 | (1) |
|
2.3.2 Block Cipher Algorithms |
|
|
44 | (23) |
|
2.3.2.1 Feistel Cipher Structure |
|
|
46 | (2) |
|
2.3.2.2 Data Encryption Standard (DES) |
|
|
48 | (8) |
|
2.3.2.3 Triple Data Encryption Standard (TDES) |
|
|
56 | (2) |
|
2.3.2.4 International Data Encryption Algorithm (IDEA) |
|
|
58 | (2) |
|
|
60 | (2) |
|
|
62 | (4) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (12) |
|
Review Questions and Exercises |
|
|
70 | (9) |
3 Philosophy of Security by Cryptostakes Schemes |
|
79 | (16) |
|
|
3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) |
|
|
79 | (2) |
|
|
81 | (3) |
|
3.3 Security Analysis of RSA |
|
|
84 | (1) |
|
3.4 Exponentiation in Modular Arithmetic |
|
|
85 | (2) |
|
3.5 Distribution of Public Keys |
|
|
87 | (2) |
|
3.6 Distribution of Secret Keys Using Public Key Cryptosystems |
|
|
89 | (2) |
|
|
91 | (1) |
|
3.8 Diffie-Hellman Key Exchange |
|
|
91 | (2) |
|
|
93 | (1) |
|
|
94 | (1) |
4 Zero-Share Key Management for Secure Communication Across a Channel |
|
95 | (14) |
|
|
|
|
95 | (1) |
|
|
96 | (2) |
|
4.3 Zero-Share Key Management System |
|
|
98 | (2) |
|
|
100 | (3) |
|
4.5 Complexity and Analysis |
|
|
103 | (3) |
|
4.6 Conclusion and Future Trends |
|
|
106 | (1) |
|
|
107 | (2) |
5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate |
|
109 | (32) |
|
|
|
|
109 | (6) |
|
5.1.1 Soft Computing for Intrusion Detection |
|
|
111 | (1) |
|
|
112 | (1) |
|
5.1.3 Reasons of False Positive |
|
|
113 | (2) |
|
5.2 Existing Technology and Its Review |
|
|
115 | (3) |
|
|
118 | (6) |
|
5.3.1 Conceptual Framework |
|
|
118 | (3) |
|
5.3.2 Preprocessing Module |
|
|
121 | (2) |
|
5.3.3 Alert Monitoring Module |
|
|
123 | (1) |
|
5.4 Results With Implications |
|
|
124 | (9) |
|
5.4.1 Preprocessing Module Benchmark |
|
|
126 | (3) |
|
5.4.2 Alert Monitoring Module Benchmark |
|
|
129 | (1) |
|
|
130 | (1) |
|
5.4.4 Test Bed Network Benchmark |
|
|
131 | (2) |
|
5.5 Future Research and Conclusion |
|
|
133 | (2) |
|
|
135 | (6) |
6 Recursively Paired Arithmetic Technique (RPAT): An FPGA- Based Block Cipher Simulation and Its Cryptanalysis |
|
141 | (14) |
|
|
|
|
141 | (1) |
|
6.2 Recursively Paired Arithmetic Technique (RPAT) |
|
|
142 | (5) |
|
|
144 | (1) |
|
|
145 | (1) |
|
6.2.3 Session Key Generation |
|
|
146 | (1) |
|
6.3 Implementation and Simulation |
|
|
147 | (3) |
|
|
150 | (2) |
|
6.5 Simulation Based Results |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
153 | (1) |
|
|
153 | (2) |
7 Security Protocol for Multimedia Streaming |
|
155 | (16) |
|
|
|
|
|
156 | (6) |
|
7.1.1 Significance of Video Streaming |
|
|
156 | (6) |
|
7.2 Existing Technology and Its Review |
|
|
162 | (4) |
|
7.3 Methodology and Research Design |
|
|
166 | (1) |
|
|
167 | (2) |
|
7.5 Future Research and Conclusion |
|
|
169 | (1) |
|
|
169 | (2) |
8 Nature Inspired Approach for Intrusion Detection Systems |
|
171 | (12) |
|
|
|
171 | (2) |
|
8.1.1 Types of Intrusion Detection Systems |
|
|
172 | (1) |
|
8.2 Approaches Used for Intrusion Detection Systems |
|
|
173 | (2) |
|
8.2.1 Intrusion Detection and Prevention Systems |
|
|
173 | (1) |
|
8.2.2 Performance Criteria of Intrusion Detection Systems |
|
|
174 | (1) |
|
8.3 Intrusion Detection Tools |
|
|
175 | (1) |
|
8.4 Use of Machine Learning to Build Dynamic IDS/IPS |
|
|
176 | (2) |
|
8.5 Bio-Inspired Approaches for IDS |
|
|
178 | (1) |
|
|
179 | (2) |
|
|
181 | (2) |
9 The Socio-Behavioral Cipher Technique |
|
183 | (28) |
|
|
|
|
|
183 | (1) |
|
|
184 | (2) |
|
|
186 | (19) |
|
|
187 | (1) |
|
|
188 | (1) |
|
9.3.3 Mathematical Operations |
|
|
189 | (2) |
|
|
191 | (1) |
|
9.3.5 Encryption Operation |
|
|
192 | (1) |
|
9.3.6 Decryption Operation |
|
|
193 | (8) |
|
9.3.7 Mathematical Modeling |
|
|
201 | (4) |
|
9.4 Conclusion: Future Scope and Limitations |
|
|
205 | (3) |
|
|
208 | (3) |
10 An Energy Efficient Scheme for Real-Time Transmissions Using Mobile Coordinated Wireless Sensor Network |
|
211 | (12) |
|
|
|
|
|
212 | (1) |
|
|
212 | (5) |
|
10.3 Results and Discussion |
|
|
217 | (3) |
|
|
220 | (1) |
|
|
221 | (2) |
11 Intrusion Detection Strategies in Smart Grid |
|
223 | (24) |
|
|
|
|
|
|
224 | (1) |
|
|
224 | (1) |
|
11.3 Technical Challenges Involved in Smart Grid |
|
|
225 | (3) |
|
11.4 Intrusion Detection System |
|
|
228 | (1) |
|
11.5 General Architecture of Intrusion Detection System |
|
|
229 | (1) |
|
|
230 | (1) |
|
|
231 | (1) |
|
11.8 Benefits of Intrusion Detection Systems |
|
|
231 | (1) |
|
|
232 | (2) |
|
11.10 IDS in a Smart Grid Environment |
|
|
234 | (3) |
|
|
235 | (1) |
|
|
235 | (1) |
|
11.10.3 Central Access Control |
|
|
236 | (1) |
|
11.10.4 Smart Data Collector |
|
|
236 | (1) |
|
11.10.5 Energy Distribution System |
|
|
237 | (1) |
|
|
237 | (1) |
|
11.11 Security Issues of Cyber-Physical Smart Grid |
|
|
237 | (2) |
|
11.12 Protecting Smart Grid From Cyber Vulnerabilities |
|
|
239 | (2) |
|
11.13 Security Issues for Future Smart Grid |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (5) |
12 Security Protocol for Cloud-Based Communication |
|
247 | (8) |
|
|
|
|
248 | (1) |
|
12.2 Existing Technology and Its Review |
|
|
249 | (1) |
|
12.3 Methodology (To Overcome the Drawbacks of Existing Protocols) |
|
|
250 | (1) |
|
12.4 Findings: Policy Monitoring Techniques |
|
|
250 | (2) |
|
12.5 Future Research and Conclusion |
|
|
252 | (1) |
|
|
253 | (2) |
13 Security Protocols for Mobile Communications |
|
255 | (22) |
|
|
|
|
|
|
256 | (2) |
|
13.2 Evolution of Mobile Communications |
|
|
258 | (2) |
|
13.3 Global System for Mobiles (GSM) |
|
|
260 | (2) |
|
13.4 Universal Mobile Telecommunications System (UMTS) |
|
|
262 | (1) |
|
13.5 Long Term Evolution (LTE) |
|
|
263 | (3) |
|
|
266 | (3) |
|
|
269 | (1) |
|
13.8 5G Integrated With LoRA |
|
|
270 | (1) |
|
13.9 Physical Layer Security and RFID Authentication |
|
|
271 | (1) |
|
|
271 | (1) |
|
|
272 | (5) |
14 Use of Machine Learning in Design of Security Protocols |
|
277 | (22) |
|
|
|
|
278 | (3) |
|
14.2 Review of Related Literature |
|
|
281 | (2) |
|
14.3 Joint and Offensive Kinetic Execution Resolver |
|
|
283 | (9) |
|
14.3.1 Design of JOKER Protocol |
|
|
285 | (3) |
|
|
288 | (2) |
|
|
290 | (1) |
|
14.3.4 Simulation Details and Parameters |
|
|
291 | (38) |
|
14.3.4.1 Packet Delivering Ratio Calculation |
|
|
291 | (1) |
|
14.3.4.2 Packet Loss Ratio Calculation |
|
|
291 | (1) |
|
14.3.4.3 Latency (Delay) Calculation |
|
|
291 | (1) |
|
14.3.4.4 Throughput Calculation |
|
|
292 | (1) |
|
14.4 Results and Discussion |
|
|
292 | (3) |
|
14.5 Conclusion and Future Scope |
|
|
295 | (1) |
|
|
295 | (4) |
15 Privacy and Authentication on Security Protocol for Mobile Communications |
|
299 | (18) |
|
|
|
300 | (1) |
|
15.2 Mobile Communications |
|
|
301 | (2) |
|
|
303 | (3) |
|
|
306 | (4) |
|
15.5 Next Generation Networking |
|
|
310 | (4) |
|
|
314 | (1) |
|
|
315 | (2) |
16 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing |
|
317 | (28) |
|
|
|
317 | (1) |
|
16.2 Need of Cloud Communication |
|
|
318 | (3) |
|
|
321 | (1) |
|
16.4 Cloud Communication Platform |
|
|
322 | (1) |
|
16.5 Security Measures Provided by the Cloud |
|
|
322 | (2) |
|
16.6 Achieving Security With Cloud Communications |
|
|
324 | (2) |
|
16.7 Cryptographic Protocols for Secure Cloud Computing |
|
|
326 | (1) |
|
16.8 Security Layer for the Transport Protocol |
|
|
327 | (2) |
|
16.9 Internet Protocol Security (IPSec) |
|
|
329 | (3) |
|
|
330 | (2) |
|
|
332 | (6) |
|
16.11 Wired Equivalent Privacy (WEP) |
|
|
338 | (1) |
|
|
338 | (1) |
|
16.12 WiFi Protected Access (WPA) |
|
|
339 | (1) |
|
16.13 Wi-Fi Protected Access II and the Most Current Security Protocols |
|
|
340 | (1) |
|
16.13.1 Wi-Fi Protected Access |
|
|
341 | (1) |
|
16.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages |
|
|
341 | (1) |
|
16.14 Wired Equivalent Privacy (WEP) |
|
|
341 | (1) |
|
16.15 Wi-Fi Protected Access (WPA) |
|
|
342 | (1) |
|
|
342 | (1) |
|
|
343 | (2) |
Index |
|
345 | |