An Efficient and Differential Privacy-Based Scheme for Aggregating Mobility Datasets.
Yang, Qing;Ji, Fujun;Liu, Fei
Academic Journal
|
Journal of Advanced Transportation. 3/8/2024, Vol. 2024, p1-14. 14p.
Please log in to see more details
Systems analysis for data transmission.
Book
|
1972
Available at Available Merrill-Cazier BARN, Books, Circulation Desk (1st Floor) (Call number: TK 5102.5 .M2924)
close
see all
Items
Location | Call No. | Status |
---|---|---|
Merrill-Cazier BARN, Books, Circulation Desk (1st Floor) | TK 5102.5 .M2924 | Available |
Enhancing vehicle IoT security through matrix power functions in supertropical semiring.
Ponmaheshkumar, A.;Perumal, R.
Academic Journal
|
Mathematics in Engineering, Science & Aerospace (MESA). 2024, Vol. 15 Issue 1, p213-223. 11p.
Please log in to see more details
High-Performance Wireless Power and Data Transmission System for Medical Implant Devices Using ASK Modulation.
Zhu, Haoqi;Tahir, Mustafa;Wu, Xu;Hu, Sideng
Academic Journal
|
Energies (19961073). Feb2024, Vol. 17 Issue 3, p731. 16p.
Please log in to see more details
UAV-Based Secure Data Communication: Multilevel Authentication Perspective.
Aljumah, Abdullah
Academic Journal
|
Sensors (14248220). Feb2024, Vol. 24 Issue 3, p996. 21p.
Please log in to see more details
Power Supply Reliability Analysis of Distribution Systems Considering Data Transmission Quality of Distribution Automation Terminals.
Luo, Fengzhang;Ge, Nan;Xu, Jing
Academic Journal
|
Energies (19961073). Dec2023, Vol. 16 Issue 23, p7826. 19p.
Please log in to see more details
Immunization Infrastructure Modernization Act of 2021 : report (to accompany H.R. 550) (including cost estimate of the Congressional Budget Office).
Electronic Government Doc
|
2021
Available at Online freely available Government Documents (USU and USU Eastern)
NOBEL-BOX: Development of a Low-Cost Ship-Based Instrument for Ocean Monitoring.
Purba, Noir P.;Faizal, Ibnu;Martasuganda, Marine K.;Wulandari, Ajeng;Kusuma...
Academic Journal
|
Sensors (14248220). Dec2023, Vol. 23 Issue 24, p9654. 13p.
Please log in to see more details
Separable Reversible Data Hiding in Encrypted Images for Remote Sensing Images.
Liu, Ruihua;Zhou, Quan;Liu, Juanni;Zhang, Yi;Hui, Zheng;Zhang, Xuejiao
Academic Journal
|
Entropy. Dec2023, Vol. 25 Issue 12, p1632. 20p.
Please log in to see more details
Patient Confidential Data Hiding and Transmission System Using Amplitude Quantization in the Frequency Domain of ECG Signals.
Chen, Shuo-Tsung;Ye, Ren-Jie;Wu, Tsung-Hsien;Cheng, Chun-Wen;Zhan, Po-You;C...
Academic Journal
|
Sensors (14248220). Nov2023, Vol. 23 Issue 22, p9199. 13p.
Please log in to see more details
Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB.
Feng, Tao;Zhang, Bugang
Academic Journal
|
Information (2078-2489). Dec2023, Vol. 14 Issue 12, p653. 26p.
Please log in to see more details
The European Installation Bus(EIB) protocol, also known as KNX/EIB, is widely used in ...
more
Security Evaluation and Improvement of the Extended Protocol EIBsec for KNX/EIB.
Information (2078-2489). Dec2023, Vol. 14 Issue 12, p653. 26p.
The European Installation Bus(EIB) protocol, also known as KNX/EIB, is widely used in building and home automation. An extension of the KNX/EIB protocol, EIBsec, is primarily designed to meet the requirements for data transmission security in distributed building automation systems . However, this protocol has some security issues in the request, key distribution, and identity authentication processes. This paper employs a formal analysis method that combines Colored Petri Net (CPN) theory with the Dolev-Yao attack model to evaluate and enhance the EIBsec protocol. It utilizes the CPN Tools to conduct CPN modeling analysis on the protocol and introduces a security assessment model to carry out intrusion detection and security assessment. Through this analysis, vulnerabilities in the protocol, such as tampering and replay attacks, are identified. To address these security concerns, we introduce hash verification and timestamp judgment methods into the original protocol to enhance its security. Subsequently, based on the improved protocol, we conduct CPN modeling and verify the security of the new scheme. Finally, through a comparison and analysis of the performance and security between the original protocol and the improved scheme, it is found that the improved scheme has higher security. [ABSTRACT FROM AUTHOR]
Subject terms:
Data transmission systems - Near field communication - Intrusion detection systems (Computer security) - Data security - Petri nets - Home automation - Burglary protection - European Investment BankContent provider:
Library, Information Science & Technology Abstracts
PROFEE: A Probabilistic-Feedback Based Speed Rate Adaption for IEEE 802.11bc.
Gomez, Javier;Camacho-Escoto, Jose Jaime;Orozco-Barbosa, Luis;Rodriguez-Tor...
Academic Journal
|
Future Internet. Dec2023, Vol. 15 Issue 12, p396. 22p.
Please log in to see more details
Network coding construction for a special class of three unicast sessions.
PU, Baoxing
Academic Journal
|
Scientific Reports. 11/20/2023, Vol. 13 Issue 1, p1-12. 12p.
Please log in to see more details
EEDC: An Energy Efficient Data Communication Scheme Based on New Routing Approach in Wireless Sensor Networks for Future IoT Applications.
Gupta, Divya;Wadhwa, Shivani;Rani, Shalli;Khan, Zahid;Boulila, Wadii
Academic Journal
|
Sensors (14248220). Nov2023, Vol. 23 Issue 21, p8839. 14p.
Please log in to see more details
Secure and Fast Image Encryption Algorithm Based on Modified Logistic Map.
Riaz, Mamoon;Dilpazir, Hammad;Naseer, Sundus;Mahmood, Hasan;Anwar, Asim;Kha...
Academic Journal
|
Information (2078-2489). Mar2024, Vol. 15 Issue 3, p172. 20p.
Please log in to see more details
In the past few decades, the transmission of data over an unsecure channel has resulte...
more
Secure and Fast Image Encryption Algorithm Based on Modified Logistic Map.
Information (2078-2489). Mar2024, Vol. 15 Issue 3, p172. 20p.
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve efficiency and robustness in the encryption process. In this article, a novel and secure image encryption algorithm is presented. It is based on a modified chaotic logistic map (CLM) that provides the advantage of taking less computational time to encrypt an input image. The encryption algorithm is based on Shannon's idea of using a substitution–permutation and one-time pad network to achieve ideal secrecy. The CLM is used for substitution and permutation to improve randomness and increase dependency on the encryption key. Various statistical tests are conducted, such as keyspace analysis, complexity analysis, sensitivity analysis, strict avalanche criteria (SAC), histogram analysis, entropy analysis, mean of absolute deviation (MAD) analysis, correlation analysis, contrast analysis and homogeneity, to give a comparative analysis of the proposed algorithm and verify its security. As a result of various statistical tests, it is evident that the proposed algorithm is more efficient and robust as compared to previous ones. [ABSTRACT FROM AUTHOR]