Design and Analysis of Security Protocol for Communication

 
 
Wiley-Scrivener (Verlag)
  • 1. Auflage
  • |
  • erschienen am 10. Februar 2020
  • |
  • 368 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
978-1-119-55574-2 (ISBN)
 
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.

S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.

Dinesh Goyal received his PhD in 2014 on 'Secure Video Transmission in a Cloud Network' and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.

O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.

Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing Information Science and Technology University of China, a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.

  • Englisch
  • Newark
  • |
  • USA
  • 7,85 MB
978-1-119-55574-2 (9781119555742)
weitere Ausgaben werden ermittelt
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 History and Generations of Security Protocols
  • 1.1 Introduction
  • 1.2 Network Security
  • 1.3 Historical Background of Network Security and Network Timeline
  • 1.4 Internet Architecture and Security Aspects
  • 1.4.1 IPv4 and IPv6 Architecture
  • 1.4.1.1 Structure of IPv4
  • 1.4.1.2 IPv6 Architecture
  • 1.4.2 Attack Through IPv4
  • 1.4.2.1 Internet Attacks Common Methods
  • 1.4.2.2 Internet Security Technology
  • 1.4.3 IPv6 IP Security Issues
  • 1.5 Different Aspects of Security of the Network
  • 1.6 Evolution of Security Protocols for Network
  • 1.6.1 Understanding the Key Components of Network Security
  • 1.6.2 A Deep Defense Strategy
  • 1.6.3 How Does the Next Generation Network Security System Work Best
  • 1.7 Network Security Protocols
  • 1.7.1 Application Layer
  • 1.7.1.1 Good Privacy (PGP)
  • 1.7.1.2 Email/Multipurpose Security (S/MIME)
  • 1.7.1.3 HTTP Secure (S-HTTP)
  • 1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer
  • 1.7.1.5 Secure E-Commerce (SET)
  • 1.7.1.6 Kerberos
  • 1.7.2 Transport Layer
  • 1.7.2.1 Secure Sockets Layer (SSL)
  • 1.7.2.2 Transport Layer Security (TLS)
  • 1.7.3 Network Layer
  • 1.7.3.1 Internet Protocol Security (IPSec)
  • 1.7.3.2 Virtual Private Network (VPN)
  • 1.7.4 Data Link Layer
  • 1.7.4.1 Point-to-Point Protocol (PPP)
  • 1.7.4.2 Remote Authentication User Service (RADIO)
  • 1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +)
  • 1.8 Current Evolution of Red Security
  • 1.8.1 Hardware Development
  • 1.8.2 Software Development
  • 1.9 Future Security Trends
  • References
  • Chapter 2 Evolution of Information Security Algorithms
  • 2.1 Introduction to Conventional Encryption
  • 2.2 Classical Encryption Techniques
  • 2.2.1 Substitution Based
  • 2.2.1.1 Caesar Cipher
  • 2.2.1.2 Monoalphabetic Cipher
  • 2.2.1.3 Playfair Cipher
  • 2.2.1.4 Polyalphabetic Cipher
  • 2.2.2 Transposition Based
  • 2.2.2.1 Simple Columnar
  • 2.2.2.2 Rail Fence Cipher
  • 2.3 Evolutions of Modern Security Techniques
  • 2.3.1 Stream Cipher Algorithms
  • 2.3.1.1 One Time Pad (OTP)
  • 2.3.1.2 RC-4
  • 2.3.1.3 A5/1
  • 2.3.2 Block Cipher Algorithms
  • 2.3.2.1 Feistel Cipher Structure
  • 2.3.2.2 Data Encryption Standard (DES)
  • 2.3.2.3 Triple Data Encryption Standard (TDES)
  • 2.3.2.4 International Data Encryption Algorithm (IDEA)
  • 2.3.2.5 Blowfish
  • 2.3.2.6 CAST-128
  • 2.4 Conclusion
  • References
  • Practice Set
  • Review Questions and Exercises
  • 3 Philosophy of Security by Cryptostakes Schemes
  • 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
  • 3.2 RSA Algorithm
  • 3.3 Security Analysis of RSA
  • 3.4 Exponentiation in Modular Arithmetic
  • 3.5 Distribution of Public Keys
  • 3.6 Distribution of Secret Keys Using Public Key Cryptosystems
  • 3.7 Discrete Logarithms
  • 3.8 Diffie-Hellman Key Exchange
  • 3.9 Review Exercise
  • References
  • Chapter 4 Zero-Share Key Management for Secure Communication Across a Channel
  • 4.1 Introduction
  • 4.2 Background
  • 4.3 Zero-Share Key Management System
  • 4.4 Simulation
  • 4.5 Complexity and Analysis
  • 4.6 Conclusion and Future Trends
  • References
  • Chapter 5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
  • 5.1 Introduction
  • 5.1.1 Soft Computing for Intrusion Detection
  • 5.1.2 False Positive
  • 5.1.3 Reasons of False Positive
  • 5.2 Existing Technology and Its Review
  • 5.3 Research Design
  • 5.3.1 Conceptual Framework
  • 5.3.2 Preprocessing Module
  • 5.3.3 Alert Monitoring Module
  • 5.4 Results With Implications
  • 5.4.1 Preprocessing Module Benchmark
  • 5.4.2 Alert Monitoring Module Benchmark
  • 5.4.3 Overall Benchmark
  • 5.4.4 Test Bed Network Benchmark
  • 5.5 Future Research and Conclusion
  • References
  • Chapter 6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
  • 6.1 Introduction
  • 6.2 Recursively Paired Arithmetic Technique (RPAT)
  • 6.2.1 An Example of RPAT
  • 6.2.2 Options of RPAT
  • 6.2.3 Session Key Generation
  • 6.3 Implementation and Simulation
  • 6.4 Cryptanalysis
  • 6.5 Simulation-Based Results
  • 6.6 Applications
  • 6.7 Conclusion
  • Acknowledgment
  • References
  • Chapter 7 Security Protocol for Multimedia Streaming
  • 7.1 Introduction
  • 7.1.1 Significance of Video Streaming
  • 7.2 Existing Technology and Its Review
  • 7.3 Methodology and Research Design
  • 7.4 Findings
  • 7.5 Future Research and Conclusion
  • References
  • Chapter 8 Nature Inspired Approach for Intrusion Detection Systems
  • 8.1 Introduction
  • 8.1.1 Types of Intrusion Detection Systems
  • 8.2 Approaches Used for Intrusion Detection Systems
  • 8.2.1 Intrusion Detection and Prevention Systems
  • 8.2.2 Performance Criteria of Intrusion Detection Systems
  • 8.3 Intrusion Detection Tools
  • 8.4 Use of Machine Learning to Build Dynamic IDS/IPS
  • 8.5 Bio-Inspired Approaches for IDS
  • 8.6 Conclusion
  • References
  • Chapter 9 The Socio-Behavioral Cipher Technique
  • 9.1 Introduction
  • 9.2 Existing Technology
  • 9.3 Methodology
  • 9.3.1 Key Arrangement
  • 9.3.2 Key Selection
  • 9.3.3 Mathematical Operations
  • 9.3.4 Algorithm
  • 9.3.5 Encryption Operation
  • 9.3.6 Decryption Operation
  • 9.3.7 Mathematical Modeling
  • 9.4 Conclusion: Future Scope and Limitations
  • References
  • Chapter 10 An Energy Efficient Scheme for Real-Time Transmissions Using Mobile Coordinated Wireless Sensor Network
  • 10.1 Introduction
  • 10.2 System Design
  • 10.3 Results and Discussion
  • Graphical Output
  • 10.4 Conclusion
  • References
  • Chapter 11 Intrusion Detection Strategies in Smart Grid
  • 11.1 Introduction
  • 11.2 Role of Smart Grid
  • 11.3 Technical Challenges Involved in Smart Grid
  • 11.4 Intrusion Detection System
  • 11.5 General Architecture of Intrusion Detection System
  • 11.6 Basic Terms in IDS
  • 11.7 Capabilities of IDS
  • 11.8 Benefits of Intrusion Detection Systems
  • 11.9 Types of IDS
  • 11.10 IDS in a Smart Grid Environment
  • 11.10.1 Smart Meter
  • 11.10.2 Metering Module
  • 11.10.3 Central Access Control
  • 11.10.4 Smart Data Collector
  • 11.10.5 Energy Distribution System
  • 11.10.6 SCADA Controller
  • 11.11 Security Issues of Cyber-Physical Smart Grid
  • 11.12 Protecting Smart Grid From Cyber Vulnerabilities
  • 11.13 Security Issues for Future Smart Grid
  • 11.14 Conclusion
  • References
  • Chapter 12 Security Protocol for CloudBased Communication
  • 12.1 Introduction
  • 12.2 Existing Technology and Its Review
  • 12.3 Methodology (To Overcome the Drawbacks of Existing Protocols)
  • 12.4 Findings: Policy Monitoring Techniques
  • 12.5 Future Research and Conclusion
  • Reference
  • Chapter 13 Security Protocols for Mobile Communications
  • 13.1 Introduction
  • 13.2 Evolution of Mobile Communications
  • 13.3 Global System for Mobiles (GSM)
  • 13.4 Universal Mobile Telecommunications System (UMTS)
  • 13.5 Long Term Evolution (LTE)
  • 13.6 5G Wireless Systems
  • 13.7 LoRA
  • 13.8 5G Integrated With LoRA
  • 13.9 Physical Layer Security and RFID Authentication
  • 13.10 Conclusion
  • References
  • Chapter 14 Use of Machine Learning in Design of Security Protocols
  • 14.1 Introduction
  • 14.2 Review of Related Literature
  • 14.3 Joint and Offensive Kinetic Execution Resolver
  • 14.3.1 Design of JOKER Protocol
  • 14.3.2 Procedure
  • 14.3.3 Procedure
  • 14.3.4 Simulation Details and Parameters
  • 14.3.4.1 Packet Delivering Ratio Calculation
  • 14.3.4.2 Packet Loss Ratio Calculation
  • 14.3.4.3 Latency (Delay) Calculation
  • 14.3.4.4 Throughput Calculation
  • 14.4 Results and Discussion
  • 14.5 Conclusion and Future Scope
  • References
  • Chapter 15 Privacy and Authentication on Security Protocol for Mobile Communications
  • 15.1 Introduction
  • 15.2 Mobile Communications
  • 15.3 Security Protocols
  • 15.4 Authentication
  • 15.5 Next Generation Networking
  • 15.6 Conclusion
  • References
  • Chapter 16 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing
  • 16.1 Introduction
  • 16.2 Need for Cloud Communication
  • 16.3 Application
  • 16.4 Cloud Communication Platform
  • 16.5 Security Measures Provided by the Cloud
  • 16.6 Achieving Security With Cloud Communications
  • 16.7 Cryptographic Protocols for Secure Cloud Computing
  • 16.8 Security Layer for the Transport Protocol
  • 16.9 Internet Protocol Security (IPSec)
  • 16.9.1 How IPsec Works
  • 16.10 Kerberos
  • 16.11 Wired Equivalent Privacy (WEP)
  • 16.11.1 Authentication
  • 16.12 WiFi Protected Access (WPA)
  • 16.13 Wi-Fi Protected Access II and the Most Current Security Protocols
  • 16.13.1 Wi-Fi Protected Access
  • 16.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages
  • 16.14 Wired Equivalent Privacy (WEP)
  • 16.15 Wi-Fi Protected Access (WPA)
  • 16.16 Conclusions
  • References
  • Index
  • EULA

1
History and Generations of Security Protocols


Bright Keswani1, Poonam Keswani2* and Rakhi Purohit3

1 Department of Computer Applications, Suresh Gyan Vihar University, Jaipur, India

2 Akashdeep PG College, Jaipur, India

3 Global Institute of Technology, Jaipur, India

Abstract

For personal computers, organizations and military users, network security has become more important. Due to the recent arrival of the internet in network, and security now a key issue, the safety record maybe availability as well all people understand very good requirements security technologies in communications. Knowing the attack method can generate enough security. Many companies testing protection auto using some techniques of the network internet through download programs firewalls and some mechanisms encryption in itself company origin it has a special internal network known as "Intranet" to maintain in contact internet access from outside also safe from any threatening state. All the security of the network is huge as well in stage specific development for evaluation. It is a theme that consists of date summary for the security that shows in internet assets security, as well development internet current techniques security. To understand the ongoing investigation, understand previous for the internet, and level his from weak points from attacks, and also methods attack different via network internet known, as well security technologies what they are very mission a lot they are need as well to be reviewed and analysis.

Keywords: Network security, security protocols, attacks collective, security techniques

1.1 Introduction


Due to advent of the Internet and ever changing network technologies, the world is increasingly interconnected day by day. There are many personal, commercial, military, and government information in the creation of infrastructure networks around the world. Network security has become very important because intellectual property can be easily accessible via the efficient use of Internet and related tools. Although there are various types of networks but two fundamentally different networks, i.e., data networks and synchronous networks consisting of switches. The Internet is seen as a data network. From its current data network, information can be obtained through special procedures by router-based computers such as planting in the router "Trojan Horse". Data is not stored by switches of a synchronous network; therefore it is not compromised by attackers. That is why security is emphasized in data networks such as the Internet, as well as in various aspects of the Internet connection proposed by other networks.

For clear understanding, this chapter is divided into the following Sections. Further, each section is discussed in brief.

  1. Network Security
  2. The History and Security of the Network
  3. Common Methods of Attack
  4. Network Security Technology
  5. Evolution of Network Security Protocols
  6. Network Security Protocol

1.2 Network Security


When thinking about network security, we should know that the network should be a secure place. The network security does not affect the security of the client computers at any of the point of the connection chain [2]. So, when transferring the data from the communications channel which does not be attacked, there will be a potential intruder can indicate to a specific communication channel, which access data and decrypt and also re-encrypt the message, which is falsified. The task of repairing a network is as important as obtaining a computer and encrypting a message.

The system and some network technologies are the key technologies for various applications in network. Network security is critical for the specific network and the applications of network [1]. Network security is a prerequisite for emerging networks; also it is easy to implement a very secure approach for networking.

At time of development of secure network, there are some of the factors considered accordingly, i.e., "Access", which provide authorized users with the methods to communicate with specific network; "Confidentiality", which ensures that information/data flow on the network will remains private; "Authentication", which makes sure that the users of the network are what they call people; "Integrity", which feature makes sure that the message is not modified during transmission, and "Do not repudiate", which makes sure that the user does not refute their use of the network [1].

The crimes committed by Kevin Mitnick have fueled the recent interest in security. Kevin Mitnick committed the greatest cybercrime in the history of the United States [3]. Losses of property and intellectual property of several companies amount to $80 million [3]. Since then, information security has become the focus of attention. The public network is called to provide personal as well as financial information. Security of such information must also evolve due to the development of information which is available online. Due to an attack Kevin Mitnick, The Company emphasizes the security of system. The Internet always works as main part behind data security.

Development of an effective security plan on the Internet require to address primarily to understand security issues, about the potential attackers, the level of security required, and about various factors that make the network insecure and vulnerable. Following are the steps to learn how to configure a secure network, the Internet, or other aspects during the search process.

In order to minimize the weaknesses from one device to another, many products are available which includes various tools for encryption of data and information, effective mechanisms for user authentication, intrusion detection and, security management. Companies around the world use a variety of these tools. The intranet connects and protects The Internet in a reasonable way. The same structure of the Internet may create weaknesses in the network. Internet security has greatly improved the development of new security mechanism and methods for networks including Internet as well as Intranet access.

It is also necessary to study the types of attacks online so that they can detect and prevent these attacks. Intrusion detection systems rely on the most common types of attacks.

Previous Internet protocols were not developed for assurance. In the TCP/IP communication stack, no security protocol is applied. This led to an attack on the Internet. Due to advancement in the Internet architecture information communications became more secure.

1.3 Historical Background of Network Security and Network Timeline


The Internet was first introduced in 1969, when the Department of Defense (ARPANET) conducted a network survey. Since the beginning of the year, ARPANET has been successful. The original design was intended easy access to remote computers so that scientists to share data and, it will become one of the most popular email for ARPANET to become a high-speed digital communication, which can be used to research various topics of interest and discuss. Collaboration in international network work is the first of many rules for entities that operate a growing network. He was the first president of INWG of Winton Joseph and became known as the "father of the Internet."

In the 1980s, TCP/IP was created by Bob Kent and Winton Joseph who were the main members of the TCP/IP team. TCP/IP is the general language for all computers to connect to the Internet. The loose network that makes the ARPANET known as today's "Internet". During 1980s, this kind of boom appeared in the computer industry. Combining low-cost desktops with powerful servers allows companies to communicate with their customers and business partners with the use of Internet.

In 1990, due to advent of World Wide Web [WWW] the Internet made accessible to everyone. Netscape Navigator and Microsoft Internet Explorer like search engines came into existence. Many important events have contributed to the development of computer security and networks. The timetable can be started in advance in 1930 to invent a Polish programmer's jigsaw machine in 1918 to convert simple information into cipher text. In 1930, the shocking mathematician Alan Turing broke the Enigma code. Make sure the connection is very important to the images of World War II. In 1960, it was launched by many students at the Massachusetts Institute of Technology (MIT) and the Department of Defense in the term "piracy", which is a popular electronic data and information exchange pipeline [3]. Telnet protocol was developed in 1970s. This led to the widespread use of data networks, initially limited to government contractors and academic researchers [3]. In the 1980s, online piracy and cybercrime began to emerge. After nine days of carnival, the authorities conducted an accidental search and penetrated into a highly confidential system. The 1986, Act of Fraud and Abuse was created, and computer crime Ian Murphy stole information from military computers. After graduation, Robert Morris was judged to launch more than 6,000 weak computers connected to the Internet. In the 1990s, the Internet became public and security issues increased dramatically. Today, about 950 million people worldwide use the Internet [3]. On any given day, there are approximately 225 important security violations [3]. These security...

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

173,99 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen