Academic literature on the topic 'Firewalls (Computer security) Computer networks Cryptography'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Firewalls (Computer security) Computer networks Cryptography.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Firewalls (Computer security) Computer networks Cryptography"

1

Prakash N Kalavadekar, Mr, and Dr Shirish S. Sane. "Effect of Mutation and Crossover Probabilities on Genetic Algorithm and Signature Based Intrusion Detection System." International Journal of Engineering & Technology 7, no. 4.19 (November 27, 2018): 1011. http://dx.doi.org/10.14419/ijet.v7i4.19.28277.

Full text
Abstract:
Conventional methods of intrusion prevention like firewalls, cryptography techniques or access management schemes, have not provided complete protection to computer systems and networks from refined malwares and attacks. Intrusion Detection Systems (IDS) are giving the right solution to the current issues and became an important part of any security management system to detect these threats and will not generate widespread harm. The basic goal of IDS is to detect attacks and their nature that may harm the computer system. Several different approaches for intrusion detection have been reported in the literature. The signature based concept using genetic algorithm as features selection and, J48 as classifier to detect attack is proposed in this paper. The system was evaluated on KDD Cup 99, NSL-KDD and Kyoto 2006+ datasets.
APA, Harvard, Vancouver, ISO, and other styles
2

Anas Aljarah, Ghaith Alomari,. "Efficiency of Using the Diffie-Hellman Key in Cryptography for Internet Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2039–44. http://dx.doi.org/10.17762/turcomat.v12i6.4807.

Full text
Abstract:
The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work we will make a encryption harder with enhanced public key encryption protocol for the security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations, and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows for the suitable security to appear. By means of the firewalls and encryption mechanisms many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web.
APA, Harvard, Vancouver, ISO, and other styles
3

Cheng, Haosu, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, and Jingdong Bian. "A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN." Security and Communication Networks 2018 (November 15, 2018): 1–20. http://dx.doi.org/10.1155/2018/8392080.

Full text
Abstract:
Software-defined networking (SDN) is a representative next generation network architecture, which allows network administrators to programmatically initialize, control, change, and manage network behavior dynamically via open interfaces. SDN is widely adopted in systems like 5G mobile networks and cyber-physical systems (CPS). However, SDN brings new security problems, e.g., controller hijacking, black-hole, and unauthorized data modification. Traditional firewall or IDS based solutions cannot fix these challenges. It is also undesirable to develop security mechanisms in such an ad hoc manner, which may cause security conflict during the deployment procedure. In this paper, we propose OSCO (Open Security-enhanced Compatible OpenFlow) platform, a unified, lightweight platform to enhance the security property and facilitate the security configuration and evaluation. The proposed platform supports highly configurable cryptographic algorithm modules, security protocols, flexible hardware extensions, and virtualized SDN networks. We prototyped our platform based on the Raspberry Pi Single Board Computer (SBC) hardware and presented a case study for switch port security enhancement. We systematically evaluated critical security modules, which include 4 hash functions, 8 stream/block ciphers, 4 public-key cryptosystems, and key exchange protocols. The experiment results show that our platform performs those security modules and SDN network functions with relatively low computational (extra 2.5% system overhead when performing AES-256 and SHA-256 functions) and networking performance overheads (73.7 Mb/s TCP and 81.2Mb/s UDP transmission speeds in 100Mb/s network settings).
APA, Harvard, Vancouver, ISO, and other styles
4

Menkus, Belden. "Firewalls in Information Systems Security." EDPACS 23, no. 3 (September 1995): 9–15. http://dx.doi.org/10.1080/07366989509451685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Castro, Julio César Hernández, and Pedro Isasi Viñuela. "Evolutionary Computation in computer security and cryptography." New Generation Computing 23, no. 3 (September 2005): 193–99. http://dx.doi.org/10.1007/bf03037654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Niemiec, M., and A. R. Pach. "Management of security in quantum cryptography." IEEE Communications Magazine 51, no. 8 (August 2013): 36–41. http://dx.doi.org/10.1109/mcom.2013.6576336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rahneva, Darina, Vanya Stoykova, Angelina Cherneva, and Krum Videnov. "VIRTUAL LABORATORY for NETWORK AND COMPUTER SECURITY." International Conference on Technics, Technologies and Education, no. 1 (2018): 315–22. http://dx.doi.org/10.15547/ictte.2018.08.003.

Full text
Abstract:
We live in the digital era and our daily lives are constantly connected with information and communication technologies. But this new world of digital information has inevitably raised the issue of data security, stored on electronic media or transmitted over the Networks. An important part in the field of computer and network security is cryptography and its study is an indispensable element in the preparation of all future specialists in the field of computer and communication technologies. The purpose of this report is to present a new way to conduct practical training in the field of Network and Computer Security using a Virtual Lab in which the basic cryptographic algorithms are presented using programming modules developed in language familiar to the students.
APA, Harvard, Vancouver, ISO, and other styles
8

Hussain, Iqtadar, Fawad Ahmed, Umar M. Khokhar, and Amir Anees. "Applied Cryptography and Noise Resistant Data Security." Security and Communication Networks 2018 (December 2, 2018): 1–2. http://dx.doi.org/10.1155/2018/3962821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zaz, Youssef, Lhoussain El Fadil, and Mohamed El Kayyali. "Securing EPR Data Using Cryptography and Image Watermarking." International Journal of Mobile Computing and Multimedia Communications 4, no. 2 (April 2012): 76–87. http://dx.doi.org/10.4018/jmcmc.2012040106.

Full text
Abstract:
This paper demonstrates new methodology to improve security and avoid data overlapping between patients records which are defined as Electronic Patient Records (EPR), a combination of digital watermarking techniques and cryptography are used to ensure the non-separation of EPR and medical images during communications within open networks. The EPR data is encrypted, by a symmetric key algorithm based on an Elliptic Curve Cryptosystem (ECC), and inserted in liberated zone of the Least Significant Bit plan (LSB) of the medical image by compressing the original one using the Huffman coding. The proposed method improves security issues and reduces the computation cost related to data encryption and decryption.
APA, Harvard, Vancouver, ISO, and other styles
10

Singh, Dilbag. "Establishing security of Bitcoins using elliptic-curve cryptography-based protocol." International Journal of Internet Technology and Secured Transactions 11, no. 3 (2021): 1. http://dx.doi.org/10.1504/ijitst.2021.10036589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Firewalls (Computer security) Computer networks Cryptography"

1

Savacool, Richard. "Firewall resistance to metaferography in network communications /." Online version of thesis, 2010. http://hdl.handle.net/1850/12272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Farley, Ryan Joseph. "Parallel firewall designs for high-speed networks /." Electronic thesis, 2005. http://etd.wfu.edu/theses/available/etd-12142005-194043/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Felker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FFelker.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Atkins, William Dee. "Design and implementation of a hardened distributed network endpoint security system for improving the security of internet protocol-based networks." Diss., Rolla, Mo. : University of Missouri-Rolla, 2007. http://scholarsmine.umr.edu/thesis/pdf/Final_Thesis_09007dcc8031d3b0.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Missouri--Rolla, 2007.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed April 11, 2007) Includes bibliographical references (p. 54-55).
APA, Harvard, Vancouver, ISO, and other styles
6

Asarcıklı, Şükran Tuğlular Tuğkan. "Firewall monitoring using intrusion detection systems/." [s.l.]: [s.n.], 2005. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000390.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Felker, Keith A. "Security and efficiency concerns with distributed collaborative networking environments." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/852.

Full text
Abstract:
Approved for public release, distribution unlimited
The progression of technology is continuous and the technology that drives interpersonal communication is not an exception. Recent technology advancements in the areas of multicast, firewalls, encryption techniques, and bandwidth availability have made the next level of interpersonal communication possible. This thesis answers why collaborative environments are important in today's online productivity. In doing so, it gives the reader a comprehensive background in distributed collaborative environments, answers how collaborative environments are employed in the Department of Defense and industry, details the effects network security has on multicast protocols, and compares collaborative solutions with a focus on security. The thesis ends by providing a recommendation for collaborative solutions to be utilized by NPS/DoD type networks. Efficient multicast collaboration, in the framework of security is a secondary focus of this research. As such, it takes security and firewall concerns into consideration while comparing and contrasting both multicast-based and non-multicast-based collaborative solutions.
APA, Harvard, Vancouver, ISO, and other styles
8

Tang, Wai-hung. "An anonymity scheme for file retrieval systems." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B40887972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Givens, Mark Allen. "Modeling and analyzing intrusion attempts to a computer network operating in a defense-in-depth posture." Thesis, View thesis View thesis via DTIC web site, 2004. http://handle.dtic.mil/100.2/ADA427180.

Full text
Abstract:
Thesis (M.S.)--Naval Postgraduate School, 2004.
Title from title screen (viewed Mar. 15, 2005). "September 2004." "ADA427180"--URL. Includes bibliographical references (p. 89-90). Also issued in paper format.
APA, Harvard, Vancouver, ISO, and other styles
10

Snyder, Walter C. "Evaluating the effectiveness of packet filter firewall applications in a "dual stack" Internet Protocol environment /." Online version of thesis, 2010. http://hdl.handle.net/1850/12263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Firewalls (Computer security) Computer networks Cryptography"

1

Network security firewalls & VPNs. Sudbury, MA: Jones & Bartlett Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stewart, James Michael. Network security firewalls & VPNs. Sudbury, MA: Jones & Bartlett Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cisco Pix firewalls. Berkeley, Calif: Osborne/McGraw-Hill, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pagan, Kevin. Intranet firewalls. Research Triangle Park, NC: Ventana, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

B, Oakes Edward, ed. Firewalls and VPNs: Principles and practices. Upper Saddle River, N.J: Pearson Prentice Hall, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vacca, John R. Firewalls clearly explained. 2nd ed. San Francisco, Calif: Morgan Kaufmann, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Deploying zone-based firewalls. Indianapolis, Ind: Cisco Press, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Preetham, V. V. Internet security and firewalls. Cincinnati, Ohio: Premier Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Strebe, Matthew. Firewalls 24 seven. San Francisco, CA: Sybex, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ronald, Sharp, ed. PCWeek Intranet and Internet firewalls strategies. Emeryville, Calif: Ziff-Davis Press, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Firewalls (Computer security) Computer networks Cryptography"

1

Verschuren, Jan. "Security of Computer Networks." In State of the Art in Applied Cryptography, 163–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/3-540-49248-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Siedlecka-Lamch, Olga, Miroslaw Kurkowski, and Jacek Piatkowski. "Probabilistic Model Checking of Security Protocols without Perfect Cryptography Assumption." In Computer Networks, 107–17. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39207-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Waleffe, Dominique, and Jean-Jacques Quisquater. "Better login protocols for computer networks." In Computer Security and Industrial Cryptography, 50–70. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57341-0_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Achenbach, Dirk, Jörn Müller-Quade, and Jochen Rill. "Synchronous Universally Composable Computer Networks." In Cryptography and Information Security in the Balkans, 95–111. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29172-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matted, Sushmita, Gori Shankar, and Bharat Bhushan Jain. "Enhanced Image Security Using Stenography and Cryptography." In Computer Networks and Inventive Communication Technologies, 1171–82. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pathak, Bageshree, Darshana Pondkule, Rasika Shaha, and Apurva Surve. "Visual Cryptography and Image Processing Based Approach for Bank Security Applications." In Second International Conference on Computer Networks and Communication Technologies, 292–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-37051-0_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yu, William Emmanuel, and Pierre Tagle. "Cryptography Enabled Security Guarantees for over the Top Networks Using GSM Short Messaging Service." In Recent Advances in Computer Science and Information Engineering, 647–57. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25769-8_91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hadi, Ali H., and Hussein Al-Bahadili. "A Hybrid Port-Knocking Technique for Host Authentication." In Simulation in Computer Network Design and Modeling, 336–57. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch016.

Full text
Abstract:
This chapter presents the detail description of a Port-Knocking (PK) technique, which should avert all types of port attacks and meets all other network security requirements. The new technique utilizes four well-known concepts, these are: PK, cryptography, steganography, and mutual authentication; therefore, it is referred to as the Hybrid Port-Knocking (HPK) technique. It is implemented as two separate modules. One is installed and run on the server computer, either behind the network firewall or on the firewall itself, and the other one is installed and run on the client computer. The first module is referred to as the HPK server, while the second is the HPK client. In terms of data processing, the technique consists of five main processes; these are: request packetization and transmission, traffic monitoring and capturing, mutual authentication, request extraction and execution, and port closing. The HPK technique demonstrates immunity against two vital attacks, namely, the TCP replay and Denial-of-Service (DoS) attacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Sinha, Keshav, Partha Paul, and Amritanjali. "Network Security Approaches in Distributed Environment." In Computational Intelligence in the Internet of Things, 174–209. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7955-7.ch008.

Full text
Abstract:
Distributed computing is one of the thrust areas in the field of computer science, but when we are concerned about security a question arises, “Can it be secure?” From this note, the authors start this chapter. In the distributed environment, when the system is connected to a network, and the operating system firewall is active, it will take care of all the authentication and access control requests. There are several traditional cryptographic approaches which implement authentication and access control. The encryption algorithms such as Rijndael, RSA, A3, and A5 is used for providing data secrecy. Some of the key distribution techniques have been discussed such as Diffie Hellman key exchange for symmetric key, and random key generation (LCG) technique is used in red-black tree traversal which provides the security of the digital contents. The chapter deals with the advanced versions of the network security techniques and cryptographic algorithms for the security of multimedia contents over the internet.
APA, Harvard, Vancouver, ISO, and other styles
10

Sinha, Keshav, Partha Paul, and Amritanjali. "Network Security Approaches in Distributed Environment." In Research Anthology on Artificial Intelligence Applications in Security, 1370–98. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-7705-9.ch061.

Full text
Abstract:
Distributed computing is one of the thrust areas in the field of computer science, but when we are concerned about security a question arises, “Can it be secure?” From this note, the authors start this chapter. In the distributed environment, when the system is connected to a network, and the operating system firewall is active, it will take care of all the authentication and access control requests. There are several traditional cryptographic approaches which implement authentication and access control. The encryption algorithms such as Rijndael, RSA, A3, and A5 is used for providing data secrecy. Some of the key distribution techniques have been discussed such as Diffie Hellman key exchange for symmetric key, and random key generation (LCG) technique is used in red-black tree traversal which provides the security of the digital contents. The chapter deals with the advanced versions of the network security techniques and cryptographic algorithms for the security of multimedia contents over the internet.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Firewalls (Computer security) Computer networks Cryptography"

1

Ali, Shaukat, Shah Khusro, and Azhar Rauf. "A cryptography-based approach to web mashup security." In 2011 International Conference on Computer Networks and Information Technology (ICCNIT). IEEE, 2011. http://dx.doi.org/10.1109/iccnit.2011.6020907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ahmed, Muhammad Hammad, Syed Wasi Alam, Nauman Qureshi, and Irum Baig. "Security for WSN based on elliptic curve cryptography." In 2011 International Conference on Computer Networks and Information Technology (ICCNIT). IEEE, 2011. http://dx.doi.org/10.1109/iccnit.2011.6020911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

El Hafez Bakr, Mohamed Abd, Mohamed Amr Mokhtar, and Ali El Sherbini Takieldeen. "Modified Elliptic Curve Cryptography in Wireless Sensor Networks Security." In 2018 28th International Conference on Computer Theory and Applications (ICCTA). IEEE, 2018. http://dx.doi.org/10.1109/iccta45985.2018.9499173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nawari, Mustafa, Hazim Ahmed, Aisha Hamid, and Mohamed Elkhidir. "FPGA based implementation of elliptic curve cryptography." In 2015 World Symposium on Computer Networks and Information Security (WSCNIS). IEEE, 2015. http://dx.doi.org/10.1109/wscnis.2015.7368282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Arokiaraj, A. Rex Macedo, and A. Shanmugam. "ACS: An efficient address based cryptography scheme for Mobile ad hoc networks security." In 2008 International Conference on Computer and Communication Engineering (ICCCE). IEEE, 2008. http://dx.doi.org/10.1109/iccce.2008.4580567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Xu, Dharmendra Sharma, Sio-Iong Ao, Hideki Katagir, Li Xu, and Alan Hoi-Shou Chan. "Elliptic Curve Cryptography with Security System in Wireless Sensor Networks." In IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES VOLUME 5: Special Edition of the International MultiConference of Engineers and Computer Scientists 2009. AIP, 2010. http://dx.doi.org/10.1063/1.3510575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Babu, Ch Ratna, M. Sridhar, and B. R. Babu. "Information hiding in gray scale images using pseudo-randomized visual cryptography algorithm for visual information security." In 2013 International Conference on Information Systems and Computer Networks (ISCON 2013). IEEE, 2013. http://dx.doi.org/10.1109/iciscon.2013.6524202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

De Oliveira Burger Monteiro Luiz, Eduardo, Alessandro Copetti, Luciano Bertini, and Juliano Fontoura Kazienko. "Intrusion Detection System for AES Encripted Low-Power IoT Networks." In Computer on the Beach. São José: Universidade do Vale do Itajaí, 2021. http://dx.doi.org/10.14210/cotb.v12.p392-399.

Full text
Abstract:
The introduction of the IPv6 protocol solved the problem of providingaddresses to network devices. With the emergence of the Internetof Things (IoT), there was also the need to develop a protocolthat would assist in connecting low-power devices. The 6LoWPANprotocols were created for this purpose. However, such protocolsinherited the vulnerabilities and threats related to Denial of Service(DoS) attacks from the IPv4 and IPv6 protocols. In this paper, weprepare a network environment for low-power IoT devices usingCOOJA simulator and Contiki operating system to analyze theenergy consumption of devices. Besides, we propose an IntrusionDetection System (IDS) associated with the AES symmetric encryptionalgorithm for the detection of reflection DoS attacks. Thesymmetric encryption has proven to be an appropriate methoddue to low implementation overhead, not incurring in large powerconsumption, and keeping a high level of system security. The maincontributions of this paper are: (i) implementation of a reflectionattack algorithm for IoT devices; (ii) implementation of an intrusiondetection system using AES encryption; (iii) comparison ofthe power consumption in three distinct scenarios: normal messageexchange, the occurrence of a reflection attack, and runningIDS algorithm. Finally, the results presented show that the IDSwith symmetric cryptography meets the security requirements andrespects the energy limits of low-power sensors.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography