To see the other types of publications on this topic, follow the link: Message authentication code (MAC).

Journal articles on the topic 'Message authentication code (MAC)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Message authentication code (MAC).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Michail, H. E., G. Selimis, M. Galanis, D. Schinianakis, and C. E. Goutis. "Novel Hardware Implementation of the Cipher Message Authentication Code." Journal of Computer Systems, Networks, and Communications 2008 (2008): 1–6. http://dx.doi.org/10.1155/2008/923079.

Full text
Abstract:
A new algorithm for producing message authenticating codes (MACs) was recently proposed by NIST. The MAC protects both a message's integrity—by ensuring that a different MAC will be produced if the message has changed—as well as its authenticity because only someone who knows the secret key could have generated a valid MAC. The proposed security scheme incorporates an FIPS approved and secure block cipher algorithm and was standardized by NIST in May, 2005. In this paper is presented the first efficient hardware implementation of the CMAC standard.
APA, Harvard, Vancouver, ISO, and other styles
2

Mousavi, Seyyed Mehdi, and Dr Mohammad Hossein Shakour. "Increasing Cryptographic Security Using Message Authentication Code (MAC)." International Journal of Engineering and Technology 11, no. 4 (August 31, 2019): 912–17. http://dx.doi.org/10.21817/ijet/2019/v11i4/191104073.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Echandouri, Bouchra, Fouzia Omary, Fatima Ezzahra Ziani, and Anas Sadak. "SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm." International Journal of Information Security and Privacy 12, no. 3 (July 2018): 16–26. http://dx.doi.org/10.4018/ijisp.2018070102.

Full text
Abstract:
This article describes how the simplicity of data transmission made eavesdropping by malicious people easier. This became one the flaws of computer security that needs to be handled. In order to establish a secure data communication, many data security techniques were developed to ensure privacy, integrity and authenticity. One of the techniques developed was to fulfill authentication with a message authentication code (MAC) that was defined by the National Institute of Standards and Technology. It is still a powerful data integrity and authentication tool that provides better protection than error detection codes or checksums. In this article, the authors propose a new cipher-based message authentication code (CMAC) algorithm. Their proposed algorithm, termed SEC-CMAC, is based on a previously developed symmetric evolutionist ciphering algorithm named symmetrical evolutionist ciphering (SEC). Compared to the well-known previously developed MAC, their suggested algorithm proved to be robust and fulfill some security requirement by resisting an exhaustive key search and mac forgery attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Ichwan, M., Milda Gustian, and Novan Rizky Nurjaman. "Implementasi Keyed-Hash Message Authentatication Code Pada Sistem Keamanan Rumah." MIND Journal 1, no. 1 (May 12, 2018): 9. http://dx.doi.org/10.26760/mindjournal.v1i1.9.

Full text
Abstract:
Keyed-Hash Message Authentication Code (HMAC) adalah algoritma untuk menghitung nilai MAC (Message Authentication Code) yang menggunakan Fungsi Hash dikombinasikan dengan sebuah kunci rahasia, Fungsi Hash yang digunakan dalam penelitian ini adalah Secure Ha sh Algorithm 256 (SHA256). Nilai MAC digunakan sebagai otentikasi untuk menjamin integritas data dan keaslian pesan. Algoritma ini di implementasikan pada sistem keamanan rumah, dimana pertukaran pesan antara user dan sistem keamanan di otentikasi dengan menggunakan HMAC. Keamanan algoritma HMAC ini dibuktikan dengan hasil pengujian Avalanche effect yang mencapai 87.5% pada fungsi Hash yang digunakan ,dan dibutuhkan waktu sampai 84 tahun untuk serangan Brute force berhasil pada kunci dengan panjang 8 karakter. Kata kunci: keyed-Hash Message Authentication Code, Hash function, Avalanche effect, Brute force attack
APA, Harvard, Vancouver, ISO, and other styles
5

Abdulla, Abdulla, and Yaseen Ismaeel. "Applying Message Authentication Code (MAC) in text chatting system." TANMIYAT AL-RAFIDAIN 30, no. 92 (December 1, 2008): 9–18. http://dx.doi.org/10.33899/tanra.2008.161723.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Noh, Jaewon, Sangil Jeon, and Sunghyun Cho. "Distributed Blockchain-Based Message Authentication Scheme for Connected Vehicles." Electronics 9, no. 1 (January 1, 2020): 74. http://dx.doi.org/10.3390/electronics9010074.

Full text
Abstract:
Vehicular ad-hoc networks (VANETs) have several security issues such as privacy preservation, secure authentication, and system reliability. In the VANET, a vehicle communicates with other vehicles or infrastructures using broadcasting messages. These messages contain not only normal traffic information, but also identification information of sender. In general, the identification information remains encrypted to ensure privacy. However, the conventional centralized system can decrypt the identification information using private information of the sender vehicle. As a result, the central server can often be targeted by adversaries. We propose a message authentication scheme for anonymity and decentralization of information using blockchain technology. Here, we introduce public-private key and message authentication code (MAC) for secure authentication. In this paper, we adopt consensus algorithms for composing blockchain system such as the proof of work (PoW) and Practical Byzantine Fault Tolerance (PBFT) into the proposed authentication process. Finally, we demonstrate that the proposed method is secure from the attacks which include impersonation from internal attacker as well as typical attacks.
APA, Harvard, Vancouver, ISO, and other styles
7

Hussain, S. M. Suhail, Shaik Mullapathi Farooq, and Taha Selim Ustun. "Analysis and Implementation of Message Authentication Code (MAC) Algorithms for GOOSE Message Security." IEEE Access 7 (2019): 80980–84. http://dx.doi.org/10.1109/access.2019.2923728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zivic, Natasa. "Principles of Soft Verification." International Journal of Distributed Systems and Technologies 4, no. 1 (January 2013): 1–15. http://dx.doi.org/10.4018/jdst.2013010101.

Full text
Abstract:
This paper considers messages protected with the Message Authentication Code (MAC) for the sake of authenticity. The standard forward error correcting channel code is assumed, which reduces the error rate, but no repeat mechanism exists to correct the remaining errors. The uncorrected errors cause the rejection of messages with a wrong MAC, as a successful MAC verification (“hard” verification) demands errorless message and errorless MAC. This paper introduces the extension of “hard” verification of MACs, whose result is “true” or “false”, to “soft” verification, that outputs additionally a trust level as verification result. This allows the acceptance of corrected messages and their MACs, even if a few bits of the MAC are different from the expected value. The costs are a loss of trust, as trust is defined for the successful standard or “hard” verification, i.e. for errorless message and its MAC. Therefore “Trust Output” is accompanied with the output of the verification process. A definition of “Trust Level” will be given, together with an algorithm of “soft” verification, which provides such Trust Output. This algorithm is based on a Soft Output channel decoder, which provides a reliability value for each bit, which is used as soft input for the proposed algorithm, “Soft Input Trust Output”. Simulation results show an essential improvement of the acceptance rate of MACs - at the cost of a reduced trust level. The reduction can be calculated and the maximum permitted reduction of the trust level can be preset.
APA, Harvard, Vancouver, ISO, and other styles
9

Muraharirao, Siva Charan, and Manik Lal Das. "Digital Image Protection using Keyed Hash Function." International Journal of Computer Vision and Image Processing 2, no. 2 (April 2012): 36–47. http://dx.doi.org/10.4018/ijcvip.2012040103.

Full text
Abstract:
Digital image authentication is an essential attribute for protecting digital image from piracy and copyright violator. Anti-piracy, digital watermarking, and ownership verification are some mechanisms evolving over the years for achieving digital image authentication. Cryptographic primitives, such as hash function, digital signature, and message authentication codes are being used in several applications including digital image authentication. Use of Least Significant Bit (LSB) is one of the classical approaches for digital image authentication. Although LSB approach is efficient, it does not provide adequate security services. On the other hand, digital signature-based image authentication provides better security, but with added computational cost in comparison with LSB approach. Furthermore, digital signature-based authentication approach requires managing public key infrastructure. Considering security weakness of LSB-based approach and cost overhead of public key based approach, the authors present a digital image authentication scheme using LSB and message authentication codes (MAC). The MAC-based approach for authenticating digital image is secure and efficient approach without public key management overhead. The authors also provide experimental results of the proposed scheme using MATLAB. The experimental results show that the proposed scheme is efficient and secure in comparisons with other schemes.
APA, Harvard, Vancouver, ISO, and other styles
10

Jabiullah, Md Ismail, AA Md Monzur Ul Akhir, and Muhammed Rasheduzzaman. "A Double-Key Based Encryption-Decryption Process for Stronger Secured Message Transactions." GUB Journal of Science and Engineering 6, no. 1 (October 13, 2020): 75–80. http://dx.doi.org/10.3329/gubjse.v6i1.52053.

Full text
Abstract:
A double-key based stronger secured electronic message transaction system has been designed and developed using Python programming language by performing encryption-decryption process. To do this, simple cryptographic encryption and decryption techniques are used with two keys avoiding vulnerabilities of a single key. First, the intended message is encrypted with the private key of sender (PRa) and the output is again encrypted with a shared secret key (K1) that generates ciphertext. The output ciphertext is again encrypted with another shared secret key (K2) that generates a code that serves as Message Authentication Code (MAC), which is concatenated with the ciphertext. And again encrypted them with shared secret key K1 that produced final ciphertext which is to be send to the intending recipient. The shared secret keys K1 and K2 are getting from the key distribution center (KDC). In the receiving end, receiver first decrypts the received information with the shared secret key K1 that gives the ciphertext and MAC of the ciphertext, and then decrypts only the MAC to generate a new ciphertext′and compare the new ciphertext′ with the received ciphertext that ensures the ciphertext authentication as well as message authentication; if ciphertexts are found same, then the ciphertext is decrypted with shared secret key K2 and again is decrypted with the sender’s public key (PUa) and retrieve the message; otherwise discarded. This proposed system ensures the stronger authenticated message transactions among the communicants. Finally, a comparative study with the existing systems has also been performed and measured stronger security. This technique can be applied for any secured electronic information transfer system with stronger security services. GUB JOURNAL OF SCIENCE AND ENGINEERING, Vol 6(1), Dec 2019 P 75-80
APA, Harvard, Vancouver, ISO, and other styles
11

Sodhi, Gurpreet Kour, Gurjot Singh Gaba, Lavish Kansal, Mohamed El Bakkali, and Faisel Em Tubbal. "Implementation of message authentication code using DNA-LCG key and a novel hash algorithm." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 1 (February 1, 2019): 352. http://dx.doi.org/10.11591/ijece.v9i1.pp352-358.

Full text
Abstract:
With the introduction of electronic form of data, the need for an automatic system of security to protect the integrity of data while being transferred from one place to another is required. This is especially the case for a network in which the systems are accessed over a public network or internet. Security mechanisms involve the use of more than one algorithm. They further require that the participants should possess a secret key, which raises issues about creation, distribution and proper usage of these keys. The most effective technique used in provisioning security is Message Authentication Code (MAC) which helps in preserving integrity. MAC involves the use of secret key along with a hash algorithm. In this paper, we present an implementation of MAC using a secret key created by Deoxyribonucleic Acid (DNA) and random output sequence of Linear Congruential Generator (LCG). The hash algorithm used is made more robust by adding complexity to the traditional SHA-160. The presented scheme RMAC (Robust Message Authentication Code) is tested on National Institute of Science and Technology (NIST) test suite for random numbers, avalanche criteria and resistance towards network attacks. The results reveal that the scheme is efficient and is applicable for a variety of security demanding environments.
APA, Harvard, Vancouver, ISO, and other styles
12

Farooq, Shaik Mullapathi, S. M. Suhail Hussain, and Taha Selim Ustun. "S-GoSV: Framework for Generating Secure IEC 61850 GOOSE and Sample Value Messages." Energies 12, no. 13 (July 1, 2019): 2536. http://dx.doi.org/10.3390/en12132536.

Full text
Abstract:
Standardized communication plays an important role in substation automation system (SAS). IEC 61850 is a de-facto standard in SAS. It facilitates smooth communication between different devices located in the substation by achieving interoperability. Generic Object-Oriented Substation Event (GOOSE) and Sample Value (SV) messages developed according to IEC 61850 enable efficient monitoring and operation control of SAS. IEC 61850 is very popular due to its flexible and robust modeling. As the number of critical infrastructures that employed IEC 61850 increases, it is important to study cybersecurity aspects as well. To this end, this paper develops a software framework, S-GoSV (Secure GOOSE and SV), that generates custom GOOSE and Sample Value messages. Furthermore, security features are added to protect them from different security attacks within a substation. IEC 62351-6 specifies digital signatures to achieve node authentication and messages integrity. Therefore, S-GoSV implements RSASSA-PKCS1-v1_5 digital signature algorithm based on RFC 2313. Performance studies show that digital signature algorithms based on RSA signing and verification take long times and do not conform to timing requirements stipulated by IEC 61850 for power system communication. To address this, Message Authentication Code (MAC) based digital signature algorithm, Keyed Hash-Message Authentication Code- Secure Hash Algorithm (HMAC-SHA256), is additionally implemented in S-GoSV framework for securing GOOSE messages.
APA, Harvard, Vancouver, ISO, and other styles
13

Balakrishna, R., R. Anandan, and A. Sajeev Ram. "Erroneous message discovery with data acquisition and secret communication in cellular networks." International Journal of Engineering & Technology 7, no. 2.31 (May 29, 2018): 186. http://dx.doi.org/10.14419/ijet.v7i2.31.13437.

Full text
Abstract:
Cellular networks are susceptible to different varieties of security barrages, inclusive of erroneous message inoculation, message falsification and monitoring. Sensitivity knots can be adjudicate by invaders and the adjudicate knots can misinterpret message integrity by inoculating erroneous message. Erroneous message can be inoculated by adjudicate sensitivity knots in different measures, Inclusive of data acquisition and broadcasting. In a System the erroneous message exposure methods contemplate the erroneous message inoculations during the message promoting only. In an (SEP) symmetric en-route purifying schemes facilitates broadcasting knots and central terminal will expose erroneous message with a assertive possibility. In an interlaced step-by-step validation pattern Sensitivity knots are not granted to execute the data acquisition during message promoting. The Capricious Cipher based En-route purifying scheme (CCEP) nips erroneous message en-route without balanced key distribution. Message confidentiality means message to be enciphered at the origin knot and deciphered at the terminal. However, message acquisition methods usually need any enciphered sensitivity message to be deciphered at data acquisition. The essential idea at the rear of the erroneous message exposure algorithm is to make team of sensitivity knots in which one team operates a message authentication code (MAC) of promoting message and the alternate team afterwards checks the message using the MAC. Data acquisition is equipped in cellular sensitivity network in order to remove message repetition, minimize message communication, and increase message efficiency.
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Ping, Tan Wang, Sitong Yan, Xiaoxu Yuan, and Zhiwen Liu. "Nursing Effect of Stellate Ganglion Block on Cerebral Infarction Based on Message Authentication Code Diameter Algorithm." Journal of Medical Imaging and Health Informatics 10, no. 2 (February 1, 2020): 410–15. http://dx.doi.org/10.1166/jmihi.2020.2880.

Full text
Abstract:
Objective: To investigate the influence of stellate ganglion block on the prognosis of patients with hypertensive intracerebral hemorrhage according to the inclusion criteria and whether the complications such as rebleeding and pulmonary infection are related to the occurrence of complications such as recurrent hemorrhage and pulmonary infection. The use of ganglion blockade in the clinical application of cerebrovascular disease and possible risks. Methods: A total of 138 patients with hypertensive intracerebral hemorrhage who were treated with different treatments in neurosurgery from March 2013 to December 2015 were included in the study. Among them, 67 patients in the treatment group (MAC diameter algorithm stellate ganglion block + conventional treatment) and 71 patients in the control group were collected. The medical records of the two groups were collected for retrospective analysis. Result: There was a difference in the prognosis between the two groups (P = 0.042). There was a difference in the prognosis between the early planetary ganglion block and the late planetary ganglion block in the treatment group (P = 0.043). There were no statistically significant differences between the two groups in the incidence of pulmonary infection (P = 0.194) and rebleeding (P = 0.856) during treatment. Conclusion: Stellate ganglion block is helpful for the prognosis of patients with hypertensive intracerebral hemorrhage. Based on MAC diameter algorithm, stellate ganglion block as a minimally invasive, simple, safe and easy-to-use minimally invasive treatment method has certain curative effect on patients with hypertensive cerebral hemorrhage, especially in early application, which is worthy of clinical promotion.
APA, Harvard, Vancouver, ISO, and other styles
15

Sepúlveda, Johanna, Felix Wilgerodt, and Michael Pehl. "Towards memory integrity and authenticity of multi-processors system-on-chip using physical unclonable functions." it - Information Technology 61, no. 1 (February 25, 2019): 29–43. http://dx.doi.org/10.1515/itit-2018-0030.

Full text
Abstract:
Abstract A persistent problem for modern Multi-Processors System-on-Chip (MPSoCs) is their vulnerability to code injection attacks. By tampering the memory content, attackers are able to extract secrets from the MPSoC and to modify or deny the MPSoC’s operation. This work proposes SEPUFSoC (Secure PUF-based SoC), a novel flexible, secure, and fast architecture able to be integrated into any MPSoC. SEPUFSoC prevents execution of unauthorized code as well as data manipulation by ensuring memory integrity and authentication. SEPUFSoC achieves: i) efficiency, through the integration of a fast and lightweight hash function for Message Authentication Code (MAC) generation and integrity verification of the memory lines at runtime; and ii) lightweight security, through the use of a Physical Unclonable Function (PUF) to securely generate and store the cryptographic keys that are used for the application authentication. We discuss the security and performance of SEPUFSoC for single core and multi-core systems. Results show that the SEPUFSoC is a secure, fast, and low overhead solution for MPSoCs. We discuss the SEPUFSoC security and cost, which strongly depends on the PUF and hash selection. In the future, new technologies may allow the exploration of different PUFs.
APA, Harvard, Vancouver, ISO, and other styles
16

Isa, Mohd Anuar Mat, Miza Mumtaz Ahmad, Nor Fazlida Mohd Sani, Habibah Hashim, and Ramlan Mahmod. "Cryptographic Key Exchange Protocol with Message Authentication Codes (MAC) Using Finite State Machine." Procedia Computer Science 42 (2014): 263–70. http://dx.doi.org/10.1016/j.procs.2014.11.061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Hakeem, Shimaa A. Abdel, Mohamed A. Abd El-Gawad, and HyungWon Kim. "Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography." Sensors 20, no. 19 (October 8, 2020): 5719. http://dx.doi.org/10.3390/s20195719.

Full text
Abstract:
Vehicle-to-everything (V2X) is the communication technology designed to support road safety for drivers and autonomous driving. The light-weight security solution is crucial to meet the real-time needs of on-board V2X applications. However, most of the recently proposed V2X security protocols—based on the Elliptic Curve Digital Signature Algorithm (ECDSA)—are not efficient enough to support fast processing and reduce the communication overhead between vehicles. ECDSA provides a high-security level at the cost of excessive communication and computation overhead, which motivates us to propose a light-weight message authentication and privacy preservation protocol for V2X communications. The proposed protocol achieves highly secure message authentication at a substantially lower cost by introducing a hash chain of secret keys for a Message Authentication Code (MAC). We implemented the proposed protocol using commercial V2X devices to prove its performance advantages over the standard and non-standard protocols. We constructed real V2X networks using commercial V2X devices that run our implemented protocol. Our extensive experiments with real networks demonstrate that the proposed protocol reduces the communication overhead by 6 times and computation overhead by more than 100 times compared with the IEEE1609.2 standard. Moreover, the proposed protocol reduces the communication overhead by 4 times and the computation overhead by up to 100 times compared with a non-standard security protocol, TESLA. The proposed protocol substantially reduces the average end-to-end delay to 2.5 ms, which is a 24- and 28-fold reduction, respectively, compared with the IEEE1609 and TESLA protocols.
APA, Harvard, Vancouver, ISO, and other styles
18

Xiao, Di, Qingqing Fu, Tao Xiang, and Yushu Zhang. "Chaotic Image Encryption of Regions of Interest." International Journal of Bifurcation and Chaos 26, no. 11 (October 2016): 1650193. http://dx.doi.org/10.1142/s0218127416501935.

Full text
Abstract:
Since different regions of an image have different importance, therefore only the important information of the image regions, which the users are really interested in, needs to be encrypted and protected emphatically in some special multimedia applications. However, the regions of interest (ROI) are always some irregular parts, such as the face and the eyes. Assuming the bulk data in transmission without being damaged, we propose a chaotic image encryption algorithm for ROI. ROI with irregular shapes are chosen and detected arbitrarily. Then the chaos-based image encryption algorithm with scrambling, S-box and diffusion parts is used to encrypt the ROI. Further, the whole image is compressed with Huffman coding. At last, a message authentication code (MAC) of the compressed image is generated based on chaotic maps. The simulation results show that the encryption algorithm has a good security level and can resist various attacks. Moreover, the compression method improves the storage and transmission efficiency to some extent, and the MAC ensures the integrity of the transmission data.
APA, Harvard, Vancouver, ISO, and other styles
19

Houmer, Meriem, Mariya Ouaissa, Mariyam Ouaissa, and Moulay Lahcen Hasnaoui. "SE-GPSR: Secured and Enhanced Greedy Perimeter Stateless Routing Protocol for Vehicular Ad hoc Networks." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 13 (August 14, 2020): 48. http://dx.doi.org/10.3991/ijim.v14i13.14537.

Full text
Abstract:
In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency. Nevertheless, due to its special characteristics like high mobility, large size of the network and dynamic topology make routing of data in the vehicular ad hoc network more challenging. The problem in these networks is to determine the routing protocol best suited to this environment, and then secure it to provide optimal and secure routing for the data. Recently, position-based routing protocol has been developed by researchers to be a very interesting routing technique for communication between vehicles. In this paper, we propose an secured and enhanced version of the Greedy Perimeter Stateless Routing (GPSR) protocol. This protocol consists of two modules: (i) To implement an improvement of GPSR routing protocol which minimizes transfer delays and control messages. (ii) To deal with security issues, we have proposed a solution that combines between an improved Diffie-Hellman algorithm for reliable key exchange and the hash function based Message Authentication Code (MAC) for the verification of the authentication and integrity of GPSR packet. The proposed solution was checked by the security protocol verification tool, Automated Validation of Internet Security Protocols and Applications (AVISPA), which indicated that it is a very secure level. Simulation results showed that our proposed compared to the original GPSR offers better performances.
APA, Harvard, Vancouver, ISO, and other styles
20

Iqbal, Amjad, and M. Tariq Iqbal. "Low-Cost and Secure Communication System for SCADA System of Remote Microgrids." Journal of Electrical and Computer Engineering 2019 (May 23, 2019): 1–12. http://dx.doi.org/10.1155/2019/1986325.

Full text
Abstract:
Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. This research has been carried out to address this issue along with the additional features such as data uploading to a server through a gateway, local data logging, and alerting the concerned crew in case of any fault to minimize the outage time. This paper presents the design of a communication system for the SCADA system of microgrid. ESP32 with LoRa has been used for communication between two nodes or a node and central SCADA unit. Communication security has been achieved by implementing AES cryptography. Data authenticity has been achieved by introducing a unique message authentication code (MAC) for each message. A mesh-like network has been implemented to improve the LoRa range. ESP32 and dragino-uno based LoRa gateways have been tried for uploading the data to the server, and local data storage has been achieved using an SD card. The main controller working as the SCADA unit has the feature of sending emails. Detailed system design and test results are presented in this paper.
APA, Harvard, Vancouver, ISO, and other styles
21

Nath Mishra, Kamta. "A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment." International Journal of Computer Network and Information Security 12, no. 6 (December 8, 2020): 57–77. http://dx.doi.org/10.5815/ijcnis.2020.06.05.

Full text
Abstract:
In the existing epoch, the cloud-IoT integrated distributive computing is earning very high attractiveness because of its immense characteristics which can be divided into two categories namely essential and common characteristics. The essential characteristics of cloud-IoT computing are demand dependent like broad network access, self-service, resource pooling, and speedy elastic nature. The common characteristics of cloud-IoT computing are homogeneity, massive scale, virtualization, resilient computing, low cost software availability, service orientation, geographic independent computation, and advanced safety availability. The cloud-IoT dependent internetworked distributive computation is internet based computation environment in which infrastructure, application software, and various similar / dissimilar platforms are accessible in the cloud and the end users (businessman, developers) have the right to use it as the client. Cloud is a step from Utility Computing and several industries / companies are frequently using cloud based systems in their day-to-day work. Therefore, safety issues and challenges of cloud computing cannot be avoided in the current era. Hence, the researchers must develop high order authentication protocols for preventing the safety threats of cloud based data communication systems.. The proposed CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) based management of cloud-IoT integrated information is a two phase authenticated encoding (AE) mechanism. The first phase is worn for executing privacy computations, and the second phase is used for computing validation and truthfulness. Here, both the cycles use same encoding technique. It is well known to us that the CCM/CCMP is an amalgamation of two forms namely AES counter form and CBC- MAC (cipher-block-chain message authentication code) protocol form. The counter form is worn to carry out encoding which guarantees data privacy whereas CBCMAC is worn to attain data legitimacy and reliability. In this investigation work the author has investigated and critically analyzed the CCMP dependent safe Cloud-IoT integrated distributive mechanism for data / information management. The proposed approach further improves the overall security and performance of cloud-IoT integrated computing networks. Further, the author has solved the challenges of cloud-IoT computing by studying and analyzing major cloud-IoT computing safety concerns, and safety threats which are expected in future generation cloud computing systems. In this paper, the author has proposed CCMP & CBC-HMAC (Cipher-Block-Chain key Hash-MessageAuthentication-Code) encoding protocol can be efficiently used for providing information safety and preventing various attacks when the data is being transferred between the Cloud and a local network. The prevention mechanism for unauthorized access of data within the cloud is also presented whose performance is highly satisfactory. A secure and flexible framework to support self-organize and self register of consumer’s information in to the cloud network is designed and tested. The testing results of proposed analysis provides us very clear evidences that the PRF of CCMP is a superior and secure in contrast to that of CBC-HMAC.
APA, Harvard, Vancouver, ISO, and other styles
22

Del Prete, Giuseppe, Daniele Gallo, Carmine Landi, and Mario Luiso. "Real-time smart meters network for energy management." ACTA IMEKO 2, no. 1 (August 16, 2013): 40. http://dx.doi.org/10.21014/acta_imeko.v2i1.51.

Full text
Abstract:
In this paper, an architecture of a low-cost ARM-based Smart Metering network is presented. The system is designed to be suitable for Smart Grids applications aimed to a more efficient energy use according to the article 13 of Directive 2006/32/EC. The network is composed by several slave smart meters that continuously monitor loads and energy generators to make available information in real-time such as power and energy consumption/generation and several power quality parameters communicating them via CAN bus to specific master device called data aggregator. This device, integrating the information coming from field devices (energy demands of loads, the current energy production and co-generator status), with information obtained through the web access (a prevision on the expected availability of energy produced by renewable sources, current and future energy price, customer remote setting), can take decisions to implement a suitable energy management aimed to cost saving or whatever else strategy chosen by customer. Data aggregator also allows checking current consumption locally, thanks to a display, and remotely, using the web browser access. To prevent external attacks a low computational burden protection software based on Message Authentication Code (MAC) has been implemented. Finally, characterization test of realized apparatus have shown good performance both in terms of communication delays and measurement uncertainty.
APA, Harvard, Vancouver, ISO, and other styles
23

Liu, Zhuo, Yong Wang, Leo Yu Zhang, and Jun Ma. "A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model." Security and Communication Networks 2021 (April 9, 2021): 1–21. http://dx.doi.org/10.1155/2021/6625579.

Full text
Abstract:
The digital image, as the critical component of information transmission and storage, has been widely used in the fields of big data, cloud and frog computing, Internet of things, and so on. Due to large amounts of private information in the digital image, the image protection is fairly essential, and the designing of the encryption image scheme has become a hot issue in recent years. In this paper, to resolve the shortcoming that the probability density distribution (PDD) of the chaotic sequences generated in the original two-dimensional coupled map lattice (2D CML) model is uneven, we firstly proposed an improved 2D CML model according to adding the offsets for each node after every iteration of the original model, which possesses much better chaotic performance than the original one, and also its chaotic sequences become uniform. Based on the improved 2D CML model, we designed a compressive image encryption scheme. Under the condition of different keys, the uniform chaotic sequences generated by the improved 2D CML model are utilized for compressing, confusing, and diffusing, respectively. Meanwhile, the message authentication code (MAC) is employed for guaranteeing that the encryption image be integration. Finally, theoretical analysis and simulation tests both demonstrate that the proposed image encryption scheme owns outstanding statistical, well encryption performance, and high security. It has great potential for ensuring the digital image security in application.
APA, Harvard, Vancouver, ISO, and other styles
24

Et. al., Ch Chakradhara Rao,. "Enhanced Effective and Privacy Preserving Multi Keyword Search over Encrypted Data in Cloud Storage Using Blowfish Algorithm." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 11, 2021): 2845–53. http://dx.doi.org/10.17762/turcomat.v12i2.2316.

Full text
Abstract:
The data owner administers their data to the public cloud due to regulatory. Even this data encoded once it easily transmitted to the cloud. In order to ensure the privacy and security, cloud subscribers need a very different type of online data. This specific information must be germane to the recipient's query. The user to inspect the query too in the cloud with umpteen keywords can accomplish this. With the intention to defend the privacy of data, confidential data encoded before subcontracting by the metadata owner, attempting to make the traditional and efficient plaintext keyword search tactic pointless. Therefore, it is crucial to explore a secure data search service for encrypted user data. Due to the growing of massive number of digital users and legal documents in the cloud, umpteen keywords forced in the search request and documents returned in the order of their relevance to these keywords.Cloud assistance end-user demands cloud information by various paternoster inquiry, whichlabelled as umpteenkeywordstratified exploration over scrambled information. In the cloud server, all the client inquiries exchanged. Server looks through the significant matter by utilizing the harmonic equivalency and sends the applicable outcomes to the client. Information got from cloud server is in the scrambled configuration. To get to control to the client,Information proprietor furnishes with key for unscrambling of information. Message Authentication Code(MAC) calculation is utilized to check and confirm trustworthiness of information. Thusly this paper depicts the method of giving security to redistribute information on cloud and checking the trustworthiness of information using blowfish algorithm. Comparison results shows the improvement in efficiency of Data Retrieval and Time efficiency.
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Changsheng. "QR Code Authentication with Embedded Message Authentication Code." Mobile Networks and Applications 22, no. 3 (November 17, 2016): 383–94. http://dx.doi.org/10.1007/s11036-016-0772-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

WANG, Da-Yin. "A Parallelizable Message Authentication Code." Journal of Software 18, no. 7 (2007): 1756. http://dx.doi.org/10.1360/jos181756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Jung, ChangHun, DongOh Shin, RhongHo Jang, DaeHun Nyang, KyungHee Lee, and Heung-Youl Youm. "Digital Legal Seal for Message Authentication Code." Journal of the Korea Institute of Information Security and Cryptology 26, no. 2 (April 30, 2016): 345–58. http://dx.doi.org/10.13089/jkiisc.2016.26.2.345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Son, Young-ho, Jin-keun Hong, and Keun-sung Bae. "Authentication masking code against DoS of T-MAC protocol." Journal of Central South University 20, no. 7 (July 2013): 1889–95. http://dx.doi.org/10.1007/s11771-013-1687-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Ce, Xiao Hui Jiang, Yong Hu, and Jiu Wu Guo. "Software Status Identification Based on Message Authentication Technology." Applied Mechanics and Materials 519-520 (February 2014): 343–49. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.343.

Full text
Abstract:
The software status identification with a message authentication code generated by means of the hash function method that falls within the message authentication technology is discussed in this document. In comparison with the software status management with a software version number that is used widely at present, the message authentication code is highly correlated with the software content to prevent failure of the software status management due to artificial negligence and provide an effective technique for software status management.
APA, Harvard, Vancouver, ISO, and other styles
30

Fahmy, Alaa. "NEW MESSAGE AUTHENTICATION CODE USLNG UNIMODAL CHAOTIC MAPPING." International Conference on Electrical Engineering 1, no. 1 (March 1, 1998): 456–62. http://dx.doi.org/10.21608/iceeng.1998.61102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kumar, Manish, Ashish Avasthi, and Gaurav Gaurav. "Advancing the Cryptographic Hash-Based Message Authentication Code." International Journal of Engineering and Technology 3, no. 3 (2011): 269–73. http://dx.doi.org/10.7763/ijet.2011.v3.236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Yeh, Yi-Shiung, Chu-Hsing Lin, and Wei-Shen Lai. "Construct message authentication code with SHA and AEA." Journal of Discrete Mathematical Sciences and Cryptography 5, no. 1 (April 2002): 77–83. http://dx.doi.org/10.1080/09720529.2002.10697940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Xiuli. "A New Construction of Multisender Authentication Codes from Polynomials over Finite Fields." Journal of Applied Mathematics 2013 (2013): 1–7. http://dx.doi.org/10.1155/2013/320392.

Full text
Abstract:
Multisender authentication codes allow a group of senders to construct an authenticated message for a receiver such that the receiver can verify the authenticity of the received message. In this paper, we construct one multisender authentication code from polynomials over finite fields. Some parameters and the probabilities of deceptions of this code are also computed.
APA, Harvard, Vancouver, ISO, and other styles
34

Wang, Xiuli. "A New Construction of Multisender Authentication Codes from Pseudosymplectic Geometry over Finite Fields." Journal of Applied Mathematics 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/602539.

Full text
Abstract:
Multisender authentication codes allow a group of senders to construct an authenticated message for one receiver such that the receiver can verify authenticity of the received message. In this paper, we construct one multisender authentication code from pseudosymplectic geometry over finite fields. The parameters and the probabilities of deceptions of this code are also computed.
APA, Harvard, Vancouver, ISO, and other styles
35

RKulkarni, V., Saneet Kalmani, and Shashank Vernekar. "Secured Hash2 based Message Authentication Code using GUI Controls." International Journal of Computer Applications 76, no. 8 (August 23, 2013): 33–37. http://dx.doi.org/10.5120/13269-0772.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Alimpia, Jerone B. "An Enhanced Hash-based Message Authentication Code using BCrypt." International Journal for Research in Applied Science and Engineering Technology 6, no. 4 (April 30, 2018): 1429–32. http://dx.doi.org/10.22214/ijraset.2018.4240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Mousavi, Seyyed Mehdi, and Dr Mohammad Hossein Shakour. "Increasing Cryptography Security using Hash-based Message Authentication Code." International Journal of Engineering and Technology 11, no. 4 (August 31, 2019): 1046–56. http://dx.doi.org/10.21817/ijet/2019/v11i4/191104086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

kumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (November 5, 2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.

Full text
Abstract:
In wireless sensor networks(WSN) ,authentication of messages is the highly important function in preventing threats from un wanted , un authorized and corrupt messages from being sent. There are various message verification and authentication methods have been proposed as well as developed based on cryptography technology such as symmetric key cryptographic systems or public-key cryptographic systems. Also there are many different techniques available based on polynomial-based schemes, elliptic curve cryptography (ECC) and so on. All the above said methods have its own merits and demerits. In this research work a new method of authenticating the message by its IP and MAC address (together encrypting) and analysing the encrypted message to find the authenticity of the message and the node which has sent the message at collecting node will be carried out.
APA, Harvard, Vancouver, ISO, and other styles
39

Xie, Man De. "Secure Image Management Based on Deluge Protocol in Wireless Sensor Networks." Applied Mechanics and Materials 29-32 (August 2010): 2608–13. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2608.

Full text
Abstract:
In present, almost all of inline code dissemination algorithms focus on securing the propagation of code images and overlook the security vulnerabilities in the image management aspects of code dissemination, such as rebooting and erasing code images. In this paper, we first investigate the security issues in remote image management for code dissemination in wireless sensor networks and analyze the advantage and disadvantage of the algorithm proposed by Liu et al which employs three different key chains to design three different schemes. To reduce the computation load of authentication operation, a message cipher puzzle-based image management algorithm is proposed. In this approach, a one-way hash key chain is introduced to authenticate the Reboot and Erase command and a weak authentication mechanism is introduced to protect the version number. The message cipher puzzle-based authentication method is efficient, because it only introduces a few hash function operations and comparisons
APA, Harvard, Vancouver, ISO, and other styles
40

Yang, B., R. Karri, and D. A. Mcgrew. "A High-Speed Hardware Architecture for Universal Message Authentication Code." IEEE Journal on Selected Areas in Communications 24, no. 10 (October 2006): 1831–39. http://dx.doi.org/10.1109/jsac.2006.877133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Hirose, Shoichi, and Junji Shikata. "Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing." IEEE Access 8 (2020): 216116–26. http://dx.doi.org/10.1109/access.2020.3041638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Fahmy, Alaa. "A New Generation of Message Authentication Code Using Symbolic Dynamics." International Conference on Aerospace Sciences and Aviation Technology 8, ASAT CONFERENCE (May 1, 1999): 1–7. http://dx.doi.org/10.21608/asat.1999.25149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bellare, Mihir, Joe Kilian, and Phillip Rogaway. "The Security of the Cipher Block Chaining Message Authentication Code." Journal of Computer and System Sciences 61, no. 3 (December 2000): 362–99. http://dx.doi.org/10.1006/jcss.1999.1694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Cheng, Chun Ling, Ya Shi Wang, Chun Ju Sun, Zhi Hua Zhang, and Jiang Ning Wang. "Ultra-Lightweight Authentication Protocol Based on Distribution Terminal Fingerprint." Advanced Materials Research 616-618 (December 2012): 2142–48. http://dx.doi.org/10.4028/www.scientific.net/amr.616-618.2142.

Full text
Abstract:
With the development of information technology in power industry, information security of the distribution automation system is facing increasing challenge. To meet the device authentication demand and the limited resources in power distribution terminal, the concept of distribution terminal fingerprint is presented according to the physical and behavioral features in terminal. And then, an ultra-lightweight mutual authentication protocol based on the message authentication code algorithm is proposed. The message authentication code of the messages sent by both communication parties is calculated with the distribution terminal fingerprint as the key to achieve mutual authentication of the terminal and the master station without any cryptosystems. Finally, security and performance analysis is given. The results show that the proposed protocol can provide mutual authentication of the communicating parties, resist several attacks with small amount of calculation and simple protocol. Therefore, it can meet the resource requirements of the distribution terminal.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhan, Xu, Yue Rong Lei, Ling Yan Du, Hui Ming Zeng, and Jian Ling Chen. "A Grayscale Image Fragile Watermark Authentication System in Spatial-Domain." Applied Mechanics and Materials 380-384 (August 2013): 2920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2920.

Full text
Abstract:
This study deals with devising and implementing a novel technique for image authentication and secured message transmission based on hiding large volume of data into gray scale images. A grayscale image fragile watermark authentication system in spatial-domain is proposed. First it preprocesses the watermark image and resizes it to a quarter of the size of the original image. Then, it generates a random key matrix K and 128bit message authentication code from the original image. It replaces the 128bit message authentication code for the former 128bit of K to obtain a new key matrix KH. Then, it calculates the embedded position P=KHi xor (b7,b6,b5.b4) i MOD 3. b7,b6,b5,b4 are the high 4 bits of the original images pixel. It embeds the watermark image according to P value to the lower 4 bits of the original images pixel. The system is made in experiment. The result shows the system has good imperceptibility.
APA, Harvard, Vancouver, ISO, and other styles
46

K. Sodhi, Gurpreet, Gurjot S. Gaba, Lavish Kansal, Eduard Babulak, Mohammed AlZain, Sandeep Kumar Arora, and Mehedi Masud. "Preserving Authenticity and Integrity of Distributed Networks through Novel Message Authentication Code." Indonesian Journal of Electrical Engineering and Computer Science 12, no. 3 (December 1, 2018): 1297. http://dx.doi.org/10.11591/ijeecs.v12.i3.pp1297-1304.

Full text
Abstract:
<p>In this era of universal electronic connectivity, communication is no more confined to transfer of data from one end to the other; rather it aims at secure data transfer. Communication sector has developed beyond this traditional boundary of data transfer and is now working on ways to provide data from the intended senders to the intended receivers in an unaltered form. Considering all these conditions, the data transfer needs to follow the principles of authentication, confidentiality and integrity. The former two have been addressed using digital signatures and encryption schemes respectively, while the solution to the later is the use of Message Authentication Code. This paper presents a Message Authentication Code scheme, which uses the biological characteristics represented by Deoxyribonucleic acid combined with the output of Blum Blum Shub Random Number Generator, as a secret key along with a novel hash algorithm. This Message Authentication Code structure is evaluated on the basis of National Institute of Science and Technology test suite for random numbers, avalanche criteria and network attacks. The results reveal that the proposed scheme performs well under all the criteria and thus is capable of preserving integrity; this increases its applicability in any data sensitive environment<em>.</em></p>
APA, Harvard, Vancouver, ISO, and other styles
47

Akhter, A. F. M. Suaib, Mohiuddin Ahmed, A. F. M. Shahen Shah, Adnan Anwar, and Ahmet Zengin. "A Secured Privacy-Preserving Multi-Level Blockchain Framework for Cluster Based VANET." Sustainability 13, no. 1 (January 4, 2021): 400. http://dx.doi.org/10.3390/su13010400.

Full text
Abstract:
Existing research shows that Cluster-based Medium Access Control (CB-MAC) protocols perform well in controlling and managing Vehicular Ad hoc Network (VANET), but requires ensuring improved security and privacy preserving authentication mechanism. To this end, we propose a multi-level blockchain-based privacy-preserving authentication protocol. The paper thoroughly explains the formation of the authentication centers, vehicles registration, and key generation processes. In the proposed architecture, a global authentication center (GAC) is responsible for storing all vehicle information, while Local Authentication Center (LAC) maintains a blockchain to enable quick handover between internal clusters of vehicle. We also propose a modified control packet format of IEEE 802.11 standards to remove the shortcomings of the traditional MAC protocols. Moreover, cluster formation, membership and cluster-head selection, and merging and leaving processes are implemented while considering the safety and non-safety message transmission to increase the performance. All blockchain communication is performed using high speed 5G internet while encrypted information is transmitted while using the RSA-1024 digital signature algorithm for improved security, integrity, and confidentiality. Our proof-of-concept implements the authentication schema while considering multiple virtual machines. With detailed experiments, we show that the proposed method is more efficient in terms of time and storage when compared to the existing methods. Besides, numerical analysis shows that the proposed transmission protocols outperform traditional MAC and benchmark methods in terms of throughput, delay, and packet dropping rate.
APA, Harvard, Vancouver, ISO, and other styles
48

Al-Alak, Saif, Zuriati Zukranian, Azizol Abdullah, and Shamala Subramiam. "Authentication Time of IEEE 802.15.4 with Multiple-key Protocol Using Distributed Message Authentication Code Algorithm." Research Journal of Information Technology 4, no. 4 (April 1, 2012): 140–54. http://dx.doi.org/10.3923/rjit.2012.140.154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kim, Minwoo, and Taekyoung Kwon. "Analysis of Research Trend and Performance Comparison on Message Authentication Code." Journal of KIISE 43, no. 11 (November 15, 2016): 1245–58. http://dx.doi.org/10.5626/jok.2016.43.11.1245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Uttarwar, Shreya V., and Dr Bagade A. M. "Two-Level QR Code for Secured Message Sharing and Document Authentication." IJARCCE 6, no. 6 (June 30, 2017): 508–11. http://dx.doi.org/10.17148/ijarcce.2017.6689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography