A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sushmitha, N.
- Data Encryption Using XTEA and OTP Generation for E-Payment System
Authors
1 Department of Information Science, RV College of Engineering, Bengaluru, IN
Source
Networking and Communication Engineering, Vol 10, No 5 (2018), Pagination: 102-105Abstract
Recently, data security is playing a major role in our day-to-day operations. Securing the Personal Identification Information (PII) is a difficult task. In this paper, two phase authentication process is used to secure the data. CIA triad means Confidentiality, Integrity and Availability, are the three main goals offered by the modern Cryptography. In two phase process, the first is OTP generation and verification for authorized users, the second phase of authentication is provided by encrypting the user details before it stores in the database. When the user wants to view the data it decrypts and displays the content. In this paper Extended Tiny Encryption Algorithm (XTEA) is used to encrypt the plain text into cipher text and also decrypt the cipher text into plain text. XTEA is a block cipher which uses a 64-bit block size and 128 bit key. Main aim of this paper is to provide security for the PII.
Keywords
Security, PII, OTP, XTEA, Encryption and Decryption, Cipher Text, Plain Text.References
- Berna Ors, Osman Semih Kayhan, Ahmet Turan Erozan, “JPEG image encryrption via TEA Algotithm” IEEE, 2015.
- John Jenkins, Joseph Shelton, Kaushik Roy, “One-time Password for Biometric Systems: Disposable Feature Templates” IEEE, 2017.
- Silke Holtmanns, Ian Oliver, “SMS and One-Time-Password Interception in LTE Networks”, IEEE, 2017.
- Devashish Kumar, Amit Agrawal, Puneet Goyal,” Efficiently Improving the Security of OTP”, IEEE, 2015.
- Schneier, Bruce; Kelsey, John (1996-02-21). "Unbalanced Feistel networks and block cipher design". Fast Software Encryption. Springer, Berlin, Heidelberg
- Benedicto B. Balilo Jr., Bobby D. Gerardo, Ruji P. Medina, “ Design of Physical Authentication based on OTP Keypad”, IEEE, 2017
- Shubham Srivastava, Sivasankar M,” On the Generation of Alphanumeric One Time Password” IEEE, 2016.
- Anonymous is my Name-A Survey Paper on Dark Web
Authors
1 Department of Information Science and Engineering, R V College of Engineering, Bengaluru, IN
Source
Networking and Communication Engineering, Vol 10, No 5 (2018), Pagination: 106-109Abstract
In the current world every transaction is online. In order to make the transactions and operations easier, technology and internet is used in every walk of life. The content which we are accessing through popular web browsers are only in the surface level of web. But the web space which was built and used for communication and maintenance of confidential information is now being a place where brutal and illegal activities are happening on a large scale, the place which is called –the dark web. It is portrayed as a den of mysterious and illegal activity. This paper illustrates the survey on the whereabouts of the dark web, its current usage in various activities, the technique of anonymity and a few relevant case studies.
Keywords
The Onion Router, Anonymous, Illegal, Deep Web, Dark Web.References
- M. Splitters, F. Klaver, G. Koot and M. Van Staalduinen,"Authorship Analysis on Dark Marketplace Forums," in proceeding of Intelligence and Security Informatics Conference (EISIC), Manchester, 2015.
- K. Bharat and A. Broder , "A technique for measuring the relative size and overlap of public Web search engines," Computer Networks and ISDN Systems, vol. 30, no. 1-7, pp. 379-388, 1998.
- M. Bergman, "White Paper: The Deep Web: Surfacing Hidden Value," The Journal of Electronic, vol. 7, no. 1, 2001.
- M. Eddy, "Inside the Dark Web," 04 02 2015. Available:http://uk.pcmag.com/security/39461/guide/ inside-thedark-web.
- M. Egan, "What is the Dark Web? How to access the Dark Web. What's the difference between the Dark Web and the Deep Web?," 2016 06 28. [Online]. Available:http://www.pcadvisor.co.uk/how- to/internet/what-isdark-web-how-access-dark-web- deep-jocbeautfiulpeople-3593569/.
- H. Oman, "Security Technology Progress: The 37th IEEE-AESS Carnahan Conference, Taiwan," IEEE Aerospace and Electronic Systems Magazine, vol. 19, no.2, pp. 35-40, 2004.
- H. Chen, "The Terrorism Knowledge Portal: Advanced Methodologies for Collecting and Analyzing Information from the„ Dark Web‟ and Terrorism Research Resources," 08 2003. [Online]. Available http://www.slideshare.net/suyu22/the- terrorismknowledge-portal-advanced-methodologies-forcollecting-and-analyzing-information-from-the- darkweb-and-terrorism-research-resources.
- A Survey on Cyber Security Attacks in Connected Vehicles
Authors
1 Department of Information Science and Engineering, R V College of Engineering, Bangalore, IN
Source
Networking and Communication Engineering, Vol 10, No 5 (2018), Pagination: 110-112Abstract
In 2016, the “Cyber security best practice for modern vehicle” is introduced by the US Department of Transportation. They encouraged companies to follow the National Institute of Standards and Technologies Cyber Security framework, i.e. identify, protect, detect, respond and recover. Now a days modern cars are new target to the hackers as they become increasingly connected. Cyber security attacks like door locks, disable brakes and engine shutdown are few examples. This paper focuses on solution that vehicle systems should take against the cyber attacks and also highlights the importance of making cyber security a priority for the automotive industry.Keywords
Cyber Security, Cyber Attacks.References
- Mahmoud Hashem Eiza, University of Central Lancashire Qiang Ni, “Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cyber security”, IEEE vehicular technology magazine February 2017.
- S. Khandelwal, “Car Hackers Could Face Life In Prison. That's Insane!,” The Hacker News, May 01, 2016. [Online]. May 2016.
- A. Greenberg, “Hackers remotely kill a Jeep on the highway – with me in it,” WIRED, July 21, 2015. [Online]. Sep 30 2015.
- S. Curts,” Self-driving cars can be hacked using laser Pointer,” The telegraph, sep. 08, 2015.
- W.Yan, ”A Two-Year Survey on Security Challenges in Automotive Threat Landscape,” in Proc. IEEE ICCVE, Shenzhen Oct. 2015, pp. 181-189.