Current Issue : July-September Volume : 2022 Issue Number : 3 Articles : 5 Articles
Data security is the science of protecting data in information technology, including authentication, data encryption, data decryption, data recovery, and user protection. To protect data from unauthorized disclosure and modification, a secure algorithm should be used. Many techniques have been proposed to encrypt text to an image. Most past studies used RGB layers to encrypt text to an image. In this paper, a Text-to-Image Encryption-Decryption (TTIED) algorithm based on Cyan, Magenta, Yellow, Key/Black (CMYK) mode is proposed to improve security, capacity, and processing time. The results show that the capacity increased from one to four times compared to RGB mode. Security was also improved due to a decrease in the probability of an adversary discovering keys. The processing time ranged between 0.001 ms (668 characters) and 31 s (25 million characters), depending on the length of the text. The compression rate for the encrypted file was decreased compared to WinRAR. In this study, Arabic and English texts were encrypted and decrypted....
Some of the advantages of using Worldwide Interoperability Microwave Access (WiMAX) technology at the last-mile level as an access technology include an extensive range of 50 km Line of Sight (LOS), 5 to 15 km Non-Line of Sight, and fewer infrastructure installations compared to other wireless broadband access technologies. Despite positive investments in ICT fiber infrastructure by developing countries, including Botswana, servicing end-users is subjected to high prices and service disparities. The alternative, theWi-Fi hotspot initiative by the Botswana government, falls short as a solution for last-mile connectivity and access. This study used OPNET simulation Modeler 14.5 to investigate whether Botswana’s national broadband project could adopt WiMAX IEEE 802.16e as an access technology. Therefore, using the experimental method, the simulation evaluated the WiMAX IEEE 802.16e/m over three subscriber locations in Botswana. The results obtained indicate that the deployment of the WiMAX IEEE 802.16e standard can solve most of the deployment issues and access at the last-mile level. Although the findings suggest thatWiMAX IEEE 802.16e is more suitable for high-density areas, it could also solve rural areas’ infrastructure development challenges and provide the required high-speed connectivity access. However, unlike the Wi-Fi initiative, which requires more infrastructure deployment and relies less on institutional and regulatory frameworks, the deployment of WiMAX IEEE 802.16e necessitates institutional and regulatory standards....
With the continuous development of the network, the number of network assets continues to increase. Despite the convenience diversified network assets bring, it also poses new challenges to IP-based network asset management. Traditional asset discovery technologies mainly analyze network traffic, and detect relevant information (operating system, running software, etc.) of IPbased assets through methods such as active discovery, passive discovery, and discovery methods based on cyberspace search engines. These methods assign the same weight to all network IP-based network assets, and it is difficult to effectively analyze diversified network assets. In this paper, we propose the concept of IP-based core network assets, and collect the data of the relevant network assets based on this concept. Then, we construct a dataset and establish feature engineering for data preprocessing. As there is currently no relevant IP-based core network asset detection method, we propose an IP-based core network asset discovery technology based on pretraining of multiple autoencoders, MAE-CAD. The results show that our method can achieve 95.74% in Acc and 95.04% in F1 in the experimental environment (Acc 98.11% and F1 97.16% in the actual network environment because of duplicate samples). In addition, MAE-CAD has excellent robustness. In an environment where the proportion of data is extremely unbalanced, when the IP-based core network asset data in the training set only accounts for 1/200 (0.5%), MAE-CAD can still obtain 92.91% in Acc and 91.57% in F1....
Lattice-based key exchange protocols have attracted tremendous attention for its post-quantum security. In this work, we construct a Module-LWE-based key exchange protocol using Peikert’s error reconciliation mechanism. Compared with Kyber.KE, our key exchange protocol reduces the total communication cost by 96-byte, i.e., 3.2% 6.1%, under the different parameter sets, and without reducing the post-quantum security levels. Moreover, our key exchange protocol slightly reduces the probability of session key agreement failure and the time consumed by modular multiplication of numbers and ring elements by approximately 30%. Thus, the key exchange protocol in this paper is more suitable for the lightweight communication systems....
The current stage of technology development is characterized by an increase in the complexity of the created anthropogenic systems, a constant expansion of the scope of information technologies, an increase in the intelligence level of the created systems, and the appearance of new paradigms for building information-oriented systems such as cyber-physical systems, the Internet of things, and cloud and fog systems. Modern information-oriented systems very often have dynamic structure, implement complex adaptive behavior, and can be considered as systems with agile architecture. The article discusses one of the possible approaches for building cyberphysical systems with agile architecture on fog platforms. The idea of the proposed approach is to accumulate knowledge about the current state of the observed cyberphysical systems in the form of knowledge graphs. As a model, it is proposed to use multilevel relatively finite state operating automaton at the upper level and knowledge graphs at the lower level. A distinctive feature of the developed approach is that models that describe the current state of the observed system can be built automatically....
Loading....