The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Noise aggregation is an efficient way of aggregating the inherent noises introduced during wireless transmissions over multiple channels to degrade the eavesdropper's channel quality. While the performance of channel aggregation has not been thoroughly studied over wireless fading channels, we in this paper concentrating on analyses of its achievable average secrecy rate with emphasis on binary symmetric...
Recently, physical layer security in the optical layer has gained significant traction. Security threats in optical networks generally impact the reliability of optical transmission. Linear Network Coding (LNC) can protect from both the security threats in form of eavesdropping and faulty transmission due to jamming. LNC can mix original data to become incomprehensible for an attacker and also extend...
Network security situational awareness is a new technology to solve the problem of single defense in recent years, and situation assessment is the most critical step in situational awareness. Because only in real-time and accurately evaluate the security situation of the current network, we can take more targeted defensive measures. This paper aims to improve timeliness and accuracy of the evaluation...
Guaranteeing the secure delivery is a critical yet challenging issue in wireless transmission. In this paper, a secure delivery scheme that utilizing the dynamic fountain code design is proposed. Using fountain-coded transmission, the transmitter continuously sends fountain packets until the legitimate receiver successfully recovers the original data from a sufficient number of fountain packets. Secure...
This paper describes a steganography technique in which text is concealed in an image. The lower nibble of each image byte is modified so as to contain each nibble of the input text. The steganography algorithm used in this implementation maximises on data capacity and also ensures security. The Java programming language is used for its comprehensive libraries and ease of use. A simple GUI has been...
Mobile ad-hoc network is a collection of mobile nodes which forms an instant network without fixed topology and can be arranged dynamically. Energy saving and security are important issue in MANET. Network coding technique is used to reduce energy consumption by less transmissions in MANET. To achieve a security, there are many encryption scheme are available. Out of which p-coding technique is lightweight...
SQL Injection Attack (SQLIA) has been consistently ranked among the top security threats against web applications for more than a decade. Nowadays, attackers use sophisticated tools to launch automated injection attacks. The problem of prevention and detection of SQLIA has been long attended by the research community, but hardly any solution exists for protecting multiple websites in a shared hosting...
In this paper we describe research relating to the potential use of quantum key distribution (QKD) protocols for secure underwater communications. We briefly summarize the BB84 QKD protocol, its implementation and use in free-space applications, and then describe recent theoretical considerations of its use in the maritime domain. We also consider alternatives to QKD that offer security and bandwidth...
This paper describes an implementation of a Secure Coding learning package for Undergraduate students in the Kulliyyah of Information and Communication Technology (KICT) at the International Islamic University Malaysia. The learning package consists of three components which are SCALT, WebGoat and notes on several vulnerabilities in programming languages. This work aims to create awareness among the...
As the need of software has been increasing, the danger of malicious attacks against software has been worse. In order to fortify software systems against adversaries, researchers have devoted significant efforts on mitigating software vulnerabilities. To eliminate security vulnerabilities from software with lower inspection effort, vulnerability prediction approaches have been emerged. By allocating...
We propose a coding scheme based on the combination of interleaving with systematic channel codes for secrecy. The basic idea consists of generating a random interleaving key that is used to shuffle/interleave information at the source. The message and the interleaving key are then both encoded with a systematic code and the part related to the interleaving key is removed/punctured before being sent...
Web applications dependent on back-end databases are currently not immune to SQL injection attacks despite huge investment in security artefacts and defensive software mechanisms deployed by organizations. These forms of attacks involve the insertion of malformed strings or specially crafted input encoded as SQL query into web forms or http header requests to web servers. While many techniques have...
This paper comprehensively studies the secure decode-and-forward (DF) relaying transmission in slow fading channels. To maximize the secrecy throughput under a secrecy outage probability constraint, we propose three adaptive transmission schemes (ATSs) with different complexity and flexibility, and design system parameters according to the instantaneous channel state information of the legitimate...
This study presents the design and prototype development of a time - controlled access system consisting of an Arduino Mega ADK 2560 microcontroller integrated with a PN532 RFID/NFC Shield, Ethernet Shield, LCD, solenoid lock and a control circuit for the loads to address security issues and help save power consumptions of any institutions. When a passive RFID tag is placed in the reading range of...
This paper focuses on increasing the data storage capacity with less storage space of QR code by applying compression techniques. Further data capacity can be increased by applying multiplexing techniques i.e. Grouping of bits into codeword and providing security by replacing the codeword by special type of character. As there are varieties of medium for information sharing over distances. Thus QR...
This paper focuses on increasing the data storage capacity with less storage space of QR code by applying compression techniques. Further data capacity can be increased by applying multiplexing techniques i.e. Grouping of bits into codeword and providing security by replacing the codeword by special type of character. As there are varieties of medium for information sharing over distances. Thus QR...
Echo hiding methods have good perceptual quality and they are robust to intentional and unintentional modifications. Unfortunately these methods are not quite transparent and are not suitable for steganography applications. Specifically, this point became more obvious after a recent steganalysis investigation where both parameters and the hidden message were extracted accurately. This work tries to...
This paper considers the two-user interference relay channel where each source wishes to communicate to its destination a message that is confidential from the other destination. Furthermore, the relay, that is the enabler of communication, due to the absence of direct links, is untrusted. Thus, the messages from both sources need to be kept secret from the relay as well. We provide an achievable...
Twitter is a popular means to disseminate information and currently more than 300 million people are using it actively. Software engineers are no exception; Singer et al. have shown that many developers use Twitter to stay current with recent technological trends. At various time points, many users are posting microblogs (i.e., tweets) about the same topic in Twitter. We refer to this reasonably large...
As the use and prevalence of mobile technology increases so too does the importance of effective security for these devices. In particular, sensitive user information must be protected, which includes protecting against any covert channels that would allow such information to be compromised. This paper will examine a new covert channel capable of circumventing existing application-level protections...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.