Book description
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.
Table of contents
- Cover
- Preface
-
1 History and Generations of Security Protocols
- 1.1 Introduction
- 1.2 Network Security
- 1.3 Historical Background of Network Security and Network Timeline
- 1.4 Internet Architecture and Security Aspects
- 1.5 Different Aspects of Security of the Network
- 1.6 Evolution of Security Protocols for Network
- 1.7 Network Security Protocols
- 1.8 Current Evolution of Red Security
- 1.9 Future Security Trends
- References
- 2 Evolution of Information Security Algorithms
-
3 Philosophy of Security by Cryptostakes Schemes
- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
- 3.2 RSA Algorithm
- 3.3 Security Analysis of RSA
- 3.4 Exponentiation in Modular Arithmetic
- 3.5 Distribution of Public Keys
- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems
- 3.7 Discrete Logarithms
- 3.8 Diffie–Hellman Key Exchange
- 3.9 Review Exercise
- References
- 4 Zero-Share Key Management for Secure Communication Across a Channel
- 5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
- 6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
- 7 Security Protocol for Multimedia Streaming
- 8 Nature Inspired Approach for Intrusion Detection Systems
- 9 The Socio-Behavioral Cipher Technique
-
10 Intrusion Detection Strategies in Smart Grid
- 10.1 Introduction
- 10.2 Role of Smart Grid
- 10.3 Technical Challenges Involved in Smart Grid
- 10.4 Intrusion Detection System
- 10.5 General Architecture of Intrusion Detection System
- 10.6 Basic Terms in IDS
- 10.7 Capabilities of IDS
- 10.8 Benefits of Intrusion Detection Systems
- 10.9 Types of IDS
- 10.10 IDS in a Smart Grid Environment
- 10.11 Security Issues of Cyber-Physical Smart Grid
- 10.12 Protecting Smart Grid From Cyber Vulnerabilities
- 10.13 Security Issues for Future Smart Grid
- 10.14 Conclusion
- References
- 11 Security Protocol for Cloud-Based Communication
-
12 Security Protocols for Mobile Communications
- 12.1 Introduction
- 12.2 Evolution of Mobile Communications
- 12.3 Global System for Mobiles (GSM)
- 12.4 Universal Mobile Telecommunications System (UMTS)
- 12.5 Long Term Evolution (LTE)
- 12.6 5G Wireless Systems
- 12.7 LoRA
- 12.8 5G Integrated With LoRA
- 12.9 Physical Layer Security and RFID Authentication
- 12.10 Conclusion
- References
- 13 Use of Machine Learning in Design of Security Protocols
- 14 Privacy and Authentication on Security Protocol for Mobile Communications
-
15 Cloud Communication
- 15.1 Introduction
- 15.2 Need for Cloud Communication
- 15.3 Application
- 15.4 Cloud Communication Platform
- 15.5 Security Measures Provided by the Cloud
- 15.6 Achieving Security With Cloud Communications
- 15.7 Cryptographic Protocols for Secure Cloud Computing
- 15.8 Security Layer for the Transport Protocol
- 15.9 Internet Protocol Security (IPSec)
- 15.10 Kerberos
- 15.11 Wired Equivalent Privacy (WEP)
- 15.12 WiFi Protected Access (WPA)
- 15.13 Wi-Fi Protected Access II and the Most Current Security Protocols
- 15.14 Wired Equivalent Privacy (WEP)
- 15.15 Wi-Fi Protected Access (WPA)
- 15.16 Conclusions
- References
- Index
- End User License Agreement
Product information
- Title: Design and Analysis of Security Protocol for Communication
- Author(s):
- Release date: March 2020
- Publisher(s): Wiley-Scrivener
- ISBN: 9781119555643
You might also like
book
Python Crash Course, 2nd Edition
This is the second edition of the best selling Python book in the world. Python Crash …
video
Python Fundamentals
51+ hours of video instruction. Overview The professional programmer’s Deitel® video guide to Python development with …
book
Serious Cryptography
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of …
book
Computer Security Fundamentals, 4th Edition
Clearly explains core concepts, terminology, challenges, technologies, and skills Covers today's latest attacks and countermeasures The …