Design and Analysis of Security Protocol for Communication

Book description

The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.
 

Table of contents

  1. Cover
  2. Preface
  3. 1 History and Generations of Security Protocols
    1. 1.1 Introduction
    2. 1.2 Network Security
    3. 1.3 Historical Background of Network Security and Network Timeline
    4. 1.4 Internet Architecture and Security Aspects
    5. 1.5 Different Aspects of Security of the Network
    6. 1.6 Evolution of Security Protocols for Network
    7. 1.7 Network Security Protocols
    8. 1.8 Current Evolution of Red Security
    9. 1.9 Future Security Trends
    10. References
  4. 2 Evolution of Information Security Algorithms
    1. 2.1 Introduction to Conventional Encryption
    2. 2.2 Classical Encryption Techniques
    3. 2.3 Evolutions of Modern Security Techniques
    4. 2.4 Conclusion
    5. References
    6. Practice Set
    7. APPENDIX A: Tables of Data Encryption Standard
  5. 3 Philosophy of Security by Cryptostakes Schemes
    1. 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
    2. 3.2 RSA Algorithm
    3. 3.3 Security Analysis of RSA
    4. 3.4 Exponentiation in Modular Arithmetic
    5. 3.5 Distribution of Public Keys
    6. 3.6 Distribution of Secret Keys Using Public Key Cryptosystems
    7. 3.7 Discrete Logarithms
    8. 3.8 Diffie–Hellman Key Exchange
    9. 3.9 Review Exercise
    10. References
  6. 4 Zero-Share Key Management for Secure Communication Across a Channel
    1. 4.1 Introduction
    2. 4.2 Background
    3. 4.3 Zero-Share Key Management System
    4. 4.4 Simulation
    5. 4.5 Complexity and Analysis
    6. 4.6 Conclusion and Future Trends
    7. References
  7. 5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
    1. 5.1 Introduction
    2. 5.2 Existing Technology and Its Review
    3. 5.3 Research Design
    4. 5.4 Results With Implications
    5. 5.5 Future Research and Conclusion
    6. References
  8. 6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
    1. 6.1 Introduction
    2. 6.2 Recursively Paired Arithmetic Technique (RPAT)
    3. 6.3 Implementation and Simulation
    4. 6.4 Cryptanalysis
    5. 6.5 Simulation-Based Results
    6. 6.6 Applications
    7. 6.7 Conclusion
    8. Acknowledgment
    9. References
  9. 7 Security Protocol for Multimedia Streaming
    1. 7.1 Introduction
    2. 7.2 Existing Technology and Its Review
    3. 7.3 Methodology and Research Design
    4. 7.4 Findings
    5. 7.5 Future Research and Conclusion
    6. References
  10. 8 Nature Inspired Approach for Intrusion Detection Systems
    1. 8.1 Introduction
    2. 8.2 Approaches Used for Intrusion Detection Systems
    3. 8.3 Intrusion Detection Tools
    4. 8.4 Use of Machine Learning to Build Dynamic IDS/IPS
    5. 8.5 Bio-Inspired Approaches for IDS
    6. 8.6 Conclusion
    7. References
  11. 9 The Socio-Behavioral Cipher Technique
    1. 9.1 Introduction
    2. 9.2 Existing Technology
    3. 9.3 Methodology
    4. 9.4 Conclusion: Future Scope and Limitations
    5. References
  12. 10 Intrusion Detection Strategies in Smart Grid
    1. 10.1 Introduction
    2. 10.2 Role of Smart Grid
    3. 10.3 Technical Challenges Involved in Smart Grid
    4. 10.4 Intrusion Detection System
    5. 10.5 General Architecture of Intrusion Detection System
    6. 10.6 Basic Terms in IDS
    7. 10.7 Capabilities of IDS
    8. 10.8 Benefits of Intrusion Detection Systems
    9. 10.9 Types of IDS
    10. 10.10 IDS in a Smart Grid Environment
    11. 10.11 Security Issues of Cyber-Physical Smart Grid
    12. 10.12 Protecting Smart Grid From Cyber Vulnerabilities
    13. 10.13 Security Issues for Future Smart Grid
    14. 10.14 Conclusion
    15. References
  13. 11 Security Protocol for Cloud-Based Communication
    1. 11.1 Introduction
    2. 11.2 Existing Technology and Its Review
    3. 11.3 Methodology (To Overcome the Drawbacks of Existing Protocols)
    4. 11.4 Findings: Policy Monitoring Techniques
    5. 11.5 Future Research and Conclusion
    6. Reference
  14. 12 Security Protocols for Mobile Communications
    1. 12.1 Introduction
    2. 12.2 Evolution of Mobile Communications
    3. 12.3 Global System for Mobiles (GSM)
    4. 12.4 Universal Mobile Telecommunications System (UMTS)
    5. 12.5 Long Term Evolution (LTE)
    6. 12.6 5G Wireless Systems
    7. 12.7 LoRA
    8. 12.8 5G Integrated With LoRA
    9. 12.9 Physical Layer Security and RFID Authentication
    10. 12.10 Conclusion
    11. References
  15. 13 Use of Machine Learning in Design of Security Protocols
    1. 13.1 Introduction
    2. 13.2 Review of Related Literature
    3. 13.3 Joint and Offensive Kinetic Execution Resolver
    4. 13.4 Results and Discussion
    5. 13.5 Conclusion and Future Scope
    6. References
  16. 14 Privacy and Authentication on Security Protocol for Mobile Communications
    1. 14.1 Introduction
    2. 14.2 Mobile Communications
    3. 14.3 Security Protocols
    4. 14.4 Authentication
    5. 14.5 Next Generation Networking
    6. 14.6 Conclusion
    7. References
  17. 15 Cloud Communication
    1. 15.1 Introduction
    2. 15.2 Need for Cloud Communication
    3. 15.3 Application
    4. 15.4 Cloud Communication Platform
    5. 15.5 Security Measures Provided by the Cloud
    6. 15.6 Achieving Security With Cloud Communications
    7. 15.7 Cryptographic Protocols for Secure Cloud Computing
    8. 15.8 Security Layer for the Transport Protocol
    9. 15.9 Internet Protocol Security (IPSec)
    10. 15.10 Kerberos
    11. 15.11 Wired Equivalent Privacy (WEP)
    12. 15.12 WiFi Protected Access (WPA)
    13. 15.13 Wi-Fi Protected Access II and the Most Current Security Protocols
    14. 15.14 Wired Equivalent Privacy (WEP)
    15. 15.15 Wi-Fi Protected Access (WPA)
    16. 15.16 Conclusions
    17. References
  18. Index
  19. End User License Agreement

Product information

  • Title: Design and Analysis of Security Protocol for Communication
  • Author(s): Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng, O. P. Verma
  • Release date: March 2020
  • Publisher(s): Wiley-Scrivener
  • ISBN: 9781119555643