Book description
Table of contents
- Cover
- Preface
-
1 History and Generations of Security Protocols
- 1.1 Introduction
- 1.2 Network Security
- 1.3 Historical Background of Network Security and Network Timeline
- 1.4 Internet Architecture and Security Aspects
- 1.5 Different Aspects of Security of the Network
- 1.6 Evolution of Security Protocols for Network
- 1.7 Network Security Protocols
- 1.8 Current Evolution of Red Security
- 1.9 Future Security Trends
- References
- 2 Evolution of Information Security Algorithms
-
3 Philosophy of Security by Cryptostakes Schemes
- 3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography)
- 3.2 RSA Algorithm
- 3.3 Security Analysis of RSA
- 3.4 Exponentiation in Modular Arithmetic
- 3.5 Distribution of Public Keys
- 3.6 Distribution of Secret Keys Using Public Key Cryptosystems
- 3.7 Discrete Logarithms
- 3.8 Diffie–Hellman Key Exchange
- 3.9 Review Exercise
- References
- 4 Zero-Share Key Management for Secure Communication Across a Channel
- 5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
- 6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis
- 7 Security Protocol for Multimedia Streaming
- 8 Nature Inspired Approach for Intrusion Detection Systems
- 9 The Socio-Behavioral Cipher Technique
-
10 Intrusion Detection Strategies in Smart Grid
- 10.1 Introduction
- 10.2 Role of Smart Grid
- 10.3 Technical Challenges Involved in Smart Grid
- 10.4 Intrusion Detection System
- 10.5 General Architecture of Intrusion Detection System
- 10.6 Basic Terms in IDS
- 10.7 Capabilities of IDS
- 10.8 Benefits of Intrusion Detection Systems
- 10.9 Types of IDS
- 10.10 IDS in a Smart Grid Environment
- 10.11 Security Issues of Cyber-Physical Smart Grid
- 10.12 Protecting Smart Grid From Cyber Vulnerabilities
- 10.13 Security Issues for Future Smart Grid
- 10.14 Conclusion
- References
- 11 Security Protocol for Cloud-Based Communication
-
12 Security Protocols for Mobile Communications
- 12.1 Introduction
- 12.2 Evolution of Mobile Communications
- 12.3 Global System for Mobiles (GSM)
- 12.4 Universal Mobile Telecommunications System (UMTS)
- 12.5 Long Term Evolution (LTE)
- 12.6 5G Wireless Systems
- 12.7 LoRA
- 12.8 5G Integrated With LoRA
- 12.9 Physical Layer Security and RFID Authentication
- 12.10 Conclusion
- References
- 13 Use of Machine Learning in Design of Security Protocols
- 14 Privacy and Authentication on Security Protocol for Mobile Communications
-
15 Cloud Communication
- 15.1 Introduction
- 15.2 Need for Cloud Communication
- 15.3 Application
- 15.4 Cloud Communication Platform
- 15.5 Security Measures Provided by the Cloud
- 15.6 Achieving Security With Cloud Communications
- 15.7 Cryptographic Protocols for Secure Cloud Computing
- 15.8 Security Layer for the Transport Protocol
- 15.9 Internet Protocol Security (IPSec)
- 15.10 Kerberos
- 15.11 Wired Equivalent Privacy (WEP)
- 15.12 WiFi Protected Access (WPA)
- 15.13 Wi-Fi Protected Access II and the Most Current Security Protocols
- 15.14 Wired Equivalent Privacy (WEP)
- 15.15 Wi-Fi Protected Access (WPA)
- 15.16 Conclusions
- References
- Index
- End User License Agreement
Product information
- Title: Design and Analysis of Security Protocol for Communication
- Author(s):
- Release date: March 2020
- Publisher(s): Wiley-Scrivener
- ISBN: 9781119555643
You might also like
book
Communication System Security
Helping current and future system designers take a more productive approach in the field, Communication System …
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …
book
Physical Layer Security in Wireless Communications
Physical layer security has recently become an emerging technique to complement and significantly improve the communication …
book
Wireless and Mobile Device Security
The world of wireless and mobile devices is evolving day-to-day, with many individuals relying solely on …