Summary
Due to the new technologies of the Internet of Things (IoT), connected objects have become smart interactive devices. However, despite their imminent advantages, whether for the daily life of users or in professional contexts, and the various security solutions proposed in literature in particular, the security of IoT networks is still a paramount issue given to the amount of confidential data that circulates through these technologies. In other words, among the IoT protocols that suffer from security issues, routing protocol for low power and lossy networks (RPL) is considered to be one of the most widely used protocols in the deployment of constrained IoT networks with limited resources (storage and energy constraints for example). On this basis, this article investigates in the first part a security flaw in the RPL protocol by carrying out an attack against the rank value of the RPL in an IoT environment. In the second part, a mitigation scheme to avoid it using a trust threshold is proposed. The malicious behavior of the attack and the effectiveness of the proposed scheme were assessed by detailed simulations using the Cooja simulator, in terms of successful detection rate, average network hops and global energy consumption. To conclude, a fair comparison between the different simulation results has been adopted using the Friedman statistical test, and a discussion has been presented with some future works concerning security against rank attack.
This paper presents an efficient approach to synchronizing two identical chaotic systems in order to achieve a cryptosystem, and this approach is intended specifically to digital communications. Instead of sending a drive signal accompanied with encrypted message to the receiver, we send only one signal which results a continuous perturbation to the chaotic system. The large computation precision used for implementation and the way by which the system key is chosen reveal high randomness of the proposed chaotic cryptosystem (PCCS) and avoid short cycles and non-chaotic regions.The mechanism used for encryption shows the reliability and efficiency of the PCCS in terms of security, and this can be proven by the failing of cryptanalysis that carried out on the PCCS and the good results of statistical tests. The real-time FPGA hardware implementation results show the efficiency of the PCCS in terms of throughput and hardware resources consumption.
<p>The developments of communications and digital transmissions have pushed the data encryption to grow quickly to protect the information, against any hacking or digital plagiarisms. Many encryption algorithms are available on the Internet, but it's still illegal to use a number of them. Therefore, the search for new the encryption algorithms is still current. In this work, we will provide a preprocessing of the securisation of the data, which will significantly enhance the crypto-systems. Firstly, we divide the pixel into two blocks of 4 bits, a left block that contains the most significant bit and another a right block which contains the least significant bits and to permute them mutually. Then make another permutation for each of group. This pretreatment is very effective, it is fast and is easy to implement and, only consumes little resource.</p>
5th generation systems (5G) will be based on Orthogonal Frequency Division Multiplexing (OFDM) multicarrier modulation technique. This modulation has a very high Peak to Average Power Ratio (PAPR). This high PAPR is a drawback when nonlinear Power Amplifiers (PA) are operated near the saturation region, for energy efficiency purposes, due to in-band and out-of-band impairments. In this paper, a new PAPR reduction technique called Iterative Dichotomy PAPR (IDP) is proposed. This method is suited for any multicarrier modulation and is studied here using realistic PA model. For evaluating the signal distortions, two main metrics have been considered to evaluate the performance of IDP technique: bit error rate (BER) and power spectrum density (PSD). The analytical expressions of the IDP technique for any dichotomy order is firstly described and subsequently the energy efficiency for different values is compared. We have shown that the proposed IDP method reduces the PAPR by 2.2 for = 2 and 4 for = 4. Regarding the energy efficiency, for the same Error Vector Magnitude (EVM) and the same PA power consumption, the output signal power obtained with the IDP based technique outperforms classical OFDM by 20%, 50% and 80% for = 2, = 3 and = 4, respectively.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.