Abstract:The major need of remote user authentication is to verify the authenticity of the user through insecure channel. Till today enormous remote user authentication schemes have been proposed but still some security flaws remains. Some of them are vulnerable to password guessing attack, Id guessing attack, client and server impersonation attack, replay attack, Denial of Service (DoS) attack etc. Besides the security issues many such schemes are supposed to have higher computational and communicational cost. To over… Show more
“…The speed analysis of our system was compared with existing systems and shown to have a 5% improvement in speed. All these analyses make the DPLM-PRNG more suitable for cryptographic applications like in bio-hash [29], remote-user authentication [30], steganography, encryption [31,32], etc.…”
Most of the web applications require security which in turn requires random numbers. Pseudo-random numbers are required with good statistical properties and efficiency. Use of chaotic map to dynamically perturb another chaotic map that generates the random bit output is introduced in this work. Perturbance is introduced to improvise the chaotic behaviour of a base map and increase the periodicity. PRNG with this architecture is devised to generate random bit sequence from initial keyspace. The statistical properties of newly constructed PRNG are tested with NIST SP 800-22 statistical test suite and were shown to have good randomness. To ensure its usability in cryptographic applications, it has been analyzed for the size of its keyspace, key sensitivity and performance speed. The test results provide evidence that newly designed PRNG has a 3.6% increase in keyspace and a 5% increase in its performance speed compared to existing chaotic PRNGs. The novel PRNG can be used for cryptographic applications with a faster generation of keys and increased security.
“…The speed analysis of our system was compared with existing systems and shown to have a 5% improvement in speed. All these analyses make the DPLM-PRNG more suitable for cryptographic applications like in bio-hash [29], remote-user authentication [30], steganography, encryption [31,32], etc.…”
Most of the web applications require security which in turn requires random numbers. Pseudo-random numbers are required with good statistical properties and efficiency. Use of chaotic map to dynamically perturb another chaotic map that generates the random bit output is introduced in this work. Perturbance is introduced to improvise the chaotic behaviour of a base map and increase the periodicity. PRNG with this architecture is devised to generate random bit sequence from initial keyspace. The statistical properties of newly constructed PRNG are tested with NIST SP 800-22 statistical test suite and were shown to have good randomness. To ensure its usability in cryptographic applications, it has been analyzed for the size of its keyspace, key sensitivity and performance speed. The test results provide evidence that newly designed PRNG has a 3.6% increase in keyspace and a 5% increase in its performance speed compared to existing chaotic PRNGs. The novel PRNG can be used for cryptographic applications with a faster generation of keys and increased security.
“…To achieve this proposed protocol is mainly designed to transmit data and information sensor nodes and varied wireless network nodes in emergency and disaster conditions. In this approach, every node connects to a sensor network based on spatial clusters and shares information on certain cluster nodes, or forwards data to each node whenever a node with such a high likelihood of data being sent to the destination is sometimes encountered [24].…”
Due to the massive use of wireless Internet of Things (IoT), the advent of multimediabig-data (MBD) in recent decades poses numerous obstacles for successful contact with the virtual era. Mobile Adhoc Network-based IoT (MANETIoT) framework is increasingly common in this regard owing to its increased communication protocols and economic efficiency. MANET comprises arbitrary, battery-driven, roaming nodes that do not have an architecture that can handle the traffic and control the IoT network. In MANET-IoT, energy usage and traffic management for the handling of MBD information are significant issues. For rapid and precise response, it is essential to route or forward information like the locations of happenings and defected in a disaster. However, it is difficult to transfer this information to the Wireless Sensor Network in disaster areas because the current networks are a disaster that has been removed. In these situations, the transmission of opportunistic knowledge may play a vital role. Current opportunistic protocols need large messages for the restoration of the cluster that leads to more energy consumption and packet loss. To overcome these issues, this work proposes the reliable, energyefficient opportunistic protocol known as Density Clustering Opportunistic Routing Protocol (DCOR). This method sends information opportunistically in emergencies and disasters through a density-clustering protocol. Results from simulations demonstrate that the designed protocol exceeds several well-known current routing mechanisms for network energy usage and dissemination of information.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.