Conference PaperPDF Available

Exploring the Use of Pretty Good Privacy (PGP) in Wireless Network Security

Authors:
Exploring the Use of Pretty Good Privacy (PGP) in
Wireless Network Security
Sunil. MP
- 3, Electronics and Communication
Engineering, Faculty of Engineering and
Technology, JAIN (Deemed-to-be
University),
Bangalore, Karnataka, India
mp.sunil@jainuniversity.ac.in
Mahesh A. Bhandari ,
Department of Information Technology,
Vishwakarma Institute of Information
Technology ,
Pune - INDIA ,
mahesh.bhandari@viit.ac.in
Saket Mishra,
Centre of Interdisciplinary Research in
Business and Technology, Chitkara
University Institute of Engineering and
technology, Chitkara University,
Punjab, India. E-mail Id:
saketmishra84824@gmail.com
Vishal Sharma
Department of Mechanical Engineering,
Vivekananda Global University,
Jaipur, India
vishal_sharma@vgu.ac.in
Srisathirapathy S,
Department of Mechanical
Engineering,Prince Shri Venkateshwara
Padmavathy Engineering College,
Chennai - 127,
S.SRISATHIRAPATHY_mech@psvpec.in
Girija Shankar Sahoo
Maharishi School of Engineering and
Technology, Maharishi University of
Information Technology,
Uttar Pradesh, India
gssahoo07@gmail.com
Abstract quite properly privacy (PGP) is a protection
protocol utilized by businesses and people to provide
comfortable information communications. It’s far an
extensively identified solution for defensive information
traversing the public net, and is more and more getting used in
the context of wireless networks to defend privacy and
authentication information. This paper explores PGP's
function in shielding the records transmitted over wireless
networks, and discusses its implementation, benefits, and
drawbacks. Topics discussed include authentication strategies,
encryption and decryption methodologies, and the usage of
hardware-degree protection mechanisms. Advantages and
disadvantages of PGP within Wi-Fi community protection are
explored, at the side of various implementation concerns. The
paper concludes with a discussion of the future of PGP in Wi-
Fi network security.
Keywords Protection, Methodologies, Hardware, Security,
Networks.
I. INTRODUCTION
The advent of Wi-Fi networks delivered comfort up-to-
date users, however it has also triggered a want for
accelerated security measures up-to-date guard cusupupdated
from unauthorized get right of entry up updated[1]. One such
degree is the use of quite suitable privateness (PGP), a sort of
encryption era first advanced by using Phil Zimmermann in
1991. In preferred, PGP encrypts records in order that it can't
be read without a private key and offers authentication of
both the sender and the receiver of the information[2-4]. This
makes it perfect for ensuring confidentiality of exchanged
records, up to date for detecting any unauthorized attempts
updated get right of entry up updated such records[5]. using
PGP in wireless network security isn't always most effective
beneficial in terms of statistics protection, but also in terms
of making sure the network itself has the maximum security
proupdatedcols.on the sender’s up-to-date, PGP guarantees
that statistics is not readable up-to-date all people other than
the supposed recipient[6]. The era uses an “uneven”
encryption set of rules, also referred up updated a “public-
key” set of rules, this means that that the sender and receiver
every have a unique key[7]. The sender’s key's used up-to-
date encrypt the data, and the receiver’s key's used up to date
decrypt it. Via authenticating the sender and the pretty up-to-
date privacy (PGP) is a digital protection program used up-
to-date encrypt and decrypt messages[8]. at the beginning
developed in 1991 by way of Phil Zimmermann, PGP used
robust public-key cry pup to dittography updated shield
information exchanged among cusupupdated, for this reason
helping people up-to-date engage in confidential verbal
exchange[9-11]. PGP is now being used extensively in
wireless network security up-to-date encrypt and authenticate
conversations and records, permitting cusupupdated up to
date have greater control over the statistics they proportion
over the community[12]. In up to date’s global of swiftly-
evolving technology and protection threats, PGP has emerge
as updated an invaluable device updated for protecting data
over Wi-Fi networks[13]. It works via producing a key pair
which is composed of one public keythe important thing
used up to date encrypt informationand one non-public
keythe key used up to date decrypt facts[14]. the private
and non-private keys are one of a kind, that means that most
effective the private key may be used updated decrypt the
information, making it truly not possible for all of us but the
up to date updated up-to-date the data[15]. Further updated
this conventional encryption system, PGP can be augmented
up to date create relaxed storage options for data over Wi-Fi
networks. when carried out updated wireless networks, PGP
lets in for up-to-date authentication, statistics integrity, and
data encryption, giving up to date additional confidence
inside the security in their information across a couple of
networks[16].
xEncryption: PGP provides up to date-up to date-end
encryption for the wireless communique, which
prevents the nodes in transit from being able up
updated view the records. As an end result,
malicious sports along with eavesdropping, packet
hijacking or guy-in-the-middle (MITM) assaults are
averted.
xAuthentication: PGP can be used up-to-date without
difficulty establish a at ease connection among up-
to-date up to date which may be used up-to-date
authenticate them and make sure handiest the
legitimate parties are allowed updated talk in the
network.
xKey control: PGP makes use of a robust key
management machine up to date updated up-to-date
2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)
K
arnataka, India. Dec 29-31, 2023
979-8-3503-1912-5/23/$31.00 ©2023 IEEE 1
2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON) | 979-8-3503-1912-5/23/$31.00 ©2023 IEEE | DOI: 10.1109/SMARTGENCON60755.2023.10442370
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
personal keys used for encryption and decryption.
This makes it difficult for attackers up to date bet the
non-public keys up-to-date decrypt information at
some point of conversation
II. RELATED WORKS
Anilkumar, C., et al. [1]Quantum Key Distribution
(QKD) is a relaxed method of conversation in traditional
cryptography the use of quantum mechanics. In QKD, a
sender and receiver alternate facts using photons. The
photons may be despatched over a communication link, and
the receiver can most effective decipher the data by using
understanding the key generated with the aid of the sender.
In this manner, no eavesdropper can advantage access to the
message without knowledge of the key. QKD offers ultra-at
ease communique, as any try to eavesdrop could be
immediately detectable. Madavarapu, J. et al. [2] Put into
effect automated records Encryption: facts encryption is a
powerful tool used to shield EDI records at the same time as
in transit. Table 1: shows the Analysis of techniques toward a
secure email environment.
TABLE I. ANALYSIS OF TECHNIQUES TOWARD A SECURE EMAIL ENVIRONMENT.
Criteria/Technique
Digital Signature
Email Encryption Techniques
Hashing Algorithm
Main Idea
Generate a unique virtual fingerprint for a
person or entity to safeguard information
in digital.
Securing the email environment
involves the encryption of
connections and the encryption of
emails.
Act of encoding such common email addresses
with a cryptographic hashing algorithm.
Authentication
Mechanism
Generated digital certificate based on the
user ID.
The address bar must begin with
https rather than just http.
Provide a secure way to store passwords and
other sensitive information.
Used Algorithm
DSA, RSA
SSL/TLS
MD5 and SHA-1
Used for
Verify the authenticity of an email’s
source.
Ensure that only authorized
individuals can read the message
Provide a secure way to store passwords and
other sensitive information.
Authentication
Performed by a trustworthy certificate
authority
Validated by the certificate
authority.
Trusted by a third-party tool, compare them to
the data received from the source. Great, if they
match. If they do not, there is a problem, and
the email should be dis
regarded or retrieved
from a trusted source directly.
Security
Highly secure
Vulnerable to alteration by
attackers.
Highly secure
Automating the technique enables make sure information
is securely encrypted and transmitted securely. Display and
restriction get entry to EDI documents: To make certain facts
security, corporations need to monitor and restrict access to
EDI files and associated structures. This includes using
authentication and authorization structures. Chandran, G. R.,
et al. [3]A privateers-retaining Framework for comfy Emails
is a framework designed to offer quit-to-cease encryption for
comfy emails. It makes use of a mixture of public-key
cryptography and virtual signatures to offer at ease and
personal communication exchanges. All electronic mail
communications are encrypted in order that handiest the
meant recipient is able to examine the message. Moreover,
the framework additionally prevents malicious actors from
intercepting or changing e-mail contents and attachments.
This guarantees that private emails are saved secure and
secured. Patalbansi, M. V., et al. [4]Packet Cryptography
technique is a statistics security technique used in cellular
cloud computing, which enables relaxed statistics transfers
by means of encrypting statistics even as it's far in transit
among cloud servers and mobile devices. The technique
makes use of cryptography algorithms to encrypt the
statistics with a packet-degree encryption method. Table
2:shows the Inclusion and exclusion criteria.
This permits information to be transmitted over
unreliable networks even as nevertheless last protected from
alteration, interception or unauthorized access. This approach
may even provide anonymity while facts is despatched
throughout public networks along with the net. It affords a
further layer of protection for statistics transfers and enables
prevent information theft and unauthorized get admission to
cloud-based totally facts. Devassy, N. et al. [5]Doctoral
TABLE II. INCLUSION AND EXCLUSION CRITERIA.
Inclusion Criteria Exclusion Criteria
Papers describing cyber security
threats, digital forensics tools in the
email environment.
Papers do not address risks and
digital forensics tools in the email
environment.
Papers published between January
2018 and December 2022
Papers that are not written in
English
Papers published in academic
journals or conference papers.
Papers that are not available online
dissertation, Dublin, countrywide university of Eire is a
scholarly work with the aid of a pupil completing a doctorate
diploma at the national college of Ireland in Dublin. The
dissertation is usually the culminating assignment for a
doctoral student and usually involves studies and writing on
a delegated concern. The dissertation can be on any situation
deemed suitable by the student's doctoral committee and is
normally defended by the pupil before the committee
individuals.
III. PROPOSED MODEL
Quite good privateness (PGP) is an effective technology
that may be used to enhance the safety of wireless networks.
The use of PGP, directors can create an encrypted wireless
community, making it hard for malicious attackers to gain
get admission to the wireless system and the facts. PGP also
provides a manner for users to authenticate different users
the use of public key encryption. The proposed system could
2
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
involve studies into the different implementations of PGP
and its effectiveness in a selection of Wi-Fi networks. The
system would check out how PGP is used to cozy Wi-Fi
networks, what blessings and downsides it provides, and
what measures ought to be taken to ensure its right use
A. Previous Empirical Studies Associated with the
Analysis of Email
Pretty correct privateness (PGP) is a facts security
protocol that is designed to guard emails and different sorts
of communique with the aid of encrypting them. Wireless
network safety is a critical problem in trendy global, as it's
miles important to protect information while communicating
thru wireless networks. Preceding empirical research have
checked out how PGP can be used to cozy wireless
networks. Studies have proven that PGP is a powerful
solution in helping guard statistics on Wi-Fi networks. Fig
1.Shows the an email system architecture.
As an example, one take a look at found that PGP can
provide a good enough stage of protection while using a Wi-
Fi network. different research have regarded into the
effectiveness of PGP in phrases of its potential to shield
information whilst in transit and have located that PGP is a
success solution for shielding facts on Wi-Fi networks.
Further, previous empirical studies have also regarded into
the usability of PGP on wireless networks. Researchers have
determined that PGP can be easy to install and use on Wi-Fi
networks, despite the fact that there may be a few inherent
complexities in its implementation. Additionally, research
have also noted that PGP might also have a few
shortcomings that need to be addressed with the intention to
ensure superior use of the protocol on Wi-Fi networks.
B. Previous Empirical Studies on Email Systems
Associated with Use Cases
Quite exact privacy (PGP) is a broadly used statistics
encryption device. Its miles usually used to alternate
messages, documents, or different information securely over
the internet or thru Wi-Fi networks. Security professionals
and virtual privacy advocates regularly advocate the use of
PGP for comfy conversation. Preceding empirical studies
have sought to reply how PGP is used in precise use
instances. as an instance, one observe checked out the usage
of PGP in a digital private community (VPN) to permit at
ease communication among parties without a shared
encryption key. Fig 2. Shows the outline of the SMTP and
POP3.
Fig. 1. An email system architecture
Fig. 2. An outline of the SMTP and POP3.
3
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
A second study explored the use of PGP to shield the
integrity of electronic economic transaction facts despatched
over a Wi-Fi network. Further, a 3rd observe carried out a
survey of network users to assess their evaluations regarding
using PGP to defend their facts from eavesdropping
C. Previous Empirical Studies Associated with Email
Abuse Investigation Scenarios
Pretty correct privacy (PGP) is a public-key encryption
device used to defend the confidentiality of records
transmitted over a wireless community. PGP guarantees that
best the intended recipient is capable of get right of entry to
the data by way of using an aggregate of key pairs and digital
signatures. Preceding empirical research on PGP awareness
on analyzing usability problems, studying the security
advantages of the usage of PGP, exploring privacy threats
related to Wi-Fi networks, and studying ways to reduce the
complexity of PGP implementations. maximum research on
Wi-Fi security have in large part targeting the analysis of
Wi-Fi protocols and standing, consisting of 802.11x and
WEP, in place of looking explicitly on the PGP protocol. Fig
3. SHOWS THE an outline of the IMAP
Fig. 3. An outline of the IMAP.
There has, however, been a few work on expertise the
diverse use cases associated with PGP in wireless security.
For instance, one observe leveraged PGP to analyze the
effect of a malicious consumer using amplification assaults
to pass a WEP network. A separate have a look at evaluated
the person-enjoy of PGP-enabled Wi-Fi networks. It tested
special scenarios to decide how properly users had been able
to authenticate and get entry to assets with PGP-licensed
routers. Moreover, any other study explored the capability of
the use of PGP for secure report change over a Wi-Fi
community. In the end, numerous studies have additionally
focused on exploring methods to lessen the complexity of
IV. RESULTS AND DISCUSSION
PGP is an encryption and authentication technology used
to defend facts and communications over the internet. It’s far
a public key-based totally machine, which means that it
makes use of keys one public and one personal to encrypt
records and confirm its authenticity. The public secret's used
to encrypt facts, and the private key is used to decrypt it.PGP
is particularly useful for Wi-Fi community security due to
the fact it's far designed with a layered method. It become
initially designed to guard email messages, however it is able
to also be used to shield other sorts of statistics, as nicely.
PGP offers a cozy tunnel from the consumer to the server,
which prevents eavesdroppers from seeing the statistics
that’s sent. Moreover, PGP can be used to authenticate the
supply of a packet despatched over a wireless community in
order that it may be traced again to its unique source
A. Header Analysis
Header evaluation is the manner of inspecting statistics
that is sent as a part of the packet header so as to advantage
statistics about the packet's starting place, vacation spot, and
other identifying characteristics of the information packet.
Via header analysis, WLAN directors and community safety
personnel can discover probably malicious site visitors.
Using quite properly privateers (PGP) in wireless networks is
an effective manner to protect statistics from eavesdroppers
and hackers. PGP is a form of encryption that uses a key
system to scramble and unscramble facts. Fig 4.shows the
Usability of End-to-End Encryption in E-Mail
Communication
Fig. 4. Usability of End-to-End Encryption in E-Mail Communication
At the same time as information is being transmitted,
PGP ensures that it stays secure by using encrypting the
information the use of a symmetric key. Header evaluation
can be used to pick out PGP-encrypted packets. By reading
the header of a PGP-encrypted packet, and professional can
determine which set of rules is getting used, the period of the
key used for encryption, and different details about the
packet. This may help discover traffic from malicious actors
and enhance the safety of the Wi-Fi network.
B. Wireshark
Quite right privacy (PGP) is a cryptographic system used
to relaxed records communications and shield statistics
integrity. It relies on public-key cryptography and offers
verifiable digital signatures for message authentication. PGP
has been used for email encryption and digital signature
verification for many years and is now used to comfy
network communications. The usage of Wireshark, network
directors can examine site visitors for PGP packets to decide
which of these are getting used and how they are being hired.
Fig 5. Shows the Distribution of the most signification of
business risks in 2021
PGP presents an important layer of protection against
malicious actors seeking to eavesdrop on network
communications or compromise touchy statistics. It could
additionally be used to locate suspicious pastime on
networks along with malware downloads, malicious DNS
requests, or attempts to compromise the integrity of
certificate.
4
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
Fig. 5. .Distribution of the most signification of business risks in 2021
C. NetworkMiner
Network Miner is a community evaluation device which
can be used to seize and analyze network site visitors. It’s far
a home windows-based device that captures and reconstructs
numerous protocols inclusive of HTTP, FTP, and Telnet. It
additionally reconstructs documents sorts inclusive of
multimedia documents, picture documents, data files, and
lots of others. The device has aid for encryptions which
includes however not constrained to WEP, WPA2, IPSec,
and SSL. Fig 6. Shows the Distribution of companies using
Symantec
Fig. 6. Distribution of companies using Symantec
It additionally helps pretty desirable privacy (PGP) which
can be used to comfy communications between two
computers over a Wi-Fi network. PGP works by encrypting
messages using a public-personal key pair, consequently
preventing eavesdropping. This makes it a top notch device
for securing data being transferred over an unsecured
wireless community.
D. Clustering
Pretty good privateness (PGP) is a type of public-key
cryptography which is used to at ease data and
communications over the net. PGP employs a ramification of
techniques, such as symmetric encryption, public-key
encryption, digital signatures, and digital certificates, to
ensure the safety of information and conversation. one of the
primary approaches it does that is by way of the use of
clustering algorithms to locate malicious activity on a
community. Fig 7. Shows the People affected by telephonic
surveillance (1998-2011).
Clustering algorithms paintings by way of taking massive
numbers of information factors and grouping them together
into “clusters” based on similarity. inside the context of PGP,
the records factors is probably community traffic within the
form of packets. as soon as the clusters are created, they can
be in addition examined to look for anomalies that indicate
malicious pastime. depending on the character of the set of
rules getting used, the statistics factors can be compared to
historic records or traits a good way to perceive suspicious
conduct.
Fig. 7. People affected by telephonic surveillance (1998-2011)
V. CONCLUSION
The realization of this paper is that PGP is an
exceptionally useful device in Wi-Fi community security,
and is regularly critical for providing secure verbal exchange
and confidentiality. PGP has been efficiently applied on both
cellular and desk bound gadgets with exceptional degrees of
capability, providing sturdy encryption protection for Wi-Fi
network communication. it's miles critical to take into
account that PGP security is best as sturdy because the tools
used to put in force it, and the user's level of know-how. To
correctly use PGP it's far vital for the person to emerge as
sufficiently at ease with the software program, in addition to
information the standards of encryption. Normal, PGP is an
exquisite tool for securing records and verbal exchange over
a wireless community, as longer as it’s used correctly
REFERENCES
[1] Anilkumar, C., Gorle, B., & Sowmya, K. (2023). A secure method of
communication in conventional cryptography using quantum key
distribution
[2] Madavarapu, J. (2023). Electronic Data Interchange Analysts
Strategies to Improve Information Security While Using EDI in
Healthcare Organizations (Doctoral dissertation, University of the
Cumberlands).
[3] Chandran, G. R., Nieminen, R., Schneider, T., & Suresh, A. (2023).
PrivMail: A Privacy-Preserving Framework for Secure
Emails. Cryptology ePrint Archive.
[4] Patalbansi, M. V., Jain, J., & Laxmi, G. P. Packet Cryptography
Technique for Data Transit in Mobile Cloud Computing.
[5] Devassy, N. (2023). Research Project Questions (Doctoral
dissertation, Dublin, National College of Ireland).
[6] Logeshwaran, J., Ramkumar, M., Kiruthiga, T., & Sharanpravin, R.
(2022). The role of integrated structured cabling system (ISCS) for
reliable bandwidth optimization in high-speed communication
network. ICTACT Journal on Communication Technology, 13(01),
26352639
[7] J.Logeshwaran, & T.Kiruthiga. (2021). A Network Management
Model for Device-To-Device Communication in 5G Networks.
International Journal of Research in Science & Engineering (IJRISE),
1(01), 1327
[8] J.Logeshwaran, & T.Kiruthiga. (2021). Network Management Model
for Device-To-Device Communication in Ultra Dense Mobile
Networks. International Journal of Research in Science &
Engineering (IJRISE), 1(02), 2538
[9] Nezhadian, F. (2023). Measuring and characterizing weak RSA keys
across PKI ecosystem (Doctoral dissertation, University of
Saskatchewan).
5
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
[10] Georgoulias, D., Yaben, R., & Vasilomanolakis, E. (2023). Cheaper
than you thought? A dive into the darkweb market of cyber-crime
products. In 12th International Workshop on Cyber Crime. ACM.
[11] Khan, S., Luo, F., Zhang, Z., Rahim, M. A., Ahmad, M., & Wu, K.
(2022). Survey on issues and recent advances in vehicular public-key
infrastructure (VPKI). IEEE Communications Surveys &
Tutorials, 24(3), 1574-1601.
[12] Rito, P., Almeida, A., Figueiredo, A., Gomes, C., Teixeira, P.,
Rosmaninho, R., ... & de Carvalho, N. B. (2023). Aveiro tech city
living lab: A communication, sensing and computing platform for city
environments. IEEE Internet of Things Journal.
[13] Rani, P., Verma, S., Yadav, S. P., Rai, B. K., Naruka, M. S., &
Kumar, D. (2022). Simulation of the Lightweight Blockchain
Technique Based on Privacy and Security for Healthcare Data for the
Cloud System. International Journal of E-Health and Medical
Communications (IJEHMC), 13(4), 1-15.
[14] Alatawi, M., & Saxena, N. (2022, November). Exploring Encrypted
Keyboards to Defeat Client-Side Scanning in End-to-End Encryption
Systems. In International Conference on Information Security and
Cryptology (pp. 100-123). Cham: Springer Nature Switzerland.
[15] Kanaoka, A. (2023, July). (I Can’t Get No) Satisfaction: On the
Existence of Satisfaction as a Component of Usable Security and
Privacy. In International Conference on Human-Computer
Interaction (pp. 78-89). Cham: Springer Nature Switzerland.
[16] Tiwari, M., Kumar, S., Kumar, B., & Tripathi, R. A. (2023). Wireless
Communication. Booksclinic Publishing.
6
Authorized licensed use limited to: Jain University. Downloaded on March 15,2024 at 05:16:20 UTC from IEEE Xplore. Restrictions apply.
ResearchGate has not been able to resolve any citations for this publication.
Chapter
Full-text available
Emails have improved our workplace efficiency and communication. However, they are often processed unencrypted by mail servers, leaving them open to data breaches on a single service provider. Public-key based solutions for end-to-end secured email, such as Pretty Good Privacy (PGP) and Secure/Multipurpose Internet Mail Extensions (S/MIME), are available but are not widely adopted due to usability obstacles and also hinder processing of encrypted emails. We propose PrivMail, a novel approach to secure emails using secret sharing methods. Our framework utilizes Secure Multi-Party Computation techniques to relay emails through multiple service providers, thereby preventing any of them from accessing the content in plaintext. Additionally, PrivMail supports private server-side email processing similar to IMAP SEARCH, and eliminates the need for cryptographic certificates, resulting in better usability than public-key based solutions. An important aspect of our framework is its capability to enable third-party searches on user emails while maintaining the privacy of both the email and the query used to conduct the search. To evaluate our solution, we benchmarked transfer and search operations using the Enron Email Dataset and demonstrate that PrivMail is an effective solution for enhancing email security.
Article
Full-text available
Security knowledge is one of the foremost challenges in the present day. When the topic is about Information security, the concept of cryptography comes into the picture. Every day, people and organizations use cryptography to maintain the confidentiality of their communications and data as well as to preserve their privacy. Today, one of the most successful methods used by businesses to protect their storage systems, whether at rest or in transit, is cryptography. Yet, cryptography is an effective technique to secure the data, the modern technology can break the cryptographic techniques. But some data encryption algorithms are several times stronger than today's conventional cryptography and can be constructed using quantum computing. They are "Quantum Cryptographic Algorithms ". Quantum cryptography uses the rules of quantum physics instead of classical encryption, which is based on mathematics, to protect and transmit data in a way that cannot be intercepted. Quantum key distribution is the greatest illustration of quantum cryptography and offers a safe solution to the key exchange issue. The proposed work deals with quantum cryptography and mainly focuses on how the quantum cryptographic algorithm is more secure than traditional cryptography.
Research
Full-text available
This study aimed to improve strategies for Electronic Data Interchange (EDI) analysts in healthcare organizations while implementing/using EDI. The development of information technology (IT) has had wide-ranging effects on healthcare organizations. However, there is a lack of good literature on the strategies that EDI analysts need to improve information security. The theoretical tenets of the Technology-Organization-Environment (TOE) framework served as the foundation for this study. This study adopted a qualitative research methodology to determine strategies to overcome the problems with the information security of healthcare organizations from the perspective of EDI professionals in healthcare. The goal is that business operations should not fail while implementing the EDI. The business should run smoothly without any failures and data loss and provide better audit capabilities of EDI communication with trading partners. The literature review of this study examined network and security issues that stem from IT in healthcare organizations. The study population came from twelve participants in the United States who met the requirements of having experience in Electronic Data Interchange and working for healthcare with at least five years and individuals with knowledge of Information security. A total of twelve participants reached saturation in this study, supporting the research questions explored. Future research should explore additional ways that research evaluates risk management in EDI while evaluating security procedures used in healthcare organizations by determining the safeguards employed to protect patient health information. Knowledge is practical and offers guidance for creating new concepts.
Article
Full-text available
This paper proposes a novel context-based network management model for device-to-device (D2D) communication in ultra dense mobile networks. Network management activities, such as bandwidth allocation, interference control, mobility management, resource management, and security management are addressed. To this end, a two-tier structure consisting of a context-aware device layer in the radio access network (RAN) and a centralized application layer is presented. The respective roles of these layers in the management model are discussed in detail. In particular, the context-aware device layer focuses on providing information regarding the application layer, while the application layer is responsible for monitoring of the overall D2D network. Additionally, a resource-efficient management scheme is proposed, based on the context-aware device layer, in order to optimize the bandwidth allocation in the D2D network. This kind of management model allows for the network to be used more effectively in ultra dense mobile systems, as it effectively offloads data traffic from classical cellular systems. Finally, the performance of the proposed network management model is evaluated through simulations.
Article
Full-text available
The fifth generation (5G) cellular wireless communication paradigm is expected to encompass many new technologies, including device-to-device (D2D) wireless communication. In D2D communication, two user devices can communicate directly, without the involvement of a network. Such communication has several advantages, including improved spectral efficiency and user experience. However, for such communication to be an integral part of the 5G network, efficient network management is essential. This paper presents a network management model for D2D communication in 5G networks. The proposed model comprises two parts: the D2D link management (DLM) and the resource management (RM). DLM is responsible for D2D link establishment, monitoring, and optimization. RM is responsible for the allocation of resources among multiple users and services. The model is based on a distributed architecture, with the base station acting as a resource management node. The system performance of the proposed model is evaluated through extensive simulation. The simulation results show that the proposed model can effectively manage D2D links and resources in 5G networks.
Conference Paper
Full-text available
The darkweb is nowadays considered a very popular place to sell and buy illegal cyber-crime related content. From botnet services and malware, to user data such as credit card information and passwords , darkweb marketplaces offer ease of use, product variety, and most importantly effective anonymity to both buyers and vendors. In this paper, we crawl 8 popular darkweb marketplaces and perform a comprehensive quantitative analysis with a focus on cyber-crime related products. Moreover, we report some preliminary findings when examining the same marketplaces through their I2P mirrors. Our results suggest that overall there is a multitude of products that fall into the cyber-crime category, with products under the Fraud category dominating the market, and that the average cyber-crime products' price is relatively low. Furthermore, we explore how the vendors of this specific product group are distributed across platforms, utilizing harvested information such as usernames and PGP keys, and investigate how their reputation scores affect their operation.
Article
Full-text available
Information about healthcare is derived from healthcare data. Healthcare data sharing helps make healthcare systems more efficient as well as improving healthcare quality. Patients should own and control healthcare information, one of their most valuable assets, instead of letting data be spread out among health care providers differ. This protects data from being shared between healthcare systems and privacy. Public ledger accompanied by a decentralized network of peer's compromises patient has been demonstrated to be able to achieve trusted, auditable computing by blockchain. The use of access control and cryptographic primitives are insufficient in addressing modern cyber threats all privacy and security concerns associated with a cloud-based environment. In this paper, the authors proposed a lightweight blockchain technique based on privacy and security for healthcare data for the cloud system. The cost-effectiveness of our system's smart contracts is evaluated, as well as the procedures used for data processing in order to encrypt and pseudonymize patient data.
Chapter
In the ISO definitions of usability, user satisfaction is specified as an element and effectiveness and efficiency. Jakob Nielsen, who is well known for his work on usability in web and UI design, defines satisfaction as one of the five qualitative elements in usability. Whitten and Tygar’s paper, one of the earliest usability studies on usable security, also includes “sufficiently comfortable” as one of the usability definitions for security, which relates to user satisfaction. Although many usable security researches have been conducted and usability evaluations of the proposed methods have been done, most of them have mainly evaluated the effectiveness and efficiency of the proposed methods, and there is a possibility that satisfaction or comfort has not been sufficiently evaluated. Therefore, this paper investigates how satisfaction or comfort is evaluated in usable security research and discusses the results.KeywordsUser acceptance of security and privacy technologiesUsable Security and Privacy
Chapter
End-to-End Encryption (E2EE) aims to make all messages impossible to read by anyone except you and your intended recipient(s). Many well-known and widely used Instant-Messaging (IM) applications (such as Signal, WhatsApp, Apple’s iMessage, and Telegram) claim to provide an E2EE functionality. However, a recent technique called client-side scanning (CSS), which could be implemented by these IM applications, makes these E2EE claims grandiose and hollow promises. The CSS is a technology that scans all sending and receiving messages from one end to the other, including text, images, audio, and video files. Some in industry and government now advocate this CSS technology to combat the growth of malicious child pornography, terrorism, and other illicit communication. Even though combating the spread of illegal and morally objectionable content is a laudable effort, it may open further backdoors that impact the user’s privacy and security. Therefore, it is not end-to-end encryption when there are censorship mechanisms and backdoors in end-to-end encrypted applications. In this paper, we shed light on this hugely problematic issue by introducing an encrypted keyboard that works as a system keyboard and can be enabled on the user’s phone device as a default system keyboard. Therefore, it works on every application on the user’s phone device when the user is asked to enter some data. To avoid the CSS system, users can use this encrypted keyboard to encrypt and decrypt their messages locally on their phone devices when sending and receiving them via IM applications. We first design and implement our encrypted keyboard as a custom keyboard application, and then we evaluate the effectiveness and security of our encrypted keyboard. Our study results show that our encrypted keyboard can successfully encrypt and decrypt all sending and receiving messages through IM applications, and therefore, it can successfully defeat the CSS technology in end-to-end encrypted systems. We also show that our encrypted keyboard can be used to add another layer of E2EE functionality on top of the existing E2EE functionality implemented by many end-to-end encrypted applications.KeywordsEnd-to-end encryptionEncrypted keyboardIM securityClient-side scanning
Article
This article presents the deployment and experimentation architecture of the Aveiro Tech City Living Lab (ATCLL) in Aveiro, Portugal. This platform comprises a large number of Internet-of-things (IoT) devices with communication, sensing and computing capabilities. The communication infrastructure, built on fiber and Millimeter-wave (mmWave) links, integrates a communication network with radio terminals (WiFi, ITS-G5, C-V2X, 5G and LoRa(WAN)), multiprotocol, spread throughout 44 connected points of access in the city. Additionally, public transportation has also been equipped with communication and sensing units. All these points combine and interconnect a set of sensors, such as mobility (radars, light detection and rangings (LiDARs), video cameras) and environmental sensors. Combining edge computing and cloud management to deploy the services and manage the platform, and a data platform to gather and process the data, the living lab supports a wide range of services and applications: IoT, intelligent transport systems (ITSs) and assisted driving, environmental monitoring, emergency and safety, among others. This article describes the architecture, implementation and deployment to make the overall platform to work and integrate researchers and citizens. Moreover, it showcases some examples of the performance metrics achieved in the city infrastructure, the data that can be collected, visualized and used to build services and applications to the cities, and, finally, different use cases in the mobility and safety scenarios.