-
Open Access Article
1 - Energy-efficient and Privacy preserving Data Aggreration in wireless sensor networks
zahra zareEnergy consumption is ranked among the major problems of research in wireless sensor networks(WSNs). The main reason for nodes failure is the discharge of batteries in sensor networks. Therefore, energy consumption plays an important role in wireless sensor networks. Da MoreEnergy consumption is ranked among the major problems of research in wireless sensor networks(WSNs). The main reason for nodes failure is the discharge of batteries in sensor networks. Therefore, energy consumption plays an important role in wireless sensor networks. Data aggregation can greatly help to reduce this consumption by eliminating redundant data, and using clustering methods for data aggregation helps to further reduce energy consumption. Sensor nodes are prone to node compromise attacks which cause an adversary to change the aggregation result and inject false data into the WSN, hence security issues such as data confidentiality and integrity are extremely important. Because both data aggregation and security are critical for wireless sensor networks, achieving secure data aggregation that protects integrity is a critical issue. In this paper, we present a secure data aggregation method called Energy-Efficient and Privacy-Preserving Data Aggregation using our clustering algorithm which is an improvement on LEACH protocol and Homomorphic Encryption technique. Manuscript profile -
Open Access Article
2 - Design of FPGA-based processor for SHA-2 series cryptographic algorithms Design ترجمههای design اسمفراوانی طرح plan, design, layout, project, scheme, plot نقشه map, plan, plot, scheme, plat, chart زمینه background, context, ground, setting, base, terrain تدبیر measure, plan, contraption, gimmick, contrivance, scheme قصد intention, intent, purpose, attempt, will, determination طراح ریزی design خیال imagination, phantom, illusion, thought, fiction, mind فعل طرح کردن design, plan, draft, draw, lay, bring forth قصد کردن attempt, decide, design, meditate تخصیص دادن allot, allocate, apportion, consecrate, give, design تدبیر کردن devise, contrive, meditate, compass, machinate, design تعریفهای design اسم ۱ a plan or drawing produced to show the look and function or workings of a building, garment, or other object before it is built or made. he has just unveiled his design for the new museum مترادفها: planblueprintdrawingscale drawingsketchoutlinemapplotdiagramdelineationdraftdepictionrepresentationartist's impressionschememodelprototypeproposal ۲ an arrangement of lines or shapes created to form a pattern or decoration. pottery with a lovely blue and white design مترادفها: patternmotifdevicestylearrangementcompositionmakeuplayoutconstitutionconfigurationorganizationconstructionshapeformformationfigure purpose, planning, or intention that exists or is thought to exist behind an action, fact, or material object. the appearance of design in the universe مترادفها: intentionaimpurposeplanintentobjectiveobjectgoalendtargetpointhopedesirewishdreamaspirationambitionidea فعل ۱ decide upon the look and functioning of (a building, garment, or other object), by making a detailed drawing of it. a number of architectural students were designing a factory مترادفها: plandraw plans ofdrawsketchoutlinemap outplotblock outdelineatedraftdepictinventoriginatecreatethink upcome up withdeviseformformulateconceivemakeproducedevelopfashionfabricateforgehatchcoindream up مترادف design اسم planpatternintention فعل planinventdream upintend ۹۱ مترادف دیگر
neda sedghahrabi Mohammad Ali Jabraeil JamaliSecure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the MoreSecure decryption algorithms are a type of cryptographic algorithms whose importance in today's society has been highlighted by applications such as the use of personal digital tools to maintain confidentiality. On the other hand, with the advancement of technology, the need to implement these algorithms on flexible platforms can be challenging. Reducing the area and speeding up the execution of operations are the main challenges for designing and implementing these algorithms. This paper proposes a new architecture for the FPGA-based processor for SHA-2 series cryptographic algorithms. In the proposed processor, the use of memory units and multi-port data path, followed by parallel processor performance, has reduced the use of resources and increased the speed of data processing. Processor architecture for SHA-2 cryptographic algorithms is modeled in VHDL and implemented on the FPGA platform in the Virtex series by ISE software. Implementation results show that the proposed compact processor compared to previous tasks with similar objectives, was able to increase the operating frequency for the SHA-256 cryptographic algorithm by 25% and occupy 55% less space for the SHA-512 cryptographic algorithm to the desired level of operational power and efficiency. Also maintain. The proposed processor is suitable for applications such as trusted mobile platforms (TMP), digital currency (Bitcoin) and secure on-chip network routing (NoC). Manuscript profile -
Open Access Article
3 - A Novel Method for Image Encryption Using Modified Logistic Map
ardalan Ghasemzadeh Omid R.B. SpeilyWith the development of the internet and social networks, the interest on multimedia data, especially digital images, has been increased among scientists. Due to their advantages such as high speed as well as high security and complexity, chaotic functions have been ext MoreWith the development of the internet and social networks, the interest on multimedia data, especially digital images, has been increased among scientists. Due to their advantages such as high speed as well as high security and complexity, chaotic functions have been extensively employed in images encryption. In this paper, a modified logistic map function was proposed, which resulted in higher scattering in obtained results. Confusion and diffusion functions, as the two main actions in cryptography, are not necessarily performed respectively, i.e. each of these two functions can be applied on the image in any order, provided that the sum of total functions does not exceed 10. In calculation of sum of functions, confusion has the coefficient of 1 and diffusion has the coefficient of 2. To simulate this method, a binary stack is used. Application of binary stack and pseudo-random numbers obtained from the modified chaotic function increased the complexity of the proposed encryption algorithm. The security key length, entropy value, NPCR and UICA values and correlation coefficient analysis results demonstrate the feasibility and validity of the proposed method. Analyzing the obtained results and comparing the algorithm to other investigated methods clearly verified high efficiency of proposed method. Manuscript profile -
Open Access Article
4 - Design of a New Format-Compliant Partial Encryption Scheme for H.264 Video Design of a New Format-Compliant Partial Encryption Scheme for H.264 Video
S. Rasoolifar M. KhademiH.264 is the latest video compression standard and its compression efficiency is twice as much as previous standards. Due to the advantages of this standard and its widespread use in various video applications, the protection of this standard has become necessary. In th MoreH.264 is the latest video compression standard and its compression efficiency is twice as much as previous standards. Due to the advantages of this standard and its widespread use in various video applications, the protection of this standard has become necessary. In this paper, a new partial encryption scheme is presented for H.264 video which keeps the video format unchanged. In this method, parameters with high sensitivity to H.264 video texture and motion components are encrypted during compression. That is, such parameters as Intra4x4PredMode, Intra Residual Data, Ref-Index and MVD are encrypted using stream ciphers. This encryption scheme obtains high encryption efficiency through reducing the encrypted data volume along with high perceptual security. In addition to these properties, parameter selection and encryption in the proposed method is implemented in a way that the encrypted video format is kept compliant and thus can be utilized in different applications such as commercial and entertainment applications. Manuscript profile -
Open Access Article
5 - Improve Identity-based Encryption Algorithm and Its Productivity in Providing Privacy of Cloud-Based Electronic Health Systems
M. Alipour Sh. Bakhtiari Chehelcheshmeh Sh. HeidarianIn this paper, a new method of identity-based encryption is first presented, and it is shown that there is less computational overhead than previous methods. In this regard, the proposed identity-based encryption method is simulated, and the results are compared with th MoreIn this paper, a new method of identity-based encryption is first presented, and it is shown that there is less computational overhead than previous methods. In this regard, the proposed identity-based encryption method is simulated, and the results are compared with the superior representatives of the identity-based encryption. Then, a cloud-based electronic health system (EHS) is proposed using the re-encryption proxy and the identity-based encryption method presented in this paper. In addition to providing confidentiality and enhancing accessibility, the system has a lower running time in the phases of setup, private key generation, encryption, re-encryption key generation, and decryption — this resulting in lower costs and overhead of the cryptographic process in the Electronics health system. Manuscript profile -
Open Access Article
6 - Maintaining Confidentiality and Integrity of Data and Preventing Unauthorized Access to DICOM Medical Images
Mohammad Soltani Hassan Shakeri Mahboobeh HoushmandWith the development of telecommunication and communication technologies, especially wireless communications, information cryptography is one of the communication necessities. Today, cryptographic algorithms are used to increase security and prevent DICOM medical images MoreWith the development of telecommunication and communication technologies, especially wireless communications, information cryptography is one of the communication necessities. Today, cryptographic algorithms are used to increase security and prevent DICOM medical images from unauthorized access. It should be noted that changes in DICOM medical images will cause the doctor to misdiagnose the patient's treatment process. In this paper, a type of hybrid cryptographic algorithms is designed. In the proposed algorithm, DNA encryption algorithm is used to encrypt DICOM images and patient biometric information such as fingerprint or iris image is used to make digital signature and validate DICOM medical images. The designed encryption algorithm is resistant to brute force attacks and the entropy of the encrypted DICOM images is above 7.99. Manuscript profile