Dynamic Key Generation Mechanism to Strengthen the Data Security

被引:0
作者
Prasath, J. S. [1 ]
Jose, Deepa [2 ]
Rammyaa, B. [2 ]
Pandian, R. [3 ]
机构
[1] KCG Coll Technol, Dept EEE, Chennai 600097, Tamil Nadu, India
[2] KCG Coll Technol, Dept ECE, Chennai 600097, Tamil Nadu, India
[3] Sathyabhama Inst Sci & Technol, Dept EEE, Chennai 600119, Tamil Nadu, India
来源
2021 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST) | 2021年
关键词
Data Security; Encryption; Decryption; Key generation; Key management; Modified Cryptography; WIRELESS SENSOR NETWORKS; MANAGEMENT;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Information Technology (IT) networks are susceptible to varieties of intrusions. Data communication through industrial networks needs to be protected from unauthorized access. The number of attacks increases rapidly due to the wide range of network operations. Industrial networks provide a connection between servers and control devices, which are located at the plant. The security attacks rises due to the wide usage of internet for accessing and monitoring the plant information. It is essential to preserve data communication in process monitoring and control operations. This proposed work is the novel dynamic key generation algorithm that generates different keys each time during the process of encoding. The security mechanism is developed that enhances the security and protects the information from unauthorized access. This security algorithm is developed and simulated using MATLAB software. This proposed cryptographic algorithm can perform encryption of the infinite number of bytes which provides additional network security. It can be applicable for securing the sensitive process parameters in industrial operations..
引用
收藏
页数:9
相关论文
共 24 条
[1]   An Efficient Data-Driven Clustering Technique to Detect Attacks in SCADA Systems [J].
Almalawi, Abdulmohsen ;
Fahad, Adil ;
Tari, Zahir ;
Alamri, Abdullah ;
AlGhamdi, Rayed ;
Zomaya, Albert Y. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) :893-906
[2]   A Highly Scalable Key Pre-Distribution Scheme for Wireless Sensor Networks [J].
Bechkit, Walid ;
Challal, Yacine ;
Bouabdallah, Abdelmadjid ;
Tarokh, Vahid .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2013, 12 (02) :948-959
[3]   A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography [J].
Boudia, Omar Rafik Merad ;
Senouci, Sidi Mohammed ;
Feham, Mohammed .
AD HOC NETWORKS, 2015, 32 :98-113
[4]   Review of Security Issues in Industrial Networks [J].
Cheminod, Manuel ;
Durante, Luca ;
Valenzano, Adriano .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :277-293
[5]   Formal Vulnerability Analysis of a Security System for Remote Fieldbus Access [J].
Cheminod, Manuel ;
Pironti, Alfredo ;
Sisto, Riccardo .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (01) :30-40
[6]   Secure embedded system hardware design - A flexible security and trust enhanced approach [J].
Fournaris, Apostolos P. ;
Sklavos, Nicolas .
COMPUTERS & ELECTRICAL ENGINEERING, 2014, 40 (01) :121-133
[7]   Dynamic key management in wireless sensor networks: A survey [J].
He, Xiaobing ;
Niedermeier, Michael ;
de Meer, Hermann .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) :611-622
[8]   Dynamic security management for real-time embedded applications in industrial networks [J].
Jiang, Wei ;
Ma, Yue ;
Sang, Nan ;
Zhong, Ziguo .
COMPUTERS & ELECTRICAL ENGINEERING, 2015, 41 :86-101
[9]   Measurement-based research on cryptographic algorithms for embedded real-time systems [J].
Jiang, Wei ;
Guo, Zhenlin ;
Ma, Yue ;
Sang, Nan .
JOURNAL OF SYSTEMS ARCHITECTURE, 2013, 59 (10) :1394-1404
[10]   Node capture attack detection and defence in wireless sensor networks [J].
Jokhio, S. H. ;
Jokhio, I. A. ;
Kemp, A. H. .
IET WIRELESS SENSOR SYSTEMS, 2012, 2 (03) :161-169