期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Novel Homomorphic Encryption for Mitigating Impersonation Attack in Fog Computing
1
作者 v.balaji P.Selvaraj 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2015-2027,共13页
Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probab... Fog computing is a rapidly growing technology that aids in pipelining the possibility of mitigating breaches between the cloud and edge servers.It facil-itates the benefits of the network edge with the maximized probability of offering interaction with the cloud.However,the fog computing characteristics are suscep-tible to counteract the challenges of security.The issues present with the Physical Layer Security(PLS)aspect in fog computing which included authentication,integrity,and confidentiality has been considered as a reason for the potential issues leading to the security breaches.In this work,the Octonion Algebra-inspired Non-Commutative Ring-based Fully Homomorphic Encryption Scheme(NCR-FHE)was proposed as a secrecy improvement technique to overcome the impersonation attack in cloud computing.The proposed approach was derived through the benefits of Octonion algebra to facilitate the maximum security for big data-based applications.The major issues in the physical layer security which may potentially lead to the possible security issues were identified.The potential issues causing the impersonation attack in the Fog computing environment were identified.The proposed approach was compared with the existing encryption approaches and claimed as a robust approach to identify the impersonation attack for the fog and edge network.The computation cost of the proposed NCR-FHE is identified to be significantly reduced by 7.18%,8.64%,9.42%,and 10.36%in terms of communication overhead for varying packet sizes,when compared to the benchmarked ECDH-DH,LHPPS,BF-PHE and SHE-PABF schemes. 展开更多
关键词 Fog computing physical layer security non-commutative ring-based fully homomorphic encryption impersonation attack
下载PDF
Nasopharyngeal colonization of otopathogens in South Indian children with acuteotitis media -- A case control pilot study 被引量:1
2
作者 M.Napolean V.Rosemol +4 位作者 M.John A.M.Varghese J.Periyasamy v.balaji P.Naina 《Journal of Otology》 CSCD 2021年第4期220-224,共5页
Background: Acute otitis media (AOM) is an inflammatory disease of the middle ear causing significantmorbidity in early childhood. A pilot study was undertaken to identify the role of various risk factorsSouth Indian ... Background: Acute otitis media (AOM) is an inflammatory disease of the middle ear causing significantmorbidity in early childhood. A pilot study was undertaken to identify the role of various risk factorsSouth Indian children with AOM, especially the role of nasopharyngeal otopathogens.Methodology: A prospective case control pilot study was conducted in children aged below six years,presenting to a single tertiary care from 2018 to 2019. Fifty cases with AOM and 45 age and gendermatched controls were recruited. Two nasopharyngeal swabs were collected, one was processed forbacterial culture. The other swab was processed according to the CDC recommended broth enrichmentmethod to identify carriage of S. pneumoniae. Subsequent serotyping was done by Quellung method andconventional sequential multiplex PCR.Result: Otalgia was the major presentation seen in 92% of the children with AOM. None of the clinical anddemographic characteristics were found to be statistically significant between the cases and controls. Themost common otopathogen was S. pneumoniae (55%) followed by H. influenza (29%). The commonS. pneumoniae serotypes encountered were 11A and 19F.Nasopharyngeal colonization with S. pneumoniae[OR 6.57, p < 0.003] and H. influenzae [OR14.18, p < 0.003] were significant risk factors for AOM inchildren. The risk increased with co-colonization (OR 13.89,p < 0.003).Conclusion: This study strengthens the significant association between nasopharyngeal colonization ofotopathogens and AOM as a risk factor that is enhanced by co-colonization.S. pneumoniae was the mainotopathogen in this population, serotypes 11A and 19F being the most common. 展开更多
关键词 Acute otitis media NASOPHARYNGEAL Otopathogens Case control study Streptococcus pneumoniae Haemophilus influenzae Moraxella catarrhalis Staphylococcus aureus
下载PDF
Gray-Hole Attack Minimization in IoMT with 5G Based D2D Networks
3
作者 v.balaji P.Selvaraj 《Computer Systems Science & Engineering》 SCIE EI 2022年第9期1289-1303,共15页
Reliable transmission is vital to the success of the next generation ofcommunications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit fr... Reliable transmission is vital to the success of the next generation ofcommunications technologies and Fifth Generation (5G) networks. Many sensitive applications, such as eHealth and medical services, can benefit from a 5G network. The Internet of Medical Things (IoMT) is a new field that fosters themaintenance of trust among various IoMT Device to Device (D2D) modern technologies. In IoMT the medical devices have to be connected through a wirelessnetwork and constantly needs to be self-configured to provide consistent and effi-cient data transmission. The medical devices need to be connected with sophisticated protocols and architecture to handle the synergy of the monitoring devices.Today, one of the commonly used algorithms in D2D communication is the Optimized Link State Routing protocol (OLSR). The OLSR is considerably good ateffectively utilizing the bandwidth and reserving the paths. One of the majorattack against the OLSR is the Node isolation attack, also known as the Gray holedenial of service attack. The Gray hole attack exploits the vulnerabilities presentwith sharing the topological information of the network. The attackers may usethis topological information to maliciously disconnect the target nodes from theexisting network and stops rendering the communication services to the victimnode. Hence, considering the sensitivity and security concerns of the data usedin e-Health applications, these types of attacks must be detected and disabledproactively. In this work, a novel Node Authentication (NA) with OLSR is proposed. The simulation experiments illustrated that the proposed protocol has anexcellent Packet Delivery Ratio, minimal End-End delay, and minimal Packet losswhen compared to the Ad-hoc On-Demand Distance Victor (AODV) protocol andthe proposed authentication scheme was able to protect the OLSR protocol from anode isolation attack. 展开更多
关键词 5G AODV D2D IoMT OLSR security issues
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部