Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Susila Windarta"'
Autor:
Susila Windarta, Suryadi Suryadi, Kalamullah Ramli, Andriani Adi Lestari, Wildan Wildan, Bernardi Pranggono, Rini Wisnu Wardhani
Publikováno v:
IEEE Access, Vol 11, Pp 84074-84090 (2023)
With the enormous growth in Internet of Things (IoT) applications, the volume of data shared among IoT devices is vastly increasing. Extensive IoT device connectivity and substantial data transmission have made information integrity susceptible to va
Externí odkaz:
https://doaj.org/article/9cc92d0ab6e548be822c1fd127fc2e88
Publikováno v:
IEEE Access, Vol 11, Pp 42644-42659 (2023)
Data breaches are becoming an increasingly prevalent and global concern due to their massive impact. One of the primary challenges in investigating data breach incidents is the unavailability of a specific framework that acknowledges the characterist
Externí odkaz:
https://doaj.org/article/c1dd9d73fd004caaaa6e197fd22267aa
Publikováno v:
IEEE Access, Vol 10, Pp 18807-18819 (2022)
A long-range wide area network (LoRaWAN) has a weakness in terms of key management: its root key is static, meaning that it never changes. Since all cryptographic keys are derived from the root key, such a weakness endangers LoRaWAN security. This pa
Externí odkaz:
https://doaj.org/article/4c85c7cb9be94989a5294dddc6a73777
Publikováno v:
IEEE Access, Vol 10, Pp 82272-82294 (2022)
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amounts of data to be connected. Therefore, IoT security has fundamental requirements. One critical aspect of IoT security is data integrity. Cryptograph
Externí odkaz:
https://doaj.org/article/8954b0991d87417d90472ab90a516623
Publikováno v:
IEEE Access, Vol 10, Pp 89696-89713 (2022)
This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key updating scheme to enhance the security of LoRaWAN with cost-effective communication that provides a unique key for each communication session. The scheme consists of thre
Externí odkaz:
https://doaj.org/article/ea0a156d412841adb1e31cc8fbbd4954
Publikováno v:
IEEE Access. 10:89696-89713
This paper proposes a novel Long-range Wide Area Network (LoRaWAN) session key updating scheme to enhance the security of LoRaWAN with cost-effective communication that provides a unique key for each communication session. The scheme consists of thre
Publikováno v:
IEEE Access. 10:18807-18819
Publikováno v:
2020 1st International Conference on Information Technology, Advanced Mechanical and Electrical Engineering (ICITAMEE).
Message Authentication Code (MAC) is a cryptographic hash function that uses the cryptographic key(s) to generate a MAC value or a tag. MAC security property that must be satisfied is the second preimage resistance; given an input, it is difficult to
Autor:
Susila Windarta, Y. S. Sofu Risqi
Publikováno v:
2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA).
In this paper, a comparison of three Pseudo Random Number Generator (PRNG) based on SIMON-64, SPECK-64 and SIMECK-64 using PGV-5 scheme is presented. We use NIST randomness test suites sts-2.1.1 which consists of 15 statistical tests. According to th
Publikováno v:
Procedia Computer Science. 72:292-299
Block cipher-based hash function is a hash function that is constructed by applying a block cipher algorithm on a scheme to form a hash algorithm. So that the strength of the block cipher-based hash function depends on the strength of a block cipher