Full Paper View Go Back
A Recent Study on Security Techniques of Information Communication Systems
Joydeep Dey1 , Sunil Karforma2
Section:Review Paper, Product Type: Journal-Paper
Vol.10 ,
Issue.4 , pp.77-83, Apr-2024
Online published on Apr 30, 2024
Copyright © Joydeep Dey, Sunil Karforma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Joydeep Dey, Sunil Karforma, “A Recent Study on Security Techniques of Information Communication Systems,” International Journal of Scientific Research in Multidisciplinary Studies , Vol.10, Issue.4, pp.77-83, 2024.
MLA Style Citation: Joydeep Dey, Sunil Karforma "A Recent Study on Security Techniques of Information Communication Systems." International Journal of Scientific Research in Multidisciplinary Studies 10.4 (2024): 77-83.
APA Style Citation: Joydeep Dey, Sunil Karforma, (2024). A Recent Study on Security Techniques of Information Communication Systems. International Journal of Scientific Research in Multidisciplinary Studies , 10(4), 77-83.
BibTex Style Citation:
@article{Dey_2024,
author = {Joydeep Dey, Sunil Karforma},
title = {A Recent Study on Security Techniques of Information Communication Systems},
journal = {International Journal of Scientific Research in Multidisciplinary Studies },
issue_date = {4 2024},
volume = {10},
Issue = {4},
month = {4},
year = {2024},
issn = {2347-2693},
pages = {77-83},
url = {https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=3456},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=3456
TI - A Recent Study on Security Techniques of Information Communication Systems
T2 - International Journal of Scientific Research in Multidisciplinary Studies
AU - Joydeep Dey, Sunil Karforma
PY - 2024
DA - 2024/04/30
PB - IJCSE, Indore, INDIA
SP - 77-83
IS - 4
VL - 10
SN - 2347-2693
ER -
Abstract :
Data security is a vital and challenging issue in this digitally revolutionary generation. Due to the attackers presence inside the open networks it is mandatory to protect any data before its transmission. Any online message communication must be ensured through cryptographic applications. Cryptographic applications are used to convert the plain text into cipher text by the sender and vice – versa by the receiver. In this paper, a recent study on the secure information communication had been conducted. The authors had reviewed twenty one research papers on the relevant cryptographic topics. Such papers were categorically divided into three sections. They are: cryptographic features, soft computing, and hybrid mode of encryption. It was observed that genetic algorithm, artificial neural network, fuzzy inference, etc were applied to ensure the data encryption technique. Soft computing is one of the major effective tools to generate secret key. The computing time calculation was tried to reduce by different authors through such techniques. Various mathematical tests were conducted by several authors.
Key-Words / Index Term :
Cryptography, Data Security, Online Systems, Encryption, Decryption, Secret Key
References :
[1] Joel J. P. C. Rodrigues, Dante Borges De Rezende Segundo, Heres Arantes Junqueira, Murilo Henrique Sabino, Rafael Maciel Prince , Jalal Al-Muhtadi , Victor Hugo C. De Albuquerque, “Enabling technologies for the internet of health things”, IEEE Access, Vol 6:13129–13141, 2016.
[2] Geeta Sharma, Sheetal Kalra, ‘‘A lightweight user authentication scheme for cloud-IoT based healthcare services,’’ Iranian J. Sci. Technol., Trans. Electr. Eng., vol. 43, no. S1, pp. 619–636, Jul. 2019.
[3] Bruce Schneier, “Applied Cryptography”, John Wiley & Sons Inc., New York, USA, 2nd edition, 1996.
[4] Ching-Kun Chen, Chung-Liang Lin, Shan Lung Lin, “Data Encryption and Transmission Based on Personal ECG Signals”, International Journal of Sensor Networks and Data Communications, Vol 4, Issue-2: pp:1-13, 2015.
[5] Muhammad Umair Shaikh, Siti Anom Ahmad, Wan Azizun Wan Adnan, “Investigation of Data Encryption Algorithm for Secured Transmission of Electrocardiograph (ECG) Signal”, IEEE-EMBS Conference on Biomedical Engineering and Sciences (IECBES), Sarawak, Malaysia, pp: 274-278, 2018.
[6] Andreea Bianca Popescu et al., “Privacy Preserving Classification of EEG Data Using Machine Learning and Homomorphic Encryption” , Applied Science, Vol: 11, Issue:16, pp: 7360, 2021.
[7] Dheeru Dua, Claus Graff, “UCI Machine Learning Repository”, 2017, Available online: http://archive.ics.uci.edu/ml (accessed on 21 December 2023).
[8] Seunghwan Son , Joonyoung Lee, Myeonghyun Kim, Sungjin Yu, Ashok Kumar Das, Youngho Park, “Design of secure authentication protocol for cloud- assisted telecare medical information system using blockchain”, IEEE Access ,Vol 8, pp: 192177–192191, 2020.
[9] Aiqing Zhang , Xiaodong Lin., “Towards Secure and Privacy-Preserving Data Sharing in e-Health Systems via Consortium Blockchain”, Journal of Medical Systems, vol 42, pp:140, 2018.
[10] Xiaodong Yang, Ting Li , Xizhen Pei, Long Wen, Caifen Wang, ‘‘Medical data sharing scheme based on attribute cryptosystem and blockchain technology,’’ IEEE Access, vol. 8, pp. 45468–45476, 2020.
[11] Gayathri Nagasubramanian, Rakesh Kumar Sakthivel, Rizwan Patan, Amir H. Gandomi, Muthuramalingam Sankayya, Balamurugan Balusamy, “Securing e-health records using keyless signature infrastructure blockchain technology in the cloud”, Neural Computing & Applications, Vol 32, pp:639–647, 2020.
[12] Esther Cubo , Pedro David Delgado-López, “Telemedicine in the Management of Parkinson’s Disease: Achievements, Challenges, and Future Perspectives”, Brain Science, Vol 12, pp: 1735, 2022.
[13] Manogaran Madhiarasan, Mohamed Louzazni, “Analysis of Artificial Neural Network: Architecture, Types, and Forecasting Applications”, Journal of Electrical and Computer Engineering, vol. 2022, pp: 23, 2022.
[14] Sebastian-Camilo Vanegas-Ayala, Julio Barón-Velandia, Daniel-David Leal-Lara, "Predictive Model of Humidity in Greenhouses through Fuzzy Inference Systems Applying Optimization Methods", Advances in Fuzzy Systems, vol. 2023, pp: 22, 2023.
[15] Jennifer L Raymond , Javier F Medina, “Computational Principles of Supervised Learning in the Cerebellum”, Annual Review of Neuroscience, Vol 41, pp: 233– 253, 2018.
[16] Hua Chai, Yong Liang, Sai Wang, Hai-wei Shen., “A Novel Logistic Regression Model Combining Semi- Supervised Learning and Active Learning for Disease Classification:, Scientific Reports, Vol 8, pp: 13009, 2018.
[17] Amit Kumar Das, Dilip Kumar Pratihar, "A Direction-Based Exponential Mutation Operator for Real-Coded Genetic Algorithm," 2018 Fifth International Conference on Emerging Applications of Information Technology (EAIT), Kolkata, India, pp: 1-4, 2018.
[18] Abid Hussain, Yousaf Shad Muhammad, M. Nauman Sajid, Ijaz Hussain, Alaa Mohamd Shoukry, Showkat Gani , “Genetic algorithm for traveling salesman problem with modified cycle crossover operator”, Computational Intelligence and Neuroscience, Vol 2017, pp:1–7, 2017.
[19] Muhammad Junaid Arshad, Muhammad Umair, Saima Munawar, Nasir Naveed, Humaira Naeem, “Improving Cloud Data Encryption Using Customized Genetic Algorithm”. International Journal of Intelligent Systems and Applications, Vol 12, pp:46-63, 2020.
[20] Pooja Bagane, Deepak Dharrao, S. Kotrappa, “Multilevel Approach for Cryptography using Genetic Algorithms with Existing S-DES Key Generation Method”, Int J Intelligent Systems and Applications in Engineering, vol. 10, issue. 4, pp: 701–706, 2022.
[21] Sania Jawaid, Anam Saiyeda, Naba Suroor, “Selection of Fittest Key Using Genetic Algorithm and Autocorrelation in Cryptography”, Journal of Computer Sciences and Applications, Vol 3, issue 2, pp: 46-51, 2015.
[22] Sania Jawaid, Jamal Adeeba, “Generating the Best Fit Key in Cryptography using Genetic Algorithm”, International Journal of Computer Applications, Vol 98, pp: 33-39, 2014.
[23] Paulo Vitor Campos Souza, Fonda, Augusto Junio Guimarães, Thiago Silva Rezende, Vinicius Jonathan Silva Araujo, Vanessa Souza Araujo, "Detection of Anomalies in Large-Scale Cyberattacks Using Fuzzy Neural Networks" AI, Vol 1, issue 1, pp: 92-116, 2020.
[24] Garima Jain, “Genetic Algorithms with Cloud Computing for Data Security & Performance Enhancements”, Journal of Education: Rabindrabharati University, Vol XXIII, i ssue 11, pp:21-29, 2021.
[25] Mortada M. Abdulwahab, Khalid H. Ahmed, Hamza M. Al-mehrabi, Mohammed A. Al-kateb, Yazid A. Al-mezgagi, Jwher Y. Al-rashdi, "Design of Wireless Monitoring System of Body Health Using Electronic Face Mask," World Academics Journal of Engineering Sciences, Vol. 9, issue.2, pp.46-51, 2022.
[26] Mortada M. Abdulwahab1, Abdalrhman A. Mohammed, Abdalrhman H. Mohammed, Mohammed M. Hamza, "Design of Wireless Sensor System of Monitoring and Controlling Parking Cars," World Academics Journal of Engineering Sciences, Vol.9, issue.1, pp.18-22, 2022.
You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at support@isroset.org or view contact page for more details.