000 -LEADER |
fixed length control field |
14485cam a22004697a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
CITU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20240512154016.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr aa aaaaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
240512b ||||| |||| 00| 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2019045372 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781119555643 |
Qualifying information |
(hardback) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781119555766 |
Qualifying information |
(adobe pdf) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Cancelled/invalid ISBN |
9781119555742 |
Qualifying information |
(epub) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Description conventions |
rda |
Transcribing agency |
DLC |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
eng |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 00 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
TK5105.59 |
Item number |
.D468 2020 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
245 00 - TITLE STATEMENT |
Title |
Design and analysis of security protocol for communication / |
Statement of responsibility, etc |
edited by Dinesh Goyal, A. Balamurigan, Sheng-Lung Peng and O. P. Verma. |
250 ## - EDITION STATEMENT |
Edition statement |
First edition. |
263 ## - PROJECTED PUBLICATION DATE |
Projected publication date |
1911 |
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Hoboken, New Jersey : |
Name of publisher, distributor, etc |
John Wiley & Sons, Inc. ; |
Place of publication, distribution, etc |
Salem, Massachusetts : |
Name of publisher, distributor, etc |
Scrivener Publishing LLC, |
Date of publication, distribution, etc |
[2020] |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
505 0# - CONTENTS |
Formatted contents note |
Table of Contents<br/>Preface xiii<br/><br/>1 History and Generations of Security Protocols 1<br/>Bright Keswani, Poonam Keswani and Rakhi Purohit<br/><br/>1.1 Introduction 2<br/><br/>1.2 Network Security 2<br/><br/>1.3 Historical Background of Network Security and Network Timeline 4<br/><br/>1.4 Internet Architecture and Security Aspects 5<br/><br/>1.4.1 IPv4 and IPv6 Architecture 6<br/><br/>1.4.1.1 Structure of IPv4 6<br/><br/>1.4.1.2 IPv6 Architecture 7<br/><br/>1.4.2 Attack Through IPv4 8<br/><br/>1.4.2.1 Internet Attacks Common Methods 8<br/><br/>1.4.2.2 Internet Security Technology 10<br/><br/>1.4.3 IPv6 IP Security Issues 11<br/><br/>1.5 Different Aspects of Security of the Network 12<br/><br/>1.6 Evolution of Security Protocols for Network 13<br/><br/>1.6.1 Understanding the Key Components of Network Security 13<br/><br/>1.6.2 A Deep Defense Strategy 14<br/><br/>1.6.3 How Does the Next Generation Network Security System Work Best 15<br/><br/>1.7 Network Security Protocols 17<br/><br/>1.7.1 Application Layer 17<br/><br/>1.7.1.1 Good Privacy (PGP) 17<br/><br/>1.7.1.2 Email/Multipurpose Security (S/MIME) 18<br/><br/>1.7.1.3 HTTP Secure (S-HTTP) 18<br/><br/>1.7.1.4 Hypertext Transfer Protocol (HTTPS) in Secure Sockets Layer 19<br/><br/>1.7.1.5 Secure E-Commerce (SET) 19<br/><br/>1.7.1.6 Kerberos 19<br/><br/>1.7.2 Transport Layer 20<br/><br/>1.7.2.1 Secure Sockets Layer (SSL) 20<br/><br/>1.7.2.2 Transport Layer Security (TLS) 21<br/><br/>1.7.3 Network Layer 21<br/><br/>1.7.3.1 Internet Protocol Security (IPSec) 22<br/><br/>1.7.3.2 Virtual Private Network (VPN) 23<br/><br/>1.7.4 Data Link Layer 24<br/><br/>1.7.4.1 Point-to-Point Protocol (PPP) 24<br/><br/>1.7.4.2 Remote Authentication User Service (RADIO) 24<br/><br/>1.7.4.3 Terminal System Access Control Access Control Equipment (TACACS +) 25<br/><br/>1.8 Current Evolution of Red Security 25<br/><br/>1.8.1 Hardware Development 25<br/><br/>1.8.2 Software Development 27<br/><br/>1.9 Future Security Trends 27<br/><br/>References 27<br/><br/>2 Evolution of Information Security Algorithms 29<br/>Anurag Jagetiya and C. Rama Krishna<br/><br/>2.1 Introduction to Conventional Encryption 30<br/><br/>2.2 Classical Encryption Techniques 31<br/><br/>2.2.1 Substitution Based 32<br/><br/>2.2.1.1 Caesar Cipher 32<br/><br/>2.2.1.2 Monoalphabetic Cipher 32<br/><br/>2.2.1.3 Playfair Cipher 33<br/><br/>2.2.1.4 Polyalphabetic Cipher 35<br/><br/>2.2.2 Transposition Based 36<br/><br/>2.2.2.1 Simple Columnar 36<br/><br/>2.2.2.2 Rail Fence Cipher 37<br/><br/>2.3 Evolutions of Modern Security Techniques 38<br/><br/>2.3.1 Stream Cipher Algorithms 38<br/><br/>2.3.1.1 One Time Pad (OTP) 40<br/><br/>2.3.1.2 RC-4 41<br/><br/>2.3.1.3 A5/1 43<br/><br/>2.3.2 Block Cipher Algorithms 44<br/><br/>2.3.2.1 Feistel Cipher Structure 46<br/><br/>2.3.2.2 Data Encryption Standard (DES) 48<br/><br/>2.3.2.3 Triple Data Encryption Standard (TDES) 56<br/><br/>2.3.2.4 International Data Encryption Algorithm (IDEA) 58<br/><br/>2.3.2.5 Blowfish 60<br/><br/>2.3.2.6 CAST-128 62<br/><br/>2.4 Conclusion 66<br/><br/>References 67<br/><br/>Practice Set 67<br/><br/>Review Questions and Exercises 70<br/><br/>3 Philosophy of Security by Cryptostakes Schemes 79<br/>Hemant Kumar Saini<br/><br/>3.1 Philosophy of Public Key Cryptosystems (p-k Cryptography) 79<br/><br/>3.2 RSA Algorithm 81<br/><br/>3.3 Security Analysis of RSA 84<br/><br/>3.4 Exponentiation in Modular Arithmetic 85<br/><br/>3.5 Distribution of Public Keys 87<br/><br/>3.6 Distribution of Secret Keys Using Public Key Cryptosystems 89<br/><br/>3.7 Discrete Logarithms 91<br/><br/>3.8 Diffie–Hellman Key Exchange 91<br/><br/>3.9 Review Exercise 93<br/><br/>References 94<br/><br/>4 Zero-Share Key Management for Secure Communication Across a Channel 95<br/>P. R. Mahalingam and K. A. Fasila<br/><br/>4.1 Introduction 95<br/><br/>4.2 Background 96<br/><br/>4.3 Zero-Share Key Management System 98<br/><br/>4.4 Simulation 100<br/><br/>4.5 Complexity and Analysis 103<br/><br/>4.6 Conclusion and Future Trends 106<br/><br/>References 107<br/><br/>5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate 109<br/>Dharmendra G. Bhatti and Paresh V. Virparia<br/><br/>5.1 Introduction 109<br/><br/>5.1.1 Soft Computing for Intrusion Detection 111<br/><br/>5.1.2 False Positive 112<br/><br/>5.1.3 Reasons of False Positive 113<br/><br/>5.2 Existing Technology and Its Review 115<br/><br/>5.3 Research Design 118<br/><br/>5.3.1 Conceptual Framework 118<br/><br/>5.3.2 Preprocessing Module 121<br/><br/>5.3.3 Alert Monitoring Module 123<br/><br/>5.4 Results With Implications 124<br/><br/>5.4.1 Preprocessing Module Benchmark 126<br/><br/>5.4.2 Alert Monitoring Module Benchmark 129<br/><br/>5.4.3 Overall Benchmark 130<br/><br/>5.4.4 Test Bed Network Benchmark 131<br/><br/>5.5 Future Research and Conclusion 133<br/><br/>References 135<br/><br/>6 Recursively Paired Arithmetic Technique (RPAT): An FPGA-Based Block Cipher Simulation and Its Cryptanalysis 141<br/>Rajdeep Chakraborty and J.K. Mandal<br/><br/>6.1 Introduction 141<br/><br/>6.2 Recursively Paired Arithmetic Technique (RPAT) 142<br/><br/>6.2.1 An Example of RPAT 144<br/><br/>6.2.2 Options of RPAT 145<br/><br/>6.2.3 Session Key Generation 146<br/><br/>6.3 Implementation and Simulation 147<br/><br/>6.4 Cryptanalysis 150<br/><br/>6.5 Simulation Based Results 152<br/><br/>6.6 Applications 152<br/><br/>6.7 Conclusion 153<br/><br/>Acknowledgment 153<br/><br/>References 153<br/><br/>7 Security Protocol for Multimedia Streaming 155<br/>N. Brindha, S. Deepa and S. Balamurugan<br/><br/>7.1 Introduction 156<br/><br/>7.1.1 Significance of Video Streaming 156<br/><br/>7.2 Existing Technology and Its Review 162<br/><br/>7.3 Methodology and Research Design 166<br/><br/>7.4 Findings 167<br/><br/>7.5 Future Research and Conclusion 169<br/><br/>References 169<br/><br/>8 Nature Inspired Approach for Intrusion Detection Systems 171<br/>Mohd Shahid Husain<br/><br/>8.1 Introduction 171<br/><br/>8.1.1 Types of Intrusion Detection Systems 172<br/><br/>8.2 Approaches Used for Intrusion Detection Systems 173<br/><br/>8.2.1 Intrusion Detection and Prevention Systems 173<br/><br/>8.2.2 Performance Criteria of Intrusion Detection Systems 174<br/><br/>8.3 Intrusion Detection Tools 175<br/><br/>8.4 Use of Machine Learning to Build Dynamic IDS/IPS 176<br/><br/>8.5 Bio-Inspired Approaches for IDS 178<br/><br/>8.6 Conclusion 179<br/><br/>References 181<br/><br/>9 The Socio-Behavioral Cipher Technique 183<br/>Harshit Bhatia, Rahul Johari and Kalpana Gupta<br/><br/>9.1 Introduction 183<br/><br/>9.2 Existing Technology 184<br/><br/>9.3 Methodology 186<br/><br/>9.3.1 Key Arrangement 187<br/><br/>9.3.2 Key Selection 188<br/><br/>9.3.3 Mathematical Operations 189<br/><br/>9.3.4 Algorithm 191<br/><br/>9.3.5 Encryption Operation 192<br/><br/>9.3.6 Decryption Operation 193<br/><br/>9.3.7 Mathematical Modeling 201<br/><br/>9.4 Conclusion: Future Scope and Limitations 205<br/><br/>References 208<br/><br/>10 Intrusion Detection Strategies in Smart Grid 211<br/>P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan<br/><br/>10.1 Introduction 212<br/><br/>10.2 Role of Smart Grid 212<br/><br/>10.3 Technical Challenges Involved in Smart Grid 213<br/><br/>10.4 Intrusion Detection System 216<br/><br/>10.5 General Architecture of Intrusion Detection System 217<br/><br/>10.6 Basic Terms in IDS 218<br/><br/>10.7 Capabilities of IDS 219<br/><br/>10.8 Benefits of Intrusion Detection Systems 219<br/><br/>10.9 Types of IDS 220<br/><br/>10.10 IDS in a Smart Grid Environment 222<br/><br/>10.10.1 Smart Meter 223<br/><br/>10.10.2 Metering Module 223<br/><br/>10.10.3 Central Access Control 224<br/><br/>10.10.4 Smart Data Collector 224<br/><br/>10.10.5 Energy Distribution System 225<br/><br/>10.10.6 SCADA Controller 225<br/><br/>10.11 Security Issues of Cyber-Physical Smart Grid 225<br/><br/>10.12 Protecting Smart Grid From Cyber Vulnerabilities 227<br/><br/>10.13 Security Issues for Future Smart Grid 229<br/><br/>10.14 Conclusion 230<br/><br/>References 230<br/><br/>11 Security Protocol for Cloud-Based Communication 235<br/>R. Suganya and S. Sujatha<br/><br/>11.1 Introduction 236<br/><br/>11.2 Existing Technology and Its Review 237<br/><br/>11.3 Methodology (To Overcome the Drawbacks of Existing Protocols) 238<br/><br/>11.4 Findings: Policy Monitoring Techniques 238<br/><br/>11.5 Future Research and Conclusion 240<br/><br/>Reference 241<br/><br/>12 Security Protocols for Mobile Communications 243<br/>Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S.<br/><br/>12.1 Introduction 244<br/><br/>12.2 Evolution of Mobile Communications 246<br/><br/>12.3 Global System for Mobiles (GSM) 248<br/><br/>12.4 Universal Mobile Telecommunications System (UMTS) 250<br/><br/>12.5 Long Term Evolution (LTE) 251<br/><br/>12.6 5G Wireless Systems 254<br/><br/>12.7 LoRA 257<br/><br/>12.8 5G Integrated With LoRA 258<br/><br/>12.9 Physical Layer Security and RFID Authentication 259<br/><br/>12.10 Conclusion 259<br/><br/>References 260<br/><br/>13 Use of Machine Learning in Design of Security Protocols 265<br/>M. Sundaresan and D. Boopathy<br/><br/>13.1 Introduction 266<br/><br/>13.2 Review of Related Literature 269<br/><br/>13.3 Joint and Offensive Kinetic Execution Resolver 271<br/><br/>13.3.1 Design of JOKER Protocol 273<br/><br/>13.3.2 Procedure 276<br/><br/>13.3.3 Procedure 278<br/><br/>13.3.4 Simulation Details and Parameters 279<br/><br/>13.3.4.1 Packet Delivering Ratio Calculation 279<br/><br/>13.3.4.2 Packet Loss Ratio Calculation 279<br/><br/>13.3.4.3 Latency (Delay) Calculation 279<br/><br/>13.3.4.4 Throughput Calculation 280<br/><br/>13.4 Results and Discussion 280<br/><br/>13.5 Conclusion and Future Scope 283<br/><br/>References 283<br/><br/>14 Privacy and Authentication on Security Protocol for Mobile Communications 287<br/>Brajesh Kumar Gupta “Mewadev”<br/><br/>14.1 Introduction 288<br/><br/>14.2 Mobile Communications 289<br/><br/>14.3 Security Protocols 291<br/><br/>14.4 Authentication 294<br/><br/>14.5 Next Generation Networking 298<br/><br/>14.6 Conclusion 302<br/><br/>References 303<br/><br/>15 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing 305<br/>Anjana Sangwan<br/><br/>15.1 Introduction 305<br/><br/>15.2 Need of Cloud Communication 306<br/><br/>15.3 Application 309<br/><br/>15.4 Cloud Communication Platform 310<br/><br/>15.5 Security Measures Provided by the Cloud 310<br/><br/>15.6 Achieving Security With Cloud Communications 312<br/><br/>15.7 Cryptographic Protocols for Secure Cloud Computing 314<br/><br/>15.8 Security Layer for the Transport Protocol 315<br/><br/>15.9 Internet Protocol Security (IPSec) 317<br/><br/>15.9.1 How IPsec Works 318<br/><br/>15.10 Kerberos 320<br/><br/>15.11 Wired Equivalent Privacy (WEP) 326<br/><br/>15.11.1 Authentication 326<br/><br/>15.12 WiFi Protected Access (WPA) 327<br/><br/>15.13 Wi-Fi Protected Access II and the Most Current Security Protocols 328<br/><br/>15.13.1 Wi-Fi Protected Access 329<br/><br/>15.13.2 Difference between WEP, WPA: Wi-Fi Security Through the Ages 329<br/><br/>15.14 Wired Equivalent Privacy (WEP) 329<br/><br/>15.15 Wi-Fi Protected Access (WPA) 330<br/><br/>15.16 Conclusions 330<br/><br/>References 331<br/><br/>Index 333 |
520 ## - SUMMARY, ETC. |
Summary, etc |
"The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any"-- |
Assigning source |
Provided by publisher. |
545 0# - BIOGRAPHICAL OR HISTORICAL DATA |
Biographical or historical note |
About the Author<br/>Dinesh Goyal received his PhD in 2014 on "Secure Video Transmission in a Cloud Network" and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.<br/><br/>S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.<br/><br/>Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing Information Science and Technology University of China, a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.<br/><br/>O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.<br/><br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer network protocols. |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Goyal, Dinesh, |
Dates associated with a name |
1976- |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Balamurigan, A., |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Peng, Sheng-Lung, |
Relator term |
editor. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Verma, O. P. |
Titles and other words associated with a name |
(Telecommunications engineer), |
Relator term |
editor. |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119555759 |
Link text |
Full text available at Wiley Online Library Click here to view |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) |
a |
7 |
b |
cbc |
c |
orignew |
d |
1 |
e |
ecip |
f |
20 |
g |
y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS |
Source of classification or shelving scheme |
|
Item type |
EBOOK |