PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The arithmetic of the topologist's sine curve in cryptographic systems dedicated to IoT devices

Treść / Zawartość
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
When observing the modern world, we can see the dynamic development of new technologies, among which a special place, both owing to the potential and the threats is occupiedby the Internet of Things which penetrates almost all areas of our life. It is assumed that the IoT technology makes our life easier, however, it poses many challenges concerning the protection of the security of information transmission and, therefore, our privacy. One of the main goals of the paper is to present a new unconventional arithmetic based onthe transcendental curve dedicated to the cryptographic systems that protect the transmission of short messages. The use of this arithmetic may develop the possibilities of protecting short sequences of data generated by devices with limited computational power. Examples of such devices include the ubiquitously used battery powered sensors, the task of which is to collectand transmit data which very often comprises concise information. Another goal is to present the possibility of using the developed arithmetic in cryptographic algorithms.
Rocznik
Strony
29--47
Opis fizyczny
Bibliogr. 42 poz., rys., tab.
Twórcy
  • Polish-Japanese Academy of Information Technology, Faculty of Information Technology, Koszykowa 86, 02-008 Warsaw, Poland
  • Łomża State University of Applied Sciences, Faculty of Computer Science and Food Science, Department of Computer Science and Programming, Akademicka 14, 18-400 Łomża, Poland
Bibliografia
  • [1] Bari N, Mani G and Berkovich S 2013 Fourth International Conference on Computingfor Geospatial Research and Application,IEEE, USA, 48
  • [2] Taylor A S, Harper R, Swan L, Izadi S, Sellen A and Perry M 2007 Personal and Ubiqu-itous Computing 11(5)383
  • [3] Niyato D, Hossain E and Camorlinga S 2009 IEEEJournal on Selected Areas inCommunications 27(4)412
  • [4] Knud L LState of the IoT 2018, [online]:https://iot-analytics.com/state-of-the-iot-update-q1-q2-2018[accessed on 26 February 2019]
  • [5] Javaid N, Sher A, Nasir H and Guizani N 2018 IEEECommunications Magazine56(10)94
  • [6] Tekinerdogan B 2017 Engineering connected intelligence: a socio-technical perspective,Wageningen University & Research
  • [7] Jalali M S, Kaiser J P, Siegel M and Madnick S 2017 IEEESecurity & Privacy 17(2)39
  • [8] Lee I and Lee K 2015 Business Horizons 58(4)431
  • [9] Blaauw D, Sylvester D, Dutta P, Lee Yet al. 201 42014 Symposium onVLSITechnology(VLSI-Technology): Digest of Technical Papers1
  • [10] Lee Y-D and Chung W-Y 2009 Journal of Business and Management 20(4)55
  • [11] Perumal T, Datta S K and Bonnet C 201 52015 IEEE 4th Global Conference on Consumer Electronics (GCCE) 54
  • [12] Open Mobile Alliance 2006 Policy Evaluation, Enforcement and Management CallableInterface (PEM-1) Technical Specification1
  • [13] Open Mobile Alliance 2017 Lightweight machine to machine technical specification 1(1)
  • [14] Choudhary V and Iniewski K 2016 Mems: fundamental technology and applications,CRC Press
  • [15] Rykowski J 2017 Napędy i Sterowanie 19 120
  • [16] Maj I 2015 Bezpieczeństwo. Teoria i Praktyka 1(3)51
  • [17] Riahi A, Challal Y, Natalizio E, Chtourou Z and Bouabdallah A 2013 IEEEinternationalconference on distributed computing in sensor systems 351
  • [18] Choudhary D 2019 Journal of Autonomous Intelligence 1(2)16
  • [19] Marin L, Pawlowski M and Jara A 2015 Sensors 15(9)21 478
  • [20] Bahrami M, Khan A and Singhal M 201 62016 IEEEInternational Conference on MobileServices (MS)190
  • [21] Heer T, Garcia-Morchon O, Hummen R, Keoh S L, Kumar S S and Wehrle K 2011 Wireless Personal Communications 61(3)527
  • [22] Roman R, Zhou J and Lopez J 2013 Computer Networks 57(10)2266
  • [23] Ochaya W B 2018 International Journal of Online Graduate Education 1(1)1
  • [24] Preuveneers D, Joosen W and Ilie-Zudor E 2016 12th International Conference onIntelligent Environments (IE)40
  • [25] Lee Y-Dong and Chung W-Young 2009 Sensors and Actuators B: Chemical 140(2)390
  • [26] Madhusudan S 2018 EAIEndorsed Transactions on Internet of Things 3(10)1doi: 10.4108/eai.15-1-2018.153 566
  • [27] Mayank S 2018 Engineering Machine Learning, Blockchain, Robotics, IoT and more Programming for All, [online]:http://www.eetimes.com/electronics-news/4409928/Cisco-sees–14-trillion-opportunity-in-Internet-of-Things[accessed: 26-Febru-ary-2019]
  • [28] Ruano A, Silva S, Duarte H and Ferreira P M 2018 Applied Sciences 8(3)370
  • [29] Shang W, Yu Y, Droms R and Zhang L 2016 NDN Project,NDN-0038 (Tech. Rep.)
  • [30] Aumasson J-P 2017 Serious Cryptography: A Practical Introduction to Modern Encryption, No Starch Press
  • [31] Diffie W and Hellman M E 1976 Proceedings of the national computer conferenceand exposition New York 109 doi: 10.1145/1499799.1499815109
  • [32] Hellman M E 1979 Scientific American 241(2)146
  • [33] Koblitz N 1987 Mathematics of computation 48(177)203
  • [34] Miller V S 1985 Conference on the theory and application of cryptographic techniques 21 8417 doi: 10.1007/3-540-39799-X31
  • [35] Yu W and Köse S 2017 IEEETransactions on Circuits and Systems I: Regular Papers 64(11)2934
  • [36] Bafandehkar M, Yasin S Md, Mahmod R and Hanapi Z Mohd 2013 International Conference on IT Convergence and Security (ICITCS)doi: 10.1109/ICITCS.2013.6717816
  • [37] Dworkin M J, Barker E B, Nechvatal J R, Foti J, Bassham L E, Roback E and Dray J F 2001 Federal Information Processing Standards (NIST FIPS)197
  • [38] Bernstein D J and Lange T 2007 International Conference on the Theory and Applicationof Cryptology and Information Security 29
  • [39] Bernstein D J and Lange T 2017 IACRCryptology ePrint Archive 201 7293
  • [40] Bernstein D J, Chuengsatiansup C, Kohel D and Lange T 2015 International Conferenceon Cryptology and Information Security in Latin America 26 9
  • [41] Maleszewski W 2017 Polish Journal of Applied Sciences 3(4)141
  • [42] Hong S Lee and Liu C 2015 IEEEAccess 35 62
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-cf4595d1-b4f5-462d-94dc-ec0a0642cce7
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.