LITERATURE SURVEY. Elliptic Curve Cryptography (ECC) is one of the symmetric key cryptographic algorithms [22] in which keys are mutually shared between the nodes in WSN for achieving cryptographic services. WSN is prone to security breaches and hence there is a need to develop lightweight security algorithms for securing WSN. Security is a very challenging task in WSN, the current state-of-the-art security mechanisms are presented in Nesteruk et al. [25]. A method for efficient key generation clusters is proposed in Xxxxxxxx [1] using the one-way hash function and a random variable for hierarchical WSN clusters to overcome the node compromise attack. This method relies on updating keys by Cluster Heads (CHs) periodically. If CHs fail to update their keys, it is considered a malicious node, even if the nodes are not malicious. Key generation plays a vital role in security. A method based on polynomial key distribution is being proposed in WSN [3]. Polynomial-based random key generation assures the existence of pair-wise keys between sensors in WSN. The method is prone to node capture attacks which need to be addressed. WSN gets compromised when a fixed number of sensors become compromised. Node capture attack that occurs due to capturing sensitive sequences is overcome to some extent in this proposed method. A detailed survey regarding key management, authentication, and trust management is done and the need for proposing lightweight protocols for key management is identified. A hybrid encryption algorithm is being proposed in Xxxxxxx et al. [19] in which the processes involved in asymmetric key cryptography are reduced with increased inclusion of processes involved in symmetric key cryptography. The work focuses on reducing energy consumption, communication costs, and computing costs with increased security. Security is increased by avoiding node-capture attacks that occur due to the capturing of sequences in our proposed protocol. A two-party Quantum Key Agreement (QKA) with strong fairness property is proposed in Naresh and Reddi [24] and extended to a Multiparty Quantum Key Agreement (MQKA) with strong fairness property withstanding both inner and outer attacks. A comparative analysis was performed with existing techniques. Cryptographic information gets stolen when an SN gets captured by an adversary. An extensive survey of various detection and key pre-distribution schemes used for resilience against node capture attacks is carried out and discussed in Butani et al. [5...
LITERATURE SURVEY. Emerging block chain-based health care innovations ,including data sources, block chain technology, healthcare applications, and stakeholders, are conceptually divided into several layers. Xxxxxx and Xxxxxxxx [1] published a review on healthcare blockchain where they concluded their discussion on how block chain technology can enable patient-centric control of healthcare data sharing over institution centric control. In their study they examined how blockchain technology transforms the healthcare sector by enabling digital access rights, patient identification across the network, handling a large volume of healthcare data and data immutability. Xxxxxxx et al. [2] worked on medical records using the Hyperledger fabric blockchain platform where they were sending medical data to the hyper ledger blockchain network. They have collected those medical records using smartphones. In their work, they were trying to make sure that healthcare data is registered to the Blockchain. Xxxxxxx etal. [3]studied blockchain as a way to manage healthcare information e silently. In their study, they included various types of studies and most of the work among this study was discussing potential benefits and limitations of blockchain technology for healthcare without being provided any proof or system evaluation. They have concluded their discussion on how blockchain could be a better fit for managing health care records on the cloud system while maintaining security and privacy of data. Xxxxxxx et al. [4] came up with an approach to address limitations of permission and permissionless blockchain. They have used an instance of Hyperledger platform for patient-controlled healthcare data management. Xx and Xxxx [5]did a literature review on healthcare management systems and proposed two algorithms for providing network security. They also suggested using a distributed system for healthcare data management and establishing regulations for the healthcare data. Shen etal. [6] proposes a mechanism for sharing medical data using blockchain and peer to peer networks known as MedChain. They have designed this system for healthcare data generated via medical examination and the patient data collected from IoT sensors and other mobile apps. Khizretal.[7]discussed various issues of the healthcare management system and how it could be resolved using blockchain technology. They have presented the current research on healthcare using distributed ledger technology with some possible medical use...
LITERATURE SURVEY. In order to strengthen the system from these issues, various group-based authentication mechanisms have been proposed especially for MTT [5]. Subsequently, Xxx et al. [5] proposed a mass gadget to get a confirmation plot for Mobile Type Transmission in LTE to organize. It took a total mark innovation in which a gathering head of MTC gadgets totals every mark that is created by each Mobile Type Transmission gadget and sends the total mark to MME, at that point MME could viably and rapidly verify a lot of MTT gadgets. Be that as it may, its computational overhead is moderately vast in light of the fact which takes bilinear matching and Elliptic Bend Calculation innovation. Lai et al. [2] devised another standard protocol namely SE-AKA of protective and productive AKA convention, that can be fitted to make major validation possibilities in the LTE systems. This can resolve the group verification method over the calculation of GTK. However, that can receive Elliptic bend Diffie– Xxxxxxx to acknowledge key forwarding reverse mystery and utilizations keys in the cryptosystem to ensure client protection. In any case, it can't check a gathering of MTC gadgets at the same time, and it just generally decreases correspondence overload. , Xxxxx et al. [2] suggested a GB dynamic verification mechanism that can be similar to SE-AKA. Initially, MTCD plays a complete verification with native condition, the rest Mobile Type Transmission Devices of this gathering simply verify with the serving system. Later, a group key update method can be planned to suits the dynamic grouping MTC. Subsequently, in ref [3] advised a light-weight authentication protocol for MTC using group key especially for the LTE systems, named as LGTH. At this, it embraces a total mark dependent on information verification codes, and it could validate a gathering of Mobile Type Transmission gadgets rapidly and at the same time. LGTH has a next to no calculation and correspondence costs, yet it can't give security insurance. Xxxx et al. [5] proposed another gathering confirmation convention for Mobile Type Transmission in LTE-A systems. For proficiency and in reverse similarity, symmetric cryptography is just utilized in the suggested a plan. Be that as it may, it likewise does not consider the DoS assault and security assurance. The Authentication and Key Agreement (AKA) protocols used a GRAKA in which it simplifies whole verification procedure by computing a GTK; secure and efficient group AKA (SE AKA)...
LITERATURE SURVEY. Juels et al. [9] explain the secrecy and confidentiality issues of the first generation passport. According to their observation, since contact less chip is embedded [11] there is a possibility of data leakage from the E- Passport without direct contact with ES. Therefore, data available in the chip will be eavesdropping. The key used for BAC is derived from MRZ information, so that the entropy of the key used for authentication is low, causes brute force attack to find out the key value. The risk of xxxxx dropping is more, if the border control is fully automated. This causes possible collection of E- Passport data by the intruder. In 2006, aware about these weaknesses, a new proposal has suggested by European Union (EU) known as EAC provides E-Passport specification for second generation protocol. Xxxxxxxxxxxxxxx et al. [18], Justice and Home Affairs (European Committee) [10] identified the shortcomings in the EAC protocol. The authors express their concerns that the EAC protocol still uses BAC to derive the session key. So, the problems present in BAC are also addressed here. suggested a new solution based on elliptic curve Xxxxxx-Xxxxxxx agreement protocol for avoiding above threats. In their method they generate elliptic curve based on selecting 32 minutiae points from the finger print of the E-Passport holder in an ordered manner. But, in real time scenario, to verify the user’s identity selecting 32 points in an ordered manner is a critical task. In the proposed method to rectify the above problems, a new authentication protocol by making a slight modification over the protocol based on variation in Xxxxxx-Xxxxxxx key agreement protocol using Elliptic Curve Cryptography (ECC) is suggested. In the proposed method, elliptic curve parameters A, B and G are derived from the all minutiae points and these values are stored in the E- Passport chip and database of the DOV. From this a shared secret session key between E-Passport and ES is generated.
LITERATURE SURVEY. Map Reduce :-The author is Xxxxx A, Xxxxx X, Xxxxx M, Xxxxx X. The advantages of this algorithm is the technology is more scalable, tamper proof and time stamped, making health data more secure. The limitation of this algorithm is Large amount of Dataset Required. • Map Reduce:- The author is Xxxxx Xxxxxx, Xxxxx Xxxxxx, Xxxx X. Xxxxxxx, Xxxxxx Xxxxxxx. The advantages of this algorithm is this system gives patients a comprehensive, immutable log and easy access to their medical information across providers and treatment sites. The limitation of this algorithm is face a critical need for Electronic Health Records (EHRs).
LITERATURE SURVEY. Nowadays, E-auctions can be classified into two types: public bids and sealed bids. A public bid is when bidders could raise the priceto bid on the products. Thus, the bidding price gets increasing continuously until no bidders are willing bids the highest price for such a product. During public bids, bidders can bid several times; thus, the public bid is also called a multi-bidding auction. A sealed bid is when bidders encrypt the bill and only send the bill once. If the time is due, the auctioneer compares all of the bills. The bidder who bids for the highest price is the winner of the sealed bid. Due to bidders only can bid once, it is also called a single-bidding auction. In the sealed bid, all bidders’ prices are sealed until the bid opening deadline is compared to the prices of all bidders.There is a common shortcoming in electronic seal ticket auctions. Before the deadline for opening bids, the bidder cannot ensure that the bid price has been leaked by a third party (the principal bidder), resulting in malicious bidders may collaborate with the bid winner to obtain the best bid price The blockchain is a technology that accesses, verifies,and transmits network data through distributed nodes. It uses a peer-to-peer network to achieve a decentralized data operation and preservation platform sender’s public key to decrypt the message, and theidentity of the sender can be confirmed. Message delivery and broadcasting: Message delivery and broadcasting are performed using a peer-to-peer technique, allowing each node to connect and exchange messages with each other. The transactions are stored in the same ledger. Eachnode in the blockchain can verify the transactions using the zero-knowledge of the decentralized access structure. Data preservation and linking: The transaction data is stored in a block to generatea hash value and the block is linked to the previous block with the hash values to construct a blockchain The fields in the block, as shown in Fig below, to detail the records of the block such as time-stamp, transaction quantity, hash value, etc. Inthe blockchain, there might be different transactions in a block. When a new transaction is just triggered, each node collects unverified transactions to the block to produce a POW (Proof of Work). That is, the node can calculate the Nonceto verify the transaction as soon as possible to get some rewards. If the node completes the proof of work, it broadcast the block to other nodes to verifywhether the t...
LITERATURE SURVEY. Paper 1: Xxxxx Xxxx Xxxxxxxx. Automatic Verification of Railway Interlocking Systems: A Case Study (Xxxxxxxx 1998).
LITERATURE SURVEY. RSA: RSA Algorithm for Authentication: Node A Node B ECC:
LITERATURE SURVEY. The authors of [1] suggest a blockchain-based system for storing property paperwork in a secure manner. When a person buys land in our system, the government authority gives the purchaser a tangible copy of the property papers, which our system then storesin the Inter Planetary File System (IPFS), a decentralised database. The documents from the government authorities will be validated and verified via smart contracts. This will result in a decentralised, tamper-proof ledger from which we can simply extract the data.The author [2] propose a device in which we use a clever agreement to deal with the belongings and transactions of the majority of the contributors, which is extremely time consuming, less stable, and unsynchronized, and in which sports such as corrup- tion and fraudulence are likely related throughout the execution of the specified process. We propose a blockchain-primarily based totally land registration device that offers a transparent, secure, and decentralised approach for execution of transactions among contributors using the hyperledger idea, based on a combination of inspection and evaluation of the vintagetraditional method and considering that Blockchain has improved transparency and integrity upkeep in conjunction with the portability factor . The authors in [3] Proposes The device that we’re looking to put into effect isprimarily based totally on Ethereum Blockchain in order to shop all of the transactions made inthecourse of the manner of land possession switch. Using the idea of clever contracts ofblockchain era we are able to triggers diverse activities like get right of entry to of land files to a land inspectorand fund switch occasion from purchaser to vendor after a hit verification of the land possession switch. This device makes the mannerof land registration resilient and reduces the instances of fraud with inside the manner. Using the device, validation of the lands is likewise feasible as immutable transactions are being saved with inside the public ledger.
LITERATURE SURVEY. The realm of cloud computing has transformed the landscape of data storage and management, offering users unprecedented flexibility and accessibility to their information. However, as mobile technology continues to evolve, users frequently encounter the challenge of migrating their data seamlessly across different cloud providers. This process, known as cross-cloud data migration, is essential when users switch mobile phones or seek services from alternative providers. Despite its significance, cross-cloud data migration presents a myriad of obstacles, particularly concerning the limitations of mobile devices in terms of local storage and computational capabilities. The proliferation of smartphones has revolutionized the way individuals interact with technology, enabling them to access an array of services and applications from the palm of their hand. However, the inherent constraints of mobile devices, such as restricted storage capacity and processing power, pose significant hurdles to the seamless transfer of data between cloud servers. As users attempt to back up their data from original cloud repositories to their mobile devices for subsequent upload to a new provider, they are often met with frustration due to the impracticality of traditional migration methods. To address these challenges, researchers have explored various approaches to facilitate efficient cross-cloud data migration while ensuring data integrity and security. One prominent area of investigation revolves around the development of innovative data migration models tailored specifically for mobile users. These models aim to optimize the transfer process by minimizing the burden on mobile devices and leveraging the capabilities of cloud infrastructure. In recent years, significant attention has been directed towards the design of mutual authentication and key agreement schemes to establish secure communication channels between cloud providers and mobile devices. These schemes play a pivotal role in building trust among disparate cloud ecosystems, thereby laying the groundwork for seamless data migration. By employing advanced cryptographic techniques, such as elliptic curve certificate-free cryptography, researchers endeavor to enhance the security and efficiency of data transfer processes. Furthermore, the evaluation and comparison of proposed data migration schemes against existing state-of-the-art solutions are integral to assessing their efficacy and performance. Mathematical verifi...