LITERATURE SURVEY. Elliptic Curve Cryptography (ECC) is one of the symmetric key cryptographic algorithms [22] in which keys are mutually shared between the nodes in WSN for achieving cryptographic services. WSN is prone to security breaches and hence there is a need to develop lightweight security algorithms for securing WSN. Security is a very challenging task in WSN, the current state-of-the-art security mechanisms are presented in Nesteruk et al. [25]. A method for efficient key generation clusters is proposed in Xxxxxxxx [1] using the one-way hash function and a random variable for hierarchical WSN clusters to overcome the node compromise attack. This method relies on updating keys by Cluster Heads (CHs) periodically. If CHs fail to update their keys, it is considered a malicious node, even if the nodes are not malicious. Key generation plays a vital role in security. A method based on polynomial key distribution is being proposed in WSN [3]. Polynomial-based random key generation assures the existence of pair-wise keys between sensors in WSN. The method is prone to node capture attacks which need to be addressed. WSN gets compromised when a fixed number of sensors become compromised. Node capture attack that occurs due to capturing sensitive sequences is overcome to some extent in this proposed method. A detailed survey regarding key management, authentication, and trust management is done and the need for proposing lightweight protocols for key management is identified. A hybrid encryption algorithm is being proposed in Xxxxxxx et al. [19] in which the processes involved in asymmetric key cryptography are reduced with increased inclusion of processes involved in symmetric key cryptography. The work focuses on reducing energy consumption, communication costs, and computing costs with increased security. Security is increased by avoiding node-capture attacks that occur due to the capturing of sequences in our proposed protocol. A two-party Quantum Key Agreement (QKA) with strong fairness property is proposed in Naresh and Reddi [24] and extended to a Multiparty Quantum Key Agreement (MQKA) with strong fairness property withstanding both inner and outer attacks. A comparative analysis was performed with existing techniques. Cryptographic information gets stolen when an SN gets captured by an adversary. An extensive survey of various detection and key pre-distribution schemes used for resilience against node capture attacks is carried out and discussed in Butani et al. [5...
LITERATURE SURVEY. In order to strengthen the system from these issues, various group-based authentication mechanisms have been proposed especially for MTT [5]. Subsequently, Xxx et al. [5] proposed a mass gadget to get a confirmation plot for Mobile Type Transmission in LTE to organize. It took a total mark innovation in which a gathering head of MTC gadgets totals every mark that is created by each Mobile Type Transmission gadget and sends the total mark to MME, at that point MME could viably and rapidly verify a lot of MTT gadgets. Be that as it may, its computational overhead is moderately vast in light of the fact which takes bilinear matching and Elliptic Bend Calculation innovation. Lai et al. [2] devised another standard protocol namely SE-AKA of protective and productive AKA convention, that can be fitted to make major validation possibilities in the LTE systems. This can resolve the group verification method over the calculation of GTK. However, that can receive Elliptic bend Diffie– Xxxxxxx to acknowledge key forwarding reverse mystery and utilizations keys in the cryptosystem to ensure client protection. In any case, it can't check a gathering of MTC gadgets at the same time, and it just generally decreases correspondence overload. , Xxxxx et al. [2] suggested a GB dynamic verification mechanism that can be similar to SE-AKA. Initially, MTCD plays a complete verification with native condition, the rest Mobile Type Transmission Devices of this gathering simply verify with the serving system. Later, a group key update method can be planned to suits the dynamic grouping MTC. Subsequently, in ref [3] advised a light-weight authentication protocol for MTC using group key especially for the LTE systems, named as LGTH. At this, it embraces a total mark dependent on information verification codes, and it could validate a gathering of Mobile Type Transmission gadgets rapidly and at the same time. LGTH has a next to no calculation and correspondence costs, yet it can't give security insurance. Xxxx et al. [5] proposed another gathering confirmation convention for Mobile Type Transmission in LTE-A systems. For proficiency and in reverse similarity, symmetric cryptography is just utilized in the suggested a plan. Be that as it may, it likewise does not consider the DoS assault and security assurance. The Authentication and Key Agreement (AKA) protocols used a GRAKA in which it simplifies whole verification procedure by computing a GTK; secure and efficient group AKA (SE AKA)...
LITERATURE SURVEY. Juels et al. [9] explain the secrecy and confidentiality issues of the first generation passport. According to their observation, since contact less chip is embedded [11] there is a possibility of data leakage from the E- Passport without direct contact with ES. Therefore, data available in the chip will be eavesdropping. The key used for BAC is derived from MRZ information, so that the entropy of the key used for authentication is low, causes brute force attack to find out the key value. The risk of xxxxx dropping is more, if the border control is fully automated. This causes possible collection of E- Passport data by the intruder. In 2006, aware about these weaknesses, a new proposal has suggested by European Union (EU) known as EAC provides E-Passport specification for second generation protocol. Xxxxxxxxxxxxxxx et al. [18], Justice and Home Affairs (European Committee) [10] identified the shortcomings in the EAC protocol. The authors express their concerns that the EAC protocol still uses BAC to derive the session key. So, the problems present in BAC are also addressed here. suggested a new solution based on elliptic curve Xxxxxx-Xxxxxxx agreement protocol for avoiding above threats. In their method they generate elliptic curve based on selecting 32 minutiae points from the finger print of the E-Passport holder in an ordered manner. But, in real time scenario, to verify the user’s identity selecting 32 points in an ordered manner is a critical task. In the proposed method to rectify the above problems, a new authentication protocol by making a slight modification over the protocol based on variation in Xxxxxx-Xxxxxxx key agreement protocol using Elliptic Curve Cryptography (ECC) is suggested. In the proposed method, elliptic curve parameters A, B and G are derived from the all minutiae points and these values are stored in the E- Passport chip and database of the DOV. From this a shared secret session key between E-Passport and ES is generated.
LITERATURE SURVEY. Map Reduce :-The author is Xxxxx A, Xxxxx X, Xxxxx M, Xxxxx X. The advantages of this algorithm is the technology is more scalable, tamper proof and time stamped, making health data more secure. The limitation of this algorithm is Large amount of Dataset Required. • Map Reduce:- The author is Xxxxx Xxxxxx, Xxxxx Xxxxxx, Xxxx X. Xxxxxxx, Xxxxxx Xxxxxxx. The advantages of this algorithm is this system gives patients a comprehensive, immutable log and easy access to their medical information across providers and treatment sites. The limitation of this algorithm is face a critical need for Electronic Health Records (EHRs).
LITERATURE SURVEY. Nowadays, E-auctions can be classified into two types: public bids and sealed bids. A public bid is when bidders could raise the priceto bid on the products. Thus, the bidding price gets increasing continuously until no bidders are willing bids the highest price for such a product. During public bids, bidders can bid several times; thus, the public bid is also called a multi-bidding auction. A sealed bid is when bidders encrypt the bill and only send the bill once. If the time is due, the auctioneer compares all of the bills. The bidder who bids for the highest price is the winner of the sealed bid. Due to bidders only can bid once, it is also called a single-bidding auction. In the sealed bid, all bidders’ prices are sealed until the bid opening deadline is compared to the prices of all bidders.There is a common shortcoming in electronic seal ticket auctions. Before the deadline for opening bids, the bidder cannot ensure that the bid price has been leaked by a third party (the principal bidder), resulting in malicious bidders may collaborate with the bid winner to obtain the best bid price The blockchain is a technology that accesses, verifies,and transmits network data through distributed nodes. It uses a peer-to-peer network to achieve a decentralized data operation and preservation platform sender’s public key to decrypt the message, and theidentity of the sender can be confirmed. Message delivery and broadcasting: Message delivery and broadcasting are performed using a peer-to-peer technique, allowing each node to connect and exchange messages with each other. The transactions are stored in the same ledger. Eachnode in the blockchain can verify the transactions using the zero-knowledge of the decentralized access structure. Data preservation and linking: The transaction data is stored in a block to generatea hash value and the block is linked to the previous block with the hash values to construct a blockchain The fields in the block, as shown in Fig below, to detail the records of the block such as time-stamp, transaction quantity, hash value, etc. Inthe blockchain, there might be different transactions in a block. When a new transaction is just triggered, each node collects unverified transactions to the block to produce a POW (Proof of Work). That is, the node can calculate the Nonceto verify the transaction as soon as possible to get some rewards. If the node completes the proof of work, it broadcast the block to other nodes to verifywhether the t...
LITERATURE SURVEY. Paper 1: Xxxxx Xxxx Xxxxxxxx. Automatic Verification of Railway Interlocking Systems: A Case Study (Xxxxxxxx 1998).
LITERATURE SURVEY. RSA: RSA is one of thepublic key cryptosystem which is based on the factorization of product of two large prime numbers. The name RSA is an abbreviation of the initials of names of professors Xxxxxx, Xxxxxx and Xxxxxxx. With the discovery of RSA, for the first time we had one system to encrypt and another system to decrypt. Many approaches have been proposed[ 13-17] in which security is based on sharing of secret keys. Two keys used in this are: public key and a private key. The private key is known to everyone but the private key is kept secret. Steps involved are the key encryption, key generation and key decryption. The messages are encrypted using the public key but are decrypted using the private key as shown in the fig1. In[1] key generation of RSA is significantly slower than ECC. For better and stronger security of databigger key sizes are required .This means that there is an overhead on computing systems. In [2] after comparing RSA and ECC, it was proved that ECC involves much fewer overheads than RSA. RSA provides same level of security but ECC outperforms over RSA in operational efficiency and security.ECC has shown many advantages due to its ability to provide security using the shorter keys. RSA Algorithm for Authentication: Node A Node B Select a private prime number ‘A’ Compute 𝐽 = 𝑁𝐴modP 𝑚𝑎{𝐻𝑎,J} Compute 𝐻𝑎 = 𝐻(XXx||𝐼𝐷𝑏||J||pw) Select a private prime number ‘B’ Compute k=𝑁𝐵mod P Compute 𝐻𝑏ℎ(XXx||𝐼𝐷𝑏||J||pw) If(𝐻𝑏 ≅ 𝐻𝑎) 𝑏 Compute𝐻1𝐻(XXx||𝐼𝐷��||𝐾||𝑝𝑤) 𝑀𝑏{𝐻1, 𝐾} 𝑏 Compute session key 𝐾𝑏 = 𝐽𝐵𝑚𝑜𝑑𝑃 Compute 𝐻1 = 𝐻(𝐼𝐷 ||𝐼𝐷 ||𝐾||𝑝𝑤) 𝑎 If(𝐻1 ≅ 𝐻1) 𝑎 𝑏 𝑎 𝑏 Compute session key 𝐾𝑎 = ��𝐴𝑚𝑜𝑑𝑃 (𝐾𝑎 ≅ 𝐾𝑏)𝑎𝑢𝑡ℎ𝑒𝑛𝑡𝑖𝑐𝑎𝑡𝑒 Fig1: Authentication using RSA ECC: Elliptic curve cryptography is an approach to the public key cryptography based on the algorithm structure of the elliptic curves over finite fields.The locus of a point, whose coordinates conform to a particular cubic equation along with the point at infinity O (the point at which the locus in the projective plane intersects the line at infinity,) is known as an elliptic curve.This encryption technique uses the properties of elliptic curve in order to generate keys instead of using the traditional methodology of generation of keys using the product of two very large prime numbers. ECC is a public key cryptosystem where each user has two keys: public key and private key. Public key is used for encryption and signature verificat...
LITERATURE SURVEY. The authors of [1] suggest a blockchain-based system for storing property paperwork in a secure manner. When a person buys land in our system, the government authority gives the purchaser a tangible copy of the property papers, which our system then storesin the Inter Planetary File System (IPFS), a decentralised database. The documents from the government authorities will be validated and verified via smart contracts. This will result in a decentralised, tamper-proof ledger from which we can simply extract the data.The author [2] propose a device in which we use a clever agreement to deal with the belongings and transactions of the majority of the contributors, which is extremely time consuming, less stable, and unsynchronized, and in which sports such as corrup- tion and fraudulence are likely related throughout the execution of the specified process. We propose a blockchain-primarily based totally land registration device that offers a transparent, secure, and decentralised approach for execution of transactions among contributors using the hyperledger idea, based on a combination of inspection and evaluation of the vintagetraditional method and considering that Blockchain has improved transparency and integrity upkeep in conjunction with the portability factor . The authors in [3] Proposes The device that we’re looking to put into effect isprimarily based totally on Ethereum Blockchain in order to shop all of the transactions made inthecourse of the manner of land possession switch. Using the idea of clever contracts ofblockchain era we are able to triggers diverse activities like get right of entry to of land files to a land inspectorand fund switch occasion from purchaser to vendor after a hit verification of the land possession switch. This device makes the mannerof land registration resilient and reduces the instances of fraud with inside the manner. Using the device, validation of the lands is likewise feasible as immutable transactions are being saved with inside the public ledger.
LITERATURE SURVEY. The realm of cloud computing has transformed the landscape of data storage and management, offering users unprecedented flexibility and accessibility to their information. However, as mobile technology continues to evolve, users frequently encounter the challenge of migrating their data seamlessly across different cloud providers. This process, known as cross-cloud data migration, is essential when users switch mobile phones or seek services from alternative providers. Despite its significance, cross-cloud data migration presents a myriad of obstacles, particularly concerning the limitations of mobile devices in terms of local storage and computational capabilities. The proliferation of smartphones has revolutionized the way individuals interact with technology, enabling them to access an array of services and applications from the palm of their hand. However, the inherent constraints of mobile devices, such as restricted storage capacity and processing power, pose significant hurdles to the seamless transfer of data between cloud servers. As users attempt to back up their data from original cloud repositories to their mobile devices for subsequent upload to a new provider, they are often met with frustration due to the impracticality of traditional migration methods. To address these challenges, researchers have explored various approaches to facilitate efficient cross-cloud data migration while ensuring data integrity and security. One prominent area of investigation revolves around the development of innovative data migration models tailored specifically for mobile users. These models aim to optimize the transfer process by minimizing the burden on mobile devices and leveraging the capabilities of cloud infrastructure. In recent years, significant attention has been directed towards the design of mutual authentication and key agreement schemes to establish secure communication channels between cloud providers and mobile devices. These schemes play a pivotal role in building trust among disparate cloud ecosystems, thereby laying the groundwork for seamless data migration. By employing advanced cryptographic techniques, such as elliptic curve certificate-free cryptography, researchers endeavor to enhance the security and efficiency of data transfer processes. Furthermore, the evaluation and comparison of proposed data migration schemes against existing state-of-the-art solutions are integral to assessing their efficacy and performance. Mathematical verifi...
LITERATURE SURVEY. The scientific and scholarly articles which were searched on this topic were first identified google scholarly articles for the term ‘Crowdfunding’, the search was continued based on the citations which were given, after which led us to the terms such as P2P crowdfunding, social lending and person- person lending were stumbled upon and later investigated. This is a very recent trend hence the papers which were referred to follow a “Phenomenon- Based-Approach” (Xxx Xxxxxx, Xxxxx Xxxxxxxx and Xxxxxxxxx, 2012). Before crowdfunding was used [2] Since crowdfunding is currently a relatively new field the amount of scholarly articles and papers are very limited. The first publications addressing the issue of how to make crowdfunding more sustainable were published in 2011, then after a two-year hiatus, another study on the subject was released in 2013. As a result, while research in this topic is still in its early stages, the number of articles published has been steadily growing. In terms of the research methodologies employed, quantitative methods have recently gained popularity [3]. According to our investigation, no significant journal in this subject has published more than four articles on the long-term viability of crowdfunding, leading our team to the conclusion that any type of research in this sector is only seldom published. According to our research, donation based crowdfunding received the highest amount of attention. Lending based crowdfunding approaches are the most relevant type of crowd funding practices when assessed by market based volume of 76%, but addressed only in 16% of the publications. The same contrast was also derived from in the crowd funding platforms examined, among what were examined, kickstarter which is a reward based crowdfunding platform is the favorite chosen source of data. Crowdfunding is a relatively new trend which is slowly gaining popularity. According to one definition, "crowdfunding" is the ability to gather a generous amount of money from a large pool of potential investors and stakeholders. Thus far, crowdfunding has gained a lot of popularity driven mainly because of the international financial crisis of 2008 [7], which resulted in credit institutions tightening their financial strength and solvency criteria. In this new age which relies heavily on the internet for their day to day tasks and the unlimited access almost everyone has, it is possible to sustain large crowds of local and foreign investors in a cost-eff...