Search

Browse Subject Areas

For Authors

Submit a Proposal

Design and Analysis of Security Protocols for Communication

Edited by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O.P. Verma
Series: Artificial Intelligence and Soft Computing for Industrial Transformation
Copyright: 2020   |   Status: Published
ISBN: 9781119555643  |  Hardcover  |  
368 pages | 87 illustrations
Price: $225 USD
Add To Cart

One Line Description
The book combines analysis and comparison of various security protocols such as HTTP, SMTP, RTP, RTCP, FTP, UDP for mobile or multimedia streaming security protocol.

Audience
Research scholars and engineers working in the area of security protocols for communication will find this book a handy reference guide. Software and hardware engineers, who work specifically in the area of communication protocols, will find this book a useful resource as all the security protocols it covers are compared and compiled in one place, thus ensuring their proper utilization. In addition, graduate and post-graduate students will find this book an ideal guide in courses on electronics and communication engineering, telecommunication engineering, network engineering, computer science and engineering and information technology.

Description
Over the past few decades, digital communication has grown by leaps and bounds. The expanding use of the internet in our day-to-day lives has resulted in a six-fold increase in the number of internet users in the past two decades alone, leading to an evolution of technologies for home use such as cloud computing, artificial intelligence, big data analytics and machine learning. However, insecurity or loss of information continues to be a major concern with multiple cases across the globe of breach of information or platforms leading to loss of data, money, faith and much more.
There are many different security protocols for various types of applications of the internet like email, web browsing, webchat, video streaming, cloud-based communication, closed group communication, banking transactions, e-commerce and many more both at network level and user end. Security has evolved to counter many kinds of attacks like intrusion, manipulation, spoofing and so on, for which techniques like cryptography, message digest, digital signature, steganography, watermarking, time stamping, access control, etc., have been incorporated into various layers of communication, resulting in protocols like HTTP, SMTP, RTP, RTCP, FTP, UDP and many more.
The 16 chapters in this book, all written by subject matter experts, analyze and compare the various protocols which might act as a Mobile Communication Security Protocol or Multimedia Streaming Security Protocol. The main goal of the book is to help the engineer proper utilize the correct security application for the application at hand.

Back to Top
Author / Editor Details
Dinesh Goyal received his PhD in 2014 on 'Secure Video Transmission in a Cloud Network' and is now Dean of Academics as well as a member of the Dept. of Computer Science & Engineering, Suresh Gyan Vihar University, India. His research interests are related to information & network security, image processing, data analytics and cloud computing.

S. Balamurugan is the Director of Research and Development, Intelligent Research Consultancy Services(iRCS), Coimbatore, Tamilnadu, India. He also serves as R&D Consultant for many companies, startups, SMEs and MSMEs. He has published 40 books, 200+ articles in international journals/conferences as well as 27 patents. He is Editor-in-Chief of Information Science Letters and International Journal of Robotics and Artificial Intelligence. His research interests include artificial intelligence, IoT, big data analytics, cloud computing, industrial automation and wearable computing. He is a life member of IEEE, ACM, ISTE and CSI.

Sheng-Lung Peng is a Professor of the Department of Computer Science and Information Engineering at National Dong Hwa University, Hualien, Taiwan. He received PhD degree in Computer Science from the National Tsing Hua University, Taiwan. He is an honorary Professor of Beijing In formation Science and Technology University of China,a supervisor of the Chinese Information Literacy Association and of the Association of Algorithms and Computation Theory. His research interests are in designing and analyzing algorithms for bioinformatics, combinatorics, data mining, and networks. He has published more than 100 international conference and journal papers.

O. P. Verma is the Principal at GB Pant Govt. Engineering College, New Delhi, India. Previously, he was at the Department of Computer Science & Engineering, Delhi Technical University, New Delhi, India. His research interests include image processing, soft computing, machine learning, evolutionary computing.

Back to Top

Table of Contents
Preface
1 History and Generations of Security Protocols
Bright Keswani, Poonam Keswani and Rakhi Purohit
2 Evolution of Information Security Algorithms
Anurag Jagetiya and C. Rama Krishna
3 Philosophy of Security by Cryptostakes Schemes
Hemant Kumar Saini
4 Zero-Share Key Management for Secure Communication Across a Channel
P. R. Mahalingam and K. A. Fasila
5 Soft Computing-Based Intrusion Detection System With Reduced False Positive Rate
Dharmendra G. Bhatti and Paresh V. Virparia
6 Recursively Paired Arithmetic Technique (RPAT): An FPGA- Based Block Cipher Simulation and Its Cryptanalysis
Rajdeep Chakraborty and J.K. Mandal
7 Security Protocol for Multimedia Streaming
N. Brindha, S. Deepa and S. Balamurugan
8 Nature Inspired Approach for Intrusion Detection Systems
Mohd Shahid Husain
9 The Socio-Behavioral Cipher Technique
Harshit Bhatia, Rahul Johari and Kalpana Gupta
10 An Energy Efficient Scheme for Real-Time Transmissions Using Mobile Coordinated Wireless Sensor Network
E. Udayakumar, S. Balamurugan and P. Vetrivelan
11 Intrusion Detection Strategies in Smart Grid
P. Ponmurugan, C. Venkatesh, M. Divya Priyadharshini and S. Balamurugan
12 Security Protocol for Cloud-Based Communication
R. Suganya and S. Sujatha
13 Security Protocols for Mobile Communications
Divya Priyadharshini M., Divya R., Ponmurugan P. and Balamurugan S.
14 Use of Machine Learning in Design of Security Protocols
M. Sundaresan and D. Boopathy
15 Privacy and Authentication on Security Protocol for Mobile Communications
Brajesh Kumar Gupta “Mewadev”
16 Cloud Communication: Different Security Measures and Cryptographic Protocols for Secure Cloud Computing
Anjana Sangwan
Index


Back to Top



Description
Author/Editor Details
Table of Contents
Bookmark this page