Author:
Haifaa Ahmed Hasan ,Hassan F. Al-Layla ,Farah N. Ibraheem
Abstract
In the recent decade, global community has been one of the world's most prominent targets of terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however the security forces and law enforcement agencies are creating and launching high security weaponry to secure their territories. There is a huge necessity to include the greater level of protection into military vehicles in the wake of several terrorist attacks and sniffing of security officers. Terrorists rely heavily on infiltration while avoiding detection by security measures because of the holes in these hypothetical situations. This paper presents the central methods of hash functions, cryptography and dynamic encryption that may be utilised by the military personnel to increase the safety, privacy, and resistance to sniffing of their communications with one another. This article details the many methods and algorithms that may be included into laser guided defensive weapons and vehicles to provide safe communication across the system.
Subject
Industrial and Manufacturing Engineering,Materials Science (miscellaneous),Business and International Management
Reference48 articles.
1. Ma M, He D, Kumar N, Choo KK, Chen J. Certificate-less searchable public key en-cryption scheme for industrial internet of things. IEEE Transactions on Industrial In-formatics. 2018 Feb;14(2):759-67.
2. Minatel PH, Lee SH, Pinto BS, Boeira FC, inventors; Samsung Electronica da Amazonia Ltda, assignee. Method for Verifying Authenticity, Configuring Network Credentials and Cryptographic Keys for Internet Of Things (IoT) Devices Using Near Field Com-munication (NFC). United States patent application US 15/365,069. 2018 May 31.
3. Chaudhary R, Jindal A, Aujla GS, Kumar N, Das AK, Saxena N. LSCSH: Lattice-Based Secure Cryptosystem for Smart Healthcare in Smart Cities Environment. IEEE Commu-nications Magazine. 2018 Apr 1;56(4):24-32.
4. Trivedi, D. M., & Raval, T. J. (2018). Proposed Cryptographic Approach for Securing IOT Device.
5. Sani AS, Yuan D, Yeoh PL, Bao W, Chen S, Vucetic B. A Lightweight Security and Privacy-Enhancing Key Establishment for Internet of Things Applications. In2018 IEEE International Conference on Communications (ICC) 2018 May 20 (pp. 1-6). IEEE.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献