Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
This study proposes SECS/GEM-AE, a mechanism for securing SECS/GEM data messages using AES-GCM encryption and evaluates its performance against the standard SECS/GEM protocol and SECS/GEMsec, a security mechanism proposed to authenticate SECS/GEM messages.
| Main Author: | Jaisan S M, Ashish |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2024
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/63114/ http://eprints.usm.my/63114/1/Pages%20from%20ASHISH%20JAISAN%20S%20M%20-%20TESIS.pdf |
Similar Items
Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing
by: Laghari, Shams Ul Arfeen
Published: (2023)
by: Laghari, Shams Ul Arfeen
Published: (2023)
A source authentication and data confidentiality scheme for multicast networks
by: Benmachiche, Abderrahim, et al.
Published: (2016)
by: Benmachiche, Abderrahim, et al.
Published: (2016)
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)
by: Hintaw, Ahmed Jameel
Published: (2023)
Confidentiality
by: Jahn Kassim, Puteri Nemie
Published: (2019)
by: Jahn Kassim, Puteri Nemie
Published: (2019)
The effect of Total Productive Management practices on manufacturing performance through SECS/GEM Standard for electronic contract manufacturing companies (TOC, Abstract, chapter 1 and Reference only)
by: Krishnamoorthy Renganathan,
Published: (2015)
by: Krishnamoorthy Renganathan,
Published: (2015)
Uncovering local gems
by: Soo, Gisele, et al.
Published: (2024)
by: Soo, Gisele, et al.
Published: (2024)
The rare gem that is Armstrong
by: Abd Razak, Dzulkifli
Published: (2009)
by: Abd Razak, Dzulkifli
Published: (2009)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Toward confidential distributed medical emergency system and security service
by: Hameed, Shihab A., et al.
Published: (2010)
by: Hameed, Shihab A., et al.
Published: (2010)
Cryptographic key exchange protocol with message authentication codes (MAC) using finite state machine
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
by: Mat Isa, Mohd Anuar, et al.
Published: (2014)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
S-PkSec: an asymmetric key based security management scheme for sensor network operation
by: Haque, Md. Mokammel, et al.
Published: (2008)
by: Haque, Md. Mokammel, et al.
Published: (2008)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
Simplified E-Content system (SECS)
by: Oon, Seau Foong
Published: (2014)
by: Oon, Seau Foong
Published: (2014)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Patient Confidentiality - revisited
by: Mohammad Amjad, Nasser
Published: (2013)
by: Mohammad Amjad, Nasser
Published: (2013)
Improved message authentication technique on IEEE 802.15.4 wireless sensor network using multiple key protocol
by: Al-Alak, Saif M. Kh.
Published: (2014)
by: Al-Alak, Saif M. Kh.
Published: (2014)
The Sec14 superfamily and mechanisms for crosstalk between lipid metabolism and lipid signaling
by: Bankaitis, V., et al.
Published: (2010)
by: Bankaitis, V., et al.
Published: (2010)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
A model for ensuring data confidentiality: In healthcare and medical emergency
by: Hameed, Shihab A., et al.
Published: (2011)
by: Hameed, Shihab A., et al.
Published: (2011)
Statistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
by: Ghaben, Ayman Ibrahim Ali
Published: (2023)
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks
by: Parvin, Sazia, et al.
Published: (2010)
by: Parvin, Sazia, et al.
Published: (2010)
A situation assessment and prediction mechanism for network security situation awareness
by: Leau, Yu Beng
Published: (2016)
by: Leau, Yu Beng
Published: (2016)
4-(sec-butylamino)-3-nitrobenzoic acid
by: Narendra Babu, Shivanagere Nagojappa, et al.
Published: (2009)
by: Narendra Babu, Shivanagere Nagojappa, et al.
Published: (2009)
Inositol in the MAnaGemENt of abdominal aortic aneurysm (IMAGEN): Study protocol for a randomised controlled trial
by: Rowbotham, S., et al.
Published: (2017)
by: Rowbotham, S., et al.
Published: (2017)
Secured Real-Time Machine Communication Protocol
by: Ren, yifei, et al.
Published: (2024)
by: Ren, yifei, et al.
Published: (2024)
Gem and rock artifacts at Pulau Kelumpang, Perak
by: Tan , Teong Hing, et al.
Published: (1990)
by: Tan , Teong Hing, et al.
Published: (1990)
Shield Laws and Confidential Sources: Data retention’s threat to shield laws
by: Fernandez, Joseph
Published: (2015)
by: Fernandez, Joseph
Published: (2015)
Authenticity and Diversity: Enhancing Australian Hepatitis C Prevention Messages
by: Winter, R., et al.
Published: (2013)
by: Winter, R., et al.
Published: (2013)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
Universiti Sydney Juara Debat GEMS WUPID09
by: Universiti Putra Malaysia, Bahagian Komunikasi Korporat
Published: (2009)
by: Universiti Putra Malaysia, Bahagian Komunikasi Korporat
Published: (2009)
THE NATION LOST ANOTHER GEM: CONDOLENCES
FROM USM
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2017)
by: MPRC, Pusat Media & Perhubungan Awam
Published: (2017)
Banker's duty of confidentiality: withering away?
by: Mohd. Yasin, Norhashimah
Published: (2015)
by: Mohd. Yasin, Norhashimah
Published: (2015)
Legal and ethical dimensions of consent and confidentiality
by: Jahn Kassim, Puteri Nemie
Published: (2017)
by: Jahn Kassim, Puteri Nemie
Published: (2017)
Informed consent and confidentiality in military setting
by: Jahn Kassim, Puteri Nemie
Published: (2019)
by: Jahn Kassim, Puteri Nemie
Published: (2019)
Similar Items
-
Cryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing
by: Laghari, Shams Ul Arfeen
Published: (2023) -
A source authentication and data confidentiality scheme for multicast networks
by: Benmachiche, Abderrahim, et al.
Published: (2016) -
MARKCLOUD - Software for data confidentiality and security in cloud computing environments
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014) -
Enhancement of bluetooth security
authentication using hash-based message
authentication code (HMAC) algorithm
by: Diallo, Alhassane Saliou, et al.
Published: (2014) -
Secure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm
by: Hintaw, Ahmed Jameel
Published: (2023)