The Literature Review on The Role and Significance of Cryptography for Network Security in Current Scenario

Authors

  • Praful Kr. Ranjay  Department of Computer Science, Magadh University, Bodh Gaya, India
  • Prof. Dr. Ramdip Prasad  Department of Mathematics, Danapur College, Patna, India
  • Arif Md. Sattar  Department of Computer Science, Anugrah Memorial College, Gaya, India

DOI:

https://doi.org//10.32628/CSEIT2064125

Keywords:

Network Security, Data Security, Cryptography, Internet, OSI Model

Abstract

As the internet has gotten more integrated into our daily lives and has grown exponentially over the last several decades, data security has become a major issue for everybody connected to the internet. Data security ensures that only the intended recipients have access to our information and prohibits any data modification or manipulation. Various techniques and approaches have been developed to reach this level of security. Cryptography is described as a set of techniques for encrypting data using specified algorithms that render the data unreadable to the naked eye unless decoded using procedures predefined by the sender. We cover some of the most recent research in the fields of cryptography and network security in this article. The security vulnerabilities of existing as well as upcoming technologies in the field of Computer Networks are discussed in these research articles. We bundle the articles together based on their content and categorise the research subjects based on their implementation throughout the seven layers of the well-known OSI reference model. In the interest of brevity, the main purpose for each research study is outlined, and the proposed solution is stated simply.

References

  1. S. J. Lincke and A. Hollan, "Network Security: Focus on Security, Skills, and Stability," in 37th ASEE/IEEE Frontiers in Education Conference, Milwaukee, 2007.
  2. O. O. Khalifa, M. R. Islam, S. Khan and M. S. Shebani, "Communications cryptography," in RF and Microwave Conference, 2004. RFM 2004. Proceedings, Selangor, 2004.
  3. N. Jirwan, A. Singh and S. Vijay , "Review and Analysis of Cryptography Techniques," International Journal of Scientific & Engineering Research, vol. 3, no. 4, pp. 1-6, 2013 .
  4. Tayal, N. Gupta, P. Gupta, D. Goyal and M. Goyal, "A Review paper on Network Security and Cryptography," Advances in Computational Sciences and Technology , vol. 10, no. 5, pp. 763770, 2017.
  5. A. Gupta and N. K. Walia, "Cryptography Algorithms: A Review," NTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH, vol. 2, no. 2, pp. 1667-1672,2014.
  6. J. Callas, "The Future of Cryptography," Information Systems Security, vol. 16, no. 1, pp. 15-22, 2007.
  7. J. L. Massey, "Cryptography—A selective survey," Digital Communications, vol. 85, pp. 3-25, 1986.
  8. B. Schneier, "The Non-Security of Secrecy," Communications of the ACM, vol. 47, no. 10, pp. 120-120, 2004.
  9. N. Varol, F. Aydoğan and A. Varol, "Cyber Attacks Targetting Android Cellphones," in The 5th International Symposium on Digital Forensics and Security (ISDFS 2017), Tirgu Mures, 2017.
  10. K. Chachapara and S. Bhadlawala, "Secure sharing with cryptography in cloud," in 2013 Nirma University International Conference on Engineering (NUiCONE), Ahmedabad, 2013.  [14] H. Orman, "Recent Parables in Cryptography," IEEE Internet Computing, vol. 18, no. 1, pp. 82-86, 2014.
  11. R. GENNARO, "IEEE Security & Privacy," IEEE Security & Privacy, vol. 4, no. 2, pp. 64 - 67, 2006.
  12. B. Preneel, "Cryptography and Information Security in the PostSnowden Era," in IEEE/ACM 1st International Workshop on TEchnical and LEgal aspects of data pRivacy and SEcurity, Florence, 2015.
  13. S. B. Sadkhan, "Cryptography : current status and future trends," in International Conference on Information and CommunicationTechnologies: From Theory to Applications, Damascus, 2004.
  14. Shouhuai Xu, Xiaohu Li, Timothy Paul Parker, Xueping Wang, “Exploiting Trust based Social Networks for Distributed Storage of Sensitive Data”, IEEE Transactions on Information Forensics and Security, Volume 6, Issue 1, 2011, pp 39-52, DOI: 10.1109/TIFS.2010. 2093521.
  15. Lo-Yao Yeh, Yu-Lun Huang, Anthony D. Joseph, Shiuhpyng Winston Shieh, Woei-Jiunn Tsaur, “A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks”, IEEE Transactions on Vehicular Technology, Volume 61, Issue 4, pp 1907-1924, 2012, DOI: 10.1109/TVT.2012.2188821.
  16. Ralf Kusters, Tomasz Truderung, Jurgen Graf, “A Framework for the Cryptographic Verification of Java-like Programs”, IEEE 25th Computer Security Foundations Symposium, Cambridge, MA, 25 - 27 2012, pp 198 -212, DOI: 10.1109/CSF.2012.9. 
  17. Idoia Aguirre, Sergio Alonso, "Improving the Automation of Security Information Management: A Collaborative Approach", IEEE Security and Privacy, Volume 10, No. 1, pp 55-59, January/ February 2012, DOI: 10.1109/MSP. 2011.153. 
  18. Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li, "Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks", IEEE Transactions on Parallel and Distributed Systems, Volume 25, No. 4, pp 950-959, April 2014, DOI:10.1109/TPDS.2013.74.
  19. I G Geetha, C Jayakumar, “Implementation of Trust and Reputation Management for Free-Roaming Mobile Agent Security”, IEEE Systems Journal, Issue 99, 2014, pp 1 - 11, DOI: 10.1109/JSYST.2013.2292192. 
  20. Jesus Tellez Isaac, Zeadally Sherali, "Secure Mobile Payment Systems", IT Professional, Volume 16, No. 3, pp 36-43, May-June 2014, DOI:10.1109/MITP. 2014.40.
  21. Kui Ren, Qian Wang, "Security Challenges for the Public Cloud", IEEE Internet Computing, Volume 16, No. 1, pp 69-73, January/February 2012, DOI:10.1109/MIC.2012.14.
  22. Sezer S, Scott-Hayward S, Chouhan P K, Fraser B, Lake D, Finnegan J, Viljoen N, Miller M, Rao N, “Are We Ready for SDN? Implementation Challenges for Software-Defined Networks”, IEEE Communications Magazine, Volume 51, Issue 7, pp 36 - 43, July 2013, DOI: 10.1109/ MCOM. 2013.6553676.
  23. Salah K, Alcaraz Calero, J.M, Zeadally S, Al-Mulla S, Alzaabi M, “Using Cloud Computing to Implement a Security Overlay Network”, IEEE Security & Privacy, Volume 11, Issue 1, pp 44 - 53, Feb 2013, DOI: 10.1109/MSP.2012.88.
  24. Yu Zhang, Loukas Lazos, William Jr. Kozma, “AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Issue 99, pp 1, Dec 2012, DOI: 10.1109/TMC.2012.257.
  25. Jie Yang, Yingying (Jennifer) Chen, Wade Trappe, Jerry Cheng, “Detection and Localization of Multiple Spoofing Attackers in Wireless Networks”, IEEE Transactions on Parallel and Distributed Systems, Volume 24, No. 1, January 2013.
  26. Shiyu Ji, Ting Ting Chen, Sheng Zhong, “Wormhole attack detection algorithms in wireless network coding systems”, IEEE Transactions on Mobile Computing, No. 1, pp 1, PrePrints, DOI: 10.1109/TMC.2014. 2324572.
  27. Mohamed M.E.A Mahmoud, Xuemein (Sherman) Shen, “A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks”, IEEE Transactions on parallel and Distributed Systems, Volume 24, Issue 2, pp 209 - 229, 2013, DOI: 10.1109/TPDS.2012.106.
  28. U. Ben-Porat, A. Bremler-Barr, and H. Levy, "Vulnerability of network mechanisms to sophisticated DDoS attacks", IEEE Transactions on Computers, Volume 62, No. 5, pp 1031 - 1043, 2013, DOI: 10.1109/TC.2012.49.
  29. Nayot Poolsappasit, Rinku Dewri, Indrajit Ray, “Dynamic Security Risk Management Using Bayesian Attack Graphs”, IEEE Transactions on Dependable and Secure Computing, Volume 9,  Issue 1, pp 61 - 74, Feb 2012, DOI: 10.1109/TDSC.2011.34.
  30. Walter Cerroni, Franco Callegati, “Man-in-the-Middle Attack to the HTTPS Protocol”, IEEE Security & Privacy, Volume 7, Issue 1, pp 78 - 81, Feb 2009, DOI: 10.1109/MSP.2009.12.
  31. Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li, “Defense against Primary User Emulation Attacks in Cognitive Radio Networks using Advanced Encryption Standard”, IEEE Transactions on Information Forensics and Security, Volume 9, No. 5, pp 772 - 781, May 2014.
  32. Guilin Wang, Jiangshan Yu, Qi Xie, “Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks”, IEEE Transactions on Industrial Informatics, Volume 9, Issue 1, pp 294 - 302, Feb 2013, DOI: 10.1109/TII.2012.2215877.
  33. Yossi Gilad, Amir Herzberg, Haya Shulman, “Off path hacking: The Illusion of Challenge-Response Authentication”, IEEE Security & Privacy, Issue 99, pp 1, Oct 2013, DOI: 10.1109/MSP.2013.130.
  34. Stainslaw Jarecki, Jihye Kim, Gene Tsudik, “Flexible Robust Group Key Agreement”, IEEE Transactions on Parallel & Distributed Systems, Volume 22, Issue 5, pp 879 - 886, May 2011, DOI: 10.1109/TPDS.2010.128.
  35. Andrew Chi-Chih Yao, Yunlei Zhao, “Privacy-Preserving Authenticated Key-Exchange over Internet”, IEEE Transactions on Information Forensics and Security, Volume 9, Issue 1, pp 125 - 140, Jan 2014, DOI: 10.1109/TIFS. 2013.2293457.
  36. Ning Cai, Raymond W. Yeung, “Secure Network Coding on a Wiretap Network”, IEEE Transactions on Information Theory, Volume 57, No. 1, pp 424 - 435, Jan 2011, DOI: 10.1109 /TIT.2010. 2090197.
  37. Takao Murakami, Kenta Takahashi, Kanta Maatsura, “Toward Optimal fusion algorithms with security against wolves and lambs in biometrics”, IEEE Transactions on Information Forensics and Security, Volume 9, Issue 2, pp 259 - 271, Feb 2014, DOI: 10.1109/TIFS.2013.2296993.
  38. Lane Harrison, Aidong Lu, “The Future of Security Visualization: Lessons from Network Visualization”, IEEE Network Magazine, Volume 26, Issue 6, pp 6 - 11, Dec 2012, DOI: 10.1109/MNET.2012. 6375887.
  39. Fan Zhang, Wenbo He, Yangyi Chen, Zhou Li, XiaoFeng Wang, Shuo Chen, Xue Liu, “Thwarting WiFi side channel analysis through Traffic Demultiplexing”, IEEE Transactions on Wireless Communications, Volume 13, No. 1, Jan 2014, DOI: 10.1109/TWC.2013.121013.121473.
  40. Daniele Riboni, Antonio Villani, Domenico Vitali, Claudio Bettini, Luigi V. Mancini, “Obfuscation of Sensitive Data for Incremental Release of Network Flows”, IEEE/ACM Transactions on Networking, Issue 99, pp 1 - 15, Mar 2014, DOI: 10.1109/TNET.2014. 2309011.
  41. Andrey Garnaev, Melike Baykal-Gursoy, H. Vincent Poor, “Incorporating Attack-Type Uncertainty into Network Protection”, IEEE Transactions on Information Forensics and Security, Volume 9, Issue 8, pp 1278 - 1287, Aug 2014.

Downloads

Published

2019-04-30

Issue

Section

Research Articles

How to Cite

[1]
Praful Kr. Ranjay, Prof. Dr. Ramdip Prasad, Arif Md. Sattar, " The Literature Review on The Role and Significance of Cryptography for Network Security in Current Scenario, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 5, Issue 2, pp.1347-1357, March-April-2019. Available at doi : https://doi.org/10.32628/CSEIT2064125