Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices (Q1718927): Difference between revisions
From MaRDI portal
Set OpenAlex properties. |
ReferenceBot (talk | contribs) Changed an Item |
||
Property / cites work | |||
Property / cites work: Cryptanalytic Attacks on Pseudorandom Number Generators / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Password hardening based on keystroke dynamics / rank | |||
Normal rank |
Latest revision as of 02:36, 18 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices |
scientific article |
Statements
Ubi-RKE: a rhythm key based encryption scheme for ubiquitous devices (English)
0 references
8 February 2019
0 references
Summary: As intelligent ubiquitous devices become more popular, security threats targeting them are increasing; security is seen as one of the major challenges of the ubiquitous computing. Now a days, applying ubiquitous computing in number of fields for human safety and convenience was immensely increased in recent years. The popularity of the technology is rising day by day, and hence the security is becoming the main focused point with the advent and rising popularity of the applications. In particular, the number of wireless networks based on ubiquitous devices has increased rapidly; these devices support transmission for many types of data traffic. The convenient portability of ubiquitous devices makes them vulnerable to security threats, such as loss, theft, data modification, and wiretapping. Developers and users should seriously consider employing data encryption to protect data from such vulnerabilities. In this paper, we propose a Rhythm Key based Encryption scheme for ubiquitous devices (Ubi-RKE). The concept of Rhythm Key based Encryption has been applied to numerous real world applications in different domains. It provides key memorability and secure encryption through user touching rhythm on ubiquitous devices. Our proposed scheme is more efficient for users than existing schemes, by providing a strong cipher.
0 references