A Novel Secured Data Transmission Using Less Number of Keys in Sensor Nodes Used in Security Application Networks

Sensor nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-Tolerant Network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext - Policy Attribute-Based Encryption (CP-ABE) is a promising cryptographic solution to the access control issues. 

Spotlight

CryptoMove

Active defense data protection. CryptoMove protects data with dynamic movement, distribution, mutation, and re-encryption. •Integrate w/cloud, distributed, on prem, database, at edge/fog nodes, and IoT devices. •Threat model: data identification and recon, cryptographic attack, cleartext and ciphertext exfiltration, key attack, data destruction, integrity, insider, corruption, ransomware, quantum. Active defense makes the attack surface dynamic and frustrates multiple layers of the kill-chain, including reconnaissance and lateral movement.

OTHER WHITEPAPERS
news image

Unidirectional Security Gateways: Enabling Secure IT-OT Communications

whitePaper | June 28, 2022

Braking performance, corner analysis, pit stop strategy breakdowns. To watch a Formula 1 race today is as much about being an adrenaline junkie as it is being a data geek, thanks to the 300 sensors on an F1 car sending more than 1.1 million data points to the pits every second1.

Read More
news image

Post-Covid-19: Digital Transformation and OT Cyber Security in Asia

whitePaper | November 2, 2022

Digital transformation has been dramatically accelerated by the Covid-19 pandemic, requiring businesses and operations to quickly set up infrastructures to maintain business continuity. And no part of the network has been impacted more than the OT environment. New systems allow employees to operate from home and for equipment vendors to connect remotely to the network to maintain production. And as we emerge from the pandemic, organisations are now more cognisant of the advantages of scaling their business and operations beyond their traditional network perimeters than ever before.

Read More
news image

Cisco’s Private 5G Solution Security Overview

whitePaper | October 12, 2022

Cisco’s Private 5G (P5G) solution, offered as a service, is designed to fit seamlessly into existing enterprise networks and provide private cellular networking capabilities for that enterprise. The solution builds on Cisco’s enterprise networking best practices and a clear understanding of enterprises’ understanding and expectations of private networks.

Read More
news image

Cloud Security Survey 2023: Infrastructure Protection Best Practices

whitePaper | September 23, 2022

This survey was distributed by VMware User Group (VMUG) to their user base between July and September 2022. The responses were analyzed by the phoenixNAP team and key findings are presented in this document.

Read More
news image

The EU Cybersecurity Certification Scheme

whitePaper | September 28, 2022

GlobalPlatform is a technical standards organization that enables the efficient launch and management of innovative, secure-by-design digital services and devices, which deliver end-to-end security, privacy, simplicity, and convenience to users. It achieves this by providing standardized technologies and certifications that empower technology and service providers to develop, certify, deploy, and manage digital services and devices in line with their business, security, regulatory, and data protection needs.

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More

Spotlight

CryptoMove

Active defense data protection. CryptoMove protects data with dynamic movement, distribution, mutation, and re-encryption. •Integrate w/cloud, distributed, on prem, database, at edge/fog nodes, and IoT devices. •Threat model: data identification and recon, cryptographic attack, cleartext and ciphertext exfiltration, key attack, data destruction, integrity, insider, corruption, ransomware, quantum. Active defense makes the attack surface dynamic and frustrates multiple layers of the kill-chain, including reconnaissance and lateral movement.

Events