logo

Overview of Network Security

   

Added on  2023-04-20

8 Pages2332 Words431 Views
Overview of network security

OVERVIEW OF NETWORK SECURITY
1
Introduction
Lightweight cryptography is an advanced technology which is located at the
intersection of electrical engineering, computer science, information technology and
focuses on modern designs and network protocols. The main goal of this technology is
to improve the performance, efficiency and security of computer devices and networks.
It is observed that many IT companies are using this approach for increasing security,
reducing the cost of products and optimize the high level computer network with an
effective manner [1]. It is a part of cryptography technique that can be used for
computer devices, wireless networks and RFID tags. The other gaol of this approach is
to enable a diverse range of modern application, for example, smart cities, wireless
systems, computer networks, smart meter, automatic vehicular system and IoT. The aim
of this report is to describe the importance of the lightweight cryptography technology
in the field of information technology, security threats occur in low power devices,
working principle of lightweight cryptography and challenges faced by this technology.
A recent study observed that with the help of lightweight cryptography technique
people can enhance the security of their personal devices. This report is categorized
into main four parts, for example, security threats of low power devices, working of
lightweight cryptography, performance metrics, algorithm and challenges faced by
lightweight cryptography.
Security threats in the system by using low power devices
There are many security related threats and issues occur using low power devices
which are described below:
Confidentiality
It is a very common security threat which results in the unwanted or fraud release of
sensitive information. In which hackers attack the server or networks of human
computer devices and transfer the unwanted signals to block their personal data or
information [2].
Authentication
It is observed that lightweight cryptography uses low power devices during data
communication and they also faced the problem of authentication. In which attacker

OVERVIEW OF NETWORK SECURITY
2
develop the unauthentic servers and send to the consumer to collect the personal
details of their networks. The issue of authentication can lead the cyber-crimes, data
breach and many other security threats in the computer system [3].
Denial of service attack
It is one of the most important security threats which occur due to lack of security and
consumers can lose their personal data or information. First hackers produce a large
number of traffic signals by using a botnet process after that they transfer to human
peripheral devices. It has the potential to reduce the performance of the computer
devices and hackers can easily access the accounts of users.
Malware attack
Malware is a kind of software which is used by the hackers during cyber-crimes and it
has the ability to detect and control the login ID or password of consumer accounts.
With the help of this technique, attackers can enter into their peripheral devices and
encrypt their personal details like a bank account, financial documents and many more
[4].
The working mechanism of lightweight cryptography
Lightweight cryptography is a modern technology which is growing rapidly and it is
driven by the lack of primitives capable to run on the computer system and devices with
very low computing power. It has potential to control and monitor the security related
issues faced by the low power devices [5]. It involves the hardware design and
implementation process that are more suitable for high level devices and
implementation for lightweight devices. There are main four lightweight cryptography
lounges which are the following:
Lightweight block cyphers
Lightweight hash functions
Lightweight Stream cyphers
Lightweight One-pass authenticated ciphers
It is observed that there are main three steps used during the implementation of a
lightweight cipher, in the first stage, people try to increase the performance of ciphers.
In the second stage investigator design and implement the ciphers in a particular

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Network Security and Preventive Techniques
|12
|3476
|20

Methods to Address Cybersecurity Issues in JL Organization
|13
|2416
|109

Implementation of Different Firewall Technologies: Advantages and Disadvantages
|6
|2344
|50

Ransomware & Malware
|5
|581
|276

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Cyber Security Assignment PDF
|9
|2867
|2114