An Illustrative Review Cryptographic Algorithms for Scada Application in Networking Ntru for Security

Authors

  • Nitin Sudhakar Patil, Shailaja Sanjay Mohite, Ravindra Sadashivrao Apare, Rajesh Bhatt, Akanksha Kapruwan, Manish Saraswat, Akhil Sankhyan, Anurag Shrivastava

Keywords:

Cryptographic Algorithms, SCADA, NTRU, Security, Cryptography Networking Applications

Abstract

The computational applications and network protection capabilities of mobile and wireless networks have grown exponentially. Cyberattacks and other unlawful activity on commercial and personal networks have increased in recent years. Firewalls and security code fail to secure computer networks. Personal gadget users, company employees, and military personnel realise network defence is crucial. SCADA systems are commonly utilised in Critical Infrastructure Systems to autonomously monitor and control industrial activities. Security concerns are more likely in SCADA design due to its reliance on computers, networks, applications, and programmable controllers.  The huge demand for computers among corporations and other organisations has led to the creation of several networks. Computer network attacks have increased in recent years. Cryptographic solutions of these requirements have performance issues in SCADA systems. NTRU, a faster and lighter public key technique for end-to-end security, is used in this research to improve SCADA security requirements.

Downloads

Download data is not yet available.

References

Anjula Gupta , et.al. “Cryptography Algorithms: A Review “ International Journal of Engineering Development and Research, Vol.2 No.2, (2014).

Mini Malhotra et.al. “ Study of Various Cryptographic Algorithms”, International Journal of Scientific Engineering and Research, Vol.1, No.3, (2013), PP.77-88.

Shashi Mehrotra Seth et.al,” Comparative Analysis Of Encryption Algorithms For Data Communication”, International Journal of Computer Science and Technology, Vol.2, No.2 (2011) pp.292-294.

S G Suganya, Prasanna D, “Detection and Prevention of DDoS Attack Using Modern Cracking Algorithm”, International Research Journal in Advanced Engineering and Technology, Vol.2, Issue.3, Apr 2017.

E. Thambiraja, G. Ramesh, Dr. R. Umarani, “A Survey on Various Most Common Encryption Techniques” International Journal of Advanced Research in Computer Science and Software Engineering, VOL. 2, Issue 7 July 2012, Page 226-233.

Sumedha Kaushik, Ankur Singhal, “Network Security Using Cryptographic Techniques” International Journal of Advanced Research in Computer Science and Software Engineering, VOL.2, Issue 12 December 2012, Page 105-107.

Daemen, J., and Rijmen, V. "Rijndael: The Advanced Encryption Standard." Dr. Dobb's Journal, March 2001.

Pranay Meshram,Pratibha Bhaisare, S.J.Karale,”,comparative study of selective encryption algorithm for wireless adhoc network” ,IJREAS Volume 2, Issue 2 , in International Journal of Research in Engineering & Applied Sciences.

Punita Mellu & Sitender Mali, “AES: Asymmetric key cryptographic System” International Journal of Information Technology and Knowledge Management, 2011, Vol, No. 4 pp. 113-117.

Wenye Wang, Zhuo Lu., “Cyber Security in the Smart Grid: Survey and challenges”, Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol.57 Issue 5, April, 2013.

Martin Drahansky and Maricel Balitanas., “Cipher for Internet-based Supervisory Control and Data Acquisition Architecture,” Journal of Security Engineering, Jun, 2011.

Aamir Shahzad and Shahrulniza Musa., “Cryptography and Authentication Placement to Provide Secure Channel for SCADA Communication”, International Journal of Society (IJS), Vol.6, Issue.3, 2012.

PAN, S., LIU, X., XIE, N. and CHONG, Y., 2023. EG-TransUNet: a transformer-based U-Net with enhanced and guided models for biomedical image segmentation. BMC Bioinformatics, 24, pp. 1-22.

RAMYA SHREE, H.P., MINAVATHI and DINESH, M.S., 2023. An Automatic Nuclei Segmentation on Microscopic Images using Deep Residual U-Net. International Journal of Advanced Computer Science and Applications, 14(10),.

] SAIDA, D. and PREMCHAND, P., 2022. Brain Tumor Identification using Dilated U-Net based CNN. International Journal of Computers, Communications and Control, 17(6),.

SITANABOINA S.L. PARVATHI, BOLEM, S.C. and HARIKIRAN, J., 2023. Depth Invariant 3D-CU-Net Model with Completely Connected Dense Skip Networks for MRI Kidney Tumor Segmentation. Traitement du Signal, 40(1), pp. 217-225.

[Bani Ahmad, A. Y. A. ., Kumari, D. K. ., Shukla, A. ., Deepak, A. ., Chandnani, M. ., Pundir, S. ., & Shrivastava, A. . (2023). Framework for Cloud Based Document Management System with Institutional Schema of Database. International Journal of Intelligent Systems and Applications in Engineering, 12(3s), 672–678.

P. William, Anurag Shrivastava, Upendra Singh Aswal, Indradeep Kumar, Framework for Implementation of Android Automation Tool in Agro Business Sector, 2023 4th International Conference on Intelligent Engineering and Management (ICIEM), 10.1109/ICIEM59379.2023.10167328

P. William, Anurag Shrivastava, Venkata Narasimha Rao Inukollu, Viswanathan Ramasamy, Parul Madan, Implementation of Machine Learning Classification Techniques for Intrusion Detection System, 2023 4th International Conference on Intelligent Engineering and Management (ICIEM), 10.1109/ICIEM59379.2023.10167390

N Sharma, M Soni, S Kumar, R Kumar, N Deb, A Shrivastava, Supervised Machine Learning Method for Ontology-based Financial Decisions in the Stock Market, ACM Transactions on Asian and Low-Resource Language Information Processing.

[ Ajay Reddy Yeruva, Esraa Saleh Alomari, S Rashmi, Anurag Shrivastava, Routing in Ad Hoc Networks for Classifying and Predicting Vulnerabilities, Cybernetics and Systems, Taylor & Francis, 2023

P William, OJ Oyebode, G Ramu, M Gupta, D Bordoloi, A Shrivastava, Artificial intelligence based models to support water quality prediction using machine learning approach, 2023 International Conference on Circuit Power and Computing Technologie

J Jose, A Shrivastava, PK Soni, N Hemalatha, S Alshahrani, A Saleel, An analysis of the effects of nanofluid-based serpentine tube cooling enhancement in solar photovoltaic cells for green cities, Journal of Nanomaterials 2023

K Murali Krishna, Amit Jain, Hardeep Singh Kang, Mithra Venkatesan, Anurag Shrivastava, Sitesh Kumar Singh, Muhammad Arif, Deelopment of the Broadband Multilayer Absorption Materials with Genetic Algorithm up to 8 GHz Frequency, Security and Communication Networks

P Bagane, SG Joseph, A Singh, A Shrivastava, B Prabha, A Shrivastava, Classification of malware using Deep Learning Techniques, 2021 9th International Conference on Cyber and IT Service Management (CITSM).

A Shrivastava, SK Sharma,Various arbitration algorithm for onchip (AMBA) shared bus multi-processor SoC, 2016 IEEE Students' Conference on Electrical, Electronics and Computer Science, SCEECS 509330

A. Gandomi, M. Haider, “Beyond the hype: Big data concepts, methods, and analytics”, International Journal of Information Management, vol. 35, no. 2, pp. 137-144, 2015.

Shrivastava, A., Chakkaravarthy, M., Shah, M.A..A Novel Approach Using Learning Algorithm for Parkinson’s Disease Detection with Handwritten Sketches. In Cybernetics and Systems, 2022

Shrivastava, A., Chakkaravarthy, M., Shah, M.A., A new machine learning method for predicting systolic and diastolic blood pressure using clinical characteristics. In Healthcare Analytics, 2023, 4, 100219

Shrivastava, A., Chakkaravarthy, M., Shah, M.A.,Health Monitoring based Cognitive IoT using Fast Machine Learning Technique. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 720–729

Shrivastava, A., Rajput, N., Rajesh, P., Swarnalatha, S.R., IoT-Based Label Distribution Learning Mechanism for Autism Spectrum Disorder for Healthcare Application. In Practical Artificial Intelligence for Internet of Medical Things: Emerging Trends, Issues, and Challenges, 2023, pp. 305–321

Boina, R., Ganage, D., Chincholkar, Y.D., .Chinthamu, N., Shrivastava, A., Enhancing Intelligence Diagnostic Accuracy Based on Machine Learning Disease Classification. In International Journal of Intelligent Systems and Applications in Engineering, 2023, 11(6s), pp. 765–774

Shrivastava, A., Pundir, S., Sharma, A., ...Kumar, R., Khan, A.K. Control of A Virtual System with Hand Gestures. In Proceedings - 2023 3rd International Conference on Pervasive Computing and Social Networking, ICPCSN 2023, 2023, pp. 1716–1721

A. P. Srivastava, P. Choudhary, S. A. Yadav, A. Singh and S. Sharma, A System for Remote Monitoring of Patient Body Parameters, International Conference on Technological Advancements and Innovations (ICTAI), 2021, pp. 238-243,

ELLOUMI, N., SLIM, B.C., SEDDIK, H. and NADRA, T., 2023. A 3D Processing Technique to Detect Lung Tumor. International Journal of Advanced Computer Science and Applications, 14(6),.

EL-MELEGY, M., KAMEL, R.M., MOHAMED ABOU EL-GHAR, NORAH, S.A. and EL-BAZ, A., 2023. Kidney Segmentation from Dynamic Contrast-Enhanced Magnetic Resonance Imaging Integrating Deep Convolutional Neural Networks and Level Set Methods. Bioengineering, 10(7), pp. 755.

GE, Z., ZHANG, Z., SHI, L., LIU, S., GAO, Y., ZHOU, Y. and SUN, Q., 2023. An Algorithm Based on DAF-Net++ Model for Wood Annual Rings Segmentation. Electronics, 12(14), pp. 3009.

HAM, S., KIM, M., LEE, S., WANG, C., KO, B. and KIM, N., 2023. Improvement of semantic segmentation through transfer learning of multi-class regions with convolutional neural networks on supine and prone breast MRI images. Scientific Reports (Nature Publisher Group), 13(1), pp. 6877.

JUNG, Y., KIM, S., KIM, J., HWANG, B., LEE, S., EUN, Y.K., KIM, J.H. and HWANG, H., 2023. Abdominal Aortic Thrombus Segmentation in Postoperative Computed Tomography Angiography Images Using Bi-Directional Convolutional Long Short-Term Memory Architecture. Sensors, 23(1), pp. 175.

Downloads

Published

26.03.2024

How to Cite

Nitin Sudhakar Patil, Shailaja Sanjay Mohite, Ravindra Sadashivrao Apare, Rajesh Bhatt, Akanksha Kapruwan, Manish Saraswat, Akhil Sankhyan, Anurag Shrivastava. (2024). An Illustrative Review Cryptographic Algorithms for Scada Application in Networking Ntru for Security. International Journal of Intelligent Systems and Applications in Engineering, 12(21s), 501–511. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5447

Issue

Section

Research Article