Cover: Design and Analysis of Security Protocol for Communication by Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O.P. Verma

Scrivener Publishing
100 Cummings Center, Suite 541J
Beverly, MA 01915-6106

 

Publishers at Scrivener
Martin Scrivener (martin@scrivenerpublishing.com)
Phillip Carmical (pcarmical@scrivenerpublishing.com)

Design and Analysis of Security Protocol for Communication




Edited by

Dinesh Goyal, S. Balamurugan, Sheng-Lung Peng and O.P. Verma




No alt text required.

Preface

Over the past few decades, digital communication has grown by leaps and bounds. The expanding use of the internet in our day-to-day lives has resulted in a six-fold increase in the number of internet users in the past two decades alone, leading to an evolution of technologies for home use such as Cloud Computing, Artificial Intelligence, Big Data Analytics and Machine Learning.

Today, 30% of the total business worldwide is done online, with approximately 25% of banking transactions being done exclusively from smart-phones and laptops at home or the office. Moreover, 50% of the world’s population is currently using social media as a platform for connecting with their friends and colleagues; and primary and higher education institutions are using internet-based education as a tool for enriching students’ knowledge and at the same time keeping track of their academic performance. Now even Government agencies are moving to internet platforms, with most of their services currently available online.

Although this huge volume of internet usage has made life easier for every individual, insecurity or loss of information continues to be a major concern. There have been many cases across the globe of breach of information or platforms leading to loss of data, money, faith and much more.

Various research scientists have done a lot of work over the past five to six decades to develop security protocols for ensuring minimization of breach of data either being stored or under one network. The history of information security has been quite long and has evolved from the era of its birth to present date. During this period millions of cryptographic algorithms have evolved, some of which have been quite successful for ensuring many secure communications across the World Wide Web.

The application of security has changed as technology has evolved from tube computing to palm (nano) computing. Presently, we have many different security protocols for various types of applications of the internet like email, web browsing, webchat, video streaming, cloud-based communication, closed group communication, banking transactions, e-commerce and many more both at network level and user end.

Security has evolved to counter many kinds of attacks like intrusion, manipulation, spoofing and so on, for which techniques like cryptography, message digest, digital signature, steganography, watermarking, time stamping, access control, etc., have been incorporated into various layers of communication, resulting in protocols like HTTP, SMTP, RTP, RTCP, FTP, UDP and many more.

The issue with these protocols is that they are not being reviewed from time to time, nor are they being compiled and compared in one place. Our aim in publishing this book is to combine the analysis and comparison of various protocols which might act as a Mobile Communication Security Protocol or Multimedia Streaming Security Protocol. Therefore, this book discusses and analyzes some of the security protocols available for communication in various application areas.

The 15 chapters of this book are well placed to illustrate the security protocols for communication. Following is a brief synopsis of each chapter:

Communication has become a lifeline for the current era, and secure communication is blood in the veins of that lifeline. Currently very few books are available on the security protocols of different communication models like wireless communication, cloud-based communication, multimedia communication, MANET (infrastructureless) communication, etc. By providing this book to an audience working in the domains of network security, we have attempted to cover the history of the evolution of communication protocols and also provide some new techniques for security of communication channels with the use of tools like machine learning and nature-inspired algorithms.

We thank all the authors for contributing to our book with their valuable knowledge. We hope this book will prove to be a good resource for the intended audience to access all relevant technologies on one platform!!

Dinesh Goyal
S. Balamurugan
Sheng-Lung Peng
O.P. Verma

December 2019