Open Access Open Access  Restricted Access Subscription or Fee Access

Quantum Cryptanalysis Using Digital Ant in Pervasive Environment

Suruchi Sinha, Thomas Thomas, VK Panchal, D. SanthaDevi4

Abstract


Nowadays security is providing essential provision to prevent unauthorized or illegal access. It has become an essential part of every framework in electronic age. In the present scenario as the world data in increasing exponentially with time interval, there is an increased threat of malicious data. Hence, security becomes the vital component to make this growing electronic usage leads to a sustainable development in society. Swarm intelligence is an upcoming field; through its stochastic behavior it has the capabilities to solve a greater range of optimization problem. Using the property of Meta heuristic techniques of finding the most optimized solution authors attempted to use them for security purposes. Paper discusses about an agent based meta heuristic approach to infrastructure cyber defense mechanism where a team of human and software ants mitigate security threat posed in a pervasive environment. The Digital AntsTM system architecture will wander through entire network in identifying the invaders i.e. viruses, trojan horses etc. Also, the quantum theory is used to generate the polynomial data analogous to pheromone in Ant Colony Optimization.

Full Text:

PDF

References


D. Frincke, A. Wespi, and D. Zamboni, “From intrusion detection to self-protection,” Computer Networks, vol. 51, 2007, pp. 1233–1238.

E.A.R. Dahiyat, “Intelligent agents and intentionality: Should we begin to think outside the box?”Computer Law Security Rep., vol. 22, 2006, pp. 472–480.

F. Bellifemine, G. Caire, D. Greenwood, DevelopingMulti-Agent Systems with JADE, Wiley & Assoc, 2007.

J. Haack., G. Fink, E. Fulp, and W. Maiden, “Cooperative Infrastructure Defense,” presented at the Workshop on Visualization for Computer Security (VizSec), 2008,

M.B. Scher, “On doing ‘being reasonable login”, vol. 31, 2006, pp. 40–47.

Zhen Chen, “A Lightweight Encryption Algorithm for Images”, Advances in Intelligent and Soft Computing, 2012.

Adnan M. Alattar, “Improved Selective Encryption Techniques for Secure Transmission of Mpeg Video Bit-Streams”, ICIP, 1999.

Mohammed AF. Al-Husainy, “Image Encryption Using Genetic Algorithm”, Information Technology Journal Asian Network for Scientific Information, 2006.

Wenjun Zeng et al, “A multi-layer key stream based approach for joint encryption and Compression of H.264 video”, IEEE International Conference on Multimedia and Expo, 2011.

Yong Wang et.al, “A new chaos based fast image encryption algorithm”, Applied Soft Computing, 2011.




DOI: https://doi.org/10.37628/ijtet.v2i2.366

Refbacks

  • There are currently no refbacks.