Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Chaos Based Stego Color Image Encryption

M. I. Fath Allah

Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in which Fractional Fast Fourier Transform (FRFFT) has been used with DWT. Not only new techniques will be presented but also a new chaotic map has been used as random keys for both algorithms. After extensive comparative study with some traditional techniques, it has been found that the proposed algorithms have achieved better performance.

Read More

Doi: https://doi.org/10.54216/JCIM.100201

Vol. 10 Issue. 2 PP. 08-18, (2022)

Coded DCO-OFDM Techniques in Intensity Modulation/Direct Detection (IM/DD) Systems

Mohamed Abdelaziz , Essam Abdellatef

Optical wireless communications (OWC) are among the best alternative techniques for transmitting information-laden optical radiation across a free-space channel from one place to another. DC-biased optical OFDM (DCO-OFDM) is a technique that sacrifices the power efficiency to transmit unipolar OFDM signals. The primary drawback with DCO-OFDM is its clipping noise, which causes distortion and lowers the bit error rate (BER). Thus, in this paper, we show the performance of DCO with different coded techniques to improve the BER in additive white Gaussian noise (AWGN) for IM/DD systems. The experimental results show that the coded DCO-OFDM has the best performance. Furthermore, turbo coding has the best coding technique added to the DCO-OFDM system.

Read More

Doi: https://doi.org/10.54216/JCIM.100202

Vol. 10 Issue. 2 PP. 19-25, (2022)

Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis

Mahmoud A. Zaher , Nabil M. Eldakhly

The Internet of Things (IoT) has revolutionized the way we interact with everyday objects, enabling devices to collect and share data seamlessly. However, this increased connectivity has also increased the security risks associated with these devices, as they often lack the necessary security mechanisms to prevent malicious attacks. To address this issue, we propose using blockchain technology to secure IoT devices. In this paper, we present a proof-of-concept implementation of a blockchain-based IoT security system and analyze its effectiveness. Our system leverages blockchain's distributed ledger technology to ensure data integrity, decentralization, and transparency, making it more resilient to attacks. We evaluate our system's performance and compare it with other existing IoT security solutions. Our results show that our blockchain-based approach outperforms traditional security measures and is a viable solution for securing IoT devices. Finally, we discuss the limitations of our study and suggest future research directions for improving the security of IoT devices.

Read More

Doi: https://doi.org/10.54216/JCIM.100203

Vol. 10 Issue. 2 PP. 26-34, (2022)

A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age

Ahmed Sleem

The digital age has ushered in a new era of connectivity and opportunity. However, it has also made us more vulnerable to cyber threats. In recent years, we have seen a rise in the number and sophistication of cyberattacks. These attacks can have a devastating impact on businesses, governments, and individuals. This paper provides a comprehensive overview of cybersecurity threats and countermeasures. It begins by discussing the different types of cybersecurity threats, including malware, phishing, denial-of-service attacks, and data breaches. The paper then discusses the different types of cybersecurity countermeasures, including firewalls, antivirus software, and intrusion detection systems. The paper concludes by discussing strategies for mitigating risks in the digital age including 1) Investing in cybersecurity solutions, 2) Educating employees about cybersecurity best practices, and 3) Having a plan in place to respond to cyberattacks. By following these strategies, businesses, governments, and individuals can help to protect themselves from cyber threats.

Read More

Doi: https://doi.org/10.54216/JCIM.100204

Vol. 10 Issue. 2 PP. 35-46, (2022)

Lightweight Symmetric Encryption and Attribute Based Encryption Method to Increase Information Safety in Wireless Sensor Network

Rajeev Pandey

Direct data transmission in a wireless sensor network raises the data transfer cost. In addition, the lifetime of sensor networks is shortened because of the rise in energy required for data exchange. As a result, data aggregation is utilized in WSN to lessen the burden of transmission costs and lengthen the useful life of the sensor networks. The sensor nodes and their collected data are vulnerable to destruction because they are broadcasting in a hostile environment. Therefore, data security is a major topic of study for WSN. Due to the limited resources of the sensor network, conventional wireless network security measures are ineffective.  With Speck encryption and CP-ABE, the proposed Lightweight Secured remote Health monitoring System (LSHS) can protect health data and restrict who can access it while using less power. Lightweight block ciphers are optimal for protecting medical records, according to the research. Using the LSHS, we evaluate how well-known lightweight block ciphers like AES, Simon, and Speck perform. Both encrypting and decrypting with the Speck technique require less processing time. Therefore, medical records are encrypted using the Speck algorithm.

Read More

Doi: https://doi.org/10.54216/JCIM.100205

Vol. 10 Issue. 2 PP. 47-56, (2023)