Articles

Enhancing Network Security through Advanced Authentication and Key Management Mechanisms

This paper introduces the SEAKS-PKMv2 protocol, a robust security mechanism aimed at addressing vulnerabilities within the PKMv2 framework, particularly focusing on mutual authentication, key management, and encryption in mobile WiMAX networks. By integrating RSA-based and EAP-based authentication methods, SEAKS-PKMv2 establishes a secure environment that mitigates risks such as replay, man-in-the-middle and interleaving attacks. The protocol adopts a distributed authentication and localized key management approach, facilitating efficient and secure network access and data transmission. Through simulation, we evaluate the SEAKS-PKMv2 protocol’s performance in terms of packet delivery ratio, overhead, processing time, and resilience against rogue relay station attacks. The findings demonstrate significant improvements in network security and efficiency, confirming the effectiveness of SEAKS-PKMv2 in enhancing the integrity and confidentiality of communications in distributed network settings.

Evaluating Encryption Algorithm Method Based on Software Encryption Tools for Information Security

Information security is the combination of policies, rules and practices to prevent any unauthorized access or attacks that causes corruption to data, information, and computing services. Information security techniques and programs are built around the core objective to secure data and information by adapting encryption algorithms methods. Encryption algorithm methods impeded in the information security programs or encryption software tools enforce more security by encrypting and decrypting data and information. Encryption algorithm methods are based on algorithms that scramble data and information by converting them into unreadable text. There are various encryption methods used in various encryption software tools. The more encryption algorithm methods used within the encryption software tool, the more security provided on data and information effective data and information security.  In this paper, the most used encryption algorithm methods are analyzed and evaluated based on their usage in encryption software tools to determine the most encryption algorithm method that is used ensure more security on data and information.