- Browse by Subject
Browsing by Subject "cybersecurity"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Efficient Secure E-Voting and its Application in Cybersecurity Education(2022-05) Swearingen, Nathan; Zou, Xukai; Li, Feng; Hu, QinAs the need for large elections increases and computer networking becomes more widely used, e-voting has become a major topic of interest in the field of cryptography. However, lack of cryptography knowledge among the general public is one obstacle to widespread deployment. In this paper, we present an e-voting scheme based on an existing scheme. Our scheme features an efficient location anonymization technique built on homomorphic encryption. This technique does not require any participation from the voter other than receiving and summing location shares. Moreover, our scheme is simplified and offers more protection against misbehaving parties. We also give an in-depth security analysis, present performance results, compare our scheme with existing schemes, and describe how our research can be used to enhance cybersecurity education.Item Internet of Things Security Using Proactive WPA/WPA2(2016-04-05) Kamoona, Mustafa; El-Sharkawy, Mohamed A.; King, Brian; Rizkalla, MaherThe Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation.Item Methods of Current Knowledge Teaching on the Cybersecurity Example(MDPI, 2022-10-22) Nyemkova, Elena; Justice, Connie; Liaskovska, Solomiia; Lakh, Yuriy; Computer Information and Graphics Technology, Purdue School of Engineering and TechnologyTeaching of modern cybersecurity specialists should be up to date and use the newest methods and methodologies in universities as the IT industry is rapidly growing and constantly changing. A good idea is to use methods of management in IT companies as methods for current knowledge teaching of university students. It is also worth engaging students not only in educational international projects but the research projects as well. This work analyzes the method for teaching students, and the Scrum methodology was selected and implemented for educational and research projects. Students participated in both projects, however, Scrum models should be different for them and this is illustrated in the paper. The visualization of collected statistical data of the performed educational project illustrated distributions of students by specialization and by marks. The distributions by marks showed that using the Scrum model for the teaching course significantly increases the marks compared with the average level marks of the students in their specializations.