Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc. Also, any image has very important characteristic such as large size, strong correlation and huge redundancy, therefore, encrypting it by using single key Advanced Encryption Standard (AES) through IoT communication technologies makes it vulnerable to many threats, thus, the pixels that have the same values will be encrypted to another pixels that have same values when they use the same key. The contribution of this work is to increase the security of transferred image. This paper proposed multiple key AES algorithm (MECCAES) to improve the security of the transmitted image through IoT. This approach is evaluated via applying it on RGB bmp images and analyzing the results using standard metrics such as entropy, histogram, correlation, Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MES) metrics. Also, the time for encryption and decryption for the proposed MECCAES is the same time consumed by original single key AES is 12 second(the used image size is 12.1MB therefore time is long). The performance experiments show that this scheme achieves confidentiality also it encourages to use effectively in a wide IoTs fields to secure transmitted image.
Polarization modulation plays an important role in polarization encoding in quantum key distribution. By using polarization modulation, quantum key distribution systems become more compact and more vulnerable as one laser source is used instead of using multiple laser sources that may cause side-channel attacks. Metasurfaces with their exceptional optical properties have led to the development of versatile ultrathin optical devices. They are made up of planar arrays of resonant or nearly resonant subwavelength pieces and provide complete control over reflected and transmitted electromagnetic waves opening several possibilities for the development of innovative optical components. In this work, the Si nanowire metasurface grating polarize
... Show MoreTechnically, mobile P2P network system architecture can consider as a distributed architecture system (like a community), where the nodes or users can share all or some of their own software and hardware resources such as (applications store, processing time, storage, network bandwidth) with the other nodes (users) through Internet, and these resources can be accessible directly by the nodes in that system without the need of a central coordination node. The main structure of our proposed network architecture is that all the nodes are symmetric in their functions. In this work, the security issues of mobile P2P network system architecture such as (web threats, attacks and encryption) will be discussed deeply and then we prop
... Show MoreKey generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show MoreDespite the multiplicity of institutions contributing to the decision-making process in the United States of America, they interact to crystallize positions regarding international and strategic situations. The formulation of the national security policy depends on a number of institutions that complement each other in order to achieve an advanced security situation. Thus, the decision reflects the process of interaction of the existing regulatory institutions. This is because the essence of the national security and achieving its requirements also stems from the existence of a coherent system of shared beliefs and principles in the American society. Besides, these elements are the bases for achieving
... Show MoreThe media plays an important role in a number of functions performed by them. Press is one of those media which had and still have a clear role in addressing the various issues, topics, and events. Journalism is no longer as expressed by owners of the liberal theory – it seeks to raise the instincts – but it began to excite the minds of readers to meet their needs. At the same time, it does not neglect the search for the truth and work to deliver it to readers. Some have identified a set of tasks carried out by the press including the interest in public affairs, the needs of the community, work to provide happiness, what is beneficial and useful and combat the negative phenomenon and to address the deviations facing society. The comi
... Show MoreThis work presents an innovative approach to enhancing the performance of concrete with reclaimed asphalt pavement (RAP) aggregates using titanium dioxide (TiO2) nanoparticles. Traditional limestone coarse aggregates were partially replaced with 30% and 50% RAP aggregates; a subset of mixtures containing RAP aggregates was treated with TiO2 nanoparticles. The rheological, mechanical, and long-term properties of concrete, along with changes in its chemical composition following the addition of RAP and TiO2, were evaluated. Results revealed that using 30% and 50% RAP in concrete mixtures reduced their compressive strength by 18% and 27%, respectively. However, using TiO2 in those mixtures enhanced their compressive strength by 8.7% an
... Show MoreST Alawi, NA Mustafa, Al-Mustansiriyah Journal of Science, 2013