[vc_empty_space][vc_empty_space]
Security system for surveillance radar network communication using chaos algorithm
Lestriandoko N.H.a, Juhana T.a, Munir R.b
a Research Center for Informatics, Indonesian Institute of Sciences (LIPI), Indonesia
b School of Electrical Engineering and Informatics, Institut Teknologi Bandung (ITB), Indonesia
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2014 IEEE.Surveillance radar network is the network of some radar station to monitor and keep watch ship/vessel traffic. The communication of these station used tcp/ip over internet and local area network. The security system is an important part that can not be ignored for network communication. This paper proposed a prototype of security system for surveillance radar network, which is handling the security of communications over the Internet between a radar station to master station. The system is designed to protect the radar data against unauthorized parties. From the previous work, there was a weakness in the pseudorandom number generator. The generated number could not satisfy the randomness, it might be raise a security problem. Thus, Pseudorandom Number Generator (PNRG) using chaos algorithm was added to strengthen the salt cryptographic scheme. The analysis of result will be discussed to obtain the advantages of new system. Finally, a layered security system has been developed by taking advantage of a variety of encryption algorithms to get the best protection for the security of surveillance radar network communication.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Chaos algorithm,Cryptographic schemes,Encryption algorithms,Identity-based,Layered security,Network communications,Pseudo random number generators,Security problems[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]chaos algorithm,Identity Based Security(IBE),salt cryptography,security system,surveillance radar network[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/TSSA.2014.7065947[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]