Yazar "Nand, Parma" seçeneğine göre listele
Listeleniyor 1 - 2 / 2
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe Applications and Associated Challenges in Deployment of Software Defined Networking (SDN)(Springer Science and Business Media Deutschland GmbH, 2023) Baniya, Pashupati; Agrawal, Atul; Nand, Parma; Bhushan, Bharat; Hameed, Alaa Ali; Jamil, AkhtarSDN, a rising technology within the realm of Internet of Things (IoT), has been increasingly well-received in recent times. This article presents a summary of SDN along with its different elements, advantages, and difficulties. The paper aims to provide practical solutions for introducing OpenFlow into commercial routers without hardware modifications and extending the integration of OpenFlow with legacy control protocols and control planes. In addition, the paper presents a refactoring process for migrating traditional network applications to OpenFlow-based ones, focusing on the security challenges and techniques of open technologies like SDN, OpenROADM, and SDN-based Mobile Networks (SDMN). The document also examines the advantages and possible uses of SDMN in enhancing network adaptability, streamlining network administration, and bolstering network security. The article also discusses O-RAN network innovations and difficulties, such as AI and ML workflows that are made possible by the architecture and interfaces, security concerns, and, most importantly, standardization issues. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.Öğe CryptStego: Powerful Blend of Cryptography and Steganography for Securing Communications(Springer Science and Business Media Deutschland GmbH, 2024) Pandey, Shraiyash; Baniya, Pashupati; Nand, Parma; Hameed, Alaa Ali; Bhushan, Bharat; Jamil, AkhtarIn today’s era, security is one of the most critical issues in the development of electronic communications applications, especially when sending private data. The data may be encrypted with several algorithms; however, an extra layer of security can improve protection by a significant amount. Therefore, in this paper, we have developed an application, CryptStego, to secure data using two techniques, cryptography and steganography, to transmit data securely. The encryption of original data is executed using Blowfish algorithm, a cryptographic technique. Additionally, the encrypted data is hidden through using Least Significant Bit (LSB), a steganography technique. The implementation of both techniques offers an extensive level of security, since an intruder must firstly identify the encrypted text within the image to attain the encrypted text, then secondly to decrypt using the algorithm to obtain the original message. Therefore, any intruder must encounter multiple levels of security to obtain the original message from the cipher image. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.