Click to open the HelpDesk interface
AECE - Front page banner

Menu:


FACTS & FIGURES

JCR Impact Factor: 0.700
JCR 5-Year IF: 0.700
SCOPUS CiteScore: 1.8
Issues per year: 4
Current issue: May 2024
Next issue: Aug 2024
Avg review time: 57 days
Avg accept to publ: 60 days
APC: 300 EUR


PUBLISHER

Stefan cel Mare
University of Suceava
Faculty of Electrical Engineering and
Computer Science
13, Universitatii Street
Suceava - 720229
ROMANIA

Print ISSN: 1582-7445
Online ISSN: 1844-7600
WorldCat: 643243560
doi: 10.4316/AECE


TRAFFIC STATS

2,642,039 unique visits
1,048,848 downloads
Since November 1, 2009



Robots online now
ZoominfoBot
Googlebot


SCOPUS CiteScore

SCOPUS CiteScore


SJR SCImago RANK

SCImago Journal & Country Rank




TEXT LINKS

Anycast DNS Hosting
MOST RECENT ISSUES

 Volume 24 (2024)
 
     »   Issue 2 / 2024
 
     »   Issue 1 / 2024
 
 
 Volume 23 (2023)
 
     »   Issue 4 / 2023
 
     »   Issue 3 / 2023
 
     »   Issue 2 / 2023
 
     »   Issue 1 / 2023
 
 
 Volume 22 (2022)
 
     »   Issue 4 / 2022
 
     »   Issue 3 / 2022
 
     »   Issue 2 / 2022
 
     »   Issue 1 / 2022
 
 
 Volume 21 (2021)
 
     »   Issue 4 / 2021
 
     »   Issue 3 / 2021
 
     »   Issue 2 / 2021
 
     »   Issue 1 / 2021
 
 
  View all issues  


FEATURED ARTICLE

Analysis of the Hybrid PSO-InC MPPT for Different Partial Shading Conditions, LEOPOLDINO, A. L. M., FREITAS, C. M., MONTEIRO, L. F. C.
Issue 2/2022

AbstractPlus


SAMPLE ARTICLES

Multi-Period Transmission Switching Strategy Analysis Considering Thermal Unit Commitment, LAM, L. H., NAM, L. K., HIEU, N. H.
Issue 1/2023

AbstractPlus

A New Visual Cryptography Method Based on the Profile Hidden Markov Model, OZCAN, H., KAYA GULAGIZ, F., ALTUNCU, M. A., ILKIN, S., SAHIN, S.
Issue 1/2021

AbstractPlus

NARA: Network Assisted Routing and Allocation Algorithm for D2D Communication in 5G Cellular Networks, BASTOS, A. V., da SILVA, C. M., da SILVA Junior, D. C.
Issue 4/2021

AbstractPlus

Design and Development of Modified Hybrid Resonant Converter with Valley-fill for LED Lighting, BALAKRISHNAN, L. P., RAMALINGAM, S.
Issue 4/2023

AbstractPlus

Comparison of Control Configurations and MPPT Algorithms for Single-Phase Grid-Connected Photovoltaic Inverter, PRASATSAP, U., NERNCHAD, N., TERMRITTHIKUN, C., SRITA, S., KAEWCHUM, T., SOMKUN, S.
Issue 2/2023

AbstractPlus

Stub Loaded Patch Antenna and a Novel Method for Miniaturization at Sub 6 GHz 5G and Wi-Fi Frequencies, HAKANOGLU, B. G., KOC, B., SEN, O., YALDUZ, H., TURKMEN, M.
Issue 2/2021

AbstractPlus




LATEST NEWS

2024-Jun-20
Clarivate Analytics published the InCites Journal Citations Report for 2023. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.700 (0.700 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.600.

2023-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2022. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.800 (0.700 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 1.000.

2023-Jun-05
SCOPUS published the CiteScore for 2022, computed by using an improved methodology, counting the citations received in 2019-2022 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2022 is 2.0. For "General Computer Science" we rank #134/233 and for "Electrical and Electronic Engineering" we rank #478/738.

2022-Jun-28
Clarivate Analytics published the InCites Journal Citations Report for 2021. The InCites JCR Impact Factor of Advances in Electrical and Computer Engineering is 0.825 (0.722 without Journal self-cites), and the InCites JCR 5-Year Impact Factor is 0.752.

2022-Jun-16
SCOPUS published the CiteScore for 2021, computed by using an improved methodology, counting the citations received in 2018-2021 and dividing the sum by the number of papers published in the same time frame. The CiteScore of Advances in Electrical and Computer Engineering for 2021 is 2.5, the same as for 2020 but better than all our previous results.

Read More »


    
 

  2/2024 - 6

Enhancing Security and Privacy in Modern Text-Based Instant Messaging Communications

VUKOVIC GRBIC, D. See more information about VUKOVIC GRBIC, D. on SCOPUS See more information about VUKOVIC GRBIC, D. on IEEExplore See more information about VUKOVIC GRBIC, D. on Web of Science, DJURIC, Z., KELEC, A. See more information about KELEC, A. on SCOPUS See more information about KELEC, A. on SCOPUS See more information about KELEC, A. on Web of Science
 
View the paper record and citations in View the paper record and citations in Google Scholar
Click to see author's profile in See more information about the author on SCOPUS SCOPUS, See more information about the author on IEEE Xplore IEEE Xplore, See more information about the author on Web of Science Web of Science

Download PDF pdficon (1,334 KB) | Citation | Downloads: 105 | Views: 107

Author keywords
cryptography, formal protocol verification, privacy, security, steganography

References keywords
security(12), protocol(10), steganography(9), secure(8), communication(8), verification(6), text(5), science(5), link(5), formal(5)
Blue keywords are present in both the references section and the paper title.

About this article
Date of Publication: 2024-05-31
Volume 24, Issue 2, Year 2024, On page(s): 49 - 60
ISSN: 1582-7445, e-ISSN: 1844-7600
Digital Object Identifier: 10.4316/AECE.2024.02006
SCOPUS ID: 85195681328

Abstract
Quick view
Full text preview
Modern society changed the way of communication: instead of communicating face-to-face, people more often communicate using text-based instant messaging (IM) applications. These applications use appropriate protocols to facilitate communication between end users. It is crucial to ensure both the security and an adequate level of privacy for end users. Many existing protocols having the same purpose might be considered potentially suspicious. The reason for this is the usage of encryption - encrypted traffic is often targeted by mass surveillance tools. This paper presents a novel protocol named StegaCloak. By combining cryptography with steganography, this protocol enhances security and privacy in modern text-based IM communication. Furthermore, it addresses one important weakness of other similar protocols - detectability, by hiding real communication within regular chat messages. We described our protocol using two approaches: a simple diagram of messages flow and formal protocol flow notation. The proposed protocol is compared to some of the most well-known IM protocols today, OTR and Signal. Its security is verified using the AVISPA tool, a tool designed for the formal verification of security protocols.


References | Cited By  «-- Click to see who has cited this paper

[1] J. M. Hudson, P. L. Witt, "Internet Relay Chat (IRC)," in Handbook of Computer Networks, 1st ed., H. Bidgoli, Ed., Wiley, 2007, pp. 889-897.
[CrossRef] [SCOPUS Times Cited 2]


[2] C. Fuchs, D. Trottier, "Internet surveillance after Snowden: A critical empirical study of computer experts' attitudes on commercial and state surveillance of the Internet and social media post-Edward Snowden," JICES, vol. 15, no. 4, pp. 412-444, Dec. 2017.
[CrossRef] [Web of Science Times Cited 20] [SCOPUS Times Cited 24]


[3] B. Schneier. Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. First published as a Norton paperback in 2016. New York London: W.W. Norton & Company, 2016

[4] D. Vukovic, D. Gligoroski, Z. Djuric, "CryptoCloak protocol and the prototype application," 2015 IEEE Conference on Communications and Network Security (CNS), Florence, Italy: IEEE, Sep. 2015, pp. 721-722.
[CrossRef] [SCOPUS Times Cited 3]


[5] R. Stedman, K. Yoshida, I. Goldberg, "A user study of off-the-record messaging," in Proceedings of the 4th symposium on Usable privacy and security, Pittsburgh Pennsylvania USA: ACM, Jul. 2008, pp. 95-104.
[CrossRef] [SCOPUS Times Cited 17]


[6] O. Bini, S. Celi, "No evidence of communication and implementing a protocol: Off-the-Record protocol version 4," presented at PoPETS symposium 2018. [Online] Available: Temporary on-line reference link removed - see the PDF document

[7] OTRv4, [Online] Available: Temporary on-line reference link removed - see the PDF document

[8] K. Cohn-Gordon, C. Cremers, B. Dowling, L. Garratt, D. Stebila, "A formal security analysis of the signal messaging protocol," J Cryptol, vol. 33, no. 4, pp. 1914-1983, Oct. 2020.
[CrossRef] [Web of Science Times Cited 50] [SCOPUS Times Cited 61]


[9] M. S. Taha, M. S. Mohd Rahim, S. A. Lafta, M. M. Hashim, H. M. Alzuabidi, "Combination of steganography and cryptography: A short survey," IOP Conf. Ser.: Mater. Sci. Eng., vol. 518, no. 5, p. 052003, May 2019.
[CrossRef] [Web of Science Times Cited 27] [SCOPUS Times Cited 73]


[10] S. Saraireh, "A secure data communication system using cryptography and steganography," International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.3, May 2013. [Online] Available: Temporary on-line reference link removed - see the PDF document

[11] P. P. Aung, T. M. Naing, "A novel secure combination technique of steganography and cryptography," IJITMC, vol. 2, no. 1, pp. 55-62, Feb. 2014.
[CrossRef]


[12] A. Jan, S. A. Parah, M. Hussan, B. A. Malik, "Double layer security using crypto-stego techniques: A comprehensive review," Health Technol., vol. 12, no. 1, pp. 9-31, Jan. 2022.
[CrossRef] [Web of Science Times Cited 4] [SCOPUS Times Cited 12]


[13] A. M. Ahmed, A. S. Nori, "Improve security using steganography and cryptography based on smartphone users locations," in 2022 Second International Conference on Advances in Electrical, Computing, Communication and Sustainable Technologies (ICAECT), Bhilai, India: IEEE, Apr. 2022, pp. 1-7.
[CrossRef] [Web of Science Record] [SCOPUS Times Cited 1]


[14] M. Junaid, K. Farhan, "Enhanced audio LSB steganography for secure communication," IJACSA, vol. 7, no. 1, 2016.
[CrossRef]


[15] E. W. Abood et al., "Audio steganography with enhanced LSB method for securing encrypted text with bit cycling," Bulletin EEI, vol. 11, no. 1, pp. 185-194, Feb. 2022.
[CrossRef] [SCOPUS Times Cited 7]


[16] J. Peng, S. Tang, "Covert communication over VoIP streaming media with dynamic key distribution and authentication," IEEE Trans. Ind. Electron., vol. 68, no. 4, pp. 3619-3628, Apr. 2021.
[CrossRef] [Web of Science Times Cited 7] [SCOPUS Times Cited 13]


[17] A. Chandragiri, P. A. Cooper, L. Yanxin, L. Qingzhong, "Implementing secure communication on short text messaging," In Proceedings of the 2nd International Symposium on Digital Forensics and Security, pp. 77-80, 2014

[18] M. Taleby Ahvanooey, Q. Li, J. Hou, H. Dana Mazraeh, J. Zhang, "AITSteg: An innovative text steganography technique for hidden transmission of text message via social media," IEEE Access, vol. 6, pp. 65981-65995, 2018.
[CrossRef] [Web of Science Times Cited 27] [SCOPUS Times Cited 43]


[19] S. Kingslin, N. Kavitha, "Evaluative approach towards text steganographic techniques," Indian Journal of Science and Technology, vol. 8, no. 29, Nov. 2015.
[CrossRef]


[20] A. Yahya, "Steganography techniques," in Steganography Techniques for Digital Images, Cham: Springer International Publishing, 2019, pp. 9-42.
[CrossRef]


[21] A. Armando et al., "The AVISPA tool for the automated validation of internet security protocols and applications," in Computer Aided Verification, vol. 3576, K. Etessami and S. K. Rajamani, Eds., in Lecture Notes in Computer Science, vol. 3576. , Berlin, Heidelberg: Springer Berlin Heidelberg, 2005, pp. 281-285.
[CrossRef] [SCOPUS Times Cited 993]


[22] A. H. Shinde, A. Umbarkar, N. R. Pillai, "Cryptographic protocols specification and verification tools - A Survey," IJCT, vol. 08, no. 02, pp. 1533-1539, Jun. 2017.
[CrossRef]


[23] P. R. Yogesh, D. S. R, "Formal verification of secure evidence collection protocol using BAN Logic and AVISPA," Procedia Computer Science, vol. 167, pp. 1334-1344, 2020.
[CrossRef] [Web of Science Times Cited 16] [SCOPUS Times Cited 32]


[24] M. Singh, M. Ranganathan, "Formal verification of bootstrapping remote secure key infrastructures (BRSKI) protocol using AVISPA," National Institute of Standards and Technology Technical Note 2123, Oct. 2020.
[CrossRef]


[25] A. D. Azzahra, Y. Farida, A. A. Lestari, "Formal Analysis of SMAP Fog/Edge Protocol Using AVISPA," in 2022 1st International Conference on Smart Technology, Applied Informatics, and Engineering (APICS), Surakarta, Indonesia: IEEE, Aug. 2022, pp. 31-35.
[CrossRef] [SCOPUS Times Cited 1]


[26] M. M. Modiri, J. Mohajeri, M. Salmasizadeh, "A novel group-based secure lightweight authentication and key agreement protocol for machine-type communication," Scientia Iranica, Feb. 2021.
[CrossRef] [Web of Science Times Cited 2] [SCOPUS Times Cited 5]


[27] H. Dalkilic, M. H. Ozcanhan, "A strong mutual authentication protocol for securing wearable smart textile applications," Adv. Electr. Comp. Eng., vol. 22, no. 1, pp. 31-38, 2022.
[CrossRef] [Full Text] [Web of Science Times Cited 2] [SCOPUS Times Cited 3]


[28] T. Genet, "A Short SPAN+AVISPA Tutorial," [Research Report] IRISA, 2015. [Online] Available: Temporary on-line reference link removed - see the PDF document

[29] A. Gotsman, F. Massacci, M. Pistore, "Towards an independent semantics and verification technology for the HLPSL specification language," Electronic Notes in Theoretical Computer Science, vol. 135, no. 1, pp. 59-77, Jul. 2005.
[CrossRef] [Web of Science Times Cited 6] [SCOPUS Times Cited 8]


[30] D. Dolev, A. Yao, "On the security of public key protocols," IEEE Trans. Inform. Theory, vol. 29, no. 2, pp. 198-208, Mar. 1983.
[CrossRef] [Web of Science Times Cited 2955] [SCOPUS Times Cited 3935]


[31] D. Adrian et al., "Imperfect forward secrecy: How Diffie-Hellman fails in practice," in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver Colorado USA: ACM, Oct. 2015, pp. 5-17.
[CrossRef] [Web of Science Times Cited 173] [SCOPUS Times Cited 288]


[32] C. Johansen, A. Mujaj, H. Arshad, J. Noll, "The snowden phone: A comparative survey of secure instant messaging mobile applications," Security and Communication Networks, vol. 2021, pp. 1-30, Jul. 2021.
[CrossRef] [Web of Science Times Cited 1] [SCOPUS Times Cited 2]


[33] J. Alwen, S. Coretti, Y. Dodis, "The double ratchet: Security notions, proofs, and modularization for the signal protocol," in Advances in Cryptology - EUROCRYPT 2019, vol. 11476, Y. Ishai and V. Rijmen, Eds., in Lecture Notes in Computer Science, vol. 11476, Cham: Springer International Publishing, 2019, pp. 129-158.
[CrossRef] [Web of Science Times Cited 54] [SCOPUS Times Cited 62]


[34] N. Kobeissi, "Formal verification for real-world cryptographic protocols and implementations," Cryptography and Security [cs.CR]. Universite Paris sciences et lettres, 2018. English. ffNNT: 2018PSLEE065ff, fftel-03245433v4. [Online] Available: Temporary on-line reference link removed - see the PDF document



References Weight

Web of Science® Citations for all references: 3,344 TCR
SCOPUS® Citations for all references: 5,585 TCR

Web of Science® Average Citations per reference: 96 ACR
SCOPUS® Average Citations per reference: 160 ACR

TCR = Total Citations for References / ACR = Average Citations per Reference

We introduced in 2010 - for the first time in scientific publishing, the term "References Weight", as a quantitative indication of the quality ... Read more

Citations for references updated on 2024-06-22 16:04 in 182 seconds.




Note1: Web of Science® is a registered trademark of Clarivate Analytics.
Note2: SCOPUS® is a registered trademark of Elsevier B.V.
Disclaimer: All queries to the respective databases were made by using the DOI record of every reference (where available). Due to technical problems beyond our control, the information is not always accurate. Please use the CrossRef link to visit the respective publisher site.

Copyright ©2001-2024
Faculty of Electrical Engineering and Computer Science
Stefan cel Mare University of Suceava, Romania


All rights reserved: Advances in Electrical and Computer Engineering is a registered trademark of the Stefan cel Mare University of Suceava. No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from the Editor. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Faculty of Electrical Engineering and Computer Science, Stefan cel Mare University of Suceava, Romania, if and only if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.

Permission for other use: The copyright owner's consent does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific written permission must be obtained from the Editor for such copying. Direct linking to files hosted on this website is strictly prohibited.

Disclaimer: Whilst every effort is made by the publishers and editorial board to see that no inaccurate or misleading data, opinions or statements appear in this journal, they wish to make it clear that all information and opinions formulated in the articles, as well as linguistic accuracy, are the sole responsibility of the author.




Website loading speed and performance optimization powered by: 


DNS Made Easy