D. Bourne’s research while affiliated with United Arab Emirates University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (5)


ESPQ_Presentation (2).pdf
  • Data
  • File available

January 2025

·

6 Reads

·

D. Bourne

·

Download

ESPQ: Quantum-Safe Encapsulation Security Payload

The significance of virtual private networks (VPN) has increased rapidly over time. Enterprises utilize IPsec and other VPN technologies to provide a secure connection to mission-critical resources over the internet. The various sub-protocols of IPsec i.e., Encapsulation Security Payload (ESP) and Authentication Header (AH) provide confidentiality and integrity through the encryption mechanisms. Unfortunately, recent studies indicate that the traditional encryption techniques employed in IPsec could face a potential threat from the progress of quantum computing. To address this issue, this research proposes an improved Encapsulation Security Payload for Quantum Safety (ESPQ) which can serve as a post-quantum encryption and authentication algorithm for VPN networks. The proposed algorithm incorporates modern quantum-safe algorithms into its framework. Through extensive research and analysis of performance metrics, it has become evident that ESPQ surpasses the conventional methodology of ESP both in terms of heightened security safeguards and reduced system load requirements.


Results Comparison
Detecting PII Leakage Using DPI and Machine Learning in an Enterprise Environment

May 2024

·

108 Reads

With the emergence of new technologies, the threat of cyberattacks is becoming more prominent. Apart from direct attacks, hackers also try to steal personal data through indirect methods, i.e., social engineering. This threatens not only single individuals but enterprises as well. As a form of protection, it’s important to raise awareness about cybercrime and social engineering. However, sometimes humans can be tricked by smart social engineering attacks. This calls for the need to improve the defense through the implementation of other methods such as Data Loss Prevention (DLP) or new customized monitoring systems that would further mitigate the risk of personal information leakage. Therefore, this paper implements a network traffic monitoring system at the network edge that inspects packets and classifies personal information based on an ML model trained on synthetic data.



Citations (1)


... As unveiled in [123], PQC computational methods can be utilized for secure identity management systems in Open RAN. It is supposed to play a crucial role in quantum-secure authentication, in order to counter various types of attacks that range from DoS [156] to MITM [157]. Nevertheless, PQC algorithms may lead to higher energy consumption in Open RAN due to increased computational resource demands, posing a challenge for operators to select appropriate algorithms without compromising efficiency and security. ...

Reference:

Security, Privacy, and Trust for Open Radio Access Networks in 6G
Improving OTP Authentication with PQC Algorithms
  • Citing Conference Paper
  • February 2024