{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,29]],"date-time":"2023-10-29T04:33:02Z","timestamp":1698553982064},"reference-count":55,"publisher":"Wiley","issue":"8","license":[{"start":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T00:00:00Z","timestamp":1350000000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2013,8]]},"abstract":"ABSTRACT<\/jats:title>To produce ciphertexts, two modes of encryption are applied\u2014block ciphers, which encrypt a fixed size block of plaintext at a time, and stream ciphers, which encrypt stream data, one or more bits at a time. As one of stream ciphers, the cipher feedback (CFB) mode is implemented by a block cipher via multiple stages, and in each stage, 1\u2009bit or a number of bits of plaintext are encrypted at a time. Throughout this paper, the study will focus upon the error performance of the stream\u2010based CFB under two sliding\u2010window protocols, go\u2010back\u2010N and selective\u2010reject, in an error channel in terms of throughput. We model the performance of the CFB in terms of application\u2010level throughput and derive the number of stages needed to achieve the optimal throughput, under a given error rate in an error channel. Copyright \u00a9 2012 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.638","type":"journal-article","created":{"date-parts":[[2012,10,12]],"date-time":"2012-10-12T06:46:44Z","timestamp":1350024404000},"page":"942-954","source":"Crossref","is-referenced-by-count":1,"title":["Cipher feedback mode under go\u2010back\u2010N and selective\u2010reject protocols in error channels"],"prefix":"10.1002","volume":"6","author":[{"given":"Xiannuan","family":"Liang","sequence":"first","affiliation":[{"name":"Department of Computer Science The University of Alabama 101 Houser Hall Tuscaloosa AL 35487\u20100290 U.S.A."}]},{"given":"Yang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science The University of Alabama 101 Houser Hall Tuscaloosa AL 35487\u20100290 U.S.A."}]},{"given":"Suat","family":"Ozdemir","sequence":"additional","affiliation":[{"name":"Computer Engineering Department Gazi University Maltepe Ankara TR\u201006570 Turkey"}]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[{"name":"Department of Computer and Telecommunications Engineering University of Western Macedonia Greece"}]},{"given":"Hongmei","family":"Deng","sequence":"additional","affiliation":[{"name":"Intelligent Automation, Inc. 15400 Calhoun Dr. Suite 400 Rockville MD 20855 U.S.A."}]}],"member":"311","published-online":{"date-parts":[[2012,10,12]]},"reference":[{"key":"e_1_2_9_2_1","volume-title":"DES Modes of Operation","author":"FIPS Publication 81","year":"1980"},{"key":"e_1_2_9_3_1","doi-asserted-by":"crossref","unstructured":"Ts'oT.RFC 2952: Telnet encryption: DES 64 bit cipher feedback Request for Comments Network Working Group the Internet Society 2000.","DOI":"10.17487\/rfc2952"},{"key":"e_1_2_9_4_1","volume-title":"High\u2010speed Networks and Internets: Performance and Quality of Service","author":"Stallings W","year":"2002"},{"key":"e_1_2_9_5_1","unstructured":"IEEE 802.11\u20101999.Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specification Standard IEEE August1999."},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1007\/BFb0053728","article-title":"A stream cipher based on linear feedback over GF(28)","volume":"1438","author":"Rose G","year":"2006","journal-title":"Book Series Lecture Notes in Computer Science"},{"key":"e_1_2_9_7_1","doi-asserted-by":"crossref","unstructured":"HamdyN El MegeedT HamadA KamalM.MANAGE1: New Stream Cipher for Data Encryption in CDMA Wireless Networks. The 2006 International Conference on Computer Engineering and Systems November2006. ISBN:1\u20104244\u20100271\u20109.","DOI":"10.1109\/ICCES.2006.320446"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071278"},{"key":"e_1_2_9_9_1","doi-asserted-by":"crossref","unstructured":"XiaoY GuizaniM.Optimal stream\u2010based cipher feedback mode in error channel. Proceedings of the IEEE Global Telecommunications Conference (Globecom '05) November2005 1660\u20131664.","DOI":"10.1109\/GLOCOM.2005.1577932"},{"key":"e_1_2_9_10_1","doi-asserted-by":"crossref","unstructured":"LiangX XiaoY VasilakosAV DengH MengK.CFB under sliding\u2010window protocols in error channels MILCOM2010;1502\u20131507.","DOI":"10.1109\/MILCOM.2010.5680161"},{"issue":"2","key":"e_1_2_9_11_1","article-title":"An adaptive tit\u2010for\u2010tat strategy for IEEE 802.11 CSMA\/CA Protocol","volume":"7","author":"Boyer S","year":"2012","journal-title":"International Journal of Security and Networks (IJSN)"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2007.012985"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.048491"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2007.014359"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.048478"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2007.014362"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.048492"},{"issue":"2","key":"e_1_2_9_18_1","article-title":"Intrusion prevention with two level user authentication in heterogeneous wireless sensor networks","volume":"7","author":"Butun I","year":"2012","journal-title":"International Journal of Security and Networks (IJSN)"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2008.019005"},{"issue":"2","key":"e_1_2_9_20_1","article-title":"Editorial: security and privacy issues","volume":"7","author":"Xiao Y","year":"2012","journal-title":"International Journal of Security and Networks (IJSN)"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.048493"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2008.022110"},{"issue":"2","key":"e_1_2_9_23_1","article-title":"MAC aggregation resilient to DoS attacks","volume":"7","author":"Kolesnikov V","year":"2012","journal-title":"International Journal of Security and Networks (IJSN)"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.048494"},{"issue":"2","key":"e_1_2_9_25_1","article-title":"Rapid anomaly detection for smart grid infrastructures through hierarchical pattern matching","volume":"7","author":"Baig ZA","year":"2012","journal-title":"International Journal of Security and Networks (IJSN)"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2010.036193"},{"issue":"2","key":"e_1_2_9_27_1","article-title":"Managing hybrid packet filter's specifications","volume":"7","author":"Neji NB","year":"2012","journal-title":"International Journal of Security and Networks (IJSN)"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2012.048479"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2011.040900"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.027339"},{"key":"e_1_2_9_31_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.027340"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.027341"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.027342"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.027343"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.027344"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023430"},{"key":"e_1_2_9_37_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023431"},{"issue":"1","key":"e_1_2_9_38_1","first-page":"1","article-title":"Foreword","volume":"4","author":"Mayrhofer R","year":"2009","journal-title":"International Journal of Security and Networks"},{"key":"e_1_2_9_39_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023422"},{"key":"e_1_2_9_40_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023423"},{"key":"e_1_2_9_41_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023424"},{"issue":"1","key":"e_1_2_9_42_1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1504\/IJSN.2009.023425","article-title":"Seeing\u2010is\u2010believing: using camera phones for human\u2010verifiable authentication","volume":"4","author":"McCune JM","year":"2009","journal-title":"International Journal of Security and Networks"},{"key":"e_1_2_9_43_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023426"},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023427"},{"key":"e_1_2_9_45_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023428"},{"key":"e_1_2_9_46_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023429"},{"key":"e_1_2_9_47_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.028667"},{"key":"e_1_2_9_48_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.028668"},{"key":"e_1_2_9_49_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.028669"},{"key":"e_1_2_9_50_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.028670"},{"key":"e_1_2_9_51_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.028671"},{"key":"e_1_2_9_52_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.028672"},{"key":"e_1_2_9_53_1","unstructured":"FIPS Publication 46\u20103.Data Encryption Standard (DES) U.S. DoC\/NIST October 25 1999."},{"key":"e_1_2_9_54_1","volume-title":"Recommendation for Block Cipher Modes of Operation: Methods and Techniques","author":"FIPS Publication 800\u201038A","year":"2001"},{"key":"e_1_2_9_55_1","doi-asserted-by":"crossref","unstructured":"QiJ AissaS ZhaoX.Optimal frame length for keeping normalized goodput with lowest requirement on BER. Proceedings of the 4th International Conference on Innovations in Information Technology 2007;715\u2013719.","DOI":"10.1109\/IIT.2007.4430479"},{"key":"e_1_2_9_56_1","volume-title":"Computer Networking: a Top\u2013Down Approach","author":"Kurose J","year":"2007"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.638","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.638","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,28]],"date-time":"2023-10-28T23:14:43Z","timestamp":1698534883000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.638"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,12]]},"references-count":55,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["10.1002\/sec.638"],"URL":"https:\/\/doi.org\/10.1002\/sec.638","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,10,12]]}}}