首页 > 最新文献

Information Security Journal: A Global Perspective最新文献

英文 中文
Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack 将网络安全教育与物联网设备相结合:引入中间人攻击的u-Learning场景
Pub Date : 2022-07-12 DOI: 10.1080/19393555.2022.2100297
Filippos Giannakas, C. Troussas, Akrivi Krouska, I. Voyiatzis, C. Sgouropoulou
ABSTRACT Nowadays, due to the increasing number of cyberattacks, cybersecurity education, training, and awareness are considered crucial for preparing current and future IT professionals. Thus, it is essential for educational institutions to foster well-designed learning strategies in the field of cybersecurity that will not only focus on theory-based learning interventions but also on encapsulating authentic learning practices. In this context, the paper at hand presents a ubiquitous scenario-based learning (SBL) intervention, blended with IoT devices for introducing the topic of the man-in-the-middle attack to 1st-grade students in vocational education. The learning scenario enables two-way plain text communication through a LoRa network. For securing the transmission and assure confidentiality, basic encryption techniques are enabled for the transmitted messages. Meanwhile, an eavesdropper, acting as the man-in-the-middle attacker, tries to intercept the communication, by applying different decryption techniques. For this purpose, a u-Learning app was developed. The app was evaluated by ninety 1st-grade students of an educational institute of vocational training, in terms of effectiveness, efficiency, knowledge acquisition, and learners’ satisfaction. Among others, the results show that the effectiveness and the efficiency of the proposed learning process were 92.03%, and 89.63%, respectively. Finally, learners’ satisfaction was high, and their knowledge acquisition was improved.
如今,由于网络攻击的数量不断增加,网络安全教育、培训和意识对于准备当前和未来的IT专业人员至关重要。因此,教育机构必须在网络安全领域培养精心设计的学习策略,不仅注重基于理论的学习干预,而且注重封装真实的学习实践。该学习场景通过LoRa网络实现双向明文通信。为了保证传输的安全性和保密性,对传输的消息启用了基本的加密技术。与此同时,窃听者作为中间人攻击者,试图通过应用不同的解密技术来拦截通信。为此,开发了u-Learning应用程序。该应用程序由一所职业培训教育机构的91名高一学生从有效性、效率、知识获取和学习者满意度等方面进行了评估。其中,结果表明,所提出的学习过程的有效性和效率分别为92.03%和89.63%。最后,学习者的满意度提高,知识获取得到改善。
{"title":"Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack","authors":"Filippos Giannakas, C. Troussas, Akrivi Krouska, I. Voyiatzis, C. Sgouropoulou","doi":"10.1080/19393555.2022.2100297","DOIUrl":"https://doi.org/10.1080/19393555.2022.2100297","url":null,"abstract":"ABSTRACT Nowadays, due to the increasing number of cyberattacks, cybersecurity education, training, and awareness are considered crucial for preparing current and future IT professionals. Thus, it is essential for educational institutions to foster well-designed learning strategies in the field of cybersecurity that will not only focus on theory-based learning interventions but also on encapsulating authentic learning practices. In this context, the paper at hand presents a ubiquitous scenario-based learning (SBL) intervention, blended with IoT devices for introducing the topic of the man-in-the-middle attack to 1st-grade students in vocational education. The learning scenario enables two-way plain text communication through a LoRa network. For securing the transmission and assure confidentiality, basic encryption techniques are enabled for the transmitted messages. Meanwhile, an eavesdropper, acting as the man-in-the-middle attacker, tries to intercept the communication, by applying different decryption techniques. For this purpose, a u-Learning app was developed. The app was evaluated by ninety 1st-grade students of an educational institute of vocational training, in terms of effectiveness, efficiency, knowledge acquisition, and learners’ satisfaction. Among others, the results show that the effectiveness and the efficiency of the proposed learning process were 92.03%, and 89.63%, respectively. Finally, learners’ satisfaction was high, and their knowledge acquisition was improved.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116766315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An adaptive randomized and secured approach against adversarial attacks 一种针对对抗性攻击的自适应随机安全方法
Pub Date : 2022-07-01 DOI: 10.1080/19393555.2022.2088429
Lovi Dhamija, Urvashi Garg
ABSTRACT With the rising trends and use of machine learning algorithms for classification and regression tasks, deep learning has been widely accepted in the Cyber and as well as non-Cyber Domain. Recent researches have shown that machine learning classifiers such as Deep Neural Networks (DNN) can be used to improve the detection against adversarial samples as well as to detect malware in the cyber security domain. However, a recent study in deep learning has found that DNN classifiers are highly vulnerable and can be evaded simply by either performing small modifications in the training model or training data. The work proposed a randomized defensive mechanism with the use of generative adversarial networks to construct more adversaries and then defend against them. Interestingly, we encountered some open challenges highlighting common difficulties faced by defensive mechanisms. We provide a general overview of adversarial attacks and proposed an Adaptive Randomized Algorithm to enhance the robustness of models. Moreover, this work aimed to ensure the security and transferability of deep learning classifiers.
随着机器学习算法在分类和回归任务中的应用的兴起,深度学习在网络领域和非网络领域都得到了广泛的接受。最近的研究表明,机器学习分类器,如深度神经网络(DNN),可以用来提高对对抗性样本的检测,以及在网络安全领域检测恶意软件。然而,最近一项关于深度学习的研究发现,DNN分类器非常容易受到攻击,只要对训练模型或训练数据进行微小的修改,就可以避免DNN分类器的攻击。这项工作提出了一种随机防御机制,使用生成对抗网络来构建更多的对手,然后对它们进行防御。有趣的是,我们遇到了一些公开的挑战,突出了防御机制面临的共同困难。我们提供了对抗性攻击的总体概述,并提出了一种自适应随机算法来增强模型的鲁棒性。此外,本工作旨在确保深度学习分类器的安全性和可移植性。
{"title":"An adaptive randomized and secured approach against adversarial attacks","authors":"Lovi Dhamija, Urvashi Garg","doi":"10.1080/19393555.2022.2088429","DOIUrl":"https://doi.org/10.1080/19393555.2022.2088429","url":null,"abstract":"ABSTRACT With the rising trends and use of machine learning algorithms for classification and regression tasks, deep learning has been widely accepted in the Cyber and as well as non-Cyber Domain. Recent researches have shown that machine learning classifiers such as Deep Neural Networks (DNN) can be used to improve the detection against adversarial samples as well as to detect malware in the cyber security domain. However, a recent study in deep learning has found that DNN classifiers are highly vulnerable and can be evaded simply by either performing small modifications in the training model or training data. The work proposed a randomized defensive mechanism with the use of generative adversarial networks to construct more adversaries and then defend against them. Interestingly, we encountered some open challenges highlighting common difficulties faced by defensive mechanisms. We provide a general overview of adversarial attacks and proposed an Adaptive Randomized Algorithm to enhance the robustness of models. Moreover, this work aimed to ensure the security and transferability of deep learning classifiers.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128218539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber hygiene knowledge, awareness, and behavioral practices of university students 大学生网络卫生知识、意识与行为实践
Pub Date : 2022-06-28 DOI: 10.1080/19393555.2022.2088428
Sabina Baraković, J. Barakovic
ABSTRACT Personal data is valuable and vulnerable to individuals who have wrong intentions as any other possessions. This can be mitigated by good cyber hygiene habits. The main aim of this paper is to evaluate, analyze, and understand the level of cyber hygiene knowledge, awareness, and behavioral practices of university students and their mutual relations. We have conducted a survey study containing 30 cyber hygiene questions. Results show that students have acceptable cyber hygiene behavior, but their awareness is not satisfactory, and their knowledge is quite low. Also, the study shows the existence of some relations between gender and current education level and cyber hygiene knowledge, awareness, and behavior, as well as mutual interplay and relations between those cyber hygiene outcomes. The main contributions of this work are bidirectional: theoretical and practical.
个人数据是有价值的,并且容易受到有错误意图的个人的伤害。这可以通过良好的网络卫生习惯来缓解。本文的主要目的是评估、分析和了解大学生的网络卫生知识、意识和行为实践水平及其相互关系。我们进行了一项包含30个网络卫生问题的调查研究。结果表明,大学生网络卫生行为尚可,但网络卫生意识不理想,知识水平较低。性别与当前教育水平与网络卫生知识、意识和行为之间存在一定的关系,以及这些网络卫生结果之间的相互作用和关系。这项工作的主要贡献是双向的:理论和实践。
{"title":"Cyber hygiene knowledge, awareness, and behavioral practices of university students","authors":"Sabina Baraković, J. Barakovic","doi":"10.1080/19393555.2022.2088428","DOIUrl":"https://doi.org/10.1080/19393555.2022.2088428","url":null,"abstract":"ABSTRACT Personal data is valuable and vulnerable to individuals who have wrong intentions as any other possessions. This can be mitigated by good cyber hygiene habits. The main aim of this paper is to evaluate, analyze, and understand the level of cyber hygiene knowledge, awareness, and behavioral practices of university students and their mutual relations. We have conducted a survey study containing 30 cyber hygiene questions. Results show that students have acceptable cyber hygiene behavior, but their awareness is not satisfactory, and their knowledge is quite low. Also, the study shows the existence of some relations between gender and current education level and cyber hygiene knowledge, awareness, and behavior, as well as mutual interplay and relations between those cyber hygiene outcomes. The main contributions of this work are bidirectional: theoretical and practical.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131078044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure search scheme for encrypted data in the VANET cloud with random query trapdoor
Pub Date : 2022-06-08 DOI: 10.1080/19393555.2022.2081636
Nayana Hegde, S. Manvi, H. Lallie
ABSTRACT Integration of the Vehicular Adhoc Network (VANET) with cloud computing has played an important role in aiding the safety of vehicle drivers and passengers. Due to the dynamic nature of the vehicles and wireless communication, achieving security of outsourced data is still a major challenge in the vehicular cloud. The encryption of sensitive data prior to outsourcing is an elementary approach to achieve data confidentiality. However, it is difficult for users to search over encrypted data using customary search techniques. In this paper, we propose a secure search scheme by empowering the data users to create a random query trapdoor. We make use of the bloom filter and bilinear pairing operation to construct a secure index for keywords of each data file, which enables the vehicular cloud to carry out a search without deriving any helpful information about the query. We use the SIMITS2 simulator to implement the proposed scheme and test the performance in terms of key generation time, secure index construction time, trapdoor generation time and search time. The proposed scheme performs better than existing searchable encryption technologies based on hashing and attribute-based encryption.
车载自组织网络(VANET)与云计算的融合在帮助车辆驾驶员和乘客的安全方面发挥了重要作用。由于车辆和无线通信的动态性,实现外包数据的安全仍然是车载云的主要挑战。在外包前对敏感数据进行加密是实现数据保密性的基本方法。然而,用户很难使用常规搜索技术搜索加密数据。在本文中,我们提出了一种通过授权数据用户创建随机查询陷阱的安全搜索方案。我们利用bloom过滤器和双线性配对操作为每个数据文件的关键字构建安全索引,使车载云能够在不获取任何有用信息的情况下进行搜索。我们使用SIMITS2模拟器对所提出的方案进行了实现,并从密钥生成时间、安全索引构建时间、活板门生成时间和搜索时间等方面进行了性能测试。该方案优于现有的基于哈希和基于属性的可搜索加密技术。
{"title":"Secure search scheme for encrypted data in the VANET cloud with random query trapdoor","authors":"Nayana Hegde, S. Manvi, H. Lallie","doi":"10.1080/19393555.2022.2081636","DOIUrl":"https://doi.org/10.1080/19393555.2022.2081636","url":null,"abstract":"ABSTRACT Integration of the Vehicular Adhoc Network (VANET) with cloud computing has played an important role in aiding the safety of vehicle drivers and passengers. Due to the dynamic nature of the vehicles and wireless communication, achieving security of outsourced data is still a major challenge in the vehicular cloud. The encryption of sensitive data prior to outsourcing is an elementary approach to achieve data confidentiality. However, it is difficult for users to search over encrypted data using customary search techniques. In this paper, we propose a secure search scheme by empowering the data users to create a random query trapdoor. We make use of the bloom filter and bilinear pairing operation to construct a secure index for keywords of each data file, which enables the vehicular cloud to carry out a search without deriving any helpful information about the query. We use the SIMITS2 simulator to implement the proposed scheme and test the performance in terms of key generation time, secure index construction time, trapdoor generation time and search time. The proposed scheme performs better than existing searchable encryption technologies based on hashing and attribute-based encryption.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of web data classification methods based on semantic similarity measure 基于语义相似度度量的web数据分类方法分析
Pub Date : 2022-06-03 DOI: 10.1080/19393555.2022.2080614
K. Ramesh, Mohanasundaram R
ABSTRACT In this survey, 60 research papers are reviewed based on various web data classification techniques, which are used for effective classification of web data and measuring the semantic relatedness between the two words. The web data classification techniques are classified into three types, such as semantic-based approach, search engine-based approach, and WordNet-based approach, and the research issues and challenges confronted by the existing techniques are reported in this survey. Moreover, the analysis is carried out based on the research works using the categorized web data classification techniques, dataset, and evaluation metrics are carried out. From the analysis, it is clear that semantic-based approach is the widely used techniques in the classification of web data. Similarly, Miller-Charles dataset is the most commonly used dataset in most of the research papers, and the evaluation metrics, like precision, recall, and F-measure are widely utilized in web data classification. The insights from this manuscript can be utilized to understand various research gaps and problems in this area. Those can be considered in the future by developing novel optimization algorithms, which might enhance the performance of web data classifications.
本文综述了60篇基于各种网络数据分类技术的研究论文,这些技术用于对网络数据进行有效分类,并测量两个词之间的语义相关性。本文将web数据分类技术分为基于语义的方法、基于搜索引擎的方法和基于wordnet的方法三种类型,并报告了现有技术的研究问题和面临的挑战。在此基础上,利用分类网络数据分类技术、数据集和评价指标对研究成果进行了分析。从分析中可以看出,基于语义的方法是网络数据分类中广泛使用的技术。同样,Miller-Charles数据集是大多数研究论文中最常用的数据集,其精度、召回率、F-measure等评价指标在web数据分类中被广泛使用。从这个手稿的见解可以用来了解各种研究差距和问题在这一领域。这些可以在未来通过开发新的优化算法来考虑,这可能会提高web数据分类的性能。
{"title":"Analysis of web data classification methods based on semantic similarity measure","authors":"K. Ramesh, Mohanasundaram R","doi":"10.1080/19393555.2022.2080614","DOIUrl":"https://doi.org/10.1080/19393555.2022.2080614","url":null,"abstract":"ABSTRACT In this survey, 60 research papers are reviewed based on various web data classification techniques, which are used for effective classification of web data and measuring the semantic relatedness between the two words. The web data classification techniques are classified into three types, such as semantic-based approach, search engine-based approach, and WordNet-based approach, and the research issues and challenges confronted by the existing techniques are reported in this survey. Moreover, the analysis is carried out based on the research works using the categorized web data classification techniques, dataset, and evaluation metrics are carried out. From the analysis, it is clear that semantic-based approach is the widely used techniques in the classification of web data. Similarly, Miller-Charles dataset is the most commonly used dataset in most of the research papers, and the evaluation metrics, like precision, recall, and F-measure are widely utilized in web data classification. The insights from this manuscript can be utilized to understand various research gaps and problems in this area. Those can be considered in the future by developing novel optimization algorithms, which might enhance the performance of web data classifications.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"83 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134464106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring organizational information security awareness in South Africa 衡量南非的组织信息安全意识
Pub Date : 2022-05-27 DOI: 10.1080/19393555.2022.2077265
E. Kritzinger, A. D. Veiga, W. V. Staden
ABSTRACT Information is a valuable resource that organization may utilize in the current business environment. It is critical to comprehend the importance of information protection, as it safeguards the lifeline of the organization. All employees within organization should be aware of the organizational information security culture. Organizations should promote an information security awareness culture, so as to secure data as part of their critical infrastructure. Organizations should monitor and measure information security awareness levels among employees, with a number of international instruments. However, the validity of those instruments has not yet been determined in the South African context. As a consequence, the aim of this article is to validate one internationally accepted measurement instrument – the Human Aspects of Information Security-Questionnaire (HAIS-Q) in South Africa. The research sought to determine employees’ awareness levels, in order to make recommendations aimed at improving awareness in organizations. A survey was conducted whereby the data from 356 respondents were collected across industries, with a web-based questionnaire. To determine the factor structure of the scale under investigation, an exploratory factor analysis (EFA) and Cronbach’s alpha was used to establish the internal reliability of the HAIS-Q. T-tests and ANOVAs were used to identify significant differences between demographic groups.
信息是组织在当前商业环境中可以利用的宝贵资源。理解信息保护的重要性是至关重要的,因为它保护着组织的生命线。组织内的所有员工都应该了解组织的信息安全文化。组织应该促进信息安全意识文化,以保护作为其关键基础设施一部分的数据。组织应该使用一些国际工具来监视和测量员工的信息安全意识水平。但是,在南非的情况下,这些文书的效力尚未确定。因此,本文的目的是验证一种国际公认的测量工具-南非的信息安全的人的方面-问卷(HAIS-Q)。该研究试图确定员工的意识水平,以便提出旨在提高组织意识的建议。通过基于网络的问卷调查,我们收集了各行业356名受访者的数据。为了确定被调查量表的因子结构,采用探索性因子分析(EFA)和Cronbach 's alpha来建立HAIS-Q的内部信度。使用t检验和方差分析来确定人口统计学组间的显著差异。
{"title":"Measuring organizational information security awareness in South Africa","authors":"E. Kritzinger, A. D. Veiga, W. V. Staden","doi":"10.1080/19393555.2022.2077265","DOIUrl":"https://doi.org/10.1080/19393555.2022.2077265","url":null,"abstract":"ABSTRACT Information is a valuable resource that organization may utilize in the current business environment. It is critical to comprehend the importance of information protection, as it safeguards the lifeline of the organization. All employees within organization should be aware of the organizational information security culture. Organizations should promote an information security awareness culture, so as to secure data as part of their critical infrastructure. Organizations should monitor and measure information security awareness levels among employees, with a number of international instruments. However, the validity of those instruments has not yet been determined in the South African context. As a consequence, the aim of this article is to validate one internationally accepted measurement instrument – the Human Aspects of Information Security-Questionnaire (HAIS-Q) in South Africa. The research sought to determine employees’ awareness levels, in order to make recommendations aimed at improving awareness in organizations. A survey was conducted whereby the data from 356 respondents were collected across industries, with a web-based questionnaire. To determine the factor structure of the scale under investigation, an exploratory factor analysis (EFA) and Cronbach’s alpha was used to establish the internal reliability of the HAIS-Q. T-tests and ANOVAs were used to identify significant differences between demographic groups.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116880931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot DEroute:基于加密和模糊概念的物联网MANET安全通信的信任感知数据路由协议
Pub Date : 2022-04-25 DOI: 10.1080/19393555.2022.2053002
Sunita I. Usturge, T. Kumar
ABSTRACT The Internet of Things in smart environments interrelates with Mobile Ad‐hoc Network and Wireless Sensor Network, which becomes more attractive and efficiently flourishing. Moreover, Mobile Ad‐hoc Network is applied in various fields including intelligent transportation, emergency communications after disaster, and Internet of Things. The incorporation of Internet of Things and Mobile Ad‐hoc Network become a rising theory for enabling opportunistic communication in Internet of Things. The security provisioning for secure communication is still the major challenge in Mobile Ad‐hoc Network – Internet of Things. Thus, in this paper, the DEroute algorithm is developed for secure communication Internet of Things structure, where Internet of Things nodes are located in mobile ad-hoc manner. In order to avoid the route list modification, nodes’ address is encrypted based on generated secret keys by Diffie–Hellman key-exchange algorithm. The fuzzy system with trust parameters, like historical, indirect and direct trust factors are considered for the identification of secure nodes. The bi-filtering process is also performed for filtering important nodes. Thus, the developed DEroute model achieved enhanced performance with respect to delay, packet delivery ratio and throughput of 0.1674 sec, 87.23% and 25.19 mbps, respectively.
智能环境下的物联网与移动自组织网络和无线传感器网络相互关联,变得更具吸引力和高效地蓬勃发展。此外,移动自组网在智能交通、灾后应急通信、物联网等领域也有广泛的应用。物联网与移动自组织网络的结合成为一种新兴的物联网机会通信理论。为安全通信提供安全保障仍然是移动自组网-物联网面临的主要挑战。因此,本文针对物联网节点以移动自组网方式定位的安全通信物联网结构,开发了DEroute算法。为了避免修改路由表,节点的地址根据生成的密钥通过Diffie-Hellman密钥交换算法进行加密。考虑了具有历史信任因子、间接信任因子和直接信任因子等信任参数的模糊系统来进行安全节点的识别。双过滤过程也用于过滤重要节点。因此,开发的DEroute模型在延迟、分组传送率和吞吐量方面的性能分别提高了0.1674秒、87.23%和25.19 mbps。
{"title":"DEroute: trust-aware data routing protocol based on encryption and fuzzy concept for MANET secure communication in Iot","authors":"Sunita I. Usturge, T. Kumar","doi":"10.1080/19393555.2022.2053002","DOIUrl":"https://doi.org/10.1080/19393555.2022.2053002","url":null,"abstract":"ABSTRACT The Internet of Things in smart environments interrelates with Mobile Ad‐hoc Network and Wireless Sensor Network, which becomes more attractive and efficiently flourishing. Moreover, Mobile Ad‐hoc Network is applied in various fields including intelligent transportation, emergency communications after disaster, and Internet of Things. The incorporation of Internet of Things and Mobile Ad‐hoc Network become a rising theory for enabling opportunistic communication in Internet of Things. The security provisioning for secure communication is still the major challenge in Mobile Ad‐hoc Network – Internet of Things. Thus, in this paper, the DEroute algorithm is developed for secure communication Internet of Things structure, where Internet of Things nodes are located in mobile ad-hoc manner. In order to avoid the route list modification, nodes’ address is encrypted based on generated secret keys by Diffie–Hellman key-exchange algorithm. The fuzzy system with trust parameters, like historical, indirect and direct trust factors are considered for the identification of secure nodes. The bi-filtering process is also performed for filtering important nodes. Thus, the developed DEroute model achieved enhanced performance with respect to delay, packet delivery ratio and throughput of 0.1674 sec, 87.23% and 25.19 mbps, respectively.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133068070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Ownership, liability, patentability, and creativity issues in artificial intelligence 人工智能中的所有权、责任、可专利性和创造性问题
Pub Date : 2022-04-12 DOI: 10.1080/19393555.2022.2060879
Akanksha Bisoyi
ABSTRACT While Artificial Intelligence technologies find increasing use in different industries such as transportation, healthcare and other services, it gives rise to legal complexities in respect of ownership and liability of AI, patentability of AI inventions, and creativity & ownership of AI-generated works attributable to various components of AI. The autonomous decision-making ability of AI challenges the existing IP framework. Since AI machines can “think” and “act” without any human effort, if any damage or harm occurs to the properties, does the current model of tort liability (product liability, negligence, strict liability) adequately address the legal concerns? Robust regulatory bodies and institutional mechanisms are required to develop rigorous safety standards and establish safety certification processes for AI. Even though AI inventions can be patented, many jurisdictions recognize only a “human” as an inventor and not the AI. With the increasing capability of AI to generate works without human intervention, there seems to be a strong case for granting copyright protection to AI-generated works. Exploring a separate legal framework for AI to reduce ambiguity and increase accountability would be in order.
虽然人工智能技术在交通、医疗和其他服务等不同行业的应用越来越多,但它在人工智能的所有权和责任、人工智能发明的可专利性以及归因于人工智能各种组件的人工智能生成作品的创造力和所有权等方面带来了法律复杂性。人工智能的自主决策能力对现有的知识产权框架提出了挑战。由于人工智能机器可以“思考”和“行动”,而无需人工干预,如果财产受到任何损害或伤害,那么目前的侵权责任模型(产品责任、疏忽责任、严格责任)是否足以解决法律问题?需要强有力的监管机构和体制机制来制定严格的安全标准,并建立人工智能的安全认证程序。尽管人工智能发明可以申请专利,但许多司法管辖区只承认“人类”是发明者,而不是人工智能。随着人工智能在没有人为干预的情况下生成作品的能力越来越强,似乎有充分的理由为人工智能生成的作品提供版权保护。为人工智能探索一个单独的法律框架,以减少模糊性和增加问责制,将是有序的。
{"title":"Ownership, liability, patentability, and creativity issues in artificial intelligence","authors":"Akanksha Bisoyi","doi":"10.1080/19393555.2022.2060879","DOIUrl":"https://doi.org/10.1080/19393555.2022.2060879","url":null,"abstract":"ABSTRACT While Artificial Intelligence technologies find increasing use in different industries such as transportation, healthcare and other services, it gives rise to legal complexities in respect of ownership and liability of AI, patentability of AI inventions, and creativity & ownership of AI-generated works attributable to various components of AI. The autonomous decision-making ability of AI challenges the existing IP framework. Since AI machines can “think” and “act” without any human effort, if any damage or harm occurs to the properties, does the current model of tort liability (product liability, negligence, strict liability) adequately address the legal concerns? Robust regulatory bodies and institutional mechanisms are required to develop rigorous safety standards and establish safety certification processes for AI. Even though AI inventions can be patented, many jurisdictions recognize only a “human” as an inventor and not the AI. With the increasing capability of AI to generate works without human intervention, there seems to be a strong case for granting copyright protection to AI-generated works. Exploring a separate legal framework for AI to reduce ambiguity and increase accountability would be in order.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122326268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Searchable encryption : A survey 可搜索加密:一项调查
Pub Date : 2022-04-03 DOI: 10.1080/19393555.2022.2033367
Dhruti Sharma
ABSTRACT We explore the field of searchable encryption (SE) and present a comprehensive survey of relevant literature. Since the existing survey articles are primarily written for the security experts, we present the discussion to assist the general practitioners (not from security background) in identifying an appropriate SE scheme for their application of interest. We initiate with the brief overview of SE along with its application-oriented criteria. By analyzing various SE schemes, we derive five significant characteristics – key structure, search structure, search functionality, support to reader/writers, and reader’s capability. Based on these characteristics, we categorize the existing SE schemes and showcase the significant features offered by each scheme. We explore numerous schemes based on symmetric/asymmetric key structures, simple/inverted search structure, single/multi-keyword search functionality, single/multiple reader/writer support, and verification functionality owned by data reader. A most promising part of the survey is the comparative analysis of the existing schemes under specific category in terms of tables showing efficiency and security. We hope that this survey is indeed beneficial for the general practitioners to pick an appropriate SE scheme better suited to the selected application.
我们探索了可搜索加密(SE)领域,并对相关文献进行了全面的调查。由于现有的调查文章主要是为安全专家撰写的,因此我们提出的讨论是为了帮助全科医生(不是来自安全背景)确定适合他们感兴趣的应用程序的安全系统方案。我们首先简要概述SE及其面向应用程序的标准。通过对各种SE方案的分析,得出了SE方案的五个重要特征:键结构、搜索结构、搜索功能、对读写器的支持以及读写器的能力。基于这些特征,我们对现有的SE方案进行了分类,并展示了每种方案提供的重要特性。我们探索了基于对称/非对称密钥结构、简单/反向搜索结构、单/多关键字搜索功能、单/多读/写支持以及数据阅读器拥有的验证功能的多种方案。调查中最有希望的部分是根据显示效率和安全性的表格对特定类别下的现有方案进行比较分析。我们希望这项调查确实有助于全科医生选择更适合所选应用的合适的社会福利计划。
{"title":"Searchable encryption : A survey","authors":"Dhruti Sharma","doi":"10.1080/19393555.2022.2033367","DOIUrl":"https://doi.org/10.1080/19393555.2022.2033367","url":null,"abstract":"ABSTRACT We explore the field of searchable encryption (SE) and present a comprehensive survey of relevant literature. Since the existing survey articles are primarily written for the security experts, we present the discussion to assist the general practitioners (not from security background) in identifying an appropriate SE scheme for their application of interest. We initiate with the brief overview of SE along with its application-oriented criteria. By analyzing various SE schemes, we derive five significant characteristics – key structure, search structure, search functionality, support to reader/writers, and reader’s capability. Based on these characteristics, we categorize the existing SE schemes and showcase the significant features offered by each scheme. We explore numerous schemes based on symmetric/asymmetric key structures, simple/inverted search structure, single/multi-keyword search functionality, single/multiple reader/writer support, and verification functionality owned by data reader. A most promising part of the survey is the comparative analysis of the existing schemes under specific category in terms of tables showing efficiency and security. We hope that this survey is indeed beneficial for the general practitioners to pick an appropriate SE scheme better suited to the selected application.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129178584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementing a secure remote patient monitoring system 实施安全的远程病人监护系统
Pub Date : 2022-03-17 DOI: 10.1080/19393555.2022.2047839
Othmane Nait Hamoud, Tayeb Kenaza, Y. Challal, Lina Ben-Abdelatif, Maroua Ouaked
ABSTRACT Remote patient monitoring (RPM) system is an efficient technology that allows reducing healthcare costs and contamination risks, especially in the context of a pandemic. However, security and data privacy are the major challenges that hinder the development of such technology. A secure RPM system should satisfy several security requirements such as authentication, confidentiality, and access control. Public Key Infrastructure (PKI) is one of the main widely-used key management schemes. Unfortunately, in an e-Health system supporting constrained devices, PKI suffers from some issues related to the burden of certificate management (e.g., revocation, storage, and distribution) and the computational cost of certification verification. In this paper, we present our contribution to the development of a secure RPM system. Our security solution is based on Certificate-less Public Key Cryptography (CL-PKC) which ensures a dynamic solution for securing communications between patient devices and the e-Health services core. The proposed solution provides secure authentication and key agreement protocol to establish secret session keys. These keys are used for secure exchanging real-time electronic health records (EHR). To evaluate our approach, we conducted both simulation and real experiments. The security and performance analysis show that our approach is secure and effective while being easy to implement on resource-constrained devices with a low computational cost.
远程患者监测(RPM)系统是一种有效的技术,可以降低医疗成本和污染风险,特别是在大流行的背景下。然而,安全和数据隐私是阻碍这种技术发展的主要挑战。一个安全的RPM系统应该满足几个安全需求,比如身份验证、机密性和访问控制。公钥基础设施(Public Key Infrastructure, PKI)是目前广泛使用的主要密钥管理方案之一。不幸的是,在支持受限设备的电子健康系统中,PKI面临着一些与证书管理负担(例如,撤销、存储和分发)和证书验证的计算成本相关的问题。在本文中,我们介绍了我们对安全RPM系统开发的贡献。我们的安全解决方案基于无证书公钥加密(CL-PKC),确保了患者设备与电子健康服务核心之间通信的动态解决方案。该方案提供了安全认证和密钥协商协议来建立秘密会话密钥。这些密钥用于安全交换实时电子健康记录(EHR)。为了评估我们的方法,我们进行了模拟和真实实验。安全性和性能分析表明,我们的方法是安全有效的,同时易于在资源受限的设备上实现,计算成本低。
{"title":"Implementing a secure remote patient monitoring system","authors":"Othmane Nait Hamoud, Tayeb Kenaza, Y. Challal, Lina Ben-Abdelatif, Maroua Ouaked","doi":"10.1080/19393555.2022.2047839","DOIUrl":"https://doi.org/10.1080/19393555.2022.2047839","url":null,"abstract":"ABSTRACT Remote patient monitoring (RPM) system is an efficient technology that allows reducing healthcare costs and contamination risks, especially in the context of a pandemic. However, security and data privacy are the major challenges that hinder the development of such technology. A secure RPM system should satisfy several security requirements such as authentication, confidentiality, and access control. Public Key Infrastructure (PKI) is one of the main widely-used key management schemes. Unfortunately, in an e-Health system supporting constrained devices, PKI suffers from some issues related to the burden of certificate management (e.g., revocation, storage, and distribution) and the computational cost of certification verification. In this paper, we present our contribution to the development of a secure RPM system. Our security solution is based on Certificate-less Public Key Cryptography (CL-PKC) which ensures a dynamic solution for securing communications between patient devices and the e-Health services core. The proposed solution provides secure authentication and key agreement protocol to establish secret session keys. These keys are used for secure exchanging real-time electronic health records (EHR). To evaluate our approach, we conducted both simulation and real experiments. The security and performance analysis show that our approach is secure and effective while being easy to implement on resource-constrained devices with a low computational cost.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"28 26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126887800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Information Security Journal: A Global Perspective
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1