Pub Date : 2022-03-16DOI: 10.1080/19393555.2022.2053001
Faozi A. Almaqtari, Najib H. S. Farhan, A. Yahya, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim
ABSTRACT The present study aims to assess the mediating role of IT governance between corporate governance mechanisms and business continuity, and transparency & disclosure during the pandemic of Covid-19 in Jordan. The study uses a sample of 232 questionnaires retrieved from different firms of different sectors. The sample includes a survey response from board members, senior executives, auditors, IT experts, and other practitioners. Factor analysis and structural equation modeling were conducted to estimate the results. The results indicate that IT governance exhibits a statistically significant positive effect on business continuity and transparency & disclosure. Further, the results reveal that corporate governance mechanisms are less efficient in their influence on business continuity and transparency & disclosure in the absence of the mediating effect of IT governance during the pandemic. The current study’s findings provide insight and empirical evidence to the importance of IT governance and its role in business continuity and transparency & disclosure in constraining the negative effects during any crisis. The current study provides a novel contribution as it links corporate governance, transparency, and IT governance in the context of Covid-19 in an emerging country.
{"title":"The mediating effect of IT governance between corporate governance mechanisms, business continuity, and transparency & disclosure: An empirical study of Covid-19 Pandemic in Jordan","authors":"Faozi A. Almaqtari, Najib H. S. Farhan, A. Yahya, Borhan Omar Ahmad Al-Dalaien, Mohd Shamim","doi":"10.1080/19393555.2022.2053001","DOIUrl":"https://doi.org/10.1080/19393555.2022.2053001","url":null,"abstract":"ABSTRACT The present study aims to assess the mediating role of IT governance between corporate governance mechanisms and business continuity, and transparency & disclosure during the pandemic of Covid-19 in Jordan. The study uses a sample of 232 questionnaires retrieved from different firms of different sectors. The sample includes a survey response from board members, senior executives, auditors, IT experts, and other practitioners. Factor analysis and structural equation modeling were conducted to estimate the results. The results indicate that IT governance exhibits a statistically significant positive effect on business continuity and transparency & disclosure. Further, the results reveal that corporate governance mechanisms are less efficient in their influence on business continuity and transparency & disclosure in the absence of the mediating effect of IT governance during the pandemic. The current study’s findings provide insight and empirical evidence to the importance of IT governance and its role in business continuity and transparency & disclosure in constraining the negative effects during any crisis. The current study provides a novel contribution as it links corporate governance, transparency, and IT governance in the context of Covid-19 in an emerging country.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-28DOI: 10.1080/19393555.2022.2033365
L. Lopriore
ABSTRACT We present a paradigm for fine-grained access security in a protection environment featuring files and records. Files are allocated at increasing addresses in a virtual space whose size is extremely large, so that virtual space reuse is never necessary. A record is a portion of a file. A subject certifies possession of an access privilege for a given object, file, or record, by presenting a cryptographic pointer (c-pointer) referencing that object. The c-pointer includes a key, and the composition of the access privilege expressed in terms of the two access rights, to read and to write. The c-pointer is valid if the key descends from a master key indicated in the c-pointer, by application of a universally known, symmetric algorithm. Records can be encrypted, and the key is specific to the given record. A set of security primitives forms the user interface of the security system. The resulting environment is evaluated from a number of viewpoints that include key proliferation, weakening and revocation, selective encryption, file directories, and robustness against security attacks aimed at c-pointer forging.
{"title":"Cryptographic pointers for fine-grained file access security","authors":"L. Lopriore","doi":"10.1080/19393555.2022.2033365","DOIUrl":"https://doi.org/10.1080/19393555.2022.2033365","url":null,"abstract":"ABSTRACT We present a paradigm for fine-grained access security in a protection environment featuring files and records. Files are allocated at increasing addresses in a virtual space whose size is extremely large, so that virtual space reuse is never necessary. A record is a portion of a file. A subject certifies possession of an access privilege for a given object, file, or record, by presenting a cryptographic pointer (c-pointer) referencing that object. The c-pointer includes a key, and the composition of the access privilege expressed in terms of the two access rights, to read and to write. The c-pointer is valid if the key descends from a master key indicated in the c-pointer, by application of a universally known, symmetric algorithm. Records can be encrypted, and the key is specific to the given record. A set of security primitives forms the user interface of the security system. The resulting environment is evaluated from a number of viewpoints that include key proliferation, weakening and revocation, selective encryption, file directories, and robustness against security attacks aimed at c-pointer forging.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116248989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-25DOI: 10.1080/19393555.2022.2036879
S. Ogundoyin
ABSTRACT In Intelligent transportation system (ITS) applications, such as road safety and traffic monitoring, useful information is frequently gathered and transmitted to the management center for analysis, to provide a wide range of control, communication, and management measures. However, privacy of users must be preserved, since data transmitted by users may reveal sensitive private information such as location, travel route, etc. In this paper, we propose a privacy-preserving data aggregation scheme for ITS applications. The proposed scheme employs the combination of modified Paillier cryptosystem, Chinese Remainder theorem, Boneh short signature, and hash function operations not only to aggregate data of heterogeneous vehicles into one but also to provide fault resilience in a scenario when some devices are malfunctioning and not reporting to the management center. In the proposed scheme, each vehicle collects its data and computes a one-time secret key shared with the gateway to mask its data. We develop a hash function-based technique to ensure the authenticity and integrity of the aggregated encrypted data without revealing the individual data. Security analysis shows that the proposed scheme is secure, privacy-preserving, and supports conditional traceability. Extensive performance analysis and comparison demonstrate that the scheme is significantly more efficient than the related schemes.
{"title":"A privacy-preserving multisubset data aggregation scheme with fault resilience for intelligent transportation system","authors":"S. Ogundoyin","doi":"10.1080/19393555.2022.2036879","DOIUrl":"https://doi.org/10.1080/19393555.2022.2036879","url":null,"abstract":"ABSTRACT In Intelligent transportation system (ITS) applications, such as road safety and traffic monitoring, useful information is frequently gathered and transmitted to the management center for analysis, to provide a wide range of control, communication, and management measures. However, privacy of users must be preserved, since data transmitted by users may reveal sensitive private information such as location, travel route, etc. In this paper, we propose a privacy-preserving data aggregation scheme for ITS applications. The proposed scheme employs the combination of modified Paillier cryptosystem, Chinese Remainder theorem, Boneh short signature, and hash function operations not only to aggregate data of heterogeneous vehicles into one but also to provide fault resilience in a scenario when some devices are malfunctioning and not reporting to the management center. In the proposed scheme, each vehicle collects its data and computes a one-time secret key shared with the gateway to mask its data. We develop a hash function-based technique to ensure the authenticity and integrity of the aggregated encrypted data without revealing the individual data. Security analysis shows that the proposed scheme is secure, privacy-preserving, and supports conditional traceability. Extensive performance analysis and comparison demonstrate that the scheme is significantly more efficient than the related schemes.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"421 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-12DOI: 10.1080/19393555.2022.2033366
Sarvesh Tanwar, Anil Kumar
ABSTRACT Recently security plays a crucial part throughout the communication framework. In the most recent decade, organizations have endeavored to move from a paper-concentrated environment to a sans paper environment where data security is one of the essential issues, and any weakness in this respect can have crushing impacts. Security implies the assurance of the data from any unauthorized access or manipulation through spying or scientific or probabilistic calculations and different strategies. For the security of information, researchers are doing more work on ID-based Cryptography (IDC). However, it has two limitations: one suffers from an inherent key escrow problem, and the second is how to revoke the misbehavior/compromised user. Tseng and Tsai have proposed a novel Revocable ID-Based Encryption (RIBE). Yet, they have not considered the key escrow problem. This paper proposed an approach in which secure key issuance is done only for non-revocable ID. This will reduce the key escrow problem as multiple entities rather than one Private Key Generator (PKG) issue the key. It will reduce the possibility of compromised PKG as the private key is cooperatively issued by PKG and multiple Key Privacy Authorities (KPAs).
{"title":"Secure key issuing scheme in ID-based cryptography with revocable ID","authors":"Sarvesh Tanwar, Anil Kumar","doi":"10.1080/19393555.2022.2033366","DOIUrl":"https://doi.org/10.1080/19393555.2022.2033366","url":null,"abstract":"ABSTRACT Recently security plays a crucial part throughout the communication framework. In the most recent decade, organizations have endeavored to move from a paper-concentrated environment to a sans paper environment where data security is one of the essential issues, and any weakness in this respect can have crushing impacts. Security implies the assurance of the data from any unauthorized access or manipulation through spying or scientific or probabilistic calculations and different strategies. For the security of information, researchers are doing more work on ID-based Cryptography (IDC). However, it has two limitations: one suffers from an inherent key escrow problem, and the second is how to revoke the misbehavior/compromised user. Tseng and Tsai have proposed a novel Revocable ID-Based Encryption (RIBE). Yet, they have not considered the key escrow problem. This paper proposed an approach in which secure key issuance is done only for non-revocable ID. This will reduce the key escrow problem as multiple entities rather than one Private Key Generator (PKG) issue the key. It will reduce the possibility of compromised PKG as the private key is cooperatively issued by PKG and multiple Key Privacy Authorities (KPAs).","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115010366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-09DOI: 10.1080/19393555.2022.2035470
G. Srikanth, Lijetha. C. Jaffrin
ABSTRACT Cloud computing is one of the rapidly growing technologies in computing. It includes many benefits such as improved reliability, enormous scalability, decreased costs, portability, enhanced geographic coverage with fastest time, less infrastructure investment though it has challenges such as data security, insufficient resources, skill, etc. For past few years, cloud computing has grown considerably in information technology. Safety of information is a great concern as enormous information of individuals and companies was being stored in cloud. Many software giants such as Microsoft joined hands to build cloud services. The growth of cloud computing had been affected by data security issues, which leads to complexity with data privacy and protection. The objective of this work is to study and analyze the security issues in cloud computing. The security issues pertaining to network, data, application, storage, and information in cloud domain with the algorithms and tools deployed were addressed and reviewed elaborately.
{"title":"Security Issues in Cloud and Mobile cloud: A Comprehensive Survey","authors":"G. Srikanth, Lijetha. C. Jaffrin","doi":"10.1080/19393555.2022.2035470","DOIUrl":"https://doi.org/10.1080/19393555.2022.2035470","url":null,"abstract":"ABSTRACT Cloud computing is one of the rapidly growing technologies in computing. It includes many benefits such as improved reliability, enormous scalability, decreased costs, portability, enhanced geographic coverage with fastest time, less infrastructure investment though it has challenges such as data security, insufficient resources, skill, etc. For past few years, cloud computing has grown considerably in information technology. Safety of information is a great concern as enormous information of individuals and companies was being stored in cloud. Many software giants such as Microsoft joined hands to build cloud services. The growth of cloud computing had been affected by data security issues, which leads to complexity with data privacy and protection. The objective of this work is to study and analyze the security issues in cloud computing. The security issues pertaining to network, data, application, storage, and information in cloud domain with the algorithms and tools deployed were addressed and reviewed elaborately.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"65 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-02-02DOI: 10.1080/19393555.2021.1912219
R. Sonar, Gandharba Swain
ABSTRACT Pixel value differencing (PVD) steganography techniques suffer with “fall off boundary problem ,” and adaptive PVD (APVD) steganography techniques suffer with “unused blocks” problem. To avoid these problems, this research article describes a new steganography technique based on remainder replacement (RR), adaptive quotient value differencing (AQVD), and quotient value correlation (QVC). It performs embedding and extraction operation on 3-by-3 disjoint pixel blocks. From the 3-by-3 size pixel block two new blocks are derived: (i) the remainder block and (ii) the quotient block. Each remainder in 3-by-3 remainder block is decimal equivalent of two binary bits, so it is substituted by decimal equivalent of two secret bits. Each quotient in 3-by-3 quotient block is decimal equivalent of six binary bits. AQVD procedure is used to conceal data in four corner quotients of the quotient block. In three quotients of the middle row of the 3-by-3 quotient block, QVC embedding procedure is applied to hide the secret bits. The average hiding capacity is 3.21 bits per byte and the average peak signal-to-noise ratio is 35.27dB. Furthermore, regular-singular and pixel difference histogram attacks could not detect this technique.
{"title":"A hybrid steganography technique based on RR, AQVD, and QVC","authors":"R. Sonar, Gandharba Swain","doi":"10.1080/19393555.2021.1912219","DOIUrl":"https://doi.org/10.1080/19393555.2021.1912219","url":null,"abstract":"ABSTRACT Pixel value differencing (PVD) steganography techniques suffer with “fall off boundary problem ,” and adaptive PVD (APVD) steganography techniques suffer with “unused blocks” problem. To avoid these problems, this research article describes a new steganography technique based on remainder replacement (RR), adaptive quotient value differencing (AQVD), and quotient value correlation (QVC). It performs embedding and extraction operation on 3-by-3 disjoint pixel blocks. From the 3-by-3 size pixel block two new blocks are derived: (i) the remainder block and (ii) the quotient block. Each remainder in 3-by-3 remainder block is decimal equivalent of two binary bits, so it is substituted by decimal equivalent of two secret bits. Each quotient in 3-by-3 quotient block is decimal equivalent of six binary bits. AQVD procedure is used to conceal data in four corner quotients of the quotient block. In three quotients of the middle row of the 3-by-3 quotient block, QVC embedding procedure is applied to hide the secret bits. The average hiding capacity is 3.21 bits per byte and the average peak signal-to-noise ratio is 35.27dB. Furthermore, regular-singular and pixel difference histogram attacks could not detect this technique.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-01-11DOI: 10.1080/19393555.2021.2023239
Reza Hooshmand, Alireza Jafari, G. Karamali
ABSTRACT In this paper, two polar code-based identification schemes are proposed in which the polar codes are used instead of random codes. The security of the proposed identification schemes is based on the hardness of coding problems such as general decoding problem (GDP) and syndrome decoding problem (SDP). By exploiting the properties of polar codes in the proposed identification schemes, it does not need to save the parity check or generator matrix of polar codes completely as a public data. Therefore, the public data size of the proposed identification schemes is reduced up to 90% in comparison with the Stern and Veron identification schemes. Also, by using the efficient techniques of seed generation and compression, it is shown that the communication costs of the proposed identification schemes are reduced up to 53% compared to the Stern and Veron identification schemes. Moreover, security analyses show that the proposed identification schemes have low cheating probability and also have proper resistance against information set decoding attack.
{"title":"Id-PC: An Identification Scheme based on Polar Codes","authors":"Reza Hooshmand, Alireza Jafari, G. Karamali","doi":"10.1080/19393555.2021.2023239","DOIUrl":"https://doi.org/10.1080/19393555.2021.2023239","url":null,"abstract":"ABSTRACT In this paper, two polar code-based identification schemes are proposed in which the polar codes are used instead of random codes. The security of the proposed identification schemes is based on the hardness of coding problems such as general decoding problem (GDP) and syndrome decoding problem (SDP). By exploiting the properties of polar codes in the proposed identification schemes, it does not need to save the parity check or generator matrix of polar codes completely as a public data. Therefore, the public data size of the proposed identification schemes is reduced up to 90% in comparison with the Stern and Veron identification schemes. Also, by using the efficient techniques of seed generation and compression, it is shown that the communication costs of the proposed identification schemes are reduced up to 53% compared to the Stern and Veron identification schemes. Moreover, security analyses show that the proposed identification schemes have low cheating probability and also have proper resistance against information set decoding attack.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115122547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-22DOI: 10.1080/19393555.2021.2017522
In Lee
ABSTRACT As healthcare information technology (HIT) advances, major stakeholders in the healthcare industry such as healthcare providers, health plan organizations, and business associates are generating and exchanging enormous amounts of patient data throughout the healthcare supply chain. Along with the explosive growth of electronic patient data, these stakeholders have experienced an increasing number of data breaches. Despite the significant consequences of the data breaches such as the loss of client privacy, regulatory penalty, and financial loss, there is a lack of studies on sector level trend analysis and risk profiling. This study develops a diversity index that can be used to compare the distribution of data breaches between three sectors of the healthcare industry. To enhance the understanding of the data breaches, this study utilizes a temporal aggregation of the data breaches, analyzes data breach risks, and develops a data-driven risk profile. The findings of this study can be used to improve the cybersecurity management of healthcare organizations.
{"title":"An analysis of data breaches in the U.S. healthcare industry: diversity, trends, and risk profiling","authors":"In Lee","doi":"10.1080/19393555.2021.2017522","DOIUrl":"https://doi.org/10.1080/19393555.2021.2017522","url":null,"abstract":"ABSTRACT As healthcare information technology (HIT) advances, major stakeholders in the healthcare industry such as healthcare providers, health plan organizations, and business associates are generating and exchanging enormous amounts of patient data throughout the healthcare supply chain. Along with the explosive growth of electronic patient data, these stakeholders have experienced an increasing number of data breaches. Despite the significant consequences of the data breaches such as the loss of client privacy, regulatory penalty, and financial loss, there is a lack of studies on sector level trend analysis and risk profiling. This study develops a diversity index that can be used to compare the distribution of data breaches between three sectors of the healthcare industry. To enhance the understanding of the data breaches, this study utilizes a temporal aggregation of the data breaches, analyzes data breach risks, and develops a data-driven risk profile. The findings of this study can be used to improve the cybersecurity management of healthcare organizations.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-20DOI: 10.1080/19393555.2021.1974130
N. Bala, Rashmi Gupta, Anil Kumar
ABSTRACT Biometric allude to an automatic procedure of acknowledging an individual utilizing their behavioral or physical characteristics. The biometric framework, which utilizes one cue for authentication is termed as unimodal biometric. The unimodal biometric framework confronts numerous snags like dearth of distinctiveness, universality intra-class similarity and multimodal biometric is one of best options to conquer these issues, which is a framework that utilizes two or more cues for authentication. This study presents the overview of multimodal biometric recognition systems. Multimodal biometric recognition systems augment the security and concealment of digital information. From last two decades, there are a lot of research work on information fusion. We have discussed recent trends in multimodal biometric depending upon the type of fusion scheme and the level of fusion i.e. sensor level or feature level fusion, decision level fusion, score level fusion and hybrid fusion level. The types of fusion are conversed in detail with their individual merits and demerits. In addition to that, the methodologies, employed databases and accuracy results of the existing works are presented to showcase the profound usage of multimodal biometric design. The paper is targeted toward presenting a comprehensive review of different fusion schemes in combining various biometric modalities.
{"title":"Multimodal biometric system based on fusion techniques: a review","authors":"N. Bala, Rashmi Gupta, Anil Kumar","doi":"10.1080/19393555.2021.1974130","DOIUrl":"https://doi.org/10.1080/19393555.2021.1974130","url":null,"abstract":"ABSTRACT Biometric allude to an automatic procedure of acknowledging an individual utilizing their behavioral or physical characteristics. The biometric framework, which utilizes one cue for authentication is termed as unimodal biometric. The unimodal biometric framework confronts numerous snags like dearth of distinctiveness, universality intra-class similarity and multimodal biometric is one of best options to conquer these issues, which is a framework that utilizes two or more cues for authentication. This study presents the overview of multimodal biometric recognition systems. Multimodal biometric recognition systems augment the security and concealment of digital information. From last two decades, there are a lot of research work on information fusion. We have discussed recent trends in multimodal biometric depending upon the type of fusion scheme and the level of fusion i.e. sensor level or feature level fusion, decision level fusion, score level fusion and hybrid fusion level. The types of fusion are conversed in detail with their individual merits and demerits. In addition to that, the methodologies, employed databases and accuracy results of the existing works are presented to showcase the profound usage of multimodal biometric design. The paper is targeted toward presenting a comprehensive review of different fusion schemes in combining various biometric modalities.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-07DOI: 10.1080/19393555.2021.2007316
Naib Rabiaa, A. C. Moussa, B. H. Sofiane
ABSTRACT Vehicular Ad-hoc Network (VANET) is a set of intelligent vehicles that communicate without a fixed infrastructure. The communication between each source/destination pair is done by using routing protocols. On-demand multipath distance vector (AOMDV) is one of the most known ad-hoc multipath routing protocols used in VANETs. The decentralized nature of VANET makes this type of network vulnerable to various attacks, such as blackhole attack. In such attack, the malicious vehicle aims to make the communication unavailable. To achieve this goal, the malicious vehicle persuades the source to send its data packets through it because it has the fresher route toward the destination. This is done by forging routing information. After receiving the data packets, the malicious vehicle deletes them instead of forwarding them to their intended destinations. This paper introduces a new Cross-Layer method (CRAOMDV) where information is shared between MAC and network layers to detect and ignore the malicious vehicles in VANETs. Our experiments used the simulator NS2 and SUMO for the generation and simulation of real mobility scenarios. The evaluation results demonstrate the efficiency of CRAOMDV compared to AOMDV under blackhole attack in terms of improving the packet delivery and reducing the average end-to-delay and the routing overhead.
{"title":"A Cross-layer Method for Identifying and Isolating the Blackhole Nodes in Vehicular Ad-hoc Networks","authors":"Naib Rabiaa, A. C. Moussa, B. H. Sofiane","doi":"10.1080/19393555.2021.2007316","DOIUrl":"https://doi.org/10.1080/19393555.2021.2007316","url":null,"abstract":"ABSTRACT Vehicular Ad-hoc Network (VANET) is a set of intelligent vehicles that communicate without a fixed infrastructure. The communication between each source/destination pair is done by using routing protocols. On-demand multipath distance vector (AOMDV) is one of the most known ad-hoc multipath routing protocols used in VANETs. The decentralized nature of VANET makes this type of network vulnerable to various attacks, such as blackhole attack. In such attack, the malicious vehicle aims to make the communication unavailable. To achieve this goal, the malicious vehicle persuades the source to send its data packets through it because it has the fresher route toward the destination. This is done by forging routing information. After receiving the data packets, the malicious vehicle deletes them instead of forwarding them to their intended destinations. This paper introduces a new Cross-Layer method (CRAOMDV) where information is shared between MAC and network layers to detect and ignore the malicious vehicles in VANETs. Our experiments used the simulator NS2 and SUMO for the generation and simulation of real mobility scenarios. The evaluation results demonstrate the efficiency of CRAOMDV compared to AOMDV under blackhole attack in terms of improving the packet delivery and reducing the average end-to-delay and the routing overhead.","PeriodicalId":103842,"journal":{"name":"Information Security Journal: A Global Perspective","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115497261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}