首页 > 最新文献

2021 4th International Conference on Security and Privacy (ISEA-ISAP)最新文献

英文 中文
A Novel Prediction Error Histogram Shifting-based Reversible Data Hiding Scheme for Medical Image Transmission 一种新的基于预测误差直方图偏移的医学图像传输可逆数据隐藏方案
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9688572
Buggaveeti Padmaja, V. Manikandan
Reversible data hiding (RDH) is an actively emerging area in the domain of Information Security having wide applications in clinical data transmission along with medical images. In our research, we came up with a new RDH scheme to keep clinical data in the medical image to ensure secure data transmission. Histogram shifting-based RDH schemes are widely explored for RDH in images. The conventional histogram shifting-based RDH schemes have two major concerns: low embedding rate and overflow or underflow. In this approach, we discuss a prediction error histogram shifting-based approach with an improved overflow handling technique. The pixels in the images are divided into two different categories: black and white. The classification of the pixels has been carried out based on the checkerboard pattern. As we know that as per the checkerboard pattern, a black pixel will have four 4-neighbourhood pixels (left, right, top and bottom). To predict the black pixel value in the middle we used the average of three pixels out of 4-neighbourhood which are very close to the central pixel value. By considering the predicted pixel value and the actual pixel value, we have computed the prediction error. The histogram of prediction error is generated based on the prediction error corresponds to all the black pixels in the image. The prediction error histogram is considered for further data hiding through the histogram shifting approach. The overflow/underflow is a critical issue in the histogram shifting-based RDH scheme, so we have came up with an improved overflow/underflow handling technique in this approach. We have validated the results after carrying out the proposed scheme on medical and natural images.
可逆数据隐藏(RDH)是信息安全领域中一个活跃的新兴领域,在临床数据传输和医学图像传输中有着广泛的应用。在我们的研究中,我们提出了一种新的RDH方案,将临床数据保存在医学图像中,以保证数据的安全传输。基于直方图移位的RDH方案被广泛探索用于图像中的RDH。传统的基于直方图位移的RDH方案存在两个主要问题:低嵌入率和溢出或下溢。在这种方法中,我们讨论了一种基于预测误差直方图移位的方法,该方法具有改进的溢出处理技术。图像中的像素被分为两种不同的类别:黑色和白色。基于棋盘图案对像素进行了分类。正如我们所知,根据棋盘模式,一个黑色像素将有四个4邻点像素(左、右、上、下)。为了预测中间的黑色像素值,我们使用了非常接近中心像素值的4个邻域中的3个像素的平均值。结合预测像素值和实际像素值,计算了预测误差。基于预测误差对应图像中所有黑色像素,生成预测误差直方图。利用预测误差直方图,通过直方图移位的方法进一步隐藏数据。在基于直方图位移的RDH方案中,溢出/下流是一个关键问题,因此我们提出了一种改进的溢出/下流处理技术。我们在医学和自然图像上执行了所提出的方案,验证了结果。
{"title":"A Novel Prediction Error Histogram Shifting-based Reversible Data Hiding Scheme for Medical Image Transmission","authors":"Buggaveeti Padmaja, V. Manikandan","doi":"10.1109/ISEA-ISAP54304.2021.9688572","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9688572","url":null,"abstract":"Reversible data hiding (RDH) is an actively emerging area in the domain of Information Security having wide applications in clinical data transmission along with medical images. In our research, we came up with a new RDH scheme to keep clinical data in the medical image to ensure secure data transmission. Histogram shifting-based RDH schemes are widely explored for RDH in images. The conventional histogram shifting-based RDH schemes have two major concerns: low embedding rate and overflow or underflow. In this approach, we discuss a prediction error histogram shifting-based approach with an improved overflow handling technique. The pixels in the images are divided into two different categories: black and white. The classification of the pixels has been carried out based on the checkerboard pattern. As we know that as per the checkerboard pattern, a black pixel will have four 4-neighbourhood pixels (left, right, top and bottom). To predict the black pixel value in the middle we used the average of three pixels out of 4-neighbourhood which are very close to the central pixel value. By considering the predicted pixel value and the actual pixel value, we have computed the prediction error. The histogram of prediction error is generated based on the prediction error corresponds to all the black pixels in the image. The prediction error histogram is considered for further data hiding through the histogram shifting approach. The overflow/underflow is a critical issue in the histogram shifting-based RDH scheme, so we have came up with an improved overflow/underflow handling technique in this approach. We have validated the results after carrying out the proposed scheme on medical and natural images.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121618775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visibility Enhancement in Surveillance images using Deep Multi-scale Feature Fusion 基于深度多尺度特征融合的监控图像可见性增强
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689709
Mohit Singh, V. Laxmi, Parvez Faruki
Visibility degradation is expected in adverse weather phenomena such as fog, mist, and haze. Object detection and identification in the surveillance feed are challenging in these weather conditions. Outdoor images can naturally be degraded, or one can intentionally degrade using smoke or bright light to hide identification. Haze, fog, and smoke are pixel-based degradation and can vary based on their thickness and distribution property in an image. In our proposed work, we explore the possibility of identifying and removal hazy pixels using the benefits of multi-scale feature-fusion and In-scale feature progression. We proposed a learning-based end-to-end network for single image dehazing. Our proposed architecture consists of three different modules: (1) Coarse Feature-fusion, (2) Fine Feature-fusion, and (3) Reconstruction module. The Coarse feature-fusion module learns broad contextual information, and the Fine feature-fusion module refines the coarse features by focusing on the channel and pixel-based information. Multi-scale feature fusion is used both in the coarse and fine module to benefit the network stage from the previous stage’s output. Extensive experimental results suggest that the proposed approach outperforms other state-of-the-art methods on synthetic homogeneous and non-homogeneous haze data and improves object detection and identification accuracy.
在雾、薄雾和雾霾等恶劣天气现象下,能见度会下降。在这种天气条件下,监控馈送中的目标检测和识别具有挑战性。户外图像可以自然地降级,或者可以故意使用烟雾或强光来隐藏身份。霾、雾和烟是基于像素的退化,可以根据它们在图像中的厚度和分布属性而变化。在我们提出的工作中,我们探索了利用多尺度特征融合和尺度内特征递进的优势来识别和去除模糊像素的可能性。我们提出了一种基于学习的端到端单幅图像去雾网络。我们提出的架构包括三个不同的模块:(1)粗特征融合,(2)细特征融合和(3)重构模块。粗特征融合模块学习广泛的上下文信息,细特征融合模块通过关注通道和基于像素的信息来细化粗特征。在粗、精两个模块中都使用了多尺度特征融合,使网络阶段从前一阶段的输出中受益。大量的实验结果表明,该方法在合成均匀和非均匀雾霾数据上优于其他最先进的方法,并提高了目标检测和识别精度。
{"title":"Visibility Enhancement in Surveillance images using Deep Multi-scale Feature Fusion","authors":"Mohit Singh, V. Laxmi, Parvez Faruki","doi":"10.1109/ISEA-ISAP54304.2021.9689709","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689709","url":null,"abstract":"Visibility degradation is expected in adverse weather phenomena such as fog, mist, and haze. Object detection and identification in the surveillance feed are challenging in these weather conditions. Outdoor images can naturally be degraded, or one can intentionally degrade using smoke or bright light to hide identification. Haze, fog, and smoke are pixel-based degradation and can vary based on their thickness and distribution property in an image. In our proposed work, we explore the possibility of identifying and removal hazy pixels using the benefits of multi-scale feature-fusion and In-scale feature progression. We proposed a learning-based end-to-end network for single image dehazing. Our proposed architecture consists of three different modules: (1) Coarse Feature-fusion, (2) Fine Feature-fusion, and (3) Reconstruction module. The Coarse feature-fusion module learns broad contextual information, and the Fine feature-fusion module refines the coarse features by focusing on the channel and pixel-based information. Multi-scale feature fusion is used both in the coarse and fine module to benefit the network stage from the previous stage’s output. Extensive experimental results suggest that the proposed approach outperforms other state-of-the-art methods on synthetic homogeneous and non-homogeneous haze data and improves object detection and identification accuracy.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130113017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable Artificial Intelligence in Cybersecurity: A Brief Review 网络安全中可解释的人工智能:简要回顾
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689765
S. Hariharan, Anusha Velicheti, A.S. Anagha, Ciza Thomas, N. Balakrishnan
Artificial intelligence has an enormous prospective to secure the cyber world. A lot of research is happening in the area of artificial intelligence in cyber security, however, the adoption in real-world practice is extremely limited. Lack of interpretability and accuracy of the artificial intelligence models pose restriction in implementation, as the user need to be confident that the Artificial Intelligence system used in decision making is trustworthy. Explainable Artificial Intelligence overcomes this concern and is the right step towards dependable and predictable Artificial Intelligence. This paper aims to provide a broad understanding of various terminology, classification, and scope of Explainable Artificial Intelligence in cyber security, challenges faced and metrics used for evaluation through the existing literature.
人工智能在网络世界安全方面有着巨大的前景。人工智能在网络安全领域的研究很多,但在现实世界中的应用却非常有限。人工智能模型缺乏可解释性和准确性,这对实现构成了限制,因为用户需要确信用于决策的人工智能系统是值得信赖的。可解释的人工智能克服了这种担忧,是迈向可靠和可预测的人工智能的正确一步。本文旨在通过现有文献提供对网络安全中可解释人工智能的各种术语、分类和范围、面临的挑战和用于评估的指标的广泛理解。
{"title":"Explainable Artificial Intelligence in Cybersecurity: A Brief Review","authors":"S. Hariharan, Anusha Velicheti, A.S. Anagha, Ciza Thomas, N. Balakrishnan","doi":"10.1109/ISEA-ISAP54304.2021.9689765","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689765","url":null,"abstract":"Artificial intelligence has an enormous prospective to secure the cyber world. A lot of research is happening in the area of artificial intelligence in cyber security, however, the adoption in real-world practice is extremely limited. Lack of interpretability and accuracy of the artificial intelligence models pose restriction in implementation, as the user need to be confident that the Artificial Intelligence system used in decision making is trustworthy. Explainable Artificial Intelligence overcomes this concern and is the right step towards dependable and predictable Artificial Intelligence. This paper aims to provide a broad understanding of various terminology, classification, and scope of Explainable Artificial Intelligence in cyber security, challenges faced and metrics used for evaluation through the existing literature.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Evaluation of Strategic Decision taken by Autonomous Agent using Explainable AI 基于可解释人工智能的自主智能体战略决策评价
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689715
Rendhir R. Prasad, R. R. Rejimol Robinson, Ciza Thomas, N. Balakrishnan
Autonomous intrusion detection systems assess the data intelligently and take strategic decision to detect and mitigate cyber-attacks. These decisions have to be explained and evaluated for the transparency and correctness. Explainable Artificial Intelligent (XAI) methods that explore how features contribute or influence a decision taken using an algorithm can be useful for the purpose. XAI method of Testing with Concept Activation Vectors (TCAV) has been used recently to show the importance of high level concepts for a prediction class in order to deliver explanations in the way humans communicate with each other. This work explores the possibility of using TCAV to evaluate the strategic decision made by autonomous agents. A case study in the context of DoS attack is analysed to show that TCAV scores for various DoS attack classes and normal class of KDD99 data set can be used to evaluate the strategic decisions. The proposed method of analysis provides a quantifiable method to justify the current strategy or change in the strategy if required.
自主入侵检测系统可以智能地评估数据,并采取战略决策来检测和减轻网络攻击。必须对这些决定进行解释和评估,以确保其透明度和正确性。可解释的人工智能(XAI)方法可以用于探索功能如何贡献或影响使用算法做出的决策。使用概念激活向量(TCAV)测试的XAI方法最近被用于显示高级概念对于预测类的重要性,以便以人类相互交流的方式传递解释。这项工作探索了使用TCAV来评估自主代理所做的战略决策的可能性。分析了DoS攻击背景下的一个案例研究,表明各种DoS攻击类别和KDD99数据集的正常类别的TCAV分数可用于评估战略决策。建议的分析方法提供了一种可量化的方法来证明当前的战略或在需要时改变战略。
{"title":"Evaluation of Strategic Decision taken by Autonomous Agent using Explainable AI","authors":"Rendhir R. Prasad, R. R. Rejimol Robinson, Ciza Thomas, N. Balakrishnan","doi":"10.1109/ISEA-ISAP54304.2021.9689715","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689715","url":null,"abstract":"Autonomous intrusion detection systems assess the data intelligently and take strategic decision to detect and mitigate cyber-attacks. These decisions have to be explained and evaluated for the transparency and correctness. Explainable Artificial Intelligent (XAI) methods that explore how features contribute or influence a decision taken using an algorithm can be useful for the purpose. XAI method of Testing with Concept Activation Vectors (TCAV) has been used recently to show the importance of high level concepts for a prediction class in order to deliver explanations in the way humans communicate with each other. This work explores the possibility of using TCAV to evaluate the strategic decision made by autonomous agents. A case study in the context of DoS attack is analysed to show that TCAV scores for various DoS attack classes and normal class of KDD99 data set can be used to evaluate the strategic decisions. The proposed method of analysis provides a quantifiable method to justify the current strategy or change in the strategy if required.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125513217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Peer-to-Peer Trade Registration Process with Blockchain in Small And Medium Enterprises (SMEs) in E-Governance 电子政务中使用区块链的中小企业点对点贸易注册流程
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689760
N. K. Dewangan, Preeti Chandrakar
The trade registration process is a big part of starting economic development for any region of the country. It provides employment, economic growth for the region, production of goods and product of the whole community. In the traditional trade registration system, challenges like corruption, delay in time, non-availability of authorities and critical registration process. Blockchain is a transparent, distributed, decentralized and reliable technology for the fast and trusted working process. Using blockchain in the trade registration process can solve the problems mentioned above in the industrial scenario. The consensus algorithm in blockchain provides the decentralized authority approval process. Any authority can approve the application process based on the digital signature availability in the transactions. In this paper, we use proof-of-authentication for transaction approval and a novel miner selection algorithm to reduce the biasing and centralization of authorization in e-governance. For key generation, we are using Ed25519, and for the implementation of blockchain, a custom PHP-based blockchain is used.
贸易注册程序是该国任何地区开始经济发展的重要组成部分。它为该地区提供就业,经济增长,生产商品和整个社区的产品。在传统的贸易登记制度中,存在腐败、时间延误、权威机构不存在以及登记程序关键等挑战。区块链是一种透明、分布式、去中心化和可靠的技术,用于快速和可信的工作过程。在贸易注册过程中使用区块链可以解决上述工业场景中的问题。区块链中的共识算法提供了去中心化的权限审批流程。任何机构都可以基于事务中的数字签名可用性批准申请流程。在本文中,我们使用身份验证来进行交易批准,并使用一种新的矿工选择算法来减少电子政务中授权的偏倚和集中化。对于密钥生成,我们使用Ed25519,对于区块链的实现,使用自定义的基于php的区块链。
{"title":"Peer-to-Peer Trade Registration Process with Blockchain in Small And Medium Enterprises (SMEs) in E-Governance","authors":"N. K. Dewangan, Preeti Chandrakar","doi":"10.1109/ISEA-ISAP54304.2021.9689760","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689760","url":null,"abstract":"The trade registration process is a big part of starting economic development for any region of the country. It provides employment, economic growth for the region, production of goods and product of the whole community. In the traditional trade registration system, challenges like corruption, delay in time, non-availability of authorities and critical registration process. Blockchain is a transparent, distributed, decentralized and reliable technology for the fast and trusted working process. Using blockchain in the trade registration process can solve the problems mentioned above in the industrial scenario. The consensus algorithm in blockchain provides the decentralized authority approval process. Any authority can approve the application process based on the digital signature availability in the transactions. In this paper, we use proof-of-authentication for transaction approval and a novel miner selection algorithm to reduce the biasing and centralization of authorization in e-governance. For key generation, we are using Ed25519, and for the implementation of blockchain, a custom PHP-based blockchain is used.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132574277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An FPGA Prototyping of the GIFT Cipher for Image Security Applications 用于图像安全的GIFT密码的FPGA原型设计
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689764
Apoorva Jangir, Diksha Shekhawat, J. Pandey
Nowadays, images are frequently used for vital information sharing; therefore, its data security is of prime concern. In this work, the GIFT is implemented on an FPGA device with 256×256 and 512×512 sized gray and RGB images. Hardware prototyping of the architecture is done on the Xilinx ZCU102 platform featuring the Zynq UltraScale+ xczu9eg-2ffvb1156 FPGA. The resource usage, efficiency, throughput, and power studies are highlighted. At a maximum clock frequency of 770/530 MHz, encryption/decryption consumes 643/660 mW of power. Furthermore, statistical analyses for histogram, correlation, entropy, and key sensitivity are carried out. In this study, the average entropy of the original-to-encrypted image is enhanced to 11.38% and improved compared to previous work. The average correlation coefficient is reduced to 99.90/99.80/99.90% in the vertical/horizontal/diagonal direction.
如今,图像经常被用于重要信息的共享;因此,它的数据安全是首要关注的问题。在这项工作中,GIFT是在FPGA器件上实现的,具有256×256和512×512大小的灰度和RGB图像。该架构的硬件原型是在采用Zynq UltraScale+ xczu9egg -2ffvb1156 FPGA的Xilinx ZCU102平台上完成的。重点介绍了资源使用、效率、吞吐量和功率研究。时钟频率最高为770/530 MHz时,加解密功耗为643/660 mW。此外,还对直方图、相关性、熵和键灵敏度进行了统计分析。本研究将原始到加密图像的平均熵增强到11.38%,与以往的工作相比有所提高。在垂直/水平/对角线方向上,平均相关系数降至99.90/99.80/99.90%。
{"title":"An FPGA Prototyping of the GIFT Cipher for Image Security Applications","authors":"Apoorva Jangir, Diksha Shekhawat, J. Pandey","doi":"10.1109/ISEA-ISAP54304.2021.9689764","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689764","url":null,"abstract":"Nowadays, images are frequently used for vital information sharing; therefore, its data security is of prime concern. In this work, the GIFT is implemented on an FPGA device with 256×256 and 512×512 sized gray and RGB images. Hardware prototyping of the architecture is done on the Xilinx ZCU102 platform featuring the Zynq UltraScale+ xczu9eg-2ffvb1156 FPGA. The resource usage, efficiency, throughput, and power studies are highlighted. At a maximum clock frequency of 770/530 MHz, encryption/decryption consumes 643/660 mW of power. Furthermore, statistical analyses for histogram, correlation, entropy, and key sensitivity are carried out. In this study, the average entropy of the original-to-encrypted image is enhanced to 11.38% and improved compared to previous work. The average correlation coefficient is reduced to 99.90/99.80/99.90% in the vertical/horizontal/diagonal direction.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127632705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
Pub Date : 2021-10-27 DOI: 10.1109/isea-isap54304.2021.9689711
{"title":"[Copyright notice]","authors":"","doi":"10.1109/isea-isap54304.2021.9689711","DOIUrl":"https://doi.org/10.1109/isea-isap54304.2021.9689711","url":null,"abstract":"","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"477 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116189368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sponge based lightweight authentication mechanism for RFID tags 基于海绵的RFID标签轻量级认证机制
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689766
Chaitanya Palli, Neelima Jampala, T. A. Naidu
Lightweight authentication schemes suitable for resource constrained environments like IoT devices, sensor networks, Radio Frequency IDentification(RFID)tags, contactless smart cards etc., have gained a lot of attention in lightweight cryptographic community. Mostly hash funtions based on block ciphers are widely used for designing lightweight authentication schemes. However, in recent years designing such schemes from a hash function based on permutations using different modes is gaining lot of attention. They are efficient alternatives for the current block-cipher dominated cryptographic practices in pervasive device. We propose a new serverless sponge-permutation based lightweight authentication mechanism for proving RFID Tags authenticity to any legitimate reader and vice-versa.
轻量级认证方案适用于资源受限的环境,如物联网设备、传感器网络、射频识别(RFID)标签、非接触式智能卡等,在轻量级密码学社区得到了广泛的关注。大多数基于分组密码的散列函数被广泛用于设计轻量级身份验证方案。然而,近年来,基于使用不同模式的排列的哈希函数设计这样的方案得到了很多关注。它们是当前普适设备中以块密码为主的加密实践的有效替代方案。我们提出了一种新的基于无服务器海绵排列的轻量级身份验证机制,用于向任何合法读取器证明RFID标签的真实性,反之亦然。
{"title":"Sponge based lightweight authentication mechanism for RFID tags","authors":"Chaitanya Palli, Neelima Jampala, T. A. Naidu","doi":"10.1109/ISEA-ISAP54304.2021.9689766","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689766","url":null,"abstract":"Lightweight authentication schemes suitable for resource constrained environments like IoT devices, sensor networks, Radio Frequency IDentification(RFID)tags, contactless smart cards etc., have gained a lot of attention in lightweight cryptographic community. Mostly hash funtions based on block ciphers are widely used for designing lightweight authentication schemes. However, in recent years designing such schemes from a hash function based on permutations using different modes is gaining lot of attention. They are efficient alternatives for the current block-cipher dominated cryptographic practices in pervasive device. We propose a new serverless sponge-permutation based lightweight authentication mechanism for proving RFID Tags authenticity to any legitimate reader and vice-versa.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISEA-ISAP 2021 Cover Page ISEA-ISAP 2021封面页
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689753
{"title":"ISEA-ISAP 2021 Cover Page","authors":"","doi":"10.1109/ISEA-ISAP54304.2021.9689753","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689753","url":null,"abstract":"","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133526785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures 物联网供应链攻击趋势——漏洞和预防措施
Pub Date : 2021-10-27 DOI: 10.1109/ISEA-ISAP54304.2021.9689704
V. Rao, R. Marshal, K. Gobinath
The lifestyle of people in this century will be categorized as Pre-COVID and Post-COVID lifestyle in the future. The pandemic has influenced every nation and every sector. The Internet of Things has helped the humankind to progress even during the pandemic time. Internet of Things has grown drastically with the industry switching their offices to homes. This has also increased the threat landscape and the attacks are also on rise. Several cyber-attacks are possible with Internet of Things devices. However, Supply chain attacks remain the largest threat as reactive measures to mitigate them are extremely difficult. In addition to that, supply chain attacks are difficult to detect in a network. In most of the cases, they remain unnoticed and they are used to launch espionage and ransom ware attacks. The impact of supply chain attacks is also extremely large compared to other attacks. The number of Internet of Things devices are going to grow by leaps and bounds, and it is necessary to take proactive steps in the network to mitigate such attacks. In this article, the elements of Internet of Things supply chain, motivation behind these attacks, vulnerabilities in the supply chain, and recent attacks are discussed in detail. In order to mitigate the supply chain attacks in Internet of Things environment, preventive measures that can be adopted at various levels are also suggested. These measures can be applied as best practices in any smart network environment against supply chain attacks.
新世纪人们的生活方式将分为“新冠前”和“后”两种。这一流行病影响到每一个国家和每一个部门。即使在疫情期间,物联网也帮助人类取得了进步。随着行业将办公室转移到家中,物联网得到了迅猛发展。这也增加了威胁形势,攻击也在增加。物联网设备可能会受到几次网络攻击。然而,供应链攻击仍然是最大的威胁,因为应对措施非常困难。除此之外,供应链攻击很难在网络中检测到。在大多数情况下,它们没有被注意到,它们被用来发动间谍活动和勒索软件攻击。与其他攻击相比,供应链攻击的影响也非常大。物联网设备的数量将突飞猛进,有必要在网络中采取主动措施来减轻此类攻击。在本文中,详细讨论了物联网供应链的要素,这些攻击背后的动机,供应链中的漏洞以及最近的攻击。为了减轻物联网环境下的供应链攻击,提出了可在各个层面采取的防范措施。这些措施可以作为最佳实践应用于任何智能网络环境中,以应对供应链攻击。
{"title":"The IoT Supply Chain Attack Trends-Vulnerabilities and Preventive Measures","authors":"V. Rao, R. Marshal, K. Gobinath","doi":"10.1109/ISEA-ISAP54304.2021.9689704","DOIUrl":"https://doi.org/10.1109/ISEA-ISAP54304.2021.9689704","url":null,"abstract":"The lifestyle of people in this century will be categorized as Pre-COVID and Post-COVID lifestyle in the future. The pandemic has influenced every nation and every sector. The Internet of Things has helped the humankind to progress even during the pandemic time. Internet of Things has grown drastically with the industry switching their offices to homes. This has also increased the threat landscape and the attacks are also on rise. Several cyber-attacks are possible with Internet of Things devices. However, Supply chain attacks remain the largest threat as reactive measures to mitigate them are extremely difficult. In addition to that, supply chain attacks are difficult to detect in a network. In most of the cases, they remain unnoticed and they are used to launch espionage and ransom ware attacks. The impact of supply chain attacks is also extremely large compared to other attacks. The number of Internet of Things devices are going to grow by leaps and bounds, and it is necessary to take proactive steps in the network to mitigate such attacks. In this article, the elements of Internet of Things supply chain, motivation behind these attacks, vulnerabilities in the supply chain, and recent attacks are discussed in detail. In order to mitigate the supply chain attacks in Internet of Things environment, preventive measures that can be adopted at various levels are also suggested. These measures can be applied as best practices in any smart network environment against supply chain attacks.","PeriodicalId":115117,"journal":{"name":"2021 4th International Conference on Security and Privacy (ISEA-ISAP)","volume":"400 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116378779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 4th International Conference on Security and Privacy (ISEA-ISAP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1