首页 > 最新文献

Int. J. Inf. Comput. Secur.最新文献

英文 中文
The prediction of network security situation based on deep learning method 基于深度学习方法的网络安全态势预测
Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116941
Zhixing Lin, Jian Yu, Shunfa Liu
Network security situational awareness is one of the important issues in the research of network space security technology. In this paper, deep learning technology is applied to analyse and learn network data, generate counter network by classification for sample amplification, use sparse noise reduction autoencoder for feature selection, and then use LSTM for deep learning model of security situation prediction. After the experiment proved that the proposed model based on sparse noise reduction is not balanced since the encoder-LSTM network security situation prediction model can solve various level attacks against a small number, using the model prediction results accurately in predicting regional security situation has the advantage for a longer time. In order to solve the above problems, the network security management becomes passive to active, adapting measures in advance.
网络安全态势感知是网络空间安全技术研究的重要问题之一。本文采用深度学习技术对网络数据进行分析学习,通过分类生成计数器网络进行样本放大,使用稀疏降噪自编码器进行特征选择,然后使用LSTM进行安全态势预测的深度学习模型。由于编码器- lstm网络安全态势预测模型可以解决针对少量的各级攻击,因此在较长时间内准确地利用模型预测结果进行区域安全态势预测具有优势。为解决上述问题,网络安全管理由被动变为主动,提前采取相应措施。
{"title":"The prediction of network security situation based on deep learning method","authors":"Zhixing Lin, Jian Yu, Shunfa Liu","doi":"10.1504/ijics.2021.116941","DOIUrl":"https://doi.org/10.1504/ijics.2021.116941","url":null,"abstract":"Network security situational awareness is one of the important issues in the research of network space security technology. In this paper, deep learning technology is applied to analyse and learn network data, generate counter network by classification for sample amplification, use sparse noise reduction autoencoder for feature selection, and then use LSTM for deep learning model of security situation prediction. After the experiment proved that the proposed model based on sparse noise reduction is not balanced since the encoder-LSTM network security situation prediction model can solve various level attacks against a small number, using the model prediction results accurately in predicting regional security situation has the advantage for a longer time. In order to solve the above problems, the network security management becomes passive to active, adapting measures in advance.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129400622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on network security defence based on big data clustering algorithms 基于大数据聚类算法的网络安全防御研究
Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116931
Jianchao Zhao
To improve the security of network in big data era, the improved clustering algorithm is applied to carry out network security defence. Firstly, application of large data clustering algorithms in n...
为了提高大数据时代网络的安全性,采用改进的聚类算法进行网络安全防御。首先,大数据聚类算法在n…
{"title":"Research on network security defence based on big data clustering algorithms","authors":"Jianchao Zhao","doi":"10.1504/ijics.2021.116931","DOIUrl":"https://doi.org/10.1504/ijics.2021.116931","url":null,"abstract":"To improve the security of network in big data era, the improved clustering algorithm is applied to carry out network security defence. Firstly, application of large data clustering algorithms in n...","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127151726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A hybrid approach for preserving privacy for real estate data 一种保护房地产数据隐私的混合方法
Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116942
Parmod Kalia, D. Bansal, S. Sofat
In the present digital world, usage of the internet has increased many folds as users have become dependent on the cloud-based applications. The disclosure of personal information on such platforms becomes a prospective threat for an attack. Researchers have used randomised data distortion technique with addition of random noise to conceal the sensitive data from an unauthorised adversary. This perturbation technique has relevance for the numerical datasets only. In this paper, we propose a hybrid model of two phases encoding with additive random noise value for ensuring non-disclosure of private and sensitive information and maintaining an effective balance between data privacy and data utility. The proposed technique has been tested on different data sizes of the real estate industry in terms of efficiency and effectiveness in preserving privacy and data utility. The proposed algorithm has been evaluated in terms of privacy level and information loss. It has proved effective in comparison with other privacy-preserving techniques such as perturbation and encryption in terms of space complexity and efficiency.
在当今的数字世界中,互联网的使用量增加了许多倍,因为用户已经变得依赖于基于云的应用程序。在这些平台上披露个人信息成为攻击的潜在威胁。研究人员使用随机数据失真技术加上随机噪声来隐藏敏感数据,使其不被未经授权的对手发现。这种微扰技术只适用于数值数据集。本文提出了一种加性随机噪声值的两阶段编码混合模型,以确保隐私和敏感信息的不泄露,并保持数据隐私和数据效用之间的有效平衡。在房地产行业的不同数据规模上,对所提出的技术在保护隐私和数据效用方面的效率和有效性进行了测试。从隐私级别和信息丢失两方面对该算法进行了评价。与其他隐私保护技术(如扰动和加密)相比,它在空间复杂性和效率方面证明是有效的。
{"title":"A hybrid approach for preserving privacy for real estate data","authors":"Parmod Kalia, D. Bansal, S. Sofat","doi":"10.1504/ijics.2021.116942","DOIUrl":"https://doi.org/10.1504/ijics.2021.116942","url":null,"abstract":"In the present digital world, usage of the internet has increased many folds as users have become dependent on the cloud-based applications. The disclosure of personal information on such platforms becomes a prospective threat for an attack. Researchers have used randomised data distortion technique with addition of random noise to conceal the sensitive data from an unauthorised adversary. This perturbation technique has relevance for the numerical datasets only. In this paper, we propose a hybrid model of two phases encoding with additive random noise value for ensuring non-disclosure of private and sensitive information and maintaining an effective balance between data privacy and data utility. The proposed technique has been tested on different data sizes of the real estate industry in terms of efficiency and effectiveness in preserving privacy and data utility. The proposed algorithm has been evaluated in terms of privacy level and information loss. It has proved effective in comparison with other privacy-preserving techniques such as perturbation and encryption in terms of space complexity and efficiency.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128677935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
E-commerce process reengineering for customer privacy protection 面向客户隐私保护的电子商务流程再造
Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116940
Fengming Ma, Gang Sheng, Y. Ma
Privacy leakage is a major hidden danger for the healthy and orderly development of e-commerce. In this paper, we analyse the current situation of the information leakage. The main reason lies in that the customer information is stored and displayed in plaintext during the e-commerce process. We present a customer privacy protection platform on the basis of the analysis, where such technical measures as information segmentation, data encryption and access authorisation are taken. With the customer privacy protection platform, the customer information is not stored and displayed in plaintext any more, which is replaced with two-dimensional code or barcode. The traceability helps to prevent the leakage and abuse of the consumer information as much as possible. Thus, the traditional operation process of e-commerce is then reengineered and the customer information is only used on demand.
隐私泄露是影响电子商务健康有序发展的重大隐患。本文对信息泄露的现状进行了分析。主要原因是在电子商务过程中,客户信息以明文形式存储和显示。在此基础上,我们提出了一个客户隐私保护平台,该平台采用了信息分割、数据加密、访问授权等技术措施。有了客户隐私保护平台,客户信息不再以明文的形式存储和显示,而是以二维码或条形码的形式存储和显示。可追溯性有助于尽可能地防止消费者信息的泄露和滥用。从而对传统的电子商务操作流程进行再造,使客户信息按需使用。
{"title":"E-commerce process reengineering for customer privacy protection","authors":"Fengming Ma, Gang Sheng, Y. Ma","doi":"10.1504/ijics.2021.116940","DOIUrl":"https://doi.org/10.1504/ijics.2021.116940","url":null,"abstract":"Privacy leakage is a major hidden danger for the healthy and orderly development of e-commerce. In this paper, we analyse the current situation of the information leakage. The main reason lies in that the customer information is stored and displayed in plaintext during the e-commerce process. We present a customer privacy protection platform on the basis of the analysis, where such technical measures as information segmentation, data encryption and access authorisation are taken. With the customer privacy protection platform, the customer information is not stored and displayed in plaintext any more, which is replaced with two-dimensional code or barcode. The traceability helps to prevent the leakage and abuse of the consumer information as much as possible. Thus, the traditional operation process of e-commerce is then reengineered and the customer information is only used on demand.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130684045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing 基于物联网和云计算的RFID个人消费数据隐私保护系统研究
Pub Date : 2021-07-28 DOI: 10.1504/ijics.2021.116930
Ningning Du, Chongxu Chen
Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.
物联网和云计算对社会学、法学和伦理学的传统观念造成了颠覆。为了提高个人消费数据的隐私保护水平,利用物联网和云计算技术构建隐私保护模型。首先,对RFID中个人隐私数据保护的法律解释。其次,提出了基于云计算的隐私保护模型,并设计了相应的算法。第三,设计了RFID个人消费数据的隐私保护认证协议。最后,在仿真分析的基础上,对传统隐私保护系统和所提出的隐私保护系统的协议搜索耗时进行了比较。结果表明,该模型能够有效地保护个人消费数据。
{"title":"Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing","authors":"Ningning Du, Chongxu Chen","doi":"10.1504/ijics.2021.116930","DOIUrl":"https://doi.org/10.1504/ijics.2021.116930","url":null,"abstract":"Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to construct the privacy protection model. Firstly, legal interpretation of personal privacy data protection in RFID is carried out. Secondly, the privacy protection model based on clouding computing, and the corresponding algorithm is designed. Thirdly, the privacy protection authentication protocol of RFID personal consumption data is designed. Finally, the protocol search time-consuming comparison based on the traditional and proposed privacy protection systems are carried out based on simulation analysis. The results show that the proposed model can effectively protect the personal consumption data.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128573381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High utility differential privacy based on smooth sensitivity and individual ranking 基于平滑敏感性和个体排名的高效用差分隐私
Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116306
Fagen Song, Tinghuai Ma
Differential privacy can provide provable privacy security protection. In recent years, a great improvement has been made, however, in practical applications, the utility of original data is highly susceptible to noise, and thus, it limits its application and extension. To address the above problem, a new differential privacy method based on smooth sensitivity has been proposed in this paper. Using this method, the dataset's utility is improved greatly by reducing the amount of noise that is added, and this was validated by experiments.
差分隐私可以提供可证明的隐私安全保护。近年来,该方法取得了很大的进步,但在实际应用中,原始数据的实用性极易受到噪声的影响,从而限制了其应用和扩展。针对上述问题,本文提出了一种基于平滑灵敏度的差分隐私算法。使用该方法,通过减少噪声的添加量,大大提高了数据集的实用性,并通过实验验证了这一点。
{"title":"High utility differential privacy based on smooth sensitivity and individual ranking","authors":"Fagen Song, Tinghuai Ma","doi":"10.1504/IJICS.2021.116306","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116306","url":null,"abstract":"Differential privacy can provide provable privacy security protection. In recent years, a great improvement has been made, however, in practical applications, the utility of original data is highly susceptible to noise, and thus, it limits its application and extension. To address the above problem, a new differential privacy method based on smooth sensitivity has been proposed in this paper. Using this method, the dataset's utility is improved greatly by reducing the amount of noise that is added, and this was validated by experiments.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122230151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN 基于SDN的雾基础设施的物联网网络应用和取证的新方法
Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116309
Shahrzad Sedaghat
Ubiquitous computing with smart mobile devices, internet of things, virtualisation, cloud, and fog is changing yesteryears' static networks to dynamic networks of mobile smart devices. Fog computing is a pattern which expands cloud computing and the provision of related services to the network edge. Therefore, fog computing was recently introduced to provide storage and network services between end users and traditional cloud computing data centres. The present study aimed to consider the structure, architecture and applications of fog computing and analyse its differences and similarities with cloud computing, examine forensics in these networks and finally, present a new approach in this regard. This paper describes how the emerging technology - software defined networking (SDN) can be deployed a single infrastructure and leveraged to provide scalable flexible forensic solutions in this diverse and service providers/IT in a deal with the dynamic nature of today's networks attacks.
智能移动设备、物联网、虚拟化、云和雾的普适计算正在将过去的静态网络转变为移动智能设备的动态网络。雾计算是一种将云计算和相关服务的提供扩展到网络边缘的模式。因此,雾计算最近被引入,用于在终端用户和传统云计算数据中心之间提供存储和网络服务。本研究旨在考虑雾计算的结构、架构和应用,并分析其与云计算的异同,检查这些网络中的取证,最后提出这方面的新方法。本文描述了如何将新兴技术-软件定义网络(SDN)部署到单一基础设施中,并利用它在这种多样化和服务提供商/IT中提供可扩展的灵活取证解决方案,以应对当今网络攻击的动态性。
{"title":"New approach in the applications and forensics of the networks of the internet of things based on the fog infrastructure using SDN","authors":"Shahrzad Sedaghat","doi":"10.1504/IJICS.2021.116309","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116309","url":null,"abstract":"Ubiquitous computing with smart mobile devices, internet of things, virtualisation, cloud, and fog is changing yesteryears' static networks to dynamic networks of mobile smart devices. Fog computing is a pattern which expands cloud computing and the provision of related services to the network edge. Therefore, fog computing was recently introduced to provide storage and network services between end users and traditional cloud computing data centres. The present study aimed to consider the structure, architecture and applications of fog computing and analyse its differences and similarities with cloud computing, examine forensics in these networks and finally, present a new approach in this regard. This paper describes how the emerging technology - software defined networking (SDN) can be deployed a single infrastructure and leveraged to provide scalable flexible forensic solutions in this diverse and service providers/IT in a deal with the dynamic nature of today's networks attacks.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121702633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network 一种可证明安全的医疗无线传感器网络轻量级无证书聚合签名方案
Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116305
I. Kamil, S. Ogundoyin
In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wearable or implantable wireless sensors which generate and transmit physiological data to a medical server...
在医疗无线传感器网络(HWSNs)中,患者的身体通常包含几个可穿戴或可植入的无线传感器,这些传感器生成生理数据并将其传输到医疗服务器。
{"title":"A provably secure lightweight certificateless aggregate signature scheme for healthcare wireless sensor network","authors":"I. Kamil, S. Ogundoyin","doi":"10.1504/IJICS.2021.116305","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116305","url":null,"abstract":"In healthcare wireless sensor networks (HWSNs), a patient's body usually contains several wearable or implantable wireless sensors which generate and transmit physiological data to a medical server...","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128810046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On QoS-aware location privacy in mobile networks 移动网络中qos感知的位置隐私
Pub Date : 2021-07-09 DOI: 10.1504/IJICS.2021.116304
Nour El Houda Senoussi, A. Bachir, A. Bouabdallah
We deal with the threats to user privacy in the context of wireless local networks. We focus on location privacy where an adversary tries to learn a user's past and current locations. The current Wi-Fi standard is vulnerable to location privacy and mobility profiling attacks due to the transmission of personally identifying information such as the MAC address in plain text. We provide a generic mathematical model to quantify and express the privacy and elaborate a decentralised algorithm that allows users to attain their desired levels of privacy while lowering its effect on the QoS perceived by them. We evaluate our proposal with numerical simulation and mobility traces collected from Wi-Fi users in an office environment. We show that higher privacy can be obtained with a variable effect on the throughput available to users.
我们在无线局域网环境下处理对用户隐私的威胁。我们专注于位置隐私,对手试图了解用户过去和当前的位置。目前的Wi-Fi标准由于以明文形式传输MAC地址等个人识别信息,容易受到位置隐私和移动性分析攻击。我们提供了一个通用的数学模型来量化和表达隐私,并精心设计了一个分散的算法,允许用户达到他们想要的隐私水平,同时降低其对他们感知的QoS的影响。我们通过数值模拟和从办公环境中的Wi-Fi用户收集的移动轨迹来评估我们的建议。我们表明,可以在对用户可用吞吐量产生可变影响的情况下获得更高的隐私。
{"title":"On QoS-aware location privacy in mobile networks","authors":"Nour El Houda Senoussi, A. Bachir, A. Bouabdallah","doi":"10.1504/IJICS.2021.116304","DOIUrl":"https://doi.org/10.1504/IJICS.2021.116304","url":null,"abstract":"We deal with the threats to user privacy in the context of wireless local networks. We focus on location privacy where an adversary tries to learn a user's past and current locations. The current Wi-Fi standard is vulnerable to location privacy and mobility profiling attacks due to the transmission of personally identifying information such as the MAC address in plain text. We provide a generic mathematical model to quantify and express the privacy and elaborate a decentralised algorithm that allows users to attain their desired levels of privacy while lowering its effect on the QoS perceived by them. We evaluate our proposal with numerical simulation and mobility traces collected from Wi-Fi users in an office environment. We show that higher privacy can be obtained with a variable effect on the throughput available to users.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"312 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the adoption of scramble keypad for unlocking PIN-protected smartphones 关于采用紧急键盘解锁密码保护的智能手机
Pub Date : 2021-05-25 DOI: 10.1504/IJICS.2021.115345
Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala
Personal identification number (PIN) is a simple and effective mechanism for screen unlocking but is susceptible to a number of attacks. Scramble keypad is a method that can improve the security of PIN by changing the keypad layout in each PIN-entry process. However, scramble keypad has not been provided as a standard feature in Android and iOS. In this work, we conducted a security and usability analysis of scramble keypad through theoretical analysis and user studies. The security analysis shows that scramble keypad can perfectly defend smudge attacks and greatly reduce the threats of side-channel attacks. It also has a significantly better chance to defend shoulder surfing attacks than standard keypad. The compromising of usability of scramble keypad for the improved security was also investigated. The results suggest that it is worthy to provide scramble keypad as a standard option of mobile operating systems for unlocking PIN-protected smartphones.
个人识别号码(PIN)是一种简单有效的屏幕解锁机制,但容易受到许多攻击。打乱键盘是一种通过改变每次输入过程中键盘的布局来提高密码安全性的方法。然而,紧急键盘并未作为Android和iOS的标准功能提供。本文通过理论分析和用户研究,对扰码键盘进行了安全性和可用性分析。安全性分析表明,加扰键盘可以很好地防御污迹攻击,大大降低了侧信道攻击的威胁。它也有一个明显更好的机会防御肩冲浪攻击比标准键盘。研究了扰码键盘的可用性对安全性的影响。研究结果表明,将加密键盘作为手机操作系统的标准选项提供解锁密码保护的智能手机是值得的。
{"title":"On the adoption of scramble keypad for unlocking PIN-protected smartphones","authors":"Geetika Kovelamudi, Bryan Watson, Jun Zheng, Srinivas Mukkamala","doi":"10.1504/IJICS.2021.115345","DOIUrl":"https://doi.org/10.1504/IJICS.2021.115345","url":null,"abstract":"Personal identification number (PIN) is a simple and effective mechanism for screen unlocking but is susceptible to a number of attacks. Scramble keypad is a method that can improve the security of PIN by changing the keypad layout in each PIN-entry process. However, scramble keypad has not been provided as a standard feature in Android and iOS. In this work, we conducted a security and usability analysis of scramble keypad through theoretical analysis and user studies. The security analysis shows that scramble keypad can perfectly defend smudge attacks and greatly reduce the threats of side-channel attacks. It also has a significantly better chance to defend shoulder surfing attacks than standard keypad. The compromising of usability of scramble keypad for the improved security was also investigated. The results suggest that it is worthy to provide scramble keypad as a standard option of mobile operating systems for unlocking PIN-protected smartphones.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128329277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Inf. Comput. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1