首页 > 最新文献

2017 IEEE Trustcom/BigDataSE/ICESS最新文献

英文 中文
Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust 基于传感器信任的触摸屏手势连续认证自适应阈值方案
Pub Date : 2017-09-07 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.284
Max Smith-Creasey, M. Rajarajan
In this study we produce a continuous authentication scheme for mobile devices that adjusts an adaptive threshold for touchscreen interactions based on trust in passively collected sensor data. Our framework unobtrusively compares real-time sensor data of a user to historic data and adjusts a trust parameter based on the similarity. We show that the trust parameter can be used to adjust an adaptive threshold in continuous authentication schemes. The framework passively models temporal, spatial and activity scenarios using sensor data such as location, surrounding devices, wi-fi networks, ambient noise, movements, user activity, ambient light, proximity to objects and atmospheric pressure from study participants. Deviations from the models increases the level of threat the device perceives from the scenario. We also model the user touchscreen interactions. The touchscreen interactions are authenticated against a threshold that is continually adjusted based on the perceived trust. This scheme provides greater nuance between security and usability, enabling more refined decisions. We present our novel framework and threshold adjustment criteria and validate our framework on two state-of-the-art sensor datasets. Our framework more than halves the false acceptance and false rejection rates of a static threshold system.
在这项研究中,我们为移动设备产生了一个连续的身份验证方案,该方案根据被动收集的传感器数据的信任来调整触摸屏交互的自适应阈值。我们的框架将用户的实时传感器数据与历史数据进行比较,并根据相似性调整信任参数。我们证明了在连续认证方案中,信任参数可以用来调整自适应阈值。该框架被动地模拟时间、空间和活动场景,使用传感器数据,如位置、周围设备、wi-fi网络、环境噪声、运动、用户活动、环境光、物体接近度和研究参与者的大气压力。与模型的偏差增加了设备从场景中感知到的威胁级别。我们还模拟了用户的触屏交互。触摸屏交互根据一个阈值进行身份验证,该阈值根据感知到的信任不断调整。该方案在安全性和可用性之间提供了更细微的差别,支持更精确的决策。我们提出了新的框架和阈值调整标准,并在两个最先进的传感器数据集上验证了我们的框架。我们的框架将静态阈值系统的错误接受率和错误拒绝率降低了一半以上。
{"title":"Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor Trust","authors":"Max Smith-Creasey, M. Rajarajan","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.284","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.284","url":null,"abstract":"In this study we produce a continuous authentication scheme for mobile devices that adjusts an adaptive threshold for touchscreen interactions based on trust in passively collected sensor data. Our framework unobtrusively compares real-time sensor data of a user to historic data and adjusts a trust parameter based on the similarity. We show that the trust parameter can be used to adjust an adaptive threshold in continuous authentication schemes. The framework passively models temporal, spatial and activity scenarios using sensor data such as location, surrounding devices, wi-fi networks, ambient noise, movements, user activity, ambient light, proximity to objects and atmospheric pressure from study participants. Deviations from the models increases the level of threat the device perceives from the scenario. We also model the user touchscreen interactions. The touchscreen interactions are authenticated against a threshold that is continually adjusted based on the perceived trust. This scheme provides greater nuance between security and usability, enabling more refined decisions. We present our novel framework and threshold adjustment criteria and validate our framework on two state-of-the-art sensor datasets. Our framework more than halves the false acceptance and false rejection rates of a static threshold system.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126002841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Volkswagen Car Entertainment System Forensics 大众汽车娱乐系统取证
Pub Date : 2017-08-04 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.302
Daniel Jacobs, Kim-Kwang Raymond Choo, Mohand Tahar Kechadi, Nhien-An Le-Khac
Vehicles are fast becoming another important source of digital evidence in a criminal investigation. Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving), the investigators focus on the acquisition of DNA, fingerprints and other identifying materials, usually non digital in nature. However, modern day cars, particularly smart or driverless cars, store a wealth of digital information, such as recent destinations, favorite locations, routes, personal data such as call logs, contact lists, SMS messages, pictures, and videos. In this paper, we describe some challenges associated with vehicle data forensics, an understudied area. Next, we present our case study on forensic acquisition and data analysis of an entertainment system on a Volkswagen car.
车辆正迅速成为刑事调查中数字证据的另一个重要来源。传统上,当车辆被卷入犯罪现场时(例如酒后驾驶),调查人员将重点放在获取DNA、指纹和其他识别材料上,这些材料通常是非数字性质的。然而,现代汽车,特别是智能或无人驾驶汽车,存储了大量的数字信息,例如最近的目的地,最喜欢的地点,路线,个人数据,如通话记录,联系人列表,短信,图片和视频。在本文中,我们描述了与车辆数据取证相关的一些挑战,这是一个研究不足的领域。接下来,我们将介绍我们对大众汽车娱乐系统的取证和数据分析的案例研究。
{"title":"Volkswagen Car Entertainment System Forensics","authors":"Daniel Jacobs, Kim-Kwang Raymond Choo, Mohand Tahar Kechadi, Nhien-An Le-Khac","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.302","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.302","url":null,"abstract":"Vehicles are fast becoming another important source of digital evidence in a criminal investigation. Traditionally, when a vehicle is involved in a crime scene (e.g. drink driving), the investigators focus on the acquisition of DNA, fingerprints and other identifying materials, usually non digital in nature. However, modern day cars, particularly smart or driverless cars, store a wealth of digital information, such as recent destinations, favorite locations, routes, personal data such as call logs, contact lists, SMS messages, pictures, and videos. In this paper, we describe some challenges associated with vehicle data forensics, an understudied area. Next, we present our case study on forensic acquisition and data analysis of an entertainment system on a Volkswagen car.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"691 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122981612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
(p, N)-identifiability: Anonymity under Practical Adversaries (p, N)-可识别性:实际对手下的匿名性
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.343
Tomoaki Mimoto, S. Kiyomoto, Katsuya Tanaka, A. Miyaji
Personal data has great potential for building an efficient and sustainable society; thus several privacy preserving techniques have been proposed to solve the essential issue of maintaining privacy in the use of personal data. Anonymization techniques are promising techniques applicable to huge-size personal data in order to reduce its re-identification risk. However, there is a trade-off between the utility of anonymized datasets and the risk of re-identification of individuals from the anonymized dataset, and so far no perfect solution has been provided. In previous studies, ideal adversaries in possession of all records of an original dataset have been considered in risk analyses, because an anonymized dataset is assumed to be publicly accessible, and once the record of a target is re-identified, privacy breaches are serious and may be uncontrollable. However, anonymized datasets are assumed to be distributed between organizations via secure channels in typical business situations. In this paper, we consider the actual risk to anonymized datasets and propose an analysis method that yields more stringent risk estimation in real settings with real adversaries. Furthermore, we present some experimental results using medical records. Our method is practical and useful for anonymized datasets generated by common anonymization methods such as generalization, noise addition and sampling, and can lead to generate more useful anonymized datasets.
个人资料对建立一个有效率和可持续发展的社会有很大的潜力;因此,人们提出了几种隐私保护技术来解决个人数据使用中维护隐私的基本问题。匿名化技术是一种很有前途的技术,适用于大规模的个人数据,以减少其重新识别的风险。然而,在匿名数据集的效用和从匿名数据集重新识别个人的风险之间存在权衡,到目前为止还没有提供完美的解决方案。在以前的研究中,在风险分析中考虑了拥有原始数据集所有记录的理想对手,因为假设匿名数据集是可公开访问的,一旦目标的记录被重新识别,隐私泄露是严重的,可能是不可控制的。然而,在典型的业务情况下,假定匿名数据集是通过安全通道在组织之间分发的。在本文中,我们考虑了匿名数据集的实际风险,并提出了一种分析方法,该方法可以在真实对手的真实设置中产生更严格的风险估计。此外,我们还介绍了一些利用病历的实验结果。该方法对于泛化、噪声添加和采样等常用匿名化方法生成的匿名数据集具有实用性和实用性,可以生成更有用的匿名数据集。
{"title":"(p, N)-identifiability: Anonymity under Practical Adversaries","authors":"Tomoaki Mimoto, S. Kiyomoto, Katsuya Tanaka, A. Miyaji","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.343","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.343","url":null,"abstract":"Personal data has great potential for building an efficient and sustainable society; thus several privacy preserving techniques have been proposed to solve the essential issue of maintaining privacy in the use of personal data. Anonymization techniques are promising techniques applicable to huge-size personal data in order to reduce its re-identification risk. However, there is a trade-off between the utility of anonymized datasets and the risk of re-identification of individuals from the anonymized dataset, and so far no perfect solution has been provided. In previous studies, ideal adversaries in possession of all records of an original dataset have been considered in risk analyses, because an anonymized dataset is assumed to be publicly accessible, and once the record of a target is re-identified, privacy breaches are serious and may be uncontrollable. However, anonymized datasets are assumed to be distributed between organizations via secure channels in typical business situations. In this paper, we consider the actual risk to anonymized datasets and propose an analysis method that yields more stringent risk estimation in real settings with real adversaries. Furthermore, we present some experimental results using medical records. Our method is practical and useful for anonymized datasets generated by common anonymization methods such as generalization, noise addition and sampling, and can lead to generate more useful anonymized datasets.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123089294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things 基于云的物联网分布式配置、授权与管理
Pub Date : 2017-08-01 DOI: 10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.236
Martin Henze, Benedikt Wolters, Roman Matzutt, T. Zimmermann, Klaus Wehrle
Network-based deployments within the Internet of Things increasingly rely on the cloud-controlled federation of individual networks to configure, authorize, and manage devices across network borders. While this approach allows the convenient and reliable interconnection of networks, it raises severe security and safety concerns. These concerns range from a curious cloud provider accessing confidential data to a malicious cloud provider being able to physically control safety-critical devices. To overcome these concerns, we present D-CAM, which enables secure and distributed configuration, authorization, and management across network borders in the cloud-based Internet of Things. With D-CAM, we constrain the cloud to act as highly available and scalable storage for control messages. Consequently, we achieve reliable network control across network borders and strong security guarantees. Our evaluation confirms that D-CAM adds only a modest overhead and can scale to large networks.
物联网中基于网络的部署越来越依赖于云控制的单个网络联盟来配置、授权和管理跨网络边界的设备。虽然这种方法可以方便和可靠地互连网络,但它引起了严重的安全和安全问题。这些问题的范围从好奇的云提供商访问机密数据到恶意的云提供商能够物理控制安全关键设备。为了克服这些问题,我们提出了D-CAM,它可以在基于云的物联网中实现跨网络边界的安全和分布式配置、授权和管理。使用D-CAM,我们将云限制为控制消息的高可用性和可扩展存储。因此,我们实现了跨网络边界的可靠网络控制和强大的安全保障。我们的评估证实,D-CAM只增加了适度的开销,并且可以扩展到大型网络。
{"title":"Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things","authors":"Martin Henze, Benedikt Wolters, Roman Matzutt, T. Zimmermann, Klaus Wehrle","doi":"10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.236","DOIUrl":"https://doi.org/10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.236","url":null,"abstract":"Network-based deployments within the Internet of Things increasingly rely on the cloud-controlled federation of individual networks to configure, authorize, and manage devices across network borders. While this approach allows the convenient and reliable interconnection of networks, it raises severe security and safety concerns. These concerns range from a curious cloud provider accessing confidential data to a malicious cloud provider being able to physically control safety-critical devices. To overcome these concerns, we present D-CAM, which enables secure and distributed configuration, authorization, and management across network borders in the cloud-based Internet of Things. With D-CAM, we constrain the cloud to act as highly available and scalable storage for control messages. Consequently, we achieve reliable network control across network borders and strong security guarantees. Our evaluation confirms that D-CAM adds only a modest overhead and can scale to large networks.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121252630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption 基于转换和加密的智能计量隐私保护聚合
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.273
Lingjuan Lyu, Yee Wei Law, Jiong Jin, M. Palaniswami
This paper proposes a novel privacy-preserving smart metering system for aggregating distributed smart meter data. It addresses two important challenges: (i) individual users wish to publish sensitive smart metering data for specific purposes, and (ii) an untrusted aggregator aims to make queries on the aggregate data. We handle these challenges using two main techniques. First, we propose Fourier Perturbation Algorithm (FPA) and Wavelet Perturbation Algorithm (WPA) which utilize Fourier/Wavelet transformation and distributed differential privacy (DDP) to provide privacy for the released statistic with provable sensitivity and error bounds. Second, we leverage an exponential ElGamal encryption mechanism to enable secure communications between the users and the untrusted aggregator. Standard differential privacy techniques perform poorly for time-series data as it results in a Θ(n) noise to answer n queries, rendering the answers practically useless if n is large. Our proposed distributed differential privacy mechanism relies on Gaussian principles to generate distributed noise, which guarantees differential privacy for each user with O(1) error, and provides computational simplicity and scalability. Compared with Gaussian Perturbation Algorithm (GPA) which adds distributed Gaussian noise to the original data, the experimental results demonstrate the superiority of the proposed FPA and WPA by adding noise to the transformed coefficients.
针对分布式智能电表数据的聚合,提出了一种新型的保密性智能电表系统。它解决了两个重要的挑战:(i)个人用户希望为特定目的发布敏感的智能计量数据,以及(ii)不受信任的聚合器旨在对聚合数据进行查询。我们使用两种主要技术来处理这些挑战。首先,我们提出傅里叶摄动算法(FPA)和小波摄动算法(WPA),利用傅里叶/小波变换和分布式差分隐私(DDP)为发布的统计量提供可证明的灵敏度和误差范围的隐私。其次,我们利用指数ElGamal加密机制来实现用户和不受信任的聚合器之间的安全通信。标准差分隐私技术对于时间序列数据的性能很差,因为它会导致回答n个查询时产生Θ(n)噪声,如果n很大,则导致答案实际上毫无用处。我们提出的分布式差分隐私机制依靠高斯原理产生分布式噪声,以0(1)误差保证每个用户的差分隐私,并且具有计算简单性和可扩展性。与在原始数据中加入分布高斯噪声的高斯摄动算法(GPA)相比,实验结果证明了在变换系数中加入噪声的FPA算法和WPA算法的优越性。
{"title":"Privacy-Preserving Aggregation of Smart Metering via Transformation and Encryption","authors":"Lingjuan Lyu, Yee Wei Law, Jiong Jin, M. Palaniswami","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.273","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.273","url":null,"abstract":"This paper proposes a novel privacy-preserving smart metering system for aggregating distributed smart meter data. It addresses two important challenges: (i) individual users wish to publish sensitive smart metering data for specific purposes, and (ii) an untrusted aggregator aims to make queries on the aggregate data. We handle these challenges using two main techniques. First, we propose Fourier Perturbation Algorithm (FPA) and Wavelet Perturbation Algorithm (WPA) which utilize Fourier/Wavelet transformation and distributed differential privacy (DDP) to provide privacy for the released statistic with provable sensitivity and error bounds. Second, we leverage an exponential ElGamal encryption mechanism to enable secure communications between the users and the untrusted aggregator. Standard differential privacy techniques perform poorly for time-series data as it results in a Θ(n) noise to answer n queries, rendering the answers practically useless if n is large. Our proposed distributed differential privacy mechanism relies on Gaussian principles to generate distributed noise, which guarantees differential privacy for each user with O(1) error, and provides computational simplicity and scalability. Compared with Gaussian Perturbation Algorithm (GPA) which adds distributed Gaussian noise to the original data, the experimental results demonstrate the superiority of the proposed FPA and WPA by adding noise to the transformed coefficients.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127218220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model 基于隐马尔可夫模型的顺序无监督文档作者聚类
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.261
Khaled Aldebei, Helia Farhood, W. Jia, P. Nanda, Xiangjian He
Document clustering groups documents of certain similar characteristics in one cluster. Document clustering has shown advantages on organization, retrieval, navigation and summarization of a huge amount of text documents on Internet. This paper presents a novel, unsupervised approach for clustering single-author documents into groups based on authorship. The key novelty is that we propose to extract contextual correlations to depict the writing style hidden among sentences of each document for clustering the documents. For this purpose, we build an Hidden Markov Model (HMM) for representing the relations of sequential sentences, and a two-level, unsupervised framework is constructed. Our proposed approach is evaluated on four benchmark datasets, widely used for document authorship analysis. A scientific paper is also used to demonstrate the performance of the approach on clustering short segments of a text into authorial components. Experimental results show that the proposed approach outperforms the state-of-the-art approaches.
文档聚类将具有某些相似特征的文档分组在一个聚类中。文档聚类在Internet上海量文本文档的组织、检索、导航和总结等方面显示出优势。本文提出了一种新颖的、无监督的方法,用于根据作者身份将单作者文档聚类成组。关键的新颖之处在于,我们提出提取上下文相关性来描述隐藏在每个文档句子中的写作风格,从而对文档进行聚类。为此,我们建立了一个隐马尔可夫模型(HMM)来表示顺序句子之间的关系,并构造了一个两层无监督框架。我们提出的方法在四个基准数据集上进行了评估,这些数据集广泛用于文档作者分析。还使用一篇科学论文来演示该方法在将文本的短片段聚类为作者成分方面的性能。实验结果表明,该方法优于现有方法。
{"title":"Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model","authors":"Khaled Aldebei, Helia Farhood, W. Jia, P. Nanda, Xiangjian He","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.261","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.261","url":null,"abstract":"Document clustering groups documents of certain similar characteristics in one cluster. Document clustering has shown advantages on organization, retrieval, navigation and summarization of a huge amount of text documents on Internet. This paper presents a novel, unsupervised approach for clustering single-author documents into groups based on authorship. The key novelty is that we propose to extract contextual correlations to depict the writing style hidden among sentences of each document for clustering the documents. For this purpose, we build an Hidden Markov Model (HMM) for representing the relations of sequential sentences, and a two-level, unsupervised framework is constructed. Our proposed approach is evaluated on four benchmark datasets, widely used for document authorship analysis. A scientific paper is also used to demonstrate the performance of the approach on clustering short segments of a text into authorial components. Experimental results show that the proposed approach outperforms the state-of-the-art approaches.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2 EPC Gen2伪随机数发生器的评价与改进
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.305
Hiroshi Nomaguchi, A. Miyaji, Chunhua Su
RFID enable applications are ubiquitous in our society, especially become more and more important as IoT management rises. Meanwhile, the concern of security and privacy of RFID is also increasing. The pseudorandom number generator is one of the core primitives to implement RFID security. Therefore, it is necessary to design and implement a secure and robust pseudo-random number generator (PRNG) for current RFID tag. In this paper, we study the security of light-weight PRNGs for EPC Gen2 RFID tag which is an EPC Global standard. Based on our analysis, we propose an new scheme which outperform the existing PRNGs for EPC Gen2 RFID tag. We build our PRNG with a combination of NLFSR and DLFSR, and achieve more efficiency and security. We also show that our proposed PRNG has good randomness and passed the NIST randomness test. we also shows that it is resistant to identification attacks and GD attacks.
RFID应用在我们的社会中无处不在,特别是随着物联网管理的兴起,它变得越来越重要。与此同时,人们对RFID的安全性和隐私性也越来越关注。伪随机数生成器是实现RFID安全的核心原语之一。因此,有必要设计和实现一种安全、鲁棒的伪随机数发生器(PRNG)。本文研究了EPC全球标准EPC Gen2 RFID标签的轻量化prng的安全性。在分析的基础上,提出了一种优于现有EPC Gen2 RFID标签prng的新方案。我们结合NLFSR和DLFSR构建了PRNG,实现了更高的效率和安全性。结果表明,所提出的PRNG具有良好的随机性,并通过了NIST随机性测试。我们还证明了它对身份识别攻击和GD攻击具有抵抗性。
{"title":"Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2","authors":"Hiroshi Nomaguchi, A. Miyaji, Chunhua Su","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.305","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.305","url":null,"abstract":"RFID enable applications are ubiquitous in our society, especially become more and more important as IoT management rises. Meanwhile, the concern of security and privacy of RFID is also increasing. The pseudorandom number generator is one of the core primitives to implement RFID security. Therefore, it is necessary to design and implement a secure and robust pseudo-random number generator (PRNG) for current RFID tag. In this paper, we study the security of light-weight PRNGs for EPC Gen2 RFID tag which is an EPC Global standard. Based on our analysis, we propose an new scheme which outperform the existing PRNGs for EPC Gen2 RFID tag. We build our PRNG with a combination of NLFSR and DLFSR, and achieve more efficiency and security. We also show that our proposed PRNG has good randomness and passed the NIST randomness test. we also shows that it is resistant to identification attacks and GD attacks.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"16 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125625631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Queuing Theory-Guided Performance Evaluation for a Reconfigurable High-Speed Device Interconnected Bus 基于排队理论的可重构高速设备互联总线性能评价
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.320
Weiwen Chen, Keni Qiu, Jiqin Zhou, Yuanhui Ni, Yuanchao Xu
UM-BUS, a reconfigurable high-speed device- interconnected bus, also characteristic of dynamic fault-tolerance and remote access has been proposed to enablelightweight sensor system design in IoTs. Performanceprediction is a key step to build an idea of the worst or best casesbefore real-world deployment of UM-BUS-based systems. Thispaper proposes a queuing theory-guided analytic model whichallows us to obtain an approximation for the average packetdelay as well as exact upper and lower bounds. A set ofexperiments based on MATLAB simulation are conducted to doperformance evaluation. Finally design insights are given forpragmatic implementation.
UM-BUS是一种可重构的高速设备互联总线,具有动态容错和远程访问的特点,可实现物联网中传感器系统的轻量化设计。在实际部署基于um - bus的系统之前,性能预测是构建最坏或最佳情况的关键步骤。本文提出了一个以排队论为指导的分析模型,该模型使我们能够得到平均分组延迟的近似值以及精确的上界和下界。在MATLAB仿真的基础上进行了一组实验,对其性能进行了评估。最后给出了实际实施的设计见解。
{"title":"Queuing Theory-Guided Performance Evaluation for a Reconfigurable High-Speed Device Interconnected Bus","authors":"Weiwen Chen, Keni Qiu, Jiqin Zhou, Yuanhui Ni, Yuanchao Xu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.320","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.320","url":null,"abstract":"UM-BUS, a reconfigurable high-speed device- interconnected bus, also characteristic of dynamic fault-tolerance and remote access has been proposed to enablelightweight sensor system design in IoTs. Performanceprediction is a key step to build an idea of the worst or best casesbefore real-world deployment of UM-BUS-based systems. Thispaper proposes a queuing theory-guided analytic model whichallows us to obtain an approximation for the average packetdelay as well as exact upper and lower bounds. A set ofexperiments based on MATLAB simulation are conducted to doperformance evaluation. Finally design insights are given forpragmatic implementation.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"379 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126725686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Cross-Domain eID by Using Agile Mobile Authentication 利用敏捷移动认证实现跨域eID
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.286
T. Lenz, Lukas Alber
Identification and authentication are essential processes in various areas of applications. While these processes are widely described and examined in respect to Web applications that are used on personal computers, the situation is more demanding on smart or mobile devices, because these devices provides other interfaces and has a different user behavior. Additionally, the smart or mobile technology sector has a continuous enhancement that results in no stable technology over the years. Consequently, a new usable, agile, and secure method becomes necessary to bring identification and secure authentication on smart or mobile platforms. In this paper, we propose a new agile mobile authentication process that closes the gap between different devices and service type. This proposed authentication process uses already existing technologies for mobile or smart devices to use these devices for identification and authentication directly. We illustrate the practical applicability of our agile mobile authentication for cross-domain eID by implementing all needed components for the Austria eGovernment infrastructure. Finally, we evaluate the implemented components during a first pilot time of 4 months.
识别和身份验证是各个应用领域的基本过程。虽然这些过程在个人计算机上使用的Web应用程序方面得到了广泛的描述和研究,但在智能或移动设备上的情况要求更高,因为这些设备提供了其他接口,并且具有不同的用户行为。此外,智能或移动技术领域不断增强,导致多年来没有稳定的技术。因此,需要一种新的可用、敏捷和安全的方法来在智能或移动平台上进行身份识别和安全身份验证。在本文中,我们提出了一种新的灵活的移动身份验证过程,缩小了不同设备和服务类型之间的差距。这个提议的身份验证过程使用已经存在的移动或智能设备技术,直接使用这些设备进行身份识别和身份验证。我们通过实现奥地利电子政府基础设施所需的所有组件来说明我们的敏捷移动身份验证在跨域eID中的实际适用性。最后,我们在4个月的第一次试点时间内评估实现的组件。
{"title":"Towards Cross-Domain eID by Using Agile Mobile Authentication","authors":"T. Lenz, Lukas Alber","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.286","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.286","url":null,"abstract":"Identification and authentication are essential processes in various areas of applications. While these processes are widely described and examined in respect to Web applications that are used on personal computers, the situation is more demanding on smart or mobile devices, because these devices provides other interfaces and has a different user behavior. Additionally, the smart or mobile technology sector has a continuous enhancement that results in no stable technology over the years. Consequently, a new usable, agile, and secure method becomes necessary to bring identification and secure authentication on smart or mobile platforms. In this paper, we propose a new agile mobile authentication process that closes the gap between different devices and service type. This proposed authentication process uses already existing technologies for mobile or smart devices to use these devices for identification and authentication directly. We illustrate the practical applicability of our agile mobile authentication for cross-domain eID by implementing all needed components for the Austria eGovernment infrastructure. Finally, we evaluate the implemented components during a first pilot time of 4 months.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116087244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems 基于相似度分析的安全保密电子病历系统访问控制策略组合
Pub Date : 2017-08-01 DOI: 10.1109/Trustcom/BigDataSE/ICESS.2017.262
F. Rezaeibagha, Y. Mu
In distributed systems, there is often a need to combine the heterogeneous access control policies to offer more comprehensive services to users in the local or national level. A large scale healthcare system is usually distributed in a computer network and might require sophisticated access control policies to protect the system. Therefore, the need for integrating the electronic healthcare systems might be important to provide a comprehensive care for patients while preserving patients' privacy and data security. However, there are major impediments in healthcare systems concerning not well-defined and flexible access control policy implementations, hindering the progress towards secure integrated systems. In this paper, we introduce an access control policy combination framework for EHR systems that preserves patients' privacy and ensures data security. We achieve our goal through an access control mechanism which handles multiple access control policies through a similarity analysis phase. In that phase, we evaluate different XACML policies to decide whether or not a policy combination is applicable. We have provided a case study to show the applicability of our proposed approach based on XACML. Our study results can be applied to the electronic health record (EHR) access control policy, which fosters interoperability and scalability among healthcare providers while preserving patients' privacy and data security.
在分布式系统中,通常需要将异构访问控制策略组合起来,以便为本地或全国级别的用户提供更全面的服务。大型医疗保健系统通常分布在计算机网络中,可能需要复杂的访问控制策略来保护系统。因此,集成电子医疗保健系统的需求对于为患者提供全面的护理,同时保护患者的隐私和数据安全可能很重要。然而,在医疗保健系统中,没有明确定义和灵活的访问控制策略实现存在主要障碍,阻碍了安全集成系统的进展。在本文中,我们介绍了一种用于EHR系统的访问控制策略组合框架,以保护患者的隐私并确保数据安全。我们通过一种访问控制机制来实现我们的目标,该机制通过相似性分析阶段来处理多个访问控制策略。在该阶段,我们将评估不同的XACML策略,以决定策略组合是否适用。我们提供了一个案例研究来展示我们提出的基于XACML的方法的适用性。我们的研究结果可以应用于电子健康记录(EHR)访问控制策略,该策略可以促进医疗保健提供者之间的互操作性和可扩展性,同时保护患者的隐私和数据安全。
{"title":"Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR Systems","authors":"F. Rezaeibagha, Y. Mu","doi":"10.1109/Trustcom/BigDataSE/ICESS.2017.262","DOIUrl":"https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.262","url":null,"abstract":"In distributed systems, there is often a need to combine the heterogeneous access control policies to offer more comprehensive services to users in the local or national level. A large scale healthcare system is usually distributed in a computer network and might require sophisticated access control policies to protect the system. Therefore, the need for integrating the electronic healthcare systems might be important to provide a comprehensive care for patients while preserving patients' privacy and data security. However, there are major impediments in healthcare systems concerning not well-defined and flexible access control policy implementations, hindering the progress towards secure integrated systems. In this paper, we introduce an access control policy combination framework for EHR systems that preserves patients' privacy and ensures data security. We achieve our goal through an access control mechanism which handles multiple access control policies through a similarity analysis phase. In that phase, we evaluate different XACML policies to decide whether or not a policy combination is applicable. We have provided a case study to show the applicability of our proposed approach based on XACML. Our study results can be applied to the electronic health record (EHR) access control policy, which fosters interoperability and scalability among healthcare providers while preserving patients' privacy and data security.","PeriodicalId":170253,"journal":{"name":"2017 IEEE Trustcom/BigDataSE/ICESS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129726820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2017 IEEE Trustcom/BigDataSE/ICESS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1