首页 > 最新文献

Security and Privacy最新文献

英文 中文
Blockchain based security protocol for device to device secure communication in internet of things networks 基于b区块链的安全协议,用于物联网网络中设备间的安全通信
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-13 DOI: 10.1002/spy2.267
Palak Chandrakar, Rashi Bagga, Y. Kumar, S. Dwivedi, Ruhul Amin
The internet of things (IoT) is now advancing at a tremendous pace. Devices in the IoT can connect and communicate in a fully autonomous mode. Because of its autonomy and numerous infractions of security policies, the IoT network is subject to various security risks. However, because of this autonomy, dependable security and storage mechanisms for authentication to share data across IoT devices are essential. Furthermore, since it has initially been popularized in Bitcoin, blockchain development has accelerated. Blockchain can be used to solve security challenges in the IoT. Making secure communication between IoT devices is one approach to accomplish this. To address this issue, we present an effective technique for intranetwork and internetwork device‐to‐device secure communication that enables IoT device identification and authentication while also providing secure communication in an open environment. The method also provides data integrity in addition to authentication and secure communication. We have presented informal security analysis, which confirms that there is no important security threats in our protocol. The performance of the protocol is also better in comparison with previously published papers.
物联网正在以惊人的速度发展。物联网中的设备可以以完全自主的模式进行连接和通信。由于其自主性和许多违反安全政策的行为,物联网网络面临各种安全风险。然而,由于这种自主性,用于跨物联网设备共享数据的认证的可靠安全和存储机制至关重要。此外,由于区块链最初在比特币中普及,区块链的发展也在加速。区块链可以用来解决物联网中的安全挑战。在物联网设备之间进行安全通信是实现这一目标的一种方法。为了解决这个问题,我们提出了一种有效的内部网络和互联网设备对设备安全通信技术,该技术能够实现物联网设备识别和身份验证,同时在开放环境中提供安全通信。除了身份验证和安全通信之外,该方法还提供数据完整性。我们提供了非正式的安全分析,证实我们的协议中没有重要的安全威胁。与之前发表的论文相比,该协议的性能也更好。
{"title":"Blockchain based security protocol for device to device secure communication in internet of things networks","authors":"Palak Chandrakar, Rashi Bagga, Y. Kumar, S. Dwivedi, Ruhul Amin","doi":"10.1002/spy2.267","DOIUrl":"https://doi.org/10.1002/spy2.267","url":null,"abstract":"The internet of things (IoT) is now advancing at a tremendous pace. Devices in the IoT can connect and communicate in a fully autonomous mode. Because of its autonomy and numerous infractions of security policies, the IoT network is subject to various security risks. However, because of this autonomy, dependable security and storage mechanisms for authentication to share data across IoT devices are essential. Furthermore, since it has initially been popularized in Bitcoin, blockchain development has accelerated. Blockchain can be used to solve security challenges in the IoT. Making secure communication between IoT devices is one approach to accomplish this. To address this issue, we present an effective technique for intranetwork and internetwork device‐to‐device secure communication that enables IoT device identification and authentication while also providing secure communication in an open environment. The method also provides data integrity in addition to authentication and secure communication. We have presented informal security analysis, which confirms that there is no important security threats in our protocol. The performance of the protocol is also better in comparison with previously published papers.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42321310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An enhanced reversible image steganography using distributive Tian's method 一种基于分布Tian方法的增强可逆图像隐写
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-08 DOI: 10.1002/spy2.266
N. Malarvizhi, R. Priya, R. Bhavani
In recent years, the concept of image encryption and data concealing has become a major area of research that significantly improves the secure communication of images with hidden data in them. The usage of the cloud has been outstanding in several aspects so as its security to ensure privacy over the data stored in it. The concept of reversible image steganography is one such stream where the cloud users are highly relying upon the privacy of the data, they store in the cloud servers. The reversible image steganography has the potential to recover the original image from the stego‐image once the embedded data is extracted. In this research work, an effective distributive Tian's method is proposed to embed the data onto an encrypted image without degrading the performance of the encrypted image. The cross‐verification of lossless image steganography can be identified when the original image is getting extracted from the encrypted image. The result of the proposed method ensures that the distributive Tian's method outperforms the recent state‐of‐art methods. The proposed method is deployed onto six different images in different aspects to ensure its significance.
近年来,图像加密和数据隐藏的概念已成为一个主要的研究领域,它显著提高了图像中隐藏数据的安全通信。云的使用在几个方面都很突出,因为它的安全性可以确保存储在其中的数据的隐私。可逆图像隐写术的概念就是这样一种流,云用户高度依赖数据的隐私,他们将数据存储在云服务器中。一旦提取出嵌入数据,可逆图像隐写术就有可能从隐写图像中恢复原始图像。在这项研究工作中,提出了一种有效的分布式田方法,在不降低加密图像性能的情况下将数据嵌入到加密图像上。当从加密图像中提取原始图像时,可以识别无损图像隐写术的交叉验证。所提出的方法的结果确保了分布式田的方法优于最近的现有方法。将所提出的方法部署在不同方面的六幅不同图像上,以确保其重要性。
{"title":"An enhanced reversible image steganography using distributive Tian's method","authors":"N. Malarvizhi, R. Priya, R. Bhavani","doi":"10.1002/spy2.266","DOIUrl":"https://doi.org/10.1002/spy2.266","url":null,"abstract":"In recent years, the concept of image encryption and data concealing has become a major area of research that significantly improves the secure communication of images with hidden data in them. The usage of the cloud has been outstanding in several aspects so as its security to ensure privacy over the data stored in it. The concept of reversible image steganography is one such stream where the cloud users are highly relying upon the privacy of the data, they store in the cloud servers. The reversible image steganography has the potential to recover the original image from the stego‐image once the embedded data is extracted. In this research work, an effective distributive Tian's method is proposed to embed the data onto an encrypted image without degrading the performance of the encrypted image. The cross‐verification of lossless image steganography can be identified when the original image is getting extracted from the encrypted image. The result of the proposed method ensures that the distributive Tian's method outperforms the recent state‐of‐art methods. The proposed method is deployed onto six different images in different aspects to ensure its significance.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45002150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptors 融合特征提取、自然语言处理和统计描述符的深度学习假新闻检测
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-07 DOI: 10.1002/spy2.264
Mirmorsal Madani, H. Motameni, Hosein Mohamadi
Fake news potentially causes serious problems in society. Therefore, it is necessary to detect such news, which is, of course, associated with some challenges such as events, verification and datasets. Reference datasets related to this area face various problems, like the lack of sufficient information about news samples, no subject diversity, etc. The present paper proposes a model using feature extraction and machine learning algorithms for dealing with some of these problems. In the feature extraction phase, two new features (named coherence and cohesion), along with other key features, were extracted from news samples. In the detection phase, initially, the news samples of each dataset were sorted based on a specific order (easier samples in the beginning and harder ones towards the end) using a hybrid method consisting of statistical descriptors and a k‐nearest neighbor algorithm. Then, inspired by the human learning principles, the sorted news samples, were sent to the Long‐Short‐Term Memory and classical machine learning algorithms for the detection of fake news. The obtained results indicated the higher performance of the proposed model in fake news detection compared to benchmark models.
假新闻可能会给社会带来严重问题。因此,有必要检测此类新闻,当然,这与事件、验证和数据集等一些挑战有关。与该领域相关的参考数据集面临着各种问题,如缺乏足够的新闻样本信息、没有主题多样性等。本文提出了一个使用特征提取和机器学习算法来处理其中一些问题的模型。在特征提取阶段,从新闻样本中提取了两个新特征(称为连贯性和内聚性)以及其他关键特征。在检测阶段,最初,使用由统计描述符和k最近邻算法组成的混合方法,根据特定顺序对每个数据集的新闻样本进行排序(开始时样本更容易,结束时样本更难)。然后,受人类学习原理的启发,将排序后的新闻样本发送到长短期记忆和经典的机器学习算法中,用于检测假新闻。所获得的结果表明,与基准模型相比,所提出的模型在假新闻检测中具有更高的性能。
{"title":"Fake news detection using deep learning integrating feature extraction, natural language processing, and statistical descriptors","authors":"Mirmorsal Madani, H. Motameni, Hosein Mohamadi","doi":"10.1002/spy2.264","DOIUrl":"https://doi.org/10.1002/spy2.264","url":null,"abstract":"Fake news potentially causes serious problems in society. Therefore, it is necessary to detect such news, which is, of course, associated with some challenges such as events, verification and datasets. Reference datasets related to this area face various problems, like the lack of sufficient information about news samples, no subject diversity, etc. The present paper proposes a model using feature extraction and machine learning algorithms for dealing with some of these problems. In the feature extraction phase, two new features (named coherence and cohesion), along with other key features, were extracted from news samples. In the detection phase, initially, the news samples of each dataset were sorted based on a specific order (easier samples in the beginning and harder ones towards the end) using a hybrid method consisting of statistical descriptors and a k‐nearest neighbor algorithm. Then, inspired by the human learning principles, the sorted news samples, were sent to the Long‐Short‐Term Memory and classical machine learning algorithms for the detection of fake news. The obtained results indicated the higher performance of the proposed model in fake news detection compared to benchmark models.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":"5 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41469212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Issue Information 问题信息
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-01 DOI: 10.1002/spy2.170
{"title":"Issue Information","authors":"","doi":"10.1002/spy2.170","DOIUrl":"https://doi.org/10.1002/spy2.170","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41526044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Private record linkage with linkage maps 带有链接映射的私有记录链接
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-29 DOI: 10.1002/spy2.265
Shreya Patel, Rinku Dewri
Private record linkage is an actively pursued research area to facilitate the linkage of database records under the constraints of regulations that do not allow linkage agents to learn sensitive identities of record owners. Recent works have shown that linkage using commutative ciphers, which were discarded earlier for efficiency concerns, can be made feasible by leveraging precomputations, data parallelism, and probabilistic key reuse approaches. In this work, we propose further optimizations that can be performed to improve the runtime efficiency of such an approach. We transition from modular exponentiation ciphers to elliptic curve operations to improve precomputation time, eliminate memory intensive comparisons of encrypted values, and introduce data structures to detect negative comparisons. We benchmark the proposed approach using real world demographics data, and provide an extensive study of the parametric aspects of the approach. We also supplement our execution time results with an assessment of the residual privacy risk left by the approach. The approach can perform a linkage of two datasets with 105 records each in 20 minutes in a commodity laptop. This is achieved by eliminating the need to compare more than 70% of the record pairs. By design, the linkage accuracy is also retained at the same level as a nonprivate record linkage procedure.
私有记录链接是一个积极追求的研究领域,在不允许链接代理了解记录所有者敏感身份的法规约束下,促进数据库记录的链接。最近的研究表明,通过利用预计算、数据并行性和概率密钥重用方法,可以使使用交换密码的链接变得可行,而之前由于效率问题而放弃了交换密码。在这项工作中,我们提出了可以执行的进一步优化,以提高这种方法的运行时效率。我们从模幂运算密码过渡到椭圆曲线运算,以改善预计算时间,消除加密值的内存密集型比较,并引入数据结构来检测负比较。我们使用真实世界的人口统计数据对提出的方法进行基准测试,并对该方法的参数方面进行了广泛的研究。我们还通过对该方法留下的剩余隐私风险的评估来补充执行时间结果。该方法可以在一台普通笔记本电脑上在20分钟内执行两个数据集的链接,每个数据集有105条记录。这是通过不需要比较70%以上的记录对来实现的。通过设计,链接精度也保持在与非私有记录链接过程相同的级别。
{"title":"Private record linkage with linkage maps","authors":"Shreya Patel, Rinku Dewri","doi":"10.1002/spy2.265","DOIUrl":"https://doi.org/10.1002/spy2.265","url":null,"abstract":"Private record linkage is an actively pursued research area to facilitate the linkage of database records under the constraints of regulations that do not allow linkage agents to learn sensitive identities of record owners. Recent works have shown that linkage using commutative ciphers, which were discarded earlier for efficiency concerns, can be made feasible by leveraging precomputations, data parallelism, and probabilistic key reuse approaches. In this work, we propose further optimizations that can be performed to improve the runtime efficiency of such an approach. We transition from modular exponentiation ciphers to elliptic curve operations to improve precomputation time, eliminate memory intensive comparisons of encrypted values, and introduce data structures to detect negative comparisons. We benchmark the proposed approach using real world demographics data, and provide an extensive study of the parametric aspects of the approach. We also supplement our execution time results with an assessment of the residual privacy risk left by the approach. The approach can perform a linkage of two datasets with 105 records each in 20 minutes in a commodity laptop. This is achieved by eliminating the need to compare more than 70% of the record pairs. By design, the linkage accuracy is also retained at the same level as a nonprivate record linkage procedure.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48597389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Perfect secret sharing schemes from combinatorial squares 基于组合平方的完美秘密共享方案
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-19 DOI: 10.1002/spy2.262
Shyam Saurabh, K. Sinha
Chaudhry et al. proposed perfect secret sharing schemes from combinatorial squares called Room squares based on certain balanced incomplete block designs. Their protocol is efficient and secure but it is based on a Room square of order r which exists if and only if r is odd and r ≠ 3, 5. Here, we have proposed the schemes from Room squares based on group divisible designs which are a broader class of designs.
Chaudhry等人基于某些平衡的不完全块设计,从称为房间正方形的组合正方形中提出了完美的秘密共享方案。他们的协议是有效和安全的,但它是基于r阶的房间平方的,该平方存在当且仅当r是奇数且r≠0 3、5。在这里,我们提出了基于分组可分割设计的房间正方形方案,这是一类更广泛的设计。
{"title":"Perfect secret sharing schemes from combinatorial squares","authors":"Shyam Saurabh, K. Sinha","doi":"10.1002/spy2.262","DOIUrl":"https://doi.org/10.1002/spy2.262","url":null,"abstract":"Chaudhry et al. proposed perfect secret sharing schemes from combinatorial squares called Room squares based on certain balanced incomplete block designs. Their protocol is efficient and secure but it is based on a Room square of order r which exists if and only if r is odd and r ≠ 3, 5. Here, we have proposed the schemes from Room squares based on group divisible designs which are a broader class of designs.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42588495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing website detection: How effective are deep learning‐based models and hyperparameter optimization? 网络钓鱼网站检测:基于深度学习的模型和超参数优化有多有效?
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-14 DOI: 10.1002/spy2.256
May Almousa, Tianyang Zhang, A. Sarrafzadeh, Mohd Anwar
Phishing websites are fraudulent websites that appear legitimate and trick unsuspecting users into interacting with them, stealing their valuable information. Because phishing attacks are a leading cause of data breach, different anti‐phishing solutions have been explored for cybersecurity management including machine learning‐based technical approaches. However, there is a gap in understanding how robust deep learning‐based models together with hyperparameter optimization are for phishing website detection. In this vein, this study pursues the tasks of developing parsimonious deep learning models and hyperparameter optimization to achieve high accuracy and reproducible results for phishing website detection. This paper demonstrates a systematic process of building detection models based on three deep learning algorithm architectures (Long Short‐Term Memory‐based detection models, Fully Connected Deep Neural Network‐based detection models, and convolutional neural network‐based detection models) that are built and evaluated using four publicly available phishing website datasets, achieving the best accuracy of 97.37%. We also compared two different optimization algorithms for hyperparameter optimization: Grid Search and Genetic Algorithm, which contributed to 0.1%–1% increase in accuracy.
网络钓鱼网站是欺诈性网站,看起来合法,欺骗毫无戒心的用户与他们互动,窃取他们的宝贵信息。由于网络钓鱼攻击是导致数据泄露的主要原因,网络安全管理已经探索了不同的反网络钓鱼解决方案,包括基于机器学习的技术方法。然而,在理解基于深度学习的模型与超参数优化一起用于网络钓鱼网站检测的鲁棒性方面存在差距。在这方面,本研究的任务是开发简洁的深度学习模型和超参数优化,以实现网络钓鱼网站检测的高精度和可重复的结果。本文演示了基于三种深度学习算法架构(基于长短期记忆的检测模型、基于全连接深度神经网络的检测模型和基于卷积神经网络的检测模型)构建检测模型的系统过程,这些模型使用四个公开可用的网络钓鱼网站数据集构建和评估,达到了97.37%的最佳准确率。我们还比较了两种不同的超参数优化算法:网格搜索和遗传算法,这两种算法的精度提高了0.1%-1%。
{"title":"Phishing website detection: How effective are deep learning‐based models and hyperparameter optimization?","authors":"May Almousa, Tianyang Zhang, A. Sarrafzadeh, Mohd Anwar","doi":"10.1002/spy2.256","DOIUrl":"https://doi.org/10.1002/spy2.256","url":null,"abstract":"Phishing websites are fraudulent websites that appear legitimate and trick unsuspecting users into interacting with them, stealing their valuable information. Because phishing attacks are a leading cause of data breach, different anti‐phishing solutions have been explored for cybersecurity management including machine learning‐based technical approaches. However, there is a gap in understanding how robust deep learning‐based models together with hyperparameter optimization are for phishing website detection. In this vein, this study pursues the tasks of developing parsimonious deep learning models and hyperparameter optimization to achieve high accuracy and reproducible results for phishing website detection. This paper demonstrates a systematic process of building detection models based on three deep learning algorithm architectures (Long Short‐Term Memory‐based detection models, Fully Connected Deep Neural Network‐based detection models, and convolutional neural network‐based detection models) that are built and evaluated using four publicly available phishing website datasets, achieving the best accuracy of 97.37%. We also compared two different optimization algorithms for hyperparameter optimization: Grid Search and Genetic Algorithm, which contributed to 0.1%–1% increase in accuracy.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47772956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Decentralized trade finance using blockchain and lightning network 使用区块链和闪电网络的去中心化贸易金融
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-12 DOI: 10.1002/spy2.260
Shivansh Kumar, Ruhul Amin
A decentralized trade finance system is urgently needed, as smart contracts and blockchain can make the entire process fast, secure, and efficient while also allowing ordinary people to participate in the global economy. Decentralization will increase trust and transparency, as well as allow smaller businesses to participate in the industry, resulting in more jobs and a boost to the economy. We have also taken a decentralized approach to solving this massive problem with our project. We propose a decentralized trade finance model that is owned by the general public, such as you and me. On the one hand, a community of people like you and me give liquidity to the platform's liquidity pool via a lighting network, while on the other hand, importers and exporters can create profiles and engage in trade finance via the decentralized network. The exporter will use the platform validator to validate their invoice and then apply for trade finance. If everything goes well, the exporter will get monies from the liquidity pool, and the platform will be compensated by the importer after the trade is completed. Everyone involved in the process will receive trade tokens when each successful deal is completed, incentivizing the participants' good behavior.
迫切需要一个去中心化的贸易金融系统,因为智能合约和区块链可以使整个过程快速、安全、高效,同时也让普通人参与全球经济。权力下放将增加信任和透明度,并允许较小的企业参与该行业,从而创造更多的就业机会,促进经济发展。我们还采取了去中心化的方法来解决我们项目中的这个巨大问题。我们提出了一种去中心化的贸易融资模式,由公众所有,比如你和我。一方面,像你和我这样的社区通过照明网络向平台的流动性池提供流动性,而另一方面,进口商和出口商可以通过去中心化网络创建档案并从事贸易融资。出口商将使用平台验证器验证发票,然后申请贸易融资。如果一切顺利,出口商将从流动性池中获得资金,交易完成后,进口商将对平台进行补偿。当每笔成功交易完成时,参与该过程的每个人都将获得交易代币,激励参与者的良好行为。
{"title":"Decentralized trade finance using blockchain and lightning network","authors":"Shivansh Kumar, Ruhul Amin","doi":"10.1002/spy2.260","DOIUrl":"https://doi.org/10.1002/spy2.260","url":null,"abstract":"A decentralized trade finance system is urgently needed, as smart contracts and blockchain can make the entire process fast, secure, and efficient while also allowing ordinary people to participate in the global economy. Decentralization will increase trust and transparency, as well as allow smaller businesses to participate in the industry, resulting in more jobs and a boost to the economy. We have also taken a decentralized approach to solving this massive problem with our project. We propose a decentralized trade finance model that is owned by the general public, such as you and me. On the one hand, a community of people like you and me give liquidity to the platform's liquidity pool via a lighting network, while on the other hand, importers and exporters can create profiles and engage in trade finance via the decentralized network. The exporter will use the platform validator to validate their invoice and then apply for trade finance. If everything goes well, the exporter will get monies from the liquidity pool, and the platform will be compensated by the importer after the trade is completed. Everyone involved in the process will receive trade tokens when each successful deal is completed, incentivizing the participants' good behavior.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45022899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system 基于切比雪夫混沌映射的卫星通信系统认证密钥协商协议的构建
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-08 DOI: 10.1002/spy2.257
Dharminder Dharminder, Ankur Nehra, Aditya Arya
In this article, we have discussed various authentication and key agreement protocols for satellite communication system and their flaws off‐line passwords guess, stolen smart card attack, insider attack and replay attack and so forth. We have analyzed the security of a recently published Uddeshaya et al's protocol for satellite communication, and discussed how it suffers from design flaws and insider attack. This protocol cannot stop the Bergamo attack, but the proposed protocol is applicable in specific environment against Bergamo attack. We have compared and illustrated the performance and security analysis of several existing protocols for satellite communication. The proposed authenticated key agreement protocol possesses both low computation and low communication cost. This protocol establishes a verified session key with only two messages of exchange. We have discussed the security of proposed framework in the random oracle model.
本文讨论了卫星通信系统的各种认证协议和密钥协议及其缺陷——离线密码猜测、智能卡被盗攻击、内部攻击和重放攻击等。我们分析了最近发布的Uddeshaya等人的卫星通信协议的安全性,并讨论了它如何遭受设计缺陷和内部攻击。虽然该协议不能阻止Bergamo攻击,但在特定的环境下可以有效地抵御Bergamo攻击。我们比较并说明了几种现有的卫星通信协议的性能和安全性分析。所提出的认证密钥协议具有计算量小、通信成本低等优点。该协议仅用两条交换消息建立一个经过验证的会话密钥。我们讨论了在随机oracle模型下所提出的框架的安全性。
{"title":"A construction of Chebyshev chaotic map based authenticated key agreement protocol for satellite communication system","authors":"Dharminder Dharminder, Ankur Nehra, Aditya Arya","doi":"10.1002/spy2.257","DOIUrl":"https://doi.org/10.1002/spy2.257","url":null,"abstract":"In this article, we have discussed various authentication and key agreement protocols for satellite communication system and their flaws off‐line passwords guess, stolen smart card attack, insider attack and replay attack and so forth. We have analyzed the security of a recently published Uddeshaya et al's protocol for satellite communication, and discussed how it suffers from design flaws and insider attack. This protocol cannot stop the Bergamo attack, but the proposed protocol is applicable in specific environment against Bergamo attack. We have compared and illustrated the performance and security analysis of several existing protocols for satellite communication. The proposed authenticated key agreement protocol possesses both low computation and low communication cost. This protocol establishes a verified session key with only two messages of exchange. We have discussed the security of proposed framework in the random oracle model.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45503364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy service for secure real‐time mission critical communications 用于安全实时关键任务通信的熵服务
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-05 DOI: 10.1002/spy2.258
E. Zeydan, Yekta Turk, Yaman Yagiz Tasbag
Real Time Mission Critical Communication (RTMCC) in emergency situations can include real‐time video and audio calls between peers and first responders all occurring simultaneously. RTMCC also requires secure end‐to‐end (E2E) group communication (GC) sessions against potential security threats during such incidents. In this paper, we explore all aspects of the possible methods that are suitable for a software implementation of for session key change during GC in E2E encryption of RTMCC. Later, we introduce our Entropy Service concept, which can be very effective in secure E2E RTMCC sessions. The proposed method ensures E2E security in real‐time communication systems while allowing very fast session key change for clients involved in an RTMCC session with a computational complexity of 𝒪(1). Our experimental results show that the proposed Entropy Service can reduce total time by 99.6% and 99.2%, the idle time by 99.4% and 98.99%, and the number of messages by 51.4% and 35.33% compared to the key refreshing and hash methods, respectively, when the number of users in the system increases to 45. These results show that both communication and computation complexity are significantly reduced with the proposed RTMCC session key change.
紧急情况下的实时关键任务通信(RTMCC)可以包括同行和急救人员之间同时发生的实时视频和音频呼叫。RTMCC还需要安全的端到端(E2E)组通信(GC)会话,以应对此类事件期间的潜在安全威胁。在本文中,我们探讨了适合于RTMCC端到端加密中GC期间会话密钥更改的软件实现的可能方法的各个方面。稍后,我们将介绍熵服务概念,它在安全的端到端RTMCC会话中非常有效。所提出的方法确保了实时通信系统的端到端安全,同时允许在一个计算复杂度为(1)的RTMCC会话中涉及的客户端进行非常快速的会话密钥更改。实验结果表明,当系统中用户数量增加到45个时,与密钥刷新和哈希方法相比,熵服务的总时间分别减少99.6%和99.2%,空闲时间分别减少99.4%和98.99%,消息数分别减少51.4%和35.33%。结果表明,采用RTMCC会话密钥更改后,通信复杂度和计算复杂度都得到了显著降低。
{"title":"Entropy service for secure real‐time mission critical communications","authors":"E. Zeydan, Yekta Turk, Yaman Yagiz Tasbag","doi":"10.1002/spy2.258","DOIUrl":"https://doi.org/10.1002/spy2.258","url":null,"abstract":"Real Time Mission Critical Communication (RTMCC) in emergency situations can include real‐time video and audio calls between peers and first responders all occurring simultaneously. RTMCC also requires secure end‐to‐end (E2E) group communication (GC) sessions against potential security threats during such incidents. In this paper, we explore all aspects of the possible methods that are suitable for a software implementation of for session key change during GC in E2E encryption of RTMCC. Later, we introduce our Entropy Service concept, which can be very effective in secure E2E RTMCC sessions. The proposed method ensures E2E security in real‐time communication systems while allowing very fast session key change for clients involved in an RTMCC session with a computational complexity of 𝒪(1). Our experimental results show that the proposed Entropy Service can reduce total time by 99.6% and 99.2%, the idle time by 99.4% and 98.99%, and the number of messages by 51.4% and 35.33% compared to the key refreshing and hash methods, respectively, when the number of users in the system increases to 45. These results show that both communication and computation complexity are significantly reduced with the proposed RTMCC session key change.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47205749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1