首页 > 最新文献

Security and Privacy最新文献

英文 中文
A comprehensive security and performance assessment of UAV authentication schemes 无人机认证方案的综合安全性和性能评估
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-03 DOI: 10.1002/spy2.338
Yassine Mekdad, Ahmet Aris, Abbas Acar, M. Conti, R. Lazzeretti, A. E. Fergougui, Selcuk Uluagac
In the past few years, unmanned aerial vehicles (UAVs) have significantly gained attention and popularity from industry, government, and academia. With their rapid development and deployment into the civilian airspace, UAVs play an important role in different applications, including goods delivery, search‐and‐rescue, and traffic monitoring. Therefore, providing secure communication through authentication models for UAVs is necessary for a successful and reliable flight mission. To satisfy such requirements, numerous authentication mechanisms have been proposed in the literature. However, the literature lacks a comprehensive study evaluating the security and performance of these solutions. In this article, we analyze the security and performance of 27 recent UAV authentication works by considering ten different key metrics. First, in the performance analysis, we show that the majority of UAV authentication schemes are lightweight in their communication cost. However, the storage overhead or the energy consumption is not reported by many authentication studies. Then, we reveal in the security analysis the widely employed formal models (i.e., abstract description of an authentication protocol through a mathematical model), while most of the studies lack coverage of many attacks that can target UAV systems. Afterwards, we highlight the challenges that need to be addressed in order to design and implement secure and reliable UAV authentication schemes. Finally, we summarize the lessons learned on the authentication strategies for UAVs to motivate promising direction for further research.
在过去的几年里,无人机显著地受到了工业界、政府和学术界的关注和欢迎。随着无人机的快速发展和在民用空域的部署,无人机在不同的应用中发挥着重要作用,包括货物运送、搜救和交通监控。因此,通过无人机认证模型提供安全通信对于成功可靠的飞行任务是必要的。为了满足这些要求,文献中已经提出了许多认证机制。然而,文献中缺乏对这些解决方案的安全性和性能进行全面评估的研究。在本文中,我们通过考虑十个不同的关键度量来分析最近27个无人机认证工作的安全性和性能。首先,在性能分析中,我们表明大多数无人机认证方案在通信成本方面都是轻量级的。然而,许多认证研究并没有报告存储开销或能量消耗。然后,我们在安全分析中揭示了广泛使用的形式模型(即通过数学模型对认证协议的抽象描述),而大多数研究都缺乏对许多可能针对无人机系统的攻击的覆盖。之后,我们强调了需要解决的挑战,以便设计和实施安全可靠的无人机身份验证方案。最后,我们总结了无人机认证策略的经验教训,为进一步研究提供了有希望的方向。
{"title":"A comprehensive security and performance assessment of UAV authentication schemes","authors":"Yassine Mekdad, Ahmet Aris, Abbas Acar, M. Conti, R. Lazzeretti, A. E. Fergougui, Selcuk Uluagac","doi":"10.1002/spy2.338","DOIUrl":"https://doi.org/10.1002/spy2.338","url":null,"abstract":"In the past few years, unmanned aerial vehicles (UAVs) have significantly gained attention and popularity from industry, government, and academia. With their rapid development and deployment into the civilian airspace, UAVs play an important role in different applications, including goods delivery, search‐and‐rescue, and traffic monitoring. Therefore, providing secure communication through authentication models for UAVs is necessary for a successful and reliable flight mission. To satisfy such requirements, numerous authentication mechanisms have been proposed in the literature. However, the literature lacks a comprehensive study evaluating the security and performance of these solutions. In this article, we analyze the security and performance of 27 recent UAV authentication works by considering ten different key metrics. First, in the performance analysis, we show that the majority of UAV authentication schemes are lightweight in their communication cost. However, the storage overhead or the energy consumption is not reported by many authentication studies. Then, we reveal in the security analysis the widely employed formal models (i.e., abstract description of an authentication protocol through a mathematical model), while most of the studies lack coverage of many attacks that can target UAV systems. Afterwards, we highlight the challenges that need to be addressed in order to design and implement secure and reliable UAV authentication schemes. Finally, we summarize the lessons learned on the authentication strategies for UAVs to motivate promising direction for further research.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48708424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions 释放SDN和GNN在网络异常检测方面的力量:最新技术、挑战和未来方向
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-30 DOI: 10.1002/spy2.337
Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, S. Tanwar, Ravi Sharma, Amit Verma
{"title":"Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions","authors":"Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, S. Tanwar, Ravi Sharma, Amit Verma","doi":"10.1002/spy2.337","DOIUrl":"https://doi.org/10.1002/spy2.337","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41493150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocation 基于属性的加密方案,用于云中的安全数据共享,具有细粒度撤销
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-18 DOI: 10.1002/spy2.336
Md. Azharul Islam, S. Madria
{"title":"Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocation","authors":"Md. Azharul Islam, S. Madria","doi":"10.1002/spy2.336","DOIUrl":"https://doi.org/10.1002/spy2.336","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42690533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks 基于物联网传感器网络中多因素和多网关的鲁棒安全用户身份验证方案
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-11 DOI: 10.1002/spy2.335
Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, S. S. Gill
{"title":"A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks","authors":"Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, S. S. Gill","doi":"10.1002/spy2.335","DOIUrl":"https://doi.org/10.1002/spy2.335","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48091623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal key pre‐distribution schemes from affine resolvable and partially affine resolvable designs 从仿射可解析和部分仿射可解析设计的最优密钥预分配方案
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-09 DOI: 10.1002/spy2.334
Shyam Saurabh, K. Sinha
{"title":"Optimal key pre‐distribution schemes from affine resolvable and partially affine resolvable designs","authors":"Shyam Saurabh, K. Sinha","doi":"10.1002/spy2.334","DOIUrl":"https://doi.org/10.1002/spy2.334","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44578636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issue Information 问题信息
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-01 DOI: 10.1002/spy2.244
{"title":"Issue Information","authors":"","doi":"10.1002/spy2.244","DOIUrl":"https://doi.org/10.1002/spy2.244","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44306315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preserving vaccinating‐ and testing‐pass for the European Union 欧盟隐私保护疫苗接种和检测通行证
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-24 DOI: 10.1002/spy2.332
Dominik Schrahe, Thomas Städter
{"title":"Privacy preserving vaccinating‐ and testing‐pass for the European Union","authors":"Dominik Schrahe, Thomas Städter","doi":"10.1002/spy2.332","DOIUrl":"https://doi.org/10.1002/spy2.332","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41734211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P‐DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities P‐DNN:用于检测物联网漏洞的基于并行DNN的IDS框架
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-22 DOI: 10.1002/spy2.330
Sharmila B S, Rohini Nagapadma
{"title":"P‐DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities","authors":"Sharmila B S, Rohini Nagapadma","doi":"10.1002/spy2.330","DOIUrl":"https://doi.org/10.1002/spy2.330","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43837002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preserving content distribution framework for multidistributor DRM systems 多地区DRM系统的隐私保护内容分发框架
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-15 DOI: 10.1002/spy2.327
Ankita Mishra, M. Obaidat, D. Mishra
{"title":"Privacy preserving content distribution framework for multidistributor DRM systems","authors":"Ankita Mishra, M. Obaidat, D. Mishra","doi":"10.1002/spy2.327","DOIUrl":"https://doi.org/10.1002/spy2.327","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43612510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFPM: A RSU‐aided framework for pseudonym management to preserve location privacy in IoV RFPM:一个RSU辅助的网际网路中保护位置隐私的假名管理框架
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-13 DOI: 10.1002/spy2.329
Indu Kumari, P. Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, D. Rawat
{"title":"RFPM: A RSU‐aided framework for pseudonym management to preserve location privacy in IoV","authors":"Indu Kumari, P. Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, D. Rawat","doi":"10.1002/spy2.329","DOIUrl":"https://doi.org/10.1002/spy2.329","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45178379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1