首页 > 最新文献

Security and Privacy最新文献

英文 中文
Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review 医疗物联网的安全与隐私挑战、问题和增强技术:系统综述
IF 1.9 Pub Date : 2024-05-07 DOI: 10.1002/spy2.409
Rizwan Uz Zaman Wani, Fursan Thabit, Ozgu Can
The Internet of Things (IoT) is a rapidly expanding network of interconnected things that use embedded sensors to gather and share data in real‐time. IoT technologies have given rise to many networking applications in our everyday life such as smart homes, smart cities, smart transport, and so forth. Smart healthcare is one such application that has been revolutionized by the IoT, introducing a new branch of IoT known as the Internet of Medical Things (IoMT). IoMT encompasses an entire ecosystem consisting of smart wearable, implantable sensing equipment's or devices, transmitters that are critical for monitoring the patients remotely and continuing the real‐time and has opened the door to new innovative smart healthcare approaches while improving patient care outcomes. IoMT wearable and embedded sensing devices are commonly utilized in smart healthcare to capture medical data and transmit the medical data in a communication network stored in the cloud. The large volume of data generated and transmitted by these IoMT devices is rising at an exponential rate, resulting in an increase in security and privacy vulnerabilities of healthcare data. To ensure the Confidentiality and integrity of the IoMT devices and the sensitive medical data, there should be proper security and privacy measures such as access control, passwords, multifactor authentication, and encryption of data generated, transmitted, or processed in the IoMT framework. In this paper, we identified the internet of things and its applications in smart healthcare systems. Additionally, the paper focuses on the architecture of IoMT, and several challenges, including the IoMT security and privacy requirements, and attack taxonomy. Furthermore, the paper thoroughly investigates both cryptographic and non‐cryptographic based security and privacy‐enhancing techniques for IoMT or healthcare systems with particular emphasis on advancements in key areas such as Homomorphic Encryption, Differential Privacy, and Federated Learning.
物联网(IoT)是一个迅速扩展的互联物网络,它使用嵌入式传感器实时收集和共享数据。物联网技术为我们的日常生活带来了许多联网应用,如智能家居、智能城市、智能交通等。智能医疗就是这样一种被物联网彻底改变的应用,它引入了一个新的物联网分支,即医疗物联网(IoMT)。IoMT 包含由智能可穿戴、植入式传感设备或装置、发射器组成的整个生态系统,这些设备和装置对远程和持续实时监控病人至关重要,为创新的智能医疗方法打开了大门,同时改善了病人的护理效果。IoMT 可穿戴和嵌入式传感设备通常用于智能医疗保健,以捕获医疗数据并将医疗数据传输到存储在云中的通信网络。这些 IoMT 设备生成和传输的大量数据正以指数级速度增长,导致医疗数据的安全和隐私漏洞增加。为确保 IoMT 设备和敏感医疗数据的机密性和完整性,应采取适当的安全和隐私措施,如访问控制、密码、多因素身份验证,以及对 IoMT 框架中生成、传输或处理的数据进行加密。在本文中,我们确定了物联网及其在智能医疗系统中的应用。此外,本文还重点介绍了 IoMT 的架构和面临的几项挑战,包括 IoMT 的安全和隐私要求以及攻击分类。此外,本文还深入研究了基于加密和非加密的 IoMT 或医疗保健系统安全和隐私增强技术,并特别强调了同态加密、差分隐私和联合学习等关键领域的进展。
{"title":"Security and privacy challenges, issues, and enhancing techniques for Internet of Medical Things: A systematic review","authors":"Rizwan Uz Zaman Wani, Fursan Thabit, Ozgu Can","doi":"10.1002/spy2.409","DOIUrl":"https://doi.org/10.1002/spy2.409","url":null,"abstract":"The Internet of Things (IoT) is a rapidly expanding network of interconnected things that use embedded sensors to gather and share data in real‐time. IoT technologies have given rise to many networking applications in our everyday life such as smart homes, smart cities, smart transport, and so forth. Smart healthcare is one such application that has been revolutionized by the IoT, introducing a new branch of IoT known as the Internet of Medical Things (IoMT). IoMT encompasses an entire ecosystem consisting of smart wearable, implantable sensing equipment's or devices, transmitters that are critical for monitoring the patients remotely and continuing the real‐time and has opened the door to new innovative smart healthcare approaches while improving patient care outcomes. IoMT wearable and embedded sensing devices are commonly utilized in smart healthcare to capture medical data and transmit the medical data in a communication network stored in the cloud. The large volume of data generated and transmitted by these IoMT devices is rising at an exponential rate, resulting in an increase in security and privacy vulnerabilities of healthcare data. To ensure the Confidentiality and integrity of the IoMT devices and the sensitive medical data, there should be proper security and privacy measures such as access control, passwords, multifactor authentication, and encryption of data generated, transmitted, or processed in the IoMT framework. In this paper, we identified the internet of things and its applications in smart healthcare systems. Additionally, the paper focuses on the architecture of IoMT, and several challenges, including the IoMT security and privacy requirements, and attack taxonomy. Furthermore, the paper thoroughly investigates both cryptographic and non‐cryptographic based security and privacy‐enhancing techniques for IoMT or healthcare systems with particular emphasis on advancements in key areas such as Homomorphic Encryption, Differential Privacy, and Federated Learning.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141004165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linguistic response surface methodology approach to measure the quality of nonlinear frame‐pixel and bit place‐based video steganography 测量基于帧-像素和位-位置的非线性视频隐写术质量的语言响应面方法
IF 1.9 Pub Date : 2024-05-07 DOI: 10.1002/spy2.397
Sabyasachi Samanta, Sudipta Roy, Abhijit Sarkar, D. Jana
Steganography refers to the practice of hiding sensitive information inside seemingly unrelated data sets. Steganography in the video is one of the best methods available for hiding data without compromising the film's appearance. For improved security and compatibility, the traditional system uses different video steganography techniques with linear or precise positions. Traditional linear video steganography practices face vulnerability, a lack of security, limited embedding options, and inadequate compatibility. Here nonlinear frame(s) and pixel positions based information hiding techniques have been developed to overwhelm the following. Both the nonlinear frame positions and nonlinear pixel positions are selected for the video‐based steganography. In the beginning, the nonlinear frame positions are selected through the key and the key may be with any prescribed range and alphanumeric characters. A single or more frames may be selected through the key and that entirely depends upon the corresponding run‐through. Then the nonlinear pixel and bit positions are also selected through a similar key. The proposed method is also compared with some former techniques and gives a magnificent result. Furthermore, a security analysis of the suggested algorithm has also been conducted using the differential attack method. To validate the suggested method and ensure that it is accurate, the author of this article made use of a very specific and innovative methodology known as the linguistic response surface methodology (LRSM). This model is framed based on achieving a few steganography assessment measures like PSNR, SSIM, and MSE metric values after incorporating hidden text in various nonlinear frames' nonlinear pixel locations of the video. The analysis of the variance using LRSM for PSNR, SSIM, and MSE response reveals very substantial results with confirmation.
隐写术是指将敏感信息隐藏在看似无关的数据集中的做法。视频中的隐写术是在不影响影片外观的情况下隐藏数据的最佳方法之一。为了提高安全性和兼容性,传统系统采用线性或精确定位的不同视频隐写技术。传统的线性视频隐写术面临着脆弱性、缺乏安全性、嵌入选项有限以及兼容性不足等问题。在此,我们开发了基于非线性帧和像素位置的信息隐藏技术,以克服以下问题。基于视频的隐写术选择了非线性帧位置和非线性像素位置。首先,通过密钥选择非线性帧位置,密钥可以是任意规定范围的字母数字字符。可以通过密钥选择单个或多个帧,这完全取决于相应的运行过程。然后,非线性像素和比特位置也通过类似的键来选择。我们还将所提出的方法与之前的一些技术进行了比较,并得出了很好的结果。此外,还使用差分攻击方法对建议算法进行了安全分析。为了验证所建议的方法并确保其准确性,本文作者使用了一种非常特殊和创新的方法,即语言响应面方法(LRSM)。该模型的框架是在视频的各种非线性帧的非线性像素位置中加入隐藏文本后,实现一些隐写术评估指标,如 PSNR、SSIM 和 MSE 指标值。利用 LRSM 对 PSNR、SSIM 和 MSE 响应进行的方差分析显示了非常可观的结果,并得到了证实。
{"title":"Linguistic response surface methodology approach to measure the quality of nonlinear frame‐pixel and bit place‐based video steganography","authors":"Sabyasachi Samanta, Sudipta Roy, Abhijit Sarkar, D. Jana","doi":"10.1002/spy2.397","DOIUrl":"https://doi.org/10.1002/spy2.397","url":null,"abstract":"Steganography refers to the practice of hiding sensitive information inside seemingly unrelated data sets. Steganography in the video is one of the best methods available for hiding data without compromising the film's appearance. For improved security and compatibility, the traditional system uses different video steganography techniques with linear or precise positions. Traditional linear video steganography practices face vulnerability, a lack of security, limited embedding options, and inadequate compatibility. Here nonlinear frame(s) and pixel positions based information hiding techniques have been developed to overwhelm the following. Both the nonlinear frame positions and nonlinear pixel positions are selected for the video‐based steganography. In the beginning, the nonlinear frame positions are selected through the key and the key may be with any prescribed range and alphanumeric characters. A single or more frames may be selected through the key and that entirely depends upon the corresponding run‐through. Then the nonlinear pixel and bit positions are also selected through a similar key. The proposed method is also compared with some former techniques and gives a magnificent result. Furthermore, a security analysis of the suggested algorithm has also been conducted using the differential attack method. To validate the suggested method and ensure that it is accurate, the author of this article made use of a very specific and innovative methodology known as the linguistic response surface methodology (LRSM). This model is framed based on achieving a few steganography assessment measures like PSNR, SSIM, and MSE metric values after incorporating hidden text in various nonlinear frames' nonlinear pixel locations of the video. The analysis of the variance using LRSM for PSNR, SSIM, and MSE response reveals very substantial results with confirmation.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141005005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain‐based decentralized oracle network framework for identity management in metaverse environment 基于区块链的去中心化甲骨文网络框架,用于元宇宙环境中的身份管理
IF 1.9 Pub Date : 2024-05-06 DOI: 10.1002/spy2.414
Ankur Gupta, Rajesh Gupta, Keyaba Gohil, S. Tanwar, Deepak Garg
Managing identities in metaverse environment is challenging due to the conflicting requirements of ensuring user privacy while enforcing accountability. Users may participate in the metaverse through multiple virtual identities or avatars for different applications/scenarios. Thus, virtual identities must be continuously generated and mapped with real identities. Further, user privacy needs to be protected while not ensuring blanket anonymity to indulge in objectionable or unlawful conduct. Ensuring privacy for the metaverse while still being able to pinpoint users for their actions in the metaverse is a significant research issue. Solving the aforementioned issue, we propose a third‐party identity management solution for the metaverse based on creating a decentralized oracle network (DON) providing identity authentication and mapping service. The proposed identity management framework is metaverse platform agnostic, ensuring users' privacy on the platform while still being able to uncover their real identities if warranted. The proposed framework is viable as evidenced by experimental results of DON and blockchain implementation. The DON based framework leverage the benefits of blockchain technology and introduces immutability, transparency, and traceability into the the metaverse environment. This ensures data integrity and minimizes the frequency of cyber attacks in the metaverse ecosystem.
在元宇宙环境中管理身份具有挑战性,因为既要确保用户隐私,又要执行问责制,这两方面的要求相互冲突。用户可以通过多个虚拟身份或化身参与元宇宙的不同应用/场景。因此,虚拟身份必须不断生成并与真实身份进行映射。此外,用户的隐私需要得到保护,同时又不能确保完全匿名,以至于放纵不良或非法行为。既要确保元宇宙的隐私,又要能确定用户在元宇宙中的行为,这是一个重要的研究课题。为解决上述问题,我们提出了一种第三方元宇宙身份管理解决方案,该方案基于创建一个提供身份验证和映射服务的去中心化甲骨文网络(DON)。所提出的身份管理框架与元宇宙平台无关,既能确保用户在平台上的隐私,又能在必要时揭露用户的真实身份。DON 和区块链实施的实验结果证明,拟议框架是可行的。基于 DON 的框架充分利用了区块链技术的优势,并将不变性、透明度和可追溯性引入了元宇宙环境。这确保了数据的完整性,并将元宇宙生态系统中的网络攻击频率降至最低。
{"title":"Blockchain‐based decentralized oracle network framework for identity management in metaverse environment","authors":"Ankur Gupta, Rajesh Gupta, Keyaba Gohil, S. Tanwar, Deepak Garg","doi":"10.1002/spy2.414","DOIUrl":"https://doi.org/10.1002/spy2.414","url":null,"abstract":"Managing identities in metaverse environment is challenging due to the conflicting requirements of ensuring user privacy while enforcing accountability. Users may participate in the metaverse through multiple virtual identities or avatars for different applications/scenarios. Thus, virtual identities must be continuously generated and mapped with real identities. Further, user privacy needs to be protected while not ensuring blanket anonymity to indulge in objectionable or unlawful conduct. Ensuring privacy for the metaverse while still being able to pinpoint users for their actions in the metaverse is a significant research issue. Solving the aforementioned issue, we propose a third‐party identity management solution for the metaverse based on creating a decentralized oracle network (DON) providing identity authentication and mapping service. The proposed identity management framework is metaverse platform agnostic, ensuring users' privacy on the platform while still being able to uncover their real identities if warranted. The proposed framework is viable as evidenced by experimental results of DON and blockchain implementation. The DON based framework leverage the benefits of blockchain technology and introduces immutability, transparency, and traceability into the the metaverse environment. This ensures data integrity and minimizes the frequency of cyber attacks in the metaverse ecosystem.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141009210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequential fusion‐based defense strategy against sophisticated Byzantine attacks in cognitive IoT networks 基于序列融合的防御策略,抵御认知物联网网络中复杂的拜占庭攻击
IF 1.9 Pub Date : 2024-05-05 DOI: 10.1002/spy2.415
Flavien Donkeng Zemo, Sara Bakkali
5G and 6G promise to be catalysts for the Internet of Things (IoT), enabling ultra‐massive and mission‐critical IoT. The demands of new IoT applications and the large number of connected objects being announced will exacerbate the thorny issue of spectrum scarcity in wireless communications. Cognitive radio (CR) is a revolutionary technology that promises to mitigate the problem of spectrum scarcity through more efficient use of spectrum. Integrating CR into the IoT allows objects to opportunistically access spectrum resources already allocated to a Primary User (PU) without causing interference. Spectrum sensing (SS) allows objects to be aware of the PU's spectrum occupancy status. In radio environments where the PU signal is subject to multipath and shadowing effects that degrade the channel between the PU and objects, SS performed by a single object could be inaccurate and lead to incorrect decisions about the PU's status. Cooperative spectrum sensing (CSS) has been proposed to improve detection performance. However, this cooperation between objects has opened the way to a new form of attack known as the Spectrum Sensing Data Falsification (SSDF) or Byzantine attack. In a SSDF attack, attackers falsify their local sensing results before sharing them in the CSS. This attack is very harmful to the CSS and can lead to a loss of spectrum opportunities or interference with the PU. In this paper, from the attack point of view, a sophisticated Byzantine attack model that generalizes well the simple attack strategies has been proposed and allows an attacker to implement other attack strategies. From a defense point of view, a new and innovative Weighted Sequential Hypothesis Testing (WSPRT) scheme has been suggested. This ensures the security of the CSS while significantly reducing the average number of samples required for overall decision‐making in a very hostile IoT network. The results obtained from simulations carried out in various attacks scenarios show that the proposed secure CSS scheme requires at most six samples to detect the state of the PU without error when the proportion of attackers reaches 80%. This performance far exceeds that of other defense mechanisms such as classic WSPRT, SPRT, and majority rule, with which we have compared it under the same conditions. In general, for the classic WSPRT, SPRT, and majority rule mechanisms, the error rate starts to deteriorate at ratio 40% of attackers and the number of samples is greater than six and reaches 50.
5G 和 6G 有望成为物联网 (IoT) 的催化剂,实现超大规模和关键任务物联网。新的物联网应用需求和即将发布的大量联网对象将加剧无线通信中频谱稀缺的棘手问题。认知无线电(CR)是一项革命性技术,有望通过更有效地利用频谱来缓解频谱稀缺问题。将认知无线电技术整合到物联网中,可使物体在不造成干扰的情况下伺机访问已分配给主用户(PU)的频谱资源。通过频谱感知(SS),物体可以了解主用户的频谱占用状态。在无线电环境中,主用户(PU)信号会受到多径和阴影效应的影响,从而降低主用户(PU)和物体之间的信道质量,因此由单个物体执行的频谱感知可能不准确,并导致对主用户(PU)状态的错误判断。为了提高检测性能,有人提出了合作频谱传感(CSS)。然而,物体之间的这种合作为一种新的攻击形式开辟了道路,这种攻击被称为频谱传感数据伪造(SSDF)或拜占庭攻击。在 SSDF 攻击中,攻击者会在 CSS 中共享本地感测结果之前伪造这些结果。这种攻击对 CSS 非常有害,可能导致频谱机会损失或干扰 PU。本文从攻击的角度出发,提出了一种复杂的拜占庭攻击模型,它能很好地概括简单的攻击策略,并允许攻击者实施其他攻击策略。从防御角度来看,本文提出了一种创新的加权序列假设检验(WSPRT)方案。这既确保了 CSS 的安全性,又大大减少了在非常恶劣的物联网网络中进行整体决策所需的平均样本数量。在各种攻击场景下进行的模拟结果表明,当攻击者比例达到 80% 时,所提出的安全 CSS 方案最多需要 6 个样本就能无差错地检测出 PU 的状态。这一性能远远超过了我们在相同条件下与之进行比较的其他防御机制,如经典 WSPRT、SPRT 和多数规则。一般来说,对于经典的 WSPRT、SPRT 和多数规则机制,当攻击者比例达到 40%、样本数量大于 6 个并达到 50 个时,错误率就会开始下降。
{"title":"Sequential fusion‐based defense strategy against sophisticated Byzantine attacks in cognitive IoT networks","authors":"Flavien Donkeng Zemo, Sara Bakkali","doi":"10.1002/spy2.415","DOIUrl":"https://doi.org/10.1002/spy2.415","url":null,"abstract":"5G and 6G promise to be catalysts for the Internet of Things (IoT), enabling ultra‐massive and mission‐critical IoT. The demands of new IoT applications and the large number of connected objects being announced will exacerbate the thorny issue of spectrum scarcity in wireless communications. Cognitive radio (CR) is a revolutionary technology that promises to mitigate the problem of spectrum scarcity through more efficient use of spectrum. Integrating CR into the IoT allows objects to opportunistically access spectrum resources already allocated to a Primary User (PU) without causing interference. Spectrum sensing (SS) allows objects to be aware of the PU's spectrum occupancy status. In radio environments where the PU signal is subject to multipath and shadowing effects that degrade the channel between the PU and objects, SS performed by a single object could be inaccurate and lead to incorrect decisions about the PU's status. Cooperative spectrum sensing (CSS) has been proposed to improve detection performance. However, this cooperation between objects has opened the way to a new form of attack known as the Spectrum Sensing Data Falsification (SSDF) or Byzantine attack. In a SSDF attack, attackers falsify their local sensing results before sharing them in the CSS. This attack is very harmful to the CSS and can lead to a loss of spectrum opportunities or interference with the PU. In this paper, from the attack point of view, a sophisticated Byzantine attack model that generalizes well the simple attack strategies has been proposed and allows an attacker to implement other attack strategies. From a defense point of view, a new and innovative Weighted Sequential Hypothesis Testing (WSPRT) scheme has been suggested. This ensures the security of the CSS while significantly reducing the average number of samples required for overall decision‐making in a very hostile IoT network. The results obtained from simulations carried out in various attacks scenarios show that the proposed secure CSS scheme requires at most six samples to detect the state of the PU without error when the proportion of attackers reaches 80%. This performance far exceeds that of other defense mechanisms such as classic WSPRT, SPRT, and majority rule, with which we have compared it under the same conditions. In general, for the classic WSPRT, SPRT, and majority rule mechanisms, the error rate starts to deteriorate at ratio 40% of attackers and the number of samples is greater than six and reaches 50.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141012173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient provably secure authentication and key agreement protocol for satellite communication networks 用于卫星通信网络的高效、可证明安全的认证和密钥协议
IF 1.9 Pub Date : 2024-04-25 DOI: 10.1002/spy2.404
Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, Sunil Prajapat, Pankaj Kumar
The leverage of satellite resources to establish a communication network offers a wide range of benefits, including the capability to support news gathering, broadcasting, and aeronautical and maritime tracking. The unique aspects of the satellite‐linked terrestrial network provide high‐speed services, dependable and consistent network quality, and comprehensive geographic coverage of remote regions. Unfortunately, these structural features also render the network vulnerable to unauthorized intrusion, potentially leading to significant disruptions. Consequently, the implementation of authentication measures presents an appealing solution for enhancing the overall service quality of this network. Recently, Kumar et al. presented an authentication and key agreement scheme for satellite communications. Strikingly, their scheme proves inadequate in safeguarding against several malicious attacks and reveals certain design weaknesses. In this article, we present a reliable and secure authentication protocol that takes advantage of the complexities inherent in the elliptic curve discrete logarithm problem. We assess the protocol's effectiveness against various types of attacks using formal proof, Burrows–Abadi–Needham logic, informal descriptive proof analysis, and the verification tool SCYTHER. Furthermore, we compare the computational, communication, and storage overhead of our proposed protocol to an existing one, demonstrating its efficiency and superiority.
利用卫星资源建立通信网络具有广泛的优势,包括支持新闻收集、广播以及航空和航海跟踪的能力。卫星连接地面网络的独特之处在于它能提供高速服务、可靠稳定的网络质量以及对偏远地区的全面地理覆盖。遗憾的是,这些结构特征也使网络容易受到未经授权的入侵,可能导致严重的中断。因此,实施身份验证措施是提高该网络整体服务质量的一个有吸引力的解决方案。最近,Kumar 等人提出了一种用于卫星通信的验证和密钥协议方案。令人震惊的是,他们的方案被证明不足以抵御几种恶意攻击,并暴露出某些设计缺陷。在本文中,我们利用椭圆曲线离散对数问题固有的复杂性,提出了一种可靠、安全的认证协议。我们使用形式化证明、Burrows-Abadi-Needham 逻辑、非正式描述性证明分析和验证工具 SCYTHER 评估了该协议抵御各类攻击的有效性。此外,我们还比较了我们提出的协议与现有协议的计算、通信和存储开销,证明了其效率和优越性。
{"title":"An efficient provably secure authentication and key agreement protocol for satellite communication networks","authors":"Garima Thakur, Mohammad S. Obaidat, Piyush Sharma, Sunil Prajapat, Pankaj Kumar","doi":"10.1002/spy2.404","DOIUrl":"https://doi.org/10.1002/spy2.404","url":null,"abstract":"The leverage of satellite resources to establish a communication network offers a wide range of benefits, including the capability to support news gathering, broadcasting, and aeronautical and maritime tracking. The unique aspects of the satellite‐linked terrestrial network provide high‐speed services, dependable and consistent network quality, and comprehensive geographic coverage of remote regions. Unfortunately, these structural features also render the network vulnerable to unauthorized intrusion, potentially leading to significant disruptions. Consequently, the implementation of authentication measures presents an appealing solution for enhancing the overall service quality of this network. Recently, Kumar et al. presented an authentication and key agreement scheme for satellite communications. Strikingly, their scheme proves inadequate in safeguarding against several malicious attacks and reveals certain design weaknesses. In this article, we present a reliable and secure authentication protocol that takes advantage of the complexities inherent in the elliptic curve discrete logarithm problem. We assess the protocol's effectiveness against various types of attacks using formal proof, Burrows–Abadi–Needham logic, informal descriptive proof analysis, and the verification tool SCYTHER. Furthermore, we compare the computational, communication, and storage overhead of our proposed protocol to an existing one, demonstrating its efficiency and superiority.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140655698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real‐time cloud datasets 集合随机森林和深度卷积神经网络检测近实时云数据集中的多重入侵并对其进行分类
IF 1.9 Pub Date : 2024-04-25 DOI: 10.1002/spy2.408
Minhaj Khan, Mohd. Haroon
Due to rapidly growing Internet facilities, intruders can steal and misuse the data saved and stored digitally. In this case, securing digital data is challenging but prominent for various purposes. However, the traditional techniques are insufficient to secure these computer networks and cloud information with a 100% success rate. Recently, machine‐ or deep‐learning‐enabled methods have been used to secure network information, but with some limits. Therefore, the study emphasizes detecting and classifying network intrusion using the proposed ensemble and deep learning models. In this case, we developed the ensemble learning‐enabled random forest algorithm and deep learning‐enabled deep convolutional neural network (CNN) models for securing near real‐time cloud information and designed the intrusion detection system accordingly. The complex and high‐volume CSE‐CICIDS2018 datasets were used to test the developed model in Python programming language implemented with several Python libraries. The outcome of the proposed models indicates that the developed models are promising in securing the cloud information with 97.73% and 99.91% accuracies via ensemble‐random forest and deep CNN models. Thus, the present study models can be applied to other real‐time datasets and computer networks to detect cyber threats effectively.
由于互联网设施发展迅速,入侵者可以窃取和滥用以数字方式保存和存储的数据。在这种情况下,确保数字数据的安全具有挑战性,但在各种用途中却非常突出。然而,传统技术并不足以确保这些计算机网络和云信息的安全,而且成功率也无法达到 100%。最近,机器学习或深度学习方法被用于保护网络信息安全,但也有一些局限性。因此,本研究强调使用建议的集合和深度学习模型检测网络入侵并对其进行分类。在这种情况下,我们开发了支持集合学习的随机森林算法和支持深度学习的深度卷积神经网络(CNN)模型,用于确保近实时云信息的安全,并设计了相应的入侵检测系统。我们利用复杂、高容量的 CSE-CICIDS2018 数据集,通过多个 Python 库使用 Python 编程语言对所开发的模型进行了测试。结果表明,通过集合随机森林模型和深度 CNN 模型,所开发的模型在保护云信息安全方面具有良好的前景,准确率分别达到 97.73% 和 99.91%。因此,本研究的模型可应用于其他实时数据集和计算机网络,以有效检测网络威胁。
{"title":"Ensemble random forest and deep convolutional neural networks in detecting and classifying the multiple intrusions from near real‐time cloud datasets","authors":"Minhaj Khan, Mohd. Haroon","doi":"10.1002/spy2.408","DOIUrl":"https://doi.org/10.1002/spy2.408","url":null,"abstract":"Due to rapidly growing Internet facilities, intruders can steal and misuse the data saved and stored digitally. In this case, securing digital data is challenging but prominent for various purposes. However, the traditional techniques are insufficient to secure these computer networks and cloud information with a 100% success rate. Recently, machine‐ or deep‐learning‐enabled methods have been used to secure network information, but with some limits. Therefore, the study emphasizes detecting and classifying network intrusion using the proposed ensemble and deep learning models. In this case, we developed the ensemble learning‐enabled random forest algorithm and deep learning‐enabled deep convolutional neural network (CNN) models for securing near real‐time cloud information and designed the intrusion detection system accordingly. The complex and high‐volume CSE‐CICIDS2018 datasets were used to test the developed model in Python programming language implemented with several Python libraries. The outcome of the proposed models indicates that the developed models are promising in securing the cloud information with 97.73% and 99.91% accuracies via ensemble‐random forest and deep CNN models. Thus, the present study models can be applied to other real‐time datasets and computer networks to detect cyber threats effectively.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140658664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach 基于转换器的改进模型,用于检测网络钓鱼、垃圾邮件和火腿肠邮件:大语言模型方法
IF 1.9 Pub Date : 2024-04-24 DOI: 10.1002/spy2.402
Suhaima Jamal, H. Wimmer, Iqbal H. Sarker
Phishing and spam have been a cybersecurity threat with the majority of breaches resulting from these types of social engineering attacks. Therefore, detection has been a long‐standing challenge for both academic and industry researcher. New and innovative approaches are required to keep up with the growing sophistication of threat actors. One such illumination which has vast potential are large language models (LLM). LLM emerged and already demonstrated their potential to transform society and provide new and innovative approaches to solve well‐established challenges. Phishing and spam have caused financial hardships and lost time and resources to email users all over the world and frequently serve as an entry point for ransomware threat actors. While detection approaches exist, especially heuristic‐based approaches, LLMs offer the potential to venture into a new unexplored area for understanding and solving this challenge. LLMs have rapidly altered the landscape from business, consumers, and throughout academia and demonstrate transformational potential to profoundly impact the society. Based on this, applying these new and innovative approaches to email detection is a rational next step in academic research. In this work, we present IPSDM, an improved phishing spam detection model based on fine‐tuning the BERT family of models to specifically detect phishing and spam emails. We demonstrate our fine‐tuned version, IPSDM, is able to better classify emails in both unbalanced and balanced datasets. Moreover, IPSDM consistently outperforms the baseline models in terms of classification accuracy, precision, recall, and F1‐score, while concurrently mitigating overfitting concerns.
网络钓鱼和垃圾邮件一直是网络安全的威胁,大多数漏洞都是由这类社会工程学攻击造成的。因此,检测一直是学术界和行业研究人员面临的长期挑战。我们需要新的创新方法来应对日益复杂的威胁行为。大型语言模型(LLM)就是这样一种具有巨大潜力的照明设备。LLM 的出现已经证明了其改变社会的潜力,并为解决既定挑战提供了新的创新方法。网络钓鱼和垃圾邮件给世界各地的电子邮件用户造成了经济困难、时间和资源损失,并经常成为勒索软件威胁行为者的切入点。虽然存在一些检测方法,特别是基于启发式的方法,但 LLM 为了解和解决这一挑战提供了进入一个新的未开发领域的可能性。LLM 已迅速改变了企业、消费者和整个学术界的格局,并展现出深刻影响社会的变革潜力。在此基础上,将这些新的创新方法应用于电子邮件检测是学术研究的下一个合理步骤。在这项工作中,我们介绍了 IPSDM,这是一种改进的网络钓鱼垃圾邮件检测模型,它基于对 BERT 系列模型的微调,能够专门检测网络钓鱼和垃圾邮件。我们证明,我们的微调版本 IPSDM 能够在不平衡和平衡数据集中更好地对电子邮件进行分类。此外,IPSDM 在分类准确度、精确度、召回率和 F1 分数方面始终优于基线模型,同时还减轻了过拟合问题。
{"title":"An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach","authors":"Suhaima Jamal, H. Wimmer, Iqbal H. Sarker","doi":"10.1002/spy2.402","DOIUrl":"https://doi.org/10.1002/spy2.402","url":null,"abstract":"Phishing and spam have been a cybersecurity threat with the majority of breaches resulting from these types of social engineering attacks. Therefore, detection has been a long‐standing challenge for both academic and industry researcher. New and innovative approaches are required to keep up with the growing sophistication of threat actors. One such illumination which has vast potential are large language models (LLM). LLM emerged and already demonstrated their potential to transform society and provide new and innovative approaches to solve well‐established challenges. Phishing and spam have caused financial hardships and lost time and resources to email users all over the world and frequently serve as an entry point for ransomware threat actors. While detection approaches exist, especially heuristic‐based approaches, LLMs offer the potential to venture into a new unexplored area for understanding and solving this challenge. LLMs have rapidly altered the landscape from business, consumers, and throughout academia and demonstrate transformational potential to profoundly impact the society. Based on this, applying these new and innovative approaches to email detection is a rational next step in academic research. In this work, we present IPSDM, an improved phishing spam detection model based on fine‐tuning the BERT family of models to specifically detect phishing and spam emails. We demonstrate our fine‐tuned version, IPSDM, is able to better classify emails in both unbalanced and balanced datasets. Moreover, IPSDM consistently outperforms the baseline models in terms of classification accuracy, precision, recall, and F1‐score, while concurrently mitigating overfitting concerns.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140658959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SAFe‐Health: Guarding federated learning‐driven smart healthcare with federated defense averaging against data poisoning SAFe-Health:用联盟防御平均法防范数据中毒,保护联盟学习驱动的智能医疗保健
IF 1.9 Pub Date : 2024-04-21 DOI: 10.1002/spy2.403
Bhabesh Mali, P. Singh, Nabajyoti Mazumdar
Federated learning (FL) serves as a decentralized training framework for machine learning (ML) models, preserving data privacy in critical domains such as smart healthcare. However, it has been found that attackers can exploit this decentralized learning framework to perform data and model poisoning attacks, specifically in FL‐driven smart healthcare. This work delves into the realm of FL‐driven smart healthcare systems, consisting of multiple hospitals based architecture and focusing on heart disease detection using FL. We carry out data poisoning attacks, using two different attacking methods, label flipping attack and input data/feature manipulation attack to demonstrate that such FL‐driven smart healthcare systems are vulnerable to attacks. To guard the system against such attack, we propose a novel federated averaging defense mechanism to stop the identified poisoned clients in weight aggregation. This mechanism effectively detects and thwarts data poisoning attempts by identifying compromised clients during weight aggregation. The proposed mechanism is based on the idea of weighted averaging, where each client's contribution is weighted according to its trustworthiness. The proposed work addresses a critical gap in the literature by focusing on the often‐overlooked issue of poisoning attacks in tabular text datasets, which are crucial to the smart healthcare system. We conduct the testbed‐based experiment to demonstrate that the proposed mechanism is effectively detecting and mitigating data poisoning attacks in selected FL‐driven smart healthcare scenarios, while maintaining high accuracy and convergence rates.
联合学习(FL)是机器学习(ML)模型的分散式训练框架,可保护智能医疗等关键领域的数据隐私。然而,人们发现,攻击者可以利用这种分散学习框架进行数据和模型中毒攻击,特别是在 FL 驱动的智能医疗保健领域。这项工作深入研究了 FL 驱动的智能医疗系统领域,该系统由基于架构的多家医院组成,重点是使用 FL 进行心脏病检测。我们使用标签翻转攻击和输入数据/特征篡改攻击这两种不同的攻击方法进行数据中毒攻击,以证明这种 FL 驱动的智能医疗系统容易受到攻击。为防范此类攻击,我们提出了一种新颖的联合平均防御机制,以阻止在权重聚合中识别出的中毒客户端。该机制通过识别权重聚合过程中被攻击的客户端,有效检测并挫败数据中毒企图。所提出的机制基于加权平均的理念,即根据每个客户端的可信度对其贡献进行加权。我们提出的工作解决了文献中的一个重要空白,重点关注表格文本数据集中经常被忽视的中毒攻击问题,这对智能医疗系统至关重要。我们进行了基于试验台的实验,证明所提出的机制能在选定的 FL 驱动的智能医疗场景中有效地检测和缓解数据中毒攻击,同时保持较高的准确率和收敛率。
{"title":"SAFe‐Health: Guarding federated learning‐driven smart healthcare with federated defense averaging against data poisoning","authors":"Bhabesh Mali, P. Singh, Nabajyoti Mazumdar","doi":"10.1002/spy2.403","DOIUrl":"https://doi.org/10.1002/spy2.403","url":null,"abstract":"Federated learning (FL) serves as a decentralized training framework for machine learning (ML) models, preserving data privacy in critical domains such as smart healthcare. However, it has been found that attackers can exploit this decentralized learning framework to perform data and model poisoning attacks, specifically in FL‐driven smart healthcare. This work delves into the realm of FL‐driven smart healthcare systems, consisting of multiple hospitals based architecture and focusing on heart disease detection using FL. We carry out data poisoning attacks, using two different attacking methods, label flipping attack and input data/feature manipulation attack to demonstrate that such FL‐driven smart healthcare systems are vulnerable to attacks. To guard the system against such attack, we propose a novel federated averaging defense mechanism to stop the identified poisoned clients in weight aggregation. This mechanism effectively detects and thwarts data poisoning attempts by identifying compromised clients during weight aggregation. The proposed mechanism is based on the idea of weighted averaging, where each client's contribution is weighted according to its trustworthiness. The proposed work addresses a critical gap in the literature by focusing on the often‐overlooked issue of poisoning attacks in tabular text datasets, which are crucial to the smart healthcare system. We conduct the testbed‐based experiment to demonstrate that the proposed mechanism is effectively detecting and mitigating data poisoning attacks in selected FL‐driven smart healthcare scenarios, while maintaining high accuracy and convergence rates.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140679007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum encryption of healthcare images: Enhancing security and confidentiality in e‐health systems 医疗图像的量子加密:增强电子医疗系统的安全性和保密性
IF 1.9 Pub Date : 2024-04-18 DOI: 10.1002/spy2.391
Ahmed J. Kadhim, T. S. Atia
Ensuring the security and privacy of patient data in e‐healthcare systems that rely on cloud computation is of utmost importance. Traditional encryption is no longer resistant to quantum attacks and safeguards sensitive medical images. To tackle this issue, robust security countermeasures are proposed by integrating quantum encryption with a cloud‐based healthcare system. The encryption scheme utilizes the Generalized Novel Enhancement Quantum Representation (GNEQR) and the Novel Enhancement Quantum Representation (NEQR) to provide a framework for representing color and grayscale healthcare images. The proposed quantum algorithm uses quantum logic for image scrambling, which is combined with the encryption key by the Xor quantum gate. The encryption key is generated by 9D chaotic and permutated before encryption. Finally, channel re‐ordering is applied for color images. The simulation results for 15 medical tests with an encryption key space >2600 on a developed e‐healthcare system demonstrate the effectiveness and reliability of the proposed work where the average number of pixels change rates was 99.82, while the unified average change intensity rate was 33.51, entropy was 7.9, the horizontal, vertical, and diagonal correlation coefficients averaged 0.000533333, 0.000706667, and 0.00076, respectively. Finally, the mean squared error (MSE) between the original and encrypted images was 10203.72. These findings improve digital healthcare by revealing the solutions' performance, security, and efficacy.
在依赖云计算的电子医疗系统中,确保患者数据的安全性和隐私性至关重要。传统加密技术已无法抵御量子攻击,也无法保护敏感的医疗图像。为解决这一问题,我们提出了将量子加密与云医疗系统相结合的稳健安全对策。该加密方案利用广义新增强量子表示法(GNEQR)和新增强量子表示法(NEQR)来提供表示彩色和灰度医疗图像的框架。拟议的量子算法使用量子逻辑进行图像加扰,并通过 Xor 量子门与加密密钥相结合。加密密钥由 9D 混沌生成,并在加密前进行置换。最后,对彩色图像进行信道重排序。在一个已开发的电子医疗系统上对加密密钥空间大于 2600 的 15 个医疗测试进行的仿真结果表明了所提工作的有效性和可靠性,其中像素的平均变化率为 99.82,而统一平均变化强度率为 33.51,熵为 7.9,水平、垂直和对角线相关系数的平均值分别为 0.000533333、0.000706667 和 0.00076。最后,原始图像和加密图像之间的均方误差(MSE)为 10203.72。这些发现揭示了解决方案的性能、安全性和有效性,从而改善了数字医疗保健。
{"title":"Quantum encryption of healthcare images: Enhancing security and confidentiality in e‐health systems","authors":"Ahmed J. Kadhim, T. S. Atia","doi":"10.1002/spy2.391","DOIUrl":"https://doi.org/10.1002/spy2.391","url":null,"abstract":"Ensuring the security and privacy of patient data in e‐healthcare systems that rely on cloud computation is of utmost importance. Traditional encryption is no longer resistant to quantum attacks and safeguards sensitive medical images. To tackle this issue, robust security countermeasures are proposed by integrating quantum encryption with a cloud‐based healthcare system. The encryption scheme utilizes the Generalized Novel Enhancement Quantum Representation (GNEQR) and the Novel Enhancement Quantum Representation (NEQR) to provide a framework for representing color and grayscale healthcare images. The proposed quantum algorithm uses quantum logic for image scrambling, which is combined with the encryption key by the Xor quantum gate. The encryption key is generated by 9D chaotic and permutated before encryption. Finally, channel re‐ordering is applied for color images. The simulation results for 15 medical tests with an encryption key space >2600 on a developed e‐healthcare system demonstrate the effectiveness and reliability of the proposed work where the average number of pixels change rates was 99.82, while the unified average change intensity rate was 33.51, entropy was 7.9, the horizontal, vertical, and diagonal correlation coefficients averaged 0.000533333, 0.000706667, and 0.00076, respectively. Finally, the mean squared error (MSE) between the original and encrypted images was 10203.72. These findings improve digital healthcare by revealing the solutions' performance, security, and efficacy.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140687119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system 面向物联网冷库监控系统的人工智能/ML 驱动型入侵检测框架
IF 1.9 Pub Date : 2024-04-18 DOI: 10.1002/spy2.400
M. Prasad, Pankaj Pal, Sachin Tripathi, Keshav P. Dahal
An IoT‐based monitoring system remotely controls and manages intelligent environments. Due to wireless communication, deployed sensor nodes are more vulnerable to attacks. An intrusion detection system is an efficient mechanism to detect malicious traffic and prevent abnormal activities. This article suggests an intrusion detection framework for the cold storage monitoring system. The temperature is the main parameter that affects the environment and harms stored products. A malicious node injects false data that manipulates temperature and forwards manipulated data. It also floods the data to neighbor nodes. In this work, data are generated and collected for intrusion detection. Two machine learning techniques have been applied: supervised learning (Bayesian rough set) and unsupervised learning (micro‐clustering). The proposed method shows better performance than existing methods.
基于物联网的监控系统可远程控制和管理智能环境。由于采用无线通信,部署的传感器节点更容易受到攻击。入侵检测系统是检测恶意流量和防止异常活动的有效机制。本文为冷库监控系统提出了一种入侵检测框架。温度是影响环境和损害存储产品的主要参数。恶意节点会注入操纵温度的虚假数据,并转发被操纵的数据。它还会将数据泛滥到邻近节点。在这项工作中,生成并收集了用于入侵检测的数据。应用了两种机器学习技术:有监督学习(贝叶斯粗糙集)和无监督学习(微聚类)。与现有方法相比,所提出的方法显示出更好的性能。
{"title":"AI/ML driven intrusion detection framework for IoT enabled cold storage monitoring system","authors":"M. Prasad, Pankaj Pal, Sachin Tripathi, Keshav P. Dahal","doi":"10.1002/spy2.400","DOIUrl":"https://doi.org/10.1002/spy2.400","url":null,"abstract":"An IoT‐based monitoring system remotely controls and manages intelligent environments. Due to wireless communication, deployed sensor nodes are more vulnerable to attacks. An intrusion detection system is an efficient mechanism to detect malicious traffic and prevent abnormal activities. This article suggests an intrusion detection framework for the cold storage monitoring system. The temperature is the main parameter that affects the environment and harms stored products. A malicious node injects false data that manipulates temperature and forwards manipulated data. It also floods the data to neighbor nodes. In this work, data are generated and collected for intrusion detection. Two machine learning techniques have been applied: supervised learning (Bayesian rough set) and unsupervised learning (micro‐clustering). The proposed method shows better performance than existing methods.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140686016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1