首页 > 最新文献

Security and Privacy最新文献

英文 中文
Intelligent jamming detection‐based robust principal components analysis in communication system for security and defense 基于鲁棒主成分分析的智能干扰检测在通信系统中的安全与防御
IF 1.9 Pub Date : 2024-04-15 DOI: 10.1002/spy2.399
Ahmed Moumena, Imane Saim Haddache
Threats to physical layer security from jamming attacks make wireless cognitive communication systems vulnerable. Global Positioning System signal is vulnerable to these attacks. Over the last decade, several types of jamming detection techniques have been proposed, antijamming‐based classical and machine learning (ML) techniques. Most of these techniques are inefficient in detecting jammers. Thus, there is a great need for efficient and quickest jamming detection technique‐based classifier using receiver operating characteristic (ROC) curve for different threshold values with high accuracy. In this work, we compare the efficiency of the proposed orthogonal distance (OD) and score distance (SD) method‐based robust principal component analysis (PCA) in ML classification in detecting jamming signals. Two hypotheses are proposed to distinguish between the presence and absence attack problem. Using this compressed data matrix obtained from modulated wideband converter (MWC) structure via centralized cooperation directly as input of the proposed classifier combined‐based ROC curve for real‐time detection scenarios. The performance of this proposed algorithm‐based robust PCA was evaluated and compared using the detection anomaly rate (DAR%), and false alarm rate (FAR%), area under curve (AUC), and accuracy. The performance of obtained results is good.
干扰攻击对物理层安全的威胁使无线认知通信系统变得脆弱。全球定位系统信号很容易受到这些攻击。在过去十年中,已经提出了几种干扰检测技术,包括基于反干扰的经典技术和机器学习(ML)技术。这些技术在检测干扰器方面大多效率低下。因此,亟需基于干扰检测技术的高效、快速分类器,针对不同的阈值,使用接收器操作特征曲线(ROC)进行高精度检测。在这项工作中,我们比较了基于正交距离(OD)和分数距离(SD)方法的鲁棒主成分分析(PCA)在检测干扰信号的 ML 分类中的效率。提出了两种假设来区分存在和不存在攻击问题。将通过集中合作从调制宽带转换器(MWC)结构中获得的压缩数据矩阵直接作为建议的分类器的输入,结合基于实时检测场景的 ROC 曲线。使用检测异常率(DAR%)、误报率(FAR%)、曲线下面积(AUC)和准确率对所提出的基于鲁棒 PCA 算法的性能进行了评估和比较。所获得的结果性能良好。
{"title":"Intelligent jamming detection‐based robust principal components analysis in communication system for security and defense","authors":"Ahmed Moumena, Imane Saim Haddache","doi":"10.1002/spy2.399","DOIUrl":"https://doi.org/10.1002/spy2.399","url":null,"abstract":"Threats to physical layer security from jamming attacks make wireless cognitive communication systems vulnerable. Global Positioning System signal is vulnerable to these attacks. Over the last decade, several types of jamming detection techniques have been proposed, antijamming‐based classical and machine learning (ML) techniques. Most of these techniques are inefficient in detecting jammers. Thus, there is a great need for efficient and quickest jamming detection technique‐based classifier using receiver operating characteristic (ROC) curve for different threshold values with high accuracy. In this work, we compare the efficiency of the proposed orthogonal distance (OD) and score distance (SD) method‐based robust principal component analysis (PCA) in ML classification in detecting jamming signals. Two hypotheses are proposed to distinguish between the presence and absence attack problem. Using this compressed data matrix obtained from modulated wideband converter (MWC) structure via centralized cooperation directly as input of the proposed classifier combined‐based ROC curve for real‐time detection scenarios. The performance of this proposed algorithm‐based robust PCA was evaluated and compared using the detection anomaly rate (DAR%), and false alarm rate (FAR%), area under curve (AUC), and accuracy. The performance of obtained results is good.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140700117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain integration in big data: Review, vision, and opportunities 大数据中的区块链集成:回顾、愿景和机遇
IF 1.9 Pub Date : 2024-03-19 DOI: 10.1002/spy2.392
Vahid Bakhtiary, AmirMasoud Rahmani
Big data has attracted extensive attention from industries and universities during the past few years. Big data is crucial in many fields, such as business analytics, healthcare, the Internet of Things (IoT), smart home, supply chain, transportation, and fraud detection. Nevertheless, some challenges must be addressed, such as decentralization, integration, data sharing, privacy, and security. On the other hand, blockchain has numerous potential for improving big data services and applications because of its decentralized, verifiable, and anti‐tamper features. We apply the Systematic Literature Review (SLR) approach in this study to investigate blockchain integrity in big data and understand the different topics and significant areas already presented. This paper aims to analyze studies on blockchain integration in big data published between 2017 and 2022. A technical taxonomy is presented for blockchain integration into big data, including data storage, security, and applications based on the field of articles selected by the SLR method. Finally, the achievements and shortcomings of each study are discussed, and future research challenges and open issues related to blockchain integration in big data are highlighted.
在过去几年里,大数据引起了工业界和大学的广泛关注。大数据在许多领域都至关重要,如商业分析、医疗保健、物联网(IoT)、智能家居、供应链、交通和欺诈检测等。然而,必须应对一些挑战,如去中心化、整合、数据共享、隐私和安全。另一方面,区块链因其去中心化、可验证和防篡改的特点,在改善大数据服务和应用方面具有众多潜力。在本研究中,我们采用系统文献综述(SLR)方法来研究大数据中的区块链完整性,并了解已提出的不同主题和重要领域。本文旨在分析 2017 年至 2022 年间发表的有关大数据中区块链集成的研究。根据SLR法选取的文章领域,提出了区块链融入大数据的技术分类标准,包括数据存储、安全和应用。最后,讨论了每项研究的成就和不足,并强调了与区块链整合大数据相关的未来研究挑战和开放性问题。
{"title":"Blockchain integration in big data: Review, vision, and opportunities","authors":"Vahid Bakhtiary, AmirMasoud Rahmani","doi":"10.1002/spy2.392","DOIUrl":"https://doi.org/10.1002/spy2.392","url":null,"abstract":"Big data has attracted extensive attention from industries and universities during the past few years. Big data is crucial in many fields, such as business analytics, healthcare, the Internet of Things (IoT), smart home, supply chain, transportation, and fraud detection. Nevertheless, some challenges must be addressed, such as decentralization, integration, data sharing, privacy, and security. On the other hand, blockchain has numerous potential for improving big data services and applications because of its decentralized, verifiable, and anti‐tamper features. We apply the Systematic Literature Review (SLR) approach in this study to investigate blockchain integrity in big data and understand the different topics and significant areas already presented. This paper aims to analyze studies on blockchain integration in big data published between 2017 and 2022. A technical taxonomy is presented for blockchain integration into big data, including data storage, security, and applications based on the field of articles selected by the SLR method. Finally, the achievements and shortcomings of each study are discussed, and future research challenges and open issues related to blockchain integration in big data are highlighted.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140229845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selective comparison of verifiable online voting systems 对可验证的在线投票系统进行选择性比较
IF 1.9 Pub Date : 2024-03-17 DOI: 10.1002/spy2.394
T. Finogina, Jordi Cucurull Juan, Nuria Costa
This paper aims to provide a guideline for identifying the most suitable online voting system under the given requirements and acceptable tradeoffs. We have selected twelve (more or less) well‐known online voting systems that rely on distinct cryptographic mechanisms for achieving security. For each of the systems, we summarized the key architectural and cryptographic ideas behind their design. Then, we analyzed the required trust assumptions for achieving the three most important security properties (i.e., verifiability, divided between cast‐as‐intended, recorded‐as‐cast, and tallied‐as‐recorded verifiabilities, privacy, and receipt‐freeness). To make a fair comparison, we did our analysis based on identical security definitions. Note that we selected wildly known and well‐accepted definitions, which are scheme‐neutral, to avoid any biases. Also, we discussed some of the most critical practical aspects of those systems, such as–the necessity for secure or anonymous channels, reliance on secure printer facilities and so forth. To facilitate the comparison, we suggested a unified naming convention for system elements based on their roles and functions. Then, based on the unified naming convention, we compared all twelve online voting systems for both the security properties and practical aspects. Finally, we summarized our observations regarding patterns and dependencies we observed, provided guidelines for selecting the online voting system, and gave recommendations regarding system design. We hope our work contributes to the online literature and facilitates the process of selecting the most suitable e‐voting system depending on the requirements of a specific election.
本文旨在提供一个指南,以便在给定的要求和可接受的权衡条件下确定最合适的在线投票系统。我们选择了 12 个(或多或少)著名的在线投票系统,它们都依赖于不同的加密机制来实现安全性。对于每个系统,我们都总结了其设计背后的关键架构和加密思想。然后,我们分析了实现三个最重要的安全属性(即可验证性,分为 "按意图投票"、"按投票记录 "和 "按记录计票 "可验证性、隐私性和无收据性)所需的信任假设。为了进行公平比较,我们根据相同的安全定义进行分析。需要注意的是,我们选择了众所周知且广为接受的定义,这些定义对方案是中立的,以避免任何偏差。此外,我们还讨论了这些系统的一些最关键的实际方面,如安全或匿名通道的必要性、对安全打印机设施的依赖等。为了便于比较,我们建议根据系统元素的作用和功能为其制定统一的命名规则。然后,根据统一的命名规则,我们对所有 12 个在线投票系统的安全性能和实用性进行了比较。最后,我们总结了观察到的模式和依赖关系,为选择在线投票系统提供了指导,并就系统设计提出了建议。我们希望我们的工作能为网上文献做出贡献,并促进根据特定选举的要求选择最合适的电子投票系统的过程。
{"title":"Selective comparison of verifiable online voting systems","authors":"T. Finogina, Jordi Cucurull Juan, Nuria Costa","doi":"10.1002/spy2.394","DOIUrl":"https://doi.org/10.1002/spy2.394","url":null,"abstract":"This paper aims to provide a guideline for identifying the most suitable online voting system under the given requirements and acceptable tradeoffs. We have selected twelve (more or less) well‐known online voting systems that rely on distinct cryptographic mechanisms for achieving security. For each of the systems, we summarized the key architectural and cryptographic ideas behind their design. Then, we analyzed the required trust assumptions for achieving the three most important security properties (i.e., verifiability, divided between cast‐as‐intended, recorded‐as‐cast, and tallied‐as‐recorded verifiabilities, privacy, and receipt‐freeness). To make a fair comparison, we did our analysis based on identical security definitions. Note that we selected wildly known and well‐accepted definitions, which are scheme‐neutral, to avoid any biases. Also, we discussed some of the most critical practical aspects of those systems, such as–the necessity for secure or anonymous channels, reliance on secure printer facilities and so forth. To facilitate the comparison, we suggested a unified naming convention for system elements based on their roles and functions. Then, based on the unified naming convention, we compared all twelve online voting systems for both the security properties and practical aspects. Finally, we summarized our observations regarding patterns and dependencies we observed, provided guidelines for selecting the online voting system, and gave recommendations regarding system design. We hope our work contributes to the online literature and facilitates the process of selecting the most suitable e‐voting system depending on the requirements of a specific election.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140234621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SafeCheck: Detecting smart contract vulnerabilities based on static program analysis methods SafeCheck:基于静态程序分析方法检测智能合约漏洞
IF 1.9 Pub Date : 2024-03-11 DOI: 10.1002/spy2.393
Haiyue Chen, Xiangfu Zhao, Yichen Wang, Zixian Zhen
Ethereum smart contracts are a special type of computer programs. Once deployed on the blockchain, they cannot be modified. This presents a significant challenge to the security of smart contracts. Previous research has proposed static and dynamic detection tools to identify vulnerabilities in smart contracts. These tools check contract vulnerabilities based on predefined rules, and the accuracy of detection strongly depends on the design of the rules. However, the constant emergence of new vulnerability types and strategies for vulnerability protection leads to numerous false positives and false negatives by tools. To address this problem, we analyze the characteristics of vulnerabilities in smart contracts and the corresponding protection strategies. We convert the contracts' bytecode into an intermediate representation to extract semantic information of the contracts. Based on this semantic information, we establish a set of detection rules based on semantic facts and implement a vulnerability detection tool SafeCheck using static program analysis methods. The tool is used to detect six common types of vulnerabilities in smart contracts. We have extensively evaluated SafeCheck on real Ethereum smart contracts and compared it to other tools. The experimental results show that SafeCheck performs better in smart contract vulnerability detection compared to other typical tools, with a high F‐measure (up to 83.1%) for its entire dataset.
以太坊智能合约是一种特殊的计算机程序。一旦部署到区块链上,就无法修改。这对智能合约的安全性提出了巨大挑战。以往的研究提出了静态和动态检测工具来识别智能合约中的漏洞。这些工具根据预定义的规则检查合约漏洞,而检测的准确性在很大程度上取决于规则的设计。然而,新的漏洞类型和漏洞保护策略的不断涌现,导致工具出现大量的误报和误判。为了解决这个问题,我们分析了智能合约中的漏洞特征和相应的保护策略。我们将合约字节码转换为中间表示法,以提取合约的语义信息。基于这些语义信息,我们建立了一套基于语义事实的检测规则,并利用静态程序分析方法实现了漏洞检测工具 SafeCheck。该工具用于检测智能合约中六种常见类型的漏洞。我们在真实的以太坊智能合约上对 SafeCheck 进行了广泛评估,并将其与其他工具进行了比较。实验结果表明,与其他典型工具相比,SafeCheck 在智能合约漏洞检测方面表现更好,其整个数据集的 F 测量值很高(达 83.1%)。
{"title":"SafeCheck: Detecting smart contract vulnerabilities based on static program analysis methods","authors":"Haiyue Chen, Xiangfu Zhao, Yichen Wang, Zixian Zhen","doi":"10.1002/spy2.393","DOIUrl":"https://doi.org/10.1002/spy2.393","url":null,"abstract":"Ethereum smart contracts are a special type of computer programs. Once deployed on the blockchain, they cannot be modified. This presents a significant challenge to the security of smart contracts. Previous research has proposed static and dynamic detection tools to identify vulnerabilities in smart contracts. These tools check contract vulnerabilities based on predefined rules, and the accuracy of detection strongly depends on the design of the rules. However, the constant emergence of new vulnerability types and strategies for vulnerability protection leads to numerous false positives and false negatives by tools. To address this problem, we analyze the characteristics of vulnerabilities in smart contracts and the corresponding protection strategies. We convert the contracts' bytecode into an intermediate representation to extract semantic information of the contracts. Based on this semantic information, we establish a set of detection rules based on semantic facts and implement a vulnerability detection tool SafeCheck using static program analysis methods. The tool is used to detect six common types of vulnerabilities in smart contracts. We have extensively evaluated SafeCheck on real Ethereum smart contracts and compared it to other tools. The experimental results show that SafeCheck performs better in smart contract vulnerability detection compared to other typical tools, with a high F‐measure (up to 83.1%) for its entire dataset.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140252435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city 利用移动车辆的信任分数从传感器节点收集可信数据的智能城市方法
IF 1.9 Pub Date : 2024-03-11 DOI: 10.1002/spy2.382
Sachin Kumar, Akshit Tyagi, Kadambri Agarwal, Saru Kumari, Chien-Ming Chen
In smart cities, a substantial amount of data is collected for analytics and a better life for the citizens. The schemes based on data collection through mobile vehicles (MV) and further verification of that data through unmanned aerial vehicles (UAV) are popular. Many trust‐based schemes of the MV have been proposed recently. However, these schemes suffered from recognition accuracy, judgment trust, and collusion attack problems. In this paper, we propose a Gompetz function‐based trust evaluation scheme. In this scheme, the direct trust of the MV is computed by comparing the data provided by the MV and the same reported by the UAV. Since the UAV can collect only limited data, indirect trust of the vehicle is computed by comparing the data reported by the MV and the same reported by the MV having the highest trust. We also applied the variable trust, which considers the recent Trust of the MVs. Then, combining all these trusts with significant weight, the final trust score of the MV is computed. After experimenting, our proposed scheme is more credible and removes the shortcomings of the existing methods by providing better recognition, accuracy, judgment, and trust.
在智慧城市中,需要收集大量数据进行分析,以改善市民的生活。基于通过移动车辆(MV)收集数据并通过无人机(UAV)进一步验证数据的方案很受欢迎。最近提出了许多基于信任的 MV 方案。然而,这些方案都存在识别精度、判断信任和串通攻击等问题。本文提出了一种基于 Gompetz 函数的信任评估方案。在该方案中,通过比较 MV 提供的数据和无人机报告的数据,计算 MV 的直接信任度。由于无人机只能收集有限的数据,因此通过比较 MV 报告的数据和信任度最高的 MV 报告的数据来计算车辆的间接信任度。我们还应用了信任变量,该变量考虑了 MV 最近的信任度。然后,结合所有这些信任度和显著权重,计算出 MV 的最终信任度得分。经过实验,我们提出的方案更加可信,并消除了现有方法的缺点,提供了更好的识别率、准确率、判断力和信任度。
{"title":"A trustworthy data collection approach from sensor nodes using trust score of mobile vehicles for smart city","authors":"Sachin Kumar, Akshit Tyagi, Kadambri Agarwal, Saru Kumari, Chien-Ming Chen","doi":"10.1002/spy2.382","DOIUrl":"https://doi.org/10.1002/spy2.382","url":null,"abstract":"In smart cities, a substantial amount of data is collected for analytics and a better life for the citizens. The schemes based on data collection through mobile vehicles (MV) and further verification of that data through unmanned aerial vehicles (UAV) are popular. Many trust‐based schemes of the MV have been proposed recently. However, these schemes suffered from recognition accuracy, judgment trust, and collusion attack problems. In this paper, we propose a Gompetz function‐based trust evaluation scheme. In this scheme, the direct trust of the MV is computed by comparing the data provided by the MV and the same reported by the UAV. Since the UAV can collect only limited data, indirect trust of the vehicle is computed by comparing the data reported by the MV and the same reported by the MV having the highest trust. We also applied the variable trust, which considers the recent Trust of the MVs. Then, combining all these trusts with significant weight, the final trust score of the MV is computed. After experimenting, our proposed scheme is more credible and removes the shortcomings of the existing methods by providing better recognition, accuracy, judgment, and trust.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140253120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and lightweight message dissemination framework for internet of vehicles 安全、轻量级的车联网信息发布框架
IF 1.9 Pub Date : 2024-03-07 DOI: 10.1002/spy2.387
Umesh Bodkhe, S. Tanwar
The Internet of Vehicles (IoV) revolutionizes vehicle communication in dynamic networks. Message dissemination in IoV involves sharing critical information for the safety and convenience of the IoV network. It is very crucial to secure message dissemination due to potential cyber‐attacks, traffic disruptions, and privacy breaches. Data integrity, authentication, and privacy are vital to maintaining trust and safety in the IoV network. This network consists of resource‐constrained IoV devices with limited resources due to the availability of embedded components in vehicular systems. Therefore, optimizing algorithms and protocols is crucial for efficient vehicle‐to‐everything (V2X) communication, enhancing safety and transportation efficiency. Solutions often include lightweight protocols and secure message exchange. This paper proposes a machine learning (ML) based secure and lightweight message dissemination framework for resource‐constrained IoV. First, we present an ML‐based threat classification model capable of effectively categorizing adversarial and nonadversarial data streams and delivering an optimized model with superior accuracy. Furthermore, we also propose a secure message dissemination scheme using lightweight cryptographic primitives, which significantly reduces computational, communication, and energy overhead. To validate the robustness of our proposed ML‐based secure and lightweight message dissemination framework, we evaluate it using various security parameters and performance measures such as computation cost, communication cost, energy cost, accuracy, precision, recall, and F1‐score. Our contributions promise to significantly enhance the security and efficiency of message dissemination in IoV environments and advance lightweight, secure, and reliable transportation systems for the future.
车联网(IoV)彻底改变了动态网络中的车辆通信。IoV 中的信息传播涉及 IoV 网络安全和便利性的关键信息共享。由于潜在的网络攻击、交通中断和隐私泄露,确保信息传播安全至关重要。数据完整性、身份验证和隐私对于维护 IoV 网络的信任和安全至关重要。该网络由资源受限的物联网设备组成,由于车辆系统中嵌入式组件的可用性,这些设备的资源十分有限。因此,优化算法和协议对于高效的车对物(V2X)通信、提高安全性和运输效率至关重要。解决方案通常包括轻量级协议和安全信息交换。本文为资源受限的物联网提出了一种基于机器学习(ML)的安全轻量级信息传播框架。首先,我们提出了一种基于 ML 的威胁分类模型,该模型能够有效地对对抗性和非对抗性数据流进行分类,并提供具有卓越准确性的优化模型。此外,我们还提出了一种使用轻量级加密原语的安全信息传播方案,大大降低了计算、通信和能源开销。为了验证我们提出的基于 ML 的安全轻量级信息传播框架的稳健性,我们使用各种安全参数和性能指标(如计算成本、通信成本、能源成本、准确度、精确度、召回率和 F1 分数)对其进行了评估。我们的贡献有望大大提高物联网环境中信息传播的安全性和效率,并推动未来轻量级、安全和可靠的交通系统的发展。
{"title":"Secure and lightweight message dissemination framework for internet of vehicles","authors":"Umesh Bodkhe, S. Tanwar","doi":"10.1002/spy2.387","DOIUrl":"https://doi.org/10.1002/spy2.387","url":null,"abstract":"The Internet of Vehicles (IoV) revolutionizes vehicle communication in dynamic networks. Message dissemination in IoV involves sharing critical information for the safety and convenience of the IoV network. It is very crucial to secure message dissemination due to potential cyber‐attacks, traffic disruptions, and privacy breaches. Data integrity, authentication, and privacy are vital to maintaining trust and safety in the IoV network. This network consists of resource‐constrained IoV devices with limited resources due to the availability of embedded components in vehicular systems. Therefore, optimizing algorithms and protocols is crucial for efficient vehicle‐to‐everything (V2X) communication, enhancing safety and transportation efficiency. Solutions often include lightweight protocols and secure message exchange. This paper proposes a machine learning (ML) based secure and lightweight message dissemination framework for resource‐constrained IoV. First, we present an ML‐based threat classification model capable of effectively categorizing adversarial and nonadversarial data streams and delivering an optimized model with superior accuracy. Furthermore, we also propose a secure message dissemination scheme using lightweight cryptographic primitives, which significantly reduces computational, communication, and energy overhead. To validate the robustness of our proposed ML‐based secure and lightweight message dissemination framework, we evaluate it using various security parameters and performance measures such as computation cost, communication cost, energy cost, accuracy, precision, recall, and F1‐score. Our contributions promise to significantly enhance the security and efficiency of message dissemination in IoV environments and advance lightweight, secure, and reliable transportation systems for the future.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140260049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure and efficient heterogeneous ID‐based signcryption for unmanned aerial vehicular networking system 用于无人驾驶航空飞行器网络系统的基于 ID 的安全高效异构签名加密技术
IF 1.9 Pub Date : 2024-03-06 DOI: 10.1002/spy2.389
Ashutosh Aithekar, Pratik Gupta, Dharminder Chaudhary
In the last decade, Internet of Things opened the door to applications of unmanned aerial vehicles (UAVs). Since the data is transferred on a public channel, therefore security, privacy, and efficiency are the main concerns of UAVs communication. Signcryption is a technique to execute encryption and signature in one step. However, the usual signcryption is not applicable to UAVs with constrained nature of resources and ground station. Moreover, in particular, UAVs and ground station need a heterogeneous signcryption for UAVs to establish communication with the ground station. But, the bilinear bilinear mapping is a very costly operation, so we need pairless identity based heterogeneous signcryption. The proposed design is unforgeable and secure against chosen message attacks. The experiment shows the efficiency of the proposed method. It takes less communication and computation costs.
近十年来,物联网为无人驾驶飞行器(UAV)的应用打开了大门。由于数据是在公共信道上传输的,因此安全、隐私和效率是无人飞行器通信的主要问题。签名加密是一种一步完成加密和签名的技术。然而,通常的签名加密技术并不适用于资源和地面站有限的无人机。此外,无人机和地面站尤其需要异构签名加密,以便无人机与地面站建立通信。但是,双线性双线性映射是一个非常昂贵的操作,因此我们需要基于无对标识的异构加密。所提出的设计具有不可伪造性,可安全抵御选择消息攻击。实验证明了所提方法的高效性。它所需的通信和计算成本更低。
{"title":"A secure and efficient heterogeneous ID‐based signcryption for unmanned aerial vehicular networking system","authors":"Ashutosh Aithekar, Pratik Gupta, Dharminder Chaudhary","doi":"10.1002/spy2.389","DOIUrl":"https://doi.org/10.1002/spy2.389","url":null,"abstract":"In the last decade, Internet of Things opened the door to applications of unmanned aerial vehicles (UAVs). Since the data is transferred on a public channel, therefore security, privacy, and efficiency are the main concerns of UAVs communication. Signcryption is a technique to execute encryption and signature in one step. However, the usual signcryption is not applicable to UAVs with constrained nature of resources and ground station. Moreover, in particular, UAVs and ground station need a heterogeneous signcryption for UAVs to establish communication with the ground station. But, the bilinear bilinear mapping is a very costly operation, so we need pairless identity based heterogeneous signcryption. The proposed design is unforgeable and secure against chosen message attacks. The experiment shows the efficiency of the proposed method. It takes less communication and computation costs.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140261334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication Dharminder 等人的卫星通信认证协议的缺陷与修正
IF 1.9 Pub Date : 2024-03-04 DOI: 10.1002/spy2.383
Sonam Yadav, Vivek Dabra, Pradeep Malik, Saru Kumari
Satellite communication is becoming an increasingly important component of the communication process, as all forms of communication are sent over open networks. As a result, there is an increase in the number of security concerns, and several protocols have been established with this consideration in mind. Recently, Dharminder et al. proposed a post‐quantum secure authentication protocol for satellite communication. The protocol is an improved version of Kumar and Garg's protocol. The authors claimed that the protocol resists the vulnerability of Kumar and Garg's protocol and provides post‐quantum security for satellite communication. Despite their claims, we have found that the protocol is vulnerable to a key mismatch attack and an offline dictionary attack. Further, we have improved Dharminder et al.'s proposed protocol that resists the key mismatch attack and offline dictionary attack and have provided the condition for the correctness of the improved protocol. Our formal security proof and implementation results demonstrate that the improved protocol is secure against quantum attacks.
随着所有形式的通信都通过开放网络发送,卫星通信正成为通信过程中日益重要的组成部分。因此,人们对安全问题的关注也越来越多,有几种协议就是基于这种考虑而制定的。最近,Dharminder 等人提出了一种用于卫星通信的后量子安全认证协议。该协议是 Kumar 和 Garg 协议的改进版。作者声称,该协议抵御了 Kumar 和 Garg 协议的漏洞,为卫星通信提供了后量子安全。尽管如此,我们还是发现该协议容易受到密钥错配攻击和离线字典攻击。此外,我们还改进了 Dharminder 等人提出的协议,使其能够抵御密钥错配攻击和离线字典攻击,并为改进协议的正确性提供了条件。我们的正式安全证明和实施结果表明,改进后的协议可以安全地抵御量子攻击。
{"title":"Flaw and amendment of Dharminder et al.'s authentication protocol for satellite communication","authors":"Sonam Yadav, Vivek Dabra, Pradeep Malik, Saru Kumari","doi":"10.1002/spy2.383","DOIUrl":"https://doi.org/10.1002/spy2.383","url":null,"abstract":"Satellite communication is becoming an increasingly important component of the communication process, as all forms of communication are sent over open networks. As a result, there is an increase in the number of security concerns, and several protocols have been established with this consideration in mind. Recently, Dharminder et al. proposed a post‐quantum secure authentication protocol for satellite communication. The protocol is an improved version of Kumar and Garg's protocol. The authors claimed that the protocol resists the vulnerability of Kumar and Garg's protocol and provides post‐quantum security for satellite communication. Despite their claims, we have found that the protocol is vulnerable to a key mismatch attack and an offline dictionary attack. Further, we have improved Dharminder et al.'s proposed protocol that resists the key mismatch attack and offline dictionary attack and have provided the condition for the correctness of the improved protocol. Our formal security proof and implementation results demonstrate that the improved protocol is secure against quantum attacks.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140266002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive evaluation of privacy policies using the contextual integrity framework 利用上下文完整性框架全面评估隐私政策
IF 1.9 Pub Date : 2024-02-20 DOI: 10.1002/spy2.380
Shahram Ghahremani, Uyen Trang Nguyen
Online privacy policies are often lengthy and difficult to understand. This may lead many users to avoid reading them despite increasing concerns about how their personal information is managed. This article presents a structured approach to evaluate the transparency and comprehensiveness of privacy policies using a comprehensive set of evaluation questions within the contextual integrity (CI) framework. We use these questions to identify policies' responses to key privacy concerns. Applying the CI framework, we analyze the clarity and context of these responses, identifying any vagueness and contextual issues that could impede a user's understanding of the privacy policy. Using the CI analysis, we quantify the quality of policies' responses, thereby enabling users to make informed decisions about online services or products. We apply our methodology to two popular messaging apps, Telegram and WhatsApp, using them as case studies to systematically uncover the strengths and weaknesses of their privacy policies. The findings demonstrate that our proposed methodology can effectively identify transparency issues and assess the comprehensiveness of privacy policies. This suggests that our approach could serve as a practical alternative to subjective evaluations typically conducted by privacy experts.
网上隐私政策往往冗长难懂。这可能会导致许多用户回避阅读这些政策,尽管他们对个人信息的管理方式越来越关注。本文提出了一种结构化的方法,在上下文完整性(CI)框架内使用一套全面的评估问题来评估隐私政策的透明度和全面性。我们利用这些问题来确定政策对关键隐私问题的回应。应用 CI 框架,我们分析了这些回应的清晰度和上下文,确定了可能妨碍用户理解隐私政策的任何模糊性和上下文问题。利用 CI 分析,我们可以量化政策回复的质量,从而使用户能够就在线服务或产品做出明智的决定。我们将我们的方法应用于 Telegram 和 WhatsApp 这两款流行的消息应用程序,将它们作为案例研究,系统地揭示其隐私政策的优缺点。研究结果表明,我们提出的方法可以有效识别透明度问题并评估隐私政策的全面性。这表明,我们的方法可以替代通常由隐私专家进行的主观评估。
{"title":"Comprehensive evaluation of privacy policies using the contextual integrity framework","authors":"Shahram Ghahremani, Uyen Trang Nguyen","doi":"10.1002/spy2.380","DOIUrl":"https://doi.org/10.1002/spy2.380","url":null,"abstract":"Online privacy policies are often lengthy and difficult to understand. This may lead many users to avoid reading them despite increasing concerns about how their personal information is managed. This article presents a structured approach to evaluate the transparency and comprehensiveness of privacy policies using a comprehensive set of evaluation questions within the contextual integrity (CI) framework. We use these questions to identify policies' responses to key privacy concerns. Applying the CI framework, we analyze the clarity and context of these responses, identifying any vagueness and contextual issues that could impede a user's understanding of the privacy policy. Using the CI analysis, we quantify the quality of policies' responses, thereby enabling users to make informed decisions about online services or products. We apply our methodology to two popular messaging apps, Telegram and WhatsApp, using them as case studies to systematically uncover the strengths and weaknesses of their privacy policies. The findings demonstrate that our proposed methodology can effectively identify transparency issues and assess the comprehensiveness of privacy policies. This suggests that our approach could serve as a practical alternative to subjective evaluations typically conducted by privacy experts.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139958248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Full‐duplex jamming for physical layer security improvement in NOMA‐enabled overlay cognitive radio networks 在支持 NOMA 的重叠认知无线电网络中进行全双工干扰以提高物理层安全性
IF 1.9 Pub Date : 2024-01-22 DOI: 10.1002/spy2.371
P. P. Hema, A. V. Babu
In this paper, we analyze the physical layer security (PLS) performance of nonorthogonal multiple access (NOMA)‐enabled overlay cognitive radio networks (NOMA‐OCRNs) in the presence of an external passive eavesdropper. Here PLS is expressed in terms of the secrecy outage probabilities (SOPs) experienced by the primary user (PU) and secondary user (SU). We obtain approximate expressions for the SOPs of both PU as well as SU assuming a jamming‐free environment, where both primary and secondary destination nodes are half‐duplex devices. To improve the SOP performance, we propose a jamming‐assisted framework, where full‐duplex destination nodes are employed, which are capable of transmitting jamming signals to confound the eavesdropper. Approximate expressions for the SOPs of PU and SU are derived for the jamming‐assisted framework as well. It is demonstrated that the proposed jamming‐assisted framework significantly reduces the SOPs compared to the jamming‐free scenario. We also determine optimal power allocation coefficients (OPACs) for PU and SU at the secondary transmitter that maximizes the total secrecy throughput of the jamming‐assisted NOMA‐OCRN with FD destinations. It is shown that the suggested OPAC significantly enhances the total secrecy throughput, compared to the default selection of the PAC.
本文分析了在外部无源窃听器存在的情况下,支持非正交多址接入(NOMA)的叠加认知无线电网络(NOMA-OCRNs)的物理层安全(PLS)性能。这里的 PLS 用主用户(PU)和次用户(SU)经历的保密中断概率(SOP)来表示。假定在无干扰环境下,主目的节点和次目的节点都是半双工设备,我们得到了主用户和次用户的 SOP 的近似表达式。为了提高 SOP 性能,我们提出了干扰辅助框架,即采用全双工目的节点,这些节点能够发射干扰信号来迷惑窃听者。我们还为干扰辅助框架推导出了 PU 和 SU 的 SOP 近似表达式。结果表明,与无干扰情况相比,建议的干扰辅助框架大大降低了 SOP。我们还确定了副发射机上 PU 和 SU 的最佳功率分配系数 (OPAC),使带 FD 目的地的干扰辅助 NOMA-OCRN 的总保密吞吐量最大化。结果表明,与默认选择的 PAC 相比,建议的 OPAC 能显著提高总保密吞吐量。
{"title":"Full‐duplex jamming for physical layer security improvement in NOMA‐enabled overlay cognitive radio networks","authors":"P. P. Hema, A. V. Babu","doi":"10.1002/spy2.371","DOIUrl":"https://doi.org/10.1002/spy2.371","url":null,"abstract":"In this paper, we analyze the physical layer security (PLS) performance of nonorthogonal multiple access (NOMA)‐enabled overlay cognitive radio networks (NOMA‐OCRNs) in the presence of an external passive eavesdropper. Here PLS is expressed in terms of the secrecy outage probabilities (SOPs) experienced by the primary user (PU) and secondary user (SU). We obtain approximate expressions for the SOPs of both PU as well as SU assuming a jamming‐free environment, where both primary and secondary destination nodes are half‐duplex devices. To improve the SOP performance, we propose a jamming‐assisted framework, where full‐duplex destination nodes are employed, which are capable of transmitting jamming signals to confound the eavesdropper. Approximate expressions for the SOPs of PU and SU are derived for the jamming‐assisted framework as well. It is demonstrated that the proposed jamming‐assisted framework significantly reduces the SOPs compared to the jamming‐free scenario. We also determine optimal power allocation coefficients (OPACs) for PU and SU at the secondary transmitter that maximizes the total secrecy throughput of the jamming‐assisted NOMA‐OCRN with FD destinations. It is shown that the suggested OPAC significantly enhances the total secrecy throughput, compared to the default selection of the PAC.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139606417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1