Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu
To ensure the security of node location privacy in the perception layer of the Internet of Things, this study proposes a location privacy protection method based on RFID location awareness algorithm. This method first introduces an adaptive multi tree anti‐collision algorithm based on collision trees when perceiving and locating the location information of nodes in the perception layer of the Internet of Things, to prevent signal collisions between multiple readers and writers. Then, based on the obtained node location results, a IoT perception layer node location privacy protection scheme based on virtual ring strategy is used to randomly initiate directed co hop routing using the virtual nodes generated after random walking, avoiding the visible area of the source node location, and transmitting data to the aggregation node in the form of the shortest routing path to protect the privacy and security of the node location. Finally, experiments are carried out to prove the progressiveness of the proposed method. The experimental results show that this method can prolong the security period of the source and aggregation nodes in the perception layer of the Internet of Things, protect the privacy and security of node positions, and has great application value.
{"title":"Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm","authors":"Ruiqi Li, Fupeng Li, Peng Xu, Shuiting Du, Bingling Gu","doi":"10.1002/spy2.368","DOIUrl":"https://doi.org/10.1002/spy2.368","url":null,"abstract":"To ensure the security of node location privacy in the perception layer of the Internet of Things, this study proposes a location privacy protection method based on RFID location awareness algorithm. This method first introduces an adaptive multi tree anti‐collision algorithm based on collision trees when perceiving and locating the location information of nodes in the perception layer of the Internet of Things, to prevent signal collisions between multiple readers and writers. Then, based on the obtained node location results, a IoT perception layer node location privacy protection scheme based on virtual ring strategy is used to randomly initiate directed co hop routing using the virtual nodes generated after random walking, avoiding the visible area of the source node location, and transmitting data to the aggregation node in the form of the shortest routing path to protect the privacy and security of the node location. Finally, experiments are carried out to prove the progressiveness of the proposed method. The experimental results show that this method can prolong the security period of the source and aggregation nodes in the perception layer of the Internet of Things, protect the privacy and security of node positions, and has great application value.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139608009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing has revolutionized the way IT industries work. Most modern‐day companies rely on cloud services to accomplish their day‐to‐day tasks. From hosting websites to developing platforms and storing resources, cloud computing has tremendous use in the modern information technology industry. Although an emerging technique, it has many security challenges. In structured query language injection attacks, the attacker modifies some parts of the user query to still sensitive user information. This type of attack is challenging to detect and prevent. In this article, we have reviewed 65 research articles that address the issue of its prevention and detection in cloud and Traditional Networks, of which 11 research articles are related to general cloud attacks, and the rest of the 54 research articles are specifically on web security. Our result shows that Random Forest has an accuracy of 99.8% and a Precision rate of 99.9%, and the worst‐performing model is Multi‐Layer Perceptron (MLP) in the SQLIA Model. For recall value, Random Forest performs best while TensorFlow Linear Classifier performs worst. F1 score is best in Random Forest, while MLP is the most diminutive performer.
云计算彻底改变了 IT 行业的工作方式。大多数现代公司都依赖云服务来完成日常任务。从托管网站到开发平台和存储资源,云计算在现代信息技术产业中有着巨大的用途。虽然云计算是一项新兴技术,但它也面临着许多安全挑战。在结构化查询语言注入攻击中,攻击者会修改用户查询的某些部分,以保留敏感的用户信息。这类攻击在检测和防范方面具有挑战性。在本文中,我们综述了 65 篇针对云计算和传统网络中结构化查询语言注入攻击的预防和检测问题的研究文章,其中 11 篇研究文章与一般的云计算攻击有关,其余 54 篇研究文章则专门针对网络安全。结果显示,随机森林的准确率为 99.8%,精确率为 99.9%,而在 SQLIA 模型中表现最差的模型是多层感知器(MLP)。在召回值方面,随机森林表现最好,而 TensorFlow 线性分类器表现最差。随机森林的 F1 分数最高,而 MLP 的表现最差。
{"title":"Analysis of SQL injection attacks in the cloud and in WEB applications","authors":"Animesh Kumar, Sandip Dutta, Prashant Pranav","doi":"10.1002/spy2.370","DOIUrl":"https://doi.org/10.1002/spy2.370","url":null,"abstract":"Cloud computing has revolutionized the way IT industries work. Most modern‐day companies rely on cloud services to accomplish their day‐to‐day tasks. From hosting websites to developing platforms and storing resources, cloud computing has tremendous use in the modern information technology industry. Although an emerging technique, it has many security challenges. In structured query language injection attacks, the attacker modifies some parts of the user query to still sensitive user information. This type of attack is challenging to detect and prevent. In this article, we have reviewed 65 research articles that address the issue of its prevention and detection in cloud and Traditional Networks, of which 11 research articles are related to general cloud attacks, and the rest of the 54 research articles are specifically on web security. Our result shows that Random Forest has an accuracy of 99.8% and a Precision rate of 99.9%, and the worst‐performing model is Multi‐Layer Perceptron (MLP) in the SQLIA Model. For recall value, Random Forest performs best while TensorFlow Linear Classifier performs worst. F1 score is best in Random Forest, while MLP is the most diminutive performer.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The advancement in technology and the adoption of innovative developments have made our lives easier. Every industry, from agriculture to transport, has experienced this advancement. The entire transportation system is in the process of becoming intelligent. Smart mobility of autonomous vehicles is an important part of the upcoming smart cities. The autonomous vehicle provides functionalities for safety and convenience. It has been an emerging field with a lot of attention and still under advancement and requires a thorough study and solutions for potential challenges and opportunities. Despite impressive advantages, it has some security vulnerabilities which could lead to life‐threatening consequences. Though they could prevent road accidents by eliminating human errors from the driving process, they also create the possibility of cyber‐physical attacks on the vehicular controlling system. For this, many researchers have focused on the security attacks and defenses in autonomous vehicular systems. A 360‐degree research has been undertaken to understand the concept of autonomous vehicles entirely, such as history, social impacts, difficulties and challenges, current product developments, and security aspects. Also, a vehicular architecture is proposed by integrating various technologies such as 5G, SDN, cloud, and so forth, its possible security attacks are mentioned.
{"title":"Autonomous vehicle security: Current survey and future research challenges","authors":"Isha Pali, Ruhul Amin, Mohammad Abdussami","doi":"10.1002/spy2.367","DOIUrl":"https://doi.org/10.1002/spy2.367","url":null,"abstract":"The advancement in technology and the adoption of innovative developments have made our lives easier. Every industry, from agriculture to transport, has experienced this advancement. The entire transportation system is in the process of becoming intelligent. Smart mobility of autonomous vehicles is an important part of the upcoming smart cities. The autonomous vehicle provides functionalities for safety and convenience. It has been an emerging field with a lot of attention and still under advancement and requires a thorough study and solutions for potential challenges and opportunities. Despite impressive advantages, it has some security vulnerabilities which could lead to life‐threatening consequences. Though they could prevent road accidents by eliminating human errors from the driving process, they also create the possibility of cyber‐physical attacks on the vehicular controlling system. For this, many researchers have focused on the security attacks and defenses in autonomous vehicular systems. A 360‐degree research has been undertaken to understand the concept of autonomous vehicles entirely, such as history, social impacts, difficulties and challenges, current product developments, and security aspects. Also, a vehicular architecture is proposed by integrating various technologies such as 5G, SDN, cloud, and so forth, its possible security attacks are mentioned.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139626140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The wide applications of the Internet of Drones (IoD), ranging from package delivery to surveillance, attract the attention of industrialists and academicians. Drones are given the task of obtaining sensitive field information within the flying zone in real‐time. Hence, it is important to tackle the privacy and security issues associated with drones that are employed in these kinds of situations. Also, when the drones move to the new unmanned aerial vehicle (UAV) operator coverage area, the drones are required to execute the authentication process again, which affects the performance of IoD. To overcome the above‐said shortcomings, a physically secure and privacy‐preserving blockchain enabled authentication method is proposed in this paper. The blockchain network permits drones to perform quick re‐authentication by transferring drone authentication codes to the following UAV operators. In the proposed work, the drone does not need to store the secret keys to perform anonymous authentication, and it provides physical security for the drones. When compared to competing techniques, the proposed scheme delivers the needed security features while incurring lower storage, computational, and communication costs.
{"title":"Physically secure and privacy‐preserving blockchain enabled authentication scheme for internet of drones","authors":"Jegadeesan Subramani, Azees Maria, ArunSekar Rajasekaran, Jaime Lloret","doi":"10.1002/spy2.364","DOIUrl":"https://doi.org/10.1002/spy2.364","url":null,"abstract":"The wide applications of the Internet of Drones (IoD), ranging from package delivery to surveillance, attract the attention of industrialists and academicians. Drones are given the task of obtaining sensitive field information within the flying zone in real‐time. Hence, it is important to tackle the privacy and security issues associated with drones that are employed in these kinds of situations. Also, when the drones move to the new unmanned aerial vehicle (UAV) operator coverage area, the drones are required to execute the authentication process again, which affects the performance of IoD. To overcome the above‐said shortcomings, a physically secure and privacy‐preserving blockchain enabled authentication method is proposed in this paper. The blockchain network permits drones to perform quick re‐authentication by transferring drone authentication codes to the following UAV operators. In the proposed work, the drone does not need to store the secret keys to perform anonymous authentication, and it provides physical security for the drones. When compared to competing techniques, the proposed scheme delivers the needed security features while incurring lower storage, computational, and communication costs.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139439697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The dynamic charging system of electric vehicles has great potential for development. Electric vehicles initiate charging requests, and charging stations charge authorized electric vehicles. Fog computing improves the efficiency of request processing. However, open channels can be vulnerable to various attacks by a malicious adversary. Mutual authentication schemes allow users and charging stations to confirm each other. Therefore, numerous authentication and key agreement schemes have been proposed. In 2021, Babu et al. proposed an authentication scheme based on fog servers. Unfortunately, we found that their scheme can not resist FS impersonation attack and replay attack. Hence, we propose an authentication scheme between electric vehicles and fog servers to resolve the security weakness. Our scheme uses lightweight hash functions and XOR operations, which is more suitable for resource‐constrained electric vehicles. We proved our scheme can achieve mutual authentication by using BAN logic, and analyzed that our scheme can resist impersonation, replay, and known session key attacks, ensuring anonymity and untraceability. We finally compare computation cost and communication cost of our scheme with the existing schemes. The result shows that our scheme performs better than others overall. Therefore, our scheme is secure and suitable for dynamic charging systems.
电动汽车的动态充电系统具有巨大的发展潜力。电动汽车发起充电请求,充电站为授权的电动汽车充电。雾计算提高了请求处理的效率。然而,开放通道容易受到恶意对手的各种攻击。相互认证方案允许用户和充电站相互确认。因此,人们提出了许多认证和密钥协议方案。2021 年,Babu 等人提出了一种基于雾服务器的认证方案。遗憾的是,我们发现他们的方案无法抵御 FS 冒充攻击和重放攻击。因此,我们提出了一种电动汽车与雾服务器之间的认证方案,以解决安全弱点。我们的方案使用轻量级哈希函数和 XOR 运算,更适合资源有限的电动汽车。我们利用 BAN 逻辑证明了我们的方案可以实现相互认证,并分析了我们的方案可以抵御冒充、重放和已知会话密钥攻击,确保了匿名性和不可追踪性。最后,我们比较了我们的方案与现有方案的计算成本和通信成本。结果表明,我们的方案在整体上优于其他方案。因此,我们的方案是安全的,适用于动态收费系统。
{"title":"A new authentication scheme for dynamic charging system of electric vehicles in fog environment","authors":"Zhongming Huang, Feng Wang, Chin-Chen Chang, Xiuqiang Chen","doi":"10.1002/spy2.365","DOIUrl":"https://doi.org/10.1002/spy2.365","url":null,"abstract":"The dynamic charging system of electric vehicles has great potential for development. Electric vehicles initiate charging requests, and charging stations charge authorized electric vehicles. Fog computing improves the efficiency of request processing. However, open channels can be vulnerable to various attacks by a malicious adversary. Mutual authentication schemes allow users and charging stations to confirm each other. Therefore, numerous authentication and key agreement schemes have been proposed. In 2021, Babu et al. proposed an authentication scheme based on fog servers. Unfortunately, we found that their scheme can not resist FS impersonation attack and replay attack. Hence, we propose an authentication scheme between electric vehicles and fog servers to resolve the security weakness. Our scheme uses lightweight hash functions and XOR operations, which is more suitable for resource‐constrained electric vehicles. We proved our scheme can achieve mutual authentication by using BAN logic, and analyzed that our scheme can resist impersonation, replay, and known session key attacks, ensuring anonymity and untraceability. We finally compare computation cost and communication cost of our scheme with the existing schemes. The result shows that our scheme performs better than others overall. Therefore, our scheme is secure and suitable for dynamic charging systems.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139457125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The dew computing is currently considered as one of the promising technology, due to its ability to give data access in the absence of internet. However, dew computing also brings new challenges, particularly security and privacy issues. In dew computing paradigm, authentication and key agreement pose substantial challenges that must be taken into account. In this context, the present work is to provide a secure authentication scheme for Internet of Things and dew server based on elliptic curve cryptography. Moreover, the performance evaluation of proposed scheme has been assessed in terms of communication and computation cost, which shows the proposed scheme outperforms than existing related schemes. The proposed scheme has also been compared with the related schemes in terms of various security features such as location privacy, anonymity, forward secrecy, mutual authentication, key agreement, forgery attack, replay attack, denial of service attack and replay attack. Furthermore, the formal security evaluation has been verified by automated validation internet security protocols and applications (AVISPA) under on‐the‐fly model‐checker (OFMC) and constraint logic based attack searcher (CL‐AtSE) backends. The OFMC backend analyzed 228 visited nodes with four plies using search time of 0.24 s. The CL‐AtSE analyzed three states with translation time of 0.12 s. The OFMC and CL‐AtSE backends have not identified any attack trace. Therefore, the simulation results demonstrate that the proposed scheme is safe against the security threats.
{"title":"An efficient lightweight authentication scheme for dew‐assisted IoT networks","authors":"Upendra Verma, M. Sohani","doi":"10.1002/spy2.360","DOIUrl":"https://doi.org/10.1002/spy2.360","url":null,"abstract":"The dew computing is currently considered as one of the promising technology, due to its ability to give data access in the absence of internet. However, dew computing also brings new challenges, particularly security and privacy issues. In dew computing paradigm, authentication and key agreement pose substantial challenges that must be taken into account. In this context, the present work is to provide a secure authentication scheme for Internet of Things and dew server based on elliptic curve cryptography. Moreover, the performance evaluation of proposed scheme has been assessed in terms of communication and computation cost, which shows the proposed scheme outperforms than existing related schemes. The proposed scheme has also been compared with the related schemes in terms of various security features such as location privacy, anonymity, forward secrecy, mutual authentication, key agreement, forgery attack, replay attack, denial of service attack and replay attack. Furthermore, the formal security evaluation has been verified by automated validation internet security protocols and applications (AVISPA) under on‐the‐fly model‐checker (OFMC) and constraint logic based attack searcher (CL‐AtSE) backends. The OFMC backend analyzed 228 visited nodes with four plies using search time of 0.24 s. The CL‐AtSE analyzed three states with translation time of 0.12 s. The OFMC and CL‐AtSE backends have not identified any attack trace. Therefore, the simulation results demonstrate that the proposed scheme is safe against the security threats.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139010561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The prevalence of malicious Android applications targeting the platform has introduced significant challenges in the realm of security testing. Traditional solutions have proven insufficient in handling the growing number of malicious apps, resulting in persistent exposure of Android smartphones to evolving forms of malware. This study investigates the potential of extreme gradient boosting (XGB) in identifying complex and high‐dimensional malicious permissions. By leveraging attribute combination and selection techniques, XGBoost demonstrates promising capabilities in this area. However, enhancing the XGBoost model presents a formidable challenge. To overcome this, This research employs adaptive grey wolf optimization (AGWO) for hyper‐parameter tuning. AGWO utilizes continuous values to represent the position and movement of the grey wolf, enabling XGBoost to search for optimal hyper‐parameter values in a continuous space. The proposed approach, DroidXGB, utilizes XGBoost and AGWO to analyze permissions and identify malware Android applications. It aims to address security vulnerabilities and compares its performance with baseline algorithms and state‐of‐the‐art methods using four benchmark datasets. The results showcase DroidXGB's impressive accuracy of 98.39%, outperforming other existing methods and significantly enhancing Android malware detection and security testing capabilities.
{"title":"Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis","authors":"Pawan Kumar, Sukhdip Singh","doi":"10.1002/spy2.361","DOIUrl":"https://doi.org/10.1002/spy2.361","url":null,"abstract":"The prevalence of malicious Android applications targeting the platform has introduced significant challenges in the realm of security testing. Traditional solutions have proven insufficient in handling the growing number of malicious apps, resulting in persistent exposure of Android smartphones to evolving forms of malware. This study investigates the potential of extreme gradient boosting (XGB) in identifying complex and high‐dimensional malicious permissions. By leveraging attribute combination and selection techniques, XGBoost demonstrates promising capabilities in this area. However, enhancing the XGBoost model presents a formidable challenge. To overcome this, This research employs adaptive grey wolf optimization (AGWO) for hyper‐parameter tuning. AGWO utilizes continuous values to represent the position and movement of the grey wolf, enabling XGBoost to search for optimal hyper‐parameter values in a continuous space. The proposed approach, DroidXGB, utilizes XGBoost and AGWO to analyze permissions and identify malware Android applications. It aims to address security vulnerabilities and compares its performance with baseline algorithms and state‐of‐the‐art methods using four benchmark datasets. The results showcase DroidXGB's impressive accuracy of 98.39%, outperforming other existing methods and significantly enhancing Android malware detection and security testing capabilities.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138980209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, P. Vijayakumar, Marimuthu Karuppiah, Youngho Park
Industry 4.0 is a revolution of the operations in the industrial manufacturing for increased productivity, trade and commerce. It is heavily reliant on the automation of the processes and equipment along with complex interconnectivity and insightful analysis using machine learning. The interconnectivity of the manufacturing devices from various industrial sites brings with it several security issues related to communication. This article focuses on solving the security issue of access control between such devices and enable seamless secure communication for the proper functioning of the industry. An access control scheme has been proposed that achieves the necessary security features of anonymity, traceability, and forward secrecy. It is also shown that the proposed scheme takes less communication and computational costs, and is strongly resilient against various attacks such as impersonation attack, replay attack, and denial‐of‐service attack as compared to other relevant schemes.
{"title":"Designing access control security protocol for Industry 4.0 using Blockchain‐as‐a‐Service","authors":"Anusha Vangala, Ashok Kumar Das, Neeraj Kumar, P. Vijayakumar, Marimuthu Karuppiah, Youngho Park","doi":"10.1002/spy2.362","DOIUrl":"https://doi.org/10.1002/spy2.362","url":null,"abstract":"Industry 4.0 is a revolution of the operations in the industrial manufacturing for increased productivity, trade and commerce. It is heavily reliant on the automation of the processes and equipment along with complex interconnectivity and insightful analysis using machine learning. The interconnectivity of the manufacturing devices from various industrial sites brings with it several security issues related to communication. This article focuses on solving the security issue of access control between such devices and enable seamless secure communication for the proper functioning of the industry. An access control scheme has been proposed that achieves the necessary security features of anonymity, traceability, and forward secrecy. It is also shown that the proposed scheme takes less communication and computational costs, and is strongly resilient against various attacks such as impersonation attack, replay attack, and denial‐of‐service attack as compared to other relevant schemes.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138981531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In today's cybersphere, cryptography plays a vital role in various fields. Image encryption is an integral part for securing information because of its vast application areas such as military (defense), multimedia, healthcare and so forth. In this article, an image encryption algorithm for both grayscale and color image is proposed based on Tangential Delay‐Ellipse Reflecting Curve System (TD‐ERCS) chaotic map system and deoxyribonucleic acid (DNA) coding. Chaotic map is used to scramble the pixel positions; to achieve confusion and for creation of mask image, and DNA coding is used for changing the pixel values; to achieve diffusion. Upon experimental analysis, proposed work achieved significantly high mean square error and low peak signal to noise ratio, almost zero correlation, high number of pixel change rate and unified averaged changed intensity values, and resistance to noise and data loss attacks. In addition, the decryption is possible without loss in quality of image.
{"title":"Chaos and DNA coding technique for image cryptography","authors":"Grishan Pradhan, Babu R. Dawadi, Abiral Chaulagain, Anish Lal Joshi, Prajal Govinda Vaidya","doi":"10.1002/spy2.359","DOIUrl":"https://doi.org/10.1002/spy2.359","url":null,"abstract":"In today's cybersphere, cryptography plays a vital role in various fields. Image encryption is an integral part for securing information because of its vast application areas such as military (defense), multimedia, healthcare and so forth. In this article, an image encryption algorithm for both grayscale and color image is proposed based on Tangential Delay‐Ellipse Reflecting Curve System (TD‐ERCS) chaotic map system and deoxyribonucleic acid (DNA) coding. Chaotic map is used to scramble the pixel positions; to achieve confusion and for creation of mask image, and DNA coding is used for changing the pixel values; to achieve diffusion. Upon experimental analysis, proposed work achieved significantly high mean square error and low peak signal to noise ratio, almost zero correlation, high number of pixel change rate and unified averaged changed intensity values, and resistance to noise and data loss attacks. In addition, the decryption is possible without loss in quality of image.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138589532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Smart cities provide a sustainable transport ecosystem to connect smart vehicles through sensors and networking units. Internet‐of‐vehicles (IoV) is vital in disseminating various messages, including road safety, exact location sharing, road accidents and blocks, collision warning, driver assistance, network congestion, or toll payment among vehicle‐to‐anything (V2X) units. Due to the mission‐critical nature of the IoV ecosystem, it requires reliable, lightweight, and real‐time communication for vehicle‐to‐vehicle (V2V) and V2X units. However, due to the availability of insecure wireless channels, an adversary can perform several security attacks such as replay, password guessing, masquerade, trace, message tampering, Man‐in‐the‐middle attack (MIMA), and plain‐text attacks in an IoV environment which may lead to potential disruptions. Motivated by the aforementioned facts, we propose a V2XCom , a lightweight and secure message dissemination scheme for the IoV network using low‐cost cryptographic SHA‐256, XoR operation, and concatenation. We performed security verification of V2XCom using the Scyther and AVISPA tools. Moreover, security proofs are provided for an informal security analysis of the proposed scheme. We have done a comparative analysis of a V2XCom with recent dissemination schemes in the IoV ecosystem concerning security features, communication latency, computational cost, and energy usage.
{"title":"<i>V2XCom:</i> Lightweight and secure message dissemination scheme for Internet of vehicles","authors":"Umesh Bodkhe, Sudeep Tanwar","doi":"10.1002/spy2.352","DOIUrl":"https://doi.org/10.1002/spy2.352","url":null,"abstract":"Abstract Smart cities provide a sustainable transport ecosystem to connect smart vehicles through sensors and networking units. Internet‐of‐vehicles (IoV) is vital in disseminating various messages, including road safety, exact location sharing, road accidents and blocks, collision warning, driver assistance, network congestion, or toll payment among vehicle‐to‐anything (V2X) units. Due to the mission‐critical nature of the IoV ecosystem, it requires reliable, lightweight, and real‐time communication for vehicle‐to‐vehicle (V2V) and V2X units. However, due to the availability of insecure wireless channels, an adversary can perform several security attacks such as replay, password guessing, masquerade, trace, message tampering, Man‐in‐the‐middle attack (MIMA), and plain‐text attacks in an IoV environment which may lead to potential disruptions. Motivated by the aforementioned facts, we propose a V2XCom , a lightweight and secure message dissemination scheme for the IoV network using low‐cost cryptographic SHA‐256, XoR operation, and concatenation. We performed security verification of V2XCom using the Scyther and AVISPA tools. Moreover, security proofs are provided for an informal security analysis of the proposed scheme. We have done a comparative analysis of a V2XCom with recent dissemination schemes in the IoV ecosystem concerning security features, communication latency, computational cost, and energy usage.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135974295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}