首页 > 最新文献

Security and Privacy最新文献

英文 中文
Financial risk analysis system and supervision based on big data and blockchain technology 基于大数据和区块链技术的金融风险分析系统与监管
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1002/spy2.224
Liping Wang
Financial risk is closely related to the risk of finance. For both institutions and financial industry, once financial risk occurs, it will bring great harm. It is very necessary to forewarn financial risks before they occur. Through the analysis and supervision of financial risk can effectively control the occurrence of financial crisis. In the current Internet era, blockchain technology has been widely used in various aspects. In finance, in particular, blockchain has brought great convenience to the analysis and supervision of its risks. This paper aims to study financial risk analysis and related regulatory research through the relevant technologies of big data and blockchain. This paper puts forward the way of combining theory and model to study financial risk. The risk value is obtained through the study of risk‐related attributes. Experimental results show that the risk rate of financial risks under big data and blockchain technology has been reduced by 10%–15%. This degree of risk reduction is of great application in actual financial risk control. Financial security is closely related to financial risks and financial crises. Both risks and crises can be used to explain and measure the degree of security, and security can also be used to explain and measure risks and crises. The higher the degree of security, the lower the risk; conversely, the greater the risk, the lower the degree of security; a crisis is the result of a large‐scale accumulation of risks, and a crisis is serious insecurity, which is an extreme of financial security.
财务风险与财务风险密切相关。无论是对机构还是对金融业来说,金融风险一旦发生,都会带来极大的危害。在金融风险发生之前进行预警是非常必要的。通过对金融风险的分析和监管,可以有效地控制金融危机的发生。在当前的互联网时代,区块链技术在各个方面得到了广泛的应用。特别是在金融领域,b区块链为其风险的分析和监管带来了极大的便利。本文旨在通过大数据和区块链相关技术进行金融风险分析及相关监管研究。本文提出了理论与模型相结合的方法来研究财务风险。风险值是通过对风险相关属性的研究得到的。实验结果表明,大数据和区块链技术下的金融风险风险率降低了10%-15%。这种风险降低程度在实际的财务风险控制中有很大的应用价值。金融安全与金融风险、金融危机密切相关。风险和危机都可以用来解释和衡量安全的程度,安全也可以用来解释和衡量风险和危机。安全程度越高,风险越低;反之,风险越大,安全程度越低;危机是风险大规模积累的结果,危机是严重的不安全感,是金融安全的一种极端。
{"title":"Financial risk analysis system and supervision based on big data and blockchain technology","authors":"Liping Wang","doi":"10.1002/spy2.224","DOIUrl":"https://doi.org/10.1002/spy2.224","url":null,"abstract":"Financial risk is closely related to the risk of finance. For both institutions and financial industry, once financial risk occurs, it will bring great harm. It is very necessary to forewarn financial risks before they occur. Through the analysis and supervision of financial risk can effectively control the occurrence of financial crisis. In the current Internet era, blockchain technology has been widely used in various aspects. In finance, in particular, blockchain has brought great convenience to the analysis and supervision of its risks. This paper aims to study financial risk analysis and related regulatory research through the relevant technologies of big data and blockchain. This paper puts forward the way of combining theory and model to study financial risk. The risk value is obtained through the study of risk‐related attributes. Experimental results show that the risk rate of financial risks under big data and blockchain technology has been reduced by 10%–15%. This degree of risk reduction is of great application in actual financial risk control. Financial security is closely related to financial risks and financial crises. Both risks and crises can be used to explain and measure the degree of security, and security can also be used to explain and measure risks and crises. The higher the degree of security, the lower the risk; conversely, the greater the risk, the lower the degree of security; a crisis is the result of a large‐scale accumulation of risks, and a crisis is serious insecurity, which is an extreme of financial security.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":"54 7","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50980464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differential fault analysis on the lightweight block cipher plug‐in plug‐out 轻量级分组密码机插拔故障分析
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 DOI: 10.1002/spy2.286
Haiyan Xiao, Lifang Wang
In recent years, many lightweight block ciphers were proposed to provide security for resource‐constrained environments such as Internet of Things (IoT). PIPO, which stands for “plug‐in plug‐out”, is just a lightweight bit‐sliced block cipher offering excellent performance in 8‐bit AVR software implementations. In fact, PIPO owns 64‐bit input and output, 128‐bit secret key. In this article, we consider the differential fault analysis (DFA), a typical side‐channel attack, on the PIPO cipher. More concretely, for the first time, we apply the mixed attack model, which considers the DFA on the encryption state and key schedule simultaneously, to recover PIPO's 128‐bit master key. The theoretical analysis shows that, in average, after injecting 4‐byte faults, the complexity of obtaining the master key reduces from 2128 reduces to 214. In fact, this attack model alleviates the assumption on attacker than the bit‐injection case. It should be noted that our analysis also holds for other bit‐sliced block ciphers. Finally, the simulations show that our proposed DFA on PIPO cipher is rather practical.
近年来,人们提出了许多轻量级分组密码来为资源受限的环境(如物联网)提供安全性。PIPO,即“plug - in plug - out”,是一种轻量级的位切片分组密码,在8位AVR软件实现中提供出色的性能。实际上,PIPO拥有64位输入和输出,128位密钥。在本文中,我们考虑了PIPO密码的差分故障分析(DFA),这是一种典型的侧信道攻击。更具体地说,我们首次应用同时考虑加密状态和密钥调度上的DFA的混合攻击模型来恢复PIPO的128位主密钥。理论分析表明,平均而言,注入4字节错误后,获得主密钥的复杂度从2128降低到214。实际上,该攻击模型比注比特攻击模型减轻了对攻击者的假设。值得注意的是,我们的分析也适用于其他位切片分组密码。最后,仿真结果表明,该算法在PIPO密码上的DFA是非常实用的。
{"title":"Differential fault analysis on the lightweight block cipher plug‐in plug‐out","authors":"Haiyan Xiao, Lifang Wang","doi":"10.1002/spy2.286","DOIUrl":"https://doi.org/10.1002/spy2.286","url":null,"abstract":"In recent years, many lightweight block ciphers were proposed to provide security for resource‐constrained environments such as Internet of Things (IoT). PIPO, which stands for “plug‐in plug‐out”, is just a lightweight bit‐sliced block cipher offering excellent performance in 8‐bit AVR software implementations. In fact, PIPO owns 64‐bit input and output, 128‐bit secret key. In this article, we consider the differential fault analysis (DFA), a typical side‐channel attack, on the PIPO cipher. More concretely, for the first time, we apply the mixed attack model, which considers the DFA on the encryption state and key schedule simultaneously, to recover PIPO's 128‐bit master key. The theoretical analysis shows that, in average, after injecting 4‐byte faults, the complexity of obtaining the master key reduces from 2128 reduces to 214. In fact, this attack model alleviates the assumption on attacker than the bit‐injection case. It should be noted that our analysis also holds for other bit‐sliced block ciphers. Finally, the simulations show that our proposed DFA on PIPO cipher is rather practical.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":"15 10","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50980516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low area and high throughput implementation of advanced encryption standard hardware accelerator on FPGA using Mux‐Demux pair 使用Mux-Demux对在FPGA上实现高级加密标准硬件加速器的低面积高吞吐量实现
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-23 DOI: 10.1002/spy2.292
N. Renugadevi, Stheya Julakanti, Sai Charan Vemula, Somya Bhatnagar, Shirisha Thangallapally
Now‐a‐days advanced cryptographic algorithms are needed in order to improve data security and confidentiality. One such algorithm used prominently is advanced encryption standard (AES) algorithm. AES is a complex algorithm with multiple rounds of processing data and occupies more space or area when implemented on hardware. Since each sub‐step of computation has a similar structure, the proposed method employs the novel idea of using the same hardware to implement the AES functionality. Hence the number of logical units occupied are leveraged. The proposed scheme, Mux‐Demux pair method (MDP), uses a mux‐demux structure. It is implemented on Virtex‐7 and ZynQ7000 FPGAs and the code is written in Verilog HDL language in the Vivado software. The proposed work when simulated on Virtex‐7 occupies an area of 1932 slices, giving an optimized throughput of 10.167 Gbps while the work simulated on ZynQ7000 occupies an area of 3253 slices, resulting in a throughput of 23.858 Gbps.
现在需要先进的加密算法来提高数据的安全性和机密性。一种突出使用的这样的算法是高级加密标准(AES)算法。AES是一种复杂的算法,需要多轮数据处理,在硬件上实现时占用更多的空间或面积。由于计算的每个子步骤都有相似的结构,因此所提出的方法采用了使用相同硬件来实现AES功能的新颖思想。因此,占用的逻辑单元的数量被利用。所提出的方案,即多路复用-多路复用对方法(MDP),使用多路复用-解复用结构。它在Virtex‐7和ZynQ7000 FPGA上实现,代码在Vivado软件中用Verilog HDL语言编写。当在Virtex‐7上模拟时,所提出的工作占据了1932个切片的面积,给出了10.167的优化吞吐量 Gbps,而在ZynQ7000上模拟的工作占用了3253个切片的面积,从而获得了23.858的吞吐量 Gbps。
{"title":"Low area and high throughput implementation of advanced encryption standard hardware accelerator on FPGA using Mux‐Demux pair","authors":"N. Renugadevi, Stheya Julakanti, Sai Charan Vemula, Somya Bhatnagar, Shirisha Thangallapally","doi":"10.1002/spy2.292","DOIUrl":"https://doi.org/10.1002/spy2.292","url":null,"abstract":"Now‐a‐days advanced cryptographic algorithms are needed in order to improve data security and confidentiality. One such algorithm used prominently is advanced encryption standard (AES) algorithm. AES is a complex algorithm with multiple rounds of processing data and occupies more space or area when implemented on hardware. Since each sub‐step of computation has a similar structure, the proposed method employs the novel idea of using the same hardware to implement the AES functionality. Hence the number of logical units occupied are leveraged. The proposed scheme, Mux‐Demux pair method (MDP), uses a mux‐demux structure. It is implemented on Virtex‐7 and ZynQ7000 FPGAs and the code is written in Verilog HDL language in the Vivado software. The proposed work when simulated on Virtex‐7 occupies an area of 1932 slices, giving an optimized throughput of 10.167 Gbps while the work simulated on ZynQ7000 occupies an area of 3253 slices, resulting in a throughput of 23.858 Gbps.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47577270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy‐preserving hands‐free voice authentication leveraging edge technology 利用边缘技术保护隐私免手语音认证
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-16 DOI: 10.1002/spy2.290
Zaid Sh. Alattar, Tarek Abbes, Faouzi Zerai
Although speech recognition technology has improved significantly over the past few years, the absence of reliable voice authentication methods has negatively affected the Internet of Things (IoT). Voice‐activated devices, by design, rely on personal voice biometrics for access‐level security, and insecure voice authentication techniques limit the development of voice interfaces that can deal with multiple users with different privileges. Furthermore, public concerns surrounding biometric systems have been reported. Outsourcing biometric data are liable to various privacy breaches, increasing vulnerability to cyberattacks from both criminal organizations and government agencies. In this article, we address the security and privacy challenges of voice authentication for IoT by presenting an edge‐based, hands‐free, single‐factor authentication scheme that consists of three security‐based features: random phrase verification, anti‐spoof verification, and text‐independent speaker recognition. The use of edge technology allows the integration of this authentication scheme with resource contained IoT devices such as voice assistants. Additionally, privacy is ensured by a novel security protocol that uses chaffing and encryption techniques to protect the users' biometric data stored locally on the edge device. Finally, the scheme does not compromise the user experience as it requires only two short voice inputs.
虽然语音识别技术在过去几年中有了很大的进步,但缺乏可靠的语音认证方法对物联网(IoT)产生了负面影响。语音激活设备在设计上依赖于个人语音生物识别技术来实现访问级安全,而不安全的语音认证技术限制了能够处理具有不同权限的多个用户的语音接口的发展。此外,公众对生物识别系统的担忧也有报道。外包生物识别数据容易受到各种隐私侵犯,更容易受到犯罪组织和政府机构的网络攻击。在本文中,我们通过提出一种基于边缘的、免提的、单因素身份验证方案来解决物联网语音身份验证的安全和隐私挑战,该方案由三个基于安全的特征组成:随机短语验证、反欺骗验证和与文本无关的说话人识别。边缘技术的使用允许将这种身份验证方案与包含资源的物联网设备(如语音助手)集成。此外,一种新的安全协议确保了隐私,该协议使用干扰和加密技术来保护本地存储在边缘设备上的用户生物特征数据。最后,该方案不会影响用户体验,因为它只需要两个简短的语音输入。
{"title":"Privacy‐preserving hands‐free voice authentication leveraging edge technology","authors":"Zaid Sh. Alattar, Tarek Abbes, Faouzi Zerai","doi":"10.1002/spy2.290","DOIUrl":"https://doi.org/10.1002/spy2.290","url":null,"abstract":"Although speech recognition technology has improved significantly over the past few years, the absence of reliable voice authentication methods has negatively affected the Internet of Things (IoT). Voice‐activated devices, by design, rely on personal voice biometrics for access‐level security, and insecure voice authentication techniques limit the development of voice interfaces that can deal with multiple users with different privileges. Furthermore, public concerns surrounding biometric systems have been reported. Outsourcing biometric data are liable to various privacy breaches, increasing vulnerability to cyberattacks from both criminal organizations and government agencies. In this article, we address the security and privacy challenges of voice authentication for IoT by presenting an edge‐based, hands‐free, single‐factor authentication scheme that consists of three security‐based features: random phrase verification, anti‐spoof verification, and text‐independent speaker recognition. The use of edge technology allows the integration of this authentication scheme with resource contained IoT devices such as voice assistants. Additionally, privacy is ensured by a novel security protocol that uses chaffing and encryption techniques to protect the users' biometric data stored locally on the edge device. Finally, the scheme does not compromise the user experience as it requires only two short voice inputs.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44459665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Software‐defined networks‐enabled fog computing for IoT‐based healthcare: Security, challenges and opportunities 基于物联网的医疗保健的软件定义网络支持雾计算:安全、挑战和机遇
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-16 DOI: 10.1002/spy2.291
Malaram Kumhar, Jitendra Bhatia
The Internet of Things (IoT) is a crucial technology in the healthcare industry thanks to recent developments in automated data collection. Current statistics of the healthcare sector show that it is expanding at a remarkable rate. However, the performance of the healthcare system is impacted by many challenges, such as security, privacy, latency, scalability, and heterogeneity that come with advancement. Fog computing and software‐defined networks (SDN) are critical enabling technologies that help to improve IoT‐based healthcare systems by ensuring timely and reliable data provisioning for use in healthcare applications. SDN solves interoperability, device management, and network management issues and automates patient health monitoring without human interaction. SDN and fog computing in IoT‐based healthcare can optimize device communication and computing power at a low cost. SDN‐enabled fog computing has lower latency and better security than cloud‐based IoT healthcare architecture. The researchers have not entirely discovered SDN‐enabled fog computing to the best of our knowledge. This paper covers healthcare IoT technicalities and related technologies. We examined ways to merge SDN, fog computing, and IoT to improve healthcare solutions. Finally, we concluded the paper with research issues and future healthcare system improvements.
由于自动化数据收集的最新发展,物联网(IoT)是医疗保健行业的一项关键技术。医疗保健部门目前的统计数据显示,它正在以惊人的速度扩张。然而,医疗保健系统的性能受到许多挑战的影响,如安全性、隐私性、延迟、可扩展性和先进性带来的异构性。雾计算和软件定义网络(SDN)是关键的使能技术,通过确保医疗保健应用中使用的及时可靠的数据供应,有助于改进基于物联网的医疗保健系统。SDN解决了互操作性、设备管理和网络管理问题,并在无人机交互的情况下自动化了患者健康监测。基于物联网的医疗保健中的SDN和雾计算可以以低成本优化设备通信和计算能力。与基于云的物联网医疗架构相比,支持SDN的雾计算具有更低的延迟和更好的安全性。据我们所知,研究人员尚未完全发现支持SDN的雾计算。本文涵盖了医疗物联网技术和相关技术。我们研究了合并SDN、雾计算和物联网以改进医疗保健解决方案的方法。最后,我们总结了本文的研究问题和未来医疗体系的改进。
{"title":"Software‐defined networks‐enabled fog computing for IoT‐based healthcare: Security, challenges and opportunities","authors":"Malaram Kumhar, Jitendra Bhatia","doi":"10.1002/spy2.291","DOIUrl":"https://doi.org/10.1002/spy2.291","url":null,"abstract":"The Internet of Things (IoT) is a crucial technology in the healthcare industry thanks to recent developments in automated data collection. Current statistics of the healthcare sector show that it is expanding at a remarkable rate. However, the performance of the healthcare system is impacted by many challenges, such as security, privacy, latency, scalability, and heterogeneity that come with advancement. Fog computing and software‐defined networks (SDN) are critical enabling technologies that help to improve IoT‐based healthcare systems by ensuring timely and reliable data provisioning for use in healthcare applications. SDN solves interoperability, device management, and network management issues and automates patient health monitoring without human interaction. SDN and fog computing in IoT‐based healthcare can optimize device communication and computing power at a low cost. SDN‐enabled fog computing has lower latency and better security than cloud‐based IoT healthcare architecture. The researchers have not entirely discovered SDN‐enabled fog computing to the best of our knowledge. This paper covers healthcare IoT technicalities and related technologies. We examined ways to merge SDN, fog computing, and IoT to improve healthcare solutions. Finally, we concluded the paper with research issues and future healthcare system improvements.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45531674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Physical layer security using boundary technique for emerging wireless communication systems 基于边界技术的新兴无线通信系统物理层安全
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-11 DOI: 10.1002/spy2.288
I. A. Sikiru, L. Olawoyin, N. Faruk, A. Oloyede, A. Abdulkarim, Imam-Fulani Yusuf Olayinka, O. Sowande, Salisu Garba, A. Imoize
The broadcast nature of radio propagation in wireless communication has been suspected as the loopholes of passive or active attacks by unauthorized users (eavesdroppers). The physical layer security techniques operate at the lowest stack of OSI layer against conventional cryptographic approaches, operating at the upper layer. However, techniques such as channel coding, power (directional antenna and artificial noise), and spread spectrum have been (and continuously) deployed to safeguard against sophisticated attacks. Most of these deployments are theoretical, and a few are enhanced for efficient security against an intruder. In this article, a boundary technique approach is proposed and applied to the physical layer to improve its secrecy‐capacity and subdue adversary effects at the legitimate receiver. Hybrid performance metrics were adopted, and a Monte Carlo simulation was performed. The result obtained using secrecy outage probability, secrecy‐capacity, and intercept‐probability show that our proposed techniques enhance the secret transmission between the main transmitter and legitimate receiver. The simulation results were compared with the analytical methods. It was found that the channel between the transmitter and the main receiver has a better signal‐to‐noise ratio than the corresponding eavesdropper's channel. Conclusively, performance of the proposed technique is validated for applications in emerging wireless communication systems.
无线通信中无线电传播的广播性一直被怀疑是未经授权的用户(窃听者)被动或主动攻击的漏洞。物理层安全技术在OSI层的最低层运行,而传统的加密方法在上层运行。然而,诸如信道编码、功率(定向天线和人工噪声)和扩频等技术已经(并不断)被部署以防止复杂的攻击。这些部署中的大多数都是理论上的,其中一些是为了有效地防御入侵者而增强的。在本文中,提出了一种边界技术方法,并将其应用于物理层,以提高其保密能力并抑制合法接收方的敌对影响。采用混合性能指标,进行蒙特卡洛仿真。使用保密中断概率、保密容量和拦截概率得到的结果表明,我们提出的技术增强了主发送器和合法接收器之间的秘密传输。仿真结果与解析方法进行了比较。研究发现,发射机与主接收机之间的信道比窃听者的相应信道具有更好的信噪比。最后,在新兴的无线通信系统中验证了所提出技术的性能。
{"title":"Physical layer security using boundary technique for emerging wireless communication systems","authors":"I. A. Sikiru, L. Olawoyin, N. Faruk, A. Oloyede, A. Abdulkarim, Imam-Fulani Yusuf Olayinka, O. Sowande, Salisu Garba, A. Imoize","doi":"10.1002/spy2.288","DOIUrl":"https://doi.org/10.1002/spy2.288","url":null,"abstract":"The broadcast nature of radio propagation in wireless communication has been suspected as the loopholes of passive or active attacks by unauthorized users (eavesdroppers). The physical layer security techniques operate at the lowest stack of OSI layer against conventional cryptographic approaches, operating at the upper layer. However, techniques such as channel coding, power (directional antenna and artificial noise), and spread spectrum have been (and continuously) deployed to safeguard against sophisticated attacks. Most of these deployments are theoretical, and a few are enhanced for efficient security against an intruder. In this article, a boundary technique approach is proposed and applied to the physical layer to improve its secrecy‐capacity and subdue adversary effects at the legitimate receiver. Hybrid performance metrics were adopted, and a Monte Carlo simulation was performed. The result obtained using secrecy outage probability, secrecy‐capacity, and intercept‐probability show that our proposed techniques enhance the secret transmission between the main transmitter and legitimate receiver. The simulation results were compared with the analytical methods. It was found that the channel between the transmitter and the main receiver has a better signal‐to‐noise ratio than the corresponding eavesdropper's channel. Conclusively, performance of the proposed technique is validated for applications in emerging wireless communication systems.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44814256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Zero‐knowledge‐based distributed auditing protocol 基于零知识的分布式审计协议
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-25 DOI: 10.1002/spy2.289
Saeed Banaeian Far, M. R. Asaar, Afrooz Haghbin
Blockchain‐based data outsourcing has attracted a huge deal of attention in recent years. However, key management and reliance on pre‐defined or randomly‐selected third‐party auditors (TPAs) are still challenging owing to refusing to collaborate or break auditing policies. Additionally, it is impossible to store secrets in smart contracts (SCs) for signing or auditing. Thus, in the present study, a zero‐knowledge (ZK)‐based distributed auditing protocol (DAP) is provided. In this protocol, a user‐based key generation mechanism offers users security against curious authorities based on no TPA causing them to reveal no knowledge about under‐auditing data. Based on Pointcheval's and Sanders's signature scheme, as a ZK‐based randomizable signature applied in an SC to handle the auditing process, the proposed DAP provides confidential transactions and user accountability. Evaluation indicates that the proposed ZK‐based DAP is efficient for the user side and it is the fastest DAP in the blockchain.
近年来,基于区块链的数据外包引起了人们的极大关注。然而,由于拒绝合作或违反审计政策,关键管理和对预先定义或随机选择的第三方审计师(TPA)的依赖仍然具有挑战性。此外,不可能将机密存储在智能合约(SC)中以供签署或审核。因此,在本研究中,提供了一种基于零知识(ZK)的分布式审计协议(DAP)。在该协议中,基于用户的密钥生成机制为用户提供了安全性,使其免受基于非TPA的好奇权威机构的攻击,从而使他们对审计不足的数据一无所知。基于Pointcheval和Sanders的签名方案,作为应用于SC中处理审计过程的基于ZK的可随机化签名,所提出的DAP提供了机密交易和用户责任。评估表明,所提出的基于ZK的DAP对用户端是有效的,是区块链中最快的DAP。
{"title":"Zero‐knowledge‐based distributed auditing protocol","authors":"Saeed Banaeian Far, M. R. Asaar, Afrooz Haghbin","doi":"10.1002/spy2.289","DOIUrl":"https://doi.org/10.1002/spy2.289","url":null,"abstract":"Blockchain‐based data outsourcing has attracted a huge deal of attention in recent years. However, key management and reliance on pre‐defined or randomly‐selected third‐party auditors (TPAs) are still challenging owing to refusing to collaborate or break auditing policies. Additionally, it is impossible to store secrets in smart contracts (SCs) for signing or auditing. Thus, in the present study, a zero‐knowledge (ZK)‐based distributed auditing protocol (DAP) is provided. In this protocol, a user‐based key generation mechanism offers users security against curious authorities based on no TPA causing them to reveal no knowledge about under‐auditing data. Based on Pointcheval's and Sanders's signature scheme, as a ZK‐based randomizable signature applied in an SC to handle the auditing process, the proposed DAP provides confidential transactions and user accountability. Evaluation indicates that the proposed ZK‐based DAP is efficient for the user side and it is the fastest DAP in the blockchain.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44135972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reputation‐based partition scheme for IoT security 物联网安全的基于信誉的分区方案
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-23 DOI: 10.1002/spy2.287
Zhikui Chen, Muhammad Zeeshan Haider, Naiwen Luo, Shuo Yu, Xu Yuan, Yaochen Zhang, Tayyaba Noreen
With the popularity of smart terminals, such as the Internet of Things, crowdsensing is an emerging data aggregation paradigm, which plays a pivotal role in data‐driven applications. There are some key issues in the development of crowdsensing such as platform security and privacy protection. As the crowdsensing is usually managed by a centralized platform, centralized management will bring various security vulnerabilities and scalability issues. To solve these issues, an effective reputation‐based partition scheme (RSPC) is proposed in this article. The partition scheme calculates the optimal partition size by combining the node reputation value and divides the node into several disjoint partitions according to the node reputation value. By selecting the appropriate partition size, RSPC provides a mechanism to ensure that each partition is valid, as long as the maximum permissible threshold for the failed node is observed. At the same time, the RSPC reorganizes the network periodically to avoid partition attacks. In addition, for cross‐partition transactions, this paper innovatively proposes a four‐stage confirmation protocol to ensure the efficient and safe completion of cross‐partition transactions. Finally, experiments show that RSPC improves scalability, low latency, and high throughput for crowdsensing.
随着物联网等智能终端的普及,众测是一种新兴的数据聚合模式,在数据驱动应用中发挥着举足轻重的作用。在众筹的发展过程中,存在着平台安全和隐私保护等关键问题。由于众测通常采用集中式平台进行管理,集中式管理会带来各种安全漏洞和可扩展性问题。为了解决这些问题,本文提出了一种有效的基于信誉的分区方案(RSPC)。分区方案通过结合节点的信誉值计算出最优的分区大小,并根据节点的信誉值将节点划分为多个不相交的分区。通过选择适当的分区大小,RSPC提供了一种机制来确保每个分区都是有效的,只要观察到故障节点的最大允许阈值。同时,RSPC定期对网络进行重组,避免分区攻击。此外,对于跨分区交易,本文创新性地提出了一种四阶段确认协议,以确保跨分区交易的高效、安全完成。最后,实验表明,RSPC提高了群体感知的可扩展性、低延迟和高吞吐量。
{"title":"Reputation‐based partition scheme for IoT security","authors":"Zhikui Chen, Muhammad Zeeshan Haider, Naiwen Luo, Shuo Yu, Xu Yuan, Yaochen Zhang, Tayyaba Noreen","doi":"10.1002/spy2.287","DOIUrl":"https://doi.org/10.1002/spy2.287","url":null,"abstract":"With the popularity of smart terminals, such as the Internet of Things, crowdsensing is an emerging data aggregation paradigm, which plays a pivotal role in data‐driven applications. There are some key issues in the development of crowdsensing such as platform security and privacy protection. As the crowdsensing is usually managed by a centralized platform, centralized management will bring various security vulnerabilities and scalability issues. To solve these issues, an effective reputation‐based partition scheme (RSPC) is proposed in this article. The partition scheme calculates the optimal partition size by combining the node reputation value and divides the node into several disjoint partitions according to the node reputation value. By selecting the appropriate partition size, RSPC provides a mechanism to ensure that each partition is valid, as long as the maximum permissible threshold for the failed node is observed. At the same time, the RSPC reorganizes the network periodically to avoid partition attacks. In addition, for cross‐partition transactions, this paper innovatively proposes a four‐stage confirmation protocol to ensure the efficient and safe completion of cross‐partition transactions. Finally, experiments show that RSPC improves scalability, low latency, and high throughput for crowdsensing.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48550158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure quantum computing for healthcare sector: A short analysis 医疗保健领域的安全量子计算:简短分析
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-18 DOI: 10.1002/spy2.293
Srikanth Pulipeti, Adarsh Kumar
Quantum computing research might lead to “quantum leaps,” and it could have unanticipated repercussions in the medical field. This technique has the potential to be used in a broad range of contexts, some of which include the development of novel drugs, the individualization of medical treatments, and the speeding of deoxyribonucleic acid sequencing. This work has assembled a list of the numerous methodologies presently employed in quantum medicine and other disciplines pertaining to healthcare. This work has created a list of the most critical concerns that need to be addressed before the broad use of quantum computing can be realized. In addition, this work investigates in detail the ways in which potential future applications of quantum computing might compromise the safety of healthcare delivery systems from the perspective of the medical industry and the patient‐centric healthcare system. The primary objective of this investigation into quantum cryptography is to locate any potential flaws in the cryptographic protocols and strategies that have only very recently been the focus of scrutiny from academic research community members.
量子计算研究可能会带来“量子飞跃”,并可能在医疗领域产生意想不到的影响。这项技术具有广泛应用的潜力,其中一些包括新药的开发、医疗的个体化以及脱氧核糖核酸测序的加速。这项工作汇集了目前在量子医学和其他与医疗保健有关的学科中使用的众多方法的列表。这项工作列出了在实现量子计算的广泛应用之前需要解决的最关键问题。此外,本研究还从医疗行业和以患者为中心的医疗保健系统的角度,详细研究了量子计算的潜在未来应用可能危及医疗保健提供系统安全的方式。对量子密码学进行调查的主要目的是定位加密协议和策略中的任何潜在缺陷,这些缺陷直到最近才成为学术研究界成员审查的焦点。
{"title":"Secure quantum computing for healthcare sector: A short analysis","authors":"Srikanth Pulipeti, Adarsh Kumar","doi":"10.1002/spy2.293","DOIUrl":"https://doi.org/10.1002/spy2.293","url":null,"abstract":"Quantum computing research might lead to “quantum leaps,” and it could have unanticipated repercussions in the medical field. This technique has the potential to be used in a broad range of contexts, some of which include the development of novel drugs, the individualization of medical treatments, and the speeding of deoxyribonucleic acid sequencing. This work has assembled a list of the numerous methodologies presently employed in quantum medicine and other disciplines pertaining to healthcare. This work has created a list of the most critical concerns that need to be addressed before the broad use of quantum computing can be realized. In addition, this work investigates in detail the ways in which potential future applications of quantum computing might compromise the safety of healthcare delivery systems from the perspective of the medical industry and the patient‐centric healthcare system. The primary objective of this investigation into quantum cryptography is to locate any potential flaws in the cryptographic protocols and strategies that have only very recently been the focus of scrutiny from academic research community members.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45663184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Efficient and secure e‐voting scheme using elliptic curve cryptography 使用椭圆曲线密码的高效安全的电子投票方案
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-11 DOI: 10.1002/spy2.283
Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, M. Khan, Mou Dasgupta
Voting allows the people to elect their representative and express their preferences. In modern day democracy, voting is one fundamental and most important tool for election. To strengthen this process, efforts must be made to achieve a confirmable and transparent voting system. Naturally, the veracity of the election process is of ultimate importance for the honor of the democracy itself. The online voting or e‐voting system is a cost‐effective procedure, which saves a lot of money and time spent for organizing the election. However, security, integrity of data and privacy of the voter are the increasing concerns in this context. In this paper, we have done a thorough literature survey of the various latest schemes in this context and found that the schemes prone to several security and privacy threats. Moreover, a major issue with all these schemes is that they are inefficient in terms of computation and communication overheads. With this motivation, we present a novel and efficient e‐voting scheme to tackle the security and privacy concerns. The proposed scheme is designed using the concept of blind signature, anonymous channel and trust worthy entities where elliptic curve cryptography (ECC) works as a backbone. The proposed scheme is formally evaluated using well known AVISPA simulation tool, which simulates the attack model using CL‐AtSe as well as OFMC backend according to Dolev‐Yao threat model. In both the cases, all the possible security threats are being nullified by the proposed scheme and results in safe communication. Also, the scheme is analyzed against all the possible attacks that jeopardize the integrity of the existing voting systems. Moreover, the proposed scheme is also compared with other prevailing schemes in terms of computation and communication overheads and found more efficient.
投票允许人们选出他们的代表并表达他们的偏好。在现代民主制度下,投票是选举最基本、最重要的手段之一。为了加强这一进程,必须努力实现一个可确认和透明的投票制度。当然,选举过程的真实性对民主本身的荣誉至关重要。网上投票或电子投票系统是一种成本效益高的程序,节省了组织选举所花费的大量金钱和时间。然而,在这种情况下,选民的安全、数据完整性和隐私日益受到关注。在本文中,我们对这方面的各种最新方案进行了全面的文献调查,发现这些方案容易受到几种安全和隐私威胁。此外,所有这些方案的一个主要问题是,它们在计算和通信开销方面效率低下。基于这种动机,我们提出了一种新颖有效的电子投票方案来解决安全和隐私问题。该方案以椭圆曲线密码学(ECC)为骨干,采用盲签名、匿名通道和可信实体的概念进行设计。该方案使用著名的AVISPA仿真工具进行了正式评估,该工具使用CL‐AtSe模拟攻击模型,并根据Dolev‐Yao威胁模型模拟OFMC后端。在这两种情况下,所提出的方案都消除了所有可能的安全威胁,从而实现了安全的通信。此外,该方案还针对所有可能危及现有投票系统完整性的攻击进行了分析。此外,在计算和通信开销方面也与其他主流方案进行了比较,发现该方案更有效。
{"title":"Efficient and secure e‐voting scheme using elliptic curve cryptography","authors":"Uddalak Chatterjee, Sangram Ray, Sharmistha Adhikari, M. Khan, Mou Dasgupta","doi":"10.1002/spy2.283","DOIUrl":"https://doi.org/10.1002/spy2.283","url":null,"abstract":"Voting allows the people to elect their representative and express their preferences. In modern day democracy, voting is one fundamental and most important tool for election. To strengthen this process, efforts must be made to achieve a confirmable and transparent voting system. Naturally, the veracity of the election process is of ultimate importance for the honor of the democracy itself. The online voting or e‐voting system is a cost‐effective procedure, which saves a lot of money and time spent for organizing the election. However, security, integrity of data and privacy of the voter are the increasing concerns in this context. In this paper, we have done a thorough literature survey of the various latest schemes in this context and found that the schemes prone to several security and privacy threats. Moreover, a major issue with all these schemes is that they are inefficient in terms of computation and communication overheads. With this motivation, we present a novel and efficient e‐voting scheme to tackle the security and privacy concerns. The proposed scheme is designed using the concept of blind signature, anonymous channel and trust worthy entities where elliptic curve cryptography (ECC) works as a backbone. The proposed scheme is formally evaluated using well known AVISPA simulation tool, which simulates the attack model using CL‐AtSe as well as OFMC backend according to Dolev‐Yao threat model. In both the cases, all the possible security threats are being nullified by the proposed scheme and results in safe communication. Also, the scheme is analyzed against all the possible attacks that jeopardize the integrity of the existing voting systems. Moreover, the proposed scheme is also compared with other prevailing schemes in terms of computation and communication overheads and found more efficient.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48268240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1