首页 > 最新文献

Security and Privacy最新文献

英文 中文
A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges 在线社交网络安全和隐私问题的综合调查:威胁、基于机器学习的解决方案和公开挑战
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-17 DOI: 10.1002/spy2.275
Munmun Bhattacharya, Sandipan Roy, Samiran Chattopadhyay, A. Das, Sachin Shetty
Over the past few years, online social networks (OSNs) have become an inseparable part of people's daily lives. Instead of being passive readers, people are now enjoying their role as content contributors. OSN has permitted its users to share their information including the multimedia content. OSN users can express themselves in virtual communities by providing their opinions and interacting with others. As a consequence, the privacy and security threats in OSNs have emerged as a major concern to the research and business world. In the recent past, a number of survey works have been conducted to discuss different security and privacy threats in OSNs. However, till date, no survey work has been conducted that aims to classify and analyze various machine learning (ML)‐based solutions adapted for the security defense of OSNs. In this survey article, we present a detailed taxonomy with a classification of various works done on various security attacks in OSNs. We then review and summarize the existing state of art survey works on OSN security, and indicate the merits and limitations of these survey works. Next, we review all recent works that aim to provide ML‐based solutions toward defense of security attacks on OSNs. Finally, we discuss the future road‐map on OSN security and provide a comprehensive analysis on the open research issues with feasible measurements and possible solutions.
在过去的几年里,在线社交网络已经成为人们日常生活中不可分割的一部分。人们不再是被动的读者,而是享受他们作为内容贡献者的角色。OSN已经允许其用户共享他们的信息,包括多媒体内容。OSN用户可以通过提供自己的意见和与他人互动,在虚拟社区中表达自己。因此,OSN中的隐私和安全威胁已成为研究和商业界关注的主要问题。在最近的一段时间里,已经进行了大量的调查工作来讨论OSN中的不同安全和隐私威胁。然而,到目前为止,还没有进行过旨在对适用于OSN安全防御的各种基于机器学习(ML)的解决方案进行分类和分析的调查工作。在这篇调查文章中,我们提出了一个详细的分类法,对OSN中各种安全攻击所做的各种工作进行了分类。然后,我们回顾和总结了现有的OSN安全调查工作,并指出了这些调查工作的优点和局限性。接下来,我们回顾了最近的所有工作,这些工作旨在为OSN上的安全攻击提供基于ML的解决方案。最后,我们讨论了OSN安全的未来路线图,并对开放研究问题进行了全面分析,提出了可行的措施和可能的解决方案。
{"title":"A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges","authors":"Munmun Bhattacharya, Sandipan Roy, Samiran Chattopadhyay, A. Das, Sachin Shetty","doi":"10.1002/spy2.275","DOIUrl":"https://doi.org/10.1002/spy2.275","url":null,"abstract":"Over the past few years, online social networks (OSNs) have become an inseparable part of people's daily lives. Instead of being passive readers, people are now enjoying their role as content contributors. OSN has permitted its users to share their information including the multimedia content. OSN users can express themselves in virtual communities by providing their opinions and interacting with others. As a consequence, the privacy and security threats in OSNs have emerged as a major concern to the research and business world. In the recent past, a number of survey works have been conducted to discuss different security and privacy threats in OSNs. However, till date, no survey work has been conducted that aims to classify and analyze various machine learning (ML)‐based solutions adapted for the security defense of OSNs. In this survey article, we present a detailed taxonomy with a classification of various works done on various security attacks in OSNs. We then review and summarize the existing state of art survey works on OSN security, and indicate the merits and limitations of these survey works. Next, we review all recent works that aim to provide ML‐based solutions toward defense of security attacks on OSNs. Finally, we discuss the future road‐map on OSN security and provide a comprehensive analysis on the open research issues with feasible measurements and possible solutions.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45393375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Enhanced pairing‐free identity‐based broadcast authentication protocol in WSN using ElGamal ECC 基于ElGamal ECC的无线传感器网络中增强的无配对身份广播认证协议
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-17 DOI: 10.1002/spy2.278
Vivek Kumar, Sangram Ray, Dipanwita Sadhukhan, Jayashree Karmakar, Mou Dasgupta
Authentication among the various communicating devices within wireless sensor networks during broadcasting is most significant among the other primary security services. This authentication during broadcasting services allows multiple mobile end‐devices to transmit messages dynamically and securely for fasten consumer tracking and sustaining privacy of the data transferred in the insecure sensor network. To enhance this authentication protocol for secure end‐users message distribution, this research work has introduced a novel identity (ID) based cryptographic technique that employs ElGmal‐elliptic‐curve cryptography and digital signature without implementing bilinear paring operation to reduce huge burden of computation overhead. Additionally, to accelerate the performance of the proposed authentication protocol, the size of the signature along with the encryption key is minimized. Eventually, the authentication protocol provides comparatively less computational complexity with secure and faster key management. The performance analysis supports the aforesaid claim as well as reflects the supremacy of the proposed scheme over the handover authentication protocol and bilinear pairings based authentication schemes.
在其他主要安全服务中,在广播期间无线传感器网络内的各种通信设备之间的认证是最重要的。广播服务期间的这种身份验证允许多个移动终端设备动态、安全地传输消息,以加强消费者跟踪,并保持在不安全的传感器网络中传输的数据的隐私。为了增强这种用于安全终端用户消息分发的身份验证协议,本研究工作引入了一种新的基于身份(ID)的加密技术,该技术采用ElGmal椭圆曲线加密和数字签名,而不实现双线性配对操作,以减少巨大的计算开销。此外,为了加速所提出的认证协议的性能,签名和加密密钥的大小被最小化。最终,身份验证协议提供了相对较低的计算复杂性和安全且更快的密钥管理。性能分析支持上述权利要求,并反映了所提出的方案优于切换认证协议和基于双线性配对的认证方案。
{"title":"Enhanced pairing‐free identity‐based broadcast authentication protocol in WSN using ElGamal ECC","authors":"Vivek Kumar, Sangram Ray, Dipanwita Sadhukhan, Jayashree Karmakar, Mou Dasgupta","doi":"10.1002/spy2.278","DOIUrl":"https://doi.org/10.1002/spy2.278","url":null,"abstract":"Authentication among the various communicating devices within wireless sensor networks during broadcasting is most significant among the other primary security services. This authentication during broadcasting services allows multiple mobile end‐devices to transmit messages dynamically and securely for fasten consumer tracking and sustaining privacy of the data transferred in the insecure sensor network. To enhance this authentication protocol for secure end‐users message distribution, this research work has introduced a novel identity (ID) based cryptographic technique that employs ElGmal‐elliptic‐curve cryptography and digital signature without implementing bilinear paring operation to reduce huge burden of computation overhead. Additionally, to accelerate the performance of the proposed authentication protocol, the size of the signature along with the encryption key is minimized. Eventually, the authentication protocol provides comparatively less computational complexity with secure and faster key management. The performance analysis supports the aforesaid claim as well as reflects the supremacy of the proposed scheme over the handover authentication protocol and bilinear pairings based authentication schemes.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48338655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demystifying quantum blockchain for healthcare 为医疗保健揭开量子区块链的神秘面纱
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-07 DOI: 10.1002/spy2.284
Keshav Kaushik, Adarsh Kumar
The healthcare industry and the battle against the COVID‐19 pandemic are two areas where blockchain technology might be useful. In this study, blockchain's significance is examined. Blockchain technology and related procedures will be used in future healthcare systems for collecting sensor data, automated patient monitoring, and safe data storage. Because it can store a large amount of data in a dispersed and secure way and provide access whenever and wherever it is needed, this technology greatly simplifies the process of carrying out activities. The advantages of quantum computing, such as the speed with which patients can be found and monitored, may be fully used with the help of quantum blockchain. Quantum blockchain is an additional resource that may be used to safeguard the veracity, integrity, and availability of stored information. Combining quantum computing with blockchain technology may allow faster and more secure medical information processing. In this research, the authors examine the potential uses of blockchain and quantum technology in the healthcare industry. Quantum technologies, blockchain‐based technologies, and other cutting‐edge ICTs (such as ratification intelligence, machine learning, drones, and so on) were investigated and contrasted in this article.
医疗保健行业和抗击COVID - 19大流行是区块链技术可能发挥作用的两个领域。在本研究中,我们检验了区块链的意义。区块链技术和相关程序将在未来的医疗保健系统中用于收集传感器数据、自动患者监测和安全数据存储。由于它可以以分散和安全的方式存储大量数据,并且可以随时随地提供需要的访问,因此该技术大大简化了开展活动的过程。量子计算的优势,比如发现和监测病人的速度,可以在量子区块链的帮助下得到充分利用。量子区块链是一种额外的资源,可用于保护存储信息的准确性、完整性和可用性。将量子计算与区块链技术相结合,可以实现更快、更安全的医疗信息处理。在这项研究中,作者研究了区块链和量子技术在医疗保健行业的潜在用途。本文对量子技术、基于区块链的技术和其他尖端信息通信技术(如批准情报、机器学习、无人机等)进行了研究和对比。
{"title":"Demystifying quantum blockchain for healthcare","authors":"Keshav Kaushik, Adarsh Kumar","doi":"10.1002/spy2.284","DOIUrl":"https://doi.org/10.1002/spy2.284","url":null,"abstract":"The healthcare industry and the battle against the COVID‐19 pandemic are two areas where blockchain technology might be useful. In this study, blockchain's significance is examined. Blockchain technology and related procedures will be used in future healthcare systems for collecting sensor data, automated patient monitoring, and safe data storage. Because it can store a large amount of data in a dispersed and secure way and provide access whenever and wherever it is needed, this technology greatly simplifies the process of carrying out activities. The advantages of quantum computing, such as the speed with which patients can be found and monitored, may be fully used with the help of quantum blockchain. Quantum blockchain is an additional resource that may be used to safeguard the veracity, integrity, and availability of stored information. Combining quantum computing with blockchain technology may allow faster and more secure medical information processing. In this research, the authors examine the potential uses of blockchain and quantum technology in the healthcare industry. Quantum technologies, blockchain‐based technologies, and other cutting‐edge ICTs (such as ratification intelligence, machine learning, drones, and so on) were investigated and contrasted in this article.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41699259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
ECAAP‐SG: Efficient certificateless anonymous authentication protocol for SG ECAAP‐SG: SG的高效无证书匿名认证协议
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-05 DOI: 10.1002/spy2.273
Egide Nkurunziza, Lawrence Tandoh, Issameldeen Elfadul, Fagen Li
A smart meter (SM) is an essential device within a smart grid (SG). It collects electrical power data from the customer and reports it to the service provider at regular intervals. Unfortunately, these regular reports may disclose confidential customer information without their knowledge. Moreover, SM is a device with limited resources, which means it cannot manage heavy security protocols. To mitigate these problems, an efficient certificateless anonymous authentication protocol for SG (ECAAP‐SG) protocol was designed. It cannot allow an adversary to tap into the communication channel and access exchanged information. In addition, the designed scheme fits SM's resource capacity. Furthermore, the authentication security provided by ECAAP‐SG guarantees that legal entities are communicating. Moreover, ECAAP‐SG provides key agreement security that establishes the session key. The established session key will be used to secure future communication. Besides, a random oracle model is used for the security analysis of the proposed protocol, and we prove that it is secure under the discrete logarithm problem and the computational Diffie–Hellman problem.
智能电表是智能电网中必不可少的设备。它从客户那里收集电力数据,并定期向服务提供商报告。不幸的是,这些常规报告可能会在客户不知情的情况下泄露机密客户信息。此外,SM是一种资源有限的设备,这意味着它无法管理繁重的安全协议。为了解决这些问题,设计了一种高效的无证书匿名认证协议(ECAAP - SG)。它不能允许对手进入通信通道并访问交换的信息。此外,所设计的方案符合SM的资源容量。此外,ECAAP - SG提供的认证安全性保证了法律实体之间的通信。此外,ECAAP - SG还提供了建立会话密钥的密钥协议安全性。建立的会话密钥将用于保护未来的通信。利用随机oracle模型对该协议进行了安全性分析,并证明了该协议在离散对数问题和计算型Diffie-Hellman问题下是安全的。
{"title":"ECAAP‐SG: Efficient certificateless anonymous authentication protocol for SG","authors":"Egide Nkurunziza, Lawrence Tandoh, Issameldeen Elfadul, Fagen Li","doi":"10.1002/spy2.273","DOIUrl":"https://doi.org/10.1002/spy2.273","url":null,"abstract":"A smart meter (SM) is an essential device within a smart grid (SG). It collects electrical power data from the customer and reports it to the service provider at regular intervals. Unfortunately, these regular reports may disclose confidential customer information without their knowledge. Moreover, SM is a device with limited resources, which means it cannot manage heavy security protocols. To mitigate these problems, an efficient certificateless anonymous authentication protocol for SG (ECAAP‐SG) protocol was designed. It cannot allow an adversary to tap into the communication channel and access exchanged information. In addition, the designed scheme fits SM's resource capacity. Furthermore, the authentication security provided by ECAAP‐SG guarantees that legal entities are communicating. Moreover, ECAAP‐SG provides key agreement security that establishes the session key. The established session key will be used to secure future communication. Besides, a random oracle model is used for the security analysis of the proposed protocol, and we prove that it is secure under the discrete logarithm problem and the computational Diffie–Hellman problem.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47797538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A provably secure, shortest, and efficient identity based signcryption technique in the standard model 标准模型中一种可证明安全、最短和高效的基于身份的签密技术
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-03 DOI: 10.1002/spy2.272
Ashutosh Aithekar, Pratik Gupta, Dharminder Dharminder
Singcryption is a very important concept to bind confidentiality and authenticity. This is a logical step to reduce both computation and communication costs. The proposed an identity based signcryption that removes the overhead of certificates. The proposed design is provably secure in the standard model (a widely accepted model). Furthermore, the IBSC design uses modified bilinear Diffie‐Hellman inversion and modified strong bilinear Diffie‐Hellman assumption as building blocks of the security. The proposed design is secure, efficient, and shortest to the best of our knowledge. In this design, a user does pairing free computation, and he sends only a triplet on the public channel, that makes it efficient in terms of computation and communication costs.
Singcryption是一个绑定机密性和真实性的重要概念。这是减少计算和通信成本的一个合乎逻辑的步骤。提出了一种基于身份的签名加密,它消除了证书的开销。所提出的设计在标准模型(一个被广泛接受的模型)中是安全的。此外,IBSC设计采用改进的双线性Diffie‐Hellman反演和改进的强双线性Diffie‐Hellman假设作为安全性的构建块。据我们所知,所提出的设计是安全、高效和最短的。在这个设计中,用户进行配对自由计算,他只在公共通道上发送一个三元组,这使得它在计算和通信成本方面都是高效的。
{"title":"A provably secure, shortest, and efficient identity based signcryption technique in the standard model","authors":"Ashutosh Aithekar, Pratik Gupta, Dharminder Dharminder","doi":"10.1002/spy2.272","DOIUrl":"https://doi.org/10.1002/spy2.272","url":null,"abstract":"Singcryption is a very important concept to bind confidentiality and authenticity. This is a logical step to reduce both computation and communication costs. The proposed an identity based signcryption that removes the overhead of certificates. The proposed design is provably secure in the standard model (a widely accepted model). Furthermore, the IBSC design uses modified bilinear Diffie‐Hellman inversion and modified strong bilinear Diffie‐Hellman assumption as building blocks of the security. The proposed design is secure, efficient, and shortest to the best of our knowledge. In this design, a user does pairing free computation, and he sends only a triplet on the public channel, that makes it efficient in terms of computation and communication costs.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44388350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A context‐aware internet of things‐driven security scheme for smart homes 智能家居的上下文感知物联网驱动安全方案
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-30 DOI: 10.1002/spy2.269
Pimal Khanpara, Kruti Lavingia, Rajvi Trivedi, S. Tanwar, Amit Verma, Ravi Sharma
In recent years, the Internet of Things (IoT) has become very popular as it has numerous applications in the industrial and research domain. Moreover, the features of IoT systems play a crucial role in the development of smart cities. It enables smart cities and their subsystems to monitor, control, and manage heterogeneous devices remotely by extracting and communicating real‐time data. However, automated IoT systems are vulnerable to many security threats like tempered protocols, device hijacking, and unauthorized access. Motivated by the aforementioned discussion, this paper addresses the security requirements of an essential subsystem of smart city architecture, that is, IoT‐based smart homes. Based on the features and functionalities of smart homes, the risk of security violations in the system behavior needs to be analyzed This paper explores various security threats in a smart home environment and proposes a context‐aware security‐based scheme to prevent and detect possible threats. Results show that the proposed scheme is superior compared to the traditional schemes considering parameters such as the performance, cost, and maintenance requirements.
近年来,物联网(IoT)在工业和研究领域有着广泛的应用,因此变得非常流行。此外,物联网系统的特点在智能城市的发展中发挥着至关重要的作用。它使智能城市及其子系统能够通过提取和通信实时数据来远程监控、控制和管理异构设备。然而,自动化物联网系统容易受到许多安全威胁,如强化协议、设备劫持和未经授权的访问。受上述讨论的启发,本文讨论了智能城市架构的一个重要子系统,即基于物联网的智能家居的安全要求。基于智能家居的特点和功能,需要分析系统行为中的安全违规风险。本文探讨了智能家居环境中的各种安全威胁,并提出了一种基于上下文感知的安全方案来预防和检测可能的威胁。结果表明,在考虑性能、成本和维护要求等参数的情况下,该方案优于传统方案。
{"title":"A context‐aware internet of things‐driven security scheme for smart homes","authors":"Pimal Khanpara, Kruti Lavingia, Rajvi Trivedi, S. Tanwar, Amit Verma, Ravi Sharma","doi":"10.1002/spy2.269","DOIUrl":"https://doi.org/10.1002/spy2.269","url":null,"abstract":"In recent years, the Internet of Things (IoT) has become very popular as it has numerous applications in the industrial and research domain. Moreover, the features of IoT systems play a crucial role in the development of smart cities. It enables smart cities and their subsystems to monitor, control, and manage heterogeneous devices remotely by extracting and communicating real‐time data. However, automated IoT systems are vulnerable to many security threats like tempered protocols, device hijacking, and unauthorized access. Motivated by the aforementioned discussion, this paper addresses the security requirements of an essential subsystem of smart city architecture, that is, IoT‐based smart homes. Based on the features and functionalities of smart homes, the risk of security violations in the system behavior needs to be analyzed This paper explores various security threats in a smart home environment and proposes a context‐aware security‐based scheme to prevent and detect possible threats. Results show that the proposed scheme is superior compared to the traditional schemes considering parameters such as the performance, cost, and maintenance requirements.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49295670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Security in 5G and beyond recent advances and future challenges 5G的安全以及近期的进展和未来的挑战
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-29 DOI: 10.1002/spy2.271
Fatima Salahdine, Tao Han, Ning Zhang
5G, 6G, and beyond (xG) technologies aim at delivering emerging services with new requirements and challenges, enabling full and hyper mobile connectivity over the world. These beyond 5G networks are expected to ensure better quality of service, very high data rate, improved network security, high capacity, low latency, and low cost. In order to meet these objectives, a number of key enabler technologies have been proposed including massive multiple input multiple output, small cells, mobile edge computing, software defined network, network function virtualization, heterogeneous networks, network slicing, cloud radio access network, ultra‐dense network, energy efficiency, and spectrum sharing. Although, the potential interest of these technologies in the network, they opened the door to many security concerns and challenges making the network security one of the primary concerns of the future wireless communication networks. In this article, we investigated the recent advancements on the xG security issues resulted by each key enabler technologies. We analyzed how to secure the network while meeting the emerging promising services, users' demands, and service requirements. We also discussed how the security issues raised by these emerging technologies can be mitigated for efficient and secure communication.
5G、6G及以上(xG)技术旨在提供具有新需求和新挑战的新兴业务,从而在全球范围内实现全面和超移动连接。这些超越5G的网络有望确保更好的服务质量、非常高的数据速率、改进的网络安全性、高容量、低延迟和低成本。为了实现这些目标,已经提出了许多关键的使能技术,包括大规模多输入多输出、小蜂窝、移动边缘计算、软件定义网络、网络功能虚拟化、异构网络、网络切片、云无线接入网、超密集网络、能源效率和频谱共享。尽管这些技术在网络中的潜在利益,它们打开了许多安全问题和挑战的大门,使网络安全成为未来无线通信网络的主要关注点之一。在本文中,我们研究了由每种关键启用技术导致的xG安全问题的最新进展。分析了如何在满足新兴的有前景的业务、用户需求和业务需求的同时保证网络的安全。我们还讨论了如何缓解这些新兴技术带来的安全问题,以实现高效和安全的通信。
{"title":"Security in 5G and beyond recent advances and future challenges","authors":"Fatima Salahdine, Tao Han, Ning Zhang","doi":"10.1002/spy2.271","DOIUrl":"https://doi.org/10.1002/spy2.271","url":null,"abstract":"5G, 6G, and beyond (xG) technologies aim at delivering emerging services with new requirements and challenges, enabling full and hyper mobile connectivity over the world. These beyond 5G networks are expected to ensure better quality of service, very high data rate, improved network security, high capacity, low latency, and low cost. In order to meet these objectives, a number of key enabler technologies have been proposed including massive multiple input multiple output, small cells, mobile edge computing, software defined network, network function virtualization, heterogeneous networks, network slicing, cloud radio access network, ultra‐dense network, energy efficiency, and spectrum sharing. Although, the potential interest of these technologies in the network, they opened the door to many security concerns and challenges making the network security one of the primary concerns of the future wireless communication networks. In this article, we investigated the recent advancements on the xG security issues resulted by each key enabler technologies. We analyzed how to secure the network while meeting the emerging promising services, users' demands, and service requirements. We also discussed how the security issues raised by these emerging technologies can be mitigated for efficient and secure communication.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42750877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Providing robust and reversible watermarking algorithm and detection of malicious manipulation 提供鲁棒可逆的水印算法和恶意操作检测
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-29 DOI: 10.1002/spy2.270
Hamidreza Damghani, Soheila Estaji, Leila Damghani
In this article, due to the importance of embedding encrypted information in the image, a watermarking method is proposed based on local statistics in pixels. The advantages of the proposed method include its complete reversibility and very high security, which is due to the use of the quadtree concept, finding similar parts in the image, and embedding information in low‐energy and less significant pixels. This method is an alternative and simplifier of the quadtree method, dividing the image into identical non‐overlapping blocks and then choosing the block with less energy as more suitable for watermarking. Also, two criteria of mean‐squared‐error and peak signal‐to‐noise ratio (PSNR) have been calculated and the PSNR shows that image quality has not changed too much after hiding the information than the original image. It should be noted that since the proposed method is applied to black and white images, the result can be generalized to different color channels in the image, and color images have more visible capabilities in terms of cached memory than black and white images because they contain three dimensions of information.
鉴于在图像中嵌入加密信息的重要性,本文提出了一种基于像素局部统计的水印方法。所提出的方法的优点包括其完全可逆性和非常高的安全性,这是由于使用了四叉树概念,在图像中找到相似的部分,并将信息嵌入低能量和低重要性的像素中。该方法是四叉树方法的替代和简化方法,将图像划分为相同的非重叠块,然后选择能量较小的块作为更适合水印的块。此外,还计算了均方误差和峰值信噪比(PSNR)这两个标准,PSNR表明,在隐藏信息后,图像质量没有比原始图像变化太大。应该注意的是,由于所提出的方法应用于黑白图像,因此可以将结果推广到图像中的不同颜色通道,并且彩色图像在缓存内存方面比黑白图像具有更明显的能力,因为它们包含三维信息。
{"title":"Providing robust and reversible watermarking algorithm and detection of malicious manipulation","authors":"Hamidreza Damghani, Soheila Estaji, Leila Damghani","doi":"10.1002/spy2.270","DOIUrl":"https://doi.org/10.1002/spy2.270","url":null,"abstract":"In this article, due to the importance of embedding encrypted information in the image, a watermarking method is proposed based on local statistics in pixels. The advantages of the proposed method include its complete reversibility and very high security, which is due to the use of the quadtree concept, finding similar parts in the image, and embedding information in low‐energy and less significant pixels. This method is an alternative and simplifier of the quadtree method, dividing the image into identical non‐overlapping blocks and then choosing the block with less energy as more suitable for watermarking. Also, two criteria of mean‐squared‐error and peak signal‐to‐noise ratio (PSNR) have been calculated and the PSNR shows that image quality has not changed too much after hiding the information than the original image. It should be noted that since the proposed method is applied to black and white images, the result can be generalized to different color channels in the image, and color images have more visible capabilities in terms of cached memory than black and white images because they contain three dimensions of information.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":"6 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41410193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
“Security Gap” as a metric for enterprise business processes “安全差距”作为企业业务流程的衡量标准
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-18 DOI: 10.1002/spy2.263
Preetam Mukherjee, A. Sengupta, C. Mazumdar
Security is becoming an indispensable factor for the well‐being of an enterprise. Enterprises are making huge investments to fulfill the demand for security. A big challenge faced by an enterprise while securing itself is to find the gap between the demand for security and the actual security status. Finding out a consistent metric for measuring this gap can enable security administrators to utilize the allocated funds more appropriately. Popular control gap analysis methods practiced in enterprises are mostly subjective in nature and results in imprecise measurements. To address this issue, a novel security metric “Security Gap” is introduced in this paper. This metric finds out the business process‐level insecurity from the security requirements and the estimated security. The methodology uses business process modeling, attack graph modeling, and relevant base metrics to compute Security Gap.
安全正成为企业健康不可或缺的因素。企业正在进行巨额投资以满足安全需求。企业在确保自身安全的同时,面临的一大挑战是找到安全需求与实际安全状况之间的差距。找出衡量这一差距的一致性指标可以使安全管理员能够更适当地利用分配的资金。企业中流行的控制差距分析方法本质上大多是主观的,导致测量不精确。为了解决这个问题,本文引入了一种新的安全度量“安全缺口”。该指标从安全需求和估计的安全性中找出业务流程级别的不安全性。该方法使用业务流程建模、攻击图建模和相关的基本指标来计算安全差距。
{"title":"“Security Gap” as a metric for enterprise business processes","authors":"Preetam Mukherjee, A. Sengupta, C. Mazumdar","doi":"10.1002/spy2.263","DOIUrl":"https://doi.org/10.1002/spy2.263","url":null,"abstract":"Security is becoming an indispensable factor for the well‐being of an enterprise. Enterprises are making huge investments to fulfill the demand for security. A big challenge faced by an enterprise while securing itself is to find the gap between the demand for security and the actual security status. Finding out a consistent metric for measuring this gap can enable security administrators to utilize the allocated funds more appropriately. Popular control gap analysis methods practiced in enterprises are mostly subjective in nature and results in imprecise measurements. To address this issue, a novel security metric “Security Gap” is introduced in this paper. This metric finds out the business process‐level insecurity from the security requirements and the estimated security. The methodology uses business process modeling, attack graph modeling, and relevant base metrics to compute Security Gap.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46436663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis and improvement of REAS‐TMIS: Resource‐efficient authentication scheme for telecare medical information system REAS‐TMIS的密码分析与改进:远程医疗信息系统的资源高效认证方案
IF 1.9 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-09-14 DOI: 10.1002/spy2.268
C. M. Kumar, Ruhul Amin, M. Brindha
Recently, Tanveer et al. proposed a resource‐efficient authentication scheme for telecare medical information systems employing the authenticated key exchange. Tanveer et al. vehemently claimed that the protocol is safe against smart card stolen attacks, password guessing attacks, anonymity and untraceability, replay attacks, man‐in‐the‐middle attacks, impersonation attacks, and so forth. We have scrutinized the Tanveer et al. protocol. Based on his attack model, we have analyzed that this protocol is not secured against session key disclosure attacks, privileged insider attacks, and medical server impersonation attacks. We have also discussed improvement mechanisms to protect the mentioned security threats.
最近,Tanveer等人提出了一种利用认证密钥交换的远程医疗信息系统资源高效认证方案。Tanveer等人强烈声称,该协议对智能卡被盗攻击、密码猜测攻击、匿名性和不可追踪性、重放攻击、中间人攻击、冒充攻击等都是安全的。我们仔细审查了Tanveer等人的协议。基于他的攻击模型,我们分析了该协议不能抵御会话密钥泄露攻击、特权内部攻击和医疗服务器模拟攻击。我们还讨论了保护上述安全威胁的改进机制。
{"title":"Cryptanalysis and improvement of REAS‐TMIS: Resource‐efficient authentication scheme for telecare medical information system","authors":"C. M. Kumar, Ruhul Amin, M. Brindha","doi":"10.1002/spy2.268","DOIUrl":"https://doi.org/10.1002/spy2.268","url":null,"abstract":"Recently, Tanveer et al. proposed a resource‐efficient authentication scheme for telecare medical information systems employing the authenticated key exchange. Tanveer et al. vehemently claimed that the protocol is safe against smart card stolen attacks, password guessing attacks, anonymity and untraceability, replay attacks, man‐in‐the‐middle attacks, impersonation attacks, and so forth. We have scrutinized the Tanveer et al. protocol. Based on his attack model, we have analyzed that this protocol is not secured against session key disclosure attacks, privileged insider attacks, and medical server impersonation attacks. We have also discussed improvement mechanisms to protect the mentioned security threats.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44197564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Security and Privacy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1