首页 > 最新文献

ISC Int. J. Inf. Secur.最新文献

英文 中文
On the design and security of a lattice-based threshold secret sharing scheme 基于格的门限秘密共享方案的设计与安全性研究
Pub Date : 2015-12-15 DOI: 10.22042/isecure.2016.8.1.2
H. A. Khorasgani, S. Asaad, Hossein Pilaram, T. Eghlidos, M. Aref
{"title":"On the design and security of a lattice-based threshold secret sharing scheme","authors":"H. A. Khorasgani, S. Asaad, Hossein Pilaram, T. Eghlidos, M. Aref","doi":"10.22042/isecure.2016.8.1.2","DOIUrl":"https://doi.org/10.22042/isecure.2016.8.1.2","url":null,"abstract":"","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129833754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GGRA: a grouped gossip-based reputation aggregation algorithm GGRA:基于分组八卦的声誉聚合算法
Pub Date : 2015-08-08 DOI: 10.22042/ISECURE.2015.7.1.6
Safieh Ghasemi Falavarjani, B. T. Ladani, Simin Ghasemi
An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on the concept of gossip. Despite its important contribution, this algorithm has deficiencies especially with high number of nodes that leads to high execution time and low accuracy in the results. In this paper, a grouped Gossip based Reputation Aggregation (GGRA) algorithm is proposed. In GGRA, Gossip Trust is executed in each group between group members and between groups instead of executing in the whole network. Due to the reduction in the number of nodes and using strongly connected graph instead of a weakly one, gossip algorithm in GGRA is executed quickly. With grouping, not only reputation aggregation is expected to be more scalable, but also because of the decrement in the number of errors of the gossiped communication, the results get more accurate. The evaluation of the proposed algorithm and its comparison with Gossip Trust confirms the expected results.
P2P网络中的一个重要问题是恶意节点的存在会降低网络的性能。信誉系统根据节点的行为对其进行排名,是检测和隔离恶意(低排名)节点的解决方案之一。八卦信任是一种基于八卦概念的P2P网络声誉聚合算法。尽管该算法做出了重要贡献,但也存在不足,特别是节点数量多,导致执行时间长,结果精度低。提出了一种基于分组八卦的声誉聚合(GGRA)算法。在GGRA中,八卦信任是在每一组成员之间、组与组之间执行,而不是在全网执行。由于减少了节点数,并且使用强连接图代替弱连接图,使得GGRA中的八卦算法执行速度很快。分组不仅可以提高声誉聚合的可扩展性,而且由于流言传播的错误数量减少,结果也更加准确。对该算法进行了评价,并与Gossip Trust进行了比较,证实了预期的结果。
{"title":"GGRA: a grouped gossip-based reputation aggregation algorithm","authors":"Safieh Ghasemi Falavarjani, B. T. Ladani, Simin Ghasemi","doi":"10.22042/ISECURE.2015.7.1.6","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.7.1.6","url":null,"abstract":"An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on the concept of gossip. Despite its important contribution, this algorithm has deficiencies especially with high number of nodes that leads to high execution time and low accuracy in the results. In this paper, a grouped Gossip based Reputation Aggregation (GGRA) algorithm is proposed. In GGRA, Gossip Trust is executed in each group between group members and between groups instead of executing in the whole network. Due to the reduction in the number of nodes and using strongly connected graph instead of a weakly one, gossip algorithm in GGRA is executed quickly. With grouping, not only reputation aggregation is expected to be more scalable, but also because of the decrement in the number of errors of the gossiped communication, the results get more accurate. The evaluation of the proposed algorithm and its comparison with Gossip Trust confirms the expected results.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130599050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimizing image steganography by combining the GA and ICA 结合遗传算法和独立分量分析优化图像隐写
Pub Date : 2015-08-08 DOI: 10.22042/ISECURE.2015.7.1.5
F. Sadeghi, F. Kermani, M. Rafsanjani
In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Filling Curves (SFC) and the optimal pair-wise LSB matching method. We employ a modified Imperialist Competitive Algorithm by Genetic Algorithm operations, namely Discrete Imperialist Competitive Algorithm (DICA), to perform the optimal pair-wise LSB matching method and find the suboptimum adjustment list. The performance of the proposed method is compared with other methods with respect to Peak Signal to Noise Ratio (PSNR). The PSNR value of the proposed method is higher than the state-of-the-art methods by almost 4dB to 5dB.
本文提出了一种将隐写术和密码学相结合的方法,将信息隐藏到数字图像中作为主机媒体。在此过程中,首先使用单字母替代密码方法对秘密数据进行加密,然后使用基于空间填充曲线(SFC)的随机模式和最优成对LSB匹配方法相结合的算法将加密后的秘密数据嵌入到图像中。本文采用遗传算法操作改进的帝国主义竞争算法,即离散帝国主义竞争算法(DICA),执行最优两两LSB匹配方法,并找到次优调整表。将该方法与其他方法在峰值信噪比方面的性能进行了比较。该方法的PSNR值比目前最先进的方法高出近4至5dB。
{"title":"Optimizing image steganography by combining the GA and ICA","authors":"F. Sadeghi, F. Kermani, M. Rafsanjani","doi":"10.22042/ISECURE.2015.7.1.5","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.7.1.5","url":null,"abstract":"In this study, a novel approach which uses combination of steganography and cryptography for hiding information into digital images as host media is proposed. In the process, secret data is first encrypted using the mono-alphabetic substitution cipher method and then the encrypted secret data is embedded inside an image using an algorithm which combines the random patterns based on Space Filling Curves (SFC) and the optimal pair-wise LSB matching method. We employ a modified Imperialist Competitive Algorithm by Genetic Algorithm operations, namely Discrete Imperialist Competitive Algorithm (DICA), to perform the optimal pair-wise LSB matching method and find the suboptimum adjustment list. The performance of the proposed method is compared with other methods with respect to Peak Signal to Noise Ratio (PSNR). The PSNR value of the proposed method is higher than the state-of-the-art methods by almost 4dB to 5dB.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel local search method for microaggregation 一种新的微聚集局部搜索方法
Pub Date : 2015-08-05 DOI: 10.22042/ISECURE.2015.7.1.3
R. Mortazavi, S. Jalili
In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least k and at most 2 k _1 records, such that the sum of the within-group squared error (SSE) is minimized. We propose a local search algorithm which iteratively satisfies the constraints of the optimal solution of the problem. The algorithm solves the problem in O ( n ^2) time. Experimental results on real and synthetic data sets with different distributions demonstrate the effectiveness of the method in producing useful protected data sets.
在本文中,我们提出了一种有效的微聚合算法,以产生更有用的保护数据。微聚集被映射为已知最小和最大群体大小约束的聚类问题。在这个方案中,目标是将n条记录聚类成至少k条最多2k条记录的组,从而使组内平方误差(SSE)的总和最小化。提出了一种迭代满足问题最优解约束的局部搜索算法。该算法在O (n ^2)时间内解决了这个问题。在不同分布的真实数据集和合成数据集上的实验结果表明,该方法可以有效地生成有用的保护数据集。
{"title":"A novel local search method for microaggregation","authors":"R. Mortazavi, S. Jalili","doi":"10.22042/ISECURE.2015.7.1.3","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.7.1.3","url":null,"abstract":"In this paper, we propose an effective microaggregation algorithm to produce a more useful protected data for publishing. Microaggregation is mapped to a clustering problem with known minimum and maximum group size constraints. In this scheme, the goal is to cluster n records into groups of at least k and at most 2 k _1 records, such that the sum of the within-group squared error (SSE) is minimized. We propose a local search algorithm which iteratively satisfies the constraints of the optimal solution of the problem. The algorithm solves the problem in O ( n ^2) time. Experimental results on real and synthetic data sets with different distributions demonstrate the effectiveness of the method in producing useful protected data sets.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126088815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A combination of semantic and attribute-based access control model for virtual organizations 基于语义和属性的虚拟组织访问控制模型
Pub Date : 2015-08-05 DOI: 10.22042/ISECURE.2015.7.1.4
M. Amini, M. Arasteh
A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex environment with the huge number of users and resources, traditional access control models cannot satisfy VOs security requirements. Most of the current proposals are basically based on the attributes of users and resources. In this paper, we suggest using a combination of the semantic based access control (SBAC) model, and the attribute based access control (ABAC) model with the shared ontology of subjects' attributes in VOs. In this model, each participating organization makes its access control decisions according to an enhanced model of the ABAC model. However, access decision in the VO is made in more abstract level through an enhanced model of theSBACmodel. Using the ontology of users and resources in this model facilitates access control in large scale VOs with numerous organizations. By the combination ofSBACand ABAC, we attain their benefits and eliminate their shortcomings. In order to show the applicability of the proposed model, an access control system, based on the proposed model, has been implemented in Java using available APIs, including Sun's XACML API, Jena, Pellet, and Protege.
虚拟组织(Virtual Organization, VO)是由一些具有共同利益的真实组织组成的,其目的是通过组织间的资源共享来提供组织间的联系,以达到共同的目标。提供安全机制,特别是适当的访问控制机制,以执行已定义的安全策略,是vo中的必要要求。由于VO是一个复杂的环境,拥有大量的用户和资源,传统的访问控制模型无法满足VO的安全需求。目前大多数建议基本上都是基于用户和资源的属性。本文提出了基于语义的访问控制(SBAC)模型和基于属性的访问控制(ABAC)模型的结合,并提出了基于主体属性的共享本体。在该模型中,每个参与组织根据ABAC模型的增强模型做出访问控制决策。然而,VO中的访问决策是通过thesbac模型的增强模型在更抽象的级别上进行的。在该模型中使用用户和资源本体,便于对具有众多组织的大型vo进行访问控制。通过将sbac和ABAC相结合,我们得到了它们的优点,消除了它们的不足。为了显示所建议模型的适用性,一个基于所建议模型的访问控制系统已经在Java中使用可用的API实现,包括Sun的XACML API、Jena、Pellet和Protege。
{"title":"A combination of semantic and attribute-based access control model for virtual organizations","authors":"M. Amini, M. Arasteh","doi":"10.22042/ISECURE.2015.7.1.4","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.7.1.4","url":null,"abstract":"A Virtual Organization (VO) consists of some real organizations with common interests, which aims to provide inter organizational associations to reach some common goals by sharing their resources with each other. Providing security mechanisms, and especially a suitable access control mechanism, which enforces the defined security policy is a necessary requirement in VOs. Since VO is a complex environment with the huge number of users and resources, traditional access control models cannot satisfy VOs security requirements. Most of the current proposals are basically based on the attributes of users and resources. In this paper, we suggest using a combination of the semantic based access control (SBAC) model, and the attribute based access control (ABAC) model with the shared ontology of subjects' attributes in VOs. In this model, each participating organization makes its access control decisions according to an enhanced model of the ABAC model. However, access decision in the VO is made in more abstract level through an enhanced model of theSBACmodel. Using the ontology of users and resources in this model facilitates access control in large scale VOs with numerous organizations. By the combination ofSBACand ABAC, we attain their benefits and eliminate their shortcomings. In order to show the applicability of the proposed model, an access control system, based on the proposed model, has been implemented in Java using available APIs, including Sun's XACML API, Jena, Pellet, and Protege.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132557234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability 安全感知寄存器的位置,以阻止恶意硬件更新和提高木马的可检测性
Pub Date : 2015-08-05 DOI: 10.22042/ISECURE.2015.7.1.7
M. Vosoughi, A. Jahanian
A B S T R A C T Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the o-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardware Trojan insertion or simplies the detection process in existence of Trojans. Experimental results show that the proposed placement improves the Trojan detectability of the attempted benchmarks against Trojan insertion more than 20% in reasonable cost in delay and wire length.
如今,由于可靠性问题、制造成本和上市时间的限制,大部分设计师更喜欢将部分设计和制造过程外包给第三方公司。在这种情况下,离岸公司有很多恶意更改的机会。在本文中,我们提出了一种新的放置算法,可以阻止硬件木马的插入或简化存在木马的检测过程。实验结果表明,在合理的时延和线长成本下,所提出的放置方法使基准测试对木马插入的检测能力提高了20%以上。
{"title":"Security-aware register placement to hinder malicious hardware updating and improve Trojan detectability","authors":"M. Vosoughi, A. Jahanian","doi":"10.22042/ISECURE.2015.7.1.7","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.7.1.7","url":null,"abstract":"A B S T R A C T Nowadays, bulk of the designers prefer to outsource some parts of their design and fabrication process to the third-part companies due to the reliability problems, manufacturing cost and time-to-market limitations. In this situation, there are a lot of opportunities for malicious alterations by the o-shore companies. In this paper, we proposed a new placement algorithm that hinders the hardware Trojan insertion or simplies the detection process in existence of Trojans. Experimental results show that the proposed placement improves the Trojan detectability of the attempted benchmarks against Trojan insertion more than 20% in reasonable cost in delay and wire length.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A traceable optimistic fair exchange protocol in the standard model 标准模型下的可追溯乐观公平交换协议
Pub Date : 2015-08-05 DOI: 10.22042/ISECURE.2015.7.1.2
R. Ganjavi, M. R. Asaar, M. Salmasizadeh
An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when arbitrator acts dishonestly and colludes with the verifier, that is, the arbitrator can complete the transaction without getting signer's agreement. Huang et al. in 2011 addressed this issue by formalizing the accountability property. However, Huang et al.'s scheme is secure in the random oracle model which is not available in the real world. We present the first generic accountable OFE protocol that is secure in the standard model by using traceable ring signatures (TRSs) as our primitive. We prove the security of our protocol under the chosen-key model and multi-user setting.
乐观公平交换(OFE)协议是双方以公平的方式交换数字物品的好方法,这样在协议执行结束时,双方都收到他们的物品,或者没有一方收到任何东西。在OFE协议中,有一个半可信的第三方,称为仲裁者,如果必要的话,它会参与到协议中。但是,当仲裁员不诚实地与验证者勾结时,存在安全问题,即仲裁员可以在没有签名者同意的情况下完成交易。Huang等人在2011年通过形式化问责性属性解决了这个问题。然而,Huang等人的方案在随机oracle模型中是安全的,这在现实世界中是不可用的。通过使用可跟踪环签名(trs)作为我们的原语,我们提出了第一个在标准模型中安全的通用可问责OFE协议。在选择密钥模型和多用户设置下证明了协议的安全性。
{"title":"A traceable optimistic fair exchange protocol in the standard model","authors":"R. Ganjavi, M. R. Asaar, M. Salmasizadeh","doi":"10.22042/ISECURE.2015.7.1.2","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.7.1.2","url":null,"abstract":"An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when arbitrator acts dishonestly and colludes with the verifier, that is, the arbitrator can complete the transaction without getting signer's agreement. Huang et al. in 2011 addressed this issue by formalizing the accountability property. However, Huang et al.'s scheme is secure in the random oracle model which is not available in the real world. We present the first generic accountable OFE protocol that is secure in the standard model by using traceable ring signatures (TRSs) as our primitive. We prove the security of our protocol under the chosen-key model and multi-user setting.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128186097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient blind signature scheme based on the elliptic curve discrete logarithm problem 基于椭圆曲线离散对数问题的一种高效盲签名方案
Pub Date : 2015-02-18 DOI: 10.22042/isecure.2015.1.2.5
M. Nikooghadam, A. Zakerolhosseini
Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme is quite commendable in comparison with the previous work in terms of security and time complexity.
椭圆曲线密码系统(ECC)由于其计算成本低、密钥尺寸小等优点,近年来受到了研究人员的广泛关注。提出了一种新的不可追踪盲签名方案。由于该方法的安全性是基于在椭圆曲线上求解离散对数的难易程度,因此与以往的工作相比,该方法在安全性和时间复杂度方面的性能都是相当值得称道的。
{"title":"An efficient blind signature scheme based on the elliptic curve discrete logarithm problem","authors":"M. Nikooghadam, A. Zakerolhosseini","doi":"10.22042/isecure.2015.1.2.5","DOIUrl":"https://doi.org/10.22042/isecure.2015.1.2.5","url":null,"abstract":"Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme is quite commendable in comparison with the previous work in terms of security and time complexity.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Artemia: a family of provably secure authenticated encryption schemes Artemia:一系列可证明的安全认证加密方案
Pub Date : 2015-02-17 DOI: 10.22042/ISECURE.2015.6.2.3
J. Alizadeh, M. Aref, N. Bagheri
Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the inverse of the permutation in the decryption function, which causes the resource efficiency. Artemia permutations have an efficient and a simple structure and are provably secure against the differential and linear cryptanalysis. In the permutations, MDS recursive layers are used that can be easily implemented in both software and hardware.
经过认证的加密方案建立了隐私性和真实性。本文提出了一种专用认证加密方案——Artemia。它是一种支持关联数据的基于随机数的在线身份验证加密方案。Artemia使用基于排列的模式JHAE,在理想的排列模型中证明是安全的。该方案不需要解密函数中的逆排列,提高了资源效率。Artemia排列结构简单、高效,可证明其对微分和线性密码分析是安全的。在排列中,使用MDS递归层,可以很容易地在软件和硬件中实现。
{"title":"Artemia: a family of provably secure authenticated encryption schemes","authors":"J. Alizadeh, M. Aref, N. Bagheri","doi":"10.22042/ISECURE.2015.6.2.3","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.6.2.3","url":null,"abstract":"Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme which supports the associated data. Artemia uses the permutation based mode, JHAE, that is provably secure in the ideal permutation model. The scheme does not require the inverse of the permutation in the decryption function, which causes the resource efficiency. Artemia permutations have an efficient and a simple structure and are provably secure against the differential and linear cryptanalysis. In the permutations, MDS recursive layers are used that can be easily implemented in both software and hardware.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A two-phase wormhole attack detection scheme in MANETs 一种面向无线网络的两阶段虫洞攻击检测方案
Pub Date : 2015-02-17 DOI: 10.22042/ISECURE.2015.6.2.7
Shiva Shamaei, A. Movaghar
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole attack is a kind of such threats against routing processes which is particularly a challenging problem to detect and prevent in MANETs. In this paper, a two-phase detection scheme is proposed to detect and prevent wormhole attacks. First phase checks whether a wormhole tunnel exists on the selected path or not. If there is such a tunnel, the second phase is applied to confirm the existence of the wormhole attack, and locate a malicious node. The proposed detection scheme can appropriately detect all types of this kind of attacks such as in-band and out-of-band ones in different modes such as hidden or exposed, without any need of special hardware or time synchronization. In order to evaluate the performance of the proposed scheme, some various scenarios are simulated in the NS-2 simulator, and different measures are assessed. The results obtained from simulating the proposed scheme and other benchmarks indicate that in most criteria considered in this paper, the proposed scheme outperforms the proposed methods in prior works.
移动自组织网络(manet)没有固定的基础设施,所以所有的网络操作,如路由和数据包转发都是由节点自己完成的。然而,几乎所有常见的现有路由协议基本上都关注性能度量,而不考虑安全问题。由于这些协议认为所有节点都是可信的,因此容易受到严重的安全威胁。虫洞攻击是一种针对路由进程的威胁,是无线网络中一个特别具有挑战性的问题。本文提出了一种检测和预防虫洞攻击的两阶段检测方案。第一阶段检查所选路径上是否存在虫洞隧道。如果存在这样的隧道,则第二阶段用于确认虫洞攻击的存在,并定位恶意节点。本文提出的检测方案可以在不需要特殊硬件和时间同步的情况下,以隐藏或暴露等不同的方式,适当地检测到各种类型的带内和带外攻击。为了评估该方案的性能,在NS-2模拟器中模拟了不同的场景,并对不同的措施进行了评估。仿真结果和其他基准测试表明,在本文考虑的大多数标准中,本文提出的方案优于先前工作中提出的方法。
{"title":"A two-phase wormhole attack detection scheme in MANETs","authors":"Shiva Shamaei, A. Movaghar","doi":"10.22042/ISECURE.2015.6.2.7","DOIUrl":"https://doi.org/10.22042/ISECURE.2015.6.2.7","url":null,"abstract":"Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole attack is a kind of such threats against routing processes which is particularly a challenging problem to detect and prevent in MANETs. In this paper, a two-phase detection scheme is proposed to detect and prevent wormhole attacks. First phase checks whether a wormhole tunnel exists on the selected path or not. If there is such a tunnel, the second phase is applied to confirm the existence of the wormhole attack, and locate a malicious node. The proposed detection scheme can appropriately detect all types of this kind of attacks such as in-band and out-of-band ones in different modes such as hidden or exposed, without any need of special hardware or time synchronization. In order to evaluate the performance of the proposed scheme, some various scenarios are simulated in the NS-2 simulator, and different measures are assessed. The results obtained from simulating the proposed scheme and other benchmarks indicate that in most criteria considered in this paper, the proposed scheme outperforms the proposed methods in prior works.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127084841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
ISC Int. J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1