首页 > 最新文献

International Journal of Information Security最新文献

英文 中文
Random forest evaluation using multi-key homomorphic encryption and lookup tables 使用多密钥同态加密和查找表进行随机森林评估
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-14 DOI: 10.1007/s10207-024-00823-1
Diana-Elena Petrean, Rodica Potolea

In recent years, machine learning (ML) has become increasingly popular in various fields of activity. Cloud platforms have also grown in popularity, as they offer services that are more secure and accessible worldwide. In this context, cloud-based technologies emerged to support ML, giving rise to the machine learning as a service (MLaaS) concept. However, the clients accessing ML services in order to obtain classification results on private data may be reluctant to upload sensitive information to cloud. The model owners may also prefer not to outsource their models in order to prevent model inversion attacks and to protect intellectual property. The privacy-preserving evaluation of ML models is possible through multi-key homomorphic encryption (MKHE), that allows both the client data and the model to be encrypted under different keys. In this paper, we propose an MKHE evaluation method for decision trees and we extend the proposed method for random forests. Each decision tree is evaluated as a single lookup table, and voting is performed at the level of groups of decision trees in the random forest. We provide both theoretical and experimental evaluations for the proposed method. The aim is to minimize the performance degradation introduced by the encrypted model compared to a plaintext model while also obtaining practical classification times. In our experiments with the proposed MKHE random forest evaluation method, we obtained minimal (less than 0.6%) impact on the main ML performance metrics considered for each scenario, while also achieving reasonable classification times (of the order of seconds).

近年来,机器学习(ML)在各行各业越来越受欢迎。云平台也越来越受欢迎,因为它们提供的服务更加安全,而且在全球范围内都可以访问。在这种情况下,出现了支持 ML 的云技术,从而产生了机器学习即服务(MLaaS)的概念。然而,访问 ML 服务以获取私人数据分类结果的客户可能不愿意将敏感信息上传到云端。为了防止模型反转攻击和保护知识产权,模型所有者可能也不愿意外包他们的模型。通过多密钥同态加密(MKHE)可以对 ML 模型进行保护隐私的评估,这种加密允许客户端数据和模型在不同密钥下加密。在本文中,我们提出了决策树的 MKHE 评估方法,并将所提方法扩展到随机森林。每棵决策树都作为单个查找表进行评估,投票则在随机森林中的决策树组层面上进行。我们对提出的方法进行了理论和实验评估。目的是尽量减少加密模型与明文模型相比所带来的性能下降,同时获得实用的分类时间。在使用所提出的 MKHE 随机森林评估方法进行的实验中,我们发现该方法对每种情况下考虑的主要 ML 性能指标的影响最小(小于 0.6%),同时还能获得合理的分类时间(约为几秒)。
{"title":"Random forest evaluation using multi-key homomorphic encryption and lookup tables","authors":"Diana-Elena Petrean, Rodica Potolea","doi":"10.1007/s10207-024-00823-1","DOIUrl":"https://doi.org/10.1007/s10207-024-00823-1","url":null,"abstract":"<p>In recent years, machine learning (ML) has become increasingly popular in various fields of activity. Cloud platforms have also grown in popularity, as they offer services that are more secure and accessible worldwide. In this context, cloud-based technologies emerged to support ML, giving rise to the machine learning as a service (MLaaS) concept. However, the clients accessing ML services in order to obtain classification results on private data may be reluctant to upload sensitive information to cloud. The model owners may also prefer not to outsource their models in order to prevent model inversion attacks and to protect intellectual property. The privacy-preserving evaluation of ML models is possible through multi-key homomorphic encryption (MKHE), that allows both the client data and the model to be encrypted under different keys. In this paper, we propose an MKHE evaluation method for decision trees and we extend the proposed method for random forests. Each decision tree is evaluated as a single lookup table, and voting is performed at the level of groups of decision trees in the random forest. We provide both theoretical and experimental evaluations for the proposed method. The aim is to minimize the performance degradation introduced by the encrypted model compared to a plaintext model while also obtaining practical classification times. In our experiments with the proposed MKHE random forest evaluation method, we obtained minimal (less than 0.6%) impact on the main ML performance metrics considered for each scenario, while also achieving reasonable classification times (of the order of seconds).</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"50 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards 通过对抗性数据中毒攻击欺骗监督机器学习模型:USB 键盘案例研究
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-14 DOI: 10.1007/s10207-024-00834-y
Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan

Due to its plug-and-play functionality and wide device support, the universal serial bus (USB) protocol has become one of the most widely used protocols. However, this widespread adoption has introduced a significant security concern: the implicit trust provided to USB devices, which has created a vast array of attack vectors. Malicious USB devices exploit this trust by disguising themselves as benign peripherals and covertly implanting malicious commands into connected host devices. Existing research employs supervised learning models to identify such malicious devices, but our study reveals a weakness in these models when faced with sophisticated data poisoning attacks. We propose, design and implement a sophisticated adversarial data poisoning attack to demonstrate how these models can be manipulated to misclassify an attack device as a benign device. Our method entails generating keystroke data using a microprogrammable keystroke attack device. We develop adversarial attacker by meticulously analyzing the data distribution of data features generated via USB keyboards from benign users. The initial training data is modified by exploiting firmware-level modifications within the attack device. Upon evaluating the models, our findings reveal a significant decrease from 99 to 53% in detection accuracy when an adversarial attacker is employed. This work highlights the critical need to reevaluate the dependability of machine learning-based USB threat detection mechanisms in the face of increasingly sophisticated attack methods. The vulnerabilities demonstrated highlight the importance of developing more robust and resilient detection strategies to protect against the evolution of malicious USB devices.

由于其即插即用的功能和广泛的设备支持,通用串行总线(USB)协议已成为使用最广泛的协议之一。然而,这种广泛的应用带来了一个重大的安全隐患:USB 设备所具有的隐含信任,产生了大量的攻击载体。恶意 USB 设备利用这种信任,将自己伪装成良性外设,并暗中向连接的主机设备植入恶意命令。现有研究采用监督学习模型来识别此类恶意设备,但我们的研究揭示了这些模型在面对复杂的数据中毒攻击时的弱点。我们提出、设计并实施了一种复杂的对抗性数据中毒攻击,以演示如何操纵这些模型,将攻击设备错误分类为良性设备。我们的方法需要使用微可编程按键攻击设备生成按键数据。我们通过对良性用户的 USB 键盘生成的数据特征的数据分布进行细致分析,从而开发出对抗攻击器。初始训练数据是通过利用攻击设备内的固件级修改进行修改的。在对模型进行评估后,我们的研究结果表明,当采用对抗攻击者时,检测准确率从 99% 显著下降到 53%。这项工作强调,面对日益复杂的攻击方法,亟需重新评估基于机器学习的 USB 威胁检测机制的可靠性。所展示的漏洞凸显了开发更强大、更有弹性的检测策略以防范恶意 USB 设备演变的重要性。
{"title":"Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards","authors":"Anil Kumar Chillara, Paresh Saxena, Rajib Ranjan Maiti, Manik Gupta, Raghu Kondapalli, Zhichao Zhang, Krishnakumar Kesavan","doi":"10.1007/s10207-024-00834-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00834-y","url":null,"abstract":"<p>Due to its plug-and-play functionality and wide device support, the universal serial bus (USB) protocol has become one of the most widely used protocols. However, this widespread adoption has introduced a significant security concern: the implicit trust provided to USB devices, which has created a vast array of attack vectors. Malicious USB devices exploit this trust by disguising themselves as benign peripherals and covertly implanting malicious commands into connected host devices. Existing research employs supervised learning models to identify such malicious devices, but our study reveals a weakness in these models when faced with sophisticated data poisoning attacks. We propose, design and implement a sophisticated adversarial data poisoning attack to demonstrate how these models can be manipulated to misclassify an attack device as a benign device. Our method entails generating keystroke data using a microprogrammable keystroke attack device. We develop adversarial attacker by meticulously analyzing the data distribution of data features generated via USB keyboards from benign users. The initial training data is modified by exploiting firmware-level modifications within the attack device. Upon evaluating the models, our findings reveal a significant decrease from 99 to 53% in detection accuracy when an adversarial attacker is employed. This work highlights the critical need to reevaluate the dependability of machine learning-based USB threat detection mechanisms in the face of increasingly sophisticated attack methods. The vulnerabilities demonstrated highlight the importance of developing more robust and resilient detection strategies to protect against the evolution of malicious USB devices.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"21 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140152902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT) 关于物联网应用层协议、安全挑战以及可解释人工智能在物联网(XAIoT)中的作用的调查
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1007/s10207-024-00828-w
Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa

The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of explainable artificial intelligence in IoT (XAIoT). To elucidate its practical implications, we conducted a case study examining a real-world scenario where XAIoT significantly bolstered IoT security. This case study demonstrated XAIoT’s potential to enhance transparency and trustworthiness in IoT systems. Furthermore, the survey critically evaluates existing literature, pinpointing specific opportunities and gaps in the present state of IoT application layer security. For instance, our analysis revealed a pressing need for more robust security protocols and the integration of advanced machine-learning techniques for anomaly detection in IoT applications. This survey, designed to provide a comprehensive perspective, seeks to stimulate additional innovation and research in the realm of secure and intelligent IoT applications. In doing so, it contributes to the ongoing dialogue on improving IoT security, offering valuable insights for researchers and practitioners alike.

物联网(IoT)在当代社会中扮演着重要角色,因此有必要深入了解其应用层协议、相互交织的技术、安全问题和有效对策。本研究对这些协议进行了详尽的分析,强调了可解释人工智能在物联网(XAIoT)中不断升级的重要性。为了阐明其实际意义,我们进行了一项案例研究,考察了 XAIoT 显著增强物联网安全性的真实场景。该案例研究证明了 XAIoT 在提高物联网系统透明度和可信度方面的潜力。此外,调查还对现有文献进行了批判性评估,指出了物联网应用层安全现状中的具体机遇和差距。例如,我们的分析表明,物联网应用迫切需要更强大的安全协议和先进的机器学习技术来进行异常检测。本调查旨在提供一个全面的视角,以激发在安全和智能物联网应用领域的更多创新和研究。在此过程中,它将为正在进行的有关提高物联网安全性的对话做出贡献,为研究人员和从业人员提供宝贵的见解。
{"title":"A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)","authors":"Vagner E. Quincozes, Silvio E. Quincozes, Juliano F. Kazienko, Simone Gama, Omar Cheikhrouhou, Anis Koubaa","doi":"10.1007/s10207-024-00828-w","DOIUrl":"https://doi.org/10.1007/s10207-024-00828-w","url":null,"abstract":"<p>The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer protocols, intertwined technologies, security issues, and effective countermeasures. This survey delivers an exhaustive analysis of these protocols, emphasizing the escalating significance of explainable artificial intelligence in IoT (XAIoT). To elucidate its practical implications, we conducted a case study examining a real-world scenario where XAIoT significantly bolstered IoT security. This case study demonstrated XAIoT’s potential to enhance transparency and trustworthiness in IoT systems. Furthermore, the survey critically evaluates existing literature, pinpointing specific opportunities and gaps in the present state of IoT application layer security. For instance, our analysis revealed a pressing need for more robust security protocols and the integration of advanced machine-learning techniques for anomaly detection in IoT applications. This survey, designed to provide a comprehensive perspective, seeks to stimulate additional innovation and research in the realm of secure and intelligent IoT applications. In doing so, it contributes to the ongoing dialogue on improving IoT security, offering valuable insights for researchers and practitioners alike.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"139 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140114765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic authentication for intelligent sensor clouds in the Internet of Things 物联网智能传感器云的动态身份验证
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-13 DOI: 10.1007/s10207-024-00829-9
Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh Daoud, Hoda Alkhzaimi

Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms’ ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol’s design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems.

传感器云由支持 IP 的无线传感器和物联网设备组成,用于商业和工业应用中的传感和执行。传感器收集的数据由分布式云数据整合(DCS)服务器整合,作为原始传感信息供运行数据分析和执行功能的应用程序使用。另外,DCS 服务器还可将传感器数据馈送至云托管大数据分析 (BDS) 服务器。传感器云及其各自的 DCS 服务器和 BDS 服务器可形成不同的安全域。这些安全域的所有权结构复杂,且不同于标准数据库服务器,因此需要一种可靠的身份验证技术来提供对 DC 和 BDS 服务器的可信访问。本文提出了一种新的多方认证框架,用于对请求访问 DCS 和 BDS 服务器的应用程序进行认证,而无需人工或应用程序直接访问传感器和执行器。只有 DC 服务器被允许与传感器/执行器通信,只有经过会话授权云认证的应用程序才能通过包括许多信息和密钥交换的认证协议访问 DCS/BDS 服务器。该解决方案可确保在不同的关键应用领域(如工业、商业、国家安全和国防等)可靠部署传感器云,同时降低直接间谍传感/执行系统的可能性。线性时态逻辑用于明确分析和建立所提出框架的正确性。OPNET 建模和仿真用于说明协议的设计和运行。结果表明,多方身份验证在传感器云计算系统中是可行的。
{"title":"Dynamic authentication for intelligent sensor clouds in the Internet of Things","authors":"Hussain Al-Aqrabi, Ahmed M. Manasrah, Richard Hill, Mohammed Q. Shatnawi, Mohammad Sh Daoud, Hoda Alkhzaimi","doi":"10.1007/s10207-024-00829-9","DOIUrl":"https://doi.org/10.1007/s10207-024-00829-9","url":null,"abstract":"<p>Sensor clouds are formed by IP-enabled wireless sensors and Internet of Things devices that are used for sensing and actuation in commercial and industrial applications. Data collected by the sensors are consolidated by distributed cloud data consolidation (DCS) servers to be utilized as raw sensory information by applications running data analytics and actuation functions. Alternatively, DC servers may feed sensor data to the cloud-hosted Big Data Analytics (BDS) servers. Sensor clouds and their respective DCS servers, as well as BDS servers, may form different security realms. These security realms’ ownership structures are complicated and differ from standard database servers, necessitating a dependable authentication technique to provide trusted access to DC and BDS servers. This paper proposes a new multiparty authentication framework to authenticate applications requesting access to the DCS and BDS servers without direct human or application access to the sensors and actuators. Only DC servers are permitted to communicate with sensors/actuators, and only applications certified by a Session Authority Cloud are granted access to DCS/BDS servers via an authentication protocol that includes many information and key exchanges. This solution may assure the reliable deployment of sensor clouds in different critical application domains (i.e., industry, commercial, national security, and defense, etc.) while reducing the potential of direct espionage of sensed/actuated systems. Linear Temporal Logic is used to explicitly analyze and establish the correctness of the presented framework. OPNET modeling and simulations are used to illustrate the protocol’s design and operations. The results demonstrate that multiparty authentication is conceivable for Sensor cloud computing systems.\u0000</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"4 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140114992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abuse-freeness in contract signing: a blockchain-based proposal 合同签署中的无滥用:基于区块链的建议
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-10 DOI: 10.1007/s10207-024-00818-y
Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos

Electronic contract signing requires the design of protocols that guarantee that the exchange is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced by blockchain. However, none of the analyzed blockchain-based solutions meets the abuse-freeness requirement (established by Garay et al. in 1999), i.e., that neither party has the power to decide whether the protocol terminates or aborts. In this article, we present the first blockchain-based contract signing protocol that meets the abuse-freeness requirement. We analyze the economic impact that the use of blockchain has on the participants of a contract signing, concluding that the solution is both technically feasible and cost effective.

电子合同的签署需要设计能保证交换公平的协议。在过去 5 年中,我们发现可信第三方(TTP)可以被区块链取代。然而,所分析的基于区块链的解决方案都不符合无滥用要求(由 Garay 等人于 1999 年制定),即任何一方都无权决定协议是终止还是中止。在本文中,我们提出了第一个符合无滥用要求的基于区块链的合同签署协议。我们分析了使用区块链对合同签署参与者的经济影响,得出的结论是,该解决方案在技术上是可行的,并且具有成本效益。
{"title":"Abuse-freeness in contract signing: a blockchain-based proposal","authors":"Josep-Lluís Ferrer-Gomila, M. Francisca Hinarejos","doi":"10.1007/s10207-024-00818-y","DOIUrl":"https://doi.org/10.1007/s10207-024-00818-y","url":null,"abstract":"<p>Electronic contract signing requires the design of protocols that guarantee that the exchange is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced by blockchain. However, none of the analyzed blockchain-based solutions meets the abuse-freeness requirement (established by Garay et al. in 1999), i.e., that neither party has the power to decide whether the protocol terminates or aborts. In this article, we present the first blockchain-based contract signing protocol that meets the abuse-freeness requirement. We analyze the economic impact that the use of blockchain has on the participants of a contract signing, concluding that the solution is both technically feasible and cost effective.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"71 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140098964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies 使用分布式账本技术的智能家居物联网设备安全增强固件管理方案
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-07 DOI: 10.1007/s10207-024-00827-x
W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroyuki Suzuki, Takashi Obi

With the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to attacks. Such attacks have recently become frequent. To address this issue, we developed a secure verification mechanism for firmware released by the device’s manufacturer. We proposed an IoT gateway for secure firmware verification and updating for smart home IoT devices utilizing the IOTA MAM (Masked Authenticated Messaging) protocol and a distributed file system with IPFS (Inter-Planetary File System) protocol. These two communication protocols ensure decentralized communication and firmware file distribution between the IoT device vendor and the IoT end device. The proposed scheme securely shares latest firmware content over IOTA and IPFS networks, performs a secure firmware update on IoT end devices and ensures authenticity and integrity of the firmware. Two types of validation methods were proposed for firmware updating and validation. We implemented the proposed scheme using three entities, Vendor, IoT gateway, and IoT end device. Our system yielded promising results in performing secure automated firmware updates on IoT end devices with very low computational power. The system’s functionality was implemented using IOTA’s MAM run on Raspberry Pi as an IoT gateway along with an ESP8266 Wi-Fi microcontroller, demonstrating the effectiveness of our approach. Our proposed methodology can be used for secure firmware distribution on home IoT applications.

随着产生大量用户敏感数据的物联网设备的增加,不适当的固件会损害用户的安全和隐私。最新的家用电器都集成了确保与智能家居物联网兼容的功能。然而,将复杂的安全机制应用于物联网受到设备硬件能力的限制,使其容易受到攻击。最近,此类攻击频频发生。为了解决这个问题,我们为设备制造商发布的固件开发了一种安全验证机制。我们提出了一种物联网网关,用于智能家居物联网设备的安全固件验证和更新,该网关采用了 IOTA MAM(掩码验证消息传递)协议和带有 IPFS(专有间文件系统)协议的分布式文件系统。这两个通信协议确保了物联网设备供应商和物联网终端设备之间的分散式通信和固件文件分发。拟议方案通过 IOTA 和 IPFS 网络安全共享最新固件内容,在物联网终端设备上执行安全固件更新,并确保固件的真实性和完整性。我们为固件更新和验证提出了两种验证方法。我们使用三个实体(供应商、物联网网关和物联网终端设备)实施了所提出的方案。我们的系统以极低的计算能力在物联网终端设备上执行安全的自动固件更新,取得了可喜的成果。该系统的功能是在作为物联网网关的树莓派(Raspberry Pi)上使用 IOTA 的 MAM 和 ESP8266 Wi-Fi 微控制器实现的,证明了我们方法的有效性。我们提出的方法可用于家庭物联网应用的安全固件分发。
{"title":"Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies","authors":"W. M. A. B. Wijesundara, Joong-Sun Lee, Dara Tith, Eleni Aloupogianni, Hiroyuki Suzuki, Takashi Obi","doi":"10.1007/s10207-024-00827-x","DOIUrl":"https://doi.org/10.1007/s10207-024-00827-x","url":null,"abstract":"<p>With the increase of IoT devices generating large amounts of user-sensitive data, improper firmware harms users’ security and privacy. Latest home appliances are integrated with features to assure compatibility with smart home IoT. However, applying complex security mechanisms to IoT is limited by device hardware capabilities, making them vulnerable to attacks. Such attacks have recently become frequent. To address this issue, we developed a secure verification mechanism for firmware released by the device’s manufacturer. We proposed an IoT gateway for secure firmware verification and updating for smart home IoT devices utilizing the IOTA MAM (Masked Authenticated Messaging) protocol and a distributed file system with IPFS (Inter-Planetary File System) protocol. These two communication protocols ensure decentralized communication and firmware file distribution between the IoT device vendor and the IoT end device. The proposed scheme securely shares latest firmware content over IOTA and IPFS networks, performs a secure firmware update on IoT end devices and ensures authenticity and integrity of the firmware. Two types of validation methods were proposed for firmware updating and validation. We implemented the proposed scheme using three entities, Vendor, IoT gateway, and IoT end device. Our system yielded promising results in performing secure automated firmware updates on IoT end devices with very low computational power. The system’s functionality was implemented using IOTA’s MAM run on Raspberry Pi as an IoT gateway along with an ESP8266 Wi-Fi microcontroller, demonstrating the effectiveness of our approach. Our proposed methodology can be used for secure firmware distribution on home IoT applications.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"13 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140071091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network 特征工程对车载 ad-hoc 网络中位置伪造攻击检测的影响
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-07 DOI: 10.1007/s10207-024-00830-2
Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam

The vehicular ad-hoc network is a technology that enables vehicles to interact with each other and the surrounding infrastructure, aiming to enhance road safety and driver comfort. However, it is susceptible to various security attacks. Among these attacks, the position falsification attack is regarded as one of the most serious, in which the malicious nodes tamper with their transmitted location. Thus, developing effective misbehavior detection schemes capable of detecting such attacks is crucial. Many of these schemes employ machine learning techniques to detect misbehavior based on the features of the exchanged messages. However, the studies that identify the impact of feature engineering on schemes’ performance and highlight the most efficient features and algorithms are limited. This paper conducts a comprehensive literature survey to identify the key features and algorithms used in the literature that lead to the best-performing models. Then, a comparative study using the VeReMi dataset, which is publicly available, is performed to assess six models implemented using three different machine learning algorithms and two feature sets: one comprising selected and derived features and the other including all message features. The findings show that two of the suggested models that employ feature engineering perform almost equally to existing studies in identifying two types of position falsification attacks while exhibiting performance improvements in detecting other types. Furthermore, the results of evaluating the proposed models using another simulation exhibit a substantial improvement achieved by employing feature engineering techniques, where the average accuracy of the models is increased by 6.31–47%, depending on the algorithm used.

车载 ad-hoc 网络是一种使车辆之间以及车辆与周围基础设施之间进行交互的技术,旨在提高道路安全性和驾驶舒适性。然而,它容易受到各种安全攻击。在这些攻击中,位置伪造攻击被认为是最严重的攻击之一,在这种攻击中,恶意节点会篡改其传输的位置。因此,开发能够检测此类攻击的有效不当行为检测方案至关重要。其中许多方案都采用了机器学习技术,根据交换信息的特征来检测不当行为。然而,能确定特征工程对方案性能的影响并强调最有效特征和算法的研究非常有限。本文进行了全面的文献调查,以确定文献中使用的导致最佳性能模型的关键特征和算法。然后,使用公开的 VeReMi 数据集进行了一项比较研究,评估了使用三种不同的机器学习算法和两个特征集实现的六个模型:一个特征集包括选定和衍生特征,另一个特征集包括所有信息特征。研究结果表明,在识别两种类型的位置伪造攻击方面,采用特征工程的两个建议模型的表现与现有研究几乎相同,而在检测其他类型的位置伪造攻击方面则表现出更高的性能。此外,使用另一种模拟方法对所建议的模型进行评估的结果表明,采用特征工程技术后,模型的平均准确率提高了 6.31-47%,具体取决于所使用的算法。
{"title":"Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network","authors":"Eslam Abdelkreem, Sherif Hussein, Ashraf Tammam","doi":"10.1007/s10207-024-00830-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00830-2","url":null,"abstract":"<p>The vehicular ad-hoc network is a technology that enables vehicles to interact with each other and the surrounding infrastructure, aiming to enhance road safety and driver comfort. However, it is susceptible to various security attacks. Among these attacks, the position falsification attack is regarded as one of the most serious, in which the malicious nodes tamper with their transmitted location. Thus, developing effective misbehavior detection schemes capable of detecting such attacks is crucial. Many of these schemes employ machine learning techniques to detect misbehavior based on the features of the exchanged messages. However, the studies that identify the impact of feature engineering on schemes’ performance and highlight the most efficient features and algorithms are limited. This paper conducts a comprehensive literature survey to identify the key features and algorithms used in the literature that lead to the best-performing models. Then, a comparative study using the VeReMi dataset, which is publicly available, is performed to assess six models implemented using three different machine learning algorithms and two feature sets: one comprising selected and derived features and the other including all message features. The findings show that two of the suggested models that employ feature engineering perform almost equally to existing studies in identifying two types of position falsification attacks while exhibiting performance improvements in detecting other types. Furthermore, the results of evaluating the proposed models using another simulation exhibit a substantial improvement achieved by employing feature engineering techniques, where the average accuracy of the models is increased by 6.31–47%, depending on the algorithm used.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"16 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140054718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices 网络卫生是解决 IPTV 侵权问题的良方吗?在线流媒体行为和网络安全实践研究
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-06 DOI: 10.1007/s10207-024-00824-0
Rajiv Shah, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos

Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic levels, with interventions having limited effect. To date, the dominant themes in interventions have been around personal deterrence (i.e. the threat of legal action) and have not considered other factors that may influence an individual’s decision to consume infringing content. In this paper, we consider psychological factors, including perceptions around risk-taking, security behaviours, problematic internet use and personality traits, to gain a comprehensive understanding of factors influencing engagement with IPTV and the potential implications for cyber security. For this purpose, a survey was conducted with 283 participants living in the UK (age range 18–74, male 104), and an integrated structural equation model was constructed. Our findings showed a positive relationship between security behaviours and the perceived risk of viewing IPTV and a negative relationship between the dark personality triad and the perceived risk of viewing IPTV. They suggest that security behaviours fully mediate the relationship between problematic internet use and IPTV risk-taking, indicating a potential new path for anti-piracy interventions with greater efficacy.

在音像产业快速现代化和互联网协议电视(IPTV)出现的刺激下,音像(AV)盗版达到了流行的程度,而干预措施的效果却十分有限。迄今为止,干预措施的主导主题一直围绕个人威慑(即法律行动的威胁),而没有考虑可能影响个人消费侵权内容决定的其他因素。在本文中,我们考虑了心理因素,包括对风险承担的看法、安全行为、有问题的互联网使用和个性特征,以全面了解影响参与 IPTV 的因素以及对网络安全的潜在影响。为此,我们对居住在英国的 283 名参与者(年龄在 18-74 岁之间,男性 104 人)进行了调查,并构建了一个综合结构方程模型。我们的研究结果表明,安全行为与观看 IPTV 的感知风险之间存在正相关关系,而黑暗人格三要素与观看 IPTV 的感知风险之间存在负相关关系。研究结果表明,安全行为完全调节了问题网络使用与观看 IPTV 风险之间的关系,为反盗版干预措施的有效实施指明了一条潜在的新途径。
{"title":"Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices","authors":"Rajiv Shah, Deniz Cemiloglu, Cagatay Yucel, Raian Ali, Vasilis Katos","doi":"10.1007/s10207-024-00824-0","DOIUrl":"https://doi.org/10.1007/s10207-024-00824-0","url":null,"abstract":"<p>Spurred by the rapid modernisation of the sector and the advent of Internet Protocol Television (IPTV), audiovisual (AV) piracy is at epidemic levels, with interventions having limited effect. To date, the dominant themes in interventions have been around personal deterrence (i.e. the threat of legal action) and have not considered other factors that may influence an individual’s decision to consume infringing content. In this paper, we consider psychological factors, including perceptions around risk-taking, security behaviours, problematic internet use and personality traits, to gain a comprehensive understanding of factors influencing engagement with IPTV and the potential implications for cyber security. For this purpose, a survey was conducted with 283 participants living in the UK (age range 18–74, male 104), and an integrated structural equation model was constructed. Our findings showed a positive relationship between security behaviours and the perceived risk of viewing IPTV and a negative relationship between the dark personality triad and the perceived risk of viewing IPTV. They suggest that security behaviours fully mediate the relationship between problematic internet use and IPTV risk-taking, indicating a potential new path for anti-piracy interventions with greater efficacy.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"66 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140054613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive review on permissions-based Android malware detection 基于权限的安卓恶意软件检测综述
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-04 DOI: 10.1007/s10207-024-00822-2
Yash Sharma, Anshul Arora

The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of Android malware has been explosive, analogous to the rise in the popularity of Android. The major positive aspect of Android is its open-source nature, which empowers app developers to expand their work. However, authors with malicious intentions pose grave threats to users. In the presence of such threats, Android malware detection is the need of an hour. Consequently, researchers have proposed various techniques involving static, dynamic, and hybrid analysis to address such threats to numerous features in the last decade. However, the feature that most researchers have extensively used to perform malware analysis and detection in Android security is Android permission. Hence, to provide a clarified overview of the latest and past work done in Android malware analysis and detection, we perform a comprehensive literature review using permissions as a central feature or in combination with other components by collecting and analyzing 205 studies from 2009 to 2023. We extracted information such as the choice opted by researchers between analysis or detection, techniques used to select or rank the permissions feature set, features used along with permissions, detection models employed, malware datasets used by researchers, and limitations and challenges in the field of Android malware detection to propose some future research directions. In addition, on the basis of the information extracted, we answer the six research questions designed considering the above factors.

2008 年 10 月底,首款支持安卓系统的 "G1 "手机首次亮相。此后,安卓恶意软件呈爆炸式增长,与安卓系统的普及程度不相上下。安卓系统的主要积极方面是其开源性,这使得应用程序开发人员能够扩展他们的工作。然而,怀有恶意的作者会对用户造成严重威胁。面对这些威胁,安卓恶意软件检测成为当务之急。因此,在过去十年中,研究人员提出了涉及静态、动态和混合分析的各种技术,以应对此类威胁的众多特征。然而,大多数研究人员广泛用于安卓安全恶意软件分析和检测的功能是安卓权限。因此,为了对安卓恶意软件分析和检测领域最新和过去的工作提供一个清晰的概览,我们通过收集和分析 2009 年至 2023 年的 205 项研究,对以权限为核心特征或与其他组件相结合的研究进行了全面的文献综述。我们提取了研究人员在分析或检测之间的选择、用于选择或排列权限特征集的技术、与权限一起使用的特征、采用的检测模型、研究人员使用的恶意软件数据集以及安卓恶意软件检测领域的局限性和挑战等信息,从而提出了一些未来的研究方向。此外,在提取信息的基础上,我们回答了考虑上述因素而设计的六个研究问题。
{"title":"A comprehensive review on permissions-based Android malware detection","authors":"Yash Sharma, Anshul Arora","doi":"10.1007/s10207-024-00822-2","DOIUrl":"https://doi.org/10.1007/s10207-024-00822-2","url":null,"abstract":"<p>The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of Android malware has been explosive, analogous to the rise in the popularity of Android. The major positive aspect of Android is its open-source nature, which empowers app developers to expand their work. However, authors with malicious intentions pose grave threats to users. In the presence of such threats, Android malware detection is the need of an hour. Consequently, researchers have proposed various techniques involving static, dynamic, and hybrid analysis to address such threats to numerous features in the last decade. However, the feature that most researchers have extensively used to perform malware analysis and detection in Android security is Android permission. Hence, to provide a clarified overview of the latest and past work done in Android malware analysis and detection, we perform a comprehensive literature review using permissions as a central feature or in combination with other components by collecting and analyzing 205 studies from 2009 to 2023. We extracted information such as the choice opted by researchers between analysis or detection, techniques used to select or rank the permissions feature set, features used along with permissions, detection models employed, malware datasets used by researchers, and limitations and challenges in the field of Android malware detection to propose some future research directions. In addition, on the basis of the information extracted, we answer the six research questions designed considering the above factors.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"7 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140032586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AutoPKI: public key infrastructure for IoT with automated trust transfer AutoPKI:自动信任传输的物联网公钥基础设施
IF 3.2 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-03-02 DOI: 10.1007/s10207-024-00825-z
Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza

IoT deployments grow in numbers and size, which makes questions of long-term support and maintainability increasingly important. Without scalable and standard-compliant capabilities to transfer the control of IoT devices between service providers, IoT system owners cannot ensure long-term maintainability, and risk vendor lock-in. The manual overhead must be kept low for large-scale IoT installations to be economically feasible. We propose AutoPKI, a lightweight protocol to update the IoT PKI credentials and shift the trusted domains, enabling the transfer of control between IoT service providers, building upon the latest IoT standards for secure communication and efficient encodings. We show that the overhead for the involved IoT devices is small and that the overall required manual overhead can be minimized. We analyse the fulfilment of the security requirements, and for a subset of them, we demonstrate that the desired security properties hold through formal verification using the Tamarin prover.

物联网部署的数量和规模不断增长,这使得长期支持和可维护性问题变得越来越重要。如果没有可扩展且符合标准的功能在服务提供商之间转移物联网设备的控制权,物联网系统所有者就无法确保长期的可维护性,并面临被供应商锁定的风险。大规模物联网安装必须保持较低的人工开销,这样才具有经济可行性。我们提出了 AutoPKI,这是一种更新物联网 PKI 证书和转移可信域的轻量级协议,它基于最新的物联网安全通信和高效编码标准,实现了物联网服务提供商之间的控制权转移。我们的研究表明,相关物联网设备的开销很小,所需的总体人工开销也能降到最低。我们分析了安全要求的满足情况,对于其中的一个子集,我们使用 Tamarin 校验器进行了形式验证,证明了所需的安全属性是成立的。
{"title":"AutoPKI: public key infrastructure for IoT with automated trust transfer","authors":"Joel Höglund, Simon Bouget, Martin Furuhed, John Preuß Mattsson, Göran Selander, Shahid Raza","doi":"10.1007/s10207-024-00825-z","DOIUrl":"https://doi.org/10.1007/s10207-024-00825-z","url":null,"abstract":"<p>IoT deployments grow in numbers and size, which makes questions of long-term support and maintainability increasingly important. Without scalable and standard-compliant capabilities to transfer the control of IoT devices between service providers, IoT system owners cannot ensure long-term maintainability, and risk vendor lock-in. The manual overhead must be kept low for large-scale IoT installations to be economically feasible. We propose AutoPKI, a lightweight protocol to update the IoT PKI credentials and shift the trusted domains, enabling the transfer of control between IoT service providers, building upon the latest IoT standards for secure communication and efficient encodings. We show that the overhead for the involved IoT devices is small and that the overall required manual overhead can be minimized. We analyse the fulfilment of the security requirements, and for a subset of them, we demonstrate that the desired security properties hold through formal verification using the Tamarin prover.</p>","PeriodicalId":50316,"journal":{"name":"International Journal of Information Security","volume":"4 1","pages":""},"PeriodicalIF":3.2,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140019896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1