首页 > 最新文献

Computer Software and Media Applications最新文献

英文 中文
Ftdho Zfnet: Block chain based Fractional Tasmanian Devil Harris optimization enabled deep learning using attack detection and mitigation Ftdho Zfnet:基于区块链的分数塔斯马尼亚魔鬼哈里斯优化深度学习,使用攻击检测和缓解功能
Pub Date : 2024-06-04 DOI: 10.24294/csma.v7i1.5224
S. S. Barani, R. Durga
Block chain technology is regarded for enhancing the characteristics of security because of decentralized design, safe distributed storage, and privacy. However, in recent times the present situation of block chain technology has experienced some crisis that may delay the quick acceptance and utilization in real-time applications. To conquer this subdues, a blockchain based system for attack detection and mitigation with Deep Learning (DL) named Fractional Tasmanian Devil Harris Optimization_Zeiler and Fergus network (FTDHO_ZFNet) is introduced. In this investigation, the entities utilized are owner, block chain, server, trusted authority and user. Here, authentication phase is done by means of Ethereum block chain by Key Exchange module and privacy preserved data sharing and communication is also done. Then, recorded log file creation is executed by the below mentioned stages. At first, a log file is generated with the basis of communication to record the events. After wards, the features are extracted by BoT-IoT database. Then, feature fusion is done by overlap coefficient utilizing Deep Q-Network (DQN). Moreover, data augmentation (DA) is doneusing bootstrapping method. At last, attack detection is observed by ZFNet tuned by FTDHO. Here, FTDHO is unified by Fractional Tasmanian Devil Optimization (FTDO) and Harris Hawks Optimization (HHO). Additionally, FTDO is integrated by Fractional Calculus (FC) concept and Tasmanian devil optimization (TDO). Furthermore, attack mitigation is performed. The performance measures applied for FTDHO_ZFNet are accuracy, and True Negative rate (TNR), observed supreme values with 92.9%, 93.8% and 92.9%.
区块链技术因其去中心化设计、安全的分布式存储和隐私性而被认为具有增强安全性的特点。然而,近来区块链技术的现状出现了一些危机,这可能会延迟其在实时应用中的快速接受和使用。为了克服这一不足,本文介绍了一种基于区块链的深度学习(DL)攻击检测和缓解系统,名为 "分数塔斯马尼亚魔鬼哈里斯优化_塞勒和弗格斯网络(FTDHO_ZFNet)"。在这项研究中,使用的实体包括所有者、区块链、服务器、可信机构和用户。在此,通过以太坊区块链的密钥交换模块完成身份验证阶段,并完成隐私保护数据共享和通信。然后,记录日志文件的创建由以下阶段完成。首先,在通信的基础上生成日志文件,记录事件。之后,通过 BoT-IoT 数据库提取特征。然后,利用深度 Q 网络(DQN)通过重叠系数进行特征融合。此外,还利用引导方法进行数据增强(DA)。最后,通过由 FTDHO 调整的 ZFNet 进行攻击检测。在这里,FTDHO 由分数塔斯马尼亚魔鬼优化(FTDO)和哈里斯-霍克斯优化(HHO)统一而成。此外,FTDHO 还与分数微积分(FC)概念和塔斯马尼亚魔鬼优化(TDO)相结合。此外,还进行了攻击缓解。FTDHO_ZFNet 的性能指标为准确率和真负率(TNR),观察到的最高值分别为 92.9%、93.8% 和 92.9%。
{"title":"Ftdho Zfnet: Block chain based Fractional Tasmanian Devil Harris optimization enabled deep learning using attack detection and mitigation","authors":"S. S. Barani, R. Durga","doi":"10.24294/csma.v7i1.5224","DOIUrl":"https://doi.org/10.24294/csma.v7i1.5224","url":null,"abstract":"Block chain technology is regarded for enhancing the characteristics of security because of decentralized design, safe distributed storage, and privacy. However, in recent times the present situation of block chain technology has experienced some crisis that may delay the quick acceptance and utilization in real-time applications. To conquer this subdues, a blockchain based system for attack detection and mitigation with Deep Learning (DL) named Fractional Tasmanian Devil Harris Optimization_Zeiler and Fergus network (FTDHO_ZFNet) is introduced. In this investigation, the entities utilized are owner, block chain, server, trusted authority and user. Here, authentication phase is done by means of Ethereum block chain by Key Exchange module and privacy preserved data sharing and communication is also done. Then, recorded log file creation is executed by the below mentioned stages. At first, a log file is generated with the basis of communication to record the events. After wards, the features are extracted by BoT-IoT database. Then, feature fusion is done by overlap coefficient utilizing Deep Q-Network (DQN). Moreover, data augmentation (DA) is doneusing bootstrapping method. At last, attack detection is observed by ZFNet tuned by FTDHO. Here, FTDHO is unified by Fractional Tasmanian Devil Optimization (FTDO) and Harris Hawks Optimization (HHO). Additionally, FTDO is integrated by Fractional Calculus (FC) concept and Tasmanian devil optimization (TDO). Furthermore, attack mitigation is performed. The performance measures applied for FTDHO_ZFNet are accuracy, and True Negative rate (TNR), observed supreme values with 92.9%, 93.8% and 92.9%.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"9 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141266923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of shadow detection and removal scheme in real-time still images 实时静态图像中阴影检测和去除方案的设计与分析
Pub Date : 2024-03-18 DOI: 10.24294/csma.v6i1.4303
Sameer Ali, Muhammad Adeel Karim, Junaid Akhtar, Tanveer Ahmed Khan, Sikander Khan Mandokhail, Ubaid Rehman Shaikh, Naveed Ahmed Buriro, Basit Ali Arain
This research’s main objective is to study and evaluate the detection and removal of undesired shadows from still images since these shadows might mask important information caused by light sources and other obstructions. A variety of methods for detecting and eliminating shadows as well as object tracking approaches based on movement estimation and identification are investigated. This includes shadow removal methods like background subtraction, which are intended to improve obstacle recognition of the source item and increase the accuracy of shadow removal from objects. When new items enter the frame, they are first distinguished from the background using a reference frame. The tracking procedure is made more difficult by the merging of the shadow with the foreground object. The approach highlights the difficulties in object detection owing to frequent occurrences of obstacles by using morphological procedures for shadow identification and removal. The proposed approach uses feature extraction is also discussed, highlighting its importance in image processing research and the use of suggested methods to get over obstacles in image sequences. The proposed method for shadow identification and removal offers a novel approach to improve image processing when dealing with still images. The purpose of this technique is to better detect and remove shadows from images, which will increase the precision of object tracking and detection. Depending on the type of images being processed, the process begins with initializing a background model, which is based on a static image background.
这项研究的主要目的是研究和评估如何检测和消除静止图像中不受欢迎的阴影,因为这些阴影可能会掩盖光源和其他障碍物造成的重要信息。研究了多种检测和消除阴影的方法,以及基于运动估计和识别的物体跟踪方法。其中包括背景减影等阴影消除方法,这些方法的目的是改善源项目的障碍物识别,并提高物体阴影消除的准确性。当新物品进入帧时,首先要使用参考帧将它们与背景区分开来。由于阴影与前景物体合并,跟踪过程变得更加困难。该方法通过使用形态学程序识别和去除阴影,突出了由于障碍物频繁出现而导致的物体检测困难。此外,还讨论了使用特征提取的拟议方法,强调其在图像处理研究中的重要性,以及使用建议的方法克服图像序列中的障碍。所提出的阴影识别和去除方法为改进静态图像的图像处理提供了一种新方法。这项技术的目的是更好地检测和去除图像中的阴影,从而提高物体跟踪和检测的精度。根据所处理图像的类型,处理过程从初始化背景模型开始,背景模型基于静态图像背景。
{"title":"Design and analysis of shadow detection and removal scheme in real-time still images","authors":"Sameer Ali, Muhammad Adeel Karim, Junaid Akhtar, Tanveer Ahmed Khan, Sikander Khan Mandokhail, Ubaid Rehman Shaikh, Naveed Ahmed Buriro, Basit Ali Arain","doi":"10.24294/csma.v6i1.4303","DOIUrl":"https://doi.org/10.24294/csma.v6i1.4303","url":null,"abstract":"This research’s main objective is to study and evaluate the detection and removal of undesired shadows from still images since these shadows might mask important information caused by light sources and other obstructions. A variety of methods for detecting and eliminating shadows as well as object tracking approaches based on movement estimation and identification are investigated. This includes shadow removal methods like background subtraction, which are intended to improve obstacle recognition of the source item and increase the accuracy of shadow removal from objects. When new items enter the frame, they are first distinguished from the background using a reference frame. The tracking procedure is made more difficult by the merging of the shadow with the foreground object. The approach highlights the difficulties in object detection owing to frequent occurrences of obstacles by using morphological procedures for shadow identification and removal. The proposed approach uses feature extraction is also discussed, highlighting its importance in image processing research and the use of suggested methods to get over obstacles in image sequences. The proposed method for shadow identification and removal offers a novel approach to improve image processing when dealing with still images. The purpose of this technique is to better detect and remove shadows from images, which will increase the precision of object tracking and detection. Depending on the type of images being processed, the process begins with initializing a background model, which is based on a static image background.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"240 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140233698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software security: Threats, solutions and challenges 软件安全:威胁、解决方案和挑战
Pub Date : 2024-02-21 DOI: 10.24294/csma.v6i1.3769
Himani Mittal
Software security is of great concern as computers have entered almost all walks of life and people at large have become dependent on technology for not only entertainment and communication but for performing tasks involving money and a lot of stake. Software security not only involves securing the software but also user data and communication media. This paper states the several types of security threats that exist since the time networking has evolved, namely, malware, Trojans, viruses, denial of service attacks, and many more. This paper reviews several measures to address these threats. It includes logging, anti-malware, network security methods, and encryption methods. It has been identified that a lot of work has been done to deal with security threats, and it is not only limited to the protection of software but also extends to the protection of data and networks. The existing methods make extensive use of artificial intelligence, and it is identified that there is a need to develop a model that is able to identify known as well as unknown threats. There is a huge scope for research in this area.
由于计算机几乎已进入各行各业,人们不仅在娱乐和通信方面依赖技术,而且在执行涉及金钱和大量利益的任务时也依赖技术,因此软件安全备受关注。软件安全不仅涉及软件的安全,还涉及用户数据和通信媒体的安全。本文阐述了自网络发展以来存在的几类安全威胁,即恶意软件、木马、病毒、拒绝服务攻击等。本文回顾了应对这些威胁的几种措施。其中包括日志记录、反恶意软件、网络安全方法和加密方法。我们发现,在应对安全威胁方面已经做了大量工作,不仅限于保护软件,还扩展到保护数据和网络。现有的方法广泛使用了人工智能,因此需要开发一种能够识别已知和未知威胁的模型。这一领域的研究空间巨大。
{"title":"Software security: Threats, solutions and challenges","authors":"Himani Mittal","doi":"10.24294/csma.v6i1.3769","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3769","url":null,"abstract":"Software security is of great concern as computers have entered almost all walks of life and people at large have become dependent on technology for not only entertainment and communication but for performing tasks involving money and a lot of stake. Software security not only involves securing the software but also user data and communication media. This paper states the several types of security threats that exist since the time networking has evolved, namely, malware, Trojans, viruses, denial of service attacks, and many more. This paper reviews several measures to address these threats. It includes logging, anti-malware, network security methods, and encryption methods. It has been identified that a lot of work has been done to deal with security threats, and it is not only limited to the protection of software but also extends to the protection of data and networks. The existing methods make extensive use of artificial intelligence, and it is identified that there is a need to develop a model that is able to identify known as well as unknown threats. There is a huge scope for research in this area.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"10 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140442335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrate between information systems engineering and software engineering theories for successful quality engineering measurement of software: Valid instrument pre-results 整合信息系统工程和软件工程理论,成功进行软件质量工程测量:有效仪器的预结果
Pub Date : 2024-02-21 DOI: 10.24294/csma.v6i1.3382
Amani Ali Ibrahim Almetwaly, I. Fadhel
An extensive number of instruments and systems assessment tools are weak and not good enough in the appraisal of systems’ quality engineer success measurement. Thus, the comprehension of systems’ success is very serious. One of the purposes of this research topic is to develop a successful, novel, validated instrument for measuring system quality success based on the integration between theories of information systems (Seddon and DeLone & McLean) and software engineering theory (ISO 25010). To ensure the quality of the instrument before use, eight academic experts have validated. The reason for expanding the number of experts to eight is to accurately build and evaluate the instrument because this instrument is the first one erring. After expert validation done successfully, researchers started the process of instrument pre-test. Pre-test verification and validation results done by test the instrument of 74 users. The results of the statistical testing were perfect. The Composite reliability proposed value is 0.7, The average variance extracted value is 0.5. Cronbach’s alpha is higher than 0.7. The value of Spearman’s reliable rhea is >0.6. Results approved that this instrument is strong and perfect to be used as a valid tool for system success measurement.
大量的工具和系统评估工具在评估系统质量工程师的成功衡量方面都很薄弱,不够完善。因此,对系统成功的理解非常重要。本研究课题的目的之一是在信息系统理论(Seddon 和 DeLone & McLean)和软件工程理论(ISO 25010)的基础上,开发一种成功的、新颖的、经过验证的系统质量成功度测量工具。为确保该工具在使用前的质量,八位学术专家对其进行了验证。将专家人数增加到八位的原因是为了准确地构建和评估该工具,因为该工具是第一个出错的工具。专家论证成功后,研究人员开始了工具的预试过程。通过对 74 名用户进行测试,对测试结果进行了验证和确认。统计测试的结果非常完美。综合信度建议值为 0.7,平均方差提取值为 0.5。Cronbach's alpha 高于 0.7。斯皮尔曼信度值大于 0.6。结果表明,该工具非常强大,完全可以作为系统成功度测量的有效工具。
{"title":"Integrate between information systems engineering and software engineering theories for successful quality engineering measurement of software: Valid instrument pre-results","authors":"Amani Ali Ibrahim Almetwaly, I. Fadhel","doi":"10.24294/csma.v6i1.3382","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3382","url":null,"abstract":"An extensive number of instruments and systems assessment tools are weak and not good enough in the appraisal of systems’ quality engineer success measurement. Thus, the comprehension of systems’ success is very serious. One of the purposes of this research topic is to develop a successful, novel, validated instrument for measuring system quality success based on the integration between theories of information systems (Seddon and DeLone & McLean) and software engineering theory (ISO 25010). To ensure the quality of the instrument before use, eight academic experts have validated. The reason for expanding the number of experts to eight is to accurately build and evaluate the instrument because this instrument is the first one erring. After expert validation done successfully, researchers started the process of instrument pre-test. Pre-test verification and validation results done by test the instrument of 74 users. The results of the statistical testing were perfect. The Composite reliability proposed value is 0.7, The average variance extracted value is 0.5. Cronbach’s alpha is higher than 0.7. The value of Spearman’s reliable rhea is >0.6. Results approved that this instrument is strong and perfect to be used as a valid tool for system success measurement.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140444204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in software engineering using AI 利用人工智能推进软件工程
Pub Date : 2024-02-01 DOI: 10.24294/csma.v6i1.3906
Hazem W. Marar
The integration of Artificial Intelligence (AI) into the space of software engineering marks a transformative period that reshapes traditional development processes and propels the industry into a new era of innovation. This exploration delves into the multifaceted impact of AI, from its roots in early symbolic AI to the contemporary dominance of machine learning and deep learning. AI’s applications span various domains, but its significance in software engineering lies in its ability to enhance efficiency, improve software quality, and introduce novel approaches to problem-solving. From automating routine tasks to streamlining complex development workflows, AI acts as a virtual collaborator, allowing human developers to focus on higher-order thinking and creativity. This study introduces the application of AI in software engineering. reverse-engineering, and development environments. Moreover, ethical considerations, challenges, and future trends, including explainable AI, reinforcement learning, and human-AI collaboration, are presented.
人工智能(AI)融入软件工程领域标志着一个变革时期的到来,它重塑了传统的开发流程,并推动整个行业进入创新的新时代。本讲座深入探讨了人工智能的多方面影响,从早期的符号人工智能到当代占主导地位的机器学习和深度学习。人工智能的应用横跨各个领域,但它对软件工程的意义在于能够提高效率、改善软件质量,并为解决问题引入新的方法。从自动化日常任务到简化复杂的开发工作流程,人工智能充当着虚拟合作者的角色,让人类开发人员能够专注于高阶思维和创造力。本研究介绍了人工智能在软件工程、逆向工程和开发环境中的应用。此外,还介绍了伦理考虑、挑战和未来趋势,包括可解释的人工智能、强化学习和人类与人工智能的协作。
{"title":"Advancements in software engineering using AI","authors":"Hazem W. Marar","doi":"10.24294/csma.v6i1.3906","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3906","url":null,"abstract":"The integration of Artificial Intelligence (AI) into the space of software engineering marks a transformative period that reshapes traditional development processes and propels the industry into a new era of innovation. This exploration delves into the multifaceted impact of AI, from its roots in early symbolic AI to the contemporary dominance of machine learning and deep learning. AI’s applications span various domains, but its significance in software engineering lies in its ability to enhance efficiency, improve software quality, and introduce novel approaches to problem-solving. From automating routine tasks to streamlining complex development workflows, AI acts as a virtual collaborator, allowing human developers to focus on higher-order thinking and creativity. This study introduces the application of AI in software engineering. reverse-engineering, and development environments. Moreover, ethical considerations, challenges, and future trends, including explainable AI, reinforcement learning, and human-AI collaboration, are presented.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"162 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139822969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in software engineering using AI 利用人工智能推进软件工程
Pub Date : 2024-02-01 DOI: 10.24294/csma.v6i1.3906
Hazem W. Marar
The integration of Artificial Intelligence (AI) into the space of software engineering marks a transformative period that reshapes traditional development processes and propels the industry into a new era of innovation. This exploration delves into the multifaceted impact of AI, from its roots in early symbolic AI to the contemporary dominance of machine learning and deep learning. AI’s applications span various domains, but its significance in software engineering lies in its ability to enhance efficiency, improve software quality, and introduce novel approaches to problem-solving. From automating routine tasks to streamlining complex development workflows, AI acts as a virtual collaborator, allowing human developers to focus on higher-order thinking and creativity. This study introduces the application of AI in software engineering. reverse-engineering, and development environments. Moreover, ethical considerations, challenges, and future trends, including explainable AI, reinforcement learning, and human-AI collaboration, are presented.
人工智能(AI)融入软件工程领域标志着一个变革时期的到来,它重塑了传统的开发流程,并推动整个行业进入创新的新时代。本讲座深入探讨了人工智能的多方面影响,从早期的符号人工智能到当代占主导地位的机器学习和深度学习。人工智能的应用横跨各个领域,但它对软件工程的意义在于能够提高效率、改善软件质量,并为解决问题引入新的方法。从自动化日常任务到简化复杂的开发工作流程,人工智能充当着虚拟合作者的角色,让人类开发人员能够专注于高阶思维和创造力。本研究介绍了人工智能在软件工程、逆向工程和开发环境中的应用。此外,还介绍了伦理考虑、挑战和未来趋势,包括可解释的人工智能、强化学习和人类与人工智能的协作。
{"title":"Advancements in software engineering using AI","authors":"Hazem W. Marar","doi":"10.24294/csma.v6i1.3906","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3906","url":null,"abstract":"The integration of Artificial Intelligence (AI) into the space of software engineering marks a transformative period that reshapes traditional development processes and propels the industry into a new era of innovation. This exploration delves into the multifaceted impact of AI, from its roots in early symbolic AI to the contemporary dominance of machine learning and deep learning. AI’s applications span various domains, but its significance in software engineering lies in its ability to enhance efficiency, improve software quality, and introduce novel approaches to problem-solving. From automating routine tasks to streamlining complex development workflows, AI acts as a virtual collaborator, allowing human developers to focus on higher-order thinking and creativity. This study introduces the application of AI in software engineering. reverse-engineering, and development environments. Moreover, ethical considerations, challenges, and future trends, including explainable AI, reinforcement learning, and human-AI collaboration, are presented.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"13 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139883012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized secure dual authentication for VANETs 针对 VANET 的优化安全双重认证
Pub Date : 2024-01-26 DOI: 10.24294/csma.v6i1.3061
Deepalakshmi Kandeepan, R. Durga
“Vehicular Ad-hoc Network (VANET)” has emerged as a hotbed of research and development. This technology has been utilized to improve vehicle and road safety by transmitting information about traffic congestion and road conditions during emergencies in order to soothe drivers and passengers. However, such environments are more vulnerable to security risks. Thus, the primary challenge in such an environment is to provide authentication services while maintaining user confidentiality. To that end, a trustworthy authority (TA) is established, which offers services to users as well as authentication of communications transmitted between trusted authorities and VANET nodes. A trusted authority (TA) is established using VANETs to supply clients with a range of online premium services. As a result, preserving the confidentiality and authenticity of messages conducted between the TA and VANET nodes is crucial. Our proposed method minimizes recognition latency by up to 85% when compared to On-site Driver ID, and decreases authentication latency by up to 94%, respectively.
"车载 Ad-hoc 网络(VANET)"已成为研究和开发的温床。这项技术已被用于改善车辆和道路安全,在紧急情况下传输有关交通拥堵和道路状况的信息,以安抚司机和乘客的情绪。然而,这种环境更容易受到安全风险的影响。因此,在这样的环境中,首要的挑战是在提供身份验证服务的同时维护用户的机密性。为此,需要建立一个可信机构(TA),为用户提供服务,并对可信机构和 VANET 节点之间传输的通信进行验证。利用 VANET 建立可信机构(TA),为客户提供一系列在线优质服务。因此,保护 TA 与 VANET 节点之间信息的机密性和真实性至关重要。与现场驾驶员 ID 相比,我们提出的方法可将识别延迟时间减少 85%,将认证延迟时间减少 94%。
{"title":"An optimized secure dual authentication for VANETs","authors":"Deepalakshmi Kandeepan, R. Durga","doi":"10.24294/csma.v6i1.3061","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3061","url":null,"abstract":"“Vehicular Ad-hoc Network (VANET)” has emerged as a hotbed of research and development. This technology has been utilized to improve vehicle and road safety by transmitting information about traffic congestion and road conditions during emergencies in order to soothe drivers and passengers. However, such environments are more vulnerable to security risks. Thus, the primary challenge in such an environment is to provide authentication services while maintaining user confidentiality. To that end, a trustworthy authority (TA) is established, which offers services to users as well as authentication of communications transmitted between trusted authorities and VANET nodes. A trusted authority (TA) is established using VANETs to supply clients with a range of online premium services. As a result, preserving the confidentiality and authenticity of messages conducted between the TA and VANET nodes is crucial. Our proposed method minimizes recognition latency by up to 85% when compared to On-site Driver ID, and decreases authentication latency by up to 94%, respectively.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"78 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139593663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PDHSMICK: A partial key-based secure EHRs with distributed cloud for healthcare systems applying MI-CRYSTALS-Kyber PDHSMICK:应用 MI-CRYSTALS-Kyber,基于部分密钥的医疗保健系统分布式云安全电子病历
Pub Date : 2023-12-15 DOI: 10.24294/csma.v6i1.3062
Prathima Subramanian, R. Durga
Healthcare, which raises several challenges regarding security and privacy, is the largest sector of society dealing with patients’ health data. Numerous approaches have been developed regarding healthcare; however, these approaches lead to high response time and leakage of transaction privacy. Thus, this work proposes PDHSMICK, a partial key-based secure EHRs with distributed cloud for Healthcare Systems applying Mimetic Interpolation-based CRYSTALS-Kyber (MI-CRYSTAL-Kyber). Primarily, the patient and doctor register with the system. After that, the patient logs in and books an appointment with the doctor. Then, consultation is done, and their details are sent to the Third-Party Auditor (TPA), where they store the information in the log file. Afterwards, the patient verifies the log file and then uploads the information to the concerned Cloud Server (CS). During uploading, the files are split, and the attributes from the files and Distributed Cloud Server (DCS) are extracted. Then, by utilizing Interpolation-based Pearson Correlation Coefficient (I-PCC), a particular DCS is selected. After that, for authorization purposes, a hash code and digital signature are generated by utilizing Exponential based Extensible Output Functions (EX-EOF) and Double Mod-Digital Signature Algorithm (DM-DSA). Concurrently, the files are encrypted by employing MI-CRYSTAL-Kyber techniques. Lastly, the doctor logs on to the system, and hash code and digital signature verification are performed. The system allows the doctor to download the data if the verification matches. Also, the experimental assessment was validated, which shows the proposed technique’s efficacy.
医疗保健是社会中处理患者健康数据最多的部门,它在安全和隐私方面提出了多项挑战。目前已开发出许多与医疗保健相关的方法,但这些方法都会导致响应时间过长和交易隐私泄露。因此,本研究提出了 PDHSMICK,这是一种基于部分密钥的安全电子病历,采用基于仿插值的 CRYSTALS-Kyber (MI-CRYSTAL-Kyber),用于医疗保健系统的分布式云。首先,病人和医生在系统中注册。然后,患者登录并预约医生。然后进行咨询,并将其详细信息发送给第三方审计员(TPA),由他们将信息存储在日志文件中。之后,患者验证日志文件,然后将信息上传到相关的云服务器(CS)。在上传过程中,文件被分割,文件和分布式云服务器(DCS)的属性被提取。然后,利用基于插值的皮尔逊相关系数(I-PCC),选择特定的 DCS。然后,为了授权目的,利用基于指数的可扩展输出函数(EX-EOF)和双模数字签名算法(DM-DSA)生成哈希代码和数字签名。同时,采用 MI-CRYSTAL-Kyber 技术对文件进行加密。最后,医生登录系统,进行哈希码和数字签名验证。如果验证结果相符,系统允许医生下载数据。此外,实验评估也得到了验证,表明了所建议技术的有效性。
{"title":"PDHSMICK: A partial key-based secure EHRs with distributed cloud for healthcare systems applying MI-CRYSTALS-Kyber","authors":"Prathima Subramanian, R. Durga","doi":"10.24294/csma.v6i1.3062","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3062","url":null,"abstract":"Healthcare, which raises several challenges regarding security and privacy, is the largest sector of society dealing with patients’ health data. Numerous approaches have been developed regarding healthcare; however, these approaches lead to high response time and leakage of transaction privacy. Thus, this work proposes PDHSMICK, a partial key-based secure EHRs with distributed cloud for Healthcare Systems applying Mimetic Interpolation-based CRYSTALS-Kyber (MI-CRYSTAL-Kyber). Primarily, the patient and doctor register with the system. After that, the patient logs in and books an appointment with the doctor. Then, consultation is done, and their details are sent to the Third-Party Auditor (TPA), where they store the information in the log file. Afterwards, the patient verifies the log file and then uploads the information to the concerned Cloud Server (CS). During uploading, the files are split, and the attributes from the files and Distributed Cloud Server (DCS) are extracted. Then, by utilizing Interpolation-based Pearson Correlation Coefficient (I-PCC), a particular DCS is selected. After that, for authorization purposes, a hash code and digital signature are generated by utilizing Exponential based Extensible Output Functions (EX-EOF) and Double Mod-Digital Signature Algorithm (DM-DSA). Concurrently, the files are encrypted by employing MI-CRYSTAL-Kyber techniques. Lastly, the doctor logs on to the system, and hash code and digital signature verification are performed. The system allows the doctor to download the data if the verification matches. Also, the experimental assessment was validated, which shows the proposed technique’s efficacy.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"1 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139178846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Software and Media Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1