首页 > 最新文献

Computer Standards & Interfaces最新文献

英文 中文
Enhancing security, privacy, and usability in social robots: A software development framework 增强社交机器人的安全性、隐私性和可用性:一个软件开发框架
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-16 DOI: 10.1016/j.csi.2025.104052
Samson O. Oruma , Mary Sánchez-Gordón , Vasileios Gkioulos
The field of social robotics is witnessing a transformative shift in public interaction and service provision with the advent of Social Robots in Public Spaces (SRPS). However, this progress brings forth significant software security challenges. Developers and stakeholders struggle with designing secure SRPS software without specific standards and frameworks. Existing Secure Software Development Life Cycles fall short in addressing the intricate security needs of SRPS, often prioritizing functionality over security. Integrating various technologies within SRPS and the dynamic nature of public spaces compounds the challenge of ensuring security and user acceptance. To bridge this gap, this study proposes SecuRoPS, a framework designed specifically to address the unique security, safety, and usability requirements of SRPS throughout the software development lifecycle by emphasizing stakeholder engagement, regulatory compliance, and continuous iterative improvements. Built on a robust technology transfer model, the framework is validated through expert interviews, real-world use cases, and laboratory testing, ensuring practical applicability and adaptability to evolving threats. This iterative framework aims to guide various stakeholders, including software developers, organizations, researchers, and end-users, fostering wider acceptance and facilitating the safe integration of social robots into everyday life.
随着公共空间社交机器人(SRPS)的出现,社交机器人领域正在见证公共互动和服务提供的变革转变。然而,这一进展也带来了重大的软件安全挑战。在没有特定标准和框架的情况下,开发人员和涉众努力设计安全的SRPS软件。现有的安全软件开发生命周期在处理SRPS复杂的安全需求方面存在不足,通常优先考虑功能而不是安全性。在SRPS和公共空间的动态特性中集成各种技术,使确保安全性和用户接受度的挑战复杂化。为了弥合这一差距,本研究提出了SecuRoPS,这是一个专门设计的框架,通过强调涉众参与、法规遵从性和持续迭代改进,来解决SRPS在整个软件开发生命周期中独特的安全性、安全性和可用性需求。该框架建立在健壮的技术转移模型之上,通过专家访谈、真实用例和实验室测试进行验证,确保了对不断变化的威胁的实际适用性和适应性。这个迭代框架旨在指导各种利益相关者,包括软件开发人员、组织、研究人员和最终用户,促进更广泛的接受并促进社交机器人安全集成到日常生活中。
{"title":"Enhancing security, privacy, and usability in social robots: A software development framework","authors":"Samson O. Oruma ,&nbsp;Mary Sánchez-Gordón ,&nbsp;Vasileios Gkioulos","doi":"10.1016/j.csi.2025.104052","DOIUrl":"10.1016/j.csi.2025.104052","url":null,"abstract":"<div><div>The field of social robotics is witnessing a transformative shift in public interaction and service provision with the advent of Social Robots in Public Spaces (SRPS). However, this progress brings forth significant software security challenges. Developers and stakeholders struggle with designing secure SRPS software without specific standards and frameworks. Existing Secure Software Development Life Cycles fall short in addressing the intricate security needs of SRPS, often prioritizing functionality over security. Integrating various technologies within SRPS and the dynamic nature of public spaces compounds the challenge of ensuring security and user acceptance. To bridge this gap, this study proposes SecuRoPS, a framework designed specifically to address the unique security, safety, and usability requirements of SRPS throughout the software development lifecycle by emphasizing stakeholder engagement, regulatory compliance, and continuous iterative improvements. Built on a robust technology transfer model, the framework is validated through expert interviews, real-world use cases, and laboratory testing, ensuring practical applicability and adaptability to evolving threats. This iterative framework aims to guide various stakeholders, including software developers, organizations, researchers, and end-users, fostering wider acceptance and facilitating the safe integration of social robots into everyday life.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104052"},"PeriodicalIF":3.1,"publicationDate":"2025-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144886894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new multi-image encryption scheme for Smart Home IoT integrating hyperchaos and compressive sensing 集成超混沌和压缩感知的智能家居物联网多图像加密新方案
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-09 DOI: 10.1016/j.csi.2025.104051
Yuanmao Zhong, Qiang Lai, Chongkun Zhu, Minghong Qin
The rapid development of Smart Home IoT (SH-IoT) technologies presents considerable challenges in information security and privacy protection, including recurrent data breaches and privacy violations. Addressing these issues, this study introduces a multi-image encryption algorithm utilizing a novel 3D discrete hyperchaotic map to strengthen SH-IoT security. The solution simultaneously encrypts multiple images by integrating compressive sensing, while novel encryption units disrupt pixel correlations through cross-plane permutation and ring chain diffusion. Demonstrating remarkable adaptability, the algorithm dynamically adjusts compression ratios according to device capabilities and application demands, optimizing the security-efficiency-quality balance. Experimental validation confirms exceptional performance: achieving 99.6095% NPCR and 33.4597% UACI, along with a 2481 kb/s encryption speed at 0.5 compression ratio—substantially outperforming non-compressed scenarios.
智能家居物联网(SH-IoT)技术的快速发展给信息安全和隐私保护带来了相当大的挑战,包括反复发生的数据泄露和隐私侵犯。为了解决这些问题,本研究引入了一种利用新型3D离散超混沌映射的多图像加密算法来增强SH-IoT安全性。该解决方案通过集成压缩感知同时加密多幅图像,而新的加密单元通过跨平面排列和环链扩散破坏像素相关性。该算法具有较强的适应性,可根据设备性能和应用需求动态调整压缩比,优化安全-效率-质量的平衡。实验验证证实了卓越的性能:在0.5压缩比下实现99.6095%的NPCR和33.4597%的UACI,以及2481 kb/s的加密速度-大大优于非压缩场景。
{"title":"A new multi-image encryption scheme for Smart Home IoT integrating hyperchaos and compressive sensing","authors":"Yuanmao Zhong,&nbsp;Qiang Lai,&nbsp;Chongkun Zhu,&nbsp;Minghong Qin","doi":"10.1016/j.csi.2025.104051","DOIUrl":"10.1016/j.csi.2025.104051","url":null,"abstract":"<div><div>The rapid development of Smart Home IoT (SH-IoT) technologies presents considerable challenges in information security and privacy protection, including recurrent data breaches and privacy violations. Addressing these issues, this study introduces a multi-image encryption algorithm utilizing a novel 3D discrete hyperchaotic map to strengthen SH-IoT security. The solution simultaneously encrypts multiple images by integrating compressive sensing, while novel encryption units disrupt pixel correlations through cross-plane permutation and ring chain diffusion. Demonstrating remarkable adaptability, the algorithm dynamically adjusts compression ratios according to device capabilities and application demands, optimizing the security-efficiency-quality balance. Experimental validation confirms exceptional performance: achieving 99.6095% NPCR and 33.4597% UACI, along with a 2481 kb/s encryption speed at 0.5 compression ratio—substantially outperforming non-compressed scenarios.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104051"},"PeriodicalIF":3.1,"publicationDate":"2025-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144829124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based automated segmentation of brain tumors using synthetic MR images generated with DCGAN 使用DCGAN生成的合成MR图像,基于深度学习的脑肿瘤自动分割
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-08 DOI: 10.1016/j.csi.2025.104054
Ercüment Güvenç , Mevlüt Ersoy , Gürcan Çetin
Early detection of a brain tumor significantly increases the likelihood that treatment will begin in a timely manner. Because it is difficult to detect tumor tissue with visual inspection, the magnetic resonance (MR) imaging method was developed. The analysis of MR images largely dependent on the radiologist's experience and visual interpretation. The primary reason for this is that brain tumors can vary in form and size. Deep learning (DL)-based techniques have accelerated medical image segmentation research thanks to their self-learning capabilities. When large amounts of training data are presented, these methods can achieve high success rates. ImageNet, CIFAR10/100, PASCAL VOC, MS COCO, and BRaTS benchmark datasets are extensively used for brain tumor segmentation. However, the limited amount of data in these datasets restricts the performance of DL models. The outstanding performance of Generative Adversarial Networks (GAN) in the field of medical image generation has attracted the interest of academics in recent years. In the study, we present a deep learning model that creates synthetic brain MR images using a Deep Convolutional GAN (DCGAN). The BRaTS2018 dataset's FLAIR sequence training data has been utilized as input. After a certain number of epochs, the learning model generated realistic and high-quality brain MR images. The FID score was used to evaluate the performance of the GAN model. Tumor regions on the generated MR images have been segmented automatically using the K-means algorithm and produced a high-dimensional dataset of 782 images. The study examined to what extent synthetic MR images enhanced the tumor region segmentation performance of the UNet, ResUNet, ResNet50, VGG16, and VGG19 models. According to the findings of the study, the ResNet50 model outperformed the other DL models. In terms of model performance, accuracy improved from 98.99% to 99.26%, the dice coefficient score moved from 57.33% to 81.32%, and the IoU increased from 40.89% to 66.86%.
脑肿瘤的早期发现大大增加了及时开始治疗的可能性。由于肉眼很难检测到肿瘤组织,因此发展了磁共振成像方法。MR图像的分析很大程度上依赖于放射科医生的经验和视觉解释。造成这种情况的主要原因是脑肿瘤的形式和大小各不相同。基于深度学习(DL)技术的自学习能力加速了医学图像分割研究。当训练数据量较大时,这些方法可以获得较高的成功率。ImageNet、CIFAR10/100、PASCAL VOC、MS COCO、BRaTS等基准数据集被广泛用于脑肿瘤分割。然而,这些数据集中有限的数据量限制了深度学习模型的性能。近年来,生成对抗网络(GAN)在医学图像生成领域的突出表现引起了学术界的关注。在这项研究中,我们提出了一个使用深度卷积GAN (DCGAN)创建合成脑磁共振图像的深度学习模型。使用BRaTS2018数据集的FLAIR序列训练数据作为输入。经过一定次数的epoch后,学习模型生成了逼真的高质量脑MR图像。FID评分用于评估GAN模型的性能。利用K-means算法对生成的MR图像上的肿瘤区域进行自动分割,生成782张图像的高维数据集。研究考察了合成MR图像在多大程度上增强了UNet、ResUNet、ResNet50、VGG16和VGG19模型的肿瘤区域分割性能。根据研究结果,ResNet50模型优于其他DL模型。在模型性能方面,准确率从98.99%提高到99.26%,骰子系数得分从57.33%提高到81.32%,IoU从40.89%提高到66.86%。
{"title":"Deep learning-based automated segmentation of brain tumors using synthetic MR images generated with DCGAN","authors":"Ercüment Güvenç ,&nbsp;Mevlüt Ersoy ,&nbsp;Gürcan Çetin","doi":"10.1016/j.csi.2025.104054","DOIUrl":"10.1016/j.csi.2025.104054","url":null,"abstract":"<div><div>Early detection of a brain tumor significantly increases the likelihood that treatment will begin in a timely manner. Because it is difficult to detect tumor tissue with visual inspection, the magnetic resonance (MR) imaging method was developed. The analysis of MR images largely dependent on the radiologist's experience and visual interpretation. The primary reason for this is that brain tumors can vary in form and size. Deep learning (DL)-based techniques have accelerated medical image segmentation research thanks to their self-learning capabilities. When large amounts of training data are presented, these methods can achieve high success rates. ImageNet, CIFAR10/100, PASCAL VOC, MS COCO, and BRaTS benchmark datasets are extensively used for brain tumor segmentation. However, the limited amount of data in these datasets restricts the performance of DL models. The outstanding performance of Generative Adversarial Networks (GAN) in the field of medical image generation has attracted the interest of academics in recent years. In the study, we present a deep learning model that creates synthetic brain MR images using a Deep Convolutional GAN (DCGAN). The BRaTS2018 dataset's FLAIR sequence training data has been utilized as input. After a certain number of epochs, the learning model generated realistic and high-quality brain MR images. The FID score was used to evaluate the performance of the GAN model. Tumor regions on the generated MR images have been segmented automatically using the K-means algorithm and produced a high-dimensional dataset of 782 images. The study examined to what extent synthetic MR images enhanced the tumor region segmentation performance of the UNet, ResUNet, ResNet50, VGG16, and VGG19 models. According to the findings of the study, the ResNet50 model outperformed the other DL models. In terms of model performance, accuracy improved from 98.99% to 99.26%, the dice coefficient score moved from 57.33% to 81.32%, and the IoU increased from 40.89% to 66.86%.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104054"},"PeriodicalIF":3.1,"publicationDate":"2025-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144902953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SMART-DEFENSE: 3D hexagonal federated network for systematic attack detection in blockchain-integrated healthcare environment SMART-DEFENSE:用于区块链集成医疗环境中系统攻击检测的3D六边形联合网络
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-07 DOI: 10.1016/j.csi.2025.104053
Gobalakrishnan N , Muthu Pandeeswari R
Ensuring the security of healthcare systems is crucial for protecting sensitive patient data from breaches and unauthorized access, thereby preserving confidentiality and maintaining trust in medical institutions. Robust security measures are also vital in preventing medical identity theft, which can result in fraudulent treatments and financial losses for patients. However, existing security frameworks often suffer from critical shortcomings, including weak encryption methods, inadequate access controls, and ineffective incident response mechanisms, leaving systems vulnerable to cyber threats. Additionally, many traditional security solutions lack adaptability to emerging technologies such as telemedicine and the Internet of Things (IoT), which introduce new attack vectors if not properly managed. To address these challenges, we introduce SMART-DEFENSE (Secure Medical Architecture for Resilient Trust and Dynamic Encryption in Federated Edge Networks with Security Enhancements), a novel defense model specifically designed for smart healthcare environments. The proposed framework consists of key components, including medical IoT devices, a Detective Gateway (DG), Edge Servers with Honeypot (HES), a Blockchain-assisted Cloud Server (BCS), and a Trust Integrity Authority (TIA). To enhance scalability, a 3D hexagonal-based network architecture (3D-Hexa) is implemented as the foundation of the system. Security is reinforced through Decentralized Identity Management and Dynamic Trust Scoring, incorporating Shuffled Pass Points (SPP) for authentication and Optimizer-based Trust Evaluation (OTE) via the DG. To improve threat detection accuracy, Stratified Federated Learning (SFL) is employed within the HES, enabling a collaborative defense mechanism against cyberattacks. Finally, Chaotic Encryption Blockchain (CEB) ensures secure data management by strengthening both privacy and integrity. By integrating these cutting-edge technologies, SMART-DEFENSE provides a comprehensive, resilient, and scalable security framework for smart healthcare achieving a 28.5 % reduction in False Acceptance Rate, a 16.9 % increase in authentication success rate, and a 4.15 % improvement in trust evaluation accuracy over existing models effectively mitigating cyber threats while ensuring the privacy and reliability of healthcare data.
确保医疗保健系统的安全性对于保护敏感的患者数据免遭泄露和未经授权的访问至关重要,从而保护机密性并维护对医疗机构的信任。强有力的安全措施对于防止医疗身份盗窃也至关重要,这可能导致欺诈性治疗和患者的经济损失。然而,现有的安全框架往往存在严重缺陷,包括加密方法薄弱、访问控制不足和无效的事件响应机制,使系统容易受到网络威胁。此外,许多传统安全解决方案缺乏对远程医疗和物联网(IoT)等新兴技术的适应性,如果管理不当,这些技术会引入新的攻击媒介。为了应对这些挑战,我们引入了smart - defense(针对具有安全增强功能的联邦边缘网络中的弹性信任和动态加密的安全医疗架构),这是一种专门为智能医疗保健环境设计的新型防御模型。该框架由关键组件组成,包括医疗物联网设备、侦探网关(DG)、带蜜罐的边缘服务器(HES)、区块链辅助云服务器(BCS)和信任完整性授权机构(TIA)。为了提高系统的可扩展性,采用了基于三维六边形的网络架构(3D- hexa)作为系统的基础。通过分散的身份管理和动态信任评分,通过DG整合用于身份验证的洗牌通行证点(SPP)和基于优化器的信任评估(OTE),增强了安全性。为了提高威胁检测的准确性,在HES内部采用了分层联邦学习(SFL),实现了对网络攻击的协同防御机制。最后,混沌加密区块链(CEB)通过加强隐私和完整性来确保安全的数据管理。通过集成这些尖端技术,smart - defense为智能医疗保健提供了一个全面、有弹性和可扩展的安全框架,在现有模型的基础上,实现了错误接受率降低28.5%,身份验证成功率提高16.9%,信任评估准确性提高4.15%,有效缓解了网络威胁,同时确保了医疗保健数据的隐私和可靠性。
{"title":"SMART-DEFENSE: 3D hexagonal federated network for systematic attack detection in blockchain-integrated healthcare environment","authors":"Gobalakrishnan N ,&nbsp;Muthu Pandeeswari R","doi":"10.1016/j.csi.2025.104053","DOIUrl":"10.1016/j.csi.2025.104053","url":null,"abstract":"<div><div>Ensuring the security of healthcare systems is crucial for protecting sensitive patient data from breaches and unauthorized access, thereby preserving confidentiality and maintaining trust in medical institutions. Robust security measures are also vital in preventing medical identity theft, which can result in fraudulent treatments and financial losses for patients. However, existing security frameworks often suffer from critical shortcomings, including weak encryption methods, inadequate access controls, and ineffective incident response mechanisms, leaving systems vulnerable to cyber threats. Additionally, many traditional security solutions lack adaptability to emerging technologies such as telemedicine and the Internet of Things (IoT), which introduce new attack vectors if not properly managed. To address these challenges, we introduce <strong>SMART-DEFENSE</strong> (Secure Medical Architecture for Resilient Trust and Dynamic Encryption in Federated Edge Networks with Security Enhancements), a novel defense model specifically designed for smart healthcare environments. The proposed framework consists of key components, including medical IoT devices, a Detective Gateway (DG), Edge Servers with Honeypot (HES), a Blockchain-assisted Cloud Server (BCS), and a Trust Integrity Authority (TIA). To enhance scalability, a 3D hexagonal-based network architecture (3D-Hexa) is implemented as the foundation of the system. Security is reinforced through Decentralized Identity Management and Dynamic Trust Scoring, incorporating Shuffled Pass Points (SPP) for authentication and Optimizer-based Trust Evaluation (OTE) via the DG. To improve threat detection accuracy<strong>,</strong> Stratified Federated Learning (SFL) is employed within the HES, enabling a collaborative defense mechanism against cyberattacks. Finally, Chaotic Encryption Blockchain (CEB) ensures secure data management by strengthening both privacy and integrity. By integrating these cutting-edge technologies, SMART-DEFENSE provides a comprehensive, resilient, and scalable security framework for smart healthcare achieving a 28.5 % reduction in False Acceptance Rate, a 16.9 % increase in authentication success rate, and a 4.15 % improvement in trust evaluation accuracy over existing models effectively mitigating cyber threats while ensuring the privacy and reliability of healthcare data.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104053"},"PeriodicalIF":3.1,"publicationDate":"2025-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144879080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a multi-core certification Job-Aid for AMC 20-193 迈向多核心认证作业辅助amc20 -193
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-08-05 DOI: 10.1016/j.csi.2025.104049
James Sharp , Mike Standish , Jaspal Sagoo , Edwin van de Sluis
Multi-Core Processors (MCPs) are ubiquitous in modern electronic devices. However, their exploitation within the high criticality domains, specifically that of aerospace, introduces challenges. The European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) recently released harmonised guidance in the form of Acceptable Means of Compliance (AMC) 20-193, which details what is required, from a certification perspective, to enable the use of MCPs for satisfying airworthiness requirements. Although regulatory authorities have withdrawn Job Aids for standards such as DO-178 and DO-254, they are an effective method of showing compliance to standards and widely used by assessors. Understanding MCPs is, however, non-trivial and requires significant expertise not only of the device itself, but also how software will be architected and executed, along with how system level safety considerations are to be employed, all to ensure safe application of this technology. Thus, within this paper the authors, through the provision of an assessment of the what detailed in AMC 20-193, give an in-depth analysis into the intent behind the 10 objectives set out in this new AMC. The aim of the paper is to provide a foundation upon which Subject Matter Experts (SMEs) might construct their own Job Aid. Through its discussions, it is the authors intention that this paper enables a common understanding against which an applicant, assessor, and authority can interpret the how when looking to achieve the what set out in AMC 20-193.
多核处理器(mcp)在现代电子设备中无处不在。然而,它们在高临界领域的开发,特别是航空航天领域,带来了挑战。欧盟航空安全局(EASA)和美国联邦航空管理局(FAA)最近以可接受合规方式(AMC) 20-193的形式发布了统一指南,从认证的角度详细说明了使用mcp满足适航要求所需的条件。尽管监管机构已经撤销了DO-178和DO-254等标准的工作辅助,但它们是显示符合标准的有效方法,并被评估人员广泛使用。然而,了解mcp并非易事,不仅需要设备本身的大量专业知识,还需要了解软件的架构和执行方式,以及如何采用系统级安全考虑因素,所有这些都是为了确保该技术的安全应用。因此,在本文中,作者通过对AMC 20-193中详细内容的评估,对新AMC中设定的10个目标背后的意图进行了深入分析。本文的目的是为中小企业提供一个基础,在此基础上,中小企业可以构建自己的就业援助。通过其讨论,作者的意图是使申请人,评估者和权威机构能够在寻求实现AMC 20-193中规定的内容时解释如何达成共识。
{"title":"Towards a multi-core certification Job-Aid for AMC 20-193","authors":"James Sharp ,&nbsp;Mike Standish ,&nbsp;Jaspal Sagoo ,&nbsp;Edwin van de Sluis","doi":"10.1016/j.csi.2025.104049","DOIUrl":"10.1016/j.csi.2025.104049","url":null,"abstract":"<div><div>Multi-Core Processors (MCPs) are ubiquitous in modern electronic devices. However, their exploitation within the high criticality domains, specifically that of aerospace, introduces challenges. The European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) recently released harmonised guidance in the form of Acceptable Means of Compliance (AMC) 20-193, which details <em>what</em> is required, from a certification perspective, to enable the use of MCPs for satisfying airworthiness requirements. Although regulatory authorities have withdrawn Job Aids for standards such as DO-178 and DO-254, they are an effective method of showing compliance to standards and widely used by assessors. Understanding MCPs is, however, non-trivial and requires significant expertise not only of the device itself, but also how software will be architected and executed, along with how system level safety considerations are to be employed, all to ensure safe application of this technology. Thus, within this paper the authors, through the provision of an assessment of the <em>what</em> detailed in AMC 20-193, give an in-depth analysis into the intent behind the 10 objectives set out in this new AMC. The aim of the paper is to provide a foundation upon which Subject Matter Experts (SMEs) might construct their own Job Aid. Through its discussions, it is the authors intention that this paper enables a common understanding against which an applicant, assessor, and authority can interpret the <em>how</em> when looking to achieve the <em>what</em> set out in AMC 20-193.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"96 ","pages":"Article 104049"},"PeriodicalIF":3.1,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145007730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber hygiene of SMiShing: What they know and where they look SMiShing的网络卫生:他们知道什么,他们在哪里看
IF 3.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-07-24 DOI: 10.1016/j.csi.2025.104048
Morgan E. Edwards, Jeremiah D. Still
Phishing attacks exploit psychological vulnerabilities to steal valuable information. While extensive research has improved defenses against email phishing, less is known about how non-technical users, particularly young adults, respond to SMiShing (SMS phishing) attacks. This research addresses this empirical gap by investigating user behavior and decision-making processes related to SMiShing among undergraduate students, a demographic identified as particularly susceptible to these attacks. Study 1 surveyed college students' SMiShing knowledge, experience, and hygiene practices, examining the influence of traditional phishing susceptibility factors. Contrary to expectations, these factors were not predictive of SMiShing behavior. Furthermore, the Cyber Hygiene Inventory (CHI) proved ineffective in predicting secure SMiShing practices. Study 2 combined eye-tracking and self-reported data to analyze how users evaluate text message legitimacy. While participants accurately reported using message content, they over-reported their reliance on sender phone numbers. These findings provide crucial insights into the SMiShing attack vector from the end-user perspective, specifically within a vulnerable demographic. This work highlights the need for human-centered security solutions tailored to the unique challenges of SMiShing, ultimately improving user resilience against these attacks.
网络钓鱼攻击利用心理漏洞窃取有价值的信息。虽然广泛的研究已经提高了对电子邮件网络钓鱼的防御,但对于非技术用户,特别是年轻人,如何应对SMS网络钓鱼攻击,我们所知甚少。本研究通过调查大学生中与SMiShing相关的用户行为和决策过程来解决这一经验差距,这一人群被认为特别容易受到这些攻击。研究1调查了大学生的钓鱼知识、经验和卫生习惯,考察了传统钓鱼易感因素的影响。与预期相反,这些因素并不能预测欺骗行为。此外,网络卫生清单(CHI)在预测安全钓鱼行为方面被证明是无效的。研究2结合眼球追踪和自我报告数据来分析用户如何评估短信的合法性。虽然参与者准确地报告了使用短信内容,但他们过度报告了对发送者电话号码的依赖。这些发现从终端用户的角度,特别是在易受攻击的人群中,对SMiShing攻击向量提供了重要的见解。这项工作强调需要针对SMiShing的独特挑战量身定制以人为本的安全解决方案,最终提高用户抵御这些攻击的能力。
{"title":"Cyber hygiene of SMiShing: What they know and where they look","authors":"Morgan E. Edwards,&nbsp;Jeremiah D. Still","doi":"10.1016/j.csi.2025.104048","DOIUrl":"10.1016/j.csi.2025.104048","url":null,"abstract":"<div><div>Phishing attacks exploit psychological vulnerabilities to steal valuable information. While extensive research has improved defenses against email phishing, less is known about how non-technical users, particularly young adults, respond to SMiShing (SMS phishing) attacks. This research addresses this empirical gap by investigating user behavior and decision-making processes related to SMiShing among undergraduate students, a demographic identified as particularly susceptible to these attacks. Study 1 surveyed college students' SMiShing knowledge, experience, and hygiene practices, examining the influence of traditional phishing susceptibility factors. Contrary to expectations, these factors were not predictive of SMiShing behavior. Furthermore, the Cyber Hygiene Inventory (CHI) proved ineffective in predicting secure SMiShing practices. Study 2 combined eye-tracking and self-reported data to analyze how users evaluate text message legitimacy. While participants accurately reported using message content, they over-reported their reliance on sender phone numbers. These findings provide crucial insights into the SMiShing attack vector from the end-user perspective, specifically within a vulnerable demographic. This work highlights the need for human-centered security solutions tailored to the unique challenges of SMiShing, ultimately improving user resilience against these attacks.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104048"},"PeriodicalIF":3.1,"publicationDate":"2025-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144749843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Certificate-based proxy signature scheme with revocation for Industrial Internet of Things 基于证书的可撤销工业物联网代理签名方案
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-07-21 DOI: 10.1016/j.csi.2025.104045
Guangjin Zhang, Yanwei Zhou, Xianxiang Liu, Bo Yang
The Industrial Internet of Things (IIoT) needs adaptive trust management solutions to emphasize secure delegation and revocation in dynamic settings. Current proxy signature schemes often have centralized architectures or mechanisms that either damage historical data integrity or cause unsustainable storage costs, failing to solve key revocation efficiency problems. This paper presents a novel revocable certificate-based proxy signature (CBPS) scheme with a new revocation framework for IIoT constraints. By introducing timestamp-based polynomial delegation, our CBPS scheme enables indirect revocation, meaning the revocation list only needs to store prematurely terminated delegate tokens. This approach ensures immediate invalidation of revoked permissions without affecting the validity of pre-revocation signatures, achieving storage efficiency while preserving historical transaction auditability. The framework seamlessly integrates with certificate-based cryptography, eliminating key escrow risks. Security analysis shows resistance to collusion attacks and adaptive adversaries, and performance evaluations confirm the scheme’s practicality in resource-constrained environments. The work progresses IIoT trust management by combining real-time revocation with minimal overhead, ensuring security and scalability in industrial deployments.
工业物联网(IIoT)需要自适应信任管理解决方案,以强调动态设置中的安全委托和撤销。当前的代理签名方案通常采用集中式架构或机制,这些架构或机制要么破坏历史数据的完整性,要么造成不可持续的存储成本,无法解决关键的撤销效率问题。本文提出了一种新的可撤销的基于证书的代理签名(CBPS)方案,该方案具有用于工业物联网约束的新的撤销框架。通过引入基于时间戳的多项式委托,我们的CBPS方案支持间接撤销,这意味着撤销列表只需要存储过早终止的委托令牌。这种方法确保被撤销的权限立即失效,而不会影响预撤销签名的有效性,在保持历史事务可审计性的同时实现存储效率。该框架与基于证书的加密技术无缝集成,消除了密钥托管风险。安全分析显示了该方案对合谋攻击和自适应对手的抵抗力,性能评估证实了该方案在资源受限环境中的实用性。通过将实时撤销与最小开销相结合,确保工业部署中的安全性和可扩展性,该工作推进了IIoT信任管理。
{"title":"Certificate-based proxy signature scheme with revocation for Industrial Internet of Things","authors":"Guangjin Zhang,&nbsp;Yanwei Zhou,&nbsp;Xianxiang Liu,&nbsp;Bo Yang","doi":"10.1016/j.csi.2025.104045","DOIUrl":"10.1016/j.csi.2025.104045","url":null,"abstract":"<div><div>The Industrial Internet of Things (IIoT) needs adaptive trust management solutions to emphasize secure delegation and revocation in dynamic settings. Current proxy signature schemes often have centralized architectures or mechanisms that either damage historical data integrity or cause unsustainable storage costs, failing to solve key revocation efficiency problems. This paper presents a novel revocable certificate-based proxy signature (CBPS) scheme with a new revocation framework for IIoT constraints. By introducing timestamp-based polynomial delegation, our CBPS scheme enables indirect revocation, meaning the revocation list only needs to store prematurely terminated delegate tokens. This approach ensures immediate invalidation of revoked permissions without affecting the validity of pre-revocation signatures, achieving storage efficiency while preserving historical transaction auditability. The framework seamlessly integrates with certificate-based cryptography, eliminating key escrow risks. Security analysis shows resistance to collusion attacks and adaptive adversaries, and performance evaluations confirm the scheme’s practicality in resource-constrained environments. The work progresses IIoT trust management by combining real-time revocation with minimal overhead, ensuring security and scalability in industrial deployments.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104045"},"PeriodicalIF":4.1,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144686880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards a new standard for network access authentication: EAP-EDHOC 迈向新的网络接入认证标准:EAP-EDHOC
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-07-12 DOI: 10.1016/j.csi.2025.104037
Francisco Lopez-Gomez , Rafael Marin-Lopez , Gabriel Lopez-Millan , Dan Garcia-Carrillo , John Preuß Mattsson , Göran Selander
The Extensible Authentication Protocol (EAP) has been a cornerstone of secure authentication in both wired and wireless networks, as well as enterprise systems, enabling integration with a wide range of authentication mechanisms. Recently, the IETF EAP Method Update (EMU) Working Group has adopted EAP-EDHOC, a method that combines EAP’s extensibility with the recent standard Ephemeral Diffie–Hellman Over COSE (EDHOC). EDHOC is a lightweight authentication and key exchange protocol designed to be supported in resource-constrained environments. This enhances EAP-EDHOC as a high-performance authentication method for EAP-based networks. This paper presents a comprehensive analysis of the standardization efforts surrounding EAP-EDHOC, including a first proof-of-concept implementation and performance evaluation conducted over Wi-Fi networks. Additionally, a new design that optimizes the existing protocol by reversing the roles of the communication parties is proposed. The original and optimized versions are evaluated and compared with each other, as well as with EAP-TLS 1.3 and EAP-PSK. The results demonstrate that EAP-EDHOC achieves more efficient authentication than EAP-TLS 1.3 in terms of execution time, number of messages, and data transmitted. Meanwhile, EAP-PSK, which is based on symmetric cryptography, serves as a performance baseline.
可扩展身份验证协议(Extensible Authentication Protocol, EAP)已经成为有线和无线网络以及企业系统中安全身份验证的基石,它支持与各种身份验证机制的集成。最近,IETF EAP方法更新(EMU)工作组采用了EAP-EDHOC,这是一种将EAP的可扩展性与最近的标准Ephemeral Diffie-Hellman Over COSE (EDHOC)相结合的方法。EDHOC是一种轻量级身份验证和密钥交换协议,旨在支持资源受限的环境。这增强了EAP-EDHOC作为基于eap的网络的高性能认证方法。本文对围绕EAP-EDHOC的标准化工作进行了全面分析,包括在Wi-Fi网络上进行的首次概念验证实施和性能评估。此外,还提出了一种新的设计,通过反转通信各方的角色来优化现有协议。对原始版本和优化版本进行了评估和比较,并与EAP-TLS 1.3和EAP-PSK进行了比较。结果表明,EAP-EDHOC在执行时间、消息数量和传输数据方面都比EAP-TLS 1.3更有效。同时,基于对称加密的EAP-PSK作为性能基准。
{"title":"Towards a new standard for network access authentication: EAP-EDHOC","authors":"Francisco Lopez-Gomez ,&nbsp;Rafael Marin-Lopez ,&nbsp;Gabriel Lopez-Millan ,&nbsp;Dan Garcia-Carrillo ,&nbsp;John Preuß Mattsson ,&nbsp;Göran Selander","doi":"10.1016/j.csi.2025.104037","DOIUrl":"10.1016/j.csi.2025.104037","url":null,"abstract":"<div><div>The Extensible Authentication Protocol (EAP) has been a cornerstone of secure authentication in both wired and wireless networks, as well as enterprise systems, enabling integration with a wide range of authentication mechanisms. Recently, the IETF EAP Method Update (EMU) Working Group has adopted EAP-EDHOC, a method that combines EAP’s extensibility with the recent standard Ephemeral Diffie–Hellman Over COSE (EDHOC). EDHOC is a lightweight authentication and key exchange protocol designed to be supported in resource-constrained environments. This enhances EAP-EDHOC as a high-performance authentication method for EAP-based networks. This paper presents a comprehensive analysis of the standardization efforts surrounding EAP-EDHOC, including a first proof-of-concept implementation and performance evaluation conducted over Wi-Fi networks. Additionally, a new design that optimizes the existing protocol by reversing the roles of the communication parties is proposed. The original and optimized versions are evaluated and compared with each other, as well as with EAP-TLS 1.3 and EAP-PSK. The results demonstrate that EAP-EDHOC achieves more efficient authentication than EAP-TLS 1.3 in terms of execution time, number of messages, and data transmitted. Meanwhile, EAP-PSK, which is based on symmetric cryptography, serves as a performance baseline.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104037"},"PeriodicalIF":4.1,"publicationDate":"2025-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144632280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient structure-aware private set intersection with distributed interval function 具有分布区间函数的高效结构感知私有集交集
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-07-12 DOI: 10.1016/j.csi.2025.104044
Huimin Zhang , Wenmin Li , Yanjin Cheng , Sujuan Qin , Fei Gao , Tengfei Tu
Structure-aware PSI protocol (Sa-PSI) allows both parties to identify pairs of points within a predefined distance threshold across their respective datasets. However, in previous work, the cost of computation scales linearly with the number of prefixes in the structure, which may become excessively large, and additionally, this protocol risks disclosing sensitive elements. In this work, we present a lightweight and efficient Sa-PSI protocol (LESa-PSI), which aims at achieving the computational cost independent of the number of prefixes in the structure while simultaneously minimizing information leakage. We formally define an FSS based on the two-sided intervals function — compact DIF. This compact DIF is instantiated for a single-dimensional two-sided interval function and then extended to d-dimensional, which may be of independent interest. By combining compact DIF with a novel variant of DPF, we achieve key size compression for the set. Meanwhile, a structural decomposition strategy is proposed to divide the structure set, thereby enabling efficient function evaluation and computing the intersection. We prove that the LESa-PSI is secure in the semi-honest model. Furthermore, a comprehensive analysis of compact DIF and LESa-PSI is conducted through theory and experiments, with a comparison against some state-of-the-art works. The experimental results show that our compact DIF has a smaller key size, while the LESa-PSI has better performance in the intersection search and Bob’s elements evaluation.
结构感知PSI协议(Sa-PSI)允许双方在各自的数据集中识别预定义距离阈值内的点对。然而,在之前的工作中,计算成本与结构中前缀的数量呈线性增长,这可能会变得过大,此外,该协议有泄露敏感元素的风险。在这项工作中,我们提出了一种轻量级和高效的Sa-PSI协议(LESa-PSI),旨在实现与结构中前缀数量无关的计算成本,同时最大限度地减少信息泄漏。我们正式定义了一个基于双边区间函数的FSS - compact DIF。这个紧凑的DIF实例化为一个单维的双边区间函数,然后扩展到d维,这可能是独立的兴趣。通过将紧凑的DIF与DPF的一种新变体相结合,我们实现了对集合的密钥大小压缩。同时,提出了一种结构分解策略对结构集进行划分,从而实现高效的函数求值和交集计算。在半诚实模型下,我们证明了LESa-PSI是安全的。此外,通过理论和实验对紧凑型DIF和LESa-PSI进行了综合分析,并与一些最新的研究成果进行了比较。实验结果表明,我们的紧凑DIF具有更小的键大小,而LESa-PSI在交集搜索和Bob元素求值方面具有更好的性能。
{"title":"Efficient structure-aware private set intersection with distributed interval function","authors":"Huimin Zhang ,&nbsp;Wenmin Li ,&nbsp;Yanjin Cheng ,&nbsp;Sujuan Qin ,&nbsp;Fei Gao ,&nbsp;Tengfei Tu","doi":"10.1016/j.csi.2025.104044","DOIUrl":"10.1016/j.csi.2025.104044","url":null,"abstract":"<div><div>Structure-aware PSI protocol (Sa-PSI) allows both parties to identify pairs of points within a predefined distance threshold across their respective datasets. However, in previous work, the cost of computation scales linearly with the number of prefixes in the structure, which may become excessively large, and additionally, this protocol risks disclosing sensitive elements. In this work, we present a lightweight and efficient Sa-PSI protocol (LESa-PSI), which aims at achieving the computational cost independent of the number of prefixes in the structure while simultaneously minimizing information leakage. We formally define an FSS based on the two-sided intervals function — compact DIF. This compact DIF is instantiated for a single-dimensional two-sided interval function and then extended to <span><math><mi>d</mi></math></span>-dimensional, which may be of independent interest. By combining compact DIF with a novel variant of DPF, we achieve key size compression for the set. Meanwhile, a structural decomposition strategy is proposed to divide the structure set, thereby enabling efficient function evaluation and computing the intersection. We prove that the LESa-PSI is secure in the semi-honest model. Furthermore, a comprehensive analysis of compact DIF and LESa-PSI is conducted through theory and experiments, with a comparison against some state-of-the-art works. The experimental results show that our compact DIF has a smaller key size, while the LESa-PSI has better performance in the intersection search and Bob’s elements evaluation.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104044"},"PeriodicalIF":4.1,"publicationDate":"2025-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144634018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SecureMD5: A new stream cipher for secure file systems and encryption key generation with artificial intelligence SecureMD5:一种新的流密码,用于安全文件系统和人工智能加密密钥生成
IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2025-07-11 DOI: 10.1016/j.csi.2025.104047
Isabel Herrera Montano , Juan Ramos Diaz , Sergio Molina-Cardín , Juan José Guerrero López , José Javier García Aranda , Isabel de la Torre Díez
The insider threat to sensitive information posed by employees or partners of an organisation remains a major cybersecurity challenge. In this regard, the measures taken by organisations and companies to protect information are often insufficient. Primarily, due to the legitimate access and knowledge of security holes that these individuals possess.
This study proposes SecureMD5, an encryption algorithm designed specifically for secure file systems (SFS). The algorithm is based on custom one-way functions integrated into an encryption scheme that operates at the byte level. It uses 11 dynamic variables generated from contextual parameters such as file position, access time, random values, and user-specific keys. This approach ensures that SecureMD5 does not inherit the known vulnerabilities of MD5 as a standard cryptographic algorithm. Consequently, SecureMD5 is presented as an adaptive and robust solution that addresses the challenges posed by insider threats in SFS.
In parallel, a modular contextual key generation scheme is proposed, which can incorporate various challenges such as user identity, access time and device location. Biometric key generation based on Artificial Intelligence (AI) methods is evaluated independently from the validation of the encryption algorithm. In the evaluated biometric key generation scheme, the AI models MediaPipe Hand Landmark and LBPHFaceRecognizer from OpenCV have been used. These methods are part of a sub-key generation scheme based on contextual challenges. This scheme eliminates the need for key storage for dynamic and secure access to sensitive information.
SecureMD5 was validated by diffusion, confusion, entropy and performance analysis. It achieved 31 % higher entropy than comparable algorithms. Performance improved by 0.32 % compared to RC4. It also passed 87 % of NIST 800–22 tests, demonstrating its robustness against cryptographic vulnerabilities. In addition, SecureMD5 balances security and performance, with encryption times 25 % faster than a modified AES algorithm for 10 MB files. Biometric key generation methods were evaluated using metrics such as precision, accuracy, false acceptance rate and specificity, achieving satisfactory values above 80 % on all metrics. This work addresses critical gaps in information security, providing significant advances in protecting SFS against insider threats. The design and adaptability of SecureMD5 make it particularly suitable for sectors with strict security requirements, such as healthcare, finance, and corporate data management. Its ability to enable dynamic and secure access control addresses the real challenges posed by protecting confidential information from internal threats.
企业员工或合作伙伴对敏感信息构成的内部威胁仍然是一个重大的网络安全挑战。在这方面,组织和公司为保护信息所采取的措施往往是不够的。主要是因为这些人拥有合法的访问权限和对安全漏洞的了解。本研究提出SecureMD5,一种专为安全文件系统(SFS)设计的加密算法。该算法基于集成到在字节级操作的加密方案中的自定义单向函数。它使用从上下文参数(如文件位置、访问时间、随机值和用户特定键)生成的11个动态变量。这种方法确保SecureMD5不会继承MD5作为标准加密算法的已知漏洞。因此,SecureMD5是一种自适应且强大的解决方案,可解决SFS内部威胁带来的挑战。同时,提出了一种模块化上下文密钥生成方案,该方案可以结合用户身份、访问时间和设备位置等各种挑战。基于人工智能(AI)方法的生物识别密钥生成的评估独立于加密算法的验证。在评估的生物识别密钥生成方案中,使用了OpenCV的人工智能模型MediaPipe Hand Landmark和LBPHFaceRecognizer。这些方法是基于上下文挑战的子键生成方案的一部分。该方案消除了对密钥存储的需求,以便对敏感信息进行动态和安全访问。通过扩散、混淆、熵和性能分析对SecureMD5进行验证。它的熵比同类算法高31%。性能比RC4提高了0.32%。它还通过了87%的NIST 800-22测试,证明了它对加密漏洞的稳健性。此外,SecureMD5平衡了安全性和性能,对于10mb文件,加密时间比修改后的AES算法快25%。使用精密度、准确度、错误接受率和特异性等指标对生物识别密钥生成方法进行评估,所有指标均达到80%以上的满意值。这项工作解决了信息安全方面的关键漏洞,在保护SFS免受内部威胁方面取得了重大进展。SecureMD5的设计和适应性使其特别适合具有严格安全要求的行业,例如医疗保健、金融和企业数据管理。它能够实现动态和安全的访问控制,解决了保护机密信息免受内部威胁所带来的真正挑战。
{"title":"SecureMD5: A new stream cipher for secure file systems and encryption key generation with artificial intelligence","authors":"Isabel Herrera Montano ,&nbsp;Juan Ramos Diaz ,&nbsp;Sergio Molina-Cardín ,&nbsp;Juan José Guerrero López ,&nbsp;José Javier García Aranda ,&nbsp;Isabel de la Torre Díez","doi":"10.1016/j.csi.2025.104047","DOIUrl":"10.1016/j.csi.2025.104047","url":null,"abstract":"<div><div>The insider threat to sensitive information posed by employees or partners of an organisation remains a major cybersecurity challenge. In this regard, the measures taken by organisations and companies to protect information are often insufficient. Primarily, due to the legitimate access and knowledge of security holes that these individuals possess.</div><div>This study proposes SecureMD5, an encryption algorithm designed specifically for secure file systems (SFS). The algorithm is based on custom one-way functions integrated into an encryption scheme that operates at the byte level. It uses 11 dynamic variables generated from contextual parameters such as file position, access time, random values, and user-specific keys. This approach ensures that SecureMD5 does not inherit the known vulnerabilities of MD5 as a standard cryptographic algorithm. Consequently, SecureMD5 is presented as an adaptive and robust solution that addresses the challenges posed by insider threats in SFS.</div><div>In parallel, a modular contextual key generation scheme is proposed, which can incorporate various challenges such as user identity, access time and device location. Biometric key generation based on Artificial Intelligence (AI) methods is evaluated independently from the validation of the encryption algorithm. In the evaluated biometric key generation scheme, the AI models MediaPipe Hand Landmark and LBPHFaceRecognizer from OpenCV have been used. These methods are part of a sub-key generation scheme based on contextual challenges. This scheme eliminates the need for key storage for dynamic and secure access to sensitive information.</div><div>SecureMD5 was validated by diffusion, confusion, entropy and performance analysis. It achieved 31 % higher entropy than comparable algorithms. Performance improved by 0.32 % compared to RC4. It also passed 87 % of NIST 800–22 tests, demonstrating its robustness against cryptographic vulnerabilities. In addition, SecureMD5 balances security and performance, with encryption times 25 % faster than a modified AES algorithm for 10 MB files. Biometric key generation methods were evaluated using metrics such as precision, accuracy, false acceptance rate and specificity, achieving satisfactory values above 80 % on all metrics. This work addresses critical gaps in information security, providing significant advances in protecting SFS against insider threats. The design and adaptability of SecureMD5 make it particularly suitable for sectors with strict security requirements, such as healthcare, finance, and corporate data management. Its ability to enable dynamic and secure access control addresses the real challenges posed by protecting confidential information from internal threats.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"95 ","pages":"Article 104047"},"PeriodicalIF":4.1,"publicationDate":"2025-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144655383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Standards & Interfaces
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1