首页 > 最新文献

Journal of Network and Computer Applications最新文献

英文 中文
SSBM: A spatially separated boxes-based multi-tab website fingerprinting model SSBM:基于空间分隔盒的多标签网站指纹识别模型
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.jnca.2024.104023
Xueshu Hong , Xingkong Ma , Shaoyong Li , Yiqing Cai , Bo Liu

In recent years, the website fingerprinting (WF) attack against the Tor anonymity system has become a hot research issue. The state-of-the-art WF studies have shown that the detection accuracy of websites is up to more than 95%. However, they are mainly conducted under the single-tab assumption, where each sample contains only one website traffic. The single-tab setting could not be realistic because users often open multiple tabs to browse simultaneously. The requests and responses from multiple tabs will overlap and interfere with each other, destroying existing single-tab WF attacks. In addition, the proposed multi-tab WF attack works poorly when traffic overlaps seriously. It remains challenging to implement WF attacks in multi-tab scenarios. This paper investigates a new spatial separated boxes-based multi-tab website fingerprinting model, called SSBM, to solve the multi-tab WF problem. It is an end-to-end model that separates traffic by equal-sized boxes and extracts features with convolutional neural networks. By predicting the label of each box, the tabs of the whole traffic are inferred. We design and implement SSBM and compare it with state-of-the-art multi-tab WF attacks in two different multi-tab modes: overlapping mode and delayed mode. In the overlapping mode, SSBM can successfully identify 81.24% of the first tab and 64.72% of the second tab when the overlapping proportions of the two tabs’ traffic reaches 50%, which are 4% and 29% higher than the current strongest BAPM. In the delayed mode, when the second tab traffic starts to overlap with the first tab traffic with a 5-second delay, SSBM improves the first tab’s classification accuracy from 60% to 69% and the second tab’s detection rates from 33% to 53%. Moreover, SSBM achieves the highest improvement, nearly 40%, in the three-tab evaluations. The experimental results show that SSBM outperforms existing multi-tab WF attack methods.

近年来,针对 Tor 匿名系统的网站指纹(WF)攻击已成为一个热门研究课题。最先进的 WF 研究表明,网站检测准确率高达 95% 以上。然而,这些研究主要是在单标签假设下进行的,即每个样本只包含一个网站流量。单标签设置并不现实,因为用户经常同时打开多个标签进行浏览。来自多个标签页的请求和响应会相互重叠和干扰,从而破坏现有的单标签页 WF 攻击。此外,当流量严重重叠时,提议的多标签 WF 攻击效果也很差。在多标签场景中实现 WF 攻击仍具有挑战性。本文研究了一种新的基于空间分隔盒的多标签网站指纹识别模型,称为 SSBM,以解决多标签 WF 问题。这是一种端到端模型,它通过大小相等的盒子来分离流量,并利用卷积神经网络提取特征。通过预测每个盒子的标签,推断出整个流量的标签。我们设计并实现了 SSBM,并在两种不同的多标签模式(重叠模式和延迟模式)下将其与最先进的多标签 WF 攻击进行了比较。在重叠模式下,当两个标签的流量重叠比例达到 50%时,SSBM 可以成功识别 81.24% 的第一个标签和 64.72% 的第二个标签,分别比目前最强的 BAPM 高出 4% 和 29%。在延迟模式下,当第二个标签页的流量开始与第一个标签页的流量重叠并延迟 5 秒时,SSBM 将第一个标签页的分类准确率从 60% 提高到 69%,将第二个标签页的检测率从 33% 提高到 53%。此外,在三个标签页的评估中,SSBM 的改进幅度最大,接近 40%。实验结果表明,SSBM 优于现有的多标签 WF 攻击方法。
{"title":"SSBM: A spatially separated boxes-based multi-tab website fingerprinting model","authors":"Xueshu Hong ,&nbsp;Xingkong Ma ,&nbsp;Shaoyong Li ,&nbsp;Yiqing Cai ,&nbsp;Bo Liu","doi":"10.1016/j.jnca.2024.104023","DOIUrl":"10.1016/j.jnca.2024.104023","url":null,"abstract":"<div><p>In recent years, the website fingerprinting (WF) attack against the Tor anonymity system has become a hot research issue. The state-of-the-art WF studies have shown that the detection accuracy of websites is up to more than 95%. However, they are mainly conducted under the single-tab assumption, where each sample contains only one website traffic. The single-tab setting could not be realistic because users often open multiple tabs to browse simultaneously. The requests and responses from multiple tabs will overlap and interfere with each other, destroying existing single-tab WF attacks. In addition, the proposed multi-tab WF attack works poorly when traffic overlaps seriously. It remains challenging to implement WF attacks in multi-tab scenarios. This paper investigates a new spatial separated boxes-based multi-tab website fingerprinting model, called SSBM, to solve the multi-tab WF problem. It is an end-to-end model that separates traffic by equal-sized boxes and extracts features with convolutional neural networks. By predicting the label of each box, the tabs of the whole traffic are inferred. We design and implement SSBM and compare it with state-of-the-art multi-tab WF attacks in two different multi-tab modes: overlapping mode and delayed mode. In the overlapping mode, SSBM can successfully identify 81.24% of the first tab and 64.72% of the second tab when the overlapping proportions of the two tabs’ traffic reaches 50%, which are 4% and 29% higher than the current strongest BAPM. In the delayed mode, when the second tab traffic starts to overlap with the first tab traffic with a 5-second delay, SSBM improves the first tab’s classification accuracy from 60% to 69% and the second tab’s detection rates from 33% to 53%. Moreover, SSBM achieves the highest improvement, nearly 40%, in the three-tab evaluations. The experimental results show that SSBM outperforms existing multi-tab WF attack methods.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104023"},"PeriodicalIF":7.7,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142236884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exclusively in-store: Acoustic location authentication for stationary business devices 店内专享:固定式商务设备的声学定位验证
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-12 DOI: 10.1016/j.jnca.2024.104028
Sungbin Park , Changbae Seo , Xueqiang Wang , Yeonjoon Lee , Seung-Hyun Seo

Over the past decade, the adoption of Internet of Things (IoT) devices has greatly revolutionized the retail and commerce industries. However, these devices are vulnerable to attacks, such as theft, which raises significant security and privacy concerns for business assets. Securing such business-owned devices is challenging, particularly due to the business contexts that require not only authenticating the devices but also verifying the environment in which the devices are located. In this study, we present a zero-effort authentication approach based on acoustic fingerprints, namely AcousticAuth. AcousticAuth enables a “verifier” device to authenticate and verify the work environment of multiple “prover” devices (e.g., kiosks) by extracting their acoustic fingerprints and direction information. Additionally, we adopt a novel method based on beamforming to expand the fingerprint space of the provers. We implemented a prototype of AcousticAuth using real-world IoT devices, and the evaluation of the prototype indicates that AcousticAuth is highly effective and achieves high sensitivity when authenticating different devices across environments. Our results demonstrate that AcousticAuth can accurately distinguish between different devices and the same model devices with the error rate of 0.03%, significantly enhancing the security of IoT devices in retail settings. AcousticAuth also distinguishes between the different environments with an error rate of 0.00%. Lastly, the system shows robustness against various acoustic interference scenarios, making it a practical solution for dynamic business environments. We not only introduce a novel security mechanism that pushes the limit of fingerprint-based authentication by expanding the fingerprint pool but also provide comprehensive insights into its implementation and performance, paving the way for more secure IoT deployments in the commercial sector.

在过去的十年中,物联网(IoT)设备的采用极大地改变了零售和商业行业。然而,这些设备很容易受到盗窃等攻击,这给企业资产的安全和隐私带来了极大的隐患。确保这些企业所有设备的安全具有挑战性,特别是在商业环境中,不仅需要对设备进行身份验证,还需要验证设备所处的环境。在本研究中,我们提出了一种基于声学指纹的零工作量认证方法,即 AcousticAuth。AcousticAuth 使 "验证者 "设备能够通过提取多个 "证明者 "设备(如自助服务终端)的声学指纹和方向信息,对其工作环境进行认证和验证。此外,我们还采用了一种基于波束成形的新方法来扩展证明者的指纹空间。我们利用真实世界的物联网设备实现了 AcousticAuth 的原型,对原型的评估表明 AcousticAuth 非常有效,在跨环境验证不同设备时实现了高灵敏度。我们的结果表明,AcousticAuth 能准确区分不同设备和同一型号设备,错误率仅为 0.03%,大大提高了零售环境中物联网设备的安全性。AcousticAuth 还能区分不同的环境,错误率为 0.00%。最后,该系统在各种声学干扰情况下都表现出很强的鲁棒性,使其成为动态商业环境中的实用解决方案。我们不仅介绍了一种新颖的安全机制,通过扩大指纹库来突破基于指纹的身份验证的极限,还对其实施和性能提供了全面的见解,为商业领域更安全的物联网部署铺平了道路。
{"title":"Exclusively in-store: Acoustic location authentication for stationary business devices","authors":"Sungbin Park ,&nbsp;Changbae Seo ,&nbsp;Xueqiang Wang ,&nbsp;Yeonjoon Lee ,&nbsp;Seung-Hyun Seo","doi":"10.1016/j.jnca.2024.104028","DOIUrl":"10.1016/j.jnca.2024.104028","url":null,"abstract":"<div><p>Over the past decade, the adoption of Internet of Things (IoT) devices has greatly revolutionized the retail and commerce industries. However, these devices are vulnerable to attacks, such as theft, which raises significant security and privacy concerns for business assets. Securing such business-owned devices is challenging, particularly due to the business contexts that require not only authenticating the devices but also verifying the environment in which the devices are located. In this study, we present a zero-effort authentication approach based on acoustic fingerprints, namely <em>AcousticAuth</em>. <em>AcousticAuth</em> enables a “verifier” device to authenticate and verify the work environment of multiple “prover” devices (e.g., kiosks) by extracting their acoustic fingerprints and direction information. Additionally, we adopt a novel method based on beamforming to expand the fingerprint space of the provers. We implemented a prototype of <em>AcousticAuth</em> using real-world IoT devices, and the evaluation of the prototype indicates that <em>AcousticAuth</em> is highly effective and achieves high sensitivity when authenticating different devices across environments. Our results demonstrate that <em>AcousticAuth</em> can accurately distinguish between different devices and the same model devices with the error rate of 0.03%, significantly enhancing the security of IoT devices in retail settings. <em>AcousticAuth</em> also distinguishes between the different environments with an error rate of 0.00%. Lastly, the system shows robustness against various acoustic interference scenarios, making it a practical solution for dynamic business environments. We not only introduce a novel security mechanism that pushes the limit of fingerprint-based authentication by expanding the fingerprint pool but also provide comprehensive insights into its implementation and performance, paving the way for more secure IoT deployments in the commercial sector.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104028"},"PeriodicalIF":7.7,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142274301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments 生活在边缘:安全关键型环境中数字双胞胎辅助任务卸载调查
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-11 DOI: 10.1016/j.jnca.2024.104024
Pedro R.X. do Carmo , Diego de Freitas Bezerra , Assis T. Oliveira Filho , Eduardo Freitas , Miguel L.P.C. Silva , Marrone Dantas , Beatriz Oliveira , Judith Kelner , Djamel F.H. Sadok , Ricardo Souza

This survey delves into the synergy between Digital Twin technology and Task Offloading within safety-critical sectors, offering a nuanced understanding of their integration, potential benefits, and associated challenges. By defining fundamental concepts and exploring real-world implementations, this study evaluates the impact of Digital Twin-Assisted Task Offloading on optimizing resource utilization in safety-critical environments. Central to our analysis is the evaluation of key performance metrics guiding task offloading strategies, notably latency, and energy consumption, which are critical for achieving real-time efficiency and sustainable operations in edge computing environments. The survey further identifies a gap in the literature concerning cybersecurity and privacy concerns, crucial elements given the vulnerability of these systems to cyber threats and data breaches. It also highlights the emerging significance of 6G technology as a pivotal enabler for future advancements. This work not only serves as a valuable resource for professionals and researchers in safety-critical industries but also underscores the importance of addressing cybersecurity measures, advocating for standardized frameworks, and aligning with future technological trends to fully harness the potential of Digital Twin-Assisted Task Offloading.

本研究深入探讨了数字孪生技术和任务卸载在安全关键领域的协同作用,对两者的集成、潜在优势和相关挑战进行了细致的了解。通过定义基本概念和探索现实世界的实施情况,本研究评估了数字孪生辅助任务卸载对优化安全关键环境中资源利用率的影响。我们分析的核心是评估指导任务卸载策略的关键性能指标,特别是延迟和能耗,这对于在边缘计算环境中实现实时效率和可持续运营至关重要。调查进一步发现了有关网络安全和隐私问题的文献空白,鉴于这些系统易受网络威胁和数据泄露的影响,这些问题是至关重要的。调查还强调了 6G 技术作为未来进步的关键推动力所具有的新兴意义。这项工作不仅为安全关键型行业的专业人员和研究人员提供了宝贵的资源,还强调了解决网络安全措施、倡导标准化框架以及与未来技术趋势保持一致以充分利用数字孪生辅助任务卸载潜力的重要性。
{"title":"Living on the edge: A survey of Digital Twin-Assisted Task Offloading in safety-critical environments","authors":"Pedro R.X. do Carmo ,&nbsp;Diego de Freitas Bezerra ,&nbsp;Assis T. Oliveira Filho ,&nbsp;Eduardo Freitas ,&nbsp;Miguel L.P.C. Silva ,&nbsp;Marrone Dantas ,&nbsp;Beatriz Oliveira ,&nbsp;Judith Kelner ,&nbsp;Djamel F.H. Sadok ,&nbsp;Ricardo Souza","doi":"10.1016/j.jnca.2024.104024","DOIUrl":"10.1016/j.jnca.2024.104024","url":null,"abstract":"<div><p>This survey delves into the synergy between Digital Twin technology and Task Offloading within safety-critical sectors, offering a nuanced understanding of their integration, potential benefits, and associated challenges. By defining fundamental concepts and exploring real-world implementations, this study evaluates the impact of Digital Twin-Assisted Task Offloading on optimizing resource utilization in safety-critical environments. Central to our analysis is the evaluation of key performance metrics guiding task offloading strategies, notably latency, and energy consumption, which are critical for achieving real-time efficiency and sustainable operations in edge computing environments. The survey further identifies a gap in the literature concerning cybersecurity and privacy concerns, crucial elements given the vulnerability of these systems to cyber threats and data breaches. It also highlights the emerging significance of 6G technology as a pivotal enabler for future advancements. This work not only serves as a valuable resource for professionals and researchers in safety-critical industries but also underscores the importance of addressing cybersecurity measures, advocating for standardized frameworks, and aligning with future technological trends to fully harness the potential of Digital Twin-Assisted Task Offloading.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104024"},"PeriodicalIF":7.7,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Fog computing system for weapon detection and face recognition 用于武器探测和人脸识别的分布式雾计算系统
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-11 DOI: 10.1016/j.jnca.2024.104026
Héctor Martinez, Francisco J. Rodriguez-Lozano, Fernando León-García, Jose M. Palomares, Joaquín Olivares

Surveillance systems are very important to prevent situations where armed people appear. To minimize human supervision, there are algorithms based on artificial intelligence that perform a large part of the identification and detection tasks. These systems usually require large data processing servers. However, a high number of cameras causes congestion in the networks due to a large amount of data being sent. This work introduces a novel system for identifying individuals with weapons by leveraging Edge, Fog, and Cloud computing. The key advantages include minimizing the data transmitted to the Cloud and optimizing the computations performed within it. The main benefits of our proposal are the high and simple scalability, the immediacy of the detection, as well as the optimization of processes through distributed processing of high performance in the Fog layer. Moreover, the structure of this proposal is suitable for 5G camera networks, which require low latency and quick responses.

监控系统对于防止武装人员出现非常重要。为了最大限度地减少人工监控,有一些基于人工智能的算法可以完成大部分识别和检测任务。这些系统通常需要大型数据处理服务器。然而,大量的摄像头会因发送大量数据而导致网络拥塞。这项工作介绍了一种利用边缘、雾和云计算识别携带武器人员的新型系统。其主要优势包括最大限度地减少向云传输的数据,并优化在云中执行的计算。我们的建议的主要优点是可扩展性高且简单、检测即时性强,以及通过雾层的高性能分布式处理优化流程。此外,该建议的结构适用于要求低延迟和快速响应的 5G 摄像网络。
{"title":"Distributed Fog computing system for weapon detection and face recognition","authors":"Héctor Martinez,&nbsp;Francisco J. Rodriguez-Lozano,&nbsp;Fernando León-García,&nbsp;Jose M. Palomares,&nbsp;Joaquín Olivares","doi":"10.1016/j.jnca.2024.104026","DOIUrl":"10.1016/j.jnca.2024.104026","url":null,"abstract":"<div><p>Surveillance systems are very important to prevent situations where armed people appear. To minimize human supervision, there are algorithms based on artificial intelligence that perform a large part of the identification and detection tasks. These systems usually require large data processing servers. However, a high number of cameras causes congestion in the networks due to a large amount of data being sent. This work introduces a novel system for identifying individuals with weapons by leveraging Edge, Fog, and Cloud computing. The key advantages include minimizing the data transmitted to the Cloud and optimizing the computations performed within it. The main benefits of our proposal are the high and simple scalability, the immediacy of the detection, as well as the optimization of processes through distributed processing of high performance in the Fog layer. Moreover, the structure of this proposal is suitable for 5G camera networks, which require low latency and quick responses.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104026"},"PeriodicalIF":7.7,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142236885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on Ethereum pseudonymity: Techniques, challenges, and future directions 以太坊匿名性调查:技术、挑战和未来方向
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-07 DOI: 10.1016/j.jnca.2024.104019
Shivani Jamwal , José Cano , Gyu Myoung Lee , Nguyen H. Tran , Nguyen Truong

Blockchain technology has emerged as a transformative force in various sectors, including finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin’s role as a decentralized payment system, Ethereum represents a notable application of blockchain, featuring Smart Contract functionality that enables the development and execution of decentralized applications (DApps). A key feature of Ethereum, and public blockchains in general, is pseudonymity, typically achieved by using public keys as pseudonyms for users. Despite implementing several privacy-preserving techniques, the public recording of user activities on the blockchain allows various deanonymization methods that can profile users, reveal sensitive information, and potentially re-identify them. Most blockchains, such as Bitcoin, Litecoin, and Cardano, employ the Unspent Transaction Output (UTXO) model for accounting, which focuses on individual transactions and is susceptible to various deanonymization techniques. In contrast, Ethereum uses an account-based transaction model, integrating the concepts of accounts and wallets at the protocol level. This makes most UTXO-based deanonymization techniques ineffective for Ethereum. However, alternative methods with the potential to deanonymize Ethereum users have been proposed and developed. Privacy preservation techniques have been used to counteract deanonymization attempts; however, the challenges related to these techniques, their effectiveness and efficiency, and the trade-off between usability and protection levels remain areas for further exploration. This survey presents a comprehensive analysis of state-of-the-art privacy preservation along with deanonymization techniques in the blockchain and Ethereum ecosystems. This survey examines the intrinsic mechanisms supporting pseudonymity in Ethereum, providing a detailed assessment of the advantages and disadvantages of privacy preservation techniques, and suggests potential countermeasures against those deanonymization methods. It also discusses the implications arising from the intersection of DApps and data protection legislation, which is vital for ensuring the coexistence and advancement of groundbreaking blockchain capabilities and protecting user data.

区块链技术已成为金融、医疗保健、供应链和知识产权管理等各个领域的变革力量。除了比特币作为去中心化支付系统的作用外,以太坊也是区块链的一个显著应用,其智能合约功能可以开发和执行去中心化应用程序(DApps)。以太坊和一般公共区块链的一个主要特点是假名性,通常通过使用公共密钥作为用户的假名来实现。尽管采用了多种隐私保护技术,但区块链上对用户活动的公开记录允许采用各种去匿名化方法,这些方法会对用户进行剖析,泄露敏感信息,并有可能重新识别用户。大多数区块链,如比特币、莱特币和卡达诺,都采用未花费交易输出(UTXO)模型进行记账,该模型侧重于单个交易,容易受到各种去匿名化技术的影响。相比之下,以太坊采用基于账户的交易模型,在协议层面整合了账户和钱包的概念。这使得大多数基于UTXO的去匿名化技术对以太坊无效。不过,也有人提出并开发了其他可能对以太坊用户进行去匿名化的方法。隐私保护技术已被用于对抗去匿名化尝试;然而,与这些技术相关的挑战、其有效性和效率以及可用性和保护水平之间的权衡仍是有待进一步探索的领域。本调查全面分析了区块链和以太坊生态系统中最先进的隐私保护和去匿名化技术。本调查研究了以太坊中支持匿名性的内在机制,详细评估了隐私保护技术的优缺点,并针对这些去匿名化方法提出了潜在对策。它还讨论了 DApps 与数据保护立法交叉所产生的影响,这对于确保突破性区块链功能的共存和进步以及保护用户数据至关重要。
{"title":"A survey on Ethereum pseudonymity: Techniques, challenges, and future directions","authors":"Shivani Jamwal ,&nbsp;José Cano ,&nbsp;Gyu Myoung Lee ,&nbsp;Nguyen H. Tran ,&nbsp;Nguyen Truong","doi":"10.1016/j.jnca.2024.104019","DOIUrl":"10.1016/j.jnca.2024.104019","url":null,"abstract":"<div><p>Blockchain technology has emerged as a transformative force in various sectors, including finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin’s role as a decentralized payment system, Ethereum represents a notable application of blockchain, featuring Smart Contract functionality that enables the development and execution of decentralized applications (DApps). A key feature of Ethereum, and public blockchains in general, is pseudonymity, typically achieved by using public keys as pseudonyms for users. Despite implementing several privacy-preserving techniques, the public recording of user activities on the blockchain allows various deanonymization methods that can profile users, reveal sensitive information, and potentially re-identify them. Most blockchains, such as Bitcoin, Litecoin, and Cardano, employ the Unspent Transaction Output (UTXO) model for accounting, which focuses on individual transactions and is susceptible to various deanonymization techniques. In contrast, Ethereum uses an account-based transaction model, integrating the concepts of accounts and wallets at the protocol level. This makes most UTXO-based deanonymization techniques ineffective for Ethereum. However, alternative methods with the potential to deanonymize Ethereum users have been proposed and developed. Privacy preservation techniques have been used to counteract deanonymization attempts; however, the challenges related to these techniques, their effectiveness and efficiency, and the trade-off between usability and protection levels remain areas for further exploration. This survey presents a comprehensive analysis of state-of-the-art privacy preservation along with deanonymization techniques in the blockchain and Ethereum ecosystems. This survey examines the intrinsic mechanisms supporting pseudonymity in Ethereum, providing a detailed assessment of the advantages and disadvantages of privacy preservation techniques, and suggests potential countermeasures against those deanonymization methods. It also discusses the implications arising from the intersection of DApps and data protection legislation, which is vital for ensuring the coexistence and advancement of groundbreaking blockchain capabilities and protecting user data.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104019"},"PeriodicalIF":7.7,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142236891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeCa360: Deadline-aware edge caching for two-tier 360° video streaming DeCa360:用于双层 360° 视频流的截止日期感知边缘缓存
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-07 DOI: 10.1016/j.jnca.2024.104022
Tao Lin , Yang Chen , Hao Yang , Yuan Zhang , Bo Jiang , Jinyao Yan

Two-tier 360° video streaming provides a robust solution for handling inaccurate viewport prediction and varying network conditions. Within this paradigm, the client employs a dual-buffer mechanism consisting of a long buffer for panoramic basic-quality segments and a short buffer for high-quality tiles. However, designing an efficient edge caching strategy for two-tier 360° videos is non-trivial. First, as basic-quality segments and high-quality tiles possess different delivery deadlines as well as content popularity, ignoring these discrepancies may result in inefficient edge caching. Second, accurately predicting the popularity of 360° videos at a fine granularity of video segments and tiles remains a challenge. To address these issues, we present DeCa360, a deadline-aware edge caching framework for 360° videos. Specifically, we introduce a lightweight runtime cache partitioning approach to achieve a careful balance between improving the cache hit ratio and guaranteeing more on-time delivery of objects. Moreover, we design a content popularity prediction method for two-tier 360° videos that combines a learning-based prediction model with domain knowledge of video streaming, leading to improved prediction accuracy and efficient cache replacement. Extensive experimental evaluations demonstrate that DeCa360 outperforms all baseline algorithms in terms of byte-hit ratio and on-time delivery ratio, making it a promising approach for efficient edge caching of 360° videos.

双层 360° 视频流为处理不准确的视口预测和不同的网络条件提供了强大的解决方案。在这种模式下,客户端采用了双缓冲机制,包括一个用于基本质量全景片段的长缓冲区和一个用于高质量瓦片的短缓冲区。然而,为双层 360° 视频设计高效的边缘缓存策略并非易事。首先,由于基本质量片段和高质量瓦片具有不同的交付期限和内容流行度,忽略这些差异可能会导致边缘缓存效率低下。其次,在视频片段和磁贴的细粒度上准确预测 360° 视频的受欢迎程度仍然是一项挑战。为了解决这些问题,我们提出了针对 360° 视频的截止日期感知边缘缓存框架 DeCa360。具体来说,我们引入了一种轻量级运行时缓存分区方法,以在提高缓存命中率和保证更多对象按时交付之间实现谨慎的平衡。此外,我们还为双层 360° 视频设计了一种内容流行度预测方法,该方法将基于学习的预测模型与视频流的领域知识相结合,从而提高了预测准确性和缓存替换效率。广泛的实验评估表明,DeCa360 在字节命中率和按时交付率方面优于所有基线算法,是一种很有前途的 360° 视频高效边缘缓存方法。
{"title":"DeCa360: Deadline-aware edge caching for two-tier 360° video streaming","authors":"Tao Lin ,&nbsp;Yang Chen ,&nbsp;Hao Yang ,&nbsp;Yuan Zhang ,&nbsp;Bo Jiang ,&nbsp;Jinyao Yan","doi":"10.1016/j.jnca.2024.104022","DOIUrl":"10.1016/j.jnca.2024.104022","url":null,"abstract":"<div><p>Two-tier 360° video streaming provides a robust solution for handling inaccurate viewport prediction and varying network conditions. Within this paradigm, the client employs a dual-buffer mechanism consisting of a long buffer for panoramic basic-quality segments and a short buffer for high-quality tiles. However, designing an efficient edge caching strategy for two-tier 360° videos is non-trivial. First, as basic-quality segments and high-quality tiles possess different delivery deadlines as well as content popularity, ignoring these discrepancies may result in inefficient edge caching. Second, accurately predicting the popularity of 360° videos at a fine granularity of video segments and tiles remains a challenge. To address these issues, we present DeCa360, a deadline-aware edge caching framework for 360° videos. Specifically, we introduce a lightweight runtime cache partitioning approach to achieve a careful balance between improving the cache hit ratio and guaranteeing more on-time delivery of objects. Moreover, we design a content popularity prediction method for two-tier 360° videos that combines a learning-based prediction model with domain knowledge of video streaming, leading to improved prediction accuracy and efficient cache replacement. Extensive experimental evaluations demonstrate that DeCa360 outperforms all baseline algorithms in terms of byte-hit ratio and on-time delivery ratio, making it a promising approach for efficient edge caching of 360° videos.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104022"},"PeriodicalIF":7.7,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142166723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on fuzz testing technologies for industrial control protocols 工业控制协议模糊测试技术调查
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-06 DOI: 10.1016/j.jnca.2024.104020
Xiaoyan Wei , Zheng Yan , Xueqin Liang

The development of the industrial Internet of Things enables industrial control systems to become inter-networked and inter-connected, making them intelligent with high productivity. However, these systems are exposed to external environments and vulnerable to network attacks, which also suffer from internal vulnerabilities. Fuzz testing, in short fuzzing, is a technique to enhance the security of industrial control systems by finding errors when repeatedly executing software that injects illegal, malformed, or unexpected inputs into the systems. Unfortunately, traditional fuzzing of communication protocols faces low coverage and efficiency problems when being applied to industrial protocols, considering the characteristics of industrial protocols such as real-time and multi-interaction. Moreover, fuzzing is difficult to perform because many structures of industrial control protocols are not publicly available. Although researchers have started to focus on the fuzzing of industrial control protocols, existing literature still lacks a thorough survey of its recent advances. To fill this gap, we conduct a comprehensive survey on existing fuzzing methods for industrial control protocols. After a brief introduction to industrial control protocols and fuzzing, we propose a set of metrics for judging the pros and cons of existing fuzzing methods. Based on these metrics, we evaluate and compare the performance of fuzzing methods of industrial control protocols in the past eight years. Based on our review and analysis, we further summarize the open problems of these methods for achieving the proposed metrics and elaborate on future research directions toward secure industrial control systems.

工业物联网的发展使工业控制系统实现了相互联网和相互连接,使其成为具有高生产率的智能系统。然而,这些系统暴露在外部环境中,容易受到网络攻击,同时也存在内部漏洞。模糊测试(Fuzz testing),简称模糊测试,是一种在反复执行向系统注入非法、畸形或意外输入的软件时发现错误,从而增强工业控制系统安全性的技术。遗憾的是,考虑到工业协议的实时性和多交互性等特点,传统的通信协议模糊测试在应用于工业协议时面临覆盖率低和效率低的问题。此外,由于许多工业控制协议的结构并不公开,模糊测试很难进行。尽管研究人员已开始关注工业控制协议的模糊处理,但现有文献仍缺乏对其最新进展的全面调查。为了填补这一空白,我们对现有的工业控制协议模糊处理方法进行了全面调查。在简要介绍了工业控制协议和模糊处理之后,我们提出了一套用于判断现有模糊处理方法优劣的指标。根据这些指标,我们对过去八年中工业控制协议模糊处理方法的性能进行了评估和比较。在回顾和分析的基础上,我们进一步总结了这些方法在实现所提指标方面还存在的问题,并阐述了安全工业控制系统的未来研究方向。
{"title":"A survey on fuzz testing technologies for industrial control protocols","authors":"Xiaoyan Wei ,&nbsp;Zheng Yan ,&nbsp;Xueqin Liang","doi":"10.1016/j.jnca.2024.104020","DOIUrl":"10.1016/j.jnca.2024.104020","url":null,"abstract":"<div><p>The development of the industrial Internet of Things enables industrial control systems to become inter-networked and inter-connected, making them intelligent with high productivity. However, these systems are exposed to external environments and vulnerable to network attacks, which also suffer from internal vulnerabilities. Fuzz testing, in short fuzzing, is a technique to enhance the security of industrial control systems by finding errors when repeatedly executing software that injects illegal, malformed, or unexpected inputs into the systems. Unfortunately, traditional fuzzing of communication protocols faces low coverage and efficiency problems when being applied to industrial protocols, considering the characteristics of industrial protocols such as real-time and multi-interaction. Moreover, fuzzing is difficult to perform because many structures of industrial control protocols are not publicly available. Although researchers have started to focus on the fuzzing of industrial control protocols, existing literature still lacks a thorough survey of its recent advances. To fill this gap, we conduct a comprehensive survey on existing fuzzing methods for industrial control protocols. After a brief introduction to industrial control protocols and fuzzing, we propose a set of metrics for judging the pros and cons of existing fuzzing methods. Based on these metrics, we evaluate and compare the performance of fuzzing methods of industrial control protocols in the past eight years. Based on our review and analysis, we further summarize the open problems of these methods for achieving the proposed metrics and elaborate on future research directions toward secure industrial control systems.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104020"},"PeriodicalIF":7.7,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques PHIGrader:使用多标准决策技术评估 Manifest 文件组件在安卓恶意软件检测中的有效性
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-06 DOI: 10.1016/j.jnca.2024.104021
Yash Sharma , Anshul Arora

The popularity of the Android operating system has itself become a reason for privacy concerns. To deal with such malware threats, researchers have proposed various detection approaches using static and dynamic features. Static analysis approaches are the most convenient for practical detection. However, several patterns of feature usage were found to be similar in the normal and malware datasets. Such high similarity in both datasets’ feature patterns motivates us to rank and select only the distinguishing set of features. Hence, in this study, we present a novel Android malware detection system, termed as PHIGrader for ranking and evaluating the efficiency of the three most commonly used static features, namely permissions, intents, and hardware components, when used for Android malware detection. To meet our goals, we individually rank the three feature types using frequency-based Multi-Criteria Decision Making (MCDM) techniques, namely TOPSIS and EDAS. Then, the system applies a novel detection algorithm to the rankings involving machine learning and deep learning classifiers to present the best set of features and feature type with higher detection accuracy as an output. The experimental results highlight that our proposed approach can effectively detect Android malware with 99.10% detection accuracy, achieved with the top 46 intents when ranked using TOPSIS, which is better than permissions, hardware components, or even the case where other popular MCDM techniques are used. Furthermore, our experiments demonstrate that the proposed system with frequency-based MCDM rankings is better than other statistical tests such as mutual information, Pearson correlation coefficient, and t-test. In addition, our proposed model outperforms various popularly used feature ranking methods such as Chi-square, Principal Component Analysis (PCA), Entropy-based Category Coverage Difference (ECCD), and other state-of-the-art Android malware detection techniques in terms of detection accuracy.

安卓操作系统的普及本身就成为隐私问题的一个原因。为应对此类恶意软件威胁,研究人员提出了各种使用静态和动态特征的检测方法。静态分析方法最便于实际检测。然而,在正常数据集和恶意软件数据集中,有几种特征使用模式被发现是相似的。这两个数据集的特征模式相似度如此之高,促使我们只对有区别的特征集进行排序和选择。因此,在本研究中,我们提出了一种新颖的安卓恶意软件检测系统,称为 PHIGrader,用于排序和评估安卓恶意软件检测中最常用的三种静态特征(即权限、意图和硬件组件)的效率。为实现目标,我们使用基于频率的多标准决策(MCDM)技术(即 TOPSIS 和 EDAS)对这三种特征类型进行单独排序。然后,系统将一种新颖的检测算法应用到涉及机器学习和深度学习分类器的排序中,从而以更高的检测准确率作为输出,呈现出最佳的特征集和特征类型。实验结果表明,我们提出的方法可以有效检测安卓恶意软件,检测准确率达到 99.10%,在使用 TOPSIS 对前 46 个意图进行排序时,检测准确率达到了 99.10%,优于权限、硬件组件,甚至优于使用其他流行的 MCDM 技术的情况。此外,我们的实验证明,采用基于频率的 MCDM 排名的拟议系统优于互信息、皮尔逊相关系数和 t 检验等其他统计检验方法。此外,就检测准确率而言,我们提出的模型优于各种常用的特征排序方法,如 Chi-square、主成分分析(PCA)、基于熵的类别覆盖率差异(ECCD)以及其他最先进的安卓恶意软件检测技术。
{"title":"PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques","authors":"Yash Sharma ,&nbsp;Anshul Arora","doi":"10.1016/j.jnca.2024.104021","DOIUrl":"10.1016/j.jnca.2024.104021","url":null,"abstract":"<div><p>The popularity of the Android operating system has itself become a reason for privacy concerns. To deal with such malware threats, researchers have proposed various detection approaches using static and dynamic features. Static analysis approaches are the most convenient for practical detection. However, several patterns of feature usage were found to be similar in the normal and malware datasets. Such high similarity in both datasets’ feature patterns motivates us to rank and select only the distinguishing set of features. Hence, in this study, we present a novel Android malware detection system, termed as <em>PHIGrader</em> for ranking and evaluating the efficiency of the three most commonly used static features, namely permissions, intents, and hardware components, when used for Android malware detection. To meet our goals, we individually rank the three feature types using frequency-based Multi-Criteria Decision Making (MCDM) techniques, namely TOPSIS and EDAS. Then, the system applies a novel detection algorithm to the rankings involving machine learning and deep learning classifiers to present the best set of features and feature type with higher detection accuracy as an output. The experimental results highlight that our proposed approach can effectively detect Android malware with 99.10% detection accuracy, achieved with the top 46 intents when ranked using TOPSIS, which is better than permissions, hardware components, or even the case where other popular MCDM techniques are used. Furthermore, our experiments demonstrate that the proposed system with frequency-based MCDM rankings is better than other statistical tests such as mutual information, Pearson correlation coefficient, and t-test. In addition, our proposed model outperforms various popularly used feature ranking methods such as Chi-square, Principal Component Analysis (PCA), Entropy-based Category Coverage Difference (ECCD), and other state-of-the-art Android malware detection techniques in terms of detection accuracy.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104021"},"PeriodicalIF":7.7,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142230792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clone node detection in static wireless sensor networks: A hybrid approach 静态无线传感器网络中的克隆节点检测:一种混合方法
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-09-05 DOI: 10.1016/j.jnca.2024.104018
Muhammad Numan , Fazli Subhan , Mohd Nor Akmal Khalid , Wazir Zada Khan , Hiroyuki Iida

Wireless Sensor Networks (WSNs) security is a serious concern due to the lack of hardware protection on sensor nodes. One common attack on WSNs is the cloning attack, where an adversary captures legitimate nodes, creates multiple replicas, and reprograms them for malicious activities. Therefore, creating an efficient defense to mitigate this challenge is essential. Several witness node-based techniques have been developed to solve this issue, but they often suffer from higher communication and memory overheads or low detection accuracy, making them less effective. In response to the limitations of existing techniques, we propose a novel approach called Hybrid Random Walk assisted Zone-based (HRWZ) for clone node detection in static WSNs. The HRWZ method relies on the random selection of Zone-Leader (ZL) in WSNs to detect clones effectively while maintaining network lifespan. We compared HRWZ to known witness node-based techniques, namely Randomized Multicast (RM), Line Selected Multicast (LSM), Random Walk (RAWL) and Table-assisted RAndom WaLk (TRAWL), under different simulation settings. The simulation results confirmed the improved performance and reliability of the proposed HRWZ technique. Our approach reduces communication costs and provides an effective way of selecting ZL for high-probability clone node detection.

由于传感器节点缺乏硬件保护,无线传感器网络(WSN)的安全性成为一个严重问题。克隆攻击是对 WSN 的一种常见攻击,即敌方捕获合法节点,创建多个复制节点,并对其重新编程以进行恶意活动。因此,创建有效的防御措施来缓解这一挑战至关重要。为了解决这个问题,已经开发出了几种基于见证节点的技术,但这些技术往往存在通信和内存开销较大或检测精度较低的问题,因此效果不佳。针对现有技术的局限性,我们提出了一种在静态 WSN 中检测克隆节点的新方法,称为基于区域的混合随机漫步辅助法(HRWZ)。HRWZ 方法依赖于在 WSN 中随机选择 Zone-Leader (ZL),从而在保持网络寿命的同时有效检测克隆节点。在不同的仿真设置下,我们将 HRWZ 与已知的基于见证节点的技术(即随机多播(RM)、线路选择多播(LSM)、随机漫步(RAWL)和表辅助见证节点检测(TRAWL))进行了比较。仿真结果证实,拟议的 HRWZ 技术提高了性能和可靠性。我们的方法降低了通信成本,为高概率克隆节点检测提供了选择 ZL 的有效方法。
{"title":"Clone node detection in static wireless sensor networks: A hybrid approach","authors":"Muhammad Numan ,&nbsp;Fazli Subhan ,&nbsp;Mohd Nor Akmal Khalid ,&nbsp;Wazir Zada Khan ,&nbsp;Hiroyuki Iida","doi":"10.1016/j.jnca.2024.104018","DOIUrl":"10.1016/j.jnca.2024.104018","url":null,"abstract":"<div><p>Wireless Sensor Networks (WSNs) security is a serious concern due to the lack of hardware protection on sensor nodes. One common attack on WSNs is the cloning attack, where an adversary captures legitimate nodes, creates multiple replicas, and reprograms them for malicious activities. Therefore, creating an efficient defense to mitigate this challenge is essential. Several witness node-based techniques have been developed to solve this issue, but they often suffer from higher communication and memory overheads or low detection accuracy, making them less effective. In response to the limitations of existing techniques, we propose a novel approach called Hybrid Random Walk assisted Zone-based (HRWZ) for clone node detection in static WSNs. The HRWZ method relies on the random selection of Zone-Leader (<span><math><msub><mrow><mi>Z</mi></mrow><mrow><mi>L</mi></mrow></msub></math></span>) in WSNs to detect clones effectively while maintaining network lifespan. We compared HRWZ to known witness node-based techniques, namely Randomized Multicast (RM), Line Selected Multicast (LSM), Random Walk (RAWL) and Table-assisted RAndom WaLk (TRAWL), under different simulation settings. The simulation results confirmed the improved performance and reliability of the proposed HRWZ technique. Our approach reduces communication costs and provides an effective way of selecting <span><math><msub><mrow><mi>Z</mi></mrow><mrow><mi>L</mi></mrow></msub></math></span> for high-probability clone node detection.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104018"},"PeriodicalIF":7.7,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1084804524001954/pdfft?md5=a1d53d6c117165e079b5f3dfe62294f6&pid=1-s2.0-S1084804524001954-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks 一种高效的无证书区块链认证方案,可确保命名数据网络中生产者的移动性
IF 7.7 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-08-30 DOI: 10.1016/j.jnca.2024.104007
Cong Wang , Tong Zhou , Maode Ma , Yuwen Xiong , Xiankun Zhang , Chao Liu

Named Data Networking (NDN) aims to establish an efficient content delivery architecture. In NDN, secure and effective identity authentication schemes ensure secure communication between producers and routers. Currently, there is no feasible solution to perform identity authentication of mobile producers in NDNs. Identity authentication schemes in other networks are either weak in security or performance, such as privacy leakage, difficulty to establish cross-domain trust, and long handover delays, and are not fully adaptable to the security requirements of NDNs. Additionally, the mobility of producers was not fully considered in the initial design of NDNs. This paper first revises the structure of packets and routers to support the identity authentication and mobility of producers. On this basis, this paper proposes a secure and efficient certificateless ECC-based producer identity authentication scheme (CL-BPA), which includes initial authentication and re-authentication, aimed at achieving rapid switch authentication and integrating blockchain to solve single-point failure issues. Using the Canetti and Krawczyk (CK) adversarial model and informal security analysis, the proposed CL-BPA scheme is demonstrated to be resistant to anonymity attacks, identity forgery attacks, and man-in-the-middle attacks. The performance analysis demonstrates that the proposed CL-BPA scheme exhibits excellent capabilities in terms of computation delay, communication cost, smart contract execution time, average response delay, and throughput.

命名数据网络(NDN)旨在建立一个高效的内容传输架构。在 NDN 中,安全有效的身份验证方案可确保生产者与路由器之间的安全通信。目前,还没有可行的解决方案来对 NDN 中的移动生产者进行身份验证。其他网络中的身份验证方案要么在安全性方面比较薄弱,要么在性能方面比较薄弱,如隐私泄露、难以建立跨域信任、切换延迟长等,不能完全适应 NDN 的安全要求。此外,在最初设计 NDN 时,并没有充分考虑到生产者的移动性。本文首先修改了数据包和路由器的结构,以支持生产者的身份验证和移动性。在此基础上,本文提出了一种安全高效的基于 ECC 的生产者身份认证方案(CL-BPA),包括初始认证和再认证,旨在实现快速切换认证,并结合区块链解决单点故障问题。利用 Canetti 和 Krawczyk(CK)对抗模型和非正式安全分析,证明了所提出的 CL-BPA 方案能够抵御匿名攻击、身份伪造攻击和中间人攻击。性能分析表明,拟议的 CL-BPA 方案在计算延迟、通信成本、智能合约执行时间、平均响应延迟和吞吐量方面都表现出了卓越的能力。
{"title":"An efficient certificateless blockchain-enabled authentication scheme to secure producer mobility in named data networks","authors":"Cong Wang ,&nbsp;Tong Zhou ,&nbsp;Maode Ma ,&nbsp;Yuwen Xiong ,&nbsp;Xiankun Zhang ,&nbsp;Chao Liu","doi":"10.1016/j.jnca.2024.104007","DOIUrl":"10.1016/j.jnca.2024.104007","url":null,"abstract":"<div><p>Named Data Networking (NDN) aims to establish an efficient content delivery architecture. In NDN, secure and effective identity authentication schemes ensure secure communication between producers and routers. Currently, there is no feasible solution to perform identity authentication of mobile producers in NDNs. Identity authentication schemes in other networks are either weak in security or performance, such as privacy leakage, difficulty to establish cross-domain trust, and long handover delays, and are not fully adaptable to the security requirements of NDNs. Additionally, the mobility of producers was not fully considered in the initial design of NDNs. This paper first revises the structure of packets and routers to support the identity authentication and mobility of producers. On this basis, this paper proposes a secure and efficient certificateless ECC-based producer identity authentication scheme (CL-BPA), which includes initial authentication and re-authentication, aimed at achieving rapid switch authentication and integrating blockchain to solve single-point failure issues. Using the Canetti and Krawczyk (CK) adversarial model and informal security analysis, the proposed CL-BPA scheme is demonstrated to be resistant to anonymity attacks, identity forgery attacks, and man-in-the-middle attacks. The performance analysis demonstrates that the proposed CL-BPA scheme exhibits excellent capabilities in terms of computation delay, communication cost, smart contract execution time, average response delay, and throughput.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"232 ","pages":"Article 104007"},"PeriodicalIF":7.7,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Network and Computer Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1