首页 > 最新文献

Hospital security and safety management最新文献

英文 中文
Digital Identity, Privacy Security and their Legal Safeguards in the Metaverse 虚拟世界中的数字身份、隐私安全及其法律保障
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023011
Wenxiang Zhang, Hong Wu
The Metaverse is the digitization of the real world, supported by big data, AI, 5G, cloud computing, blockchain, encryption algorithm, perception technology, digital twin, virtual engine and other technologies that interact with human behaviour and thoughts in avatars through digital identity. Cracking the trust problem brought by the avatar depends on the privacy security and authentication technology for individuals using digital identities to enter the Metaverse. To accomplish personal domination of the avatar, metaverse users need privacy data feeding and emotion projection. They must be equipped with proprietary algorithms to process and analyze the complex data generated in adaptive interactions, which challenges the privacy security of user data in the Metaverse. Distinguishing the significance of different identifiers in personal identity generation while imposing different behavioural regulatory requirements on data processing levels may better balance the relationship between personal privacy security and digital identity protection and data utilization in the Metaverse. In response to digital identity issues, there is an objective need to establish a unified digital identity authentication system to gain the general trust of society. Further, the remedies for a right to personality can be applied to the scenario of unlawful infringement of digital identity and privacy security.
虚拟世界是对现实世界的数字化,以大数据、人工智能、5G、云计算、区块链、加密算法、感知技术、数字孪生、虚拟引擎等技术为支撑,通过数字身份与化身中的人类行为和思想进行交互。破解虚拟化身带来的信任问题,取决于使用数字身份进入虚拟世界的个人的隐私安全和认证技术。为了实现对虚拟化身的个人控制,虚拟世界用户需要提供隐私数据和情感投射。它们必须配备专有算法来处理和分析自适应交互中生成的复杂数据,这对元宇宙中用户数据的隐私安全性提出了挑战。区分不同标识符在个人身份生成中的重要性,同时对数据处理层面施加不同的行为监管要求,可以更好地平衡个人隐私安全与数字身份保护和数据利用之间的关系。针对数字身份问题,客观上需要建立统一的数字身份认证体系,以获得社会的普遍信任。此外,人格权的补救措施可适用于非法侵犯数字身份和隐私安全的情况。
{"title":"Digital Identity, Privacy Security and their Legal Safeguards in the Metaverse","authors":"Wenxiang Zhang, Hong Wu","doi":"10.1051/sands/2023011","DOIUrl":"https://doi.org/10.1051/sands/2023011","url":null,"abstract":"The Metaverse is the digitization of the real world, supported by big data, AI, 5G, cloud computing, blockchain, encryption algorithm, perception technology, digital twin, virtual engine and other technologies that interact with human behaviour and thoughts in avatars through digital identity. Cracking the trust problem brought by the avatar depends on the privacy security and authentication technology for individuals using digital identities to enter the Metaverse. To accomplish personal domination of the avatar, metaverse users need privacy data feeding and emotion projection. They must be equipped with proprietary algorithms to process and analyze the complex data generated in adaptive interactions, which challenges the privacy security of user data in the Metaverse. Distinguishing the significance of different identifiers in personal identity generation while imposing different behavioural regulatory requirements on data processing levels may better balance the relationship between personal privacy security and digital identity protection and data utilization in the Metaverse. In response to digital identity issues, there is an objective need to establish a unified digital identity authentication system to gain the general trust of society. Further, the remedies for a right to personality can be applied to the scenario of unlawful infringement of digital identity and privacy security.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"159 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74301775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Security Challenges of The "Metaverse" “虚拟世界”的安全挑战
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023010
Shiya Liu
This work take a comprehensive look at the security issues that may be faced in an emerging field, "Metaverse". Starting from the physical construction basis of “Metaverse”, I firstly give a general introduction to the possible security issues faced by “Metaverse” in the areas of hardware, software, system, platform, etc., then discuss the specific security issues in terms of endogenous and technical support, and finally conclude from the perspectives of technology, regulation and discourse.
这项工作全面考察了在新兴领域“元宇宙”中可能面临的安全问题。从“元宇宙”的物理构建基础出发,首先对“元宇宙”在硬件、软件、系统、平台等方面可能面临的安全问题进行了概括性的介绍,然后从内生和技术支撑两个方面探讨了具体的安全问题,最后从技术、监管和话语三个方面进行总结。
{"title":"The Security Challenges of The \"Metaverse\"","authors":"Shiya Liu","doi":"10.1051/sands/2023010","DOIUrl":"https://doi.org/10.1051/sands/2023010","url":null,"abstract":"This work take a comprehensive look at the security issues that may be faced in an emerging field, \"Metaverse\". Starting from the physical construction basis of “Metaverse”, I firstly give a general introduction to the possible security issues faced by “Metaverse” in the areas of hardware, software, system, platform, etc., then discuss the specific security issues in terms of endogenous and technical support, and finally conclude from the perspectives of technology, regulation and discourse.\u0000","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76283008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructing China’s Independent Knowledge System in the Digital Era 构建数字时代中国自主知识体系
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023008
Hong Zou
Since last year, the Metaverse concept has incredibly become a hot topic from both industrial and societal perspectives pushed by various parties and factors. Meanwhile, the phenomenal growth of information technologies such as Web3.0, DAO, StarLink, AIGC, etc. has also attracted great attention from both industry and academia. Although worth exploring, they are somewhat exacerbated by the hype of speculative capital. If we break free from the switching hot topics and calm our mind down, we will find a problem that China often lacks its own discourse system in spite of its arrival as a major tech power. We tend to “follow the crowd”. As a latecomer in information technology, the key to harnessing China’s “latecomer’s advantage” lies in getting rid of “path dependence” which is all about establishing an independent knowledge system and discourse system as well as setting up a “Chinese school” in the information field.
自去年以来,Metaverse概念在各种各方和因素的推动下,令人难以置信地成为了行业和社会的热门话题。与此同时,Web3.0、DAO、StarLink、AIGC等信息技术的迅猛发展也引起了业界和学术界的高度关注。虽然值得探讨,但投机资本的炒作在一定程度上加剧了这些问题。如果我们从话题的切换中跳出来,静下心来,就会发现一个问题:中国虽然已经成为科技大国,但往往缺乏自己的话语体系。我们倾向于“随大流”。中国作为信息技术的后发国家,发挥“后发优势”的关键在于摆脱“路径依赖”,即建立独立的知识体系和话语体系,建立信息领域的“中国学校”。
{"title":"Constructing China’s Independent Knowledge System in the Digital Era","authors":"Hong Zou","doi":"10.1051/sands/2023008","DOIUrl":"https://doi.org/10.1051/sands/2023008","url":null,"abstract":"Since last year, the Metaverse concept has incredibly become a hot topic from both industrial and societal perspectives pushed by various parties and factors. Meanwhile, the phenomenal growth of information technologies such as Web3.0, DAO, StarLink, AIGC, etc. has also attracted great attention from both industry and academia. Although worth exploring, they are somewhat exacerbated by the hype of speculative capital. If we break free from the switching hot topics and calm our mind down, we will find a problem that China often lacks its own discourse system in spite of its arrival as a major tech power. We tend to “follow the crowd”. As a latecomer in information technology, the key to harnessing China’s “latecomer’s advantage” lies in getting rid of “path dependence” which is all about establishing an independent knowledge system and discourse system as well as setting up a “Chinese school” in the information field.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"58 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73659378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A review of the application of digital identity in the metaverse 数字身份在虚拟世界中的应用综述
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023009
Siwen Wang, Wei Wang
The development of Internet has further expanded people's social scope. Digital identity has been widely used. In social networks, the use of anonumity or pseudonym heightens the charm of the network. Nevertherless, when online payments, online transactions and online assets began to enter the Internet, the negative impact of virtualization ahas gradually emerged. As an individual's maker in Metaverse, digital identity may become a key factor to balance the association between anonymity and pseudonym. To sort out the current situation and possibility of the use of digital identity, this paper takes the appliction of digital identity in metaverse, and uses the "Enterprise IA" miniature model of Morey et al. . We analyzed the focus of the current debate on digital identity, hoping to reflect on the new problems on the basis of exploring the application rules of digital identity. The article belived that the nature of the metaverse is the digitalization of the physical word. Futhermore, the fundamental issue of digital identity is still the issue of power ownership. With the help of blockchain, privacy filter and other technologies, we can not only change the governance logic and methods, but also balance the correlation between private rights and public interests. We can explore new governance approaches to deal with the growing identity trust crisis, individual competition for identity authorization rights, and privacy problems in Metaverse.
互联网的发展进一步扩大了人们的社会范围。数字身份已经被广泛使用。在社交网络中,匿名或假名的使用增加了网络的魅力。然而,当在线支付、在线交易和在线资产开始进入互联网时,虚拟化的负面影响也逐渐显现出来。作为虚拟世界中个人的创造者,数字身份可能成为平衡匿名与假名之间关系的关键因素。为了梳理数字身份使用的现状和可能性,本文以数字身份在元宇宙中的应用为例,采用Morey等人的“Enterprise IA”微缩模型。我们分析了当前关于数字身份的争论焦点,希望在探索数字身份应用规律的基础上,对新问题进行反思。文章认为,虚拟世界的本质是物理世界的数字化。此外,数字身份的根本问题仍然是权力所有权的问题。借助区块链、隐私过滤器等技术,我们不仅可以改变治理逻辑和方法,还可以平衡私人权利与公共利益之间的相关性。我们可以探索新的治理方法来处理日益严重的身份信任危机、个人对身份授权权利的竞争以及Metaverse中的隐私问题。
{"title":"A review of the application of digital identity in the metaverse","authors":"Siwen Wang, Wei Wang","doi":"10.1051/sands/2023009","DOIUrl":"https://doi.org/10.1051/sands/2023009","url":null,"abstract":"The development of Internet has further expanded people's social scope. Digital identity has been widely used. In social networks, the use of anonumity or pseudonym heightens the charm of the network. Nevertherless, when online payments, online transactions and online assets began to enter the Internet, the negative impact of virtualization ahas gradually emerged. As an individual's maker in Metaverse, digital identity may become a key factor to balance the association between anonymity and pseudonym. To sort out the current situation and possibility of the use of digital identity, this paper takes the appliction of digital identity in metaverse, and uses the \"Enterprise IA\" miniature model of Morey et al. . We analyzed the focus of the current debate on digital identity, hoping to reflect on the new problems on the basis of exploring the application rules of digital identity. The article belived that the nature of the metaverse is the digitalization of the physical word. Futhermore, the fundamental issue of digital identity is still the issue of power ownership. With the help of blockchain, privacy filter and other technologies, we can not only change the governance logic and methods, but also balance the correlation between private rights and public interests. We can explore new governance approaches to deal with the growing identity trust crisis, individual competition for identity authorization rights, and privacy problems in Metaverse.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86864510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Challenges of AI to Cognitive Security and Safety 论人工智能对认知安全的挑战
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023012
Ruiyang Huang, Xiaoqing Zheng, Yuting Shang, Xiangyang Xue
Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.
深度学习的最新进展导致了人工智能(AI)的颠覆性突破,推动了类似chatgpt的大型语言模型(llm)的飞跃。与任何新兴技术一样,它是一枚两面硬币,不仅带来了巨大的社会影响,也带来了重大的安全问题,特别是在社会认知领域。在此背景下,本研究从认知域博弈的内在机制分析入手,探讨认知域面临的安全问题,并分析认知免疫系统的形成机制。最后,受生物学中行为模仿的启发,本文将从模拟计算、模拟防御和模拟智能三个方面阐述认知安全的新途径。
{"title":"On Challenges of AI to Cognitive Security and Safety","authors":"Ruiyang Huang, Xiaoqing Zheng, Yuting Shang, Xiangyang Xue","doi":"10.1051/sands/2023012","DOIUrl":"https://doi.org/10.1051/sands/2023012","url":null,"abstract":"Recent advances in deep learning have led to disruptive breakthroughs in artificial intelligence (AI), fueling the jump in ChatGPT-like Large Language Models (LLMs). As with any emerging technology, it is a two-sided coin, bringing not only vast social impacts but also significant security concerns, especially in the socio-cognitive domain. Against this background, this work starts with an inherent mechanism analysis of cognitive domain games, from which it proceeds to explore the security concerns facing the cognitive domain as well as to analyze the formation mechanisms of a cognitive immune system. Finally, inspired by the behavioral mimicry in biology, this work will elaborate on new approaches to cognitive security from three aspects: Mimicry Computing, Mimicry Defense and Mimicry Intelligence.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85866469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Copyright Protection on NFT Digital Works in the Metaverse 虚拟世界中NFT数字作品的版权保护
Pub Date : 2023-05-15 DOI: 10.1051/sands/2023013
Yupeng Dong, Chunhui Wang
Non fungible token (NFT) emerges with the marvelous explosion of the Metaverse. NFT digital products are profoundly impacting the existing copyright system, which needs to be amended and responded in time. There is a possibility that it would completely change the distribution pattern of rights and interests in the field of copyright law. Currently, the legal nature of the casting and trading of NFT digital products still remains controversial. The liability of NFT digital product creators as well as service platforms is required to be further identified accordingly. this article starts with the analysis of the right attributes of NFT digital products based on intellectual property law. Subsequently, the related legal issues and countermeasures are discussed, including the exhaustion of the right-holders, the duty of care of the platform, and the assumption of tort liability arising from the transaction. It is suggested that the NFT digital products should be treated with considerable caution and the legal system of NFT digital products should be constructed in the near future.
不可替代代币(NFT)随着虚拟世界的奇妙爆炸而出现。NFT数字产品正在深刻冲击着现有的版权制度,需要及时修正和应对。它有可能彻底改变著作权法领域的权益分配格局。目前,关于NFT数字产品的铸造和交易的法律性质仍存在争议。NFT数字产品创作者和服务平台的责任需要进一步明确。本文首先从知识产权法的角度对NFT数字产品的权利属性进行分析。随后,讨论了相关的法律问题和对策,包括权利人的权利穷竭、平台的注意义务以及交易产生的侵权责任的承担。建议应谨慎对待NFT数字产品,并在不久的将来建立NFT数字产品的法律体系。
{"title":"Copyright Protection on NFT Digital Works in the Metaverse","authors":"Yupeng Dong, Chunhui Wang","doi":"10.1051/sands/2023013","DOIUrl":"https://doi.org/10.1051/sands/2023013","url":null,"abstract":"Non fungible token (NFT) emerges with the marvelous explosion of the Metaverse. NFT digital products are profoundly impacting the existing copyright system, which needs to be amended and responded in time. There is a possibility that it would completely change the distribution pattern of rights and interests in the field of copyright law. Currently, the legal nature of the casting and trading of NFT digital products still remains controversial. The liability of NFT digital product creators as well as service platforms is required to be further identified accordingly. this article starts with the analysis of the right attributes of NFT digital products based on intellectual property law. Subsequently, the related legal issues and countermeasures are discussed, including the exhaustion of the right-holders, the duty of care of the platform, and the assumption of tort liability arising from the transaction. It is suggested that the NFT digital products should be treated with considerable caution and the legal system of NFT digital products should be constructed in the near future.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86106003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards building a firm metaverse security base 朝着建立稳固的虚拟世界安全基础迈进
Pub Date : 2023-04-19 DOI: 10.1051/sands/2023005
Anmin Li, Xiaohui Yao, Haiying Gu, Yungeng Zhang, Yuan Chang
Metaverse is a significant field that is currently receiving considerable attention from both industry and academia. The transformation of the metaverse from science fiction to reality is actively promoted by technology, industry, and capital. However, metaverse development is still in its early stages. The system architecture and theoretical technology of the metaverse are not yet mature. This paper provides a comprehensive analysis of the metaverse and summarizes its holographic, omnipotent, multidimensional, and multifaceted characteristics. Development of the metaverse is founded on the pertinent infrastructure.We elaborate on the primary components of the metaverse infrastructure and summarize the security risks inherent in the metaverse infrastructure in a systematic manner. On this basis, we propose to utilize the system security technology concept as a guide to build a metaverse security protection system from various perspectives at each level of computing,cloud, network, digital assets, and terminals in order to construct a secure foundation for addressing the metaverse security risks and challenges.
元宇宙是一个重要的领域,目前正受到工业界和学术界的广泛关注。科技、产业和资本积极推动着虚拟世界从科幻到现实的转变。然而,虚拟世界的开发仍处于早期阶段。元宇宙的系统架构和理论技术还不成熟。本文对超宇宙进行了全面的分析,并总结了其全息、全能、多维和多面性的特征。元数据库的开发建立在相关的基础设施之上。我们详细介绍了元基础设施的主要组件,并以系统的方式总结了元基础设施中固有的安全风险。在此基础上,我们提出以系统安全技术理念为指导,从计算、云、网络、数字资产、终端等各个层面多角度构建元宇宙安全防护体系,为应对元宇宙安全风险和挑战搭建安全基础。
{"title":"Towards building a firm metaverse security base","authors":"Anmin Li, Xiaohui Yao, Haiying Gu, Yungeng Zhang, Yuan Chang","doi":"10.1051/sands/2023005","DOIUrl":"https://doi.org/10.1051/sands/2023005","url":null,"abstract":"Metaverse is a significant field that is currently receiving considerable attention from both industry and academia. The transformation of the metaverse from science fiction to reality is actively promoted by technology, industry, and capital. However, metaverse development is still in its early stages. The system architecture and theoretical technology of the metaverse are not yet mature. This paper provides a comprehensive analysis of the metaverse and summarizes its holographic, omnipotent, multidimensional, and multifaceted characteristics. Development of the metaverse is founded on the pertinent infrastructure.\u0000We elaborate on the primary components of the metaverse infrastructure and summarize the security risks inherent in the metaverse infrastructure in a systematic manner. On this basis, we propose to utilize the system security technology concept as a guide to build a metaverse security protection system from various perspectives at each level of computing,cloud, network, digital assets, and terminals in order to construct a secure foundation for addressing the metaverse security risks and challenges.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72568932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From Perfect Secrecy to Perfect Safety & Security: Cryptography-Based Analysis of Endogenous Security 从完全保密到完全安全:基于密码学的内生安全分析
Pub Date : 2023-04-17 DOI: 10.1051/sands/2023004
Liang Jin, Xiaoyan Hu, Jiangxing Wu
In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge. To prove the conjecture, we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain. Then, we inherit and apply the established ideas and means of Perfect Secrecy, and propose the concept, definition and corollaries of the perfect instinct function security (PIFS) corresponding to Perfect Secrecy. Furthermore, we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem. Finally, we prove that the DHR satisfying the “One-Time Reconstruction” constraint is the sufficient and necessary condition to achieve perfect security. This means that the existence of PIFS is also proven. The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the one-way transparent superiority of the attacker into a double-blind problem for both the attacker and the defender, which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks. Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.
本文提出了一个假设,即没有任何先验知识的内生安全类似于没有任何先验知识的完全保密。为了证明这一猜想,我们首先建立了本能函数安全的密码学模型,将网络域的安全问题转化为密码域的加密问题。在此基础上,继承和运用完善保密的思想和手段,提出了与完善保密相对应的完善本能功能安全的概念、定义和推论。并将DHR系统作为PIFS的具体实现,提出了对应于香农完全保密定理的DHR完全安全定理。最后证明了满足“一次性重构”约束的DHR是实现完全安全的充要条件。这意味着PIFS的存在也得到了证明。分析表明,任何可重构系统都可以通过其构造进行加密,PIFS将攻击者的单向透明优势转化为攻击者和防御者的双盲问题,导致攻击者无法从攻击中获取有用的构造信息,也无法找到比盲试错或暴力攻击更好的方法。由于要求攻击者具有新的强大的破解结构密码的能力,因此将网络安全的门槛至少提高到与密码解密相同的水平,因此无处不在的网络威胁注定会大大减少。
{"title":"From Perfect Secrecy to Perfect Safety & Security: Cryptography-Based Analysis of Endogenous Security","authors":"Liang Jin, Xiaoyan Hu, Jiangxing Wu","doi":"10.1051/sands/2023004","DOIUrl":"https://doi.org/10.1051/sands/2023004","url":null,"abstract":"In this paper, we propose a conjecture that endogenous security without any prior knowledge is similar to perfect secrecy without any prior knowledge. To prove the conjecture, we first establish a cryptography model of instinct function security to transform the security problem in the network domain into an encryption problem in the cryptographic domain. Then, we inherit and apply the established ideas and means of Perfect Secrecy, and propose the concept, definition and corollaries of the perfect instinct function security (PIFS) corresponding to Perfect Secrecy. Furthermore, we take the DHR system as a concrete implementation of PIFS and propose the DHR Perfect Security Theorem corresponding to Shannon’s Perfect Secrecy Theorem. Finally, we prove that the DHR satisfying the “One-Time Reconstruction” constraint is the sufficient and necessary condition to achieve perfect security. This means that the existence of PIFS is also proven. The analysis shows that any reconfigurable system can be encrypted by its construct and that the PIFS converts the one-way transparent superiority of the attacker into a double-blind problem for both the attacker and the defender, which leads to that the attacker is impossible to obtain useful construction information from the attacks and unable to find a better way than blind trial-and-error or brute-force attacks. Since the attackers are required to have the new powerful ability to crack the structure cryptogram, the threshold of cyber security is raised to at least the same level as cryptogram deciphering, thereafter the ubiquitous cyber threats are destined to be significantly reduced.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84855480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Communications "N + 1 dimensionality" Endogenous Anti-Jamming: Theory and Techniques 无线通信“N + 1维”内生抗干扰:理论与技术
Pub Date : 2023-04-02 DOI: 10.1051/sands/2023003
Yonggang Zhu, F. Yao, Yifu Sun, Wenlong Guo
The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently. With this focus, by leveraging the inherent characteristics of wireless communication and referring to the principle of cyberspace endogenous security, this paper investigates the core issues of endogenous security in the electromagnetic space, namely, endogenous anti-jamming (EAJ), which can defend against the unknown electromagnetic attacks effectively. Specifically, the subspace method is first adopted to establish the unified framework for the conventional spread-spectrum, intelligent, and endogenous anti-jamming, in which both the intrinsic development law of each technique and the internal logic between them are revealed. Then, the fundamental concept, key techniques, and development suggestions of wireless communication "N+1 dimensionality" endogenous anti-jamming are proposed to seek a disruptive breakthrough.
目前,现有的无线通信抗干扰理论和技术已经达到了性能极限。以此为重点,利用无线通信的固有特性,参考网络空间内生安全原理,研究电磁空间内生安全的核心问题,即内生抗干扰(endogenous anti- interference, EAJ),能够有效防御未知的电磁攻击。具体而言,首先采用子空间方法建立了传统扩频、智能和内生性抗干扰的统一框架,揭示了各技术的内在发展规律和相互之间的内在逻辑。然后,提出无线通信“N+1维”内生抗干扰的基本概念、关键技术和发展建议,寻求颠覆性突破。
{"title":"Wireless Communications \"N + 1 dimensionality\" Endogenous Anti-Jamming: Theory and Techniques","authors":"Yonggang Zhu, F. Yao, Yifu Sun, Wenlong Guo","doi":"10.1051/sands/2023003","DOIUrl":"https://doi.org/10.1051/sands/2023003","url":null,"abstract":"The existing theory and techniques of wireless communication anti-jamming have reached their performance limit recently. With this focus, by leveraging the inherent characteristics of wireless communication and referring to the principle of cyberspace endogenous security, this paper investigates the core issues of endogenous security in the electromagnetic space, namely, endogenous anti-jamming (EAJ), which can defend against the unknown electromagnetic attacks effectively. Specifically, the subspace method is first adopted to establish the unified framework for the conventional spread-spectrum, intelligent, and endogenous anti-jamming, in which both the intrinsic development law of each technique and the internal logic between them are revealed. Then, the fundamental concept, key techniques, and development suggestions of wireless communication \"N+1 dimensionality\" endogenous anti-jamming are proposed to seek a disruptive breakthrough.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"4007 3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86696685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An accurate identification method for network devices based on spatial attention mechanism 基于空间注意机制的网络设备准确识别方法
Pub Date : 2023-03-23 DOI: 10.1051/sands/2023002
Xiuting Wang, Ruixiang Li, Shaoyong Du, X. Luo
With the metaverse being the development direction of the next generation Internet, the popularity of intelligent devices and the maturity of various emerging technologies, more and more intelligent devices try to connect to the Internet, which poses a major threat to the management and security protection of network equipment. At present, the mainstream method of network equipment identification in the metaverse is to obtain the network traffic data generated in the process of device communication, extract the device features through analysis and processing, and identify the device based on a variety of learning algorithms. Such methods often require manual participation, and it is difficult to capture the small differences between similar devices, leading to identification errors. Therefore, we propose a deep learning device recognition method based on spatial attention mechanism. Firstly, we extract the required feature fields from the acquired network traffic data. Then, Then, we normalize the data and convert it into grayscale images. After that, we add spatial attention mechanism to CNN and MLP respectively to increase the difference between similar network devices and further improve the recognition accuracy. Finally, we identify device based on the deep learning model. A large number of experiments were carried out on 31 types of network devices such as web cameras, wireless routers and smartwatches. The results show that the accuracy of the proposed recognition method based on spatial attention mechanism is increased by 0.8% and 2.0%, respectively, compared with the recognition method based only on deep learning model under the CNN and MLP models. The method proposed in this paper is significantly superior to the existing method of device type recognition based only on deep learning model.
随着元宇宙作为下一代互联网的发展方向,智能设备的普及和各种新兴技术的成熟,越来越多的智能设备试图接入互联网,这对网络设备的管理和安全防护构成了重大威胁。目前,元宇宙中网络设备识别的主流方法是获取设备通信过程中产生的网络流量数据,通过分析处理提取设备特征,并基于多种学习算法对设备进行识别。这种方法通常需要人工参与,而且很难捕捉到类似设备之间的微小差异,从而导致识别错误。因此,我们提出了一种基于空间注意机制的深度学习设备识别方法。首先,从采集的网络流量数据中提取所需的特征域;然后,对数据进行归一化,并将其转换为灰度图像。之后,我们分别在CNN和MLP中加入空间注意机制,增加相似网络设备之间的差异,进一步提高识别准确率。最后,我们基于深度学习模型对设备进行识别。在网络摄像头、无线路由器、智能手表等31种网络设备上进行了大量实验。结果表明,与CNN和MLP模型下仅基于深度学习模型的识别方法相比,基于空间注意机制的识别方法的准确率分别提高了0.8%和2.0%。本文提出的方法明显优于现有的仅基于深度学习模型的设备类型识别方法。
{"title":"An accurate identification method for network devices based on spatial attention mechanism","authors":"Xiuting Wang, Ruixiang Li, Shaoyong Du, X. Luo","doi":"10.1051/sands/2023002","DOIUrl":"https://doi.org/10.1051/sands/2023002","url":null,"abstract":"With the metaverse being the development direction of the next generation Internet, the popularity of intelligent devices and the maturity of various emerging technologies, more and more intelligent devices try to connect to the Internet, which poses a major threat to the management and security protection of network equipment. At present, the mainstream method of network equipment identification in the metaverse is to obtain the network traffic data generated in the process of device communication, extract the device features through analysis and processing, and identify the device based on a variety of learning algorithms. Such methods often require manual participation, and it is difficult to capture the small differences between similar devices, leading to identification errors. Therefore, we propose a deep learning device recognition method based on spatial attention mechanism. Firstly, we extract the required feature fields from the acquired network traffic data. Then, Then, we normalize the data and convert it into grayscale images. After that, we add spatial attention mechanism to CNN and MLP respectively to increase the difference between similar network devices and further improve the recognition accuracy. Finally, we identify device based on the deep learning model. A large number of experiments were carried out on 31 types of network devices such as web cameras, wireless routers and smartwatches. The results show that the accuracy of the proposed recognition method based on spatial attention mechanism is increased by 0.8% and 2.0%, respectively, compared with the recognition method based only on deep learning model under the CNN and MLP models. The method proposed in this paper is significantly superior to the existing method of device type recognition based only on deep learning model.","PeriodicalId":79641,"journal":{"name":"Hospital security and safety management","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86237774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Hospital security and safety management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1