首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme 分散的基于多权威机构属性的可搜索加密方案
Pub Date : 2021-03-01 DOI: 10.6633/IJNS.202103_23(2).17
Juan Ren, Leyou Zhang, Baocang Wang
Attribute-based searchable encryption (ABSE) scheme is an efficient mechanism to implement access control and secure keywords search based on attributes over encrypted data. However, most existing ABSE schemes rely on single trusted authority to manage the attribute private keys. In real life, it is impractical that one authority completes all verifications and certifications to all attributes. In addition, the existence of the vulnerable item makes them be vulnerable to secret-key-recovery attack in some existing multi-authority attribute-based encryption (ABE) schemes based on access tree. To solve above problems, we design a decentralized multi-authority ABSE scheme based on access tree, which can resist the keyword guessing (KG) attack and the secret-keys-recovery attack. We also give performance analysis of the proposed scheme and prove it to be selectively secure under the decisional bilinear Diffie-Hellman (DBDH) assumption, the hash Diffie-Hellman (HDH) assumption and the bilinear Diffie-Hellman (BDH) assumption.
基于属性的可搜索加密(ABSE)方案是一种基于属性对加密数据进行访问控制和安全关键字搜索的有效机制。然而,大多数现有的ABSE方案依赖于单个可信机构来管理属性私钥。在现实生活中,让一个权威机构完成对所有属性的所有验证和认证是不切实际的。此外,在现有的基于访问树的多权威属性加密(ABE)方案中,由于脆弱项的存在,容易受到私钥恢复攻击。为了解决上述问题,我们设计了一种基于访问树的去中心化多授权ABSE方案,该方案能够抵御关键字猜测(KG)攻击和秘钥恢复攻击。本文还对该方案进行了性能分析,并证明了该方案在决策双线性Diffie-Hellman (DBDH)假设、哈希Diffie-Hellman (HDH)假设和双线性Diffie-Hellman (BDH)假设下具有选择性安全性。
{"title":"Decentralized Multi-Authority Attribute-based Searchable Encryption Scheme","authors":"Juan Ren, Leyou Zhang, Baocang Wang","doi":"10.6633/IJNS.202103_23(2).17","DOIUrl":"https://doi.org/10.6633/IJNS.202103_23(2).17","url":null,"abstract":"Attribute-based searchable encryption (ABSE) scheme is an efficient mechanism to implement access control and secure keywords search based on attributes over encrypted data. However, most existing ABSE schemes rely on single trusted authority to manage the attribute private keys. In real life, it is impractical that one authority completes all verifications and certifications to all attributes. In addition, the existence of the vulnerable item makes them be vulnerable to secret-key-recovery attack in some existing multi-authority attribute-based encryption (ABE) schemes based on access tree. To solve above problems, we design a decentralized multi-authority ABSE scheme based on access tree, which can resist the keyword guessing (KG) attack and the secret-keys-recovery attack. We also give performance analysis of the proposed scheme and prove it to be selectively secure under the decisional bilinear Diffie-Hellman (DBDH) assumption, the hash Diffie-Hellman (HDH) assumption and the bilinear Diffie-Hellman (BDH) assumption.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"30 1","pages":"332-342"},"PeriodicalIF":0.0,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85444855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms 零信任架构和其他端到端范式解决网络防御冲突
Pub Date : 2021-01-31 DOI: 10.5121/IJNSA.2021.13101
W. Simpson, K. Foltz
Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting activities such as exfiltration of data, theft of credentials, blocking of services and other nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets and this implies that the defensive suite either impersonates the requestor, or has access to the private cryptographic keysof the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly and no other entity has access to the content unless that content is provided to them. There are many new processes that require end-to-end encrypted communication, including distributed computing, endpoint architectures, and zero trust architectures and enterprise level security. In an end-to-end paradigm, the keys used for authentication, confidentiality, and integrity reside only with the endpoints. This paper examines a formulation that allows unbroken communication, while meeting the inspection and reporting requirements of a network defense. This work is part of a broader security architecture termed Enterprise Level Security (ELS)framework.
网络防御意味着一套全面的软件工具,以防止恶意实体进行诸如泄露数据、窃取凭证、阻止服务和其他恶意活动等活动。对于此时的大多数企业来说,这种防御建立在堡垒方法的明确概念之上。在将信息传递给预定目标之前,许多需求都是基于检查和报告的。这些检查需要对数据包进行解密,这意味着防御套件要么冒充请求者,要么访问作为通信目标的服务器的私有加密密钥。这与端到端范式相反,在端到端范式中,已知的良好实体可以直接通信,除非向它们提供内容,否则其他实体无法访问内容。有许多新流程需要端到端加密通信,包括分布式计算、端点体系结构、零信任体系结构和企业级安全性。在端到端范例中,用于身份验证、机密性和完整性的密钥仅存在于端点中。本文研究了一种允许不间断通信的公式,同时满足网络防御的检查和报告要求。这项工作是称为企业级安全(ELS)框架的更广泛的安全体系结构的一部分。
{"title":"Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms","authors":"W. Simpson, K. Foltz","doi":"10.5121/IJNSA.2021.13101","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13101","url":null,"abstract":"Network defense implies a comprehensive set of software tools to preclude malicious entities from conducting activities such as exfiltration of data, theft of credentials, blocking of services and other nefarious activities. For most enterprises at this time, that defense builds upon a clear concept of the fortress approach. Many of the requirements are based on inspection and reporting prior to delivery of the communication to the intended target. These inspections require decryption of packets and this implies that the defensive suite either impersonates the requestor, or has access to the private cryptographic keysof the servers that are the target of communication. This is in contrast to an end-to-end paradigm where known good entities can communicate directly and no other entity has access to the content unless that content is provided to them. There are many new processes that require end-to-end encrypted communication, including distributed computing, endpoint architectures, and zero trust architectures and enterprise level security. In an end-to-end paradigm, the keys used for authentication, confidentiality, and integrity reside only with the endpoints. This paper examines a formulation that allows unbroken communication, while meeting the inspection and reporting requirements of a network defense. This work is part of a broader security architecture termed Enterprise Level Security (ELS)framework.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74581857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys 使用个人用户密钥击败对加密货币交换帐户的MITM攻击
Pub Date : 2021-01-31 DOI: 10.5121/IJNSA.2021.13104
Cheman Shaik
Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks on cryptocurrency exchange accounts. In this scheme, a separate public and private key pair is assigned to every account and the public key is shifted either forward or backward on the elliptic curve by a difference of the account user’s password. When a user logs into his account, the server sends the shifted public key of his account. The user computes the actual public key of his account by reverse shifting the shifted public key exactly by a difference of his password. Alternatively, shifting can be applied to the user’s generator instead of the public key. Described in detail is as to how aman-in-the-middle attack takes place and how the proposed scheme defeats the attack. Provided detailed security analysis in both the cases of publickey shifting and generator shifting. Further, compared the effectiveness of another three authentication schemes in defending passwords against MITM attacks.
本文提出了一种基于椭圆曲线密码学的用户特定密钥方案,该方案可以挫败对加密货币交换账户的中间人攻击。在该方案中,为每个帐户分配一个单独的公钥和私钥对,并通过帐户用户密码的差异在椭圆曲线上向前或向后移动公钥。当用户登录到他的帐户时,服务器发送他的帐户的移位公钥。用户通过将已移位的公钥通过其密码的差异进行反向移动来计算其帐户的实际公钥。或者,可以将移动应用于用户的生成器,而不是公钥。详细描述了中间人攻击是如何发生的以及所提出的方案是如何击败攻击的。对公钥移动和生成器移动两种情况进行了详细的安全性分析。进一步,比较了另外三种身份验证方案对密码防御MITM攻击的有效性。
{"title":"Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys","authors":"Cheman Shaik","doi":"10.5121/IJNSA.2021.13104","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13104","url":null,"abstract":"Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks on cryptocurrency exchange accounts. In this scheme, a separate public and private key pair is assigned to every account and the public key is shifted either forward or backward on the elliptic curve by a difference of the account user’s password. When a user logs into his account, the server sends the shifted public key of his account. The user computes the actual public key of his account by reverse shifting the shifted public key exactly by a difference of his password. Alternatively, shifting can be applied to the user’s generator instead of the public key. Described in detail is as to how aman-in-the-middle attack takes place and how the proposed scheme defeats the attack. Provided detailed security analysis in both the cases of publickey shifting and generator shifting. Further, compared the effectiveness of another three authentication schemes in defending passwords against MITM attacks.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"106 1","pages":"51-64"},"PeriodicalIF":0.0,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79562525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset 基于UNSW-NB15数据集的入侵检测特征选择机器学习算法分析
Pub Date : 2021-01-27 DOI: 10.5121/IJNSA.2021.13102
Geeta Kocher, G. Kumar
In recent times, various machine learning classifiers are used to improve network intrusion detection. The researchers have proposed many solutions for intrusion detection in the literature. The machine learning classifiers are trained on older datasets for intrusion detection, which limits their detection accuracy. So, there is a need to train the machine learning classifiers on the latest dataset. In this paper, UNSW-NB15, the latest dataset is used to train machine learning classifiers. The selected classifiers such as K-Nearest Neighbors (KNN), Stochastic Gradient Descent (SGD), Random Forest (RF), Logistic Regression (LR), and Naïve Bayes (NB) classifiers are used for training from the taxonomy of classifiers based on lazy and eager learners. In this paper, Chi-Square, a filter-based feature selection technique, is applied to the UNSW-NB15 dataset to reduce the irrelevant and redundant features. The performance of classifiers is measured in terms of Accuracy, Mean Squared Error (MSE), Precision, Recall, F1-Score, True Positive Rate (TPR) and False Positive Rate (FPR) with or without feature selection technique and comparative analysis of these machine learning classifiers is carried out.
近年来,各种机器学习分类器被用于改进网络入侵检测。研究人员在文献中提出了许多入侵检测的解决方案。机器学习分类器是在旧的入侵检测数据集上训练的,这限制了它们的检测精度。因此,有必要在最新的数据集上训练机器学习分类器。本文使用最新数据集UNSW-NB15来训练机器学习分类器。选择的分类器,如k近邻(KNN)、随机梯度下降(SGD)、随机森林(RF)、逻辑回归(LR)和Naïve贝叶斯(NB)分类器,用于基于懒惰和渴望学习者的分类器分类训练。本文将基于滤波器的特征选择技术卡方技术应用于UNSW-NB15数据集,以减少不相关和冗余的特征。通过使用或不使用特征选择技术来衡量分类器的准确性、均方误差(MSE)、精度、召回率、F1-Score、真阳性率(TPR)和假阳性率(FPR),并对这些机器学习分类器进行比较分析。
{"title":"Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset","authors":"Geeta Kocher, G. Kumar","doi":"10.5121/IJNSA.2021.13102","DOIUrl":"https://doi.org/10.5121/IJNSA.2021.13102","url":null,"abstract":"In recent times, various machine learning classifiers are used to improve network intrusion detection. The researchers have proposed many solutions for intrusion detection in the literature. The machine learning classifiers are trained on older datasets for intrusion detection, which limits their detection accuracy. So, there is a need to train the machine learning classifiers on the latest dataset. In this paper, UNSW-NB15, the latest dataset is used to train machine learning classifiers. The selected classifiers such as K-Nearest Neighbors (KNN), Stochastic Gradient Descent (SGD), Random Forest (RF), Logistic Regression (LR), and Naïve Bayes (NB) classifiers are used for training from the taxonomy of classifiers based on lazy and eager learners. In this paper, Chi-Square, a filter-based feature selection technique, is applied to the UNSW-NB15 dataset to reduce the irrelevant and redundant features. The performance of classifiers is measured in terms of Accuracy, Mean Squared Error (MSE), Precision, Recall, F1-Score, True Positive Rate (TPR) and False Positive Rate (FPR) with or without feature selection technique and comparative analysis of these machine learning classifiers is carried out.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82777123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Applying Permutations and Cuckoo Search for Obtaining a New Steganography Approach in Spatial Domain 应用排列和布谷鸟搜索获得空间域隐写新方法
Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).09
Dieaa I. Nassr, Sohier M. Khamis
Video Steganography is an art and science of embedding secret information into a carrying video file in such a way that others cannot observe the embedded information. Cuckoo Search (CS) is a meta-heuristic algorithm which has been developed by Xin-She Yang and Suash Deb in 2009. CS is very effective in solving many optimization problems that have been found in previous literature. In this paper, a new efficient approach for embedding a secret image in a digital video is proposed. Generally, any colored image consists of three color components (Red, Green, and Blue). So, an image's pixel has three bytes; each of which belongs to one different color component. For security purposes, each secret image's color component is embedded separately into a selected cover video's frame. The proposed approach is based on the permutations on 3 sections of a secret byte, 3-3-2 bits. These three sections are permuted to obtain five different patterns of a specified secret byte. Then, the population of five different pairs is built; each pair consists of one different pattern repeated twice. Good pixels are so chosen via using CS algorithm to achieve the minimum distortion in carrier pixels due to embedding. The sum of absolute values of sectional differences is used as an objective function to compare all the distances between the 3-3-2 Least Significant Bit (LSB) values of a cover frame's pixel and the generated different patterns of a specified secret byte. Experimental results show that the efficiency of the suggested approach is successful since the Peak Signal to Noise Ratio (PSNR) is above 52 decibels.
视频隐写术是一门将秘密信息嵌入到视频文件中,使他人无法观察到嵌入信息的艺术和科学。布谷鸟搜索(Cuckoo Search, CS)是由杨新社和Suash Deb于2009年提出的一种元启发式算法。CS在解决前人文献中发现的许多优化问题方面非常有效。本文提出了一种在数字视频中嵌入秘密图像的有效方法。通常,任何彩色图像都由三种颜色组成(红、绿、蓝)。一个图像的像素有三个字节;每一个都属于一个不同的颜色成分。为了安全起见,每个秘密图像的颜色组件分别嵌入到选定的封面视频帧中。所提出的方法是基于一个秘密字节的3个部分的排列,即3-3-2位。将这三个部分进行排列,以获得指定秘密字节的五种不同模式。然后,建立五对不同的种群;每对由一种重复两次的不同图案组成。利用CS算法选择好的像素,使载波像素由于嵌入而产生的畸变最小。以截面差绝对值之和作为目标函数,比较覆盖帧像素的3-3-2最小有效位(Least Significant Bit, LSB)值与生成的指定秘密字节的不同模式之间的所有距离。实验结果表明,该方法的峰值信噪比(PSNR)在52分贝以上,是有效的。
{"title":"Applying Permutations and Cuckoo Search for Obtaining a New Steganography Approach in Spatial Domain","authors":"Dieaa I. Nassr, Sohier M. Khamis","doi":"10.6633/IJNS.202101_23(1).09","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).09","url":null,"abstract":"Video Steganography is an art and science of embedding secret information into a carrying video file in such a way that others cannot observe the embedded information. Cuckoo Search (CS) is a meta-heuristic algorithm which has been developed by Xin-She Yang and Suash Deb in 2009. CS is very effective in solving many optimization problems that have been found in previous literature. In this paper, a new efficient approach for embedding a secret image in a digital video is proposed. Generally, any colored image consists of three color components (Red, Green, and Blue). So, an image's pixel has three bytes; each of which belongs to one different color component. For security purposes, each secret image's color component is embedded separately into a selected cover video's frame. The proposed approach is based on the permutations on 3 sections of a secret byte, 3-3-2 bits. These three sections are permuted to obtain five different patterns of a specified secret byte. Then, the population of five different pairs is built; each pair consists of one different pattern repeated twice. Good pixels are so chosen via using CS algorithm to achieve the minimum distortion in carrier pixels due to embedding. The sum of absolute values of sectional differences is used as an objective function to compare all the distances between the 3-3-2 Least Significant Bit (LSB) values of a cover frame's pixel and the generated different patterns of a specified secret byte. Experimental results show that the efficiency of the suggested approach is successful since the Peak Signal to Noise Ratio (PSNR) is above 52 decibels.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"1 1","pages":"67-76"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81429373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Sensitive-Information Hiding Treatment in Quick-Response Codes Based on Error-Correcting Framework 基于纠错框架的快速响应码敏感信息隐藏处理
Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).03
Mingwu Zhang, Xiao Chen, Yong Ding, Hua Shen
Quick Responding codes, namely QR codes, are widely used in various communication applications and electronic transactions such as electronic payments and information integrations, since they provide excellent characteristics such as large data capacity, widely coding domain, and stronger error correction ability etc. However, as the QR code is transmitted on public channel and can be scanned by any QR reader, one can obtain the data from the encoded QR code. Simultaneously, the encoding and decoding algorithms are public, the sensitive data such as paying account and password will be revealed to the QR reader, which might incubate the risk of privacy leakage. For solving this problem, this paper proposes a novel approach to protect the private data in QR code. In our method, the secret information is embedded in the random position of a QR code matrix by utilizing an error-correcting mechanism, and only authorized user in possession of required keys will be able to retrieve and recover this secret data embedded and hidden in the QR code. The user without the secret key can only decode public information from the QR code. Although our hiding scheme will decrease the rate of error-correctness of QR decoding, we indicate that the analysis shows that scheme is effect om practical applications. Compared with related schemes, the proposed scheme provides higher security that is less likely to attract the attention of potential attackers.
快速响应码即二维码,由于其具有数据容量大、编码域广、纠错能力强等优良特点,被广泛应用于电子支付、信息集成等各种通信应用和电子交易中。然而,由于QR码是在公共通道上传输的,并且可以被任何QR阅读器扫描,因此人们可以从编码的QR码中获取数据。同时,编码和解码算法是公开的,支付账号、密码等敏感数据将被泄露给QR阅读器,这可能会孕育隐私泄露的风险。为了解决这一问题,本文提出了一种新的QR码私有数据保护方法。在我们的方法中,秘密信息通过纠错机制嵌入到QR码矩阵的随机位置,只有拥有所需密钥的授权用户才能检索和恢复嵌入和隐藏在QR码中的秘密数据。没有密钥的用户只能从QR码中解码公共信息。虽然我们的隐藏方案会降低QR码解码的错误率,但分析表明该方案在实际应用中是有效的。与相关方案相比,该方案具有更高的安全性,不易引起潜在攻击者的注意。
{"title":"A Sensitive-Information Hiding Treatment in Quick-Response Codes Based on Error-Correcting Framework","authors":"Mingwu Zhang, Xiao Chen, Yong Ding, Hua Shen","doi":"10.6633/IJNS.202101_23(1).03","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).03","url":null,"abstract":"Quick Responding codes, namely QR codes, are widely used in various communication applications and electronic transactions such as electronic payments and information integrations, since they provide excellent characteristics such as large data capacity, widely coding domain, and stronger error correction ability etc. However, as the QR code is transmitted on public channel and can be scanned by any QR reader, one can obtain the data from the encoded QR code. Simultaneously, the encoding and decoding algorithms are public, the sensitive data such as paying account and password will be revealed to the QR reader, which might incubate the risk of privacy leakage. For solving this problem, this paper proposes a novel approach to protect the private data in QR code. In our method, the secret information is embedded in the random position of a QR code matrix by utilizing an error-correcting mechanism, and only authorized user in possession of required keys will be able to retrieve and recover this secret data embedded and hidden in the QR code. The user without the secret key can only decode public information from the QR code. Although our hiding scheme will decrease the rate of error-correctness of QR decoding, we indicate that the analysis shows that scheme is effect om practical applications. Compared with related schemes, the proposed scheme provides higher security that is less likely to attract the attention of potential attackers.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"22 1","pages":"14-21"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76804028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Looking to the future of the cyber security landscape 展望网络安全的未来
Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00029-5
Rashid Ali
{"title":"Looking to the future of the cyber security landscape","authors":"Rashid Ali","doi":"10.1016/S1353-4858(21)00029-5","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00029-5","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"4 1","pages":"8-10"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85745343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigating cyber attacks using domain and DNS data 利用域名和DNS数据调查网络攻击
Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00028-3
Chad Anderson, John 'Turbo' Conwell, Tarik Saleh
{"title":"Investigating cyber attacks using domain and DNS data","authors":"Chad Anderson, John 'Turbo' Conwell, Tarik Saleh","doi":"10.1016/S1353-4858(21)00028-3","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00028-3","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"8 1","pages":"6-8"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73593005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Lightweight User Authentication Scheme Based on Fuzzy Extraction Technology for Wireless Sensor Networks 基于模糊提取技术的无线传感器网络轻量级用户认证方案
Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).18
Rui-Hong Dong, Bu-Bu Ren, Qiu-yu Zhang, Hui Yuan
In order to improve the balanced relationships among security, privacy and design overhead for existing wireless sensor networks (WSNs) user authentication scheme, a lightweight user authentication scheme based on fuzzy extraction technology for WSNs. The present scheme combined with biometric fuzzy extraction technology and hash function to generate biometric key, which eliminates the user password factor in the existing authentication schemes. In addition, the proposed scheme can complete mutual authentication and session key agreement between legitimate users and sensor nodes only by using xor, hash and other operations with the lower computation overhead. And the heuristic security analysis, BAN logic model and random oracle model are used for security verification and performance analysis of the current scheme. The results of analysis and verification show that our scheme achieves more security and functional features, and keeps computational efficiency. Compared with other related works, our scheme is more suitable for practical application.
为了改善现有无线传感器网络用户认证方案在安全性、隐私性和设计开销之间的平衡关系,提出了一种基于模糊提取技术的轻量级无线传感器网络用户认证方案。该方案结合生物特征模糊提取技术和哈希函数生成生物特征密钥,消除了现有认证方案中存在的用户密码因素。此外,该方案仅通过xor、hash等操作即可完成合法用户与传感器节点之间的相互认证和会话密钥协议,且计算开销较低。采用启发式安全分析、BAN逻辑模型和随机oracle模型对当前方案进行安全验证和性能分析。分析和验证结果表明,该方案在保证计算效率的前提下,实现了更高的安全性和功能特性。与其他相关工作相比,我们的方案更适合实际应用。
{"title":"A Lightweight User Authentication Scheme Based on Fuzzy Extraction Technology for Wireless Sensor Networks","authors":"Rui-Hong Dong, Bu-Bu Ren, Qiu-yu Zhang, Hui Yuan","doi":"10.6633/IJNS.202101_23(1).18","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).18","url":null,"abstract":"In order to improve the balanced relationships among security, privacy and design overhead for existing wireless sensor networks (WSNs) user authentication scheme, a lightweight user authentication scheme based on fuzzy extraction technology for WSNs. The present scheme combined with biometric fuzzy extraction technology and hash function to generate biometric key, which eliminates the user password factor in the existing authentication schemes. In addition, the proposed scheme can complete mutual authentication and session key agreement between legitimate users and sensor nodes only by using xor, hash and other operations with the lower computation overhead. And the heuristic security analysis, BAN logic model and random oracle model are used for security verification and performance analysis of the current scheme. The results of analysis and verification show that our scheme achieves more security and functional features, and keeps computational efficiency. Compared with other related works, our scheme is more suitable for practical application.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"14 1","pages":"157-171"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86887092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning from the past 从过去吸取教训
Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00031-3
K. Renaud
{"title":"Learning from the past","authors":"K. Renaud","doi":"10.1016/S1353-4858(21)00031-3","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00031-3","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"19 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79084076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1