Cyber Security and Applications最新文献

筛选
英文 中文
Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models 使用无监督和有监督深度学习模型的基于联合学习的物联网入侵检测系统
Cyber Security and Applications Pub Date : 2024-08-03 DOI: 10.1016/j.csa.2024.100068
Babatunde Olanrewaju-George , Bernardi Pranggono
{"title":"Federated learning-based intrusion detection system for the internet of things using unsupervised and supervised deep learning models","authors":"Babatunde Olanrewaju-George ,&nbsp;Bernardi Pranggono","doi":"10.1016/j.csa.2024.100068","DOIUrl":"10.1016/j.csa.2024.100068","url":null,"abstract":"<div><p>The adoption of the Internet of Things (IoT) in our technology-driven society is hindered by security and data privacy challenges. To address these issues, Artificial Intelligence (AI) techniques such as Machine Learning (ML) and Deep Learning (DL) can be applied to build Intrusion Detection Systems (IDS) that help securing IoT networks. Federated Learning (FL) is a decentralized approach that can enhance performance and privacy of the data by training IDS on individual connected devices. This study proposes the use of unsupervised and supervised DL models trained via FL to develop IDS for IoT devices. The performance of FL-trained models is compared to models trained via non-FL using the N-BaIoT dataset of nine IoT devices. To improve the accuracy of DL models, a randomized search hyperparameter optimization is performed. Various performance metrics are used to evaluate the prediction results. The results indicate that the unsupervised AutoEncoder (AE) model trained via FL is the best overall in terms of all metrics, based on testing both FL and non-FL trained models on all nine IoT devices.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100068"},"PeriodicalIF":0.0,"publicationDate":"2024-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000341/pdfft?md5=48d2bf0e58e547f6db91e198b3e50c2e&pid=1-s2.0-S2772918424000341-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment EMAKAS:适用于物联网环境的高效三因素相互认证和密钥协议方案
Cyber Security and Applications Pub Date : 2024-08-02 DOI: 10.1016/j.csa.2024.100066
Tinashe Magara , Yousheng Zhou
{"title":"EMAKAS: An efficient three-factor mutual authentication and key-agreement scheme for IoT environment","authors":"Tinashe Magara ,&nbsp;Yousheng Zhou","doi":"10.1016/j.csa.2024.100066","DOIUrl":"10.1016/j.csa.2024.100066","url":null,"abstract":"<div><p>The adoption of IoT in healthcare revolutionizes remote patient monitoring and healthcare efficiency. Yet, it brings notable security and privacy challenges, particularly in resource-constrained environment. We propose a secure and efficient three-factor lightweight mutual authentication and key agreement scheme, designed for IoT-based smart healthcare systems, addressing these critical concerns. The scheme employs a fuzzy extractor, a one-way hash function, Elliptic Curve Discrete Logarithm and XOR operations for efficient cryptographic transformations, creating a robust framework for secure data handling. The scheme's design focuses on security and privacy while minimizing computational demands, making it ideal for resource-constrained IoT devices. We utilized both informal and formal security analyses to validate our scheme, employing the Random Oracle Model (ROM), Scyther tool and Burrows-Abadi-Needham (BAN) logic. The security and performance analysis showed that our scheme offers more security features across 15 defined criteria with minimal communication and computational costs compared to other related schemes. The scheme is not only robust against security threats but also practical for implementation in IoT healthcare environment, offering a solution for secure IoT communication by achieving mutual authentication and key agreement with minimized computational requirements.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100066"},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000328/pdfft?md5=d75e8e032da3467ecc69f9f1bed90b00&pid=1-s2.0-S2772918424000328-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141953401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management 确保工业 4.0 的安全:评估网络安全挑战并提出制造业管理战略
Cyber Security and Applications Pub Date : 2024-07-29 DOI: 10.1016/j.csa.2024.100067
Adel Alqudhaibi , Majed Albarrak , Sandeep Jagtap , Nikki Williams , Konstantinos Salonitis
{"title":"Securing industry 4.0: Assessing cybersecurity challenges and proposing strategies for manufacturing management","authors":"Adel Alqudhaibi ,&nbsp;Majed Albarrak ,&nbsp;Sandeep Jagtap ,&nbsp;Nikki Williams ,&nbsp;Konstantinos Salonitis","doi":"10.1016/j.csa.2024.100067","DOIUrl":"10.1016/j.csa.2024.100067","url":null,"abstract":"<div><p>Industry 4.0 represents the foundation of the fourth industrial revolution, characterised by the integration of innovative technology into the manufacturing process. This integration enhances automation, diagnostics, data analysis, and autonomous decision-making through the networking of equipment and machinery. However, the increased reliance on technology raises concerns about the implementation and maintenance of cybersecurity. This paper aims to address cybersecurity challenges in the manufacturing industry and suggest strategies to reduce risks. In particular, it examines the level of awareness and understanding of cybersecurity issues among manufacturing employees, establishes accountability for cyberattacks, and evaluates the effectiveness of existing industry practices. The current cybersecurity landscape in the manufacturing industry was thoroughly analysed. Data were gathered through surveys, interviews, and case studies to measure awareness, identify knowledge gaps, and assess existing practices. The research findings indicate a significant knowledge gap regarding cybersecurity among manufacturing employees. This vulnerability can be attributed to the lack of funding and training, especially compared to the resources provided to information technology departments and corporate employees. The study emphasises the importance of redirecting cybersecurity resources and protocols towards the manufacturing industry. This paper puts forward a series of recommendations to mitigate risks and safeguard the manufacturing industry.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100067"},"PeriodicalIF":0.0,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S277291842400033X/pdfft?md5=f6386e2daf26b1845c9939c005c7a936&pid=1-s2.0-S277291842400033X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141961237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on scalable consensus algorithms for blockchain technology 区块链技术可扩展共识算法概览
Cyber Security and Applications Pub Date : 2024-07-08 DOI: 10.1016/j.csa.2024.100065
Ankit Kumar Jain , Nishant Gupta , Brij B. Gupta
{"title":"A survey on scalable consensus algorithms for blockchain technology","authors":"Ankit Kumar Jain ,&nbsp;Nishant Gupta ,&nbsp;Brij B. Gupta","doi":"10.1016/j.csa.2024.100065","DOIUrl":"10.1016/j.csa.2024.100065","url":null,"abstract":"<div><p>The process of reaching an agreement on a value within a distributed network, known as a consensus problem, is a defining feature of blockchain. This consensus problem can be seen in various applications like load balancing, transaction validation in blockchain, and distributed computing. In recent years, many researchers have provided solutions to this problem. Hence we have presented a survey in which we delved into blockchain consensus algorithms and conducted a comparative analysis of all the consensus algorithms to provide information about each protocol’s advantages and drawbacks. This survey starts with the standard proof-of-work consensus protocol applied in bitcoin cryptocurrency and its limitations on the ground of the following parameters: throughput (transactions per second), latency, forks, fault tolerance, double spending attacks, and power consumption. The rest of the consensus algorithms in this paper have been systematically covered to address the limitations of proof-of-work. This paper also covered Raft and PBFT consensus algorithms suitable for permissioned networks. Although the PBFT consensus protocol has a high throughput and a low latency, it has limited node scalability. The PBFT has a low byzantine fault tolerant rate. This paper also covers PoEWAL for blockchain-based IoT applications and WBFT, which prevents corrupt nodes from taking part in consensus. A comparative analysis of the consensus algorithms provides an explicit knowledge of the present research, which also offers guidance for future study.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100065"},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000316/pdfft?md5=3bf0696549ef3be318eef483a00ad2e8&pid=1-s2.0-S2772918424000316-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141699980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies 基于区块链和 Web3 技术的分布式可信数字孪生平台
Cyber Security and Applications Pub Date : 2024-07-05 DOI: 10.1016/j.csa.2024.100064
Seyed Mojtaba Hosseini Bamakan , Saeed Banaeian Far
{"title":"Distributed and trustworthy digital twin platform based on blockchain and Web3 technologies","authors":"Seyed Mojtaba Hosseini Bamakan ,&nbsp;Saeed Banaeian Far","doi":"10.1016/j.csa.2024.100064","DOIUrl":"10.1016/j.csa.2024.100064","url":null,"abstract":"<div><p>The fourth industrial revolution has significantly increased the adoption of Digital Twins (DTs) across various sectors, including intelligent manufacturing, automation, logistics, and medical analysis. Despite substantial progress in deploying DT projects, numerous challenges remain, such as managing distributed data flows, protecting commercial confidentiality, securing intellectual property, and ensuring privacy and security. This research introduces a novel approach to addressing these challenges by leveraging blockchain and Web3 technologies, including non-fungible tokens (NFTs) and Distributed Autonomous Organizations (DAOs). The study aims to develop a distributed, tamper-proof DT cooperation platform that facilitates traceable and trustworthy data sharing while preserving intellectual property rights and enabling decentralized governance. This platform enhances idea and invention ownership, promotes collective decision-making through consensus protocols, and explores innovative solutions like blockchain-based federated learning and efficient DT project fundraising tools. Relying on security models and analysis tools, this study addresses several important security analysis methods/tools/models (e.g., random oracle model, BAN logic, AVISPA tool, and TAMARIN prover) that are known as practical analysis methods. They can strongly prove every claimed security feature of DT projects. The proposed solutions set the stage for future academic and industrial advancements, supported by a comprehensive SWOT (Strongness - Weakness - Opportunity - Threat) analysis, and outline potential future research directions.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100064"},"PeriodicalIF":0.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000304/pdfft?md5=5d1abd83937572d1a33c3217975ca8a0&pid=1-s2.0-S2772918424000304-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach for handling missing data to enhance network intrusion detection system 处理缺失数据以增强网络入侵检测系统的新方法
Cyber Security and Applications Pub Date : 2024-07-01 DOI: 10.1016/j.csa.2024.100063
Mahjabeen Tahir , Azizol Abdullah , Nur Izura Udzir , Khairul Azhar Kasmiran
{"title":"A novel approach for handling missing data to enhance network intrusion detection system","authors":"Mahjabeen Tahir ,&nbsp;Azizol Abdullah ,&nbsp;Nur Izura Udzir ,&nbsp;Khairul Azhar Kasmiran","doi":"10.1016/j.csa.2024.100063","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100063","url":null,"abstract":"<div><p>Managing missing data is a critical challenge in Intrusion Detection System (IDS) datasets, significantly affecting the performance of deep learning models. To address this issue, we introduce DeepLearning_Based_MissingData_Imputation (DMDI), a novel method designed to enhance the quality of input data by efficiently handling missing values. Our approach employs the Random Missing Value (RMV) algorithm to simulate missing data, enabling thorough testing and comparison of various imputation techniques. The DMDI method integrates a stacked denoising autoencoder with Gradient Boosting to improve imputation accuracy. We evaluated the effectiveness of our approach through three experimental phases: generating missing data, imputing missing values, and assessing imputation models. Using the NSL-KDD and UNSW-NB15 datasets, our results demonstrate significant improvements in the performance of five different classifiers (SVM, KNN, Logistic Regression, Decision Tree, and Random Forest) after imputation. On average, our method achieved accuracy improvements ranging from 0.95 to 0.97 across these classifiers compared to baseline imputation methods. Detailed analysis using Python 3 validates our findings, demonstrating enhanced model performance and robustness. This study underscores the necessity of precise missing data imputation for enhancing deep learning tasks, particularly in anomaly detection systems. It provides a reliable solution for managing missing data in IDS datasets.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100063"},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000298/pdfft?md5=09e2857fa1c1aad5fc434b6f9663038b&pid=1-s2.0-S2772918424000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved three factor authentication protocol for wireless body area networks 无线体域网络的改进型三因素身份验证协议
Cyber Security and Applications Pub Date : 2024-06-18 DOI: 10.1016/j.csa.2024.100062
Muthukumar Manickam, Ganesh Gopal Devarajan
{"title":"An improved three factor authentication protocol for wireless body area networks","authors":"Muthukumar Manickam,&nbsp;Ganesh Gopal Devarajan","doi":"10.1016/j.csa.2024.100062","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100062","url":null,"abstract":"<div><p>Wireless Body Area Networks (WBAN) is a concrete solution for the healthcare system, and it is paramount to ensure the sensed data by the WBAN sensors is secure against vulnerable threats and inaccessible by unauthorized entities. In light of this, highly robust authentication schemes and solutions are essential for the successful adoption of WBANs. To this end, a plethora of secure authentication solutions have been recommended by investigators over the past few decades. However, the absence of cohesive research work in view of secure mutual authentication schemes does not light on the extensive purpose of offering a bird’s-eye solution to the domain. To address the security issues in the previous schemes, we approach them in the following manner: We reviewed the Ali et al. scheme, a recently proposed authentication scheme for wireless medical sensor networks for healthcare monitoring, asserting that their scheme can withstand various attacks. Despite this, we proved that their scheme still has significant security weaknesses and is vulnerable to various attacks through rigorous cryptanalysis. Afterward, we proposed our three-factor authentication scheme to overcome the vulnerable attacks found in the Ali et al. scheme. Thereafter, we performed an extensive informal and formal analysis using Burrows-Abadi-Needham (BAN) logic to verify the robustness of the proposed scheme. From the analysis, we proved that the proposed authentication scheme is able to withstand various attacks on WBAN. Finally, a critical performance evaluation is done on our scheme. From the results, we identified that our scheme is a robust and identical solution for feature-rich WBAN health-care applications.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100062"},"PeriodicalIF":0.0,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000286/pdfft?md5=34980754b64c7fd31c0726f0060f4be3&pid=1-s2.0-S2772918424000286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of techniques to detect common weaknesses in program binaries 程序二进制文件常见弱点检测技术调查
Cyber Security and Applications Pub Date : 2024-05-28 DOI: 10.1016/j.csa.2024.100061
Ashish Adhikari, Prasad Kulkarni
{"title":"Survey of techniques to detect common weaknesses in program binaries","authors":"Ashish Adhikari,&nbsp;Prasad Kulkarni","doi":"10.1016/j.csa.2024.100061","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100061","url":null,"abstract":"<div><p>Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy of end-users. Most end-user software is distributed as program binaries. Therefore, to increase trust in third-party software, researchers have built techniques and tools to detect and resolve different classes of coding weaknesses in binary software. Our work is motivated by the need to survey the state-of-the-art and understand the capabilities and challenges faced by binary-level techniques that were built to detect the most important coding weaknesses in software binaries. Therefore, in this paper, we first show the most critical coding weaknesses for compiled programming languages. We then survey, explore, and compare the <em>static</em> techniques that were developed to detect each such coding weakness in software binaries. Our other goal in this work is to discover and report the state of published open-source implementations of static binary-level security techniques. For the open-source frameworks that work as documented, we independently evaluate their effectiveness in detecting code vulnerabilities on a suite of program binaries. To our knowledge, this is the first work that surveys and independently evaluates the performance of state-of-the-art binary-level techniques to detect weaknesses in binary software.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100061"},"PeriodicalIF":0.0,"publicationDate":"2024-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000274/pdfft?md5=c9a8e0423e7058b2489659e2c1a52960&pid=1-s2.0-S2772918424000274-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141286033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for assessing the functional vulnerabilities criticality of CPS components 评估 CPS 组件功能脆弱性关键性的方法
Cyber Security and Applications Pub Date : 2024-04-30 DOI: 10.1016/j.csa.2024.100058
Rasim Alguliyev, Ramiz Aliguliyev, Lyudmila Sukhostat
{"title":"An approach for assessing the functional vulnerabilities criticality of CPS components","authors":"Rasim Alguliyev,&nbsp;Ramiz Aliguliyev,&nbsp;Lyudmila Sukhostat","doi":"10.1016/j.csa.2024.100058","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100058","url":null,"abstract":"<div><p>Timely identification of critical security flaws in a cyber-physical system makes identifying risks and potential threats possible. To address this issue, threat models are created to better understand potential vulnerabilities that must be considered to ensure system reliability. Selecting the optimal solution for assessing the functional vulnerabilities criticality of cyber-physical system components is a complex process since all vulnerabilities must be identified, classified, and quantified according to a unified approach as part of the cybersecurity process. An effective tool for cyber-physical systems analysis is the Bayesian attack graph. Each path in the graph represents a sequence of attacks that an attacker can use to achieve a specific goal, such as gaining access to sensitive data or controlling a system. This paper proposes a quantitative method for assessing the vulnerability criticality of cyber-physical system components based on the Promethee II multi-criteria decision-making method. It allows ranking and identification of the system's most vulnerable components. The proposed approach is evaluated using a threat model and three scenarios of cyberattacks on a cyber-physical system. Comparison with TOPSIS, VIKOR, and ELECTRE methods proves the effectiveness of the proposed approach. The proposed approach can help technical specialists make more reasoned decisions when ranking critical vulnerabilities of cyber-physical system components to provide security measures and prevent cyberattacks.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100058"},"PeriodicalIF":0.0,"publicationDate":"2024-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000249/pdfft?md5=537b81fa3158aaa50778331ccc27fb52&pid=1-s2.0-S2772918424000249-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140843839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers 通过快速、节能地实施 PRIDE 和 PRESENT 密码,确保物联网设备的安全
Cyber Security and Applications Pub Date : 2024-04-16 DOI: 10.1016/j.csa.2024.100055
Vijay Dahiphale , Hrishikesh Raut , Gaurav Bansod , Devendra Dahiphale
{"title":"Securing IoT devices with fast and energy efficient implementation of PRIDE and PRESENT ciphers","authors":"Vijay Dahiphale ,&nbsp;Hrishikesh Raut ,&nbsp;Gaurav Bansod ,&nbsp;Devendra Dahiphale","doi":"10.1016/j.csa.2024.100055","DOIUrl":"https://doi.org/10.1016/j.csa.2024.100055","url":null,"abstract":"<div><p>The rise of low-power, cost-efficient internet-connected devices has led to a need for lightweight cryptography. The lightweight block cipher PRIDE, designed by Martin R. Albrecht, is one of the most efficient ciphers designed for IoT-constrained environments. It is useful for connected devices, requires fewer resources to implement, and has high performance. PRIDE is a software-oriented lightweight cipher optimized for microcontrollers. This paper focuses on the FPGA implementation of the PRIDE cipher by keeping throughput, energy, and power consumption metrics focused. The paper also presents a novel and simpler diagrammatical view of a Matrix Layer implementation of the PRIDE cipher. We also implemented the PRESENT cipher using the same metrics. We analyzed different design metrics on Field Programmable Gate Arrays (FPGAs) and compared the metrics of the PRIDE implementation with the well-known cipher PRESENT. This gives us an insight into the efficiency and reliability of PRIDE in IoT-constrained environments. We also proposed different architectures of the PRIDE cipher for 16-bit and 32-bit datapaths.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100055"},"PeriodicalIF":0.0,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2772918424000213/pdfft?md5=df43871fa4d22608fccc2bf541243198&pid=1-s2.0-S2772918424000213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140645519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信