Palak Bagga , Ashok Kumar Das , Joel J.P.C. Rodrigues
{"title":"Bilinear pairing-based access control and key agreement scheme for smart transportation","authors":"Palak Bagga , Ashok Kumar Das , Joel J.P.C. Rodrigues","doi":"10.1016/j.csa.2022.100001","DOIUrl":"https://doi.org/10.1016/j.csa.2022.100001","url":null,"abstract":"<div><p>Internet of Vehicles (IoV) enabled Intelligent Transportation System (ITS) allows smart vehicles to communicate with other vehicles on road, humans (customers or pedestrians), infrastructure (parking areas, traffic lights etc), Internet, Cloud etc. The vehicles communicate with other entities over wireless open channels directly or indirectly through messages or beacons. Open channel allows various attacks, like replay, man-in-the-middle, impersonation, fabrication etc., during communication. Also, malicious vehicles can be deployed in the network to misuse or have an unauthorized access to the services. To mitigate these issues, we propose a new remote access control scheme that ensures the secure communication among the vehicles. The vehicles are dynamic in nature in an IoV paradigm, that is, they are not under fixed domains. Therefore, whenever a vehicle changes its location it has to register to the nearest trusted authority (<span><math><mrow><mi>T</mi><mi>A</mi></mrow></math></span>) in offline or secured channel mode. To make it applicable, we propose <em>remote registration</em> of the vehicles via the <span><math><mrow><mi>T</mi><mi>A</mi></mrow></math></span>. Access control mechanism occurs in two phases: 1) node authentication phase, where vehicles are remotely authenticated by <span><math><mrow><mi>T</mi><mi>A</mi></mrow></math></span> and 2) key agreement phase, where after successful mutual authentication they compute a session key by using cryptographic techniques and pre-loaded information. The computed secret session keys are used for ensuring secure communications in future between two vehicles in a cluster as well. Informal security analysis along with formal security verification using the broadly-used Automated Validation of Internet Security Protocols and Applications (AVISPA) show that our access control scheme is secured against various potential attacks. We also show the competency of our scheme by comparing it with other existing schemes in terms of computation and communication costs.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"1 ","pages":"Article 100001"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient IoT group association and data sharing mechanism in edge computing paradigm","authors":"Haowen Tan","doi":"10.1016/j.csa.2022.100003","DOIUrl":"https://doi.org/10.1016/j.csa.2022.100003","url":null,"abstract":"<div><p>Despite its benefits and promising future, security and privacy challenges for the IoT wireless communication of edge computing environment remain unaddressed. As a result, proper authentication mechanisms are critical, especially in the extreme scenario where some edge facilities are not functional. For the above consideration, in this paper we develop an efficient IoT group association and updating mechanism in edge computing paradigm. The proposed scheme can provide data transmission and communication guarantees for special practical scenarios. The group key updating process in our architecture only necessitates minor changes on the EI side, whereas the decryption information of some IoT devices remains constant if the devices have not been revoked. The proposed strategy can accomplish the desired security features, according to the security analysis.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"1 ","pages":"Article 100003"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review","authors":"Syed Amma Sheik, Amutha Prabakar Muniyandi","doi":"10.1016/j.csa.2022.100002","DOIUrl":"https://doi.org/10.1016/j.csa.2022.100002","url":null,"abstract":"<div><p>The fast growth of the cloud computing technology has led to immense development in the public and private sectors. Cloud computing provides a high level of virtualization, massive scalability, multitenancy and elasticity. This has enabled organizations, academia, government departments and the public to move forward with this technology. However, they are unable to assuredly place their information over the clouds due to many security threats. Cloud security plays a vital role to establish a confidence between the cloud service providers, consumers and the multi-users to maintain the security levels of their data. This paper focuses the survey for cloud security issues, existing authentication schemes, data storage technologies and offers a glimpse of Artificial Neural Networks (ANNs) applied to the cloud security.</p></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"1 ","pages":"Article 100002"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Herausforderung Verteidigung im Cyber- und Informationsraum","authors":"Generalmajor Jürgen Jakob Setzer","doi":"10.5771/9783828874015-27","DOIUrl":"https://doi.org/10.5771/9783828874015-27","url":null,"abstract":"Ich möchte Ihnen heute vorstellen, wie sich die Bundeswehr mit dem neuen Organisationsbereich Cyberund Informationsraum (OrgBer CIR) auf die Bedrohungen in diesem Raum aufstellt. Ohne Digitalisierung sind weder unsere Gesellschaft noch wir als Einzelne heutzutage in gewisser Weise lebensfähig. Digitale Entwicklungen bestimmen unser Leben nachhaltig und in immer kürzeren Rhythmen. Auch die Bundeswehr profitiert von der zunehmenden Digitalisierung.","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"306 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75669067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber-Reserve. So hilft die RAG Cyber bei der Suche nach IT-Experten","authors":"Benjamin Vorhölter","doi":"10.5771/9783828874015-107","DOIUrl":"https://doi.org/10.5771/9783828874015-107","url":null,"abstract":"","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85672209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}