{"title":"An Anonymous Blockchain-Based Authentication Scheme for Secure Healthcare Applications","authors":"A. Rajasekaran, M. Azees","doi":"10.1155/2022/2793116","DOIUrl":"https://doi.org/10.1155/2022/2793116","url":null,"abstract":"Nowadays, continuous monitoring of a patient’s healthcare data has become a critical factor in human well-being. However, with the rapid advancement of wireless technology, doctors and healthcare professionals can monitor the patient’s healthcare data in real time. But to access the confidential patient’s data which is transferred through the open wireless medium, the secure transmission plays an important role. In this work, the privacy and the anonymity of the end-users (patient/doctor) are preserved using an anonymous blockchain-based authentication scheme. Moreover, in this work initially, mutual authentication is performed between the end-users, followed by encryption and decryption of confidential data. In addition, to avoid reauthentication of the patient again during the movement of a patient from one doctor to another, a transfer authentication protocol is performed between the doctors which enhances performance analysis. The security analysis section illustrates the withstanding capability of the proposed work against various vulnerable attacks. Finally, performance investigation of the proposed work reveals a reduction in computational and communication costs when compared to existing related works.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125976829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep-Learning-Based Motion Capture Technology in Film and Television Animation Production","authors":"Yating Wei","doi":"10.1155/2022/6040371","DOIUrl":"https://doi.org/10.1155/2022/6040371","url":null,"abstract":"With the popularity of King Kong, Pirates of the Caribbean 2, Avatar, and other films, the virtual characters in these films have become popular and well loved by audiences. The creation of these virtual characters is different from traditional 3D animation but is based on real character movements and expressions. An overview of several mainstream motion capture systems in the field of motion capture is presented, and the application of motion capture technology in film and animation is explained in detail. The current motion capture technology is mainly based on complex human markers and sensors, which are costly, while deep-learning-based human pose estimation is becoming a new option. However, most existing methods are based on a single person or picture estimation, and there are many challenges for video multiperson estimation. The experimental results show that a simple design of the human motion capture system is achieved.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124967814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Artificial Neural Network-Based Biomechanical Research on Elbow Injury of Tennis Serve","authors":"Jiaju Zhu, Meng Zhang","doi":"10.1155/2022/2725900","DOIUrl":"https://doi.org/10.1155/2022/2725900","url":null,"abstract":"Tennis is a sport with a large age span. Its technology is complex. Factors such as tennis racket and service position will affect the effect of players holding the ball, but often the service posture and strength will affect the players’ elbow tendon. Once the service posture is wrong or the strength is too strong, it will cause irreversible damage to players. Therefore, the study of artificial neural network training on tennis elbow injury is of great significance. Based on artificial neural network, this paper studies the biomechanics of elbow injury in tennis service. Firstly, this paper expounds the concept and characteristics of tennis service technology and studies the injury of tennis players’ elbow. Then this paper studies the artificial neural network technology and uses the experimental comparison method to test the force generated by the two groups of tennis players from different angles. The results show that, in the professional group, the forearm is in the internal rotation state before and after hitting the ball, while the beginner group is generally in the external rotation state. It can be inferred that, under the constant collision force, the reversal force absorbed by the beginner group in the swing process is greater than that of the professional group, which will increase the load of the supinator muscle on the antipronation, which will damage the supinator muscle, which is also one of the causes of the “tennis elbow” disease.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Yu, Gang Xu, Zhifei Wang, Na Zhang, Fengqi Wei
{"title":"A Hybrid Opportunistic IoT Secure Routing Strategy Based on Node Intimacy and Trust Value","authors":"Lin Yu, Gang Xu, Zhifei Wang, Na Zhang, Fengqi Wei","doi":"10.1155/2022/6343764","DOIUrl":"https://doi.org/10.1155/2022/6343764","url":null,"abstract":"Routing strategy is one of the most important researches in Opportunistic Internet of Things (IoT), and it highly influences the efficiency of data transmission. In this paper, a hybrid Opportunistic IoT secure routing strategy based on node intimacy and trust value (HIRouter) is proposed to resolve the problem of unbalanced transmission efficiency and security in the message delivery process. According to the records of node encounter and message forwarding, the strategy proposed in this paper can calculate nodes’ intimacy and trust value. The messages are then forwarded based on the intimacy and trust value between nodes. Experimental results verify that HIRouter algorithm we proposed can improve the message delivery rates and reduce the overhead rate in the Opportunistic IoT with dense nodes and frequent interactions between nodes.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qingyi Zhu, Pingfan Xiang, Xuhang Luo, Chenquan Gan
{"title":"Dynamical Behavior of Hybrid Propagation of Computer Viruses","authors":"Qingyi Zhu, Pingfan Xiang, Xuhang Luo, Chenquan Gan","doi":"10.1155/2022/2576685","DOIUrl":"https://doi.org/10.1155/2022/2576685","url":null,"abstract":"Considering the horizontal and vertical propagation of computer viruses over the Internet, this article proposes a hybrid susceptible-latent-breaking-recovered-susceptible (SLBRS) model. Through mathematical analysis of the model, two equilibria (virus-free and virose equilibria) and their global stabilities are both proved depending on the basic reproduction number \u0000 \u0000 \u0000 \u0000 R\u0000 \u0000 \u0000 0\u0000 \u0000 \u0000 \u0000 , which is affected by the vertical propagation of infected computers. Moreover, the feasibility of the obtained results is verified by numerical simulations. Finally, the dependence of \u0000 \u0000 \u0000 \u0000 R\u0000 \u0000 \u0000 0\u0000 \u0000 \u0000 \u0000 on system parameters and the parameters affecting the stability level of infected computers are both analyzed.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"190 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120863764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lattice-Based Self-Enhancement Authorized Accessible Privacy Authentication for Cyber-Physical Systems","authors":"Jinhui Liu, Yong Yu, Houzhen Wang, Huanguo Zhang","doi":"10.1155/2022/8995704","DOIUrl":"https://doi.org/10.1155/2022/8995704","url":null,"abstract":"Healthcare cyber-physical system significantly facilitates healthcare services and patient treatment effectiveness by analyzing patients’ health information data conveniently. Nevertheless, it also develops the threats to the confidentiality of health information, patients’ privacy, and decidability of medical disputes. And, with the advances of quantum computing technology, most existing anonymous authentication schemes are becoming a growing threat to traditional cryptosystems. To address these problems, for healthcare cyber-physical systems, we propose a new lattice-based self-enhancement authorized accessible privacy authentication scheme by using a strong designated verifier double-authentication-preventing signature technique, called SEAPA. The SEAPA achieves three security and privacy requirements including unforgeability, anonymity for patients’ information, and self-enhancement for patients themselves. A detailed security proof shows our proposal achieves those required security goals. Finally, our construction is demonstrated by parameter analysis and performance evaluation to have reasonable efficiency.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128894524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monitoring and Analysis of English Classroom Teaching Quality Based on Big Data","authors":"Zhang Xun","doi":"10.1155/2022/5365807","DOIUrl":"https://doi.org/10.1155/2022/5365807","url":null,"abstract":"In order to deal with the problems of low evaluation accuracy and long evaluation time in the traditional English classroom teaching quality monitoring and evaluation methods, this study proposes an English classroom teaching quality monitoring and evaluation method based on big data. According to the selection principle of English classroom teaching quality monitoring factors, this study analyzes the English classroom teaching quality monitoring factors, constructs the English classroom teaching quality monitoring index system, obtains the monitoring index data, filters and compresses the monitoring data, and takes the preprocessed English classroom teaching quality monitoring data as the evaluation index. This study uses the principal component analysis method to calculate the weight of the English classroom teaching quality evaluation index and constructs an English classroom teaching quality evaluation model. The simulation results show that the proposed method has high accuracy and short evaluation time.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132456760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Umar Aftab, A. Hamza, Ariyo Oluwasanmi, Xuyun Nie, M. Sarfraz, Danish Shehzad, Zhiguang Qin, Ammar Rafiq
{"title":"Traditional and Hybrid Access Control Models: A Detailed Survey","authors":"Muhammad Umar Aftab, A. Hamza, Ariyo Oluwasanmi, Xuyun Nie, M. Sarfraz, Danish Shehzad, Zhiguang Qin, Ammar Rafiq","doi":"10.1155/2022/1560885","DOIUrl":"https://doi.org/10.1155/2022/1560885","url":null,"abstract":"Access control mechanisms define the level of access to the resources among specified users. It distinguishes the users as authorized or unauthorized based on appropriate policies. Several traditional and hybrid access control models have been proposed in previous researches over the last few decades. In this study, we provide a detailed survey of access control models and compare the traditional and hybrid access control models based on their access control criteria. This survey focuses on the growing literature of access control models and summarizes it through comparative analysis, identifying limitations and illustrating the advantages of both traditional and hybrid models. This study will help the researchers to get a deep understanding of the traditional and hybrid access control models.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134478211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Design of Linkable Ring Signature Scheme with Stealth Addresses","authors":"Weizhou Li, Zhiqiang Lin, Qi Chen","doi":"10.1155/2022/1417607","DOIUrl":"https://doi.org/10.1155/2022/1417607","url":null,"abstract":"Blockchain is a transformational technology which affects finance, Internet, and politics. However, many privacy protection problems for blockchain are waiting to be solved. In this study, we propose a novel linkable ring signature scheme with stealth addresses, which enables the payer and payee of the transaction to be anonymous and unlinkable in the cryptocurrency. The scheme is combined with an elliptic curve discrete logarithm (ECD logarithm)-based key encapsulation mechanism (KEM) stage and a lattice-based signature stage. The master public key and master secret key are much smaller compared with the previous scheme. Complete secure proof of the scheme is also presented in this study.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123736955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain","authors":"Huiying Zou, Xiaofan Liu, Wei Ren, Tianqing Zhu","doi":"10.1155/2022/5424395","DOIUrl":"https://doi.org/10.1155/2022/5424395","url":null,"abstract":"The electronic reporting system can alleviate the problems in terms of efficiency, content confidentiality, and reporter privacy imposed in the traditional reporting system. Relying on anonymity, the privacy of reporters can be protected, but the authentication of reporters with fake names should also be maintained. If authenticated anonymity is guaranteed, the reporters may still conduct misbehaviors such as submitting fake reports after the authentication. To address the above dilemma, we propose to apply a proxy signature to achieve authenticated anonymity and employ blockchain to maintain anonymity yet guarantee traceability for reporters’ misbehaviors. We also propose a new proxy signature scheme in this paper by module lattice for postquantum security. The extensive analysis justified our proposed scheme is secure and manageable.","PeriodicalId":167643,"journal":{"name":"Secur. Commun. Networks","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114157042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}