Security and Privacy最新文献

筛选
英文 中文
A comprehensive security and performance assessment of UAV authentication schemes 无人机认证方案的综合安全性和性能评估
IF 1.9
Security and Privacy Pub Date : 2023-08-03 DOI: 10.1002/spy2.338
Yassine Mekdad, Ahmet Aris, Abbas Acar, M. Conti, R. Lazzeretti, A. E. Fergougui, Selcuk Uluagac
{"title":"A comprehensive security and performance assessment of UAV authentication schemes","authors":"Yassine Mekdad, Ahmet Aris, Abbas Acar, M. Conti, R. Lazzeretti, A. E. Fergougui, Selcuk Uluagac","doi":"10.1002/spy2.338","DOIUrl":"https://doi.org/10.1002/spy2.338","url":null,"abstract":"In the past few years, unmanned aerial vehicles (UAVs) have significantly gained attention and popularity from industry, government, and academia. With their rapid development and deployment into the civilian airspace, UAVs play an important role in different applications, including goods delivery, search‐and‐rescue, and traffic monitoring. Therefore, providing secure communication through authentication models for UAVs is necessary for a successful and reliable flight mission. To satisfy such requirements, numerous authentication mechanisms have been proposed in the literature. However, the literature lacks a comprehensive study evaluating the security and performance of these solutions. In this article, we analyze the security and performance of 27 recent UAV authentication works by considering ten different key metrics. First, in the performance analysis, we show that the majority of UAV authentication schemes are lightweight in their communication cost. However, the storage overhead or the energy consumption is not reported by many authentication studies. Then, we reveal in the security analysis the widely employed formal models (i.e., abstract description of an authentication protocol through a mathematical model), while most of the studies lack coverage of many attacks that can target UAV systems. Afterwards, we highlight the challenges that need to be addressed in order to design and implement secure and reliable UAV authentication schemes. Finally, we summarize the lessons learned on the authentication strategies for UAVs to motivate promising direction for further research.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48708424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions 释放SDN和GNN在网络异常检测方面的力量:最新技术、挑战和未来方向
IF 1.9
Security and Privacy Pub Date : 2023-07-30 DOI: 10.1002/spy2.337
Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, S. Tanwar, Ravi Sharma, Amit Verma
{"title":"Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions","authors":"Archan Dhadhania, Jitendra Bhatia, Rachana Mehta, S. Tanwar, Ravi Sharma, Amit Verma","doi":"10.1002/spy2.337","DOIUrl":"https://doi.org/10.1002/spy2.337","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":"1 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41493150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocation 基于属性的加密方案,用于云中的安全数据共享,具有细粒度撤销
IF 1.9
Security and Privacy Pub Date : 2023-07-18 DOI: 10.1002/spy2.336
Md. Azharul Islam, S. Madria
{"title":"Attribute‐based encryption scheme for secure data sharing in cloud with fine‐grained revocation","authors":"Md. Azharul Islam, S. Madria","doi":"10.1002/spy2.336","DOIUrl":"https://doi.org/10.1002/spy2.336","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42690533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks 基于物联网传感器网络中多因素和多网关的鲁棒安全用户身份验证方案
IF 1.9
Security and Privacy Pub Date : 2023-07-11 DOI: 10.1002/spy2.335
Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, S. S. Gill
{"title":"A robust and secure user authentication scheme based on multifactor and multi‐gateway in IoT enabled sensor networks","authors":"Ravi Kumar, Samayveer Singh, Deepti Singh, Mohit Kumar, S. S. Gill","doi":"10.1002/spy2.335","DOIUrl":"https://doi.org/10.1002/spy2.335","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48091623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal key pre‐distribution schemes from affine resolvable and partially affine resolvable designs 从仿射可解析和部分仿射可解析设计的最优密钥预分配方案
IF 1.9
Security and Privacy Pub Date : 2023-07-09 DOI: 10.1002/spy2.334
Shyam Saurabh, K. Sinha
{"title":"Optimal key pre‐distribution schemes from affine resolvable and partially affine resolvable designs","authors":"Shyam Saurabh, K. Sinha","doi":"10.1002/spy2.334","DOIUrl":"https://doi.org/10.1002/spy2.334","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44578636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Issue Information 问题信息
IF 1.9
Security and Privacy Pub Date : 2023-07-01 DOI: 10.1002/spy2.244
{"title":"Issue Information","authors":"","doi":"10.1002/spy2.244","DOIUrl":"https://doi.org/10.1002/spy2.244","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44306315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preserving vaccinating‐ and testing‐pass for the European Union 欧盟隐私保护疫苗接种和检测通行证
IF 1.9
Security and Privacy Pub Date : 2023-06-24 DOI: 10.1002/spy2.332
Dominik Schrahe, Thomas Städter
{"title":"Privacy preserving vaccinating‐ and testing‐pass for the European Union","authors":"Dominik Schrahe, Thomas Städter","doi":"10.1002/spy2.332","DOIUrl":"https://doi.org/10.1002/spy2.332","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41734211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
P‐DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities P‐DNN:用于检测物联网漏洞的基于并行DNN的IDS框架
IF 1.9
Security and Privacy Pub Date : 2023-06-22 DOI: 10.1002/spy2.330
Sharmila B S, Rohini Nagapadma
{"title":"P‐DNN: Parallel DNN based IDS framework for the detection of IoT vulnerabilities","authors":"Sharmila B S, Rohini Nagapadma","doi":"10.1002/spy2.330","DOIUrl":"https://doi.org/10.1002/spy2.330","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43837002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preserving content distribution framework for multidistributor DRM systems 多地区DRM系统的隐私保护内容分发框架
IF 1.9
Security and Privacy Pub Date : 2023-06-15 DOI: 10.1002/spy2.327
Ankita Mishra, M. Obaidat, D. Mishra
{"title":"Privacy preserving content distribution framework for multidistributor DRM systems","authors":"Ankita Mishra, M. Obaidat, D. Mishra","doi":"10.1002/spy2.327","DOIUrl":"https://doi.org/10.1002/spy2.327","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43612510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RFPM: A RSU‐aided framework for pseudonym management to preserve location privacy in IoV RFPM:一个RSU辅助的网际网路中保护位置隐私的假名管理框架
IF 1.9
Security and Privacy Pub Date : 2023-06-13 DOI: 10.1002/spy2.329
Indu Kumari, P. Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, D. Rawat
{"title":"RFPM: A RSU‐aided framework for pseudonym management to preserve location privacy in IoV","authors":"Indu Kumari, P. Singh, Shivram N. Gowtham, Sukumar Nandi, Uttam Ghosh, D. Rawat","doi":"10.1002/spy2.329","DOIUrl":"https://doi.org/10.1002/spy2.329","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45178379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信