{"title":"Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study","authors":"Mohammed Rauf Ali Khan","doi":"10.1002/spy2.328","DOIUrl":"https://doi.org/10.1002/spy2.328","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43618358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on disturbing white‐box cryptography algorithm based on local differential privacy","authors":"Wenjun Luo, Die Lai, Zesen Dai","doi":"10.1002/spy2.320","DOIUrl":"https://doi.org/10.1002/spy2.320","url":null,"abstract":"White‐box cryptography protects the secret key extraction from software implementations of cryptographic primitives. The principle is to white‐box the key by using obfuscation and hide the key in the whole encryption process to ensure that the key cannot be traced and extracted. The idea of adding internal perturbed terms and additional random equations is given by Bringer et al. to implement white‐box encryption, which has been attacked due to the defect in structure. In this paper, we propose a new secure white‐box encryption method by combining the random perturbation mechanism of local differential privacy protection and adding internal interference term, which can protect the privacy of the intermediate secret key more securely. The further disrupted cipher can also obtain the correct result by voting without increasing the number of parallel systems, and also gives the practical white‐box representation to AEw/oS. Compared with the white‐box implementation proposed by Bringer et al., the memory space of the new white‐box scheme will be 44 bytes more, but in terms of security, it can resist traditional attacks and Mulder's attacks.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48936258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain‐based authentication and secure communication in IoT networks","authors":"C. Lau, K. Yeung, Fan Yan, Sammy Chan","doi":"10.1002/spy2.319","DOIUrl":"https://doi.org/10.1002/spy2.319","url":null,"abstract":"The application of IoT covers various domains, including smart cities, smart homes, e‐health, autonomous vehicles and so forth. These are powered by IoT networks which consist of a collection of heterogeneous devices. These devices collect and analyze personal data and sometimes make decisions for us. Since IoTs are involved in the decision‐making process, the authenticity and privacy of such networks are critical. In this article, authenticated devices configuration protocol (ADCP) is proposed to handle the authentication and construct a secure overlay network in the existing IoT networks; authenticated device transmission protocol is also proposed to secure the communication within the overlay network. Besides the authentication, ADCP can also mitigate the zero‐day attack and achieve zero the zero‐day attack can also be mitigated and achieved 0 round trip time key exchange. These protocols utilize a distributed blockchain database to store the authentication records optimized for data integrity. These properties guarantee the integrity of the authentication records. Both protocols are compatible with the existing communication protocols and do not require reprogramming the current software. The formal analysis of the proposed scheme has proven its resilience against various possible attacks. In addition, a stochastic threat model is considered and numerical results give solid evidence of security enhancement.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41594103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation and design of B‐128 modified Blowfish algorithm","authors":"Sunil Kumar, D. Kumar","doi":"10.1002/spy2.307","DOIUrl":"https://doi.org/10.1002/spy2.307","url":null,"abstract":"The field of information security has many uses in the modern day and beyond. Encryption is a method used to secure information from unauthorized access. Since symmetric key algorithms can decrypt data much more quickly than asymmetric key algorithms, the former are more popular. Blowfish is an unpatented, freely useable, compact, quick, and efficient symmetric key encryption technique. Additionally, this method has a high level of security. The size of its blocks (64 bits) is limiting its use, though. The paper aims to propose a modified version of the Blowfish algorithm that performs high‐speed encryption with high throughput and supports 128‐bit block size, enhancing its applicability in various areas. The algorithm can be an alternative to the AES algorithm with limited power consumption. The proposed algorithm is compared with the original Blowfish algorithm based on execution speed, throughput, and the avalanche effect. The algorithm's performance is also evaluated on images based on diffusion properties, image histogram, entropy, and correlation coefficient.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42593542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain‐based internet of vehicles (\u0000 BIoV\u0000 ): A systematic review of surveys and reviews","authors":"Atefeh Hemmati, Mani Zarei, Alireza Souri","doi":"10.1002/spy2.317","DOIUrl":"https://doi.org/10.1002/spy2.317","url":null,"abstract":"The Internet of vehicles (IoV) has appeared as an effective method of obtaining an intelligent transportation system able to deliver various innovative solutions and enable several applications as a replacement for vehicular ad‐hoc networks (VANETs). To help IoV contexts, enormous quantities of information are created and transmitted between various communication components wirelessly across multiple channels, which may entice attackers and put the network at risk. Security is one of the vital concerns and critical issues in VANETs and IoV networks. Blockchain is employed to create a distributed and secure IoV to overcome some centralized concerns and enhance the network architecture. This article presents a systematic and detailed review by selecting 28 review articles from 2018 to 2022 on blockchain‐based IoV (BIoV). We investigate the latest review and survey articles regarding their aspects, contributions, findings, limitations, and strong points to address unsolved problems of BIoV. In this article, the review/survey articles are systematically reviewed to resolve taxonomy aspects intended for BIoV. We provide a new taxonomy and discuss security concerns, open issues, and future directions so that researchers in this field can quickly and easily access recent content and do not need to read numerous review articles.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48432259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}