Security and Privacy最新文献

筛选
英文 中文
Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study 利用LockBit作为案例研究,了解勒索软件对医疗卫生设施的影响
IF 1.9
Security and Privacy Pub Date : 2023-06-04 DOI: 10.1002/spy2.328
Mohammed Rauf Ali Khan
{"title":"Understanding impacts of a ransomware on medical and health facilities by utilizing LockBit as a case study","authors":"Mohammed Rauf Ali Khan","doi":"10.1002/spy2.328","DOIUrl":"https://doi.org/10.1002/spy2.328","url":null,"abstract":"","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43618358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on disturbing white‐box cryptography algorithm based on local differential privacy 基于局部差分隐私的干扰白盒密码算法研究
IF 1.9
Security and Privacy Pub Date : 2023-05-30 DOI: 10.1002/spy2.320
Wenjun Luo, Die Lai, Zesen Dai
{"title":"Research on disturbing white‐box cryptography algorithm based on local differential privacy","authors":"Wenjun Luo, Die Lai, Zesen Dai","doi":"10.1002/spy2.320","DOIUrl":"https://doi.org/10.1002/spy2.320","url":null,"abstract":"White‐box cryptography protects the secret key extraction from software implementations of cryptographic primitives. The principle is to white‐box the key by using obfuscation and hide the key in the whole encryption process to ensure that the key cannot be traced and extracted. The idea of adding internal perturbed terms and additional random equations is given by Bringer et al. to implement white‐box encryption, which has been attacked due to the defect in structure. In this paper, we propose a new secure white‐box encryption method by combining the random perturbation mechanism of local differential privacy protection and adding internal interference term, which can protect the privacy of the intermediate secret key more securely. The further disrupted cipher can also obtain the correct result by voting without increasing the number of parallel systems, and also gives the practical white‐box representation to AEw/oS. Compared with the white‐box implementation proposed by Bringer et al., the memory space of the new white‐box scheme will be 44 bytes more, but in terms of security, it can resist traditional attacks and Mulder's attacks.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48936258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain‐based authentication and secure communication in IoT networks 物联网网络中基于区块链的认证和安全通信
IF 1.9
Security and Privacy Pub Date : 2023-05-04 DOI: 10.1002/spy2.319
C. Lau, K. Yeung, Fan Yan, Sammy Chan
{"title":"Blockchain‐based authentication and secure communication in IoT networks","authors":"C. Lau, K. Yeung, Fan Yan, Sammy Chan","doi":"10.1002/spy2.319","DOIUrl":"https://doi.org/10.1002/spy2.319","url":null,"abstract":"The application of IoT covers various domains, including smart cities, smart homes, e‐health, autonomous vehicles and so forth. These are powered by IoT networks which consist of a collection of heterogeneous devices. These devices collect and analyze personal data and sometimes make decisions for us. Since IoTs are involved in the decision‐making process, the authenticity and privacy of such networks are critical. In this article, authenticated devices configuration protocol (ADCP) is proposed to handle the authentication and construct a secure overlay network in the existing IoT networks; authenticated device transmission protocol is also proposed to secure the communication within the overlay network. Besides the authentication, ADCP can also mitigate the zero‐day attack and achieve zero the zero‐day attack can also be mitigated and achieved 0 round trip time key exchange. These protocols utilize a distributed blockchain database to store the authentication records optimized for data integrity. These properties guarantee the integrity of the authentication records. Both protocols are compatible with the existing communication protocols and do not require reprogramming the current software. The formal analysis of the proposed scheme has proven its resilience against various possible attacks. In addition, a stochastic threat model is considered and numerical results give solid evidence of security enhancement.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41594103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance evaluation and design of B‐128 modified Blowfish algorithm B‐128改进Blowfish算法的性能评估与设计
IF 1.9
Security and Privacy Pub Date : 2023-04-23 DOI: 10.1002/spy2.307
Sunil Kumar, D. Kumar
{"title":"Performance evaluation and design of B‐128 modified Blowfish algorithm","authors":"Sunil Kumar, D. Kumar","doi":"10.1002/spy2.307","DOIUrl":"https://doi.org/10.1002/spy2.307","url":null,"abstract":"The field of information security has many uses in the modern day and beyond. Encryption is a method used to secure information from unauthorized access. Since symmetric key algorithms can decrypt data much more quickly than asymmetric key algorithms, the former are more popular. Blowfish is an unpatented, freely useable, compact, quick, and efficient symmetric key encryption technique. Additionally, this method has a high level of security. The size of its blocks (64 bits) is limiting its use, though. The paper aims to propose a modified version of the Blowfish algorithm that performs high‐speed encryption with high throughput and supports 128‐bit block size, enhancing its applicability in various areas. The algorithm can be an alternative to the AES algorithm with limited power consumption. The proposed algorithm is compared with the original Blowfish algorithm based on execution speed, throughput, and the avalanche effect. The algorithm's performance is also evaluated on images based on diffusion properties, image histogram, entropy, and correlation coefficient.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42593542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain‐based internet of vehicles ( BIoV ): A systematic review of surveys and reviews 基于区块链的汽车互联网(BIoV):对调查和评论的系统回顾
IF 1.9
Security and Privacy Pub Date : 2023-04-20 DOI: 10.1002/spy2.317
Atefeh Hemmati, Mani Zarei, Alireza Souri
{"title":"Blockchain‐based internet of vehicles (\u0000 BIoV\u0000 ): A systematic review of surveys and reviews","authors":"Atefeh Hemmati, Mani Zarei, Alireza Souri","doi":"10.1002/spy2.317","DOIUrl":"https://doi.org/10.1002/spy2.317","url":null,"abstract":"The Internet of vehicles (IoV) has appeared as an effective method of obtaining an intelligent transportation system able to deliver various innovative solutions and enable several applications as a replacement for vehicular ad‐hoc networks (VANETs). To help IoV contexts, enormous quantities of information are created and transmitted between various communication components wirelessly across multiple channels, which may entice attackers and put the network at risk. Security is one of the vital concerns and critical issues in VANETs and IoV networks. Blockchain is employed to create a distributed and secure IoV to overcome some centralized concerns and enhance the network architecture. This article presents a systematic and detailed review by selecting 28 review articles from 2018 to 2022 on blockchain‐based IoV (BIoV). We investigate the latest review and survey articles regarding their aspects, contributions, findings, limitations, and strong points to address unsolved problems of BIoV. In this article, the review/survey articles are systematically reviewed to resolve taxonomy aspects intended for BIoV. We provide a new taxonomy and discuss security concerns, open issues, and future directions so that researchers in this field can quickly and easily access recent content and do not need to read numerous review articles.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48432259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effect of Hadamard multiplication on bloom filter and double bloom filter transformations 阿达玛乘法对布隆滤波器和双布隆滤波器变换的影响
IF 1.9
Security and Privacy Pub Date : 2023-04-19 DOI: 10.1002/spy2.316
Ajish Sreedharan, A. K S
{"title":"Effect of Hadamard multiplication on bloom filter and double bloom filter transformations","authors":"Ajish Sreedharan, A. K S","doi":"10.1002/spy2.316","DOIUrl":"https://doi.org/10.1002/spy2.316","url":null,"abstract":"Iris biometric is the most common and widely accepted biometric authentication method due to its high accuracy. The iris biometric template should be protected to overcome security and privacy attacks. The two standard iris biometric template protection methods are bloom filter and double bloom filter‐based feature transformations. In this article, we first permuted and then applied the p‐order Hadamard product on the iris template before the bloom filter and double bloom filter‐based transformation to enhance the security. The performance and security are measured using the CASIAv1 iris benchmark database to study the effect of Hadamard multiplication on bloom and double bloom filter‐based transformation. The Hadamard multiplication on the iris template increases the security of the transformed iris template and slightly degrades the matching performance.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46056466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive study on cybersecurity challenges and opportunities in the IoT world 全面研究物联网世界的网络安全挑战与机遇
IF 1.9
Security and Privacy Pub Date : 2023-04-12 DOI: 10.1002/spy2.318
Aejaz Nazir Lone, Suhel Mustajab, M.Aftab Alam
{"title":"A comprehensive study on cybersecurity challenges and opportunities in the\u0000 IoT\u0000 world","authors":"Aejaz Nazir Lone, Suhel Mustajab, M.Aftab Alam","doi":"10.1002/spy2.318","DOIUrl":"https://doi.org/10.1002/spy2.318","url":null,"abstract":"It has become possible to link anything and everything to the Internet in recent decades due to the expanding Internet of Things (IoT). As a result, our usage of technology has changed a lot, causing digital disruption in the real world. IoT allows drones, sensors, digital set‐top boxes, surveillance cameras, wearable technology, and medical equipment to be connected to the internet. Healthcare, manufacturing, utilities, transportation, and housing are among the various sectors that has become intelligent. Recently, we have seen a surge in cybersecurity challenges and opportunities for the improvement of various IoT applications. Although cybersecurity and the IoT are extensively researched, there is a dearth of studies that exclusively focus on the evolution of cybersecurity challenges in the area of AI and machine learning, blockchain and zero trust, lightweight security, integration of IoT with 5G networks, and many more in the IoT world. The availability of environment‐capturing sensors and internet‐connected tracking devices allows for private life surveillance and cloud data transmission. Therefore, a significant problem for researchers and developers is to ensure the CIA (Confidentiality, Integrity, and Availability) security triangle for people. This paper presents a comprehensive study of cybersecurity applications, challenges, and opportunities in the IoT world. The IoT architectural layer, attacks against the IoT layer, and related issues are highlighted. Furthermore, cybersecurity issues and challenges in IoT along with the strength and weaknesses of existing techniques are discussed in detail. Our study will provide insight into various current cybersecurity research trends in the IoT world.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43073983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Phishing uniform resource locator detection using machine learning: A step towards secure system 使用机器学习的网络钓鱼统一资源定位器检测:迈向安全系统的一步
IF 1.9
Security and Privacy Pub Date : 2023-03-25 DOI: 10.1002/spy2.311
Shilpa Mahajan
{"title":"Phishing uniform resource locator detection using machine learning: A step towards secure system","authors":"Shilpa Mahajan","doi":"10.1002/spy2.311","DOIUrl":"https://doi.org/10.1002/spy2.311","url":null,"abstract":"The advancement in technology has led to increase in cyber‐attacks. Hackers have become more skilled at finding the loopholes in the system and can penetrate easily on to host network. The rate of cybercrimes is increasing exponentially with the growth of digital era. Phishing is considered as one of the top cybercrimes that has impacted the society at large. As per Kaspersky reports 2021, around 22% attacks were phishing attacks. This paper explores methods for detecting phishing uniform resource locator (URLs) by analyzing various features using Machine Learning techniques. Various data mining algorithms are used to learn data patterns that can identify and differentiate between benign and phishing websites using phishing website data set. The best results are shown by an XGBoost Model that provides more than 90% accuracy on the balanced class dataset.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42423570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MyEasyHealthcare : An efficient and secure three‐tier blockchain‐based healthcare system MyEasyHealthcare:一个高效、安全的三层基于区块链的医疗保健系统
IF 1.9
Security and Privacy Pub Date : 2023-03-25 DOI: 10.1002/spy2.314
Kanika Agrawal, Mayank Aggarwal, S. Tanwar
{"title":"\u0000 MyEasyHealthcare\u0000 \u0000 : An efficient and secure three‐tier blockchain‐based healthcare system","authors":"Kanika Agrawal, Mayank Aggarwal, S. Tanwar","doi":"10.1002/spy2.314","DOIUrl":"https://doi.org/10.1002/spy2.314","url":null,"abstract":"Blockchain systems have seen vast growth due to the immense potential in developing secure applications for education, healthcare, and so forth. The healthcare system is extensively researched to provide convenience to human life. With the exponential growth in healthcare systems and devices, patient data security and privacy issues are becoming primary concerns. Blockchain is emerging as a solution to secure healthcare records, but it faces certain shortcomings like transaction time, execution time, gas cost consumption, bandwidth utilization, and so forth. The current article designed an extensive blockchain‐based healthcare system (MyEasyHealthcare) with reduced gas consumption, transaction cost, execution cost, and bandwidth utilization, along with enhanced security at three levels. At the first level, the professionals and patients get registered, which provides identity access management. Secondly, authorization is required for each registered entity by the owners. Lastly, the third level includes a doctor‐patient relationship where the hospital's owner assigns a patient to a particular doctor. The data is protected from the outer world and is preserved only between the doctor and the patient. Moreover, to include the majority of tasks for hospital management, the developed system incorporates a smart contract to record seven different parameters for patient diagnosis by a physician and 15 different parameters by a pathologist. The designed system is evaluated for the amount of gas consumed, transaction cost, execution cost, and bandwidth utilization by simulating/executing the written smart contract on InterPlanetary File System (IPFS) and Remix to check the feasibility of the developed system (MyEasyHealthcare) for the real world; the results testify the proposed system is useful in the real world.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44747064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel reversible data hiding scheme for VQ codebooks 一种新的VQ码本可逆数据隐藏方案
IF 1.9
Security and Privacy Pub Date : 2023-03-22 DOI: 10.1002/spy2.315
Xu Wang, Jui‐Chuan Liu, Chin-chen Chang
{"title":"A novel reversible data hiding scheme for\u0000 VQ\u0000 codebooks","authors":"Xu Wang, Jui‐Chuan Liu, Chin-chen Chang","doi":"10.1002/spy2.315","DOIUrl":"https://doi.org/10.1002/spy2.315","url":null,"abstract":"Vector quantization (VQ) technique is widely used in digital image compression. Some reversible data hiding schemes have been proposed to embed secret data (eg, password, timestamp, and watermark) into a VQ index table. In real application scenarios, users usually train codebooks on their own data sets instead of using the public codebooks directly. Therefore, different from the conventional schemes, in this paper we propose a novel reversible data hiding scheme for VQ codebooks instead of VQ index tables. All permutation operation is adopted to a sorted codebook to find usable codewords and embeds secret data. Experimental results demonstrate that the embedding rates of our proposed scheme for different‐sized codebooks are appreciable. The embedded codebook can also be directly applied to decompress images.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41533623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信