{"title":"Biometric multi‐factor authentication: On the usability of the FingerPIN scheme","authors":"Emanuela Marasco, Massimiliano Albanese, Venkata Vamsi Ram Patibandla, Anudeep Vurity, S. Sriram","doi":"10.1002/spy2.261","DOIUrl":"https://doi.org/10.1002/spy2.261","url":null,"abstract":"Fingerprint‐based authentication has been successfully adopted in a wide range of applications, including law enforcement and immigration, due to its numerous advantages over traditional password‐based authentication. Despite the usability and accuracy of this technology, some significant concerns still exist, which can potentially hinder its further adoption. For instance, a fingerprint is permanently associated with an individual and, once stolen, cannot be replaced, thus compromising biometric‐based authentication. To mitigate this concern, we previously designed a multi‐factor authentication approach that integrates Type‐1 and Type‐3 authentication factors into a fingerprint‐based personal identification number (PIN). To authenticate, a subject is required to present a sequence of fingerprints corresponding to the digits of the PIN, based on a predefined secret mapping between digits and fingers. We conducted a preliminary vulnerability analysis and demonstrated that this approach is robust to the compromise of one or more of the subject's fingerprints. The objective of the work presented in this paper is to identify any usability issues for this FingerPIN scheme, collect qualitative and quantitative data through a user study, and determine the participants' satisfaction with the authentication mechanism. We carried out systematic usability tests, designed suitable performance metrics for assessing authentication usability on an initial cohort of 100 individuals, and performed a comparative analysis of the FingerPIN scheme against traditional sequential multi‐factor authentication schemes.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48911233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A survey of recent advances in image steganography","authors":"Akshaya Kumar, Rajneesh Rani, Samayveer Singh","doi":"10.1002/spy2.281","DOIUrl":"https://doi.org/10.1002/spy2.281","url":null,"abstract":"Over the course of technological development, data security while transmission and storing has always been a field of continuous advancements and key importance. In the recent times, its importance has increased even further and the main reason behind this is the increase in the amount of data that is being transferred over internet and various networks. Although there are cryptographic approaches to handle these situations, steganography provides a different aspect to the solution. While cryptography encrypts the data such that the cipher text is visible to human eye, but the meaning of that encrypted text is never known. Steganography is the process of hiding data in plain sight inside some images, audio, video and so on, such that it is very difficult for the viewer to directly differentiate if there is some data hidden in the host or not. This paper consists a study of various methodologies to implement Image steganography like spatial domain manipulation, encryption based and deep learning approaches. The paper focuses upon recent advances in all these approaches for image steganography and aims to help other researches in this domain to understand recent developments as well future advancements possible in the same field. Furthermore, this paper illustrates about how different image formats effect various image steganography methods and how the various image color models interact with image steganography. Later this article sheds some light on the domain of steganalysis and reports about the fundamental principles as well as various implementations of steganalysis systems in recent times.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48034061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of security issues in Internet of Things and artificial intelligence‐driven solutions","authors":"Ali K. Abed, Angesh Anupam","doi":"10.1002/spy2.285","DOIUrl":"https://doi.org/10.1002/spy2.285","url":null,"abstract":"Internet of Things (IoT) is a network of several hardware and software systems which is broadly based upon internet services and several state‐of‐the‐art sensing and communication technologies. The emergence of 5G technology will witness a further surge in the growth of IoT across the world but simultaneously security concerns pertinent to the IoT technology also need rigorous evaluations. This article will present a thorough survey of the security challenges in an IoT network, recent cases of attacks on IoT technology, communication protocols prevalent in IoT systems and the role of artificial intelligence (AI) in IoT security. For the first time, all the major attributes related to IoT security along with potential solutions using AI are reviewed and articulated together. This work would act as a useful resource for understanding useful perspectives in future research focused around the development of more secured IoT communication protocols as well as AI tools for handling privacy and security in IoT.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42635966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A privacy oriented authorized key agreement framework for vehicular edge computing","authors":"Shanil Sharma, D. Mishra, Saurabh Rana","doi":"10.1002/spy2.277","DOIUrl":"https://doi.org/10.1002/spy2.277","url":null,"abstract":"The revolution of technology has presented smart vehicles. To use reliable cloud service for smart vehicles at low latency, vehicular edge computing (VEC) is introduced. VEC adopts a unique approach for providing better vehicular connection, data storage, and sharing information among IoT‐enabled vehicles. However, the establishment of secure communication and authorized access to data in these cloud‐based services are always a concern. To ensure secure and authorized communication, we construct an authenticated key agreement framework for VEC. The edge computing‐based proposed vehicular communication protocol provides secure and authorized communication for an edge‐endorsed IoT environment. The security is proved on the random oracle model. The analysis of computational efficiency is also included. Furthermore, we have conferred the comparison analysis of our designed scheme with other schemes.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42801950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software defined radio implementation of a secure waveform for real‐time data transmission using universal software radio peripheral","authors":"H. Benimam, S. Sadoudi, Djamal Teguig","doi":"10.1002/spy2.280","DOIUrl":"https://doi.org/10.1002/spy2.280","url":null,"abstract":"In the present work, we propose a new approach to secure waveforms for data transmission in software defined radio (SDR) based communication systems. For more precision, SDR implementation and validation, using Universal software radio peripherals (USRPs) B210 platforms, of a chaos‐based cryptosystem is used for securing transmitted multimedia data such as text, image, and video. For this, new GNU‐radio companion (GRC) blocks are developed and integrated in the GRC software environment to use effectively our solution. In this context, we have integrated GRC block for the Lorenz chaotic generator which generates chaotic signals. These signals are then used to generate the encryption keys by inserting a dedicated GRC block. The latest and largest development GRC block concerns the proposed solution for the chaotic synchronization problem, which is a challenge when applying chaotic systems to secure data transmission. The implemented chaotic cryptosystem is based on one time pad cipher, knowing that it's the most suitable for chaos‐based cryptography. The obtained results of the security analysis of the proposed cryptosystem validate its robustness. In fact, the generated encryption keys deemed robust after passing through two statistical tests batteries namely, NIST and DIEHARD. In addition, a good result is obtained by a large security evaluation of the encrypted data through several metrics, which are compared to some previous works. Finally, we have experimentally validated a secure waveform between two USRPs platforms for different types of data information like text, image, and video. Furthermore, a graphical communication interface is designed to guarantee easy access and broad flexible applicability of the developed solution.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45472682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"What are the benefits and opportunities of launching a Metaverse for NEOM city?","authors":"Saeed Banaeian Far, Azadeh Imani Rad","doi":"10.1002/spy2.282","DOIUrl":"https://doi.org/10.1002/spy2.282","url":null,"abstract":"It is expected that in 2025$$ 2025 $$ , the first phase of the most innovative city in the world will be opened. Seemingly NEOM city's developers have forgotten about an attractive technology called Metaverse, presented almost simultaneously along with the NEOM idea in 2017$$ 2017 $$ . This study stipulates that Metaverse can appreciably assist in delivering a broad digital perspective of the future to governments, futurologists, people, and particularly the NEOM developers. Also, this study briefly addresses the benefits and opportunities of releasing Metaverse‐based NEOM for the Kingdom of Saudi Arabia (KSA), engineers, developers, futurologists, and people worldwide. Moreover, it is illustrated that KSA and people worldwide can benefit from the Metaverse version. For example, people can visit the world's dream city as digital tourists. As a result of this revolutionary idea, KSA can earn considerable revenue by land pre‐selling and providing remote services.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42698755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kaushal A. Shah, Sarth Kanani, Shivam Patel, Manan Devani, S. Tanwar, Amit Verma, Ravi Sharma
{"title":"Blockchain‐based object detection scheme using federated learning","authors":"Kaushal A. Shah, Sarth Kanani, Shivam Patel, Manan Devani, S. Tanwar, Amit Verma, Ravi Sharma","doi":"10.1002/spy2.276","DOIUrl":"https://doi.org/10.1002/spy2.276","url":null,"abstract":"The rapid development of computing devices and automation in various fields drastically increased the growth of data, which promotes the usage of machine learning (ML) techniques to get insights from the generated data. However, data processed by ML algorithms lead to several privacy issues, including leakage of users' biometric data while sharing it through the network to train the object detection model. Therefore, federated learning (FL) was introduced, in which the models are trained locally; only model parameters are shared between central authority (CA) and end nodes. They will eventually maintain a common model for all the participating devices. However, many problems are associated with FL, such as the difference in data consumption rate, training capabilities, geographical challenges, and storage capacity. These problems might lead to differences in the common global model and thus an inefficient FL approach. Moreover, the presence of a CA results in a single point of failure and is vulnerable to various attacks. Motivated by the aforementioned discussion, in this article, we propose a blockchain‐based object detection scheme using FL that eliminates the CA by using distributed InterPlanetary File System (IPFS). Global models can be aggregated periodically when several local model parameters are uploaded on the IPFS. Nodes can fetch the global model from the IPFS. The global aggregated object detection model has been evaluated for various scenarios such as human face detection, animal detection, unsafe content detection, noteworthy vehicle detection, and performance evaluation parameters such as accuracy, precision, recall, and end‐to‐end latency. Compared to traditional models, the proposed model achieved an average accuracy of 92.75% on the object detection scenarios mentioned above.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46306578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient procedure for online/offline ID‐based signature using extended chaotic maps and group ring","authors":"Gaurav Mittal, S. Sushanth Kumar, Sandeep Kumar","doi":"10.1002/spy2.279","DOIUrl":"https://doi.org/10.1002/spy2.279","url":null,"abstract":"In this article, we utilize the notions of extended chaotic maps and group ring to propose an efficient procedure for online/offline identity based (ID‐based) signature. The main purpose of engaging chaotic maps in our procedure is to reduce its computational complexity while maintaining the desired security and the purpose of including algebraic structure of group ring is to shorten the signature. We show that under chosen message attack, our signature procedure is secure under unforgeability of ID‐based short signature. Most of the available online/offline signature procedures allow one time use of the offline preadministered information (offline stockpiling), but the proposed procedure grants multitime usage of the offline stockpiling. Therefore, the offline preadministered information can be reused by the signer in polynomial time. We show that our signature procedure is efficient, fast and provides signature of the small size. Finally, we compare our procedure with the several existing schemes in the literature and discuss its advantages.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45942143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy in smart speakers: A systematic literature review","authors":"Guglielmo Maccario, M. Naldi","doi":"10.1002/spy2.274","DOIUrl":"https://doi.org/10.1002/spy2.274","url":null,"abstract":"Parallel to the increasing use of smart speakers (aka virtual assistants), privacy concerns emerge. In this article, we provide a systematic review of the literature on privacy issues in smart speakers. Both Scopus and Web of Science databases are examined, as well as the preprint repository arXiv, to take into account the most recent contributions. That literature exhibits a continuously growing trend in the last 4 years, with the USA being the single largest contributor to the field. The topics debated in the literature concern the perception of privacy issues, their contribution to adoption choices, the identification of vulnerabilities, the proposal of possible countermeasures, and (last and least) the analysis of the legal cases that are arising.","PeriodicalId":29939,"journal":{"name":"Security and Privacy","volume":" ","pages":""},"PeriodicalIF":1.9,"publicationDate":"2022-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47199911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}