透過您的圖書館登入
IP:3.143.244.83

International Journal of Network Security

  • Ahead-of-Print

捷頂科技有限公司,正常發行

選擇卷期


已選擇0筆
  • 期刊
Kuo-Kun Tseng Xialong He Xiaoxiao An 以及其他 3 位作者

In this paper we proposed a novel security authentication mechanism, which is a secure authentication mechanism for network transmission with an ECG biological feature. The theory of this authentication mechanism can be applied within various network identification and authentication systems. In addition, the algorithm needs to strengthen the safety and performance for watermarking. In addition, experimentation on the packet watermarking of ECG is conducted. The criteria has two parameters, one is the SNR (signal-to-noise ratio) and the other is BER, to evaluate the overall performance. Not only that, we have also considered noise attack. According to our obtained results, our algorithm has proven to be robust, and it thus worth considering in the application.

  • 期刊

Under the business environment, the ownership of an (Radio Frequency Identification, RFID) RFID tag embedded item often shifts, and the ownership of the corresponding item must also be transferred, so the privacy of the original owner and the new owner needs to be protected during the transfer of ownership. In order to protect the privacy of tag's ownership during the transfer process, an RFID tag's ownership transfer protocol base on bitwise operation (PSU-TOTP) is proposed. The proposed protocol uses bitwise cross-synthesis and cross-connect operations to encrypt the transmitted information and reduce the amount of computation at the tag. The flag FLAG is introduced to record the ownership of the current owner. The abstract description of the security model and protocol is given, and the proposed protocol is comprehensively analyzed to meet the corresponding security requirements under the security model. Security analysis shows that the proposed protocol meets the security requirements for the tag ownership transfer. The formalization of GNY logic proves the correctness of the proposed protocol. Performance analysis shows that the proposed protocol can effectively reduce the computational load on the tag side and achieve the goal of reducing the tag's cost. PSU-TOTP is suitable for low-cost RFID systems.

  • 期刊

In commercial fog computing, block-level client-side deduplication (BC-Dedu) can be used to save storage space and network bandwidth. However, the existing BC-Dedu schemes cannot support ownership management, which leads to the degradation of forward and backward secrecy of the outsourced data. Besides, BC-Dedu schemes are vulnerable to the side information leakage issue since the existence of data is revealed to the outside adversary. In this paper, we propose an anti-leakage BC-Dedu scheme that supports ownership management in fog computing. Specifically, we present a dual-level ownership list and key update mechanism to achieve ownership management in the proposed scheme. Besides, we construct a novel deduplication protocol to alleviate the side information leakage issue. Furthermore, a dynamic data storage strategy is proposed to reduce service costs and latency. Security and performance analyses demonstrate that the proposed scheme achieves the desired security requirements while saving resource efficiently.

  • 期刊
Lihua Liu Yang Li Zhengjun Cao 以及其他 1 位作者

Recently, Xiong et al. have proposed a secure data self-destructing scheme [IEEE TCC, vol. 2, no. 4, pp. 448- 458, 2014] in cloud computing. The scheme aims to solve some important security problems by supporting user-defined authorization period and by providing fine-grained access control during the period. The sensitive data will be securely self-destructed after a user-specified expiration time. In this note, it shows that the scheme is awed because its decryption mechanism is incorrect. The consistency between encryption mechanism and decryption mechanism is not kept. We also show that it seems difficult to revise its decryption mechanism.

  • 期刊

The number of devices connected to the Internet has been increasing with the emergence of the Internet of things technology. Although it has many advantages, the weak configuration of Internet of things devices and the higher number of such devices provide a good potential for DDoS (Distributed Denial-of-Service) attacks. In this study, an approach based on SDN (Software Defined Network) and NFV (Network Functions Virtualization) technologies were presented for the purpose of network forensics and DDoS attack detection. In this approach, the entropy-based methods were used as a warning for DDoS attacks. The methods of detecting the fake IP address of the message source and a method based on correlation coefficient were used for separating the legal traffic from allowed traffic from non-allowed traffic. In addition, NFV technology was used for allocating more resources dynamically.

  • 期刊
Jiabin Zhu Wenchao Huang Fuyou Miao 以及其他 3 位作者

The shielding systems, e.g., special-purpose hypervisor, provide more secure environments for security-critical applications (SCAs), compared with traditional computer systems. In this paper, we propose a general framework of formally modeling and verifying the shielding systems for enhancing the security. The framework supports multiples types of shielding systems based on different technologies, such as Intel TXT or TrustZone. It is implemented by stepwise refinement, in which the early steps model the common states, events and security properties among the systems. Then the shielding systems are modeled in latter steps, where all the events are refined from the ones in the previous steps without the requirement of reproving soundness of security properties, e.g., memory isolation, data confidentiality, upon the occurrence of each event. Therefore, the complexity of formally verifying new shielding systems is reduced. We implement the framework in the Coq proof assistant, and find potential security threats in using the shielding systems.

  • 期刊
Hui Tian Zhaohua Zhu Chin-Chen Chang 以及其他 4 位作者

Due to its diversity, sensual and physical redundancies, music is considered as a type of ideal carrier for steganography, and has attracted increasing attention from the research community of information hiding. In this paper, we present a novel note-modulating steganographic scheme for guitar music. Differing from the existing works, the proposed scheme conceals secret messages into guitar accompaniments based on the fact that there are many note combinations available for expressing a group of similar harmony effects. Specifically, the proposed scheme first determines the available tones for information hiding, and then embeds the secret messages by modulating the note combination of each candidate tone with matrix embedding strategies. The embedding process has no appreciable impact on the playing effect of the music, because only a small part of the musical tones in an accompaniment are substituted by the other note combinations that can achieve similar harmony effects. The proposed scheme is further evaluated with thirty guitar-music samples collected from the Internet. The experimental results demonstrate that the proposed scheme is feasible and efficient. Particularly, employing an appropriate matrix embedding strategy, the proposed scheme can achieve a good balance between steganographic transparency and capacity.

  • 期刊
Jintian Lu Xudong He Yitong Yang 以及其他 2 位作者

In recent years, several Identity Federation security protocols have been introduced to enhance the security of Identity authentication. Owning to the complexity, assessing security of Identity Federation security protocols has becoming a hot issue. Hence, in this study, we firstly review the development of formal methods on Identity Federation Security Protocol Based on SAML. And then, an Identity Federation Security Protocol Based on SAML is formalized with Applied PI calculus. After that, the formal model is translated into the inputs of ProVerif. Finally, we run ProVerif to analyze the security properties of Identity Federation Security Protocol Based on SAML. The result shows it has not secrecy, but it has some authentications. At the same time, we present a solution to address the security problems.

  • 期刊

This study examines the proliferation of hoaxes and hate speech through websites and social media in Indonesia. Such provocative content utilizes sectarian issues to at-tack its creators' political opponents. This study finds that hate has been politicized and hoaxes have been com-modified, both for economic and political interests, in cyberspace. There has been a transformation from freedom of speech to freedom to hate, particularly on social networks. This proliferation of hoaxes, as a means of furthering specific political interests, may potentially threaten national security and stability. To overcome the threat posed by cyberhoaxes, the state, industry, and society must take an active role in protecting cyberspace.

  • 期刊

Signcryption is a useful primitive which simultaneously provides the functions of encryption and signature. Certificateless cryptography not only eliminates the key escrow property, but also removes certificates. In a ring signcryption scheme, an entity can anonymously signcrypt a message on behalf of ring members including himself. In this paper, a new certificateless ring signcryption (CLRSC) scheme is proposed, and it is proved to be secure in the random oracle model. In the scheme, it requires only one bilinear pairing operation in signcryption, and three bilinear pairing operations in unsigncryption. To the best of our knowledge, our scheme is more efficient than previous ones in computation.