样式: 排序: IF: - GO 导出 标记为已读
-
Effective and Efficient Android Malware Detection and Category Classification Using the Enhanced KronoDroid Dataset Secur. Commun. Netw. (IF 1.968) Pub Date : 2024-4-8 Mudassar Waheed, Sana Qadir
Android is the most widely used mobile operating system and responsible for handling a wide variety of data from simple messages to sensitive banking details. The explosive increase in malware targeting this platform has made it imperative to adopt machine learning approaches for effective malware detection and classification. Since its release in 2008, the Android platform has changed substantially
-
Securing the Transmission While Enhancing the Reliability of Communication Using Network Coding in Block-Wise Transfer of CoAP Secur. Commun. Netw. (IF 1.968) Pub Date : 2024-3-28 Mohammed D. Halloush
The practical employment of network coding (NC) has shown major improvements when it comes to the transmission reliability of sender data and bandwidth utilization. Moreover, network coding has been employed recently to secure the transmission of data and prevent unauthorized recovery of sender packets. In this paper, we employ network coding (NC) in a practical way in networks with constrained resources
-
Exploring the Security Vulnerability in Frequency-Hiding Order-Preserving Encryption Secur. Commun. Netw. (IF 1.968) Pub Date : 2024-2-29 JiHye Yang, Kee Sung Kim
Frequency-hiding order-preserving encryption (FH-OPE) has emerged as an important tool in data security, particularly in cloud computing, because of its unique ability to preserve the order of plaintexts in their corresponding ciphertexts and enable efficient range queries on encrypted data. Despite its strong security model, indistinguishability under frequency analyzing ordered chosen plaintext attack
-
Toward a Real-Time TCP SYN Flood DDoS Mitigation Using Adaptive Neuro-Fuzzy Classifier and SDN Assistance in Fog Computing Secur. Commun. Netw. (IF 1.968) Pub Date : 2024-2-23 Radjaa Bensaid, Nabila Labraoui, Ado Adamou Abba Ari, Leandros Maglaras, Hafida Saidi, Ahmed Mahmoud Abdu Lwahhab, Sihem Benfriha
The growth of the Internet of Things (IoT) has recently impacted our daily lives in many ways. As a result, a massive volume of data are generated and need to be processed in a short period of time. Therefore, a combination of computing models such as cloud computing is necessary. The main disadvantage of the cloud platform is its high latency due to the centralized mainframe. Fortunately, a distributed
-
Feature-Weighted Naive Bayesian Classifier for Wireless Network Intrusion Detection Secur. Commun. Netw. (IF 1.968) Pub Date : 2024-1-3 Hongjiao Wu
Objective. Wireless sensor networks, crucial for various applications, face growing security challenges due to the escalating complexity and diversity of attack behaviours. This paper presents an advanced intrusion detection algorithm, leveraging feature-weighted Naive Bayes (NB), to enhance network attack detection accuracy. Methodology. Initially, a feature weighting algorithm is introduced to assign
-
A Postquantum Linkable Ring Signature Scheme from Coding Theory Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-12-26 Xindong Liu, Li-Ping Wang
Linkable ring signatures (LRSs) are ring signatures with the extended property that a verifier can detect whether two messages were signed by the same ring member. LRSs play an important role in many application scenarios such as cryptocurrency and confidential transactions. The first code-based LRS scheme was put forward in 2018. However, this scheme was pointed out to be insecure. In this paper,
-
MC-MLDCNN: Multichannel Multilayer Dilated Convolutional Neural Networks for Web Attack Detection Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-12-22 Nazanin Moarref, Mehmet Tahir Sandıkkaya
The explosive growth of web-based technology has led to an increase in sophisticated and complex attacks that target web applications. To protect against this growing threat, a reliable web attack detection methodology is essential. This research aims to provide a method that can detect web attacks accurately. A character-level multichannel multilayer dilated convolutional neural network (MC-MLDCNN)
-
Stackelberg Security Game for Optimizing Cybersecurity Decisions in Cloud Computing Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-12-11 Abdelkarim Ait Temghart, Mbarek Marwan, Mohamed Baslam
As it is difficult to cover all cybersecurity threats, an optimal defense strategy is one of the focal issues in cloud computing due to its dynamic abstraction and scalability. On this basis, Stackelberg security games (SSG) have received significant attention for their better deployment of limited security. To deal with uncertainty and incomplete information, we introduce a modified quantal response
-
An Improved Big Data Analytics Architecture for Intruder Classification Using Machine Learning Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-12-4 Muhammad Babar, Sarah Kaleem, Adnan Sohail, Muhammad Asim, Muhammad Usman Tariq
The approval of retrieving information on the Internet originates several network securities matters. Intrusion recognition is a critical study in network security to spot unauthorized admission or occurrences on protected networks. Intrusion detection has a fully-fledged reputation in the current era. Research emphasizes several datasets to upsurge system precision and lessen the false-positive proportion
-
High Payload Lossless Steganography Using Image Interpolation Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-11-28 Raju Pratap Sharma, Aruna Malik, Samayveer Singh, Saurabh Agarwal, Rajeev Kumar
Interpolation-based reversible data hiding (IRDH) is a method for embedding data in a reversible manner into digital images. It is based on the polynomial interpolation to hide the secret data bit stream in the coefficients of the interpolation polynomial. In this paper, an IRDH method that combines a modified neighbor mean interpolation is presented with a new method for reversibly embedding secret
-
Feasibility Analysis of Cracking RSA with Improved Quantum Circuits of the Shor’s Algorithm Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-11-24 Xia Liu, Huan Yang, Li Yang
Since the RSA public key cryptosystem was proposed, it has been widely used because of its strong security. Although the proposal of the Shor’s algorithm offers hope for cracking RSA, it is debatable whether the algorithm can actually pose a threat in practice. From the perspective of the quantum circuit of the Shor’s algorithm, we analyse the feasibility of cracking RSA with improved quantum circuits
-
SCARE of Secret Ciphers under Rough Leakage Model Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-11-23 Mengxing Wang, Ming Tang, Xige Zhang, Qi Chen, Haili Ding
Most previousside-channel analysis-based reverse engineering (SCARE) methods were based on collision attack. However, the collision-based methods generally need noise-free traces and can hardly be verified by realistic implementations. This paper proposes a novel SCARE, which is named as OSHDG-SCARE, targeting on secret S-box. We define a graph as OSHDG (one-step HD graph) to recover the parameters
-
Deep Forest-Based E-Commerce Recommendation Attack Detection Model Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-11-21 Zhu Mingxun, Yin Jiewu, Meng Zhigang, Wang Yanping
With the advancement of Internet, recommendation systems have become an indispensable component for every e-commerce platform, playing an increasingly pivotal role in product recommendations. However, due to the recommendation mechanisms of these systems, numerous new attack patterns have emerged. A novel attack pattern targeting e-commerce recommendation systems, termed the “Ride Item’s Coattails”
-
Deep Graph Embedding for IoT Botnet Traffic Detection Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-10-25 Bonan Zhang, Jingjin Li, Lindsay Ward, Ying Zhang, Chao Chen, Jun Zhang
Botnet attacks have mainly targeted computers in the past, which is a fundamental cybersecurity problem. Due to the booming of Internet of things (IoT) devices, an increasing number of botnet attacks are now targeting IoT devices. Researchers have proposed several mechanisms to avoid botnet attacks, such as identification by communication patterns or network topology and defence by DNS blacklisting
-
Machine Learning-Based Jamming Detection for Safety Applications in Vehicular Networks: Individual Detection? Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-10-12 Huong Nguyen-Minh, Tung Tran Hoang, Giang Pham Thanh
Intelligent transportation system (ITS) refers to advanced applications to make transportation safer and more intelligent. The dynamic and diverse natures of the system have been creating many challenges in ITS deployment and security. The progression in recent years of machine learning provides potentially strong methods to exploit data sources from transportation networks. Machine learning-based
-
One-Class Fake Speech Detection Based on Improved Support Vector Data Description Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-10-4 Jinghong Zhang, Xiaowei Yi, Xianfeng Zhao
With the development of deep neural synthesis methods, speech forgery techniques based on text-to-speech (TTS) and voice conversion (VC) pose a serious threat to auto speaker verification (ASV) systems. Some studies show that the attack success rate of deep synthetic speech on ASV systems can reach about 90%. Existing detection methods improve the detection generalization of known forgery methods by
-
Guarding Your Social Circle: Strategies to Protect Key Connections and Edge Importance Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-9-28 Nisha P. Shetty, Balachandra Muniyal, Akshat Dokania, Sohom Datta, Manas Subramanyam Gandluri, Leander Melroy Maben, Aman Priyanshu
With the growing use of social networks and the consequent rise in the sharing of personal information online, privacy has become a major concern, leading to an increased demand for efficient anonymization techniques. This research proposes innovative methods for hiding information in weighted social network graphs. We provide a topology-modification technique for precisely hiding important nodes in
-
Secure Low-Energy Routing Protocol Based on Dynamic Trust Awareness and Load Balancing in Wireless Sensor Networks Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-9-9 Yuan Xiaogang
Since wireless sensor networks (WSNs) have the requirements of high security and energy conservation, a distributed secure low-energy routing protocol (SLERP) based on dynamic trust awareness and load balancing is proposed. In order to reduce the adverse influence of malicious nodes in the network, the Chebyshev neural network is used to predict the dynamic trust degree of network nodes to accelerate
-
Metamorphic Malware and Obfuscation: A Survey of Techniques, Variants, and Generation Kits Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-9-2 Kenneth Brezinski, Ken Ferens
The competing landscape between malware authors and security analysts is an ever-changing battlefield over who can innovate over the other. While security analysts are constantly updating their signatures of known malware, malware variants are changing their signature each time they infect a new host, leading to an endless game of cat and mouse. This survey looks at providing a thorough review of obfuscation
-
Towards Efficient Federated Learning Using Agile Aggregation in Internet of Vehicles Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-9-1 Xin He, Xiaolin Hu, Guanghui Wang, Junyang Yu, Zhanghong Zhao, Xiaobin Lu
Federated learning is an enabling technology for the services in Internet of vehicles because it can effectively alleviate privacy issues in data circulation and diversified intelligent applications. However, existing federated learning methods still confront the problem of low computational efficiency when applied to the scenario of high-dynamic vehicles. In order to address this problem, we present
-
Investigation of Different Mechanisms to Detect Misbehaving Nodes in Vehicle Ad-Hoc Networks (VANETs) Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-8-21 Ainaz Nobahari, Danial Bakhshayeshi Avval, Abbas Akhbari, Solmaz Nobahary
The vehicle ad-hoc network (VANET) is a crucial technology that will play a significant role in shaping the future of transition systems, which is widely used as a subset of ad-hoc networks. VANET aims to ensure driver safety by establishing independent communication with nearby vehicles. A key requirement for successful data transmission is cooperation among nodes, as factors such as high mobility
-
PSI-CA-Based Vehicle Selection Scheme for Data Sharing in Internet of Vehicles Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-8-19 Zhengtao Jiang, Ting Yu, Ye Chen, Huiqiang Li, Xiaoxuan Guo
In recent years, the development of the Internet of Vehicles (IoV) has led to an increase in the demand for data sharing services for the IoV. In the era of big data, safe and convenient data sharing services for IoV are inseparable from the support of reliable data. With the increase in the number of smart cars, how to filter the data provided by vehicles while protecting privacy to improve the quality
-
Exploring Frame Difference to Enhance Robustness for Video Steganography on Social Networks Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-8-16 Pingan Fan, Hong Zhang, Xianfeng Zhao
The proliferation of video sharing on social networks has created a novel avenue for covert communication. Since most social networking channels are lossy, researchers have devoted efforts to robust video steganography to establish covert communication on social networks. Although there are various methods available, they often overlook the differences between frames in a video and are designed for
-
Single-Tiered Hybrid PoW Consensus Protocol to Encourage Decentralization in Bitcoin Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-7-15 Gyu Chol Kim, Gang Song Han, Ryong Chol Kim, Yong Bok Jong, Nam Hyok Kim, Il Min Han, Ung Il Han
We propose a single-tiered hybrid proof-of-work consensus protocol to encourage decentralization in bitcoin. Our new mechanism comprises coupled puzzles from which properties differ from each other; the one is the extant outsourceable bitcoin puzzle while the other is nonoutsourceable. Our new protocol enables miners to solve either puzzle as they want; therefore, blocks can be generated by either
-
HCV: Practical Multi-Keyword Conjunctive Query with Little Result Pattern Leakage Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-7-11 Xueling Zhu, Shaojing Fu, Huaping Hu, Qing Wu, Bo Liu
Multi-keyword conjunctive query is the most common searchable encryption (SE) scheme and gives practical search capability. This paper focuses on constructing a conjunctive query scheme with high privacy and accurate query result. For efficiency, this paper introduces a novel counter vector (CV) data structure instead of inverted index and builds the CV index database with three-tuple keywords. We
-
Adaptive Sensitive Information Recognition Based on Multimodal Information Inference in Social Networks Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-7-7 Peiyu Ji, Fangfang Shan, Fuyang Li, Huifang Sun, Mengyi Wang, Dalong Shan
With the advent of the multimedia era, the identification of sensitive information in social data of online social network users has become critical for maintaining the security of network community information. Currently, traditional sensitive information identification techniques in online social networks cannot acquire the full semantic knowledge of multimodal data and cannot learn cross-information
-
PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-7-3 John Kwao Dawson, Frimpong Twum, James Benjamin Hayfron Acquah, Yaw Marfo Missah
Industries have embraced cloud computing for their daily operations due to the volume of data they create. As data generation and consumption have increased, the challenges and opportunities have also increased. Researchers have proposed various cryptographic schemes to secure data on the cloud. Regardless of the multiple cryptographic schemes proposed, security remains an obstacle to cloud computing’s
-
A Management Specification for Data Sharing Security in the System Construction of Smart Mine Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-29 Haitao Wang, Lina Tan, Yang Zhang, Qiwen Gong, Shan Zhang, Yanan Ren, Tao He
With the development of Internet of Things technology and the informatization of the coal industry, various intelligent applications have emerged in the process of the system construction of the smart mine. During this process, data sharing is essential to the effective use of data resources in the smart mine. In order to improve the protection of coal mine data, this study proposes a set of management
-
Vision Transformer-Based Video Hashing Retrieval for Tracing the Source of Fake Videos Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-28 Pengfei Pei, Xianfeng Zhao, Jinchuan Li, Yun Cao, Xuyuan Lai
With the increasing negative impact of fake videos on individuals and society, it is crucial to detect different types of forgeries. Existing forgery detection methods often output a probability value, which lacks interpretability and reliability. In this paper, we propose a source-tracing-based solution to find the original real video of a fake video, which can provide more reliable results in practical
-
HTTP Cookie Covert Channel Detection Based on Session Flow Interaction Features Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-26 Wenxin Yuan, Xingshu Chen, Yi Zhu, Xuemei Zeng, Yawei Yue
HTTP cookie covert channel is a covert communication method that encodes malicious information in cookie fields to escape regulatory audits. It is difficult to detect this kind of covert channel according to the cookie content because cookie fields are mainly encoded in custom modes. To effectively identify the HTTP cookie covert channel, this paper proposes a detection method based on the interaction
-
Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-19 Daniela Pöhn, Wolfgang Hommel
Digital transformation with the adoption of cloud technologies, outsourcing, and working-from-home possibilities permits flexibility for organizations and persons. At the same time, it makes it more difficult to secure the IT infrastructure as the IT team needs to keep track of who is accessing what data from where and when on which device. With these changes, identity management as a key element of
-
Nesting Circles: An Interactive Visualization Paradigm for Network Intrusion Detection System Alerts Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-16 Mohammad-Salar Shahryari, Leyli Mohammad-Khanli, Majid Ramezani, Leili Farzinvash, Mohammad-Reza Feizi-Derakhshi
Intrusion detection systems (IDSs) are valuable tools for fighting against those who want to intrude on the network and steal sensitive information for any reason. These tools, however, have difficulties in their essence. The generated alerts are in textual format, and extracting the exact information from the textual files needs lots of time and scrutiny. Also, not all alerts are accurate, and these
-
Adversarial Attacks on Large Language Model-Based System and Mitigating Strategies: A Case Study on ChatGPT Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-10 Bowen Liu, Boao Xiao, Xutong Jiang, Siyuan Cen, Xin He, Wanchun Dou
Machine learning algorithms are at the forefront of the development of advanced information systems. The rapid progress in machine learning technology has enabled cutting-edge large language models (LLMs), represented by GPT-3 and ChatGPT, to perform a wide range of NLP tasks with a stunning performance. However, research on adversarial machine learning highlights the need for these intelligent systems
-
Distributed Public Key Certificate-Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-7 Keita Kumagai, Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito
With the development of cloud services and the Internet of Things, the integration of heterogeneous systems is becoming increasingly complex. Identity management is important in the coordination of various systems, and public key infrastructure (PKI) is widely known as an identity management methods. In PKI, a certificate authority (CA) acts as a trust point to guarantee the identity of entities such
-
A Low-Overhead Auditing Protocol for Dynamic Cloud Storage Based on Algebra Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-3 Fudong Ding, Libing Wu, Zhuangzhuang Zhang, Xianfeng Wu, Chao Ma, Qin Liu
With the widespread adoption of cloud storage, ensuring the integrity of outsourced data has become increasingly important. Various cloud storage auditing protocols based on public key cryptography have been proposed. However, all of them require complex cryptographic operations and incur significant storage and communication costs. To address the issues of significant storage overhead for data tags
-
An IoT-Enabled Intelligent and Secure Manufacturing Model Using Blockchain in Hybrid Cloud Communication System Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-1 Sudipto Bhattacharyya, Senthil Athithan, Souvik Pal, Bikramjit Sarkar, D. Akila, Subrata Chowdhury, Karthik Chandran, Saravanakumar Gurusamy
The smart manufacturing system can become a linked network with the help of the Internet of Things (IoT). Devices connected to the IoT are susceptible to various attacks and assaults. An effective protection plan is needed to ensure that the billions of IoT nodes are protected from these hazards. The security mechanisms on IoT devices are ineffective due to resource limitations. As a result, the academic
-
A Secure and Efficient Multi-Object Grasping Detection Approach for Robotic Arms Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-6-1 Hui Wang, Jieren Cheng, Yichen Xu, Sirui Ni, Zaijia Yang, Jiangpeng Li
Robot grasping is one of the most important abilities of modern intelligent robots, especially industrial robots. However, most of the existing robot arm’s grasp detection work is highly dependent on their edge computing ability, and the safety problems in the process of grasp detection are not considered enough. In this paper, we propose a new robotic arm grasping detection model with an edge-cloud
-
An Anomaly Detection Approach Based on Integrated LSTM for IoT Big Data Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-30 Chao Li, Yuhan Fu, Rui Zhang, Hai Liang, Chonghua Wang, Junjian Li
Due to the expanding scope of Industry 4.0, the Internet of Things has become an important element of the information age. Cyber security relies heavily on intrusion detection systems for Internet of Things (IoT) devices. In the face of complex network data and diverse intrusion methods, today’s network security environment requires more suitable machine learning methods to meet its security needs
-
IoT Security Detection Method Based on Multifeature and Multineural Network Fusion Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-29 Zihao Zhu, Leilei Zhang, Jianhua Liu, Xianer Ying
IoT security detection plays an important role in securing the IoT ecosystem. The current detection systems suffer from poor fault tolerance and inefficient detection results. To address the IoT security vulnerability, the paper designs a multifeature fusion-based IoT security detection model to simulate an attacker sending test commands to IoT nodes. Firstly, the data collection algorithm is introduced
-
Container Scaling Strategy Based on Reinforcement Learning Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-26 Huaijun Wang, Chenfei Zhang, Junhuai Li, Dan Bao, Jiang Xu
Elasticity capability is one of the most important capabilities of cloud computing, which combines large-scale resource allocation capability to quickly achieve minute-level resource demand provisioning to meet the elasticity requirements of different scale scenarios. The elasticity capability is mainly determined by the container start-up speed and container scaling strategy together, where the container
-
Blockchain for Credibility in Educational Development: Key Technology, Application Potential, and Performance Evaluation Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-22 Yan Wang, Xin Cong, Lingling Zi, Qiuyan Xiang
Blockchain proposes many innovative technologies to establish credible mechanisms in an open environment and therefore, it becomes a promising solution to the problem of credibility in educational development. To better understand the role of the blockchain, we aim to provide an extensive survey focusing on its key technology, application potential, and performance evaluation. First, from the perspective
-
IOT and Blockchain-Based Cloud Model for Secure Data Transmission for Smart City Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-20 Liwa H. Al-Farhani, Yahya Alqahtani, Hamdan Ali Alshehri, R. John Martin, Sachin Lalar, Rituraj Jain
The widespread use of the Internet of Things (IoT) technology has both good and bad things about it. There must be a full and reliable security system in place for the Internet of Things so that things can work together in a safe way and intrusions cannot happen. There are now many more ways to keep the Internet of Things safe, thanks to a detecting system. As machine learning and deep learning technologies
-
Contract-Based Incentive Mechanism for Redactable Proof-of-Stake Blockchains Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-17 Yumei Wang, Yongdong Wu, Junzuo Lai
Blockchain has received a lot of attention due to its immutability. However, the immutability characteristic prohibits editing the blocks which need to be modified. Although the existing redactable blockchain enables to manipulate blocks in a controlled way, it may suffer from the security threats if the number of honest committee members (CMs) is insufficient. Thus, to attract honest CMs for validating
-
Network Traffic Classification Based on SD Sampling and Hierarchical Ensemble Learning Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-17 Jian Qin, Xueying Han, Chonghua Wang, Qing Hu, Bo Jiang, Chen Zhang, Zhigang Lu
With the increase in cyber threats in recent years, there have been more forms of demand for network security protection measures. Network traffic classification technology is used to adapt to the dynamic threat environment. However, network traffic has a natural unbalanced class distribution problem, and the single model leads to the low accuracy and high false-positive rate of the traditional detection
-
Self-Sovereign Identity for Consented and Content-Based Access to Medical Records Using Blockchain Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-16 Marie Tcholakian, Karolina Gorna, Maryline Laurent, Hella Kaffel Ben Ayed, Montassar Naghmouchi
Electronic health records (EHRs) and medical data are classified as personal data in every privacy law, meaning that any related service that includes processing such data must come with full security, confidentiality, privacy, and accountability. Solutions for health data management, as in storing it, sharing and processing it, are emerging quickly and were significantly boosted by the COVID-19 pandemic
-
FACSC: Fine-Grained Access Control Based on Smart Contract for Terminals in Software-Defined Network Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-15 Bingcheng Jiang, Qian He, Mingliu He, Zhongyi Zhai, Baokang Zhao
Physical terminals provide network services to upper-layer applications, but their limited memory and processing power make it challenging to perform security updates and patches, leaving them vulnerable to known security threats. Attackers can exploit these weaknesses to control the terminals and attack the network. To restrict unauthorized access to the network and its resources, appropriate access
-
Local Corner and Motion Key Point Trajectory Extraction for Facial Forgery Identification Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-15 Qingtong Liu, Ziyu Xue
At present, the development of deep forgery technology has brought new challenges to media content forensics, and the use of deep forgery identification methods to identify forged audio and video has become a significant focus of research and difficulty. Deep forgery technology and forensic technology play a mutual game and promote each other’s development. This paper proposes a spatiotemporal local
-
KTSDroid: A Framework for Android Malware Categorization Using the Kernel Task Structure Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-13 Saneeha Khalid, Khalid Imran, Faisal Bashir Hussain
The penetration of malicious applications in the Android market has enhanced the significance of designing malware mitigation systems for Android. Malware detection systems are being developed by examining applications using static and dynamic analysis techniques. The use of code obfuscation has highlighted the importance of dynamic analysis as many static analysis schemes can be evaded by code obfuscation
-
Blockchain-Based Privacy-Preserving Sensor Data Sharing with Fine-Grained Authorization in Microgrid Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-11 Jinhu Yu, Yue Han, Kai Zhang, Siyuan Chen, Jinguo Li
Microgrid is a power system that includes various energy sources (e.g., solar panels and wind turbines), where a number of device status and sensing data are collected and transmitted by smart sensors. Based on sensing-as-a-service in microgrid, sensor owners and sensor data consumers can effectively perform data sharing operations. However, the state-of-the-art sensor data sharing works in microgrid
-
Defending Privacy Inference Attacks to Federated Learning for Intelligent IoT with Parameter Compression Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-11 Yongsheng Zhu, Hongbo Cao, Yuange Ren, Wanqi Wang, Bin Wang, Mingqing Hu, Baigen Cai, Wei Wang
Federated learning has been popularly studied with people’s increasing awareness of privacy protection. It solves the problem of privacy leakage by its ability that allows many clients to train a collaborative model without uploading local data collected by Internet of Things (IoT) devices. However, there are still threats of privacy leakage in federated learning. The privacy inference attacks can
-
Efficient Compression Sensing Mechanism Based WBAN System Using Blockchain Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-11 Vinay Pathak, Karan Singh, Radha Raman Chandan, Sachin Kumar Gupta, Manoj Kumar, Shashi Bhushan, Sujith Jayaprakash
The hybrid wireless sensor network is made up of Wireless Body Area Network (WBAN). Generally, many hospitals use cellular networks to support telemedicine. To provide the treatment to the patient on time, for this, an early diagnosis is required, for treatment. With the help of WBANs, collections and transmissions of essential biomedical data to monitor human health becomes easy. Compressor Sensing
-
Workload-Aware WiNoC Design with Intelligent Reconfigurable Wireless Interface Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-9 Qi Wang, Yiming Ouyang, Zhengfeng Huang, Huaguo Liang
By introducing wireless interfaces in conventional wired routers or hubs, wireless network-on-chip (WiNoC) is proposed to relieve congestion pressure from high volume inter-subnet data transmission. Generally, processing elements on chip receive input data and return feedback through network interface, and data transmission function in Network-on-Chip (NoC) is completed by routers. Hubs equipped with
-
DeepDefense: A Steganalysis-Based Backdoor Detecting and Mitigating Protocol in Deep Neural Networks for AI Security Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-9 Lei Zhang, Ya Peng, Lifei Wei, Congcong Chen, Xiaoyu Zhang
Backdoor attacks have been recognized as a major AI security threat in deep neural networks (DNNs) recently. The attackers inject backdoors into DNNs during the model training such as federated learning. The infected model behaves normally on the clean samples in AI applications while the backdoors are only activated by the predefined triggers and resulted in the specified results. Most of the existing
-
CRT-Based Homomorphic Encryption over the Fraction Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-8 De Zhao, Haiyang Ding, Zhenzhen Li, Zhenzhen Zhang, Zichen Li, Jing Gao
Homomorphic encryption technology is the holy grail of cryptography and has a wide range of applications in practice. This paper proposes a homomorphic encryption scheme over the fraction based on the Chinese remainder theorem (CRT) Dayan qiuyi rule. This homomorphic scheme performs encryption and decryption operations by forming congruence groups and has homomorphism. The solution in this paper first
-
Twitter Bots in Cyber-Physical-Social Systems: Detection and Estimation Based on the SEIR Model Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-8 Weisha Zhang, Jiazhong Lu, Yulin Liu, Xiaojun Liu
Bots are now part of the social media landscape, and thus, a threat to cyber-physical-social systems (CPSSs). A better understanding of their characteristic behaviors and estimation of their impact on public opinion could help improve the algorithms to identify bots and help develop strategies to reduce their influence. The cosine function-based algorithm is able to compare the similarity between tweets
-
A Lightweight Cryptographic Algorithm Based on DNA Computing for IoT Devices Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-8 Gamil R. S. Qaid, Nadhem Sultan Ebrahim
Internet of Things (IoT) applications are used in almost every part of our life, so it is important to protect the sensitive data and information that is transmitted over wireless networks such as images and documents. The IoT devices have limited computational resources; they are called limited devices due to their limited processors and memory size. Traditional encryption methods require a lot of
-
DQfD-AIPT: An Intelligent Penetration Testing Framework Incorporating Expert Demonstration Data Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-4 Yongjie Wang, Yang Li, Xinli Xiong, Jingye Zhang, Qian Yao, Chuanxin Shen
The application of reinforcement learning (RL) methods of artificial intelligence for penetration testing (PT) provides a solution to the current problems of high labour costs and high reliance on expert knowledge for manual PT. In order to improve the efficiency of RL algorithms for PT, existing research has considered bringing in the knowledge of PT experts and combining it with the use of imitative
-
Uncovering Resilient Actions of Robotic Technology with Data Interpretation Trajectories Using Knowledge Representation Procedures Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-3 Yuvaraja Teekaraman, Irina Kirpichnikova, Hariprasath Manoharan, Ramya Kuppusamy, Arun Radhakrishnan
This article highlights the importance of learning models which prevent the resilient attack of robotic technology with a subset of trajectories. Many complement models are introduced in the field of path planning robots without any knowledge of representation procedures, so robotic data are subject to different attacks from several users. During such attacks, the data will be misplaced and commands
-
Explore Gap between 3D DNN and Human Vision Utilizing Fooling Point Cloud Generated by MEHHO Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-5-2 Linkun Fan, Fazhi He, Bing Li, Xiaoxin Gao, Jinkun Luo
Deep neural network (DNN) has replaced humans to make decisions in many security-critical senses such as face recognition and automatic drive. Essentially, researchers try to teach DNN to simulate human behavior. However, many evidences show that there is a huge gap between humans and DNN, which has raised lots of security concern. Adversarial sample is a common way to show the gap between DNN and
-
Reversible Data Hiding in Encrypted Image via Joint Encoding of Multiple MSB and Pixel Difference Secur. Commun. Netw. (IF 1.968) Pub Date : 2023-4-29 Ping Kong, Di Fu, Lin Huang, Liang Zhou, Jian Li, Chuan Qin
Reversible data hiding in encrypted image (RDHEI) has become a research hotspot, which can effectively protect image content privacy. An RDHEI scheme based on the joint encoding of multiple MSBs (most significant bits) and pixel difference is proposed in this paper. A block-based image encryption method is adopted on the content owner side, which can securely protect the image contents while retaining