security problem
Recently Published Documents


TOTAL DOCUMENTS

477
(FIVE YEARS 156)

H-INDEX

17
(FIVE YEARS 3)

2022 ◽  
Vol 355 ◽  
pp. 03030
Author(s):  
Chao Ma ◽  
Hao Zhao ◽  
Tong Wang

With the rapid development of the automotive industry and the wide application of 5G network technology, there are more and more Telematics Box (T-Box) equipped with intelligent operating systems in vehicles and they are becoming more and more complex. Because it is connected to the on-board CAN bus internally and interconnects with mobile phone /PC through the cloud platform externally, the security of T-Box must be fully guaranteed, to make the automotive more secure. T-Box can realize remote control function, so the T-Box information security problem has been paid more and more attention. In this paper, the T-Box were tested from multiple dimensions by using various methods, and the results were statistically analyzed, and the corresponding protection strategies were proposed for the corresponding security risks.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Jing Zhang ◽  
Rongxia Qin ◽  
Ruijie Mu ◽  
Xiaojun Wang ◽  
Yongli Tang

The development of edge computing and Internet of Things technology has brought convenience to our lives, but the sensitive and private data collected are also more vulnerable to attack. Aiming at the data privacy security problem of edge-assisted Internet of Things, an outsourced mutual Private Set Intersection protocol is proposed. The protocol uses the ElGamal threshold encryption algorithm to rerandomize the encrypted elements to ensure all the set elements are calculated in the form of ciphertext. After that, the protocol maps the set elements to the corresponding hash bin under the execution of two hash functions and calculates the intersection in a bin-to-bin manner, reducing the number of comparisons of the set elements. In addition, the introduction of edge servers reduces the computational burden of participating users and achieves the fairness of the protocol. Finally, the IND-CPA security of the protocol is proved, and the performance of the protocol is compared with other relevant schemes. The evaluation results show that this protocol is superior to other related protocols in terms of lower computational overhead.


Drones ◽  
2021 ◽  
Vol 6 (1) ◽  
pp. 10
Author(s):  
Tsu-Yang Wu ◽  
Xinglan Guo ◽  
Yeh-Cheng Chen ◽  
Saru Kumari ◽  
Chien-Ming Chen

At present, the great progress made by the Internet of Things (IoT) has led to the emergence of the Internet of Drones (IoD). IoD is an extension of the IoT, which is used to control and manipulate drones entering the flight area. Now, the fifth-generation mobile communication technology (5G) has been introduced into the IoD; it can transmit ultra-high-definition data, make the drones respond to ground commands faster and provide more secure data transmission in the IoD. However, because the drones communicate on the public channel, they are vulnerable to security attacks; furthermore, drones can be easily captured by attackers. Therefore, to solve the security problem of the IoD, Hussain et al. recently proposed a three-party authentication protocol in an IoD environment. The protocol is applied to the supervision of smart cities and collects real-time data about the smart city through drones. However, we find that the protocol is vulnerable to drone capture attacks, privileged insider attacks and session key disclosure attacks. Based on the security of the above protocol, we designed an improved protocol. Through informal analysis, we proved that the protocol could resist known security attacks. In addition, we used the real-oracle random model and ProVerif tool to prove the security and effectiveness of the protocol. Finally, through comparison, we conclude that the protocol is secure compared with recent protocols.


2021 ◽  
Vol 16 (4) ◽  
pp. 326-336
Author(s):  
Nataliya N. Vozhzhova ◽  
Olga S. Zhogaleva ◽  
Natia T. Kupreyshvili ◽  
Angelina Y. Dubina ◽  
Pavel I. Kostylev

Rice is one of the most widespread and cultivated crops in the world. It is necessary to increase the yield of crops or expand their sown areas to resolve a food security problem in Russia. Current impossibility of expanding rice cultivated areas in the Rostov region and the need to maintain and increase its yield require developing new disease-resistant varieties. Rice genotypes with multiple blast resistance genes avoid significant yield losses. Since pyramiding and selection of resistance genes in the same genotype through traditional selection methods are complicated, it is urgent to search for homozygous samples using marker-assisted selection methods. This study was aimed to identify Pi-1, Pi-2, Pi-33 and Pi-ta blast resistance genes in breeding rice samples by MAS-methods. The study used CTAB-method for DNA-isolation, PCR, electrophoresis on agarose and polyacrylamide gels. The resulting gels were stained in a solution of ethidium bromide and photographed in ultraviolet light. To control the presence of blast resistance genes the following parental cultivars were used: C104LAC for the Pi-1 and Pi-33 genes, C101-A-51 for the Pi-2 gene, IR36 for the Pi-ta gene; Novator and Boyarin as controls of non-functional alleles of all studied genes. The 446 selection samples of the seventh generation were analyzed. As a result of the research, 127 rice samples that combine 2 or 3 different blast resistance genes were identified. The Pi-2 and Pi-33 genes combination was identified in 43 samples (1128/1, 1149/3, 1171/2, 1177/3, 1177/4, 1186/4, et al.). Samples with three resistance genes are the most interesting for selection and further breeding. For developing new blast-resistant varieties, we recommend using rice samples with the following combinations of resistance genes Pi-1+Pi-2+Pi-33 (1197/1, 1226/2, 1271/1, 1272/2), Pi-1+Pi-2+Pi-ta (1197/4, 1304/2, 1304/3, 1482/3, 1482/4, 1486/1) and Pi-2+Pi-33+Pi-ta (1064/1, 1064/3, 1281/2, 1281/3, 1281/4, 1282/2, 1283/1, 1283/2, 1284/3).


Author(s):  
Андрей Иванович Костюк ◽  
Наталия Михайловна Коробейникова

Описаны методы построения высокопроизводительной отказоустойчивой распределенной базы данных для задачи охраны периметра. Представлена архитектура подсистемы отказоустойчивости, архитектура подсистемы резервного копирования, описаны подходы к достижению заданных ключевых показателей. Проведено исследование производительности системы, определены ключевые показатели эффективности, достигаемые подсистемой обеспечения отказоустойчивости. The paper discusses the methods for constructing a high-performance fault-tolerant distributed database for the perimeter security problem. The architecture of the fault tolerance subsystem, the architecture of the backup subsystem, and approaches to achieving the specified key indicators are described. The study of the system performance was carried out, the values of the key performance indicators achieved by the fault tolerance subsystem were determined.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Yongli Tang ◽  
Ying Li ◽  
Zongqu Zhao ◽  
Jing Zhang ◽  
Lina Ren ◽  
...  

With the advent of large-scale social networks, two communication users need to generate session keys with the help of a remote server to communicate securely. In the existing three-party authenticated key exchange (3PAKE) protocols, users’ passwords need to be stored on the server; it cannot resist the server disclosure attack. To solve this security problem, we propose a more efficient 3PAKE protocol based on the verification element by adopting a public-key cryptosystem and approximate smooth projection hash (ASPH) function on an ideal lattice. Using the structure of separating authentication from the server, the user can negotiate the session key only after two rounds of communication. The analysis results show that it can improve the efficiency of computation and communication and resist the server disclosure attack, quantum algorithm attack, and replay attack; moreover, it has session key privacy to the server. This protocol can meet the performance requirement of the current communication network.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Lina Zhang ◽  
Tong Wang ◽  
Xiangqin Zheng ◽  
Junhan Yang ◽  
Liping Lv

Internet of things (IoT) has been developed and applied rapidly because of its huge commercial value in recent years. However, security problem has become a key factor restricting the development of IoT. The nodes of IoT are easy to be impersonated or replaced when attacked, which leads to the mistake of the uploaded data, the abnormal use of the application, and so on. Identifying the authenticity of the data submitted by the nodes is the top priority. We propose a scheme to verify the authenticity of multinode data. In this scheme, the authenticity of node data is checked through visual secret recovery and XOR operation together. The least significant bit (lsb) operation converts data from nodes into a bit, which improves the efficiency of data verification and reduces the risk of data leakage. This scheme achieves the purpose of verifying the data provided by the node, which avoids malicious attacks from illegal nodes. By analyzing the experiment result and comparing with other works, our scheme has the advantages of high verification efficiency, lightweight storage of nodes, and security verification.


Author(s):  
Jingyi Shen ◽  
Yun Yao ◽  
Hao Mei

Copy-paste tampering is a common type of digital image tampering, which refers to copying a part of the image area in the same image, and then pasting it into another area of the image to generate a forged image, so as to carry out malicious operations such as fraud and framing. This kind of malicious forgery leads to the security problem of digital image. The research of digital image copy paste forensics has important theoretical significance and practical value. For digital image copy-paste tampering, this paper is based on moment invariant image copy paste tampering detection algorithm, and use Matlab software to design the corresponding tampering forensics system.


Author(s):  
Madan Mohan ◽  
◽  
Aadarsh Malviya ◽  
Anuranjan Mishra ◽  
◽  
...  

Big Data is the way to go especially for the large companies which keep a lot of information on the systems. This paper delves into the new challenges associated with big data. It points out safety challenges on Big Data as the main issues that organizations seek to address on a day-to-day basis. These challenges include securing the trusted environments, sufficient access management, performing due diligence, combating AVI vulnerabilities, and security automation. They can be solved by maintaining strict access strategies that only allow their esteemed and responsible employees to login and also set the systems in such a way that they can detect abnormalities and allow for investigations while there is still time. The paper has addressed big data challenges as well as their solutions which are always be considered in the case of the organization as they have long-term consequences if not put into consideration.


2021 ◽  
Vol 16 (95) ◽  
pp. 16-32
Author(s):  
Emil A. Gumerov ◽  
◽  
Tamara V. Alekseeva ◽  

The development of the digital economy in the modern world requires solving the issue of security of Industrial Internet of Things (IIoT) applications. A large number of distributed, network-based, IIoT devices managed by intelligent programs (software agents) require protection. A successful attack on any IIoT device will lead to hacking of the IIoT application and to large financial losses, as well as to the termination of the IIoT application, therefore, the research topic is relevant. The purpose of this article is to radically solve the security problem of the IIoT application by developing a blockchain architecture of the application. The authors were tasked with investigating all aspects of the blockchain system that ensure the security of IIoT application devices. The peculiarity of the blockchain system is that its participants are software agents that control the application devices. As a result of the research, the concept of the blockchain architecture of the IIoT application is proposed. He mechanisms of consensus of intelligent programs of IIoT devices as equal active participants of the blockchain network are investigated. The consensus mechanism and the cryptographic system of the distributed registry of the blockchain network increase the information security of the IIoT application. The synergistic effect of the blockchain system and intelligent systems of software agents of IIoT application devices significantly increases the efficiency of the solution. Intelligent systems of software agents and IIoT applications are effectively trained on the blockchain platform, and as a result, we get a decentralized supercomputer in the form of a blockchain system.


Sign in / Sign up

Export Citation Format

Share Document