期刊文献+
共找到5,480篇文章
< 1 2 250 >
每页显示 20 50 100
IoT-Enabled Plant Monitoring System with Power Optimization and Secure Authentication
1
作者 Samsul Huda Yasuyuki Nogami +5 位作者 Maya Rahayu Takuma Akada MdBiplob Hossain Muhammad Bisri Musthafa Yang Jie Le Hoang Anh 《Computers, Materials & Continua》 SCIE EI 2024年第11期3165-3187,共23页
Global food security is a pressing issue that affects the stability and well-being of communities worldwide.While existing Internet of Things(IoT)enabled plant monitoring systems have made significant strides in agric... Global food security is a pressing issue that affects the stability and well-being of communities worldwide.While existing Internet of Things(IoT)enabled plant monitoring systems have made significant strides in agricultural monitoring,they often face limitations such as high power consumption,restricted mobility,complex deployment requirements,and inadequate security measures for data access.This paper introduces an enhanced IoT application for agricultural monitoring systems that address these critical shortcomings.Our system strategically combines power efficiency,portability,and secure access capabilities,assisting farmers in monitoring and tracking crop environmental conditions.The proposed system includes a remote camera that captures images of surrounding plants and a sensor module that regularly monitors various environmental factors,including temperature,humidity,and soil moisture.We implement power management strategies to minimize energy consumption compared to existing solutions.Unlike conventional systems,our implementation utilizes the Amazon Web Services(AWS)cloud platform for reliable data storage and processing while incorporating comprehensive security measures,including Two-Factor Authentication(2FA)and JSON Web Tokens(JWT),features often overlooked in current agricultural IoT solutions.Users can access this secure monitoring system via a developed Android application,providing convenient mobile access to the gathered plant data.We validate our system’s advantages by implementing it with two potted garlic plants on Okayama University’s rooftop.Our evaluation demonstrates high sensor reliabil-ity,with strong correlations between sensor readings and reference data,achieving determination coefficients(R2)of 0.979 for temperature and 0.750 for humidity measurements.The implemented power management strategies extend battery life to 10 days on a single charge,significantly outperforming existing systems that typically require daily recharging.Furthermore,our dual-layer security implementation utilizing 2FA and JWT successfully protects sensitive agricultural data from unauthorized access. 展开更多
关键词 Plant monitoring AGRICULTURE food security environmental monitoring IOT power management AWS secure access JWT
下载PDF
Secure transmission in backhaul NOMA systems:A physical layer security design with untrusted user and eavesdropper
2
作者 Chi-Bao Le Dinh-Thuan Do Miroslav Voznak 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1001-1013,共13页
In order to improve the Physical Layer Security(PLS)perspective,this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access(NOMA)system in two practical situations.In the propos... In order to improve the Physical Layer Security(PLS)perspective,this paper aims to empower function of PLS by considering a backhaul Non-Orthogonal Multiple Access(NOMA)system in two practical situations.In the proposed schemes,the untrusted user intercepts information transmitted to the far user,or the external eavesdropper overhears confidential information sent to the far user in the context of NOMA technique.Unlike the conventional NOMA systems,this paper emphasizes the actual situations of the existence of actual illegal users and legitimate users,especially the reasonable use of relay selection architecture to improve the confidentiality performance.To evaluate the security properties of the proposed scheme,a comprehensive analysis of the Security Outage Probability(SOP)performance is first performed,and then the corresponding SOP asymptotic expressions are derived for real scenarios related to eavesdroppers and untrusted users.Numerical results are performed to verify the analysis in terms of the secure performance metric. 展开更多
关键词 Non-orthogonal multiple access(NOMA) Wireless backhaul secure outage probability Power allocation
下载PDF
EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems
3
作者 Zhenjiang Dong Xin Ge +2 位作者 Yuehua Huang Jiankuo Dong Jiang Xu 《Computers, Materials & Continua》 SCIE EI 2024年第6期4021-4044,共24页
This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.W... This paper presents a comprehensive exploration into the integration of Internet of Things(IoT),big data analysis,cloud computing,and Artificial Intelligence(AI),which has led to an unprecedented era of connectivity.We delve into the emerging trend of machine learning on embedded devices,enabling tasks in resource-limited environ-ments.However,the widespread adoption of machine learning raises significant privacy concerns,necessitating the development of privacy-preserving techniques.One such technique,secure multi-party computation(MPC),allows collaborative computations without exposing private inputs.Despite its potential,complex protocols and communication interactions hinder performance,especially on resource-constrained devices.Efforts to enhance efficiency have been made,but scalability remains a challenge.Given the success of GPUs in deep learning,lever-aging embedded GPUs,such as those offered by NVIDIA,emerges as a promising solution.Therefore,we propose an Embedded GPU-based Secure Two-party Computation(EG-STC)framework for Artificial Intelligence(AI)systems.To the best of our knowledge,this work represents the first endeavor to fully implement machine learning model training based on secure two-party computing on the Embedded GPU platform.Our experimental results demonstrate the effectiveness of EG-STC.On an embedded GPU with a power draw of 5 W,our implementation achieved a secure two-party matrix multiplication throughput of 5881.5 kilo-operations per millisecond(kops/ms),with an energy efficiency ratio of 1176.3 kops/ms/W.Furthermore,leveraging our EG-STC framework,we achieved an overall time acceleration ratio of 5–6 times compared to solutions running on server-grade CPUs.Our solution also exhibited a reduced runtime,requiring only 60%to 70%of the runtime of previously best-known methods on the same platform.In summary,our research contributes to the advancement of secure and efficient machine learning implementations on resource-constrained embedded devices,paving the way for broader adoption of AI technologies in various applications. 展开更多
关键词 secure two-party computation embedded GPU acceleration privacy-preserving machine learning edge computing
下载PDF
Adaptation of Federated Explainable Artificial Intelligence for Efficient and Secure E-Healthcare Systems
4
作者 Rabia Abid Muhammad Rizwan +3 位作者 Abdulatif Alabdulatif Abdullah Alnajim Meznah Alamro Mourade Azrour 《Computers, Materials & Continua》 SCIE EI 2024年第3期3413-3429,共17页
Explainable Artificial Intelligence(XAI)has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning(ML)and Deep Learning(DL)based algorit... Explainable Artificial Intelligence(XAI)has an advanced feature to enhance the decision-making feature and improve the rule-based technique by using more advanced Machine Learning(ML)and Deep Learning(DL)based algorithms.In this paper,we chose e-healthcare systems for efficient decision-making and data classification,especially in data security,data handling,diagnostics,laboratories,and decision-making.Federated Machine Learning(FML)is a new and advanced technology that helps to maintain privacy for Personal Health Records(PHR)and handle a large amount of medical data effectively.In this context,XAI,along with FML,increases efficiency and improves the security of e-healthcare systems.The experiments show efficient system performance by implementing a federated averaging algorithm on an open-source Federated Learning(FL)platform.The experimental evaluation demonstrates the accuracy rate by taking epochs size 5,batch size 16,and the number of clients 5,which shows a higher accuracy rate(19,104).We conclude the paper by discussing the existing gaps and future work in an e-healthcare system. 展开更多
关键词 Artificial intelligence data privacy federated machine learning healthcare system SECURITY
下载PDF
Blockchain-Based Secure and Fair IoT Data Trading System with Bilateral Authorization 被引量:2
5
作者 Youngho Park Mi Hyeon Jeon Sang Uk Shin 《Computers, Materials & Continua》 SCIE EI 2023年第8期1871-1890,共20页
These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairnes... These days,data is regarded as a valuable asset in the era of the data economy,which demands a trading platform for buying and selling data.However,online data trading poses challenges in terms of security and fairness because the seller and the buyer may not fully trust each other.Therefore,in this paper,a blockchain-based secure and fair data trading system is proposed by taking advantage of the smart contract and matchmaking encryption.The proposed system enables bilateral authorization,where data trading between a seller and a buyer is accomplished only if their policies,required by each other,are satisfied simultaneously.This can be achieved by exploiting the security features of the matchmaking encryption.To guarantee non-repudiation and fairness between trading parties,the proposed system leverages a smart contract to ensure that the parties honestly carry out the data trading protocol.However,the smart contract in the proposed system does not include complex cryptographic operations for the efficiency of onchain processes.Instead,these operations are carried out by off-chain parties and their results are used as input for the on-chain procedure.The system also uses an arbitration protocol to resolve disputes based on the trading proof recorded on the blockchain.The performance of the protocol is evaluated in terms of off-chain computation overhead and on-chain gas consumption.The results of the experiments demonstrate that the proposed protocols can enable the implementation of a cost-effective data trading system. 展开更多
关键词 Bilateral authorization blockchain data marketplace fair exchange policy matching secure data trading
下载PDF
Deep Learning Based Autonomous Transport System for Secure Vehicle and Cargo Matching 被引量:1
6
作者 T.Shanthi M.Ramprasath +1 位作者 A.Kavitha T.Muruganantham 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期957-969,共13页
The latest 6G improvements secured autonomous driving's realism in Intelligent Autonomous Transport Systems(IATS).Despite the IATS's benefits,security remains a significant challenge.Blockchain technology has ... The latest 6G improvements secured autonomous driving's realism in Intelligent Autonomous Transport Systems(IATS).Despite the IATS's benefits,security remains a significant challenge.Blockchain technology has grown in popularity as a means of implementing safe,dependable,and decentralised independent IATS systems,allowing for more utilisation of legacy IATS infrastructures and resources,which is especially advantageous for crowdsourcing technologies.Blockchain technology can be used to address security concerns in the IATS and to aid in logistics development.In light of the inadequacy of reliance and inattention to rights created by centralised and conventional logistics systems,this paper discusses the creation of a blockchain-based IATS powered by deep learning for secure cargo and vehicle matching(BDL-IATS).The BDL-IATS approach utilises Ethereum as the primary blockchain for storing private data such as order and shipment details.Additionally,the deep belief network(DBN)model is used to select suitable vehicles and goods for transportation.Additionally,the chaotic krill herd technique is used to tune the DBN model’s hyper-parameters.The performance of the BDL-IATS technique is validated,and the findings are inspected under a variety of conditions.The simulationfindings indicated that the BDL-IATS strategy outperformed recent state-of-the-art approaches. 展开更多
关键词 Blockchain ethereum intelligent autonomous transport system security deep belief network
下载PDF
Hadoop-based secure storage solution for big data in cloud computing environment 被引量:1
7
作者 Shaopeng Guan Conghui Zhang +1 位作者 Yilin Wang Wenqing Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期227-236,共10页
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose... In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average. 展开更多
关键词 Big data security Data encryption HADOOP Parallel encrypted storage Zookeeper
下载PDF
Finite-Time Attack Detection and Secure State Estimation for Cyber-Physical Systems
8
作者 Mi Lv Yuezu Lv +1 位作者 Wenwu Yu Haofei Meng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第10期2032-2034,共3页
Dear Editor, This letter aims to investigate the problem of attack detection and state estimation when the system suffers from external malicious attacks. A finite-time reduce-order observer is designed, which can ach... Dear Editor, This letter aims to investigate the problem of attack detection and state estimation when the system suffers from external malicious attacks. A finite-time reduce-order observer is designed, which can achieve attack detection at the preset time instant. Meanwhile, it is shown that the protection of the key nodes greatly improves the efficiency of secure state estimation. Finally, the proposed theory is applied to a general cyber-physical system to illustrate its effectiveness. 展开更多
关键词 ESTIMATION secure system
下载PDF
Editorial:Secure and Safe Meta Control for Cyber Physical Systems
9
作者 Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第12期2177-2178,共2页
Welcome to the twelfth issue of 2023 in the IEEE/CAA Journal of Automatica Sinica(JAS).In the sixth issue of2023,I systematically addressed the latest development of Meta Vehicles,and sorted out some important contrib... Welcome to the twelfth issue of 2023 in the IEEE/CAA Journal of Automatica Sinica(JAS).In the sixth issue of2023,I systematically addressed the latest development of Meta Vehicles,and sorted out some important contributions published in the IEEE/CAA JAS focusing on control,estimation,and optimization of automated vehicles with reliability,security,efficiency,and intelligence. 展开更多
关键词 secure AUTOMATED ESTIMATION
下载PDF
Distributed Secure State Estimation of Multi-Agent Systems Under Homologous Sensor Attacks
10
作者 Yukun Shi Youqing Wang Jianyong Tuo 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第1期67-77,共11页
This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the sy... This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks.Two types of secure Luenberger-like distributed observers are proposed to estimate the system state and attack signal simultaneously.Specifically,the proposed two observers are applicable to deal with the cases in the presence and absence of time delays during network communication.It is also shown that the proposed observers can ensure the attack estimations from different agents asymptotically converge to the same value.Sufficient conditions for guaranteeing the asymptotic convergence of the estimation errors are derived.Simulation examples are finally provided to demonstrate the effectiveness of the proposed results. 展开更多
关键词 Consensus-based Luenberger-like observer distributed secure state estimation homologous signal
下载PDF
Concept Drift Analysis and Malware Attack Detection System Using Secure Adaptive Windowing
11
作者 Emad Alsuwat Suhare Solaiman Hatim Alsuwat 《Computers, Materials & Continua》 SCIE EI 2023年第5期3743-3759,共17页
Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning(ML)models.Due to attackers’(and/or benign equivalents’)dynamic behavior ch... Concept drift is a main security issue that has to be resolved since it presents a significant barrier to the deployment of machine learning(ML)models.Due to attackers’(and/or benign equivalents’)dynamic behavior changes,testing data distribution frequently diverges from original training data over time,resulting in substantial model failures.Due to their dispersed and dynamic nature,distributed denial-of-service attacks pose a danger to cybersecurity,resulting in attacks with serious consequences for users and businesses.This paper proposes a novel design for concept drift analysis and detection of malware attacks like Distributed Denial of Service(DDOS)in the network.The goal of this architecture combination is to accurately represent data and create an effective cyber security prediction agent.The intrusion detection system and concept drift of the network has been analyzed using secure adaptive windowing with website data authentication protocol(SAW_WDA).The network has been analyzed by authentication protocol to avoid malware attacks.The data of network users will be collected and classified using multilayer perceptron gradient decision tree(MLPGDT)classifiers.Based on the classification output,the decision for the detection of attackers and authorized users will be identified.The experimental results show output based on intrusion detection and concept drift analysis systems in terms of throughput,end-end delay,network security,network concept drift,and results based on classification with regard to accuracy,memory,and precision and F-1 score. 展开更多
关键词 Concept drift machine learning DDOS cyber security SAW_WDA MLPGDT
下载PDF
Medi-Block Record Secure Data Sharing in Healthcare System:Issues,Solutions and Challenges
12
作者 Zuriati Ahmad Zukarnain Amgad Muneer +1 位作者 Nur Atirah Mohamad Nassir Akram A。Almohammedi 《Computer Systems Science & Engineering》 SCIE EI 2023年第12期2725-2740,共16页
With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves stor... With the advancements in the era of artificial intelligence,blockchain,cloud computing,and big data,there is a need for secure,decentralized medical record storage and retrieval systems.While cloud storage solves storage issues,it is challenging to realize secure sharing of records over the network.Medi-block record in the healthcare system has brought a new digitalization method for patients’medical records.This centralized technology provides a symmetrical process between the hospital and doctors when patients urgently need to go to a different or nearby hospital.It enables electronic medical records to be available with the correct authentication and restricts access to medical data retrieval.Medi-block record is the consumer-centered healthcare data system that brings reliable and transparent datasets for the medical record.This study presents an extensive review of proposed solutions aiming to protect the privacy and integrity of medical data by securing data sharing for Medi-block records.It also aims to propose a comprehensive investigation of the recent advances in different methods of securing data sharing,such as using Blockchain technology,Access Control,Privacy-Preserving,Proxy Re-Encryption,and Service-On-Chain approach.Finally,we highlight the open issues and identify the challenges regarding secure data sharing for Medi-block records in the healthcare systems. 展开更多
关键词 Medi-block record healthcare system Blockchain technology secure data sharing
下载PDF
An Enhanced Intelligent Intrusion Detection System to Secure E-Commerce Communication Systems
13
作者 Adil Hussain Kashif Naseer Qureshi +1 位作者 Khalid Javeed Musaed Alhussein 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期2513-2528,共16页
Information and communication technologies are spreading rapidly due to their fast proliferation in many fields.The number of Internet users has led to a spike in cyber-attack incidents.E-commerce applications,such as... Information and communication technologies are spreading rapidly due to their fast proliferation in many fields.The number of Internet users has led to a spike in cyber-attack incidents.E-commerce applications,such as online banking,marketing,trading,and other online businesses,play an integral role in our lives.Network Intrusion Detection System(NIDS)is essential to protect the network from unauthorized access and against other cyber-attacks.The existing NIDS systems are based on the Backward Oracle Matching(BOM)algorithm,which minimizes the false alarm rate and causes of high packet drop ratio.This paper discussed the existing NIDS systems and different used pattern-matching techniques regarding their weaknesses and limitations.To address the existing system issues,this paper proposes an enhanced version of the BOM algorithm by using multiple pattern-matching methods for the NIDS system to improve the network performance.The proposed solution is tested in simulation with existing solutions using the Snort and NSL-KDD datasets.The experimental results indicated that the proposed solution performed better than the existing solutions and achieved a 5.17%detection rate and a 0.22%lower false alarm rate than the existing solution. 展开更多
关键词 E-COMMERCE NIDS security algorithm network applications CIA detection
下载PDF
Severity Based Light-Weight Encryption Model for Secure Medical Information System
14
作者 Firas Abedi Subhi R.M.Zeebaree +10 位作者 Zainab Salih Ageed Hayder M.A.Ghanimi Ahmed Alkhayyat Mohammed A.M.Sadeeq Sarmad Nozad Mahmood Ali S.Abosinnee Zahraa H.Kareem Ali Hashim Abbas Waleed Khaild Al-Azzawi Mustafa Musa Jaber Mohammed Dauwed 《Computers, Materials & Continua》 SCIE EI 2023年第3期5691-5704,共14页
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o... As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques. 展开更多
关键词 Deep learning ENCRYPTION medical images SCRAMBLING security skew tent map rotation zigzag pattern
下载PDF
Secured Cyber Security Algorithm for Healthcare System Using Blockchain Technology
15
作者 D.Doreen Hephzibah Miriam Deepak Dahiya +1 位作者 Nitin C.R.Rene Robin 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期1889-1906,共18页
Blockchain technology is critical in cyber security.The most recent cryptographic strategies may be hacked as efforts are made to build massive elec-tronic circuits.Because of the ethical and legal implications of a p... Blockchain technology is critical in cyber security.The most recent cryptographic strategies may be hacked as efforts are made to build massive elec-tronic circuits.Because of the ethical and legal implications of a patient’s medical data,cyber security is a critical and challenging problem in healthcare.The image secrecy is highly vulnerable to various types of attacks.As a result,designing a cyber security model for healthcare applications necessitates extra caution in terms of data protection.To resolve this issue,this paper proposes a Lionized Golden Eagle based Homomorphic Elapid Security(LGE-HES)algorithm for the cybersecurity of blockchain in healthcare networks.The blockchain algorithm preserves the security of the medical image by performing hash function.The execution of this research is carried out by MATLAB software.The suggested fra-mework was tested utilizing Computed Tumor(CT)pictures and MRI image data-sets,and the simulation results revealed the proposed model’s profound implications.During the simulation,94.9%of malicious communications were recognized and identified effectively,according to the total outcomes statistics.The suggested model’s performance is also compared to that of standard approaches in terms of Root Mean Square Error(RMSE),Peak Signal to Noise Ratio(PSNR),Mean Square Error(MSE),time complexity,and other factors. 展开更多
关键词 Healthcare system CYBERSECURITY SECURITY data sharing blockchain
下载PDF
Secure Downlink Transmission Strategies against Active Eavesdropping in NOMA Systems:A Zero-Sum Game Approach
16
作者 Yanqiu Chen Xiaopeng Ji 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第7期531-553,共23页
Non-orthogonal multiple access technology(NOMA),as a potentially promising technology in the 5G/B5G era,suffers fromubiquitous security threats due to the broadcast nature of the wirelessmedium.In this paper,we focus ... Non-orthogonal multiple access technology(NOMA),as a potentially promising technology in the 5G/B5G era,suffers fromubiquitous security threats due to the broadcast nature of the wirelessmedium.In this paper,we focus on artificial-signal-assisted and relay-assisted secure downlink transmission schemes against external eavesdropping in the context of physical layer security,respectively.To characterize the non-cooperative confrontation around the secrecy rate between the legitimate communication party and the eavesdropper,their interactions are modeled as a two-person zero-sum game.The existence of the Nash equilibrium of the proposed game models is proved,and the pure strategyNash equilibriumand mixed-strategyNash equilibriumprofiles in the two schemes are solved and analyzed,respectively.The numerical simulations are conducted to validate the analytical results,and showthat the two schemes improve the secrecy rate and further enhance the physical layer security performance of NOMA systems. 展开更多
关键词 Non-orthogonalmultiple access technology(NOMA) physical layer security game theory nash equilibrium zerosum game
下载PDF
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
17
作者 Lamiaa A.Abou Elazm Walid El-Shafai +6 位作者 Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期929-955,共27页
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the secur... Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of these sys-tems.Biometric systems provide sufficient protection and privacy for users.The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks.In addition,they have not been studied on different and large biometric datasets.Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems.This paper presents a suggested hybrid cancellable biometric recognition system based on a 3D chaotic cryptosystem.The rationale behind the utilization of the 3D chaotic cryptosystem is to guarantee strong encryption of biometric templates,and hence enhance the security and privacy of users.The suggested cryptosystem adds significant permutation and diffusion to the encrypted biometric templates.We introduce some sort of attack analysis in this paper to prove the robustness of the proposed cryptosystem against attacks.In addition,a Field Programmable Gate Array(FPGA)implementation of the pro-posed system is introduced.The obtained results with the proposed cryptosystem are compared with those of the traditional encryption schemes,such as Double Random Phase Encoding(DRPE)to reveal superiority,and hence high recogni-tion performance of the proposed cancellable biometric recognition system.The obtained results prove that the proposed cryptosystem enhances the security and leads to better efficiency of the cancellable biometric recognition system in the presence of different types of attacks. 展开更多
关键词 Information security cancellable biometric recognition systems CRYPTANALYSIS 3D chaotic map ENCRYPTION FPGA
下载PDF
Towards Blockchain-Based Secure BGP Routing,Challenges and Future Research Directions
18
作者 Qiong Yang Li Ma +3 位作者 Shanshan Tu Sami Ullah MuhammadWaqas Hisham Alasmary 《Computers, Materials & Continua》 SCIE EI 2024年第5期2035-2062,共28页
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits s... Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different destinations.The BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security threats.Meanwhile,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of trust.The decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing mechanisms.In this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their causes.Additionally,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security threats.Finally,we discuss the challenges posed by BGP security problems and outline prospects for future research. 展开更多
关键词 BGP security blockchain prefix hijacking trust model secure routing
下载PDF
Research on intelligent search-and-secure technology in accelerator hazardous areas based on machine vision
19
作者 Ying-Lin Ma Yao Wang +1 位作者 Hong-Mei Shi Hui-Jie Zhang 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第4期96-107,共12页
Prompt radiation emitted during accelerator operation poses a significant health risk,necessitating a thorough search and securing of hazardous areas prior to initiation.Currently,manual sweep methods are employed.How... Prompt radiation emitted during accelerator operation poses a significant health risk,necessitating a thorough search and securing of hazardous areas prior to initiation.Currently,manual sweep methods are employed.However,the limitations of manual sweeps have become increasingly evident with the implementation of large-scale accelerators.By leveraging advancements in machine vision technology,the automatic identification of stranded personnel in controlled areas through camera imagery presents a viable solution for efficient search and security.Given the criticality of personal safety for stranded individuals,search and security processes must be sufficiently reliable.To ensure comprehensive coverage,180°camera groups were strategically positioned on both sides of the accelerator tunnel to eliminate blind spots within the monitoring range.The YOLOV8 network model was modified to enable the detection of small targets,such as hands and feet,as well as larger targets formed by individuals near the cameras.Furthermore,the system incorporates a pedestrian recognition model that detects human body parts,and an information fusion strategy is used to integrate the detected head,hands,and feet with the identified pedestrians as a cohesive unit.This strategy enhanced the capability of the model to identify pedestrians obstructed by equipment,resulting in a notable improvement in the recall rate.Specifically,recall rates of 0.915 and 0.82were obtained for Datasets 1 and 2,respectively.Although there was a slight decrease in accuracy,it aligned with the intended purpose of the search-and-secure software design.Experimental tests conducted within an accelerator tunnel demonstrated the effectiveness of this approach in achieving reliable recognition outcomes. 展开更多
关键词 Search and secure Machine vision CAMERA Human body parts recognition Particle accelerator Hazardous area
下载PDF
Trust-based co-operative routing for secure communication in mobile ad hoc networks
20
作者 Ankita A.Mahamune M.M.Chandane 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1079-1087,共9页
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ... The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency. 展开更多
关键词 Mobile Ad hoc NETwork secure communication AODV Co-operative routing Trust metric
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部