Article
Computer Science, Information Systems
Tian-Fu Lee, Der-Chyuan Lou, Chien-Hung Chang
Summary: Authenticated key agreement for Internet of Drones (IoD) allows mobile users to securely and efficiently access a group of drones for various services such as supply transportation, surveillance data transmission, and communication provision. Previous studies developed lightweight protocols to address security issues, but this investigation reveals the weaknesses of a previous protocol and proposes an enhanced protocol with dynamic identities and message freshness. The enhanced protocol is formally proven secure and outperforms related protocols by 28.4%.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Dharminder Chaudhary, Tanmay Soni, Kondeti Lakshmi Vasudev, Kashif Saleem
Summary: Drones can be embedded in the system Internet of Drones for military observation and in a transport system embedded with sensors. Drones have played a significant role in various fields and brought convenience to production and lifestyle. However, the security challenges and privacy issues of the data collected by sensors embedded in drones need to be addressed.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Cong Pu, Andrew Wall, Kim-Kwang Raymond Choo, Imtiaz Ahmed, Sunho Lim
Summary: With the advancement of drone technology, Internet of Drones (IoD) has gained widespread applications in various fields. However, securing IoD systems can be challenging due to the unique characteristics of drones. In this article, a lightweight and privacy-preserving mutual authentication and key agreement protocol, PMAP, is proposed.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Hardware & Architecture
Mahdi Nikooghadam, Haleh Amintoosi, S. K. Hafizul Islam, Mostafa Farhadi Moghadam
Summary: In smart cities, surveillance using drones requires a secure authentication scheme to ensure data security, which should be efficient in terms of computation overhead while providing high security.
JOURNAL OF SYSTEMS ARCHITECTURE
(2021)
Article
Remote Sensing
Shuo Zhang, Yaping Liu, Zhiyu Han, Zhikai Yang
Summary: With the rapid development of UAVs, their security issues are gaining more attention. This paper proposes an ECC-based identity authentication protocol, LAPEC, which ensures backward secrecy of session keys and offers more flexibility. The analysis shows that LAPEC has a manageable time cost without significantly increasing overhead compared to other authentication methods.
Article
Telecommunications
Yuanyuan Zhang, Lingzhe Meng, Mingwu Zhang, Weizhi Meng
Summary: This research proposes a lightweight authentication scheme that supports batch authentication of multiple drones, improving efficiency and security of authentication. Batch authentication is achieved using hash function and point multiplication, and physical unclonable functions are introduced to resist physical attacks. Security analyses demonstrate the scheme's resilience against known attacks, and experimental results show better security and lower overheads compared to existing schemes for authenticating multiple drones.
VEHICULAR COMMUNICATIONS
(2023)
Article
Chemistry, Analytical
Chun-Ta Li, Chi-Yao Weng, Chin-Ling Chen, Cheng-Chi Lee, Yong-Yuan Deng, Agbotiname Lucky Imoize
Summary: This paper proposes an authentication and secure communication scheme for addressing security and privacy issues in IoD communications. The scheme uses secure one-way hash function and bitwise XOR operations for authentication and ensures efficiency.
Article
Computer Science, Information Systems
Seungnam Han, Yonggu Lee, Jinho Choi, Euiseok Hwang
Summary: This study proposes a lightweight physical layer aided authentication and key agreement (PL-AKA) protocol for IoT, aiming to reduce signaling overhead in core networks. Experimental results demonstrate a significant reduction in signaling overhead compared to traditional methods, indicating the potential for practical and efficient implementation in large-scale IoT networks.
Article
Chemistry, Analytical
Xiang Gong, Tao Feng
Summary: This study addresses the problem of the lack of a lightweight and secure authentication and key agreement protocol in the Internet of Things environment and proposes a new lightweight solution based on the CoAP framework. The proposed scheme ensures the anonymity of the communicators and provides strong security and anti-attack capacity.
Article
Computer Science, Information Systems
Jae Yeol Jeong, Jin Wook Byun, Ik Rae Jeong
Summary: The text discusses the importance of establishing a session key between users and drones to ensure authentication and secure channels in IoD environments. It also considers potential drone capture attacks and emphasizes the need for forward unlinkability and forward secrecy in key exchanges to minimize damage. The paper proposes key agreement protocols that provide both pseudonymity and forward unlinkability, enhancing privacy and security for users and drones.
Article
Computer Science, Information Systems
Sajid Hussain, Muhammad Farooq, Bander. A. A. Alzahrani, Aiiad Albeshri, Khalid Alsubhi, Shehzad Ashraf Chaudhry
Summary: This article investigates the application of the Internet of Drones (IoD) in military and civil fields and emphasizes the need for a secure and efficient authentication protocol in order to ensure authorized communication and data transmission. The author introduces an enhanced, lightweight, and secure protocol to overcome the limitations of existing protocols and demonstrates through performance comparison that the proposed scheme provides improved security with minimal computation cost. Formal automated analysis using ProVerif confirms that the proposed scheme is resilient against various attacks.
Article
Telecommunications
Rasoul Roustaei, Hamid Haj Seyyed Javadi, Midia Reshadi
Summary: Due to the heterogeneity of devices and resource limitations in the Internet of Things, simplifying and lightening algorithms in this domain has become an interesting study area. A critical aspect in the Internet of Things is the establishment of secret keys for secure communication. The importance of communication security and the need for lightweight algorithms have motivated the development of a lightweight key agreement protocol. This article presents a lightweight method for key agreement, analyzing its performance and showing its resistance to attacks.
WIRELESS PERSONAL COMMUNICATIONS
(2023)
Article
Computer Science, Information Systems
Yuanyuan Yang, Jin Cao, Xiongpeng Ren, Ben Niu, Yinghui Zhang, Hui Li
Summary: As a supplementary to terrestrial networks, satellite communication networks have wide coverage, large communication capacity, reliable communication quality, and seamless global connectivity which are competitive to traditional communication technologies. However, security issues and efficiency problems arise due to characteristics of satellite communications such as exposed satellite links, dynamic topology and limited computational power and storage resources. This paper proposes a lightweight authentication and key agreement scheme for S2S communication using symmetric cryptographic system and satellite location key (LK) constructed by satellite orbital parameters and location information.
COMPUTER COMMUNICATIONS
(2023)
Article
Engineering, Civil
Muhammad Wahid Akram, Ali Kashif Bashir, Salman Shamshad, Muhammad Asad Saleem, Ahmad Ali AlZubi, Shehzad Ashraf Chaudhry, Bander A. Alzahrani, Yousaf Bin Zikria
Summary: The advancement of ICT and the Internet has facilitated the use of Unmanned Aerial Vehicles (UAVs) in assisting Vehicular Ad-hoc Networks (VANETs), providing real-time data access and monitoring capabilities in smart cities. However, security, privacy, and routing concerns remain significant challenges for UAV-assisted VANETs, where Deep Learning Algorithms (DLAs) can play a vital role.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2022)
Article
Computer Science, Information Systems
Yuan Lei, Lining Zeng, Yan-Xing Li, Mei-Xia Wang, Haisheng Qin
Summary: This study proposes an optimized lightweight identity security authentication protocol for Internet of Drones networks, aiming to ensure security through optimizing the utilization of computing resources.
Article
Engineering, Electrical & Electronic
Biwen Chen, Libing Wu, Huaqun Wang, Lu Zhou, Debiao He
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2020)
Article
Computer Science, Theory & Methods
Peng Wang, Biwen Chen, Tao Xiang, Zhongming Wang
Summary: Edge computing serves as a bridge between cloud computing platforms and IoT devices, providing on-demand data services to reduce latency and network congestion. Data security in edge computing can be ensured by encrypting sensitive data before outsourcing it to edge servers. The proposed lattice-based public key searchable encryption scheme in this paper achieves post-quantum security and highly flexible access control policies for multi-user applications.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2022)
Article
Computer Science, Information Systems
Biwen Chen, Tao Xiang, Mimi Ma, Debiao He, Xiaofeng Liao
Summary: The Internet of Things is transitioning from infancy to maturity, but challenges with data security and privacy persist. To address these challenges, a new cryptographic primitive named CL-ME is proposed, with two effective constructions based on standard hard assumptions. These proposed schemes are more suitable for IoT environment based on theoretical analysis and experimental evaluations.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Biwen Chen, Xue Li, Tao Xiang, Peng Wang
Summary: Electronic auction has become a popular method for resource allocation in contemporary society but also brings new challenges such as low robustness, data privacy, and trust issues. An effective smart contract-based privacy-preserving sealed-bid reverse auction scheme can address these concerns.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Biwen Chen, Libing Wu, Sherali Zeadally, Debiao He
Summary: Efficient and secure search of sensitive data in cloud storage is a challenging problem. Searchable encryption technique provides a solution that preserves data confidentiality and usability. However, traditional PEKS schemes are vulnerable to inside keyword guessing attacks. To address this problem, the notion of Dual-server Public-key Authenticated Encryption with Keyword Search (DPAEKS) is introduced, which leverages two non-cooperating servers to resist inside keyword guessing attacks and supports authentication. A construction of DPAEKS without bilinear pairings is provided.
IEEE TRANSACTIONS ON CLOUD COMPUTING
(2022)
Proceedings Paper
Computer Science, Artificial Intelligence
Biwen Chen, Lei Yang, Tao Xiang, Xiaoguo Li
Summary: The security of data transmission in smart home systems is crucial, leading researchers to propose a new secure data transmission scheme with access control using access control encryption (ACE) to protect data. Experimental results demonstrate the effectiveness and efficiency of this mechanism.
2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021)
(2021)
Proceedings Paper
Computer Science, Information Systems
Zhongming Wang, Biwen Chen, Tao Xiang, Lu Zhou, Hongyang Yan, Jin Li
Summary: PEKS is a promising cryptographic primitive that allows keyword search in ciphertexts, widely used in fields such as Cloud Computing and Internet of Things. Existing schemes mainly focus on data receiver control, ignoring data sender control. To address this, a concept of PEKS with fine-grained sender permission control has been introduced.
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021
(2021)
Review
Computer Science, Information Systems
Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani
Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas
Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang
Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Jing Xiong, Hong Zhu
Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy
Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Annisa Sarah, Gianfranco Nencioni
Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Sumana Maiti, Sudip Misra, Ayan Mondal
Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Pankaj Kumar, Hari Om
Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia
Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Suvrima Datta, U. Venkanna
Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo
Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Rajesh Kumar, Deepak Sinwar, Vijander Singh
Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Giovanni Nardini, Giovanni Stea
Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Zhaolin Ma, Jiali You, Haojiang Deng
Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.
COMPUTER COMMUNICATIONS
(2024)
Article
Computer Science, Information Systems
Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang
Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.
COMPUTER COMMUNICATIONS
(2024)