Article
Computer Science, Information Systems
Zhonghao Zhai, Subin Shen, Yanqin Mao
Summary: This paper discusses the trust issues of the traditional public key infrastructure (PKI) for web services and the potential of blockchain technology to solve these issues. However, there are still critical problems in existing blockchain-based solutions, including domain name preemption attacks and scalability issues. To address these problems, a secure and scalable blockchain-based PKI solution called BPKI is proposed, which introduces auditors to prevent domain name preemption attacks and utilizes a delegated PBFT consensus algorithm and a double blockchain structure to improve scalability. The security of BPKI is theoretically proved and simulation experiments demonstrate its superiority over existing blockchain-based PKI solutions in scalability.
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Lu Wei, Jie Cui, Hong Zhong, Yan Xu, Lu Liu
Summary: This paper proposes a proven secure authenticated key agreement (AKA) scheme for securing V2V and V2I communications in VANETs. The scheme consists of a three-party authentication process and a key agreement process, which includes a tree-based key agreement algorithm. Formal security proof and security analysis demonstrate that the proposed scheme satisfies the necessary security requirements in VANETs.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Computer Science, Information Systems
Shohei Kakei, Hiroaki Seko, Yoshiaki Shiraishi, Shoichi Saito
Summary: This paper uses IoT as an example to illustrate the need for eliminating the single point of trust in a CA-based private PKI. It proposes a distributed public key certificate-issuing infrastructure that addresses the limitations caused by the generation of signing keys. Lastly, it suggests a method for all certificate issuers to overcome these limitations.
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
(2023)
Article
Engineering, Electrical & Electronic
Ivan E. Carvajal-Roca, Jian Wang, Jun Du, Shuangqing Wei
Summary: This study introduces a semi-centralized dynamic key management framework that enhances the security and safety of vehicle networks through decentralized and dynamic key generation, while also reducing issues such as key quantity and communication payload.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
(2021)
Article
Telecommunications
Akber Ali Khan, Vinod Kumar, Musheer Ahmad, B. B. Gupta, Musheer Ahmad, Ahmed A. Abd El-Latif
Summary: This article introduces the two-way communication of the Internet of Energy to address the security, efficiency, and reliability in energy reform. A mutual authenticated key agreement framework is proposed in the vehicle-grid system using elliptic curve cryptography and hash function to maintain secure communication with reliable computation and communication costs. The proposed protocol is shown to be secure through formal and informal methods, and is more efficient in terms of computation and communication costs compared to related protocols in the same environment.
TELECOMMUNICATION SYSTEMS
(2021)
Article
Telecommunications
Fahiem Altaf, Soumyadev Maity
Summary: The paper proposes a novel authentication scheme for vehicular ad hoc networks to address scalability issues in high-density and safety-critical environments. By distributing key management tasks to reduce centralized dependency, and utilizing an efficient certificate-less signature scheme to authenticate outgoing messages, the scheme aims to protect long-term keys from potential attacks.
VEHICULAR COMMUNICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Dariush Abbasinezhad-Mood, Arezou Ostad-Sharif, Morteza Nikooghadam, Sayyed Majid Mazinani
Summary: The integration of information technologies into the current power grid has raised significant security concerns for the advanced metering infrastructure (AMI). Scholars have presented key agreement schemes for secure communication in the AMI, but found that efficiency could be improved. Thus, they propose a novel security scheme utilizing Chebyshev chaotic maps to enhance security and reduce computational overhead.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Automation & Control Systems
Jinghui Peng, Shanyu Tang
Summary: The article investigates covert steganographic communications over VoIP, finding that the proposed information-theoretical model is secure against passive attacks. The accumulation-based steganographic algorithm effectively protects steganographic systems from adversary attacks with minimal impact on real-time VoIP communications.
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
(2021)
Article
Computer Science, Hardware & Architecture
Jing Chen, Zeyi Zhan, Kun He, Ruiying Du, Donghui Wang, Fei Liu
Summary: This article presents an efficient privacy-preserving cross-domain authentication scheme, called XAuth, which is integrated with existing PKI and CT systems, and is characterized by rapid responsiveness and anonymous authentication.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2022)
Article
Computer Science, Information Systems
Suleman Khan, Gurjot Singh Gaba, An Braeken, Pardeep Kumar, Andrei Gurtov
Summary: Controller-Pilot Data Link Communications (CPDLC) is being widely adopted as a replacement for voice-based Air Traffic Control (ATC) communications worldwide. However, it faces serious security challenges, including eavesdropping and impersonation attacks. To address these issues, we propose a new security model called AKAASH, which provides mutual authentication, key establishment, and a secure handover approach for the CPDLC-enabled aviation communication network.
INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION
(2023)
Article
Computer Science, Information Systems
Yimin Guo, Zhenfeng Zhang, Yajun Guo
Summary: In this paper, a new protocol for anonymous authentication and group proof in wearable computing is proposed, which solves the existing security and privacy issues, offers more functionality features, and reduces communication and computation costs.
IEEE TRANSACTIONS ON MOBILE COMPUTING
(2022)
Article
Engineering, Civil
Mohammad Wazid, Ashok Kumar Das, Sachin Shetty
Summary: Internet of Space Things (IoST), also known as CubeSats, expands the uses and functionalities of traditional Internet of Things (IoT) by providing satellite networks and real-time satellite data. To address data security in IoST, an authentication and key management framework called SAKM-IoST has been proposed, which demonstrates resilience against potential threats and attacks.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Article
Computer Science, Hardware & Architecture
Weibiao Liang, Lin You, Gengran Hu
Summary: This article proposes a blockchain-based PKI framework called LRS_PKI. It reduces the risk of attacks on the PKI system by using linkable ring signatures to hide the issuing CA. Additionally, it utilizes the blockchain as a public log for certificate operations and employs IPFS for certificate storage, enhancing both security and efficiency.
Article
Multidisciplinary Sciences
Matthew M. Turner, Majid Ghayoomi, Katharine Duderstadt, Jennifer Brewer, Alexander Kholodov
Summary: Alaska is one of the most seismically active regions in the world and is experiencing significant impacts of climate change. This paper explores the challenges and needs posed by earthquake hazards and climate change to Alaska's infrastructure and built environment, and provides recommendations for policy, mitigation, and adaptation to improve seismic resilience.
Article
Computer Science, Hardware & Architecture
Tania Saleem, Muhammad Umar Janjua, Muhammad Hassan, Talha Ahmad, Filza Tariq, Khadija Hafeez, Muhammad Ahsan Salal, Muhammad Danish Bilal
Summary: Public Key Infrastructure (PKI) is a widely accepted cryptography protocol for secure communication, relying on the reliability of third-party Certificate Authorities (CAs). This paper proposes a decentralized PKI framework called ProofChain, leveraging blockchain technology to provide trust among a decentralized group of CAs. ProofChain is compatible with existing PKI standards and has been evaluated against popular security standards and PKI adversarial attacks.
Proceedings Paper
Multidisciplinary Sciences
F. I. Sadiq, A. Selamat, R. Ibrahim
ADVANCED SCIENCE LETTERS
(2018)
Review
Information Science & Library Science
Husna Hafiza Razami, Roslina Ibrahim
Summary: This paper presents a systematic literature review of the significant predictors of digital educational games (DEG) acceptance among students. The review finds that many previous studies adopted the technology acceptance model (TAM) to evaluate students' intention in using digital games for learning, and constructs such as perceived ease of use, perceived usefulness, enjoyment, attitude, satisfaction, and social influence were repeatedly shown to have a significant influence on intention.
TELEMATICS AND INFORMATICS
(2022)
Review
Computer Science, Information Systems
Cheng Zhang, Nilam N. A. Sjarif, Roslina B. Ibrahim
Summary: Stock market prediction based on machine or deep learning is a crucial topic in finance. Decision fusion, which combines forecasts from multiple models, is an important method for achieving better prediction. However, there is a lack of systematic review on the application of decision fusion in this field, highlighting the need for this study.
Article
Computer Science, Theory & Methods
Husna Hafiza Razami, Roslina Ibrahim
Summary: The study reveals that students are concerned about the challenges of online distance learning under the impact of the COVID-19 pandemic, with a focus on issues such as interaction, concentration, and learning motivation. Most students believe that elements like animation and gamification can enhance their engagement in online learning.
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
(2021)
Proceedings Paper
Computer Science, Interdisciplinary Applications
Mohd Talmizie Amron, Roslina Ibrahim, Nur Azaliah Abu Bakar, Suriayati Chuprat
2020 THE 6TH IEEE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2020)
(2020)
Article
Computer Science, Theory & Methods
Vanisri Nagalingam, Roslina Ibrahim, Rasimah Che Mohd Yusoff
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
(2020)
Proceedings Paper
Computer Science, Information Systems
Nur Marissa Vee Senap, Roslina Ibrahim
FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE
(2019)
Proceedings Paper
Computer Science, Information Systems
Mohd Talmizie Amron, Roslina Ibrahim, Nur Azaliah Abu Bakar, Suriayati Chuprat
FIFTH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE
(2019)
Review
Business
Mohd Talmizie Amron, Roslina Ibrahim, Nur Azaliah Abu Bakar, Suriayati Chuprat
INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT
(2019)
Article
Computer Science, Artificial Intelligence
Suraya Ya'acob, Nazlena Mohamad Ali, Norshita Mat Nayan, Hai-Ning Liang, Ibrahim Ahmad, Roslina Ibrahim, Nur Azaliah Abu Bakar
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
(2019)
Article
Computer Science, Theory & Methods
Husna Hafiza R. Azami, Roslina Ibrahim
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
(2019)
Proceedings Paper
Engineering, Industrial
Rozana Ismail, Roslina Ibrahim, Suraya Yaacob
5TH INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT (ICIM 2019)
(2019)
Article
Computer Science, Artificial Intelligence
Nazri Kama, Sufyan Basri, Saiful Adli Ismail, Roslina Ibrahim
INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY
(2019)
Proceedings Paper
Computer Science, Interdisciplinary Applications
Rozana Ismail, Roslina Ibrahim
PROCEEDINGS 2018 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY FOR THE MUSLIM WORLD (ICT4M)
(2018)
Article
Computer Science, Theory & Methods
Yazriwati Yahya, Nor Zairah Ab Rahim, Roslina Ibrahim, Nurazean Maarop, Haslina Md Sarkan, Suriayati Chuprat
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
(2018)