Article
Computer Science, Information Systems
Xingwen Zhao, Dexin Li
Summary: This paper proposes a lightweight multi-gateway authentication scheme based on the Rabin cryptosystem. The scheme uses encryption operation on the sensor side with resource constraints to save resources and employs Scyther to prove its security. The analysis shows that the proposed scheme achieves higher security with lower computational overhead.
Article
Telecommunications
Chukhu Chunka, Subhasish Banerjee, Rajat Subhra Goswami
Summary: This paper focuses on the importance and challenges of securely accessing information from sensor nodes in wireless sensor networks and IoT environments. By refining Kalra et al.'s scheme, the security and efficiency have been enhanced.
WIRELESS PERSONAL COMMUNICATIONS
(2021)
Article
Computer Science, Hardware & Architecture
Linyan Bai, Chingfang Hsu, Lein Harn, Jianqun Cui, Zhuo Zhao
Summary: With the rapid development of IoT technologies, the security of sensitive data in resource-asymmetric smart environments has become a growing concern. Existing authentication and key establishment schemes fail to consider the excess of gateway resources and user anonymity, and are not suitable for lightweight operations in user and device side. Therefore, a new practical authentication and key establishment scheme based on the Rabin cryptosystem is proposed to address these challenges. The scheme makes better use of abundant gateway resources, ensures lightweight operations, and provides user anonymity. The scheme is proven to satisfy all defined security features and outperforms similar protocols in computation cost and communication overhead.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2023)
Article
Chemistry, Analytical
Pooja Tyagi, Saru Kumari, Bander A. Alzahrani, Anshay Gupta, Ming-Hour Yang
Summary: A secure protocol for wireless transmission is crucial for protecting sensitive information, but existing schemes have security pitfalls. To address these issues, we propose an enhanced authentication scheme and demonstrate its superiority through validation and comparison.
Article
Computer Science, Information Systems
Fengyin Li, Xinying Yu, Yang Cui, Siqi Yu, Yuhong Sun, Yilei Wang, Huiyu Zhou
Summary: This paper proposes an Anonymous Authentication and Key Agreement protocol (AAKA) to protect the privacy and data security of Wireless Sensor Networks (WSNs). Compared with other authentication schemes, the AAKA protocol has better security features and higher efficiency, making it suitable for smart living applications.
COMPUTER COMMUNICATIONS
(2022)
Article
Computer Science, Software Engineering
Qing Fan, Jianhua Chen, Feng Xu, Li Li, Min Luo
Summary: Wireless sensor networks are widely used in various fields, with security and privacy issues being a challenge. Two-factor authentication schemes have shortcomings, while three-factor authentication methods can address these deficiencies.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2022)
Article
Computer Science, Information Systems
Priyanka Mall, Ruhul Amin, Ashok Kumar Das, Mark T. Leung, Kim-Kwang Raymond Choo
Summary: This article provides an overview of physically unclonable function (PUF) and authentication and key agreement (AKA) protocols, as well as their applications in fields such as Internet of Things, wireless sensor networks, and smart grids. The challenges and potential security risks of these technologies are discussed, along with possible solutions and mitigation strategies.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Hui Zhang, Weixin Bian, Biao Jie, Deqin Xu, Jun Zhao
Summary: With the development and popularization of biometrics recognition technology, the protection of biometric data is of utmost importance. A user authentication protocol based on cancelable biometrics and PUF is proposed to ensure robustness, effectiveness, and security through performance and security analysis.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2021)
Article
Computer Science, Information Systems
Antonio Robles-Gonzalez, Patricia Arias-Cabarcos, Javier Parra-Arnau
Summary: The usage of authentication schemes in our daily life is increasing, but password-based verification is still the dominant method despite its vulnerability and user dislike. Bonneau et al. proposed the UDS framework to evaluate authentication schemes and find alternatives to passwords. However, the UDS framework lacks analysis of privacy aspects. In this study, we extend the UDS framework to include a privacy category, creating the UDSP framework, for a more comprehensive evaluation. We thoroughly assess sample authentication schemes, including novel behavioural biometrics, and discuss implementation aspects and future research gaps regarding the new privacy dimension.
COMPUTERS & SECURITY
(2023)
Article
Engineering, Electrical & Electronic
Xinyin Xiang, Jin Cao
Summary: Smart grid integrates information and communication technology with traditional grid architecture to enhance efficiency and reliability of power systems. A secure authentication method is essential to prevent data tampering in smart grid communications. The proposed AKA scheme in this paper supports privacy preservation and enables secure communication between SG devices and service providers.
ELECTRIC POWER SYSTEMS RESEARCH
(2022)
Article
Computer Science, Hardware & Architecture
Yulei Chen, Jianhua Chen
Summary: This study introduces a new authentication protocol for e-Health clouds, which has stronger security and performance compared to previous protocols. It can resist various attacks, provide user anonymity and untraceability.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Software Engineering
B. B. Gupta, Megha Quamara
Summary: The deployment of smart card-based applications is becoming more widespread, with security relying on a variety of factors such as hardware, software platforms, and cryptographic algorithms. Despite significant advancements in smart card technology, attackers are continuously searching for vulnerabilities to exploit. This survey provides a detailed overview of smart card technology, discussing security attacks and countermeasures, along with some open challenges and future research directions.
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE
(2021)
Article
Computer Science, Information Systems
Chandrashekhar Meshram, Mohammad S. Obaidat, Cheng-Chi Lee, Sarita Gajbhiye Meshram
Summary: Wireless sensor networks are vital for real-time monitoring systems in various aspects of life, requiring security measures like authentication to protect data privacy from unauthorized access. Researchers have proposed different authentication procedures to address these concerns and improve system security.
IEEE SYSTEMS JOURNAL
(2021)
Article
Computer Science, Information Systems
Gaurav Tyagi, Rahul Kumar
Summary: Formulating a secure and efficient user authentication scheme for wireless sensor networks (WSNs) is a complex task. Existing schemes have several issues such as information leakage attacks, session key exposure, lack of user anonymity, forward secrecy, and multi-factor security. To address these issues, we propose an improved scheme that has been verified for security through formal and informal analysis, achieving a good balance between efficiency and security.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2023)
Article
Mathematics
Fairuz Shohaimay, Eddie Shahril Ismail
Summary: This research proposes an improved ECC-based authentication scheme with a session key agreement. It solves the infeasible computations and provides a mechanism for the password change/update phase. The proposed scheme achieves mutual authentication and resists privileged insider attacks, suggesting potential applicability of the three hard problems in designing identification and authentication schemes in distributed computer networks.
Article
Computer Science, Information Systems
Qing Fan, Debiao He, Jianhua Chen, Cong Peng, Lianhai Wang
Summary: Driven by cloud computing technologies, public-key encryption with keyword search (PEKS) is becoming popular in various fields. However, there are security and privacy issues in the encrypted data search and access processes. This article presents a postquantum searchable encryption scheme named Isoga, which fights against keyword guessing attacks. The scheme utilizes designated tester primitive and quantum resistance of isogeny.
IEEE SYSTEMS JOURNAL
(2023)
Article
Computer Science, Information Systems
Xi Xie, Sihem Mesnager, Nian Li, Debiao He, Xiangyong Zeng
Summary: This article discusses the locally-APN power functions introduced by Blondeau, Canteaut, and Charpin, which generalize APN functions and are potentially more resistant to differential attacks. The study focuses on the Niho type power function F(x) = xs(2m- 1)+1 over the finite field F22m, where s is the multiplicative inverse modulo 2m + 1. The authors prove the locally-APN property of F(x) and determine its differential spectrum through detailed analysis of equation solutions in finite fields. The article highlights that computer experiments confirm the coverage of all Niho type locally-APN power functions for 2 <= m <= 10. Additionally, the boomerang spectrum of F(x) is determined by using its differential spectrum.
IEEE TRANSACTIONS ON INFORMATION THEORY
(2023)
Article
Computer Science, Information Systems
Xin Chen, Debiao He, Muhammad Khurram Khan, Min Luo, Cong Peng
Summary: The Internet of Medical Things (IoMT), which combines medical sensors with the Internet of Things, enables remote diagnosis and real-time decision making. However, it raises security challenges due to the sensitive patient information involved. This article presents a new certificateless signcryption (CLSC) scheme for data privacy in IoMT, utilizing the Schnorr signature for improved security and performance.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Telecommunications
Biwen Chen, Zhongming Wang, Tao Xiang, Jiyun Yang, Debiao He, Kim-Kwang Raymond Choo
Summary: Vehicular Ad-Hoc Networks (VANETs) have improved driving safety and comfort through vehicular wireless communication technology. However, existing authentication protocols in VANETs have limitations in terms of privacy protection, malicious entity tracking, and cross-domain authentication. To address these challenges, we propose a secure and effective group signature scheme for anonymous authentication and traceable identity within a domain, and a blockchain-based privacy-preserving cross-domain authentication protocol (BCGS) that integrates both blockchain and group signature. Our evaluations show that BCGS outperforms other approaches in terms of security, computation, and storage costs.
VEHICULAR COMMUNICATIONS
(2023)
Article
Engineering, Multidisciplinary
Jie Cui, Nan Liu, Qingyang Zhang, Debiao He, Chengjie Gu, Hong Zhong
Summary: The rapid development of the Industrial Internet of Things (IIoT) has improved industrial manufacturing efficiency through intelligent devices and collaboration. However, cross-domain communication in IIoT faces security and privacy issues. To address these issues, we propose an efficient and anonymous cross-domain authentication scheme based on blockchain, which improves authentication efficiency, ensures device anonymity, and combines blockchain and dynamic accumulator technology for fast authentication.
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING
(2023)
Article
Computer Science, Hardware & Architecture
Qi Feng, Debiao He, Min Luo, Xinyi Huang, Kim-Kwang Raymond Choo
Summary: In this paper, we propose an Efficient and Privacy-preserving Real-time Incentive system for CrowdsEnsing (EPRICE), designed to estimate the reliability of sensing data in a privacy-preserving setting. The theoretical analysis demonstrates that our proposed system achieves a high level of privacy-preserving for real-time reward distribution and supports practical privacy-preserving properties. The experimental findings show that our proposed EPRICE system significantly decreases the computation costs by three orders of magnitude compared with other competing schemes.
IEEE TRANSACTIONS ON COMPUTERS
(2023)
Article
Computer Science, Theory & Methods
Jie Cui, Hu Sun, Hong Zhong, Jing Zhang, Lu Wei, Irina Bolodurina, Debiao He
Summary: With the development of communication technology and intelligent transportation systems, vehicular ad hoc networks (VANETs) have gained popularity, leading to increased importance of VANET communication security. An intrusion detection system (IDS) is essential in improving network security, but faces challenges in accuracy, efficiency, and completeness due to frequent location changes in VANETs. This study proposes a collaborative intrusion detection system (CIDS) model that utilizes federated learning in software-defined VANETs to address these issues. The model trains through collaboration among local software-defined networks (SDNs) without sharing local network data flows, improving IDS scalability and globality.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
(2023)
Article
Computer Science, Hardware & Architecture
Quanrun Li, Debiao He, Haifeng Liu, Xiaoying Jia, Zhichao Yang
Summary: This paper presents a security-enhanced conditional privacy-preserving authentication protocol to address the vulnerability of existing protocols in the smart grid to attacks from quantum computers. The protocol is shown to have superior security in the random oracle model, and its potential utility and efficiency improvement are demonstrated through performance analysis.
JOURNAL OF SYSTEMS ARCHITECTURE
(2023)
Article
Computer Science, Information Systems
Lang Pu, Chao Lin, Biwen Chen, Debiao He
Summary: The Industrial Internet of Things (IIoT) utilizes physical devices to collect data, which needs to be saved on a cloud server for processing and analysis. Traditional encryption techniques make it difficult to search the generated ciphertext. Public-key encryption with keyword search (PEKS) can provide data encryption and confidential searching, but it is susceptible to internal keyword guessing attacks (IKGAs) due to limited commonly used keywords. A user-friendly public-key authenticated encryption with keyword search (PAEKS) scheme is proposed in this article to address this issue.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Information Systems
Ningbin Yang, Chunming Tang, Debiao He
Summary: The Industrial Internet of Things (IIoT) and cloud computing have seen rapid development, leading to enterprises outsourcing industrial data via the cloud to lower costs and improve efficiency. However, concerns over data security and privacy in cloud outsourcing systems exist. To address these issues, this study proposes a blockchain-assisted secure data-sharing protocol with dynamic multiuser keyword search (DMUKS) in IIoT. The protocol utilizes blockchain techniques to solve the single-key exposure problem and allows for fast certificateless keyword search, dynamic user and key management.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Computer Science, Theory & Methods
Biwen Chen, Tao Xiang, Debiao He, Hongwei Li, Kim-Kwang Raymond Choo
Summary: In this paper, we propose BPVSE, a new verifiable and dynamic searchable encryption scheme for cloud-assisted EHR. BPVSE leverages blockchain and hash-proof chain to enable public verification of search results without a trusted authority. It supports dynamic datasets with forward and backward security, using a newly designed hidden data structure. Additionally, BPVSE allows for efficient encryption and parallel search.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Engineering, Environmental
Ding Ling Gao, Wei Wei Lin, Qiao Jing Lin, Fei Fei Dai, Yan Xue Xue, Jian Hua Chen, Yu Xiang Liu, Yang Huang, Qian Yang
Summary: In this study, Cu2+ was doped into ZnAl hydrotalcite to enhance its phosphate adsorption capacity. The Cu2+ doping increased the inter-layer spacing and specific surface area of the adsorbent. The optimal doping amount was found to be 1% of the total metal molarity. The resulting ZnAlCu layered trimetallic oxide exhibited significantly improved phosphate adsorption performance compared to ZnAl hydrotalcite and ZnAlCu ternary hydrotalcite.
JOURNAL OF ENVIRONMENTAL CHEMICAL ENGINEERING
(2023)
Article
Computer Science, Theory & Methods
Yang Liu, Debiao He, Qi Feng, Min Luo, Kim-Kwang Raymond Choo
Summary: The anonymous credential has various applications, such as pay-as-you-go strategy in electronic subscription. However, the strategy may not suit non-regular users as they require stricter identity supervision. Identity supervision is a crucial part of an anonymous credential system and needs to be both reasonable and practical in regulating user behavior. The combination of customized k-times and epochs is necessary due to the limitations of existing works. This paper presents a permissioned redactable credentials scheme that allows fine-grained supervision, user control, and user redaction, providing potential utility when evaluated for performance.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Information Systems
Pengfei Wu, Jianting Ning, Wu Luo, Xinyi Huang, Debiao He
Summary: This article introduces a T-SGX framework based on trusted execution environments, which aims to protect user privacy and ensure system efficiency by dynamically loading enclave objects. All these objects are secretly shared and stored in a verifiably distributed share management system to mitigate exposure of sensitive information. Security analysis shows that T-SGX achieves secure distributed computing without privacy leakage to unauthorized parties. Experimental results demonstrate that T-SGX outperforms a state-of-the-art solution, with 11.9%-29.7% less overhead in SGX-based applications.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Computer Science, Hardware & Architecture
Xinjie Zhu, Debiao He, Zijian Bao, Min Luo, Cong Peng
Summary: Online social networks (OSNs) are becoming increasingly popular as the demand for online interaction grows. However, current OSNs using centralized identity management systems face issues of single point of failure and privacy data leakage. This paper presents a decentralized identity (DID) protocol to address these challenges, including a range proof protocol for attribute privacy and an extended identity model for identity revocation. The proposed protocol is implemented on the blockchain and analysis shows it provides stronger privacy protection with acceptable computation cost and blockchain overheads.
IEEE OPEN JOURNAL OF THE COMPUTER SOCIETY
(2023)