Article
Optics
Xiaogang Wang, Yao Zhang, Lin Zhang, Qingming Zhou, Min Yao
Summary: This paper proposes a secure method for encoded-image-based authentication using a simplified optical diffractive-imaging scheme and secret-key-assisted phase retrieval. The method provides an enlarged key space and authentication without visual disclosure of the secret image, ensuring a high level of security.
OPTICS AND LASER TECHNOLOGY
(2024)
Article
Multidisciplinary Sciences
Philip Georgi, Qunshuo Wei, Basudeb Sain, Christian Schlickriede, Yongtian Wang, Lingling Huang, Thomas Zentgraf
Summary: This study demonstrates a novel secret sharing scheme based on metasurface holography, utilizing holographic images for splitting and reconstructing encrypted information, achieving high fidelity secret extraction.
Article
Computer Science, Hardware & Architecture
Abolfazl Sajadi, Ahmad Shabani, Bijan Alizadeh
Summary: The Physical Unclonable Function (PUF) is a hardware block that assigns a unique fingerprint to each physical entity by exploiting process variations. In this paper, a low-cost PUF-based authentication mechanism called DC-PUF is developed for IoT devices to resist machine-learning attacks. The mechanism uses the dependency chain (DC) strategy to obfuscate the correlation between challenge-response pairs and propose a CNN-based attack scenario. The experimental results show that DC-PUF has a higher resistance against CNN-based attacks compared to existing PUF structures.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
(2023)
Article
Computer Science, Information Systems
Shuai Chen, Bing Li, Ziheng Chen, Yan Zhang, Caicai Wang, Cheng Tao
Summary: This article introduces a lightweight protocol based on Shamir's secret sharing for preserving the privacy of physical unclonable function (PUF) in the Internet of Things (IoT). Protocol A randomizes the mappings between challenges and responses to resist machine learning attacks, while Protocol B realizes a mutual authentication protocol without exposing the response.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Information Systems
Songsong Zhang, Xie Yong, Min Luo, Debiao He, Kim-Kwang Raymond Choo
Summary: This paper proposes an efficient dual-server secret sharing protocol (DssP) based on password authentication for cloud storage services. Users only need to remember a simple password to achieve random key access through dual server cooperation.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Information Systems
Tian-Fu Lee, Xiucai Ye, Syuan-Han Lin
Summary: Group authenticated key agreements (GAKAs) using physical unclonable function (PUF) solve the security and efficiency problems of the Internet of Medical Things (IoMT) by enabling authentication and secure information exchange among medical sensor devices.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Computer Science, Theory & Methods
Morteza Adeli, Nasour Bagheri, Honorio Martin, Pedro Peris-Lopez
Summary: Recently, the use of Physical Unclonable Functions (PUF) to design lightweight authentication protocols for constrained environments such as the Internet of Things (IoT) has gained attention. This paper presents the first third-party security analysis of PHEMAP and Salted PHEMAP and reveals their vulnerabilities to impersonation, de-synchronization, and traceability attacks. Additionally, two enhanced lightweight authentication protocols, PBAP and Salted PBAP, based on PUF chains are introduced as practical solutions for resource-constrained IoT environments.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING
(2022)
Article
Computer Science, Information Systems
Kai Gao, Ji-Hwei Horng, Chin-Chen Chang
Summary: The study introduces a secret image sharing scheme based on a fractal matrix, distributing secret data into three indistinguishable shares. Any two of the three shares can cooperate to extract the exact secret data, and two authentication mechanisms are devised to prevent tampering.
Article
Computer Science, Information Systems
Fahem Zerrouki, Samir Ouchani, Hafida Bouarfa
Summary: With the increasing connection of constrained devices in the Internet of Things (IoT) network, security issues have become a major concern. Authentication, as a significant challenge, is difficult to achieve with conventional protocols due to limitations in IoT devices. However, Physical Unclonable Functions (PUF) offer a promising low-cost security solution by eliminating the need to store secret keys in device memory. This paper proposes two lightweight Mutual Authentication and Key Exchange Protocols (MAKEP) for IoT devices using PUF, enabling secure communication without storing any information on the device's memory.
INTERNET OF THINGS
(2023)
Article
Computer Science, Information Systems
Jie Tang, Hong Wen, Huan-Huan Song, Long Jiao, Kai Zeng
Summary: In this paper, a new physical layer group secret key generation scheme is proposed to reduce the consumption of channel probing and improve the efficiency for group key generation. The transmitter randomly generates the group secret key and directly broadcasts the downlink data symbols to the group users, allowing for efficient observation and perfect secrecy.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Engineering, Civil
Brij Bhooshan Gupta, Akshat Gaurav, Ching-Hsien Hsu, Bo Jiao
Summary: The maritime transportation system is responsible for providing safe transportation in the vast area covered by water. IoT devices are used for continuous monitoring of vessel performance and secure data sharing to protect confidential information. Identity-based encryption is used for authentication management in this scheme.
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS
(2023)
Review
Chemistry, Analytical
Wencheng Yang, Song Wang, Nor Masri Sahri, Nickson M. Karie, Mohiuddin Ahmed, Craig Valli
Summary: This review paper provides a comprehensive survey on the current research of biometrics in IoT security, focusing on authentication and encryption. The integration of biometrics with cryptography in biometric-cryptographic systems enhances the security of IoT devices. Challenges and potential solutions in applying biometrics to IoT are also identified and analyzed, contributing to the advancement of research in this field.
Article
Multidisciplinary Sciences
Snehlata Yadav, Namita Tiwari
Summary: Digital security as a service is crucial in protecting user privacy and ensuring secure content delivery. While most social media platforms use end-to-end encryption, multimedia data transmission in group communication is not encrypted. Broadcast encryption is an effective solution to send desired multimedia data only to legitimate subscribers.
Article
Computer Science, Information Systems
Rui Xu, Xu Wang, Kirill Morozov, Chi Cheng, Jintai Ding
Summary: This paper revisits and proves that two (t, m, n) group oriented secret sharing schemes cannot provide the so-called group oriented property. Concrete attacks are developed to demonstrate how an unauthenticated adversary can participate in the reconstruction phase and obtain the secret.
INFORMATION SCIENCES
(2022)
Article
Computer Science, Hardware & Architecture
Mohammed El-Hajj, Ahmad Fadlallah, Maroun Chamoun, Ahmed Serhrouchni
Summary: Security is a significant issue in IoT due to resource and energy constraints on implementing cryptographic methods. Physical Unclonable Functions (PUFs) are considered as a method to enhance device security with their unpredictable and unclonable characteristics. The proposed Arbiter PUF scheme resists machine learning attacks and avoids the shortcomings of previous PUF-based authentication protocols.
Article
Computer Science, Information Systems
Lake Bu, Mark G. Karpovsky, Michel A. Kinsy
COMPUTERS & SECURITY
(2019)
Article
Computer Science, Hardware & Architecture
Lake Bu, Mihailo Isakov, Michel A. Kinsy
IET COMPUTERS AND DIGITAL TECHNIQUES
(2019)
Article
Computer Science, Hardware & Architecture
Lake Bu, Mark G. Karpovsky, Michel A. Kinsy
IET COMPUTERS AND DIGITAL TECHNIQUES
(2019)
Article
Computer Science, Information Systems
Michel A. Kinsy, Lake Bu, Mihailo Isakov, Miguel Mark
Article
Computer Science, Information Systems
Muna Al-Hawawreh, Nour Moustafa
Summary: Cyber-physical control loops are crucial in the industrial Internet of Things, but vulnerable to attacks. This study proposes an AI-based attack intelligence framework for identifying and extracting attack intelligence, and demonstrates its effectiveness using a real-world case.
Article
Computer Science, Information Systems
Youcef Azzoug, Abdelmadjid Boukra
Summary: This paper presents a novel JBR routing protocol based on swarm-inspired optimization to reduce data packet loss and introduces a concept of route stability to predict the stability degree of road segments.
Article
Computer Science, Information Systems
Paulo Cesar Prandel, Priscila Solis Barreto
Summary: This study proposes two stateful techniques, LGFS-C and LGFS-C-peak, which optimize AoI metrics by making conditional preemption decisions on packets based on system state variables. Experimental results show that both techniques achieve better optimization results than the state-of-the-art techniques and may improve CPS performance.
Article
Computer Science, Information Systems
Michele Girolami, Davide La Rosa, Paolo Barsocchi
Summary: In this work, a CrowdSensing-based proximity detection technique for visitors in an indoor museum is proposed and investigated. The technique utilizes data collected from users' smartphones, which can collect and upload Received Signal Strength (RSS) values of nearby Bluetooth tags to a backend server along with context-information. Experimental results show a clear improvement in performance when data from the crowd are exploited with the proposed architecture.
Review
Computer Science, Information Systems
Nazli Tekin, Ahmet Aris, Abbas Acar, Selcuk Uluagac, Vehbi Cagri Gungor
Summary: This paper provides a review of existing studies on energy consumption of on-device machine learning models for IoT applications. It introduces a taxonomy to define approaches for energy-aware on-device ML models and discusses open issues for further research in this field.
Article
Computer Science, Information Systems
Yangyang Li, Lei Feng, Yang Yang, Wenjing Li
Summary: This study investigates a task offloading scheme and trajectory optimization in a multi-UAV-assisted system and proposes a heterogeneous multi-agent reinforcement learning-based approach. By training with generated environment states offline, the algorithm's performance is optimized, resulting in superior energy consumption and task latency.
Article
Computer Science, Information Systems
Xinrong Zhang, Ye-Hwa Chen, Dongsheng Zhang, Ruiying Zhao, Lei Guo
Summary: This paper proposes a game-theoretic method based on constraint following theory to enhance the control resilience of cyber-physical systems. It addresses the uncertainties, mechanical constraints, and cyberattacks that these systems may encounter. Experimental results demonstrate the resilience of the controlled system against cyberattack disturbances and other threat attacks, and simulations verify the superiority of the optimal control design parameter.
Article
Computer Science, Information Systems
Shahaf Yamin, Haim H. Permuter
Summary: This study examines the problem of downlink wireless routing in integrated access backhaul (IAB) networks and proposes a multi-agent reinforcement learning algorithm for joint routing optimization. Experimental results demonstrate the effectiveness of the algorithm in achieving near-centralized performance.
Article
Computer Science, Information Systems
Phuong T. Tran, Le Thi Thanh Huyen, Ba Cao Nguyen, Huu Minh Nguyen, Tran Manh Hoang
Summary: This paper introduces and investigates a system utilizing an unmanned aerial vehicle (UAV) to assist terrestrial backscattering devices (BDs) in wireless energy charging and data transmission. The study considers energy efficiency (EE) and age-of-information (AoI) in performance assessment, and solves an optimization problem to maximize EE and minimize transmit power. Analytical and simulation results show that optimizing packet length and UAV altitude can achieve the best performance.
Article
Computer Science, Information Systems
Mohammed Aissaoui, Chiraz Houaidia, Adrien Van Den Bossche, Thierry Val, Leila Azouz Saidane
Summary: This paper proposes a distributed MAC protocol that supports PNC in static multi-hop wireless networks. The protocol's advantages over conventional CSMA/CA and PNCOPP MAC protocols are demonstrated through practical testing and numerical results.
Article
Computer Science, Information Systems
Mohamed Selim Korium, Mohamed Saber, Alexander Beattie, Arun Narayanan, Subham Sahoo, Pedro H. J. Nardelli
Summary: This paper presents a novel framework for intrusion detection in the Internet of Vehicles environment, specifically designed to detect cyberattacks on vehicles. The proposed system uses machine learning to detect abnormal behavior by analyzing network traffic. Experimental results demonstrate the effectiveness of the system in terms of accuracy and speed.
Article
Computer Science, Information Systems
Xue Li, Xiaojuan Chen, Guohua Li
Summary: This study proposes a two-tier cooperative edge network model for Power Internet of Things (PIoT) and introduces a fairness indicator based on the Theil index. By formulating a fairness and delay guaranteed task offloading and load balancing optimization problem, the research demonstrates that cooperation at the edge can significantly improve the performance of PIoT.
Article
Computer Science, Information Systems
Kun Yang, Peng Sun, Dingkang Yang, Jieyu Lin, Azzedine Boukerche, Liang Song
Summary: The focus of this research is to effectively coordinate the limited computing power of various components in intelligent transportation systems (ITS) and provide reliable support for resource-intensive applications through efficient resource allocation methods in the highly dynamic Internet-of-Vehicles environment. A novel joint computing and communication resource scheduling method is proposed, which includes a hierarchical three-layer Vehicular Edge Computing (VEC) framework and onboard joint computation offloading and transmission scheduling policy. Extensive simulation tests and ablation experiments demonstrate the effectiveness and stability of the proposed method in achieving stable performance and reducing scheduling overhead, improving resource utilization, and minimizing data transmission delay caused by vehicle motion.
Article
Computer Science, Information Systems
Rakesh Das, Jitendra Nath Bera
Summary: This paper focuses on the development of a highly reliable customized home area networking (HAN) to provide a robust communication network for smart home owners. The proposed HAN utilizes a multi-gateway-based partial mesh networking topology with ZigBee control boards to enable remote monitoring and control of individual appliances within the home. The introduction of active and pseudo gateway concept enhances the reliability of the HAN by automatically reconfiguring in case of failure. Experimental verification demonstrates the fail-proof and reliable nature of the proposed HAN with alternate routes and activation of pseudo gateway as active gateway.
Article
Computer Science, Information Systems
Changhao Li, Huanjing Li, Tao Wu, Lei Yan, Suzhi Cao
Summary: The maximum flow problem based on a contact graph in Delay-Tolerant Networking (DTN) is important for routing and data planning. Existing algorithms cannot be directly applied to topological networks with time series changes. This paper proposes a method of dismantling and reconstructing the graph to solve the maximum flow problem in a continuously changing network. The method discretizes time on different nodes to reduce the scale of the graph, optimizing data transmission, improving data delivery rate, and reducing link occupation.