Article
Computer Science, Information Systems
Most Nuzman Nahar, Abeer Alsadoon, P. W. C. Prasad, Nabil Giweli, Omar Hisham Alsadoon
Summary: This paper proposes an enhanced Mixed Reality surgery system with real-time authentication to increase security and privacy. The system includes an SMS-based OTSP and IRIS biometric authentication technique, successfully overcoming limitations of previous solutions, reducing processing time, and enhancing system resistance against hacking attacks.
MULTIMEDIA TOOLS AND APPLICATIONS
(2021)
Article
Engineering, Electrical & Electronic
He Xu, Xianzhen Yin, Feng Zhu, Peng Li
Summary: This paper presents a new RFID system, Au-Hota, which can authenticate both tags and users simultaneously, and resist replay and impersonation attacks. The system assigns a unique identifier to users based on inductive coupling between tags, achieving good authentication performance.
IEEE SENSORS JOURNAL
(2021)
Article
Computer Science, Information Systems
Yu-Ju Tu, Gaurav Kapoor, Selwyn Piramuthu
Summary: This article highlights the importance of properly authenticating RFID tags in systems where they may be read by multiple readers and ownership of items may change. The researchers develop a group ownership authentication protocol for RFID-tagged items, but identify critical vulnerabilities in their evaluation. The discussion focuses on the sources of these vulnerabilities and common precautions that can be taken to mitigate them.
INFORMATION SYSTEMS FRONTIERS
(2022)
Article
Computer Science, Information Systems
Ali Kazemy, Ramasamy Saravanakumar, James Lam
Summary: This paper discusses the master-slave synchronization issue of neural networks under mixed-type communication attacks, proposing a synchronization strategy based on static output feedback controller and event-triggered scheme, and investigating various types of network attacks in a unified Markovian jump framework. Design criteria are derived using Lyapunov-Krasovskii theory and stochastic analysis techniques, formulated as matrix inequalities, and a convex optimization algorithm is proposed to design the static output feedback controller. Finally, the effectiveness of the event-triggered static output feedback controller is demonstrated through two chaotic examples.
INFORMATION SCIENCES
(2021)
Article
Acoustics
Ali Javed, Khalid Mahmood Malik, Aun Irtaza, Hafiz Malik
Summary: This paper presents a spoofing countermeasure using novel acoustic ternary patterns and Gammatone cepstral coefficients features to counter voice spoofing attacks on VCSs. Experimental analysis demonstrates the effectiveness of this method in detecting various voice spoofing attacks.
Article
Computer Science, Information Systems
Ye Bi, Kai Fan, Kuan Zhang, Yuhan Bai, Hui Li, Yintang Yang
Summary: This article proposes an ultralightweight RFID ownership transfer protocol based on permutation function, which reduces computational overhead through efficient bit operations and provides advantages in terms of privacy protection and security.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Automation & Control Systems
Carlos Trapiello, Vicenc Puig, Damiano Rotondo
Summary: This paper presents a zonotopic set-invariance analysis of replay attacks targeting the communication network serving the supervisory layer of complex control systems, using an observer-based detection scheme. Two scenarios are considered based on the attacker's access to system resources, with analytical expressions derived for attack detectability under bounded uncertainties. The validity of the analysis is demonstrated through simulations on a quadruple-tank process.
SYSTEMS & CONTROL LETTERS
(2021)
Article
Computer Science, Theory & Methods
Congming Wei, Bingyou Dong, Jialiang Hua, Xiaoyang Dong, Guoyan Zhang
Summary: In this paper, a 7-round pseudo-preimage attack is presented using MILP models. The preimage attack on 4-round Whirlwind is improved with reduced time complexity. Additionally, a quantum collision attack on 5-round Whirlwind is discovered using quantum algorithms.
DESIGNS CODES AND CRYPTOGRAPHY
(2023)
Article
Computer Science, Information Systems
Soheyla ZakeriKia, Rahman Hajian, Seyed Hossein Erfani, Amir Masoud Rahmani
Summary: Vehicular ad hoc Networks (VANETs) are essential in the world, encompassing the Internet of Vehicles, Vehicular Sensor Networks (VSNs), and electronic vehicles. Communication in VANETs is susceptible to security issues due to the open channel and high mobility. Existing authentication schemes have security flaws and call for a secure and robust roaming authentication mechanism.
Article
Computer Science, Information Systems
Muhammad Bilal, Sandile C. Showngwe, Abid Bashir, Yazeed Y. Ghadi
Summary: To secure web applications, the paper proposes an anticipated strategy that leverages encoded emails and a novel password form pattern method. The proposed EAAA protocol ensures security by relying on email authenticity and a special encrypted alphanumeric string (SSEAS), protecting the OpenID URL's identity from MITM and phishing attacks. Experimental results show that the EAAA protocol has a higher response time of 339 ms compared to existing methods such as Single Sign-On (SSO) and OpenID.
CMC-COMPUTERS MATERIALS & CONTINUA
(2023)
Article
Automation & Control Systems
Carlos Trapiello, Vicenc Puig
Summary: This paper proposes a method using zonal for designing watermark signals and investigates the estimation using a zonotopic Kalman filter in the context of stationary Gaussian processes. By introducing a new performance metric and studying the relationship between system steady-state operation and the minimal robust positive invariant set of estimation errors, it reveals the impact of digital watermark signals on system operation.
IEEE-CAA JOURNAL OF AUTOMATICA SINICA
(2022)
Article
Computer Science, Information Systems
Shunli Zhao, Qisen Li, Haifeng Cao
Summary: Network attack detection is crucial for cyber-physical systems, and replay attack is a common type of network attack. Although watermarking schemes are effective in detecting replay attacks, they face challenges when applied to process control systems. To address this issue, two novel smooth watermarking methods are proposed and validated through simulated examples.
Article
Computer Science, Information Systems
Hoorin Park, Wonjun Lee
Summary: This paper proposes a collision-assisted authentication scheme called TagDuet, which can improve the security of RFID systems without the need for fingerprint library establishment. TagDuet places an independent backscatter tag near the reader and utilizes tag collisions to enhance wireless security. The phase cancellation decoding algorithm accurately decodes the collisions, making TagDuet fully compatible with commodity RFID tags. The performance of TagDuet is evaluated with commodity tags in randomized channels, and its resilience against replay and relay attacks is demonstrated.
Article
Computer Science, Information Systems
Ming-Hour Yang, Chien-Hung Chen, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie
Summary: This article proposes a method for transferring ownership of a large number of goods simultaneously, which does not require a trusted third party and can securely and efficiently transfer group ownership of multiple tags. It can resist most known attacks and has better security and fewer transmitted messages compared to other methods.
IEEE SYSTEMS JOURNAL
(2023)
Article
Multidisciplinary Sciences
Mahmood A. Al-Shareeda, Selvakumar Manickam
Summary: Mobile ad hoc networks (MANETs) have been widely used in various fields, but the inter-node communication is vulnerable to security attacks, such as Man-In-The-Middle (MITM) attacks. This study aims to investigate the impact of attackers' strategies on executing MITM assaults in MANETs and proposes the use of encryption to prevent such attacks.