共查询到20条相似文献,搜索用时 15 毫秒
1.
《Digital Communications & Networks》2021,7(3):295-307
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain has shown a good application prospect in many fields, from the initial cryptocurrency to the Internet of Things (IoT) and Vehicular Ad-Hoc Networking (VANET), which is considered as the beginning of rewriting our digital infrastructure. However, blockchain confronts some privacy risks that hinder its practical applications. Though numerous surveys reviewed the privacy preservation in blockchain, they failed to reveal the latest advances, nor have they been able to conduct a unified standard comprehensive classification of the privacy protection of permissionless blockchain. Therefore, in this paper, we analyze the specific characteristics of permissionless blockchain, summarize the potential privacy threats, and investigate the unique privacy requirements of blockchain. Existing privacy preservation technologies are carefully surveyed and evaluated based on our proposed evaluation criteria. We finally figure out open research issues as well as future research directions from the perspective of privacy issues. 相似文献
2.
3.
Mpitziopoulos A. Gavalas D. Konstantopoulos C. Pantziou G. 《Communications Surveys & Tutorials, IEEE》2009,11(4):42-56
Jamming represents the most serious security threat in the field of Wireless Sensor Networks (WSNs), as it can easily put out of order even WSNs that utilize strong highlayer security mechanisms, simply because it is often ignored in the initial WSN design. The objective of this article is to provide a general overview of the critical issue of jamming in WSNs and cover all the relevant work, providing the interested researcher pointers for open research issues in this field. We provide a brief overview of the communication protocols typically used in WSN deployments and highlight the characteristics of contemporary WSNs, that make them susceptible to jamming attacks, along with the various types of jamming which can be exercised against WSNs. Common jamming techniques and an overview of various types of jammers are reviewed and typical countermeasures against jamming are also analyzed. The key ideas of existing security mechanisms against jamming attacks in WSNs are presented and open research issues, with respect to the defense against jamming attacks are highlighted. 相似文献
4.
5.
Wireless Networks - As the core of a blockchain system, the consensus mechanism not only helps to maintain the consistency of node data, but also gets involved in the issuance of tokens and... 相似文献
6.
Within 24 hours in November 2002, a British hacker was indicted by the US justice Department for breaking into military and NASA computer systems and the US Congress passed a bill that funded $903 million for computer security initiatives (Wired.com, 14 Nov. 2002). Meanwhile, nearly every multimedia conference since 11 September 2001 has discussed the need for increased computer security, both in the public and private sector. Is this burgeoning field all hype? It seems that although some hype exists, the fears are warranted. On one hand, terrorists and "hacktivists" have employed various means to attack or shut down government sites since the Web's inception. On the other hand, despite grave warnings by the US government and security companies, we have not really seen great dangers of cyberterrorism in the private sector. What we have seen, however, is an increase in general hackers attacking the public and private sector either to prove they can, to cause aggravation, or for financial gain. The paper discusses basis security concerns, event management software and intrusion detection. 相似文献
7.
Web of cybersecurity: Linking,locating, and discovering structured cybersecurity information 下载免费PDF全文
Takeshi Takahashi Bhola Panta Youki Kadobayashi Koji Nakao 《International Journal of Communication Systems》2018,31(3)
Cybersecurity is one of the main concerns of many organizations today, and accessibility to cybersecurity information in a timely manner is crucial to maintaining cybersecurity. Various repositories of cybersecurity‐related information are publicly available on the Internet. However, users are unaware of many of them, and it is impractical for them to keep track of all of them. Cybersecurity information stored in these repositories must be able to be located and accessed by the parties who need it. To address this issue, this paper proposes a mechanism of linking, locating, and discovering various cybersecurity information to improve its accessibility in a timely manner. This mechanism allows us to locate various cybersecurity information having different schemata by generating metadata with which a list of cybersecurity information is managed. The information structure incorporated in this mechanism is unique, and it makes our mechanism flexible and extensible. The structure consists of categories and formats that are linked to each other. The mechanism can propagate information updates to minimize the risk of obsolete information. This paper also introduces a prototype of the mechanism to demonstrate its feasibility, and it analyzes the mechanism's extensibility, scalability, and information credibility. Through this study, we aim to improve the accessibility of cybersecurity information on the Internet and facilitate information sharing beyond organizational borders, with the eventual goal of creating a web of cybersecurity. 相似文献
8.
A survey of possible applications of high-temperature superconductors (HTSs) to antennas and antenna feed networks is presented. The frequency range considered is 1 MHz for 100 GHz. Three antenna application areas seem appropriate for HTS material: electrically small antennas and their matching networks; feed and matching networks for compact arrays with enhanced directive gain (superdirective arrays); and feed networks for millimeter-wave arrays. Preliminary experimental results are presented on YBaCuO and TlBaCaCuO 500 MHz half-loop antennas that show an increase in radiation efficiency (compared with a copper antenna at the same temperature) by a factor of 5 for the HTS antennas 相似文献
9.
10.
Parallel and distributed data mining offer great promise for addressing cybersecurity. The Minnesota Intrusion Detection System can detect sophisticated cyberattacks on large-scale networks that are hard to detect using signature-based systems. 相似文献
11.
目前Android系统占领了智能移动操作系统的绝大多数份额,然而Android系统的安全问题却令人忧虑,近年来频频爆出高危漏洞,给广大Android用户带来了很大的安全隐患。对Android系统漏洞检测进行了研究,提出了一种基于匹配的快速检测Android系统漏洞的方法,同时设计和实现了一个基于脚本的漏洞扫描工具。实验表明,该工具可有效检测Android系统漏洞,运行效果良好。 相似文献
12.
Carrara Gabriel R. Burle Leonardo M. Medeiros Dianne S. V. de Albuquerque Célio Vinicius N. Mattos Diogo M. F. 《电信纪事》2020,75(3-4):163-174
Annals of Telecommunications - Blockchain is a disruptive technology that relies on the distributed nature of the peer-to-peer network while performing an agreement, or consensus, a mechanism to... 相似文献
13.
Cyber attacks on vehicles not only cause privacy leaks and economic losses but also endanger human life and even rise to national public safety issues.Therefore,the research on the cybersecurity of intelligent and connected vehicle (ICV) has become a research hot spot.Firstly,the structural status and characteristics of the in-vehicle network (IVN) in ICV were introduced,and the challenges and constraints of cybersecurity enhancement design for IVN were also presented.Secondly,focusing on the current functional safety and cybersecurity issues of IVN,a survey of the current cybersecurity enhancement researches for IVN was conducted.Finally,according to the characteristics of the IVN structure,some important research directions and suggestions about cybersecurity problems of ICV were pointed out from the three aspects of standard construction,functional safety and cybersecurity. 相似文献
14.
15.
信息化程度越来越高在给人们的日常生活及工作带来便利的同时,也容易引发一系列的安全隐患问题。在信息化时代背景下,随着计算机网络的普及,所涉及的行业领域越来越广,计算机网络逐渐成为现代社会生产和发展过程中不可或缺的重要组成部分。但是过于依赖于计算机网络,也同样为各个行业带来了诸多隐患。计算机网络安全漏洞的出现,必然会对计算机网络的安全运行造成极大影响,如果不采取有效的防范措施,就会造成网络系统遭受破坏或信息泄露等一系列问题。文章就计算机网络安全漏洞进行简要分析,并在此基础上对其有效的防范措施进行深入探讨,希望能够为我国计算机网络系统的安全带来一定保障作用。 相似文献
16.
基于区块链的可信数据交换技术能实现去中心化网络中隐私数据的保护与流通,推动数字化时代打破“数据孤岛”壁垒。分析了可信数据交换的背景和需求,阐述了基于区块链可信数据交换及其关键技术,并结合区块链底层基础设施平台展示了应用情况。 相似文献
17.
18.
《Digital Communications & Networks》2020,6(2):147-156
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through decentralized, trustless, peer-to-peer systems. This research identifies peer-reviewed literature that seeks to utilize blockchain for cyber security purposes and presents a systematic analysis of the most frequently adopted blockchain security applications. Our findings show that the Internet of Things (IoT) lends itself well to novel blockchain applications, as do networks and machine visualization, public-key cryptography, web applications, certification schemes and the secure storage of Personally Identifiable Information (PII). This timely systematic review also sheds light on future directions of research, education and practices in the blockchain and cyber security space, such as security of blockchain in IoT, security of blockchain for AI data, and sidechain security. 相似文献
19.
At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘ value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains. 相似文献
20.
In recent years, numerous standards related to the cybersecurity of smart grids have been published, which led to the challenge for operators in obtaining indications that match their specific objectives and contexts. Although several studies approached this problem by providing more or less comprehensive surveys and overviews of smart grid cybersecurity standards, none of them was dedicated to the actual and important subject of cybersecurity controls. This paper aims at filling this gap. A systematic literature analysis was conducted which resulted in the identification of 19 broadly recognised standards that specify cybersecurity controls applicable to the smart grid infrastructure. The publications are described in respect to the controls they define and referred to evaluation criteria. In result, this paper constitutes a guideline on standardised cybersecurity controls for smart grids, where (criteria‐based) indications help to select standards for a particular smart grid area or specific goals. The method of the research as well as the standards' selection and evaluation criteria are presented. 相似文献