共查询到20条相似文献,搜索用时 109 毫秒
1.
Muhammad Samiullah Waqar Aslam Arif Mehmood Muhammad Saeed Ahmad Shafiq Ahmad Adel M. Al-Shayea Muhammad Shafiq 《计算机、材料和连续体(英文)》2022,71(1):753-769
Smart and interconnected devices can generate meaningful patient data and exchange it automatically without any human intervention in order to realize the Internet of Things (IoT) in healthcare (HIoT). Due to more and more online security and data hijacking attacks, the confidentiality, integrity and availability of data are considered serious issues in HIoT applications. In this regard, lightweight block ciphers (LBCs) are promising in resource-constrained environment where security is the primary consideration. The prevalent challenge while designing an LBC for the HIoT environment is how to ascertain platform performance, cost, and security. Most of the existing LBCs primarily focus on text data or grayscale images. The main focus of this paper is about securing color images in a cost-effective way. We emphasis high confidentiality of color images captured by cameras in resource-constrained smartphones, and high confidentiality of sensitive images transmitted by low-power sensors in IoT systems. In order to reduce computational complexity and simulation time, the proposed Lightweight Symmetric Block Cipher (LSBC) exploits chaos-based confusion-diffusion operations at the inter-block level using a single round. The strength of LSBC is assessed by cryptanalysis, while it is ranked by comparing it to other privacy-preserving schemes. Our results show that the proposed cipher produces promising results in terms of key sensitivity and differential attacks, which proves that our LSBC is a good candidate for image security in HIoT. 相似文献
2.
In recent years, the application of a smart city in the healthcare sector via loT systems has continued to grow exponentially and various advanced network intrusions have emerged since these loT devices are being connected. Previous studies focused on security threat detection and blocking technologies that rely on testbed data obtained from a single medical IoT device or simulation using a well-known dataset, such as the NSL-KDD dataset. However, such approaches do not reflect the features that exist in real medical scenarios, leading to failure in potential threat detection. To address this problem, we proposed a novel intrusion classification architecture known as a Multi-class Classification based Intrusion Detection Model (M-IDM), which typically relies on data collected by real devices and the use of convolutional neural networks (i.e., it exhibits better performance compared with conventional machine learning algorithms, such as naïve Bayes, support vector machine (SVM)). Unlike existing studies, the proposed architecture employs the actual healthcare IoT environment of National Cancer Center in South Korea and actual network data from real medical devices, such as a patient’s monitors (i.e., electrocardiogram and thermometers). The proposed architecture classifies the data into multiple classes: Critical, informal, major, and minor, for intrusion detection. Further, we experimentally evaluated and compared its performance with those of other conventional machine learning algorithms, including naïve Bayes, SVM, and logistic regression, using neural networks. 相似文献
3.
计算机密码学的新进展 总被引:3,自引:3,他引:3
孙燮华 《中国计量学院学报》2001,12(1):1-18
本文综述了计算机密码学在分组密码 ,序列密码 ,公钥密码 ,混沌密码等方面研究的新进展 相似文献
4.
Anwer Mustafa Hilal Badria Sulaiman Alfurhood Fahd N. Al-Wesabi Manar Ahmed Hamza Mesfer Al Duhayyim Huda G. Iskandar 《计算机、材料和连续体(英文)》2022,71(1):143-157
Smart city promotes the unification of conventional urban infrastructure and information technology (IT) to improve the quality of living and sustainable urban services in the city. To accomplish this, smart cities necessitate collaboration among the public as well as private sectors to install IT platforms to collect and examine massive quantities of data. At the same time, it is essential to design effective artificial intelligence (AI) based tools to handle healthcare crisis situations in smart cities. To offer proficient services to people during healthcare crisis time, the authorities need to look closer towards them. Sentiment analysis (SA) in social networking can provide valuable information regarding public opinion towards government actions. With this motivation, this paper presents a new AI based SA tool for healthcare crisis management (AISA-HCM) in smart cities. The AISA-HCM technique aims to determine the emotions of the people during the healthcare crisis time, such as COVID-19. The proposed AISA-HCM technique involves distinct operations such as pre-processing, feature extraction, and classification. Besides, brain storm optimization (BSO) with deep belief network (DBN), called BSO-DBN model is employed for feature extraction. Moreover, beetle antenna search with extreme learning machine (BAS-ELM) method was utilized for classifying the sentiments as to various classes. The use of BSO and BAS algorithms helps to effectively modify the parameters involved in the DBN and ELM models respectively. The performance validation of the AISA-HCM technique takes place using Twitter data and the outcomes are examined with respect to various measures. The experimental outcomes highlighted the enhanced performance of the AISA-HCM technique over the recent state of art SA approaches with the maximum precision of 0.89, recall of 0.88, F-measure of 0.89, and accuracy of 0.94. 相似文献
5.
Gia Nhu Nguyen Nin Ho Le Viet Gyanendra Prasad Joshi Bhanu Shrestha 《计算机、材料和连续体(英文)》2021,66(1):551-562
Fog computing in the Internet of Health Things (IoHT) is promisingowing to the increasing need for energy- and latency-optimized health sector provisioning. Additionally, clinical data (particularly, medical image data) are a delicate, highly protected resource that should be utilized in an effective andresponsible manner to fulfil consumer needs. Herein, we propose an energy-effi-cient fog-based IoHT with a tunicate swarm-optimization-(TSO)-based lightweight Simon cipher to enhance the energy efficiency at the fog layer and thesecurity of data stored at the cloud server. The proposed Simon cipher uses theTSO algorithm to select the optimal keys that will minimize the deteriorationof quality between the original and reconstructed (decrypted) images. In thisstudy, the decrypted image quality is preserved by the peak signal-to-noise ratio(PSNR) such that consumers can generate precise medical reports from IoHTdevices at the application level. Moreover, a lightweight encryption step is implemented in the fog to improve energy efficiency and reduce additional computations at the cloud server. Experimental results indicate that the TSO-Simonmodel achieved a high PSNR of 61.37 dB and a pixel change rate of 95.31. 相似文献
6.
Jos J. Amador Robert W. Green 《International journal of imaging systems and technology》2005,15(3):178-188
Public‐key cryptography has been widely accepted as the method in which data is encrypted, using algorithms such as the widely known and popularly used RSA algorithm. However, management of the public‐key and its storage is an on‐going issue. To avoid these problems the symmetric‐key approach can be taken, where there is only one key and it must be kept secret. Presented in this paper is a new cipher based on symmetric‐key cryptography, called the NASA/Kennedy Cipher (N/KC), and further designed as a block cipher using 128‐bit blocks. The minimum key size is set at 128 bits with a maximum allowable of 2048 bits, modulus 2. The main focus of this work is encryption of image data for the purpose of protecting intellectual properties. However, empirical results are presented on N/KC's ability of encrypting and decrypting text data in the form of vectors and documents as well. © 2005 Wiley Periodicals, Inc. Int J Imaging Syst Technol, 15, 178–188, 2005 相似文献
7.
数字水印图像的置乱加密预处理研究 总被引:1,自引:2,他引:1
分析了分组置乱加密与混沌置乱加密算法,阐明了置乱加密预处理的安全性和置乱效果,提出了一种基于水印图像置乱加密的抗JPEG压缩的半脆弱数字水印算法. 相似文献
8.
Recently, Courtois and Pieprzyk proposed a class of algebraic attacks on symmetric block ciphers that takes advantage of a
previously-unexploited property of substitution boxes, or s-boxes, in the round function. This paper gives a brief overview
of this ``overdefined system of equations' (OSE) attack and shows how the attack may be avoided through the use of round
functions constructed according to the CAST design procedure. Such round functions contain a variety of protection mechanisms,
including s-boxes of large dimension, a circular key-dependent rotation step, and combinations of operators from different
algebraic groups. 相似文献
9.
This study aimed to explore the universal evolution process of smart cities. To achieve this, we evaluated the performance and efficiency of 32 smart cities in China between 2012 and 2017. The 32 cities were divided into four categories according to average performance and efficiency. The process of change in the smart cities between 2012 and 2017 was mapped and three primary trends in performance and efficiency were identified. The final status reached by the 32 cities was predicted according to the three trends. To more effectively implement smart city initiatives, two evolutionary routes for smart cities are proposed. The findings demonstrate that the performance of smart city implementation is consistent with economic development but not with efficiency. The status of smart city implementation is not static; it depends on the context of the city and can shift between the four city categories. Smart city initiatives should be driven by technology firms with appropriate governmental guidance. 相似文献
10.
The speech recognition technology has been increasingly common in our lives. Recently, a number of commercial smart speakers containing the personal assistant system using speech recognition came out. While the smart speaker vendors have been concerned about the intelligence and the convenience of their assistants, but there have been little mentions of the smart speakers in security aspects. As the smart speakers are becoming the hub for home automation, its security vulnerabilities can cause critical problems. In this paper, we categorize attack vectors and classify them into hardware-based, network-based, and software-based. With the attack vectors, we describe the detail attack scenarios and show the result of tests on several commercial smart speakers. In addition, we suggest guidelines to mitigate various attacks against smart speaker ecosystem. 相似文献
11.
Tzu-Chia Chen Ngakan Ketut Acwin Dwijendra Saurabh Singhal R. Sivaraman Amr Mamdouh 《计算机、材料和连续体(英文)》2023,75(2):3159-3169
A smart city incorporates infrastructure methods that are environmentally responsible, such as smart communications, smart grids, smart energy, and smart buildings. The city administration has prioritized the use of cutting-edge technology and informatics as the primary strategy for enhancing service quality, with energy resources taking precedence. To achieve optimal energy management in the multidimensional system of a city tribe, it is necessary not only to identify and study the vast majority of energy elements, but also to define their implicit interdependencies. This is because optimal energy management is required to reach this objective. The lighting index is an essential consideration when evaluating the comfort indicators. In order to realize the concept of a smart city, the primary objective of this research is to create a system for managing and monitoring the lighting index. It is possible to identify two distinct phases within the intelligent system. Once data collection concludes, the monitoring system will be activated. In the second step, the operation of the control system is analyzed and its effect on the performance of the numerical model is determined. This evaluation is based on the proposed methodology. The optimized results were deemed satisfactory because they maintained the brightness index value (79%) while consuming less energy. The intelligent implementation system generated satisfactory outcomes, which were observed 1.75 times on average. 相似文献
12.
Rabie A. Ramadan Bassam W. Aboshosha Kusum Yadav Ibrahim M. Alseadoon Munawar J. Kashout Mohamed Elhoseny 《计算机、材料和连续体(英文)》2021,67(3):3563-3579
With the new era of the Internet of Things (IoT) technology, many devices with limited resources are utilized. Those devices are susceptible to a significant number of new malware and other risks emerging rapidly. One of the most appropriate methods for securing those IoT applications is cryptographic algorithms, as cryptography masks information by eliminating the risk of collecting any meaningful information patterns. This ensures that all data communications are private, accurate, authenticated, authorized, or non-repudiated. Since conventional cryptographic algorithms have been developed specifically for devices with limited resources; however, it turns out that such algorithms are not ideal for IoT restricted devices with their current configuration. Therefore, lightweight block ciphers are gaining popularity to meet the requirements of low-power and constrained devices. A new ultra-lightweight secret-key block-enciphering algorithm named “LBC-IoT” is proposed in this paper. The proposed block length is 32-bit supporting key lengths of 80-bit, and it is mainly based on the Feistel structure. Energy-efficient cryptographic features in “LBC-IoT” include the use of simple functions (shift, XOR) and small rigid substitution boxes (4-bit-S-boxes). Besides, it is immune to different types of attacks such as linear, differential, and side-channel as well as flexible in terms of implementation. Moreover, LBC-IoT achieves reasonable performance in both hardware and software compared to other recent algorithms. LBC-IoT’s hardware implementation results are very promising (smallest ever area “548” GE) and competitive with today’s leading lightweight ciphers. LBC-IoT is also ideally suited for ultra-restricted devices such as RFID tags. 相似文献
13.
一个基于混沌的分组密码算法的分析 总被引:18,自引:0,他引:18
"基于混沌的分组密码置换网络的设计"一文提出的一个分组密码算法在已知明文攻击和唯密文攻击下都是很容易被破译的,而且在知道加密变换的条件下,很容易利用分割攻击方法求出该分组密码的密钥。此外,基于Logistic映射的混沌序列的相邻值之间的相互制约性,以及该混沌序列的前若干值对初值的低位比特不敏感。 相似文献
14.
提出了用于分组密码分析的分区线性分析法.以SAFER++为例,通过基础模块的密码特性分析,建立密码分析的线性逼近式.该逼近式的特点是把密钥的比特位分区出现在逼近式的任选项中,这样不仅可以攻击密钥的所有比特位,而且大大降低了攻击的复杂度,并从理论上证明了逼近式的优势与任何子密钥的最低有效位无关.迄今为止有关文献都认为相关子密钥最低有效位等于0是逼近优势非零的前提条件. 相似文献
15.
Sadaf Qazi Muhammad Usman Azhar Mahmood Aaqif Afzaal Abbasi Muhammad Attique Yunyoung Nam 《计算机、材料和连续体(英文)》2021,66(1):589-605
Immunization is a noteworthy and proven tool for eliminating lifethreating infectious diseases, child mortality and morbidity. Expanded Programon Immunization (EPI) is a nation-wide program in Pakistan to implement immunization activities, however the coverage is quite low despite the accessibility offree vaccination. This study proposes a defaulter prediction model for accurateidentification of defaulters. Our proposed framework classifies defaulters at fivedifferent stages: defaulter, partially high, partially medium, partially low, andunvaccinated to reinforce targeted interventions by accurately predicting childrenat high risk of defaulting from the immunization schedule. Different machinelearning algorithms are applied on Pakistan Demographic and Health Survey(2017–18) dataset. Multilayer Perceptron yielded 98.5% accuracy for correctlyidentifying children who are likely to default from immunization series at different risk stages of being defaulter. In this paper, the proposed defaulters’ predictionframework is a step forward towards a data-driven approach and provides a set ofmachine learning techniques to take advantage of predictive analytics. Hence, predictive analytics can reinforce immunization programs by expediting targetedaction to reduce dropouts. Specially, the accurate predictions support targetedmessages sent to at-risk parents’ and caretakers’ consumer devices (e.g., smartphones) to maximize healthcare outcomes. 相似文献
16.
In block ciphers, the nonlinear components, also known as substitution boxes (S-boxes), are used with the purpose of inducing confusion in cryptosystems. For the last decade, most of the work on designing S-boxes over the points of elliptic curves has been published. The main purpose of these studies is to hide data and improve the security levels of crypto algorithms. In this work, we design pair of nonlinear components of a block cipher over the residue class of Gaussian integers (GI). The fascinating features of this structure provide S-boxes pair at a time by fixing three parameters. But the prime field dependent on the Elliptic curve (EC) provides one S-box at a time by fixing three parameters and . The newly designed pair of S-boxes are assessed by various tests like nonlinearity, bit independence criterion, strict avalanche criterion, linear approximation probability, and differential approximation probability. 相似文献
17.
分析了RSA和DES的算法优点和安全弱点,设计了一个新的密码算法方案。该方案以类FEISTEL结构为基础增强了左右两半部分结构的安全设计,利用了RSA进行密钥分配,并以序列密码算法的生成原理改变了固定密钥的缺点。该新方案具有一次一密的特点,给破译者获得大量的明密文对造成了很大的困难,可较好地抵抗差分分析与线性分析,是一种安全性较强的加密方案。 相似文献
18.
Smart irrigation system, also referred as precision irrigation system, is an attractive solution to save the limited water resources as well as to improve crop productivity and quality. In this work, by using Internet of things (IoT), we aim to design a smart irrigation system for olive groves. In such IoT system, a huge number of low-power and low-complexity devices (sensors, actuators) are interconnected. Thus, a great challenge is to satisfy the increasing demands in terms of spectral efficiency. Moreover, securing the IoT system is also a critical challenge, since several types of cybersecurity threats may pose. In this paper, we address these issues through the application of the massive multiple-input multiple-output (M-MIMO) technology. Indeed, M-MIMO is a key technology of the fifth generation (5G) networks and has the potential to improve spectral efficiency as well as the physical layer security. Specifically, by exploiting the available M-MIMO channel degrees of freedom, we propose a physical layer security scheme based on artificial noise (AN) to prevent eavesdropping. Numerical results demonstrate that our proposed scheme outperforms traditional ones in terms of spectral efficiency and secrecy rate. 相似文献
19.
Muhammad Nadeem Ali Arshad Saman Riaz Syeda Wajiha Zahra Shahab S. Band Amir Mosavi 《计算机、材料和连续体(英文)》2023,74(2):2625-2640
Many organizations have insisted on protecting the cloud server from the outside, although the risks of attacking the cloud server are mostly from the inside. There are many algorithms designed to protect the cloud server from attacks that have been able to protect the cloud server attacks. Still, the attackers have designed even better mechanisms to break these security algorithms. Cloud cryptography is the best data protection algorithm that exchanges data between authentic users. In this article, one symmetric cryptography algorithm will be designed to secure cloud server data, used to send and receive cloud server data securely. A double encryption algorithm will be implemented to send data in a secure format. First, the XOR function will be applied to plain text, and then salt technique will be used. Finally, a reversing mechanism will be implemented on that data to provide more data security. To decrypt data, the cipher text will be reversed, salt will be removed, and XOR will be implemented. At the end of the paper, the proposed algorithm will be compared with other algorithms, and it will conclude how much better the existing algorithm is than other algorithms. 相似文献
20.
Algorithmic decision-making (ADM) systems are increasingly adopted by the state to support various administrative functions and improve the effectiveness and efficiency of public services, such as in unemployment services or policing. While these systems create challenges of opaqueness, unfairness, and value trade-offs, the present paper argues that a more fundamental challenge lies in the way these systems alter the epistemic bases of decision-making. It contributes to the literature by highlighting why procedural standards of legitimacy in operative decision-making no longer suffice for certain applications and by discussing how the resulting legitimacy gap can be addressed through stakeholder involvement. By adapting research on participatory technology assessments to the particularities of ADM system design, it is possible to identify the core challenges of such a stakeholder process and the necessary steps to deal with them. 相似文献