Current Issue : July - September Volume : 2018 Issue Number : 3 Articles : 5 Articles
The advent of intelligent transportation system has a crucial impact on the traffic safety and efficiency. To cope with security issues\nsuch as spoofing attack and forgery attack, many authentication schemes for vehicular ad hoc networks (VANETs) have been\ndeveloped, which are based on the hypothesis that secret keys are kept perfectly secure. However, key exposure is inevitable on\naccount of the openness of VANETenvironment. To address this problem, key insulation is introduced in our proposed scheme.\nWith a helper device, vehicles could periodically update their own secret keys. In this way, the forward and backward secrecy has\nbeen achieved. In addition, the elliptic curve operations have been integrated to improve the performance. The random oracle\nmodel is adopted to prove the security of the proposed scheme, and the experiment has been conducted to demonstrate the\ncomparison between our scheme and the existing similar schemes....
Investments in cybersecurity are critical to the national and economic security\nof a nation. There is, however, a strong tendency for firms in the private sector\nto underinvest in cybersecurity activities. This paper reports the results of\na survey designed to empirically assess whether treating cybersecurity as an\nimportant component of a firm�s internal control system for financial reporting\npurposes serves as a driver for private sector firms to invest in cybersecurity\nactivities. The findings, in this regard, are significantly positive. The study\nalso shows that a firm�s concern over the risk of incurring a large loss due to a\ncybersecurity breach and the degree the firm treats cybersecurity investments\nas generating a competitive advantage are drivers of the level of private sector\ninvestment in cybersecurity activities. The implications of the empirical results\nfor designing public policies to mitigate the tendency of private sector\nfirms to underinvest in cybersecurity are also explored....
Cyberspace has become the most popular carrier of information exchange in every corner of our life, which is beneficial for our life\nin almost all aspects. With the continuous development of science and technology, especially the quantum computer, cyberspace\nsecurity has become themost critical problem for the Internet in near future. In this paper, we focus on analyzing characteristics of\nthe quantumcryptography and exploring of the advantages of it in the future Internet. It isworth noting thatwe analyze the quantum\nkey distribution (QKD) protocol in the noise-free channel. Moreover, in order to simulate real situations in the future Internet,\nwe also search the QKD protocol in the noisy channel. The results reflect the unconditional security of quantum cryptography\ntheoretically, which is suitable for the Internet as ever-increasing challenges are inevitable in the future....
This paper presents a reference sharing mechanism-based self-embedding watermarking scheme. The host image is embedded\nwith watermark bits including the reference data for content recovery and the authentication data for tampering location. The\nspecial encoding matrix derived from the generator matrix of selected systematic Maximum Distance Separable (MDS) code is\nadopted. The reference data is generated by encoding all the representative data of the original image blocks. On the receiver side,\nthe tampered image blocks can be located by the authentication data. The reference data embedded in one image block can be\nshared by all the image blocks to restore the tampered content.The tampering coincidence problem can be avoided at the extreme.\nThe maximal tampering rate is deduced theoretically. Experimental results show that, as long as the tampering rate is less than the\nmaximal tampering rate, the content recovery is deterministic.Thequality of recovered content does not decrease with the maximal\ntampering rate....
Cognitive radio networks (CRNs) allow coexistence of unlicensed users (UUs) and licensed users (LUs) and hence, mutual\ninterference between UUs and LUs is neither ignored nor considered as Gaussian-distributed quantity. Additionally, exploiting\njamming signals to purposely interfere with signal reception of eavesdroppers is a feasible solution to improve security performance\nof CRNs.This paper analyzes reliability-security trade-off, which accounts for maximum transmit power constraint, interference\npower constraint, jamming signal, and Rayleigh fading, and considers interference fromLUs as non-Gaussian-distributed quantity.\nToward this end, exact closed-form expressions of successful detection probability and successful eavesdropping probability, from\nwhich reliability-security trade-off is straightforwardly visible, are first suggested and then validated by Monte-Carlo simulations.\nVarious results demonstrate that interference from LUs considerably decreases both probabilities while jamming signal enlarges\nthe difference between them, emphasizing its effectiveness in improving security performance....
Loading....