Current Issue : July - September Volume : 2020 Issue Number : 3 Articles : 5 Articles
The article analyzes the domestic and foreign experience of information security\nin todayâ??s society. The peculiarities of the research are analyzing the\nprocess of information security from the point of two sociological paradigms:\nstructural-functional and interpretive. The process of informatization in the\nsociety is one of the key factors of its development. This article analyzes the\nestablishment of an information society. The article analyzes the process of\ninformatization, which is to facilitate the survival of humanity and set it on\nthe path of sustainable development. Owing to that fact, the problem of information\nsecurity is attracting increasing interest; it is assuming primary\nimportance among the rest of security types. This problem is investigated with\nthe following methods. First, we reveal the nature of information security, its\nforms, and content within the framework of the modern information society.\nSecond, we define the possible ways information security affects the development\nof society....
Wireless medical sensor networks (WMSNs) play an important role in collecting healthcare data of the remote patient and\ntransmitting them to the medical professional for proper diagnosis via wireless channel. To protect the patientâ??s healthcare data\nwhich is private-related and sensitive, some authentication schemes for healthcare systems using WMSN have been proposed to\nensure the secure communication between the medical sensors and the medical professional. Since cryptanalyzing the security\ndefects of authenticated protocols is crucial to put forward solutions and propose truly robust protocols, we scrutinize two stateof-\nthe-art authentication protocols using WMSN for healthcare systems. Firstly, we examine Ali et al.â??s enhanced three-factor\nbased authentication protocol and show that although it provides a formal proof and a security verification, it still fails to resist\noffline dictionary guessing attack, desynchronization attack, and privileged insider attack and contains a serious flaw in the\npassword change phase. Secondly, we investigate Shuai et al.â??s lightweight and three-factor based authentication protocol and\npoint out that it cannot achieve high security level as they claimed; it is actually subject to offline dictionary guessing attack and\nprivileged insider attack, and it also has a design flaw in the password change phase. In addition, we suggest several countermeasures\nto thwart these security weaknesses in these two schemes for WMSN and the similar kinds....
Radio frequency (RF) fingerprinting extracts fingerprint features from RF signals to protect against masquerade attacks by\nenabling reliable authentication of communication devices at the â??serial numberâ? level. Facilitating the reliable authentication of\ncommunication devices are machine learning (ML) algorithms which find meaningful statistical differences between measured\ndata. The Generalized Relevance Learning Vector Quantization-Improved (GRLVQI) classifier is one ML algorithm which has\nshown efficacy for RF fingerprinting device discrimination. GRLVQI extends the Learning Vector Quantization (LVQ) family of\nâ??winner take allâ? classifiers that develop prototype vectors (PVs) which represent data. In LVQ algorithms, distances are\ncomputed between exemplars and PVs, and PVs are iteratively moved to accurately represent the data. GRLVQI extends LVQ\nwith a sigmoidal cost function, relevance learning, and PV update logic improvements. However, both LVQ and GRLVQI are\nlimited due to a reliance on squared Euclidean distance measures and a seemingly complex algorithm structure if changes are\nmade to the underlying distance measure. Herein, the authors (1) develop GRLVQI-D (distance), an extension of GRLVQI to\nconsider alternative distance measures and (2) present the Cosine GRLVQI classifier using this framework. To evaluate this\nframework, the authors consider experimentally collected Z-wave RF signals and develop RF fingerprints to identify devices.\nZ-wave devices are low-cost, low-power communication technologies seen increasingly in critical infrastructure. Both classification\nand verification, claimed identity, and performance comparisons are made with the new Cosine GRLVQI algorithm. The\nresults show more robust performance when using the Cosine GRLVQI algorithm when compared with four algorithms in the\nliterature. Additionally, the methodology used to create Cosine GRLVQI is generalizable to alternative measures....
In this paper, we consider the issue of the secure transmissions for the cognitive radio-based Internet of Medical Things (IoMT)\nwith wireless energy harvesting. In these systems, a primary transmitter (PT) will transmit its sensitive medical information to a\nprimary receiver (PR) by a multi-antenna-based secondary transmitter (ST), where we consider that a potential eavesdropper may\nlisten to the PTâ??s sensitive information. Meanwhile, the STalso transmits its own information concurrently by utilizing spectrum\nsharing. We aim to propose a novel scheme for jointly designing the optimal parameters, i.e., energy harvesting (EH) time ratio\nand secure beamforming vectors, for maximizing the primary secrecy transmission rate while guaranteeing secondary transmission\nrequirement. For solving the nonconvex optimization problem, we transfer the problem into convex optimization form\nby adopting the semidefinite relaxation (SDR) method and Charnesâ??Cooper transformation technique. Then, the optimal secure\nbeamforming vectors and energy harvesting duration can be obtained easily by utilizing the CVX tools. According to the\nsimulation results of secrecy transmission rate, i.e., secrecy capacity, we can observe that the proposed protocol for the considered\nsystem model can effectively promote the primary secrecy transmission rate when compared with traditional zero-forcing (ZF)\nscheme, while ensuring the transmission rate of the secondary system....
In our daily life, Internet-of-Things (IoT) is everywhere and used in many more beneficial functionalities. It is used in our homes,\nhospitals, fire prevention, and reporting and controlling the environmental changes. Data security is the crucial requirement for\nIoT since the number of recent technologies in different domains is increasing day by day. Various attempts have been made to\ncater the userâ??s demands for more security and privacy. However, a huge risk of security and privacy issues can arise among all\nthose benefits. Digital document security and copyright protection are also important issues in IoT because they are distributed,\nreproduced, and disclosed with extensive use of communication technologies. The content of books, research papers, newspapers,\nlegal documents, and web pages are based on plain text, and the ownership verification and authentication of such documents are\nessential. In the current domain of the Internet of Things, limited techniques are available for ownership verification and copyright\nprotection. In the said perspective, this study includes the discussion about the approaches of text watermarking, IoT security\nchallenges, IoT device limitations, and future research directions in the area of text watermarking....
Loading....