期刊文献+
共找到21篇文章
< 1 2 >
每页显示 20 50 100
Blockchain-Based Message Authentication Scheme for Internet of Vehicles in an Edge Computing Environment
1
作者 Qiping Zou Zhong Ruan Huaning Song 《Computer Systems Science & Engineering》 2024年第5期1301-1328,共28页
As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’trav... As an important application of intelligent transportation system,Internet of Vehicles(IoV)provides great convenience for users.Users can obtain real-time traffic conditions through the IoV’s services,plan users’travel routes,and improve travel efficiency.However,in the IoV system,there are always malicious vehicle nodes publishing false information.Therefore,it is essential to ensure the legitimacy of the source.In addition,during the peak period of vehicle travel,the vehicle releases a large number of messages,and IoV authentication efficiency is prone to performance bottlenecks.Most existing authentication schemes have the problem of low authentication efficiency in the scenario.To address the above problems,this paper designs a novel reliable anonymous authentication scheme in IoV for Rush-hour Traffic.Here,our scheme uses blockchain and elliptic curve cryptography(ECC)to design authentication algorithms for message authentication between vehicles and roadside units(RSU).Additionally,we introduce the idea of edge computing into the scheme,RSU will select themost suitable vehicle as the edge computing node for message authentication.In addition,we used the ProVerif tool for Internet security protocols and applications to test its security,ensuring that it is secure under different network attacks.In the simulation experiment,we compare our scheme with other existing works.Our scheme has a significant improvement in computational overhead,authentication efficiency and packet loss rate,and is suitable for traffic scenarios with large message volume. 展开更多
关键词 Internet of Vehicles messages authentication edge computing blockchain elliptic curve cryptography
下载PDF
Message Authentication with a New Quantum Hash Function
2
作者 Yalan Wang Yuling Chen +1 位作者 Haseeb Ahmad Zhanhong Wei 《Computers, Materials & Continua》 SCIE EI 2019年第5期635-648,共14页
To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication sch... To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future. 展开更多
关键词 message authentication symmetric encryption quantum Hash function quantum walk
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
3
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
TESLA-Based Authentication for BeiDou Civil Navigation Message 被引量:3
4
作者 Zhijun Wu Yun Zhang +1 位作者 Liang Liu Meng Yue 《China Communications》 SCIE CSCD 2020年第11期194-218,共25页
Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here... Due to the civil BeiDou navigation system is open,unauthenticated,and non-encrypted,civilian BeiDou navigation signals may have great security loopholes during transmission or reception.The main security loophole here is spoofing attacks.Spoofing attacks make the positioning or timing results of BeiDou civilian receivers wrong.Such errors may cause a series of security problems,which lays a serious hidden danger for Bei-Dou satellite information security.This article proposes an anti-spoofing method for BeiDou navigation system based on the combination of SM commercial cryptographic algorithm and Timed Efficient Stream Loss-tolerant Authentication(TESLA)for spoofing attacks.In this solution,we use the SM3 algorithm to generate a TESLA key chain with time information,and then use the key in the key chain to generate the message authentication code for the BeiDou D2 navigation message.The message authentication code is inserted into a reserved bit of the D2 navigation message.In addition,this solution uses the SM2 algorithm to protect and encrypt time information in the TESLA key chain to prevent key replay attacks in TESLA.The experimental results tested on the experimental platform built in this paper show that this scheme reduces the possibility of the BeiDou navigation system being deceived and enhances the safety of the BeiDou navigation system. 展开更多
关键词 BeiDou navigation system SM commercial cryptographic algorithm TESLA message authentication code D2 navigation message
下载PDF
TuLP: A Family of Lightweight Message Authentication Codes for Body Sensor Networks 被引量:2
5
作者 龚征 Pieter Hartel +2 位作者 Svetla Nikova 唐韶华 朱博 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第1期53-68,共16页
A wireless sensor network (WSN) commonly whilst a body sensor network (BSN) must be secured with requires lower level security for public information gathering, strong authenticity to protect personal health infor... A wireless sensor network (WSN) commonly whilst a body sensor network (BSN) must be secured with requires lower level security for public information gathering, strong authenticity to protect personal health information. In this paper, some practical problems with the message authentication codes (MACs), which were proposed in the popular security architectures for WSNs, are reconsidered. The analysis shows that the recommended MACs for WSNs, e.g., CBC- MAC (TinySec), OCB-MAC (MiniSec), and XCBC-MAC (SenSee), might not be exactly suitable for BSNs. Particularly an existential forgery attack is elaborated on XCBC-MAC. Considering the hardware limitations of BSNs, we propose a new family of tunable lightweight MAC based on the PRESENT block cipher. The first scheme, which is named TukP, is a new lightweight MAC with 64-bit output range. The second scheme, which is named TuLP-128, is a 128-bit variant which provides a higher resistance against internal collisions. Compared with the existing schemes, our lightweight MACs are both time and resource efficient on hardware-constrained devices. 展开更多
关键词 message authentication code body sensor network low-resource implementation
原文传递
Secure authentication of classical messages with single photons
6
作者 王天银 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第8期3189-3192,共4页
This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid me... This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical. 展开更多
关键词 message authentication codes single photons hash function
下载PDF
Two Modifications on IKE Protocol with Pre-shared Key Authentication 被引量:3
7
作者 刘东喜 张连华 白英彩 《Journal of Shanghai Jiaotong university(Science)》 EI 2003年第2期142-145,共4页
This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder genera... This paper proposed two modifications on IKE protocol with pre-shared key authentication. The first modification can improve its immunity against DDoS attack by authenticating the initiator before the responder generates the computation-intensive Diffie-Hellman public value. The second modification can improve its efficiency when the attack on messages occurs because it can detect the attack quickly by replacing the centralized authentication in origical IKE protocol with immediate authentication. In addition, the two modifications can be integrated into one protocol compactly. 展开更多
关键词 IKE protocol message authentication authenticated key agreement
下载PDF
Active Authentication Protocol for IoV Environment with Distributed Servers
8
作者 Saravanan Manikandan Mosiur Rahaman Yu-Lin Song 《Computers, Materials & Continua》 SCIE EI 2022年第12期5789-5808,共20页
The Internet of Vehicles(IoV)has evolved as an advancement over the conventional Vehicular Ad-hoc Networks(VANETs)in pursuing a more optimal intelligent transportation system that can provide various intelligent solut... The Internet of Vehicles(IoV)has evolved as an advancement over the conventional Vehicular Ad-hoc Networks(VANETs)in pursuing a more optimal intelligent transportation system that can provide various intelligent solutions and enable a variety of applications for vehicular traffic.Massive volumes of data are produced and communicated wirelessly among the different relayed entities in these vehicular networks,which might entice adversaries and endanger the system with a wide range of security attacks.To ensure the security of such a sensitive network,we proposed a distributed authentication mechanism for IoV based on blockchain technology as a distributed ledger with an ouroboros algorithm.Using timestamp and challenge-responsemechanisms,the proposed authentication model can withstand several security attacks such asMan-in-Middle(MiM)attacks,Distributed Denial of Service(DDoS)attacks,server spoofing attacks and more.The proposed method also provides a solution for single-point failure,forward secrecy,revocability,etc.We exhibit the security of our proposed model by using formal(mathematical)analysis and informal analysis.We used Random Oracle Model to perform themathematical analysis.In addition,we compared the communication cost,computation cost,and security of the proposed model with the related existing studies.We have verified the security of the model by using AVISPA tool simulation.The security analysis and computation analysis show that the proposed protocol is viable. 展开更多
关键词 IoV message authentication random oracle model blockchain distributed server revocability
下载PDF
A Novel Video Data-Source Authentication Model Based on Digital Watermarking and MAC in Multicast
9
作者 ZHAO Anjun LU Xiangli GUO Lei 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1257-1261,共5页
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o... A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast. 展开更多
关键词 video data authentication MULTICAST MAC(message authentication code) digital watermarking MLUT(modifled look-up table)
下载PDF
Cryptanalysis of quantum broadcast communication and authentication protocol with a one-time pad
10
作者 曹雅 高飞 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第11期149-153,共5页
Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesd... Chang et al.[Chin.Phys.623 010305(2014)]have proposed a quantum broadcast communication and authentication protocol.However,we find that an intercept-resend attack can be preformed successfully by a potential eavesdropper,who will be able to destroy the authentication function.Afterwards,he or she can acquire the secret transmitted message or even modify it while escaping detection,by implementing an efficient man-in-the-middle attack.Furthermore,we show a simple scheme to defend this attack,that is,applying non-reusable identity strings. 展开更多
关键词 authentication broadcast secret message strings transmitted applying sender acquire cryptography
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
11
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Security System in United Storage Network and Its Implementation
12
作者 黄建忠 谢长生 韩德志 《Journal of Shanghai University(English Edition)》 CAS 2005年第3期249-254,共6页
With development of networked storage and its applications, united storage network (USN) combined with network attached storage (NAS) and storage area network (SAN) has emerged. It has such advantages as high performa... With development of networked storage and its applications, united storage network (USN) combined with network attached storage (NAS) and storage area network (SAN) has emerged. It has such advantages as high performance, low cost, good connectivity, etc. However the security issue has been complicated because USN responds to block I/O and file I/O requests simultaneously. In this paper, a security system module is developed to prevent many types of attacks against USN based on NAS head. The module not only uses effective authentication to prevent unauthorized access to the system data, but also checks the data integrity. Experimental results show that the security module can not only resist remote attacks and attacks from those who has physical access to the USN, but can also be seamlessly integrated into underlying file systems, with little influence on their performance. 展开更多
关键词 network attached storage (NAS) storage area network (SAN) united storage network (USN) hashed message authentication code (HMAC).
下载PDF
Two Improved Digital Signature Schemes
13
作者 Lin Bogang Dept. of Computer and Technology, Fuzhou University, 350002, P. R. China Qiu Hongduan College of Qiaoxin Light Industry, Fuzhou University, 350002, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2001年第1期78-81,共4页
In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is au... In this paper, two improved digital signature schemes are presented based on the design of directed signature scheme. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated. Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security of digital signature system are increased. 展开更多
关键词 Digital signature message authentication Network security.
下载PDF
Research on the Security of the United Storage Network Based on NAS
14
作者 黄建忠 《Journal of Chongqing University》 CAS 2004年第2期48-53,共6页
A multi-user view file system (MUVFS) and a security scheme are developed to improve the security of the united storage network (USN) that integrates a network attached storage (NAS) and a storage area network (SAN). ... A multi-user view file system (MUVFS) and a security scheme are developed to improve the security of the united storage network (USN) that integrates a network attached storage (NAS) and a storage area network (SAN). The MUVFS offers a storage volume view for each authorized user who can access only the data in his own storage volume, the security scheme enables all users to encrypt and decrypt the data of their own storage view at client-side, and the USN server needs only to check the users’ identities and the data’s integrity. Experiments were performed to compare the sequential read, write and read/write rates of NFS+MUVFS+secure_module with those of NFS. The results indicate that the security of the USN is improved greatly with little influence on the system performance when the MUVFS and the security scheme are integrated into it. 展开更多
关键词 multi-user view file system (MUVFS) storage area network (SAN) united storage network (USN) network attached storage (NAS) hashed message authentication code (HMAC)
下载PDF
CAN总线信息认证码(MAC)研究
15
作者 洪雷 万开明 《时代汽车》 2020年第11期119-120,共2页
CAN(Controller Area Network)总线技术的发展令人惊叹,基于CAN的车载总线实现ECU(Electronic Control Unit)分布式实时数据通讯,自由通信,总线仲裁。本文提出了在CAN协议基础上增加ECU间(Key)密钥分配与信息认证,简称MAC(Message Authe... CAN(Controller Area Network)总线技术的发展令人惊叹,基于CAN的车载总线实现ECU(Electronic Control Unit)分布式实时数据通讯,自由通信,总线仲裁。本文提出了在CAN协议基础上增加ECU间(Key)密钥分配与信息认证,简称MAC(Message Authentication Code,信息认证码)。本文会由浅入深阐述当前CAN总线协议基础上的MAC的工作原理与实现方式。 展开更多
关键词 CAN总线 信息认证 MAC(message authentication Code)
下载PDF
IOTA-Based Data Encryption Storage and Retrieval Method
16
作者 Hongchao Ma Yi Man +2 位作者 Xiao Xing Zihan Zhuo Mo Chen 《Journal of Quantum Computing》 2021年第3期97-105,共9页
At present,the traditional blockchain for data storage and retrieval reflects the characteristics of slow data uploading speed,high cost,and transparency,and there are a lot of corresponding problems,such as not suppo... At present,the traditional blockchain for data storage and retrieval reflects the characteristics of slow data uploading speed,high cost,and transparency,and there are a lot of corresponding problems,such as not supporting private data storage,large data operation costs,and not supporting Data field query.This paper proposes a method of data encryption storage and retrieval based on the IOTA distributed ledger,combined with the fast transaction processing speed and zero-value transactions of the IOTA blockchain,through the Masked Authenticated Messaging technology,so that the data is encrypted in the data stream.The form is stored in the distributed ledger,quickly retrieved through the field index mechanism established by the data form,and the data operation is carried out on the chain.Experimental results show that this system has high storage,encryption and retrieval performance,and good practicability. 展开更多
关键词 IOTA Masked Authenticated Messaging storage and retrieval
下载PDF
Efficient Conditional Privacy-Preserving and Authentication Scheme for Secure Service Provision in VANET 被引量:8
17
作者 Hong Zhong Jingyu Wen +1 位作者 Jie Cui Shun Zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第6期620-629,共10页
Vehicle Ad hoc NETworks(VANET) can enhance traffic safety and improve traffic efficiency through cooperative communication among vehicles, roadside infrastructure, and traffic management centers. To guarantee secure... Vehicle Ad hoc NETworks(VANET) can enhance traffic safety and improve traffic efficiency through cooperative communication among vehicles, roadside infrastructure, and traffic management centers. To guarantee secure service provision in VANET, message authentication is important. Moreover, a vehicle user's private information can also be leaked during service provision. A protection mechanism is needed to prevent such leakage. Therefore, we propose a conditional privacy-preserving and authentication scheme for secure service provision in VANETs. The proposed scheme not only satisfies the security requirements of VANETs, but also optimizes the calculation process of signature generation and verification. We carry out a detailed comparative analysis. The result shows that the proposed scheme is more efficient than existing schemes in terms of communication overhead and computational cost. Therefore, our scheme is suitable for secure service provision in VANETs. 展开更多
关键词 VANET message authentication batch verification privacy-preserve elliptic curve
原文传递
Fast Confidentiality-Preserving Authentication for Vehicular Ad Hoc Networks 被引量:1
18
作者 MIRZAEE Siavash JIANG Letian 《Journal of Shanghai Jiaotong university(Science)》 EI 2019年第1期31-40,共10页
This paper studies the existing problems of message authentication protocols in vehicular ad hoc networks(VANETs) due to their significance in the future of commuting and transportation. Our contribution has been devo... This paper studies the existing problems of message authentication protocols in vehicular ad hoc networks(VANETs) due to their significance in the future of commuting and transportation. Our contribution has been devoted to implementing a new protocol for VANETs so that inherent security problems in past works are resolved. Exclusive security measures have been considered for the system which protects the users against threat of any attack. The new protocol shows a great hardness guaranteed by certificate based 80 bit security which assures messages to remain confidential in any time. Also, new unprecedented features like V2 X which improves system performance effectively have been instantiated. The simulation results indicate that message signature generation and verification both take place in much less time than present comparable rival protocols. 展开更多
关键词 message authentication protocol vehicular ad hoc networks(VANETs) signature generation and verification
原文传递
Homomorphic MAC-Based Scheme against Pollution Attacks in Network Coding 被引量:3
19
作者 ZHANG Yujie CAI Ying +1 位作者 LI Zhuo FAN Yanfang 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期435-442,共8页
Network coding can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic message authentication code (MAC) scheme with discrete l... Network coding can improve network throughput in large, but it is vulnerable to the data pollution attacks. In this paper, we propose an efficient homomorphic message authentication code (MAC) scheme with discrete logarithm to detect and locate the malicious nodes. We also prove the security property of the scheme theoretically. Its effectiveness is demonstrated, and overhead is analyzed through extensive experiments. 展开更多
关键词 network coding pollution attacks homomorphic message authentication code discrete logarithm
原文传递
Algebraic manipulation detection codes 被引量:1
20
作者 CRAMER Ronald FEHR Serge PADRó Carles 《Science China Mathematics》 SCIE 2013年第7期1349-1358,共10页
Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that were previously used in cheater detection in secret shari... Algebraic manipulation detection codes are a cryptographic primitive that was introduced by Cramer et al. (Eurocrypt 2008). It encompasses several methods that were previously used in cheater detection in secret sharing. Since its introduction, a number of additional applications have been found. This paper contains a detailed exposition of the known results about algebraic manipulation detection codes as well as some new results. 展开更多
关键词 CRYPTOGRAPHY keyless message authentication algebraic manipulation
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部