With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via ...The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.展开更多
A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement...A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement a session key in the end of it. Unfortunately, Mangipudi pointed out Aydos' scheme was incurred the man-in-middle attack denial-of-service attack and impersonation based on man-in-middle attack. Then he proposed an improved scheme m overcome the above weakness. However, there is an attack which can forge the message required in the protocol and impersonation a valid user to the server.展开更多
The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these ...The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.展开更多
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
基金The authors would like to thank the reviewers and the Associate Editor for their valuable suggestions that helped in improving the quality,readability and presentation of the paper.This work was supported by FCT/MCTES through national funds and when applicable co-funded EU funds under the Project UIDB/50008/2020by the Brazilian National Council for Research and Development(CNPq)via Grants No.431726/2018-3 and 313036/2020-9.
文摘The Internet of Medical Things(IoMT)is a collection of smart healthcare devices,hardware infrastructure,and related software applications,that facilitate the connection of healthcare information technology system via the Internet.It is also called IoT in healthcare,facilitating secure communication of remote healthcare devices over the Internet for quick and flexible analysis of healthcare data.In other words,IoMT is an amalgam of medical devices and applications,which improves overall healthcare outcomes.However,this system is prone to securityand privacy-related attacks on healthcare data.Therefore,providing a robust security mechanism to prevent the attacks and vulnerability of IoMT is essential.To mitigate this,we proposed a new Artificial-Intelligence envisioned secure communication scheme for IoMT.The discussed network and threat models provide details of the associated network arrangement of the IoMT devices and attacks relevant to IoMT.Furthermore,we provide the security analysis of the proposed scheme to show its security against different possible attacks.Moreover,a comparative study of the proposed scheme with other similar schemes is presented.Our results show that the proposed scheme outperforms other similar schemes in terms of communication and computation costs,and security and functionality attributes.Finally,we provide a pragmatic study of the proposed scheme to observe its impact on various network performance parameters.
基金Supported by the Natural Science Foundation ofShandong Province (Y2005G09)
文摘A mutual authentication and key establishment protocol proposed by Aydos et al, for wireless communication based on elliptic curve cryptography can provide authentication between the user and server and they agreement a session key in the end of it. Unfortunately, Mangipudi pointed out Aydos' scheme was incurred the man-in-middle attack denial-of-service attack and impersonation based on man-in-middle attack. Then he proposed an improved scheme m overcome the above weakness. However, there is an attack which can forge the message required in the protocol and impersonation a valid user to the server.
基金The Universiti Kebangsaan Malaysia(UKM)Research Grant Scheme GGPM-2020-028 funded this research.
文摘The fifth generation(5G)system is the forthcoming generation of the mobile communication system.It has numerous additional features and offers an extensively high data rate,more capacity,and low latency.However,these features and applications have many problems and issues in terms of security,which has become a great challenge in the telecommunication industry.This paper aimed to propose a solution to preserve the user identity privacy in the 5G system that can identify permanent identity by using Variable Mobile Subscriber Identity,which randomly changes and does not use the permanent identity between the user equipment and home network.Through this mechanism,the user identity privacy would be secured and hidden.Moreover,it improves the synchronization between mobile users and home networks.Additionally,its compliance with the Authentication and Key Agreement(AKA)structure was adopted in the previous generations.It can be deployed efficiently in the preceding generations because the current architecture imposes minimal modifications on the network parties without changes in the authentication vector’s message size.Moreover,the addition of any hardware to the AKA carries minor adjustments on the network parties.In this paper,the ProVerif is used to verify the proposed scheme.