Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and ...Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and complex business relationships of industrial Internet.The main contents of the platform include industrial data collection,industrial protocol identification,industrial asset detection and industrial threat monitoring.Among them,risk prevention and detection,key data protection,cloud platform and identification resolution node protection are all important issues.On the one hand,escorting the industrial Internet business needs to summarize the industrial Internet network security data and master the network security situation from the overall perspective.On the other hand,it is also necessary to establish an industrial Internet platform security early warning and emergency response process system,promote the security rectification of industrial platform enterprises,find the security threats and risks that have been hidden in the industrial Internet platform for a long time,and provide perception and decision⁃making support for enterprises.展开更多
Windows Vista正式发布之后.最新版本的Norton Internet Security2007就在第一时间送到了《个人电脑》实验室.这无疑是一个好消息——对消费者来讲.终于可以为这个新操作系统找到一个同样出自名门的合伙人了,对Symantec来讲.抢先于...Windows Vista正式发布之后.最新版本的Norton Internet Security2007就在第一时间送到了《个人电脑》实验室.这无疑是一个好消息——对消费者来讲.终于可以为这个新操作系统找到一个同样出自名门的合伙人了,对Symantec来讲.抢先于竞争对手推出支持Vista系统的防护软件无疑会占尽先机。展开更多
Kaspersky的系列安全防护工具囊括了查杀病毒、木马监测、网络防护等诸多方面,凭借着稳定的性能和强大的功能赢得了用户的一致赞誉。为了减少独立工具给安装使用带来的麻烦,集多种安全防护功能于一体的Kaspersky Internet Security 20...Kaspersky的系列安全防护工具囊括了查杀病毒、木马监测、网络防护等诸多方面,凭借着稳定的性能和强大的功能赢得了用户的一致赞誉。为了减少独立工具给安装使用带来的麻烦,集多种安全防护功能于一体的Kaspersky Internet Security 2006(以下简称为KIS2006)应运而生。展开更多
赛门铁克的Norton Internet Security 2010
是一款已经推出了一段时间的产品,同时也是获得本刊2009年年度百佳产品安防软件类产品大奖的一款产品。这足以证明它的优秀,在功能方面、性能方面,乃至UI设计方面都十分令人满意。作为赛...赛门铁克的Norton Internet Security 2010
是一款已经推出了一段时间的产品,同时也是获得本刊2009年年度百佳产品安防软件类产品大奖的一款产品。这足以证明它的优秀,在功能方面、性能方面,乃至UI设计方面都十分令人满意。作为赛门铁克每年更新的一款产品,NIS代表着最为完善的互联网安防体系。展开更多
Norton Internet Security 2003( 诺顿网络安全特警2003,以下简称NIS2003),实际上是由Norton AntiVirus 2003(诺顿防毒2003,以下简称NAV2003)和Norton Personal Firewall 2003(诺顿个人防火墙2003,以下简称NPF2003)两个组件组成的...Norton Internet Security 2003( 诺顿网络安全特警2003,以下简称NIS2003),实际上是由Norton AntiVirus 2003(诺顿防毒2003,以下简称NAV2003)和Norton Personal Firewall 2003(诺顿个人防火墙2003,以下简称NPF2003)两个组件组成的。作为著名的反病毒软件,NAV2003确实不用在这里多费笔墨,而NPF2003则是NIS2003作为网络防火墙的功能主体。另外,NIS2003之所以号称“网络安全特警”,它除了网络防火墙的基本功能外,还具备“隐私控制”、“禁止广告”和“垃圾邮件警报”的功能,这些都有利于提高你的上网效率,净化网络环境,这是很多网络防火墙软件都不具备的特性。展开更多
Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the...Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.展开更多
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment.Concur-r...Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment.Concur-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human intervention.However,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration.The findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy protection.Recent investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)attacks.Moreover,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application plane.Additionally,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.展开更多
Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metav...Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every day.This Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber attacks.MV-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be developed.To fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper.We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars.As a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established.展开更多
文摘Under the new situation of"integration of industrialization and industrialization"in China,security situational awareness is an important means to solve the problems of unclear boundaries,multiple roles and complex business relationships of industrial Internet.The main contents of the platform include industrial data collection,industrial protocol identification,industrial asset detection and industrial threat monitoring.Among them,risk prevention and detection,key data protection,cloud platform and identification resolution node protection are all important issues.On the one hand,escorting the industrial Internet business needs to summarize the industrial Internet network security data and master the network security situation from the overall perspective.On the other hand,it is also necessary to establish an industrial Internet platform security early warning and emergency response process system,promote the security rectification of industrial platform enterprises,find the security threats and risks that have been hidden in the industrial Internet platform for a long time,and provide perception and decision⁃making support for enterprises.
文摘卡巴斯基一直以来以其超强的杀毒能力为用户所熟知。不过它的上一代产品Kaspersky 6.0推出至今已经差不多有两年时间了,这多少有点让那些热衷于KIS系列产品的用户有些失望。最近,卡巴斯基终于正式推出了他们的新品——Kaspersky Internet Security7.0。这一版本的KIS功能更为全面。
文摘Windows Vista正式发布之后.最新版本的Norton Internet Security2007就在第一时间送到了《个人电脑》实验室.这无疑是一个好消息——对消费者来讲.终于可以为这个新操作系统找到一个同样出自名门的合伙人了,对Symantec来讲.抢先于竞争对手推出支持Vista系统的防护软件无疑会占尽先机。
文摘Kaspersky的系列安全防护工具囊括了查杀病毒、木马监测、网络防护等诸多方面,凭借着稳定的性能和强大的功能赢得了用户的一致赞誉。为了减少独立工具给安装使用带来的麻烦,集多种安全防护功能于一体的Kaspersky Internet Security 2006(以下简称为KIS2006)应运而生。
文摘赛门铁克的Norton Internet Security 2010
是一款已经推出了一段时间的产品,同时也是获得本刊2009年年度百佳产品安防软件类产品大奖的一款产品。这足以证明它的优秀,在功能方面、性能方面,乃至UI设计方面都十分令人满意。作为赛门铁克每年更新的一款产品,NIS代表着最为完善的互联网安防体系。
文摘Norton Internet Security 2003( 诺顿网络安全特警2003,以下简称NIS2003),实际上是由Norton AntiVirus 2003(诺顿防毒2003,以下简称NAV2003)和Norton Personal Firewall 2003(诺顿个人防火墙2003,以下简称NPF2003)两个组件组成的。作为著名的反病毒软件,NAV2003确实不用在这里多费笔墨,而NPF2003则是NIS2003作为网络防火墙的功能主体。另外,NIS2003之所以号称“网络安全特警”,它除了网络防火墙的基本功能外,还具备“隐私控制”、“禁止广告”和“垃圾邮件警报”的功能,这些都有利于提高你的上网效率,净化网络环境,这是很多网络防火墙软件都不具备的特性。
基金supported in part by the National Natural Science Foundation of China (62072248, 62072247)the Jiangsu Agriculture Science and Technology Innovation Fund (CX(21)3060)。
文摘Solar insecticidal lamps(SIL) can effectively control pests and reduce the use of pesticides. Combining SIL and Internet of Things(IoT) has formed a new type of agricultural IoT,known as SIL-IoT, which can improve the effectiveness of migratory phototropic pest control. However, since the SIL is connected to the Internet, it is vulnerable to various security issues.These issues can lead to serious consequences, such as tampering with the parameters of SIL, illegally starting and stopping SIL,etc. In this paper, we describe the overall security requirements of SIL-IoT and present an extensive survey of security and privacy solutions for SIL-IoT. We investigate the background and logical architecture of SIL-IoT, discuss SIL-IoT security scenarios, and analyze potential attacks. Starting from the security requirements of SIL-IoT we divide them into six categories, namely privacy, authentication, confidentiality, access control, availability,and integrity. Next, we describe the SIL-IoT privacy and security solutions, as well as the blockchain-based solutions. Based on the current survey, we finally discuss the challenges and future research directions of SIL-IoT.
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
基金This work was supported by National Natural Science Foundation of China(Grant No.62341208)Natural Science Foundation of Zhejiang Province(Grant Nos.LY23F020006 and LR23F020001)Moreover,it has been supported by Islamic Azad University with the Grant No.133713281361.
文摘Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize deployment.Concur-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human intervention.However,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN integration.The findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy protection.Recent investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)attacks.Moreover,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application plane.Additionally,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(IITP)(Project Nos.2022-0-00701,10%,RS-2023-00228996,10%,RS-2022-00165794,10%)the ICTR&DProgram of MSIT/IITP(ProjectNo.2021-0-01816,10%)a National Research Foundation of Korea(NRF)grant funded by the Korean Government(Project No.RS2023-00208460,60%).
文摘Nowadays,theuse of Avatars that are unique digital depictions has increased by users to access Metaverse—a virtual reality environment—through multiple devices and for various purposes.Therefore,the Avatar and Metaverse are being developed with a new theory,application,and design,necessitating the association of more personal data and devices of targeted users every day.This Avatar and Metaverse technology explosion raises privacy and security concerns,leading to cyber attacks.MV-Honeypot,or Metaverse-Honeypot,as a commercial off-the-shelf solution that can counter these cyber attack-causing vulnerabilities,should be developed.To fill this gap,we study user’s engagements with Avatars in Metaverse,analyze possible security vulnerabilities,and create a model named Simplified Avatar Relationship Association with Non-linear Gradient(SARANG)that draws the full diagram of infrastructure components and data flow through accessing Metaverse in this paper.We also determine the most significant threat for each component’s cyberattacks that will affect user data and Avatars.As a result,the commercial off-the-shelf(COTS)of the MV-Honeypot must be established.