Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food mater...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited...Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited manually to ensure document authenticity.However,manual assessment of seal images is tedious and laborintensive due to human errors,inconsistent placement,and completeness of the seal.Traditional image recognition systems are inadequate enough to identify seal types accurately,necessitating a neural network-based method for seal image recognition.However,neural network-based classification algorithms,such as Residual Networks(ResNet)andVisualGeometryGroup with 16 layers(VGG16)yield suboptimal recognition rates on stamp datasets.Additionally,the fixed training data categories make handling new categories to be a challenging task.This paper proposes amulti-stage seal recognition algorithmbased on Siamese network to overcome these limitations.Firstly,the seal image is pre-processed by applying an image rotation correction module based on Histogram of Oriented Gradients(HOG).Secondly,the similarity between input seal image pairs is measured by utilizing a similarity comparison module based on the Siamese network.Finally,we compare the results with the pre-stored standard seal template images in the database to obtain the seal type.To evaluate the performance of the proposed method,we further create a new seal image dataset that contains two subsets with 210,000 valid labeled pairs in total.The proposed work has a practical significance in industries where automatic seal authentication is essential as in legal,financial,and governmental sectors,where automatic seal recognition can enhance document security and streamline validation processes.Furthermore,the experimental results show that the proposed multi-stage method for seal image recognition outperforms state-of-the-art methods on the two established datasets.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the 1atest research findings in the field of anima1-origin foobis,involving food mate...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the 1atest research findings in the field of anima1-origin foobis,involving food matenials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identification;cell-culured meat,regulations and standards.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
Civilian services of Global Navigation Satellite System are threatened by spoofng attacks since it is hard to determine the authenticity of a navigation signal with a detailed structure open to the public.Signal authe...Civilian services of Global Navigation Satellite System are threatened by spoofng attacks since it is hard to determine the authenticity of a navigation signal with a detailed structure open to the public.Signal authentication efectively protects the security of the signal by attaching unforgeable information to one or several elements of the signal.Receivers can verify the authenticity of the signal by extracting and validating this information.Developing good signal authentication schemes requires understanding possible spoofng modes,signal element specialty,and performance evaluation methods.This paper is an overview of navigation signal authentication,where the theories and reported approaches are described in detail.A design/performance matrix that demonstrates the advantages and defects of the signal element and its authentication design is summarized.Recommendations are proposed to improve the robustness,security,efciency,and implementation hardness for future designs of navigation signal authentication.展开更多
Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laborat...Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is available in a single place. However, it is difficult to store and manage large amounts of data. Dedicated servers and a data center are needed to store and manage patient data. However, self-managed data centers are expensive for hospitals. Storing data in a cloud is a cheaper alternative. The advantage of storing data in a cloud is that it can be retrieved anywhere and anytime using any device connected to the Internet. Therefore, doctors can easily access the medical history of a patient and diagnose diseases according to the context. It also helps prescribe the correct medicine to a patient in an appropriate way. The systematic storage of medical records could help reduce medical errors in hospitals. The challenge is to store medical records on a third-party cloud server while addressing privacy and security concerns. These servers are often semi-trusted. Thus, sensitive medical information must be protected. Open access to records and modifications performed on the information in those records may even cause patient fatalities. Patient-centric health-record security is a major concern. End-to-end file encryption before outsourcing data to a third-party cloud server ensures security. This paper presents a method that is a combination of the advanced encryption standard and the elliptical curve Diffie-Hellman method designed to increase the efficiency of medical record security for users. Comparisons of existing and proposed techniques are presented at the end of the article, with a focus on the analyzing the security approaches between the elliptic curve and secret-sharing methods. This study aims to provide a high level of security for patient health records.展开更多
The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link system....The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link system.Due to the openness and widely distribution of ATM system,the trust relationship of all parties in the system is pretty complex.At present,public key infrastructure(PKI)based identity authentication method is more and more difficult to meet the growing demand of ATM service.First,through the analysis of the organizational structure and operation mode of ATM system,this paper points out the existing identity authentication security threats in ATM system,and discusses the advantages of adopting blockchain technology in ATM system.Further,we briefly analyze some shortcomings of the current PKI-based authentication system in ATM.Particularly,to address the authentication problem,this paper proposes and presents a trusted ATM Security Authentication Model and authentication protocol based on blockchain.Finally,this paper makes a comprehensive analysis and simulation of the proposed security authentication scheme,and gets the expected effect.展开更多
With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification o...With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures.展开更多
The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti...With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is ...Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.展开更多
The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during informati...The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur...The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.展开更多
Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food mat...Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.展开更多
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research findings in the field of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
基金the National Natural Science Foundation of China(Grant No.62172132)Public Welfare Technology Research Project of Zhejiang Province(Grant No.LGF21F020014)the Opening Project of Key Laboratory of Public Security Information Application Based on Big-Data Architecture,Ministry of Public Security of Zhejiang Police College(Grant No.2021DSJSYS002).
文摘Seal authentication is an important task for verifying the authenticity of stamped seals used in various domains to protect legal documents from tampering and counterfeiting.Stamped seal inspection is commonly audited manually to ensure document authenticity.However,manual assessment of seal images is tedious and laborintensive due to human errors,inconsistent placement,and completeness of the seal.Traditional image recognition systems are inadequate enough to identify seal types accurately,necessitating a neural network-based method for seal image recognition.However,neural network-based classification algorithms,such as Residual Networks(ResNet)andVisualGeometryGroup with 16 layers(VGG16)yield suboptimal recognition rates on stamp datasets.Additionally,the fixed training data categories make handling new categories to be a challenging task.This paper proposes amulti-stage seal recognition algorithmbased on Siamese network to overcome these limitations.Firstly,the seal image is pre-processed by applying an image rotation correction module based on Histogram of Oriented Gradients(HOG).Secondly,the similarity between input seal image pairs is measured by utilizing a similarity comparison module based on the Siamese network.Finally,we compare the results with the pre-stored standard seal template images in the database to obtain the seal type.To evaluate the performance of the proposed method,we further create a new seal image dataset that contains two subsets with 210,000 valid labeled pairs in total.The proposed work has a practical significance in industries where automatic seal authentication is essential as in legal,financial,and governmental sectors,where automatic seal recognition can enhance document security and streamline validation processes.Furthermore,the experimental results show that the proposed multi-stage method for seal image recognition outperforms state-of-the-art methods on the two established datasets.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the 1atest research findings in the field of anima1-origin foobis,involving food matenials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product flavor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identification;cell-culured meat,regulations and standards.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
基金the National Natural Science Foundation of China(Grant Nos.U20A0193 and 62003354).
文摘Civilian services of Global Navigation Satellite System are threatened by spoofng attacks since it is hard to determine the authenticity of a navigation signal with a detailed structure open to the public.Signal authentication efectively protects the security of the signal by attaching unforgeable information to one or several elements of the signal.Receivers can verify the authenticity of the signal by extracting and validating this information.Developing good signal authentication schemes requires understanding possible spoofng modes,signal element specialty,and performance evaluation methods.This paper is an overview of navigation signal authentication,where the theories and reported approaches are described in detail.A design/performance matrix that demonstrates the advantages and defects of the signal element and its authentication design is summarized.Recommendations are proposed to improve the robustness,security,efciency,and implementation hardness for future designs of navigation signal authentication.
文摘Without proper security mechanisms, medical records stored electronically can be accessed more easily than physical files. Patient health information is scattered throughout the hospital environment, including laboratories, pharmacies, and daily medical status reports. The electronic format of medical reports ensures that all information is available in a single place. However, it is difficult to store and manage large amounts of data. Dedicated servers and a data center are needed to store and manage patient data. However, self-managed data centers are expensive for hospitals. Storing data in a cloud is a cheaper alternative. The advantage of storing data in a cloud is that it can be retrieved anywhere and anytime using any device connected to the Internet. Therefore, doctors can easily access the medical history of a patient and diagnose diseases according to the context. It also helps prescribe the correct medicine to a patient in an appropriate way. The systematic storage of medical records could help reduce medical errors in hospitals. The challenge is to store medical records on a third-party cloud server while addressing privacy and security concerns. These servers are often semi-trusted. Thus, sensitive medical information must be protected. Open access to records and modifications performed on the information in those records may even cause patient fatalities. Patient-centric health-record security is a major concern. End-to-end file encryption before outsourcing data to a third-party cloud server ensures security. This paper presents a method that is a combination of the advanced encryption standard and the elliptical curve Diffie-Hellman method designed to increase the efficiency of medical record security for users. Comparisons of existing and proposed techniques are presented at the end of the article, with a focus on the analyzing the security approaches between the elliptic curve and secret-sharing methods. This study aims to provide a high level of security for patient health records.
基金This work was supported in part by the National Key R&D Program of China(No.2022YFB3904503)National Natural Science Foundation of China(No.62172418).
文摘The air traffic management(ATM)system is an intelligent system,which integrates the ground computer network,airborne network and space satellite(communication and navigation)network by the ground-air data link system.Due to the openness and widely distribution of ATM system,the trust relationship of all parties in the system is pretty complex.At present,public key infrastructure(PKI)based identity authentication method is more and more difficult to meet the growing demand of ATM service.First,through the analysis of the organizational structure and operation mode of ATM system,this paper points out the existing identity authentication security threats in ATM system,and discusses the advantages of adopting blockchain technology in ATM system.Further,we briefly analyze some shortcomings of the current PKI-based authentication system in ATM.Particularly,to address the authentication problem,this paper proposes and presents a trusted ATM Security Authentication Model and authentication protocol based on blockchain.Finally,this paper makes a comprehensive analysis and simulation of the proposed security authentication scheme,and gets the expected effect.
基金supported by Support Plan of Scientific and Technological Innovation Team in Universities of Henan Province(20IRTSTHN013)Shaanxi Key Laboratory of Information Communication Network and Security,Xi’an University of Posts&Telecommunications,Xi’an,Shaanxi 710121,China(ICNS202006)The National Natural Science Fund(No.61802117).
文摘With the promotion of digital currency,how to effectively solve the authenticity,privacy and usability of digital currency issuance has been a key problem.Redactable signature scheme(RSS)can provide the verification of the integrity and source of the generated sub-documents and solve the privacy problem in digital currency by removing blocks from the signed documents.Unfortunately,it has not realized the consolidation of signed documents,which can not solve the problem of merging two digital currencies.Now,we introduce the concept of weight based on the threshold secret sharing scheme(TSSS)and present a redactable signature scheme with merge algorithm(RSS-MA)using the quasi-commutative accumulator.Our scheme can reduce the communication overhead by utilizing the merge algorithm when transmitting multiple digital currency signatures.Furthermore,this can effectively hide the scale of users’private monetary assets and the number of transactions between users.While meeting the three properties of digital currency issuance,in order to ensure the availability of digital currency after redacting,editors shall not remove the relevant identification information block form digital currency.Finally,our security proof and the analysis of efficiency show that RSS-MA greatly improves the communication and computation efficiency when transmitting multiple signatures.
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.
基金Wenzhou Key Scientific and Technological Projects(No.ZG2020031)Wenzhou Polytechnic Research Projects(No.WZY2021002)+3 种基金Key R&D Projects in Zhejiang Province(No.2021C01117)Major Program of Natural Science Foundation of Zhejiang Province(LD22F020002)the Cloud Security Key Technology Research Laboratorythe Researchers Supporting Project Number(RSP2023R509),King Saud University,Riyadh,Saudi Arabia.
文摘With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy information.At present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of practicability.To this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model certification.The experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
文摘Nowadays, devices are connected across all areas, from intelligent buildings and smart cities to Industry 4.0 andsmart healthcare. With the exponential growth of Internet of Things usage in our world, IoT security is still thebiggest challenge for its deployment. The main goal of IoT security is to ensure the accessibility of services providedby an IoT environment, protect privacy, and confidentiality, and guarantee the safety of IoT users, infrastructures,data, and devices. Authentication, as the first line of defense against security threats, becomes the priority ofeveryone. It can either grant or deny users access to resources according to their legitimacy. As a result, studyingand researching authentication issues within IoT is extremely important. As a result, studying and researchingauthentication issues within IoT is extremely important. This article presents a comparative study of recent researchin IoT security;it provides an analysis of recent authentication protocols from2019 to 2023 that cover several areaswithin IoT (such as smart cities, healthcare, and industry). This survey sought to provide an IoT security researchsummary, the biggest susceptibilities, and attacks, the appropriate technologies, and the most used simulators. Itillustrates that the resistance of protocols against attacks, and their computational and communication cost arelinked directly to the cryptography technique used to build it. Furthermore, it discusses the gaps in recent schemesand provides some future research directions.
基金supported in part by the Fundamental Research Funds for the Central Universities(Nos.3282024052,3282024058)the“Advanced and Sophisticated”Discipline Construction Project of Universities in Beijing(No.20210013Z0401).
文摘The Industrial Internet of Things(IIoT)consists of massive devices in different management domains,and the lack of trust among cross-domain entities leads to risks of data security and privacy leakage during information exchange.To address the above challenges,a viable solution that combines Certificateless Public Key Cryptography(CL-PKC)with blockchain technology can be utilized.However,as many existing schemes rely on a single Key Generation Center(KGC),they are prone to problems such as single points of failure and high computational overhead.In this case,this paper proposes a novel blockchain-based certificateless cross-domain authentication scheme,that integrates the threshold secret sharing mechanism without a trusted center,meanwhile,adopts blockchain technology to enable cross-domain entities to authenticate with each other and to negotiate session keys securely.This scheme also supports the dynamic joining and removing of multiple KGCs,ensuring secure and efficient cross-domain authentication and key negotiation.Comparative analysiswith other protocols demonstrates that the proposed cross-domain authentication protocol can achieve high security with relatively lowcomputational overhead.Moreover,this paper evaluates the scheme based on Hyperledger Fabric blockchain environment and simulates the performance of the certificateless scheme under different threshold parameters,and the simulation results show that the scheme has high performance.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.
文摘The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment.
文摘Food Science of Animal Products(ISSN:2958-4124,e-ISSN:2958-3780)is a peer-reviewed,open access international journal that publishes the latest research fi ndings in the fi eld of animal-origin foods,involving food materials such as meat,aquatic products,milk,eggs,animal offals and edible insects.The research scope includes the quality and processing characteristics of food raw materials,the relationships of nutritional components and bioactive substances with human health,product fl avor and sensory characteristics,the control of harmful substances during processing or cooking,product preservation,storage and packaging;microorganisms and fermentation,illegal drug residues and food safety detection;authenticity identifi cation;cell-cultured meat,regulations and standards.