scholarly journals Blockchain-Based Authentication with Optional Privacy Preservation for Internet of Vehicles

2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Jinxin Zhang ◽  
Meng Wu

With the rapid development of the mobile internet and intelligent technology of in-vehicle equipment, the Internet of Vehicles (IoV), centered on intelligent connected cars, has gradually entered people’s lives. However, these technologies also bring serious privacy risks and security issues in terms of data transmission and storage. In this article, we propose a blockchain-based authentication system to provide vehicle safety management. The privacy and security attributes of various vehicle authentication transactions are based on high-level cryptographic primitives, realizing temporary and formal authentication methods. At the same time, a fair blockchain consensus mechanism Auction of block generation Rights (AoR) is proposed. To demonstrate the feasibility and scalability of the proposed scheme, security and performance analyses are presented. The relevant experimental results show that the scheme can provide superior decentralized management for IoV.

2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Suzan Almutairi ◽  
Saoucene Mahfoudh ◽  
Sultan Almutairi ◽  
Jalal S. Alowibdi

Botnet is one of the most dangerous cyber-security issues. The botnet infects unprotected machines and keeps track of the communication with the command and control server to send and receive malicious commands. The attacker uses botnet to initiate dangerous attacks such as DDoS, fishing, data stealing, and spamming. The size of the botnet is usually very large, and millions of infected hosts may belong to it. In this paper, we addressed the problem of botnet detection based on network’s flows records and activities in the host. Thus, we propose a general technique capable of detecting new botnets in early phase. Our technique is implemented in both sides: host side and network side. The botnet communication traffic we are interested in includes HTTP, P2P, IRC, and DNS using IP fluxing. HANABot algorithm is proposed to preprocess and extract features to distinguish the botnet behavior from the legitimate behavior. We evaluate our solution using a collection of real datasets (malicious and legitimate). Our experiment shows a high level of accuracy and a low false positive rate. Furthermore, a comparison between some existing approaches was given, focusing on specific features and performance. The proposed technique outperforms some of the presented approaches in terms of accurately detecting botnet flow records within Netflow traces.


2016 ◽  
Vol 2016 ◽  
pp. 1-14 ◽  
Author(s):  
Hong Zhong ◽  
Song Li ◽  
Ting-Fang Cheng ◽  
Chin-Chen Chang

With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.


Author(s):  
Weiwei Zhao

With the rapid development of artificial intelligence, it has a more and more far-reaching impact on social, economic, cultural, and other fields. At the same time, artificial intelligence faces ethical, moral, privacy, and security issues. In order to realize the healthy development of artificial intelligence, it is urgent to apply the social responsibility management system to artificial intelligence. Based on the seven core subjects of social responsibility proposed by ISO 26000: organizational governance, human rights, labor practices, the environment, fair operating practices, consumer issues, and community involvement and development. In this chapter, the possible risks of artificial intelligence in these seven aspects are analyzed, and the corresponding countermeasures are discussed according to the causes of these problems. The final conclusion is the aspects that artificial intelligence should pay attention to when fulfilling its social responsibility.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Peijun Zhang ◽  
Lianhai Wang ◽  
Wei Wang ◽  
Kunlun Fu ◽  
Jinpeng Wang

Blockchain, which has a distributed structure, has been widely used in many areas. Especially in the area of smart cities, blockchain technology shows great potential. The security issues of blockchain affect the construction of smart cities to varying degrees. With the rapid development of quantum computation, elliptic curves cryptosystems used in blockchain are not secure enough. This paper presents a blockchain system based on lattice cipher, which can resist the attack of quantum computation. The most challenge is that the size of public keys and signatures used by lattice cryptosystems is typically very large. As a result, each block in a blockchain can only accommodate a small number of transactions. It will affect the running speed and performance of the blockchain. For overcoming this problem, we proposed a way that we only put the hash values of public keys and signatures on the blockchain and store the complete content of them on an IPFS (interplanetary file system). In this way, the number of bytes occupied by each transaction is greatly reduced. We design a bitcoin exchange scheme to evaluate the performance of the proposed quantum-resistant blockchain system. The simulation platform is verified to be available and effective.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Junsong Zhang ◽  
Qikun Zhang ◽  
Xianling Lu ◽  
Yong Gan

With the rapid development of communication and microelectronic technology, the vehicular ad hoc network (VANET) has received extensive attention. However, due to the open nature of wireless communication links, it will cause VANET to generate many network security issues such as data leakage, network hijacking, and eavesdropping. To solve the above problem, this paper proposes a new authentication protocol which uses bilinear pairings and temporary pseudonyms. The proposed authentication protocol can realize functions such as the identity authentication of the vehicle and the verification of the message sent by the vehicle. Moreover, the proposed authentication protocol is capable of preventing any party (peer vehicles, service providers, etc.) from tracking the vehicle. To improve the efficiency of message verification, this paper also presents a batch authentication method for the vehicle to verify all messages received within a certain period of time. Finally, through security and performance analysis, it is actually easy to find that the proposed authentication protocol can not only resist various security threats but also have good computing and communication performance in the VANET environment.


2021 ◽  
Author(s):  
Xiaohui Yu

As Radio Frequency Identification (RFID) technology achieves commercial success, its privacy and security issues are becoming a barrier to limit its potential for future start of the art applications. In this report, we present an investigation of the past and current research related to RFID security algorithms and protocols for product authentication. We also present a novel RFID security protocol based on eXtended Tiny Encryption Algorithm (XTEA). Analysis of the security and privacy level of our proposed protocol is performed using SystemC based modeling and different attack models are simulated to show that the protocol is robust and safe against application, protoypes of these attack models are implemented on FPGA platform. We also compare our proposed protocol technique with similar protocols presented in the near past that also use symmetric key algorithms to verify and demostrate main advantages of our protocol in terms of security and performance.


Sensors ◽  
2019 ◽  
Vol 19 (9) ◽  
pp. 2042 ◽  
Author(s):  
Yiming Jiang ◽  
Chenxu Wang ◽  
Yawei Wang ◽  
Lang Gao

With the rapid development of the internet of things (IoT), traditional industries are setting off a massive wave of digitization. In the era of the Internet of Everything, millions of devices and links in IoT pose more significant challenges to data management. Most existing solutions employ centralized systems to control IoT devices, which brings about the privacy and security issues in IoT data management. Recently, blockchain has attracted much attention in the field of IoT due to its decentralization, traceability, and non-tamperability. However, it is non-trivial to apply the current blockchain techniques to IoT due to the lack of scalability and high resource costs. Different blockchain platforms have their particular advantages in the scenario of IoT data management. In this paper, we propose a cross-chain framework to integrate multiple blockchains for efficient and secure IoT data management. Our solution builds an interactive decentralized access model which employs a consortium blockchain as the control station. Other blockchain platforms customized for specific IoT scenarios run as the backbone of all IoT devices. It is equivalent to opening the off-chain channels on the consortium blockchain. Our model merges transactions in these channels for confirmation based on the notary mechanism. Finally, we implement a prototype of the proposed model based on hyperledge Fabric and IOTA Tangle. We evaluate the performance of our method through extensive experiments. The results demonstrate the effectiveness and efficiency of our framework.


Entropy ◽  
2020 ◽  
Vol 22 (7) ◽  
pp. 712
Author(s):  
Hong Zhao ◽  
Xue Bai ◽  
Shihui Zheng ◽  
Licheng Wang

As the blockchain 2.0 platform, Ethereum’s turing complete programming language and smart contract components make it play an important role in the commercialization of blockchain. With the further development of blockchain applications, the privacy and security issues of Ethereum have gradually emerged. To solve this problem, we proposed a blockchain privacy protection model called RZcash in the previous work. It implements the dynamically updateable and verifiable hiding of the asset information in Ethereum, namely the account balance and transaction amount. However, RZcash does not pay attention to the key redundancy problem that may be caused by the creation of secret accounts. In addition, the large size of proofs gives it high communication costs. In response to these problems, we further improve RZcash. For the key redundancy problem, we construct a new signature scheme based on the ciphertext equivalent test commitment. Moreover, we use the Schnorr signature and bulletproof to improve the corresponding proof scheme in RZcash, thereby reducing the size of proof. Based on these improvements, we propose a decentralized payment system, called RZcoin, based on Ethereum. Finally, we implement the algorithm model of RZcoin and evaluate its security and performance. The results show that RZcoin has higher security and Lower communication cost than RZcash.


Author(s):  
K. G. Srinivasa ◽  
Ganesh Hegde ◽  
G M Sideesh ◽  
Srinidhi Hiriyannaiah

With the advent of increasing breaches and of private data stored in a large number of public cloud storage providers by high level government organizations under the pretext of copyright infringements, national security etc, data privacy is gaining paramount importance. Cheap yet powerful system-on-chip computers like the Raspberry Pi and wide range of community supported software have made running one's own server without spending a lot, a reality. We explore open source cloud storage service alternatives and their feature parity, running one of these services to setup a personal cloud server to protect data privacy and security. We also take a look at the security issues, data availability, cost effectiveness and viability of deploying a personal cloud when compared to some popular public cloud storage providers.


Sign in / Sign up

Export Citation Format

Share Document