با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Authenticated Secure Quantum-Based Communication Scheme in Internet-of-Drones Deployment
طرح ارتباطی مبتنی بر کوانتومی ایمن در استقرار اینترنت پهپادها-2022 The rapid advance of manufacturing Unmanned Aerial Vehicles (UAVs, aka drones) has led
to a rise in the use of their civilian and commercial applications. The access of these drones to controlled
airspace can be efficiently coordinated through particular layered network architecture, often referred to
as the Internet-of-Drones (IoD). The nature of IoD, which is deployed in an open-access environment,
brings significant safety and security concerns. Classical cryptosystems such as elliptic curve cryptography,
Rivest-Shamir-Adleman, and Diffie-Hellman are essential building blocks to secure communication in the
IoD. However, with the rapid development of quantum computing, it will be easy to break public-key
cryptosystems using efficient quantum algorithms like Shor’s algorithm. Thus, building quantum-safe
solutions to enhance IoD security has become imperative. Fortunately, quantum technologies can provide
unconditional security solutions to protect data and communications in the IoD environment. This paper
proposes a quantum-based scheme to prevent unauthorized drones from accessing a specific flight zone
and authenticates the identities and shared secret messages of involved entities. To do so, we used a quantum
channel to encode the private information based on a pre-shared key and a random key generated in a session.
The involved entities also perform mutual authentication and share a secret key. We also provide the security
proofs and analysis of the proposed scheme that indicates its resistance to well-known attacks.
INDEX TERMS- Authentication | internet-of-drones | quantum-based communication | quantum cryptography. |
مقاله انگلیسی |
2 |
TNFS resistant families of pairing-friendly elliptic curves
خانواده های مقاوم TNFS منحنی بیضوی مناسب جفت شدن-2019 Recently there has been a significant progress on the tower number field sieve (TNFS) method, reducing the complexity of the discrete logarithm problem (DLP) in finite field extensions of composite degree. These new variants of the TNFS attacks have a major impact on pairing-based cryptography and particularly on the selection of the underlying elliptic curve groups and extension fields. In this paper we revise the criteria for selecting pairing-friendly elliptic curves considering these new TNFS attacks in finite extensions of composite embedding degree. Additionally we update the criteria for finite extensions of prime degree in order to meet today’s security requirements. Keywords: Pairings | Elliptic curves | Pairing-friendly parameters | Embedding degree | TNFS attacks |
مقاله انگلیسی |
3 |
A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
پروتکل احراز هویت متقابل منحنی بیضوی امن برای TMIS با کمک ابر-2019 With the fast progress of network communication, its technologies and the developing popularity
of telecare medical information system (TMIS), doctors provide treatment to patients via Internet
without visiting hospitals. By using mobile device, wireless body area network and cloud based
architecture, the patients can gather their physiological information and upload to cloud via their
mobile devices. The authenticated doctor provides online treatment to patient at anytime and
anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication
and authenticated to all the participants before assessing this system. Recently Li
et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS.
They believed that their scheme secure against all well-known privacy and security attributes. In
the proposed work, we reviewed Li et al. authentication protocol and found that it has various
security flaws like as message authentication fails in healthcare center upload phase, session key
is not possible in healthcare center upload phase, impersonation attack in patient data upload
phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in
similar environment. The proposed protocol secure against man-in-the-middle attack, patient
anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation,
message authentication, impersonation attack, session key security and patient unlinkability.
We compared the proposed protocol with existing related protocols in same cloud based
TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the
efficiency in terms of computation and communication costs for cloud-assisted TMIS. Keywords: Cloud computing | Elliptic curve cryptography | TMIS | Medical data | Mutual authentication |
مقاله انگلیسی |
4 |
Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
پروتکل احراز هویت کاربر از راه دور سبک وزن برای شبکه های 5G چند سرور با استفاده از رمزنگاری کلید عمومی عمومی خود گواهی شده-2019 Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication
protocol needs to be developed for complex 5G networks. In this paper, we propose a lightweight and untraceable
authentication protocol for multi-server-based 5G networks. To reduce computational complexity, we employ selfcertified
public key cryptography based on elliptic curve cryptography to authenticate the validation of users and
servers. Without pairing operations, our scheme could improve performance efficiency. Also, a formal security
model is designed to prove that our protocol is secure against forgery attack due to the discrete logarithm and the
computational Diffie-Hellman problem. Performance analysis further shows that our protocol has a lower
communication and computational overhead. Also, our protocol could support anonymous mutual authentication. Keywords: Multi-server | Mutual authentication | Lightweight |
مقاله انگلیسی |
5 |
Privacy-preserving aggregation for cooperative spectrum sensing
تجمیع حفظ حریم خصوصی برای سنجش طیف تعاونی-2019 Cognitive radio technology has been proposed as a promising way to alleviate spectrum scarcity. In cognitive
radio networks, cooperative spectrum sensing is an effective approach to improve spectrum-estimation accuracy.
In this approach, a fusion center (FC) outsources sensing tasks to secondary users (SUs), and aggregates sensing
reports provided by SUs to estimate spectrum availability. However, as sensing reports are highly correlated to
SUs’ real locations, revealing sensing reports to an untrusted FC may incur a serious privacy threat for SUs. In this
paper, we propose an efficient scheme that allows the FC to learn desired statistics from a group of SUs without
compromising individual privacy. Moreover, the FC is still able to compute the sum over the remaining SUs
when some SUs fail to submit their reports. Besides, to ensure secure communication in cooperative spectrum
sensing, the proposed scheme verifies the legitimacy of SUs by utilizing the elliptic curve cryptography technique.
The results of security analysis show that the proposed scheme achieves the combined objectives of privacy
preservation, authentication, fault tolerance, and resistance to various types of attacks. Performance evaluation
results demonstrate the feasibility and practicality of the proposed scheme. Keywords: Cognitive radio networks | Cooperative spectrum sensing | Privacy preservation | Authentication | Fault tolerance | Elliptic curve cryptography |
مقاله انگلیسی |
6 |
EMOTE – Multilayered encryption system for protecting medical images based on binary curve
EMOTE - سیستم رمزگذاری چند لایه برای محافظت از تصاویر پزشکی بر اساس منحنی باینری-2019 Digital images used in business, government and medical sectors insist the need for image security
against various threats. An exclusive system that can make use of color spaces has been proposed to process
sensitive images based on the binary curve. The proposed Encryption systeM fOr proTecting imagEs
has been coined as EMOTE. This multilayered system works on binary curves as binary operations have
no carries. Since binary squaring is lightweight, it is claimed to be smaller and faster in hardware than
prime-field ones. Logistic mapping has been done to perform chaotic masking, which is then followed
by DNA encoding in the next layer. ECC over GF(2m) that works on the spatial domain has been chosen
as it is one of the proven technique for its mathematical strength. This proposed system can facilitate
both symmetric and asymmetric combination and hence hybrid. Experimental results and the histogram
analysis obtained comprehend this proposed system for its extensive deployment to process sensitive
images, especially in the medical domain. Ideal measures attained for MSE, PSNR values for the standard
benchmark images taken from ‘‘The whole brain atlas” database from Harvard University, substantiate
the proposed EMOTE system as an expedient choice for processing sensitive images. Keywords: Elliptic curve cryptography | DNA encoding | Encryption | Decryption | Logistic Map |
مقاله انگلیسی |
7 |
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
رمزنگاری منحنی بیضوی مبتنی بر طرح احراز هویت متقابل برای ارتباطات شبکه هوشمند با استفاده از روش بیومتریک-2019 Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability
to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it
is accountable for providing power without any interruption. SG is one of the vital components to authorize
smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment
security and privacy are the major concern for communications. An authentication protocol
provides secure communication between users and service provider for security and privacy purpose.
Several authentication protocols are available in the literature. However, they are enabled to known security
attacks easily or they are not computationally efficient for SG communication. In the present paper,
we design an ECC-based mutual authentication protocol for smart grid communication using biometric
approach. The present framework satisfy various security features such as replay attack, user anonymity,
man in the middle attack, key freshness, message authentication, session key agreement, impersonation
attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication
and computation costs compared with other existing protocols in SG environment. Therefore,
our scheme is convenient for practical application in SG communication Keywords: Biometric | Elliptic curve cryptography | Fuzzy extractor | Mutual authentication | Smart grid security and privacy |
مقاله انگلیسی |
8 |
Parallelizing pairings on Hessian elliptic curves
موازی سازی جفتی بر روی منحنی بیضوی هسیان-2019 This paper considers the computation of the Ate pairing on the Hessian model
of elliptic curves. Due to the many important properties making the model attractive in
cryptography, we compute for the first time the Ate pairing on this model and show how
both the Tate and the Ate pairings can be parallelized on this curve. We wrote codes in the
Sage software to ensure the correctness of formulas in this work. Keywords: Hessian curves | Tate and ate pairings | Parallel computation |
مقاله انگلیسی |
9 |
An Efficient Identity-Based Signature Scheme without Bilinear Pairing for Vehicle-To-Vehicle Communication in VANETs
یک طرح امضایی مبتنی بر هویت کارآمد و بدون جفت دو طرفه برای ارتباط وسیله نقلیه به وسیله نقلیه در VANET-2019 Vehicles exchange traffic-related messages with neighboring vehicles to aid passengers
and provide efficient traffic management. This is done via wireless communication
channels in Vehicular Ad Hoc Networks (VANETs). Security and
privacy issues are a major concern in VANETs. A typical attack consists of a
malicious third party modifying and retransmitting intercepted messages. Current
state of the art solutions enable a verifier to authenticate the source of
received messages as well as to check their integrity before accepting them.
However, these solutions do not adequately address the efficiency with which
multiple messages are verified in VANETs deployed in high traffic density areas.
Due to this, the computational load on a verifier is increased. In this paper, an
efficient Identity-Based Signature with Conditional Privacy-Preserving Authentication
(IBS-CPPA) scheme based on the Elliptic Curve Cryptography (ECC)
and general one-way hash functions for V2V communication is proposed. This
scheme supports the batch signature verification method, which enables each
vehicle to authenticate a large number of messages at the same time. We provide
a security proof of the proposed IBS-CPPA scheme in the random oracle
model. The performance evaluation indicates that our scheme is more efficient
in terms of computational cost with respect to similar schemes. Keywords: Privacy-preservation | Identity-based cryptography | Bilinear pairing | Computational cost |
مقاله انگلیسی |
10 |
An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system
یک طبقه بندی کارآمد شبکه عصبی Elman با ساختار اینترنت اشیاء با پشتیبانی ابری برای سیستم نظارت بر سلامت-2019 To improve the strain on healthcare systems which happens through an aging population and a rise in chronic illness, Internet of Things (IoT) technology has attracted much attention in recent years. Cloud computing along with the IoT concept is a novel trend, for an efficient management and online process- ing of sensor data, and its major problem is the protection of privacy. Normally, the data is acquired from the users (i.e. patients) by the healthcare service provider and distributes them with authorized clinics or healthcare experts and these details were distributed to both pharmaceutical and life health insur- ance companies. Additionally the hackers have susceptible about the data of the patient, at the time of synchronization or cloud transfer is happening with the devices that are interconnected. An efficient El- man Neural Network (ENN) classifier based data protection is given in this work, which forms the cryp- tography and authentication. This suggested work has two varieties of process namely client side and cloud side. In client side, initially, the EEG signal is obtained from human and is processed with the help of the Hyper analytic Wavelet Transform (HWT) with Adaptive Noise Cancellation (ANC) method. Then, through the Elliptic Curve Cryptography (ECC) scheme, signal is safeguarded from forgery. The features were drawn-out from authenticated information in cloud side, and these details were divided as abnor- mal or not. The appropriateness of this work is validated by executing the technique called One Class Support Vector Machine (OCSVM) with IoT that drivens the ECG-dependent health monitoring system in the cloud on both experimental analysis and simulation. Keywords: IoT | Cloud computing | Elman neural network | Hyper analytic wavelet transform | Adaptive noise cancellation | Elliptic curve cryptography | SVM |
مقاله انگلیسی |