با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
پروتکل احراز هویت متقابل منحنی بیضوی امن برای TMIS با کمک ابر-2019 With the fast progress of network communication, its technologies and the developing popularity
of telecare medical information system (TMIS), doctors provide treatment to patients via Internet
without visiting hospitals. By using mobile device, wireless body area network and cloud based
architecture, the patients can gather their physiological information and upload to cloud via their
mobile devices. The authenticated doctor provides online treatment to patient at anytime and
anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication
and authenticated to all the participants before assessing this system. Recently Li
et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS.
They believed that their scheme secure against all well-known privacy and security attributes. In
the proposed work, we reviewed Li et al. authentication protocol and found that it has various
security flaws like as message authentication fails in healthcare center upload phase, session key
is not possible in healthcare center upload phase, impersonation attack in patient data upload
phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in
similar environment. The proposed protocol secure against man-in-the-middle attack, patient
anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation,
message authentication, impersonation attack, session key security and patient unlinkability.
We compared the proposed protocol with existing related protocols in same cloud based
TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the
efficiency in terms of computation and communication costs for cloud-assisted TMIS. Keywords: Cloud computing | Elliptic curve cryptography | TMIS | Medical data | Mutual authentication |
مقاله انگلیسی |
2 |
Privacy-preserving aggregation for cooperative spectrum sensing
تجمیع حفظ حریم خصوصی برای سنجش طیف تعاونی-2019 Cognitive radio technology has been proposed as a promising way to alleviate spectrum scarcity. In cognitive
radio networks, cooperative spectrum sensing is an effective approach to improve spectrum-estimation accuracy.
In this approach, a fusion center (FC) outsources sensing tasks to secondary users (SUs), and aggregates sensing
reports provided by SUs to estimate spectrum availability. However, as sensing reports are highly correlated to
SUs’ real locations, revealing sensing reports to an untrusted FC may incur a serious privacy threat for SUs. In this
paper, we propose an efficient scheme that allows the FC to learn desired statistics from a group of SUs without
compromising individual privacy. Moreover, the FC is still able to compute the sum over the remaining SUs
when some SUs fail to submit their reports. Besides, to ensure secure communication in cooperative spectrum
sensing, the proposed scheme verifies the legitimacy of SUs by utilizing the elliptic curve cryptography technique.
The results of security analysis show that the proposed scheme achieves the combined objectives of privacy
preservation, authentication, fault tolerance, and resistance to various types of attacks. Performance evaluation
results demonstrate the feasibility and practicality of the proposed scheme. Keywords: Cognitive radio networks | Cooperative spectrum sensing | Privacy preservation | Authentication | Fault tolerance | Elliptic curve cryptography |
مقاله انگلیسی |
3 |
EMOTE – Multilayered encryption system for protecting medical images based on binary curve
EMOTE - سیستم رمزگذاری چند لایه برای محافظت از تصاویر پزشکی بر اساس منحنی باینری-2019 Digital images used in business, government and medical sectors insist the need for image security
against various threats. An exclusive system that can make use of color spaces has been proposed to process
sensitive images based on the binary curve. The proposed Encryption systeM fOr proTecting imagEs
has been coined as EMOTE. This multilayered system works on binary curves as binary operations have
no carries. Since binary squaring is lightweight, it is claimed to be smaller and faster in hardware than
prime-field ones. Logistic mapping has been done to perform chaotic masking, which is then followed
by DNA encoding in the next layer. ECC over GF(2m) that works on the spatial domain has been chosen
as it is one of the proven technique for its mathematical strength. This proposed system can facilitate
both symmetric and asymmetric combination and hence hybrid. Experimental results and the histogram
analysis obtained comprehend this proposed system for its extensive deployment to process sensitive
images, especially in the medical domain. Ideal measures attained for MSE, PSNR values for the standard
benchmark images taken from ‘‘The whole brain atlas” database from Harvard University, substantiate
the proposed EMOTE system as an expedient choice for processing sensitive images. Keywords: Elliptic curve cryptography | DNA encoding | Encryption | Decryption | Logistic Map |
مقاله انگلیسی |
4 |
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
رمزنگاری منحنی بیضوی مبتنی بر طرح احراز هویت متقابل برای ارتباطات شبکه هوشمند با استفاده از روش بیومتریک-2019 Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability
to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it
is accountable for providing power without any interruption. SG is one of the vital components to authorize
smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment
security and privacy are the major concern for communications. An authentication protocol
provides secure communication between users and service provider for security and privacy purpose.
Several authentication protocols are available in the literature. However, they are enabled to known security
attacks easily or they are not computationally efficient for SG communication. In the present paper,
we design an ECC-based mutual authentication protocol for smart grid communication using biometric
approach. The present framework satisfy various security features such as replay attack, user anonymity,
man in the middle attack, key freshness, message authentication, session key agreement, impersonation
attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication
and computation costs compared with other existing protocols in SG environment. Therefore,
our scheme is convenient for practical application in SG communication Keywords: Biometric | Elliptic curve cryptography | Fuzzy extractor | Mutual authentication | Smart grid security and privacy |
مقاله انگلیسی |
5 |
An efficient Elman neural network classifier with cloud supported internet of things structure for health monitoring system
یک طبقه بندی کارآمد شبکه عصبی Elman با ساختار اینترنت اشیاء با پشتیبانی ابری برای سیستم نظارت بر سلامت-2019 To improve the strain on healthcare systems which happens through an aging population and a rise in chronic illness, Internet of Things (IoT) technology has attracted much attention in recent years. Cloud computing along with the IoT concept is a novel trend, for an efficient management and online process- ing of sensor data, and its major problem is the protection of privacy. Normally, the data is acquired from the users (i.e. patients) by the healthcare service provider and distributes them with authorized clinics or healthcare experts and these details were distributed to both pharmaceutical and life health insur- ance companies. Additionally the hackers have susceptible about the data of the patient, at the time of synchronization or cloud transfer is happening with the devices that are interconnected. An efficient El- man Neural Network (ENN) classifier based data protection is given in this work, which forms the cryp- tography and authentication. This suggested work has two varieties of process namely client side and cloud side. In client side, initially, the EEG signal is obtained from human and is processed with the help of the Hyper analytic Wavelet Transform (HWT) with Adaptive Noise Cancellation (ANC) method. Then, through the Elliptic Curve Cryptography (ECC) scheme, signal is safeguarded from forgery. The features were drawn-out from authenticated information in cloud side, and these details were divided as abnor- mal or not. The appropriateness of this work is validated by executing the technique called One Class Support Vector Machine (OCSVM) with IoT that drivens the ECG-dependent health monitoring system in the cloud on both experimental analysis and simulation. Keywords: IoT | Cloud computing | Elman neural network | Hyper analytic wavelet transform | Adaptive noise cancellation | Elliptic curve cryptography | SVM |
مقاله انگلیسی |
6 |
An area-efficient bit-serial sequential polynomial basis finite field GF(2m) multiplier
An area-efficient bit-serial sequential polynomial basis finite field GF(2m) multiplier-2019 Many cryptographic and error control coding algorithms rely on finite field arithmetic. Hardware
implementation of these algorithms requires an efficient realization of finite field GF(2m) arithmetic
operations. Finite field multiplication is complex among the basic arithmetic operations, and it is
employed in field exponentiation and inversion operations. Various algorithms and architectures are
proposed in the literature for hardware implementation of finite field multiplication to achieve a
reduction in area and delay. In this paper, a modified interleaved modular reduction multiplication
algorithm and its bit-serial sequential architecture are proposed. It is observed from the comparison of
analytical results that the proposed architecture achieves the reduction in area and area-delay product
compared to the existing multipliers. The proposed multiplier achieves an improvement of 39% in area
and 17% in area-delay product estimations for field order of 409 when compared with the best sequential
multiplier available in the literature. Application specific integrated circuit (ASIC) implementation of the
proposed multiplier together with the two most comparable multipliers confirms that the proposed
multiplier outperforms in terms of area and area-delay product. The proposed multiplier is suitable for
implementation of security in Internet of Things (IoT) gateways and edge-devices. Keywords: Finite field arithmetic | Polynomial basis | Bit-serial multiplier | Elliptic curve cryptography | Internet of Things (IoT) |
مقاله انگلیسی |
7 |
An efficient privacy-preserving protocol for database-driven cognitive radio networks
یک پروتکل موثر برای حفظ حریم خصوصی برای شبکه های رادیویی شناختی محور از پایگاه داده-2019 Cognitive radio is regarded as a promising technology for remedying spectrum shortage and improving spectrum utilization. However, database-driven cognitive radio networks (CRNs) are vulnerable to a series of security attacks and privacy threats, especially the privacy breach of secondary users (SUs). In this paper, we propose an efficient privacy-preserving protocol to protect the identity and trajectory privacy of each SU and to prevent the database (DB) from tracing any SU. Besides, this paper also aims at improving the efficiency of authentication and channel allocation to offer the best connectivity to SUs wherever they are and at any time. Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which enhances the security of CRNs communication. Based on channel pre-allocation to BSs, our protocol reduces the latency of obtaining available channels for SUs. Moreover, our protocol exploits reputation to motivate SUs to be honest and thus increases the utilization of the limited spectrum resources. The results of security analysis show that our protocol provides strong privacy preservation for SUs that the DB cannot get the entire trajectory of any SU, even the DB colludes with all BSs. Furthermore, the results also show that the proposed protocol can resist various types of attacks. The results of performance evaluation indicate the efficiency of the proposed privacy-preserving protocol. Keywords: Cognitive radio networks | Privacy-preserving | Authentication | Elliptic curve cryptography | Reputation |
مقاله انگلیسی |
8 |
Enhanced authentication and key management scheme for securing data transmission in the internet of things
تصدیق پیشرفته و برنامه مدیریت کلیدی برای اطمینان از انتقال داده ها در اینترنت اشیا-2019 The Internet of Things (IoT), with its smartness and intelligence, is gradually changing human life by al- lowing everyday objects to be connected to the Internet. With the prevalence of the IoT, wireless sensor networks (WSNs) are attracting worldwide attention, because they cover a wide range of IoT applica- tions. The sensors collect data from the physical world and communicate with each other through wire- less links. Ensuring the security and privacy of WSNs’ communication is challenging. Recently, a secure authentication and key management scheme was proposed to secure data transmission in WSNs. In this paper, we show that this scheme has various security flaws, such as replay attack, denial of service attack, impersonation attack, and lack of mutual authentication and session key agreement. Then, we propose an enhanced scheme to overcome the identified security weaknesses. The security of the enhanced scheme is formally verified using the Burrows–Abadi–Needham logic and the Automated Validation of Internet Security Protocols and Applications tool. Our proposed scheme is more secure, efficient, and suitable for WSN-based IoT applications than recent related methods. Keywords: Privacy | Mutual authentication | Key agreement | Elliptic curve cryptography | BAN logic | AVISPA |
مقاله انگلیسی |
9 |
Identity-based proxy-oriented outsourcing with public auditing in cloud-based medical cyber–physical systems
برون سپاری مبتنی بر پروکسی مبتنی بر هویت با ممیزی عمومی در سیستم های سایبر فیزیکی پزشکی مبتنی بر ابر-2019 Cloud-based medical cyber–physical system (MCPS) relies on cloud computing to provide
powerful data storage and computing services. Based on the vital outsourced medical
data, doctors can perform precise medical diagnosis for patients, thus the integrity
verification of medical data has become increasingly important. In this paper, we propose
an identity-based proxy-oriented outsourcing with public auditing scheme in cloudbased
MCPS using elliptic curve cryptography. Our scheme enables a patient to authorize
the proxy to generate and upload the signatures of medical data and corresponding
encrypted medical data to cloud-based MCPS. Any third party auditor (TPA) can audit
the medical data efficiently, without retrieving the entire medical data set. We provide
the security proof of the proposed scheme, including the storage correctness guarantee
and proxy-oriented privacy-preserving property. Moreover, our scheme is designed
on identity-based systems, which can avoid complex certificates management. The
efficiency comparison shows that our scheme is much more light-weight, and more
suitable in cloud-based MCPS. Keywords: Cloud computing | Identity-based proxy-oriented outsourcing | Medical cyber–physical system | Elliptic curve cryptography | Public auditing |
مقاله انگلیسی |
10 |
An efficient CPPA scheme for intelligent transportation networks
یک طرح کارآمد CPPA برای شبکه های حمل و نقل هوشمند-2019 To defend intelligent transportation networks’ security and privacy, existing standards
employ the Public Key Infrastructure (PKI) authentication framework. However, the high
associated PKI computation and communication overheads break ground for utilizing
an alternative candidate, the Identity-based Cryptographic (IBC) authentication. Most of
the underlined calculations of the IBC approaches rely on the elliptic curves’ pairing
operation. Since the pairing function is a complex and computation intensive operation,
several studies have developed pairingless IBC authentications and applied the hardware
security of tamper-proof devices to secure the cryptographic parameters at user-end.
Motivated by this trend, we compose a Pairingless Modified Efficient Conditional Privacy-
Preserving Authentication Scheme (PME-CPPAS). Our scheme omits the utilization of
the complex pairing operation as well as the demand for expensive tamper-proof
devices. When analyzing the performance of the presented design, its effectiveness, in
comparison to the available pairing-based and pairingless approaches, is proved in terms
of computation complexity, communication overhead, and storage overhead. PME-CPPAS
achieves less signing computational cost and comparable verification computational
performance. Keywords: Intelligent transportation/vehicular | networks | Authentication | Conditional privacy | Elliptic curve cryptography | Identity-based signature | Bilinear pairings | Tamper-proof device |
مقاله انگلیسی |