With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spe...With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum allocation,and due to the complexity of the network environment,the security of spectrum auctions can not be ignored.Most existing secure spectrum auction schemes introduce a semi-honest agent to complete spectrum auction.However,the hypothetical semi-honest model does not guarantee the security of spectnim auction in the actual application scenario,which may lead to potential security threats:the agent may reveal the privacy of bidders,agent or auctioneer may collude with the bidder to manipulate the spectrum auction,and so on.In this paper,a secure spectrum auction scheme without a trusted party is proposed based on the smart contract technology,and the smart contract written into the blockchain replaces the traditional semi-honest agent to cooperate with the auctioneer server to complete the auction.In order to ensure the security of our scheme,a secure spectrum auction protocol is designed,in which the Software Guard Extensions(SGX)technology and Paillier cryptosystem are used to protect the privacy of bidders.Public verification is provided in our protocol by using extensive Pedersen commitment,which prevents the auctioneer server and the bidder from colluding with each other and verifies group bid sum values.Finally,the security analysis is given to propose several types of attacks that can be defended.Besides,theoretical analysis and simulation experiments of our protocol are also provided.展开更多
In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this pape...In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection.For the spatial image,this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain.Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography,and use the minimum distortion coding to realize the embedding of the secret messages.Finally,according to the embedding modification amplitude of secret messages in the new embedded domain,the quantization index modulation algorithm is applied to realize the final embedding of secret messages in the original embedded domain.The experimental results show that the algorithm proposed is robust to the three common interpolation attacks including the nearest neighbor interpolation,the bilinear interpolation and the bicubic interpolation.And the average correct extraction rate of embedded messages increases from 50%to over 93% after 0.5 times-fold scaling attack using the bicubic interpolation method,compared with the classical steganography algorithm S-UNIWARD.Also the algorithm proposed has higher detection resistance than the original watermarking algorithm based on quantization index modulation.展开更多
With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of data....With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of data.Therefore,it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission.At present,blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability.Recently,Fan et al.proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme.We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes.To overcome these security flaws,this paper proposes an enhanced authentication and data transmission scheme,which is verified by formal security proofs and informal security analysis.Furthermore,Scyther is applied to prove the security of the proposed scheme.Moreover,it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.展开更多
Because of its closeness to users,fog computing responds faster than cloud computing.Thus,it has been deployed to various applications,such as healthcare system.Recently,to ensure the secure communication of the fog-b...Because of its closeness to users,fog computing responds faster than cloud computing.Thus,it has been deployed to various applications,such as healthcare system.Recently,to ensure the secure communication of the fog-based healthcare system,Jia et al.proposed an authenticated key agreement scheme.Moreover,in view of the high computation cost existing in Jia et al.’s scheme,Ma et al.presented an efficient one using elliptic curve cryptography.In this paper,we observe that both the two schemes may potentially risk ephemeral key compromise attacks and need improving.Therefore,to overcome this potential risk,we propose a new authenticated scheme based on Jia et al.’s scheme using elliptic curve computational Diffie-Hellman hypothesis and hash functions.Additionally,we provide provable security under the adopted adversarial model and ProVerif simulation,and also analyze the performance in terms of computation and communication costs by comparisons.The analysis results show that the improved scheme resists the common attacks,reduces computation overhead,and has a certain significance.展开更多
Compared with the traditional power grid,smart grid involves many advanced technologies and applications.However,due to the rapid development of various network technologies,smart grid is facing the challenges of bala...Compared with the traditional power grid,smart grid involves many advanced technologies and applications.However,due to the rapid development of various network technologies,smart grid is facing the challenges of balancing privacy,security,efficiency,and functionality.In the proposed scheme,we design a privacy protection scheme for outsourcing smart grid aided by fog computing,which supports fine-grained privacy-protected data aggregation based on user characteristics.The fog server matches the encrypted characteristics in the received message with the encrypted aggregation rules issued by the service provider.Therefore,the service provider can get more fine-grained analysis data based on user characteristics.Different from the existing outsourcing smart grid schemes,the proposed scheme can achieve real-time pricing on the premise of protecting user privacy and achieving system fault tolerance.Finally,experiment analyses demonstrate that the proposed scheme has less computation overhead and lower transmission delay than existing schemes.展开更多
Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.Howev...Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.However,with the speedy development of hardware,the existing security schemes can no longer meet the new requirements of anonymity and lightweight.New solutions that do not require complex calculations,such as certificateless cryptography,attract great attention from researchers.To resolve these difficulties,Wang et al.designed a new authentication architecture for the WBANs environment,which was claimed to be secure and efficient.However,in this paper,we will show that this scheme is prone to ephemeral key leakage attacks.Further,based on this authentication scheme,an anonymous certificateless scheme is proposed for lightweight devices.Meanwhile,user anonymity is fully protected.The proposed scheme is proved to be secure under a specific security model.In addition,we assess the security attributes our scheme meets through BAN logic and Scyther tool.The comparisons of time consumption and communication cost are given at the end of the paper,to demonstrate that our scheme performs prior to several previous schemes.展开更多
The rapid advancement in 5G networks calls for more key technologies to support.To promote its wide deployment and application,ultra-dense network(UDN)plays a significant part by providing high data rate and realizing...The rapid advancement in 5G networks calls for more key technologies to support.To promote its wide deployment and application,ultra-dense network(UDN)plays a significant part by providing high data rate and realizing seamless coverage and low delay.There have proposed many related works on 5G UDN,such as the literatures[1,2].However,UDN still faces some security challenges.For instance,it needs to guarantee the reliable and continuous connection and provide communication security.展开更多
基金This work was supported by the National Natural Science Foundation of China(Nos.61601107,U1708262 and 61872449)China Postdoctoral Science Foundation(No.2019M653568)The Fundamental Research Funds for the Central Universities(No.Nl 72304023).
文摘With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum allocation,and due to the complexity of the network environment,the security of spectrum auctions can not be ignored.Most existing secure spectrum auction schemes introduce a semi-honest agent to complete spectrum auction.However,the hypothetical semi-honest model does not guarantee the security of spectnim auction in the actual application scenario,which may lead to potential security threats:the agent may reveal the privacy of bidders,agent or auctioneer may collude with the bidder to manipulate the spectrum auction,and so on.In this paper,a secure spectrum auction scheme without a trusted party is proposed based on the smart contract technology,and the smart contract written into the blockchain replaces the traditional semi-honest agent to cooperate with the auctioneer server to complete the auction.In order to ensure the security of our scheme,a secure spectrum auction protocol is designed,in which the Software Guard Extensions(SGX)technology and Paillier cryptosystem are used to protect the privacy of bidders.Public verification is provided in our protocol by using extensive Pedersen commitment,which prevents the auctioneer server and the bidder from colluding with each other and verifies group bid sum values.Finally,the security analysis is given to propose several types of attacks that can be defended.Besides,theoretical analysis and simulation experiments of our protocol are also provided.
基金This work was supported by the National Natural Science Foundation of China(No.61379151,61401512,61572052,U1636219)the National Key Research and Development Program of China(No.2016YFB0801303,2016QY01W0105)the Key Technologies Research and Development Program of Henan Provinces(No.162102210032).
文摘In view of the fact that the current adaptive steganography algorithms are difficult to resist scaling attacks and that a method resisting scaling attack is only for the nearest neighbor interpolation method,this paper proposes an image steganography algorithm based on quantization index modulation resisting both scaling attacks and statistical detection.For the spatial image,this paper uses the watermarking algorithm based on quantization index modulation to extract the embedded domain.Then construct the embedding distortion function of the new embedded domain based on S-UNIWARD steganography,and use the minimum distortion coding to realize the embedding of the secret messages.Finally,according to the embedding modification amplitude of secret messages in the new embedded domain,the quantization index modulation algorithm is applied to realize the final embedding of secret messages in the original embedded domain.The experimental results show that the algorithm proposed is robust to the three common interpolation attacks including the nearest neighbor interpolation,the bilinear interpolation and the bicubic interpolation.And the average correct extraction rate of embedded messages increases from 50%to over 93% after 0.5 times-fold scaling attack using the bicubic interpolation method,compared with the classical steganography algorithm S-UNIWARD.Also the algorithm proposed has higher detection resistance than the original watermarking algorithm based on quantization index modulation.
基金supported by the National Natural Science Foundation of China(Grant Nos.61872449,U1804263,62172435,62172141,61772173)the Zhongyuan Science and Technology Innovation Leading Talent Project,China(No.214200510019)+2 种基金the Natural Science Foundation of Henan(No.222300420004)the Major Public Welfare Special Projects of Henan Province(No.201300210100)the Key Research and Development Project of Henan Province(No.221111321200).
文摘With the widespread use of network infrastructures such as 5G and low-power wide-area networks,a large number of the Internet of Things(IoT)device nodes are connected to the network,generating massive amounts of data.Therefore,it is a great challenge to achieve anonymous authentication of IoT nodes and secure data transmission.At present,blockchain technology is widely used in authentication and s data storage due to its decentralization and immutability.Recently,Fan et al.proposed a secure and efficient blockchain-based IoT authentication and data sharing scheme.We studied it as one of the state-of-the-art protocols and found that this scheme does not consider the resistance to ephemeral secret compromise attacks and the anonymity of IoT nodes.To overcome these security flaws,this paper proposes an enhanced authentication and data transmission scheme,which is verified by formal security proofs and informal security analysis.Furthermore,Scyther is applied to prove the security of the proposed scheme.Moreover,it is demonstrated that the proposed scheme achieves better performance in terms of communication and computational cost compared to other related schemes.
基金supported by the National Natural Science Foundation of China(Grant Nos.Ui708262,U1736203,61872449).
文摘Because of its closeness to users,fog computing responds faster than cloud computing.Thus,it has been deployed to various applications,such as healthcare system.Recently,to ensure the secure communication of the fog-based healthcare system,Jia et al.proposed an authenticated key agreement scheme.Moreover,in view of the high computation cost existing in Jia et al.’s scheme,Ma et al.presented an efficient one using elliptic curve cryptography.In this paper,we observe that both the two schemes may potentially risk ephemeral key compromise attacks and need improving.Therefore,to overcome this potential risk,we propose a new authenticated scheme based on Jia et al.’s scheme using elliptic curve computational Diffie-Hellman hypothesis and hash functions.Additionally,we provide provable security under the adopted adversarial model and ProVerif simulation,and also analyze the performance in terms of computation and communication costs by comparisons.The analysis results show that the improved scheme resists the common attacks,reduces computation overhead,and has a certain significance.
基金This work was supported in part by the National Natural Science Foundation of China(Grant Nos.62125205,62072361 and 61872449)。
文摘Compared with the traditional power grid,smart grid involves many advanced technologies and applications.However,due to the rapid development of various network technologies,smart grid is facing the challenges of balancing privacy,security,efficiency,and functionality.In the proposed scheme,we design a privacy protection scheme for outsourcing smart grid aided by fog computing,which supports fine-grained privacy-protected data aggregation based on user characteristics.The fog server matches the encrypted characteristics in the received message with the encrypted aggregation rules issued by the service provider.Therefore,the service provider can get more fine-grained analysis data based on user characteristics.Different from the existing outsourcing smart grid schemes,the proposed scheme can achieve real-time pricing on the premise of protecting user privacy and achieving system fault tolerance.Finally,experiment analyses demonstrate that the proposed scheme has less computation overhead and lower transmission delay than existing schemes.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos.61872449,62172433,62072093,62125205)the Science Foundation for the Excellent Youth Scholars of Henan Province(No.222300420099).
文摘Wireless body area networks(WBANs)guarantee timely data processing and secure information preservation within the range of the wireless access network,which is in urgent need of a new type of security technology.However,with the speedy development of hardware,the existing security schemes can no longer meet the new requirements of anonymity and lightweight.New solutions that do not require complex calculations,such as certificateless cryptography,attract great attention from researchers.To resolve these difficulties,Wang et al.designed a new authentication architecture for the WBANs environment,which was claimed to be secure and efficient.However,in this paper,we will show that this scheme is prone to ephemeral key leakage attacks.Further,based on this authentication scheme,an anonymous certificateless scheme is proposed for lightweight devices.Meanwhile,user anonymity is fully protected.The proposed scheme is proved to be secure under a specific security model.In addition,we assess the security attributes our scheme meets through BAN logic and Scyther tool.The comparisons of time consumption and communication cost are given at the end of the paper,to demonstrate that our scheme performs prior to several previous schemes.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos.U1708262,U1736203,61872449)the Scientific and Technological Project of Henan Province(182102210588).
文摘The rapid advancement in 5G networks calls for more key technologies to support.To promote its wide deployment and application,ultra-dense network(UDN)plays a significant part by providing high data rate and realizing seamless coverage and low delay.There have proposed many related works on 5G UDN,such as the literatures[1,2].However,UDN still faces some security challenges.For instance,it needs to guarantee the reliable and continuous connection and provide communication security.