This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid me...This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical.展开更多
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a...Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.展开更多
具有隐私保护能力的范围查询处理方法是当前无线传感器网络(wireless sensor networks,WSNs)数据管理应用技术中具有挑战性的研究内容.针对2层传感器网络环境,提出了一种能量高效的隐私保护范围查询处理方法(energy-efficient and priva...具有隐私保护能力的范围查询处理方法是当前无线传感器网络(wireless sensor networks,WSNs)数据管理应用技术中具有挑战性的研究内容.针对2层传感器网络环境,提出了一种能量高效的隐私保护范围查询处理方法(energy-efficient and privacy-preserving range query,EPRQ).在数据存储阶段,感知节点对其采集的数据进行加密处理,并利用0-1编码和Hash消息身份认证编码机制计算各采集数据的最小化比较因子,然后将密文和编码数据上传至存储节点.在查询处理阶段,基站计算用户查询的目标范围区间的比较因子,并作为查询指令发送给存储节点;再由存储节点利用0-1编码验证机制的数值比较特性,实现无需明文数值参与下的数据大小比较,进而确定查询结果密文数据集,并返回基站;基站解密密文数据,获得最终的查询结果.理论分析和实验结果表明,该方法能够实现对感知数据、查询结果和目标范围区间的隐私保护,且与现有方法相比具有更高的能耗效率.展开更多
基金supported by the National Natural Science Foundation of China (Grant Nos 60873191 and 60821001)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No 200800131016)+5 种基金Beijing Nova Program (Grant No2008B51)Key Project of the Chinese Ministry of Education (Grant No 109014)the Natural Science Foundation of Beijing (Grant No 4072020)the National Laboratory for Modern Communications Science Foundation of China (Grant No 9140C1101010601)the Natural Science Foundation of Education Bureau of Henan Province (Grant No 2008B120005)the Youth Foundation of Luoyang Normal University
文摘This paper proposes a scheme for secure authentication of classical messages with single photons and a hashed function. The security analysis of this scheme is also given, which shows that anyone cannot forge valid message authentication codes (MACs). In addition, the lengths of the authentication key and the MACs are invariable and shorter, in comparison with those presented authentication schemes. Moreover, quantum data storage and entanglement are not required in this scheme. Therefore, this scheme is more efficient and economical.
文摘Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high.
文摘具有隐私保护能力的范围查询处理方法是当前无线传感器网络(wireless sensor networks,WSNs)数据管理应用技术中具有挑战性的研究内容.针对2层传感器网络环境,提出了一种能量高效的隐私保护范围查询处理方法(energy-efficient and privacy-preserving range query,EPRQ).在数据存储阶段,感知节点对其采集的数据进行加密处理,并利用0-1编码和Hash消息身份认证编码机制计算各采集数据的最小化比较因子,然后将密文和编码数据上传至存储节点.在查询处理阶段,基站计算用户查询的目标范围区间的比较因子,并作为查询指令发送给存储节点;再由存储节点利用0-1编码验证机制的数值比较特性,实现无需明文数值参与下的数据大小比较,进而确定查询结果密文数据集,并返回基站;基站解密密文数据,获得最终的查询结果.理论分析和实验结果表明,该方法能够实现对感知数据、查询结果和目标范围区间的隐私保护,且与现有方法相比具有更高的能耗效率.