This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It i...This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements.展开更多
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system...As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk.展开更多
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm...The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed.展开更多
Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMN...Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMNs subjected to their fixed substrate security framework. A fundamental diversifying attribute for the customized security experiences of CMNs is pressing. This paper proposes a programmable network structure which is named Service Processing Chain(SPC) based on network function combination. The SPC is established by the ordinal combination of network functions in substrate switches dynamically, and therefore constructs a special channel for each CMN with required security. The construction and reconfiguration algorithms of SPC are also discussed in this paper. Evaluations and implementation show that above approaches are effective in providing multilevel security with flexibility and expansibility. It is believed that the SPC could provide customized security service and drive participative real-time multimedia sharing for CMNs.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa...As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.展开更多
In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the un...In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the unbalanced DFF to reduce the bias in response output and enhances the security of PUF by adopting two balanced DFFs in series. The experimental results show that two cascaded balanced DFFs improve the stability of the DFF, and the output of two balanced DFFs is more reliable. The entropy of output is fixed at 98.7%.展开更多
Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pat...Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pattern analyzing of conditions,resulting in higher false positive rate or false negative rate,which increased manual confirmation workload.In this paper,we propose a security sensitive function mining approach based on preconditon pattern analyzing.Firstly,we propose an enhanced system dependency graph analysis algorithm for precisely extracting the conditional statements which check the function parameters and conducting statistical analysis of the conditional statements for selecting candidate security sensitive functions of the target program.Then we adopt a precondition pattern mining method based on conditional statements nomalizing and clustering.Functions with fixed precondition patterns are regarded as security-sensitive functions.The experimental results on four popular open source codebases of different scales show that the approach proposed is effective in reducing the false positive rate and false negative rate for detecting security sensitive functions.展开更多
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a...Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.展开更多
Industry 5.0 blows the whistle on a new industrial revolution,aiming to refocus industrial development by reintegrating the human factor into the technological equation.On the eve of the revolution,the comprehensive s...Industry 5.0 blows the whistle on a new industrial revolution,aiming to refocus industrial development by reintegrating the human factor into the technological equation.On the eve of the revolution,the comprehensive surveys for Industry 5.0 would provide important support for future development.However,current surveys for Industry 5.0 are still in their infancy and some gaps remain.(ⅰ)Current work lacks a comprehensive technical architecture for Industry 5.0 and an in-depth analysis of the enabling technologies that will drive Industry 5.0;(ⅱ)There is no comprehensive survey on security issues of Industry 5.0,which will directly hinder its development;(ⅲ)As Industry 5.0 introduces people into the technological equation,then it will also further consider the broader human interests in its security equation.It is an open issue that traditional security classifications cannot summarize these new security threats in Industry 5.0.Therefore,this survey starts by reviewing the latest key enabling technologies and proposing an overall technology hierarchical structure for Industry 5.0.Second,we investigate the triad of security issues in Industry 5.0,which includes threats and countermeasures for functional safety,information security,and humanized security.Among them,we define the third security issue in Industry 5.0,humanized security,which includes safeguarding the broader interests and rights of individuals,machines,and society.Finally,we summarize future challenges and research trends.To the best of our knowledge,this is the first comprehensive overview of security in Industry 5.0,in which humanized security is defined for the first time.展开更多
Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potent...Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potential unconditional security,quantum blind signature(QBS)is more advantageous than the classical ones.In this paper,an efficient and practical quantum blind signature scheme relaxed security model is presented,where quantum superposition,decoy qubits and hash function are used for the purpose of blindness.Compared with previous QBS scheme,the presented scheme is more efficient and practical with a relaxed security model,in which the signer’s dishonest behavior can be detected other than being prevented as in other QBS schemes.展开更多
Security service function chaining(SFC)based on software-defined networking(SDN)and network function virtualization(NFV)technology allows traffic to be forwarded sequentially among different security service functions...Security service function chaining(SFC)based on software-defined networking(SDN)and network function virtualization(NFV)technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions.Security SFC can be deployed according to requirements,but the current SFC is not flexible enough and lacks an effective feedback mechanism.The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid.How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic has become an important issue.Our contribution is threefold.First,we propose a secure SFC path selection framework.The framework can accept the feedback results of traffic and security service functions in SFC,and dynamically select the opti-mal path for SFC based on the feedback results.It also realizes the automatic deployment of paths,forming a complete closed loop.Second,we expand the protocol of SFC to realize the security SFC with branching path,which improve flexibility of security SFC.Third,we propose a deep reinforcement learning-based dynamic path selection method for security SFC.It infers the optimal branching path by analyzing feedback from the security SFC.We have experimented with Distributed Denial of Service(DDoS)attack detection modules as security service functions.Experimental results show that our proposed method can dynamically select the optimal branching path for a security SFC based on traffic features and the state of the SFC.And it improves the accuracy of the overall malicious traffic detection of the security SFC and significantly reduces the latency and overall load of the SFC.展开更多
The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. ...The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. In addition, the primary factor of mature securities market is perfect and integrated function of the securities market. Afterwards, the article analyses the static and dynamic function of the securities market. At last, it probes into the government role in the securities market briefly and proposes that China needs to carry out the essential change on government role, market function location, development goal and the mode of securities market if the function of China's securities market is to be exerted properly.展开更多
The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="fon...The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.展开更多
Worldwide biodiversity is being threatened by human activities to a greater level wherein the natural ecosystems are reaching the verge of collapsing. We are faced with four major interrelated challenges namely a chan...Worldwide biodiversity is being threatened by human activities to a greater level wherein the natural ecosystems are reaching the verge of collapsing. We are faced with four major interrelated challenges namely a changing climate, biodiversity loss, human population growth and food production for this growing population. Agricultural intensification contributes significantly to biodiversity loss. The agricultural model for our current food production systems is mainly based on the Green Revolution, which promoted the cultivation of crops in extensive monoculture fields and intensified external inputs of agrochemicals. This model resulted in biodiversity loss, particularly in insect populations. A model based on ecological intensification as an alternative to agricultural intensification with minimized use of agro-inputs may slow the rate of biodiversity loss resulting in more sustainable agricultural ecosystems.展开更多
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.展开更多
文摘This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2025R343),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabiathe Deanship of Scientific Research at Northern Border University,Arar,Saudi Arabia for funding this research work through the project number NBU-FFR-2025-1092-10.
文摘As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk.
基金National Natural Science Foundation of China(No.61941114 and No.61521003)Key Universities and Academic Disciplines Contruction Project。
文摘The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed.
基金supported by The National Basic Research Program of China (973) (Grant No. 2012CB315901, 2013CB329104)The National Natural Science Foundation of China (Grant No. 61521003, 61372121, 61309019, 61572519, 61502530)The National High Technology Research and Development Program of China (863) (Grant No. 2015AA016102)
文摘Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMNs subjected to their fixed substrate security framework. A fundamental diversifying attribute for the customized security experiences of CMNs is pressing. This paper proposes a programmable network structure which is named Service Processing Chain(SPC) based on network function combination. The SPC is established by the ordinal combination of network functions in substrate switches dynamically, and therefore constructs a special channel for each CMN with required security. The construction and reconfiguration algorithms of SPC are also discussed in this paper. Evaluations and implementation show that above approaches are effective in providing multilevel security with flexibility and expansibility. It is believed that the SPC could provide customized security service and drive participative real-time multimedia sharing for CMNs.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
文摘As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security.
基金Supported by the National Natural Science Foundation of China(41371402)the Fundamental Research Funds for the Central Universities(2015211020201)
文摘In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the unbalanced DFF to reduce the bias in response output and enhances the security of PUF by adopting two balanced DFFs in series. The experimental results show that two cascaded balanced DFFs improve the stability of the DFF, and the output of two balanced DFFs is more reliable. The entropy of output is fixed at 98.7%.
基金This work was supported by the National Key R&D Program of China(Grant No.2016QY07X1404)the Zhejiang Provincial Natural Science Foundation of China(Grant No.LY19E050012)the Humanities and Social Sciences project of the Ministry of Education of China(Grant No.19YJCZH005).
文摘Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pattern analyzing of conditions,resulting in higher false positive rate or false negative rate,which increased manual confirmation workload.In this paper,we propose a security sensitive function mining approach based on preconditon pattern analyzing.Firstly,we propose an enhanced system dependency graph analysis algorithm for precisely extracting the conditional statements which check the function parameters and conducting statistical analysis of the conditional statements for selecting candidate security sensitive functions of the target program.Then we adopt a precondition pattern mining method based on conditional statements nomalizing and clustering.Functions with fixed precondition patterns are regarded as security-sensitive functions.The experimental results on four popular open source codebases of different scales show that the approach proposed is effective in reducing the false positive rate and false negative rate for detecting security sensitive functions.
基金The National Natural Science Foundation of China(No.71371050)
文摘Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable.
基金supported in part by the JSPS KAKENHI under Grants 23K11072in part by the China Scholarship Council under Grants 202308050055
文摘Industry 5.0 blows the whistle on a new industrial revolution,aiming to refocus industrial development by reintegrating the human factor into the technological equation.On the eve of the revolution,the comprehensive surveys for Industry 5.0 would provide important support for future development.However,current surveys for Industry 5.0 are still in their infancy and some gaps remain.(ⅰ)Current work lacks a comprehensive technical architecture for Industry 5.0 and an in-depth analysis of the enabling technologies that will drive Industry 5.0;(ⅱ)There is no comprehensive survey on security issues of Industry 5.0,which will directly hinder its development;(ⅲ)As Industry 5.0 introduces people into the technological equation,then it will also further consider the broader human interests in its security equation.It is an open issue that traditional security classifications cannot summarize these new security threats in Industry 5.0.Therefore,this survey starts by reviewing the latest key enabling technologies and proposing an overall technology hierarchical structure for Industry 5.0.Second,we investigate the triad of security issues in Industry 5.0,which includes threats and countermeasures for functional safety,information security,and humanized security.Among them,we define the third security issue in Industry 5.0,humanized security,which includes safeguarding the broader interests and rights of individuals,machines,and society.Finally,we summarize future challenges and research trends.To the best of our knowledge,this is the first comprehensive overview of security in Industry 5.0,in which humanized security is defined for the first time.
基金support by National Natural Science Foundation of China(61202354,51507084)Nanjing University of Post and Telecommunications Science Foundation(NUPTSF)(NT214203)
基金This work was supported by 2018 Provincial Key Research and Development Program(Social Development)Project of Jiangsu Province(No.BF2018719)2018 Provincial Key Research and Development Program(Modern Agriculture)Project of Jiangsu Province(No.2018301).
文摘Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potential unconditional security,quantum blind signature(QBS)is more advantageous than the classical ones.In this paper,an efficient and practical quantum blind signature scheme relaxed security model is presented,where quantum superposition,decoy qubits and hash function are used for the purpose of blindness.Compared with previous QBS scheme,the presented scheme is more efficient and practical with a relaxed security model,in which the signer’s dishonest behavior can be detected other than being prevented as in other QBS schemes.
基金Acknowledgments: This work is supported by the State Key Laboratory of Software Engineering and the Natural Science Foundation of Guizhou and the Science Foundation of Guizhou Province(No. 20043029).
基金supported by NSFC under Grant No.62341102National Key R&D Program of China under Grant No.2018YFA0701604。
文摘Security service function chaining(SFC)based on software-defined networking(SDN)and network function virtualization(NFV)technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions.Security SFC can be deployed according to requirements,but the current SFC is not flexible enough and lacks an effective feedback mechanism.The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid.How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic has become an important issue.Our contribution is threefold.First,we propose a secure SFC path selection framework.The framework can accept the feedback results of traffic and security service functions in SFC,and dynamically select the opti-mal path for SFC based on the feedback results.It also realizes the automatic deployment of paths,forming a complete closed loop.Second,we expand the protocol of SFC to realize the security SFC with branching path,which improve flexibility of security SFC.Third,we propose a deep reinforcement learning-based dynamic path selection method for security SFC.It infers the optimal branching path by analyzing feedback from the security SFC.We have experimented with Distributed Denial of Service(DDoS)attack detection modules as security service functions.Experimental results show that our proposed method can dynamically select the optimal branching path for a security SFC based on traffic features and the state of the SFC.And it improves the accuracy of the overall malicious traffic detection of the security SFC and significantly reduces the latency and overall load of the SFC.
文摘The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. In addition, the primary factor of mature securities market is perfect and integrated function of the securities market. Afterwards, the article analyses the static and dynamic function of the securities market. At last, it probes into the government role in the securities market briefly and proposes that China needs to carry out the essential change on government role, market function location, development goal and the mode of securities market if the function of China's securities market is to be exerted properly.
文摘The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems.
文摘Worldwide biodiversity is being threatened by human activities to a greater level wherein the natural ecosystems are reaching the verge of collapsing. We are faced with four major interrelated challenges namely a changing climate, biodiversity loss, human population growth and food production for this growing population. Agricultural intensification contributes significantly to biodiversity loss. The agricultural model for our current food production systems is mainly based on the Green Revolution, which promoted the cultivation of crops in extensive monoculture fields and intensified external inputs of agrochemicals. This model resulted in biodiversity loss, particularly in insect populations. A model based on ecological intensification as an alternative to agricultural intensification with minimized use of agro-inputs may slow the rate of biodiversity loss resulting in more sustainable agricultural ecosystems.
基金supported in part by the national natural science foundation of China (NSFC) under Grant61871193in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001in part by the Guangzhou Key Field R&D Program under Grant 202206030005
文摘Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.