期刊文献+
共找到19,530篇文章
< 1 2 250 >
每页显示 20 50 100
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
1
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-SERVER HETEROGENEOUS SECURITY
在线阅读 下载PDF
Design of Navigation Message Authentication for BDSBAS System
2
作者 Chen Xiao Tian Xiang +2 位作者 Luo Ruidan Liu Ting Wu Haitao 《China Communications》 2026年第1期189-203,共15页
The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a ri... The satellite-based augmentation system(SBAS)provides differential and integrity augmentation services for life safety fields of aviation and navigation.However,the signal structure of SBAS is public,which incurs a risk of spoofing attacks.To improve the anti-spoofing capability of the SBAS,European Union and the United States conduct research on navigation message authentication,and promote the standardization of SBAS message authentication.For the development of Beidou satellite-based augmentation system(BDSBAS),this paper proposes navigation message authentication based on the Chinese commercial cryptographic standards.Firstly,this paper expounds the architecture and principles of the SBAS message authentication,and then carries out the design of timed efficient streaming losstolerant authentication scheme(TESLA)and elliptic curve digital signature algorithm(ECDSA)authentication schemes based on Chinese commercial cryptographic standards,message arrangement and the design of over-the-air rekeying(OTAR)message.Finally,this paper conducts a theoretical analysis of the time between authentications(TBA)and maximum authentication latency(MAL)for L5 TESLA-I and L5 ECDSA-Q,and further simulates the reception time of OTAR message,TBA and MAL from the aspects of OTAR message weight and demodulation error rate.The simulation results can provide theoretical supports for the standardization of BDSBAS message authentication. 展开更多
关键词 Beidou satellite-based augmentation system ECDSA message authentication satellite navigation TESLA
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
3
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 authentication key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
Two-Dimensional MXene-Based Advanced Sensors for Neuromorphic Computing Intelligent Application
4
作者 Lin Lu Bo Sun +2 位作者 Zheng Wang Jialin Meng Tianyu Wang 《Nano-Micro Letters》 2026年第2期664-691,共28页
As emerging two-dimensional(2D)materials,carbides and nitrides(MXenes)could be solid solutions or organized structures made up of multi-atomic layers.With remarkable and adjustable electrical,optical,mechanical,and el... As emerging two-dimensional(2D)materials,carbides and nitrides(MXenes)could be solid solutions or organized structures made up of multi-atomic layers.With remarkable and adjustable electrical,optical,mechanical,and electrochemical characteristics,MXenes have shown great potential in brain-inspired neuromorphic computing electronics,including neuromorphic gas sensors,pressure sensors and photodetectors.This paper provides a forward-looking review of the research progress regarding MXenes in the neuromorphic sensing domain and discussed the critical challenges that need to be resolved.Key bottlenecks such as insufficient long-term stability under environmental exposure,high costs,scalability limitations in large-scale production,and mechanical mismatch in wearable integration hinder their practical deployment.Furthermore,unresolved issues like interfacial compatibility in heterostructures and energy inefficiency in neu-romorphic signal conversion demand urgent attention.The review offers insights into future research directions enhance the fundamental understanding of MXene properties and promote further integration into neuromorphic computing applications through the convergence with various emerging technologies. 展开更多
关键词 two-dimensional MXenes SENSOR Neuromorphic computing Multimodal intelligent system Wearable electronics
在线阅读 下载PDF
Two-dimensional kagome semiconductor Sc_(6)S_(5)X_(6)(X=Cl,Br,I)with trilayer kagome lattice
5
作者 Jin-Ling Yan Xing-Yu Wang +5 位作者 Gen-Ping Wu Hao Wang Ya-Jiao Ke Jiafu Wang Zhi-Hong Liu Jun-Hui Yuan 《Chinese Physics B》 2026年第2期519-528,共10页
Two-dimensional(2D)multilayer kagome materials hold significant research value for regulating kagome-related physical properties and exploring quantum effects.However,their development is hindered by the scarcity of a... Two-dimensional(2D)multilayer kagome materials hold significant research value for regulating kagome-related physical properties and exploring quantum effects.However,their development is hindered by the scarcity of available material systems,making the identification of novel 2D multilayer kagome candidates particularly important.In this work,three types of 2D materials with trilayer kagome lattices,namely Sc_(6)S_(5)X_(6)(X=Cl,Br,I),are predicted based on first-principles calculations.These 2D materials feature two kagome lattices composed of Sc atoms and one kagome lattice composed of S atoms.Stability analysis indicates that these materials can exist as free-standing 2D materials.Electronic structure calculations reveal that Sc_(6)S_(5)X_(6)are narrow-bandgap semiconductors(0.76–0.95 e V),with their band structures exhibiting flat bands contributed by Sc-based kagome lattices and Dirac band gaps resulting from symmetry breaking.The sulfur-based kagome lattice in the central layer contributes an independent flat band below the Fermi level.Additionally,Sc_(6)S_(5)X_(6)exhibit high carrier mobility,with hole and electron mobilities reaching up to 10^(3)cm^(2)·V^(-1)·s^(-1),indicating potential applications in low-dimensional electronic devices.This work provides an excellent example for the development of novel multilayer 2D kagome materials. 展开更多
关键词 multilayer kagome lattice two-dimensional materials carrier mobility first-principles calculations
原文传递
IOTA-Based Authentication for IoT Devices in Satellite Networks
6
作者 D.Bernal O.Ledesma +1 位作者 P.Lamo J.Bermejo 《Computers, Materials & Continua》 2026年第1期1885-1923,共39页
This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi... This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks. 展开更多
关键词 Satellite IoT decentralized authentication directed acyclic graph IOTA identity verifiable credentials
在线阅读 下载PDF
EARAS:An Efficient,Anonymous,and Robust Authentication Scheme for Smart Homes
7
作者 Muntaham Inaam Hashmi Muhammad Ayaz Khan +3 位作者 Khwaja Mansoor ul Hassan Suliman A.Alsuhibany Ainur Abduvalova Asfandyar Khan 《Computers, Materials & Continua》 2026年第3期780-797,共18页
Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share ... Cyber-criminals target smart connected devices for spyware distribution and security breaches,but existing Internet of Things(IoT)security standards are insufficient.Major IoT industry players prioritize market share over security,leading to insecure smart products.Traditional host-based protection solutions are less effective due to limited resources.Overcoming these challenges and enhancing the security of IoT Devices requires a security design at the network level that uses lightweight cryptographic parameters.In order to handle control,administration,and security concerns in traditional networking,the Gateway Node offers a contemporary networking architecture.By managing all network-level computations and complexity,the Gateway Node relieves IoT devices of these responsibilities.In this study,we introduce a novel privacy-preserving security architecture for gateway-node smart homes.Subsequently,we develop Smart Homes,An Efficient,Anonymous,and Robust Authentication Scheme(EARAS)based on the foundational principles of this security architecture.Furthermore,we formally examine the security characteristics of our suggested protocol that makes use of methodology such as ProVerif,supplemented by an informal analysis of security.Lastly,we conduct performance evaluations and comparative analyses to assess the efficacy of our scheme.Performance analysis shows that EARAS achieves up to 30%to 54%more efficient than most protocols and lower computation cost compared to Banerjee et al.’s scheme,and significantly reduces communication overhead compared to other recent protocols,while ensuring comprehensive security.Our objective is to provide robust security measures for smart homes while addressing resource constraints and preserving user privacy. 展开更多
关键词 Smart home user authentication gateway node security IoT security privacy and security
在线阅读 下载PDF
Wearable Biodevices Based on Two-Dimensional Materials:From Flexible Sensors to Smart Integrated Systems 被引量:1
8
作者 Yingzhi Sun Weiyi He +3 位作者 Can Jiang Jing Li Jianli Liu Mingjie Liu 《Nano-Micro Letters》 2025年第5期207-255,共49页
The proliferation of wearable biodevices has boosted the development of soft,innovative,and multifunctional materials for human health monitoring.The integration of wearable sensors with intelligent systems is an over... The proliferation of wearable biodevices has boosted the development of soft,innovative,and multifunctional materials for human health monitoring.The integration of wearable sensors with intelligent systems is an overwhelming tendency,providing powerful tools for remote health monitoring and personal health management.Among many candidates,two-dimensional(2D)materials stand out due to several exotic mechanical,electrical,optical,and chemical properties that can be efficiently integrated into atomic-thin films.While previous reviews on 2D materials for biodevices primarily focus on conventional configurations and materials like graphene,the rapid development of new 2D materials with exotic properties has opened up novel applications,particularly in smart interaction and integrated functionalities.This review aims to consolidate recent progress,highlight the unique advantages of 2D materials,and guide future research by discussing existing challenges and opportunities in applying 2D materials for smart wearable biodevices.We begin with an in-depth analysis of the advantages,sensing mechanisms,and potential applications of 2D materials in wearable biodevice fabrication.Following this,we systematically discuss state-of-the-art biodevices based on 2D materials for monitoring various physiological signals within the human body.Special attention is given to showcasing the integration of multi-functionality in 2D smart devices,mainly including self-power supply,integrated diagnosis/treatment,and human–machine interaction.Finally,the review concludes with a concise summary of existing challenges and prospective solutions concerning the utilization of2D materials for advanced biodevices. 展开更多
关键词 two-dimensional material Wearable biodevice Flexible sensor Smart integrated system Healthcare
在线阅读 下载PDF
Inhibitory effect of the interlayer of two-dimensional vermiculite on the polysulfide shuttle in lithium-sulfur batteries
9
作者 CHEN Xiaoli LUO Zhihong +3 位作者 XIONG Yuzhu WANG Aihua CHEN Xue SHAO Jiaojing 《无机化学学报》 北大核心 2025年第8期1661-1671,共11页
A functional interlayer based on two-dimensional(2D)porous modified vermiculite nanosheets(PVS)was obtained by acid-etching vermiculite nanosheets.The as-obtained 2D porous nanosheets exhibited a high specific surface... A functional interlayer based on two-dimensional(2D)porous modified vermiculite nanosheets(PVS)was obtained by acid-etching vermiculite nanosheets.The as-obtained 2D porous nanosheets exhibited a high specific surface area of 427 m^(2)·g^(-1)and rich surface active sites,which help restrain polysulfides(LiPSs)through good physi-cal and chemical adsorption,while simultaneously accelerating the nucleation and dissolution kinetics of Li_(2)S,effec-tively suppressing the shuttle effect.The assembled lithium-sulfur batteries(LSBs)employing the PVS-based inter-layer delivered a high initial discharge capacity of 1386 mAh·g^(-1)at 0.1C(167.5 mAh·g^(-1)),long-term cycling stabil-ity,and good rate property. 展开更多
关键词 vermiculite nanosheets two-dimensional materials INTERLAYER shuttle effect lithium-sulfur batteries
在线阅读 下载PDF
Finite-Time Expected Present Value of Operating Costs until Ruin in a Two-Dimensional Risk Model with Periodic Observation
10
作者 TENG Ye XIE Jiayi ZHANG Zhimin 《应用概率统计》 北大核心 2025年第5期748-765,共18页
This paper investigates ruin,capital injection,and dividends for a two-dimensional risk model.The model posits that surplus levels of insurance companies are governed by a perturbed composite Poisson risk model.This m... This paper investigates ruin,capital injection,and dividends for a two-dimensional risk model.The model posits that surplus levels of insurance companies are governed by a perturbed composite Poisson risk model.This model introduces a dependence between the two surplus levels,present in both the associated perturbations and the claims resulting from common shocks.Critical levels of capital injection and dividends are established for each of the two risks.The surplus levels are observed discretely at fixed intervals,guiding decisions on capital injection,dividends,and ruin at these junctures.This study employs a two-dimensional Fourier cosine series expansion method to approximate the finite time expected discounted operating cost until ruin.The ensuing approximation error is also quantified.The validity and accuracy of the method are corroborated through numerical examples.Furthermore,the research delves into the optimal capital allocation problem. 展开更多
关键词 two-dimensional risk model Fourier cosine expansion capital injection DIVIDEND
在线阅读 下载PDF
Multi-Factor Authentication for Keyless Entry Systems: An Innovative Approach to Automotive Security
11
作者 Danilo Brito Shakour Abuzneid 《Journal of Information Security》 2025年第1期78-100,共23页
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s... Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks. 展开更多
关键词 MFA Keyless Entry Systems Automotive Security Biometric authentication
在线阅读 下载PDF
Endogenous Security Through AI-Driven Physical-Layer Authentication for Future 6G Networks
12
作者 MENG Rui FAN Dayu +2 位作者 XU Xiaodong LYU Suyu TAO Xiaofeng 《ZTE Communications》 2025年第1期18-29,共12页
To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the ... To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the introduction of artificial intelligence(AI)facilitates the learning of the distribution characteristics of channel fingerprints,effectively addressing the uncertainties and unknown dynamic challenges in wireless link modeling.This paper reviews representative AI-enabled PLA schemes and proposes a graph neural network(GNN)-based PLA approach in response to the challenges existing methods face in identifying mobile users.Simulation results demonstrate that the proposed method outperforms six baseline schemes in terms of authentication accuracy.Furthermore,this paper outlines the future development directions of PLA. 展开更多
关键词 physical-layer authentication artificial intelligence wireless security intelligent authentication
在线阅读 下载PDF
MXenes-based separators with nanoconfined two-dimensional channels for high-performance lithium-sulfur battery
13
作者 Yi-Hui Zhao Shuai Li +6 位作者 Yu-Lu Huo Zhen Li Lan-Lan Hou Yong-Qiang Wen Xiao-Xian Zhao Jian-Jun Song Jing-Chong Liu 《Rare Metals》 2025年第5期2921-2944,共24页
Lithium-sulfur(Li-S)batteries with high energy density and capacity have garnered significant research attention among various energy storage devices.However,the shuttle effect of polysulfides(LiPSs)remains a major ch... Lithium-sulfur(Li-S)batteries with high energy density and capacity have garnered significant research attention among various energy storage devices.However,the shuttle effect of polysulfides(LiPSs)remains a major challenge for their practical application.The design of battery separators has become a key aspect in addressing the challenge.MXenes,a promising two-dimensional(2D)material,offer exceptional conductivity,large surface area,high mechanical strength,and active sites for surface reactions.When assembled into layered films,MXenes form highly tunable two-dimensional channels ranging from a few angstroms to over 1 nm.These nanoconfined channels are instrumental in facilitating lithium-ion transport while effectively impeding the shuttle effect of LiPSs,which are essential for improving the specific capacity and cyclic stability of Li-S batteries.Substantial progress has been made in developing MXenes-based separators for Li-S batteries,yet there remains a research gap in summarizing advancements from the perspective of interlayer engineering.This entails maintaining the 2D nanochannels of layered MXenes-based separators while modulating the physicochemical environment within the MXenes interlayers through targeted modifications.This review highlights advancements in in situ modification of MXenes and their integration with 0D,1D,and 2D materials to construct laminated nanocomposite separators for Li-S batteries.The future development directions of MXenes-based materials in Li-S energy storage devices are also outlined,to drive further advancements in MXenes for Li-S battery separators. 展开更多
关键词 Lithium-sulfur battery MXenes SEPARATOR two-dimensional materials two-dimensional nanochannels
原文传递
CD-AKA-IoV:A Provably Secure Cross-Domain Authentication and Key Agreement Protocol for Internet of Vehicle
14
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第10期1715-1732,共18页
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi... With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency. 展开更多
关键词 authentication key agreement IoV cross-domain
在线阅读 下载PDF
Light-Weighted Mutual Authentication and Key Agreement in V2N VANET
15
作者 Yanan Liu Lei Cao +3 位作者 Zheng Zhang Ge Li Shuo Qiu Suhao Wang 《Computers, Materials & Continua》 2025年第9期4997-5019,共23页
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari... As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience. 展开更多
关键词 KERBEROS PUF authentication key agreement VANET
在线阅读 下载PDF
Unleashing the Potential of Metaverse in Social IoV:An Authentication Protocol Based on Blockchain
16
作者 Tsu-Yang Wu Haozhi Wu +2 位作者 Maoxin Tang Saru Kumari Chien-Ming Chen 《Computers, Materials & Continua》 2025年第8期3175-3192,共18页
As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in... As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality. 展开更多
关键词 authentication key agreement SIoV metaverse blockchain
在线阅读 下载PDF
PLAP-PCPE:Physical-Layer Authentication Protocol Based on PUF and Channel Pre-Equalization for the Internet of Things
17
作者 Guo Dengke Gao Yuwei +2 位作者 Cao Kuo Xiong Jun Ma Dongtang 《China Communications》 2025年第3期234-253,共20页
How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with ... How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with constrained resources,this paper proposes a lightweight physical-layer authentication protocol based on Physical Unclonable Function(PUF)and channel pre-equalization.PUF is employed as a secret carrier to provide authentication credentials for devices due to its hardware-based uniqueness and unclonable property.Meanwhile,the short-term reciprocity and spatio-temporal uniqueness of wireless channels are utilized to attach an authentication factor related to the spatio-temporal position of devices and to secure the transmission of authentication messages.The proposed protocol is analyzed formally and informally to prove its correctness and security against typical attacks.Simulation results show its robustness in various radio environments.Moreover,we illustrate the advantages of our protocol in terms of security features and complexity through performance comparison with existing authentication schemes. 展开更多
关键词 IoT physical-layer authentication preequalization PUF wireless channel
在线阅读 下载PDF
A blockchain-based efficient traceability authentication scheme in VANET
18
作者 Junhui Zhao Yingxuan Guo +1 位作者 Longxia Liao Dongming Wang 《Digital Communications and Networks》 2025年第5期1410-1420,共11页
Vehicular Ad-hoc Network(VANET)is a platform that facilitates Vehicle-to-Everything(V2X)interconnection.However,its open communication channels and high-speed mobility introduce security and privacy vulnerabilities.An... Vehicular Ad-hoc Network(VANET)is a platform that facilitates Vehicle-to-Everything(V2X)interconnection.However,its open communication channels and high-speed mobility introduce security and privacy vulnerabilities.Anonymous authentication is crucial in ensuring secure communication and privacy protection in VANET.However,existing anonymous authentication schemes are prone to single points of failure and often overlook the efficient tracking of the true identities of malicious vehicles after pseudonym changes.To address these challenges,we propose an efficient anonymous authentication scheme for blockchain-based VANET.By leveraging blockchain technology,our approach addresses the challenges of single points of failure and high latency,thereby enhancing the service stability and scalability of VANET.The scheme integrates homomorphic encryption and elliptic curve cryptography,allowing vehicles to independently generate new pseudonyms when entering a new domain without third-party assistance.Security analyses and simulation results demonstrate that our scheme achieves effective anonymous authentication in VANET.Moreover,the roadside unit can process 500 messages per 19 ms.As the number of vehicles in the communication domain grows,our scheme exhibits superior messageprocessing capabilities. 展开更多
关键词 VANET Anonymous authentication SECURITY Privacy protection Blockchain
在线阅读 下载PDF
Two-Dimensional TiO_(2)Ultraviolet Filters for Sunscreens
19
作者 Ling QiuHui-Ming Cheng Ruoning Yang +10 位作者 Jiefu Chen Xiang Li Yaxin Zhang Baofu Ding Yujiangsheng Xu Shaoqiang Luo Shaohua Ma Xingang Ren Gang Liu Ling Qiu Hui-Ming Cheng 《Nano-Micro Letters》 2025年第12期108-119,共12页
Titanium dioxide(TiO_(2))has been an important protective ingredient in mineral-based sunscreens since the 1990s.However,traditional TiO_(2)nanoparticle formulations have seen little improvement over the past decades ... Titanium dioxide(TiO_(2))has been an important protective ingredient in mineral-based sunscreens since the 1990s.However,traditional TiO_(2)nanoparticle formulations have seen little improvement over the past decades and continue to face persistent challenges related to light transmission,biosafety,and visual appearance.Here,we report the discovery of two-dimensional(2D)TiO_(2),characterized by a micro-sized lateral dimension(~1.6μm)and atomic-scale thickness,which fundamentally resolves these long-standing issues.The 2D structure enables exceptional light management,achieving 80%visible light transparency—rendering it nearly invisible on the skin—while maintaining UV-blocking performance comparable to unmodified rutile TiO_(2)nanoparticles.Its larger lateral size results in a two-orders-of-magnitude reduction in skin penetration(0.96 w/w%),significantly enhancing biosafety.Moreover,the unique layered architecture inherently suppresses the generation of reactive oxygen species(ROS)under sunlight exposure,reducing the ROS generation rate by 50-fold compared to traditional TiO_(2)nanoparticles.Through precise metal element modulation,we further developed the first customizable sunscreen material capable of tuning UV protection ranges and automatically matching diverse skin tones.The 2D TiO_(2)offers a potentially transformative approach to modern sunscreen formulation,combining superior UV protection,enhanced safety and a natural appearance. 展开更多
关键词 two-dimensional Titanium dioxide SUNSCREEN BIOSAFETY
在线阅读 下载PDF
DriveMe:Towards Lightweight and Practical Driver Authentication System Using Single-Sensor Pressure Data
20
作者 Mohsen Ali Alawami Dahyun Jung +3 位作者 Yewon Park Yoonseo Ku Gyeonghwan Choi Ki-Woong Park 《Computer Modeling in Engineering & Sciences》 2025年第5期2361-2389,共29页
To date,many previous studies have been proposed for driver authentication;however,these solutions have many shortcomings and are still far from practical for real-world applications.In this paper,we tackle the shortc... To date,many previous studies have been proposed for driver authentication;however,these solutions have many shortcomings and are still far from practical for real-world applications.In this paper,we tackle the shortcomings of the existing solutions and reach toward proposing a lightweight and practical authentication system,dubbed DriveMe,for identifying drivers on cars.Our novelty aspects are 1⃝Lightweight scheme that depends only on a single sensor data(i.e.,pressure readings)attached to the driver’s seat and belt.2⃝Practical evaluation in which one-class authentication models are trained from only the owner users and tested using data collected from both owners and attackers.3⃝Rapid Authentication to quickly identify drivers’identities using a few pressure samples collected within short durations(1,2,3,5,or 10 s).4⃝Realistic experiments where the sensory data is collected from real experiments rather than computer simulation tools.We conducted real experiments and collected about 13,200 samples and 22,800 samples of belt-only and seat-only datasets from all 12 users under different settings.To evaluate system effectiveness,we implemented extensive evaluation scenarios using four one-class detectors One-Class Support Vector Machine(OCSVM),Local Outlier Factor(LOF),Isolation Forest(IF),and Elliptic Envelope(EE),three dataset types(belt-only,seat-only,and fusion),and four different dataset sizes.Our average experimental results show that the system can authenticate the driver with an F1 score of 93.1%for seat-based data using OCSVM classifier,an F1 score of 98.53%for fusion-based data using LOF classifier,an F1 score of 91.65%for fusion-based data using IF classifier,and an F1 score of 95.79%for fusion-based data using EE classifier. 展开更多
关键词 Driver authentication pressure data SENSOR car machine learning
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部