Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,400 Hits in 8.1 sec

Face Security Authentication System Based on Deep Learning and Homomorphic Encryption

Dechao Sun, Hong Huang, Dongsong Zheng, Haoliang Hu, Chunyue Bi, Renfang Wang, Tahir Mahmood
2022 Security and Communication Networks  
To solve this problem, a face feature ciphertext authentication scheme based on homomorphic encryption is proposed.  ...  Finally, the integrity and consistency of face feature ciphertext recognition results before and after decryption are guaranteed by the one-time MAC authentication method.  ...  greatly improves the efficiency and flexibility of calculation; (2) the one-time MAC authentication method is directly utilized on the server, removing the trusted center for authentication. is scheme  ... 
doi:10.1155/2022/7752292 fatcat:25ktss2nw5e7dng7a3sigyupxi

Routing Strategy and Data Security Technology in IPv6 Wireless Sensor Networks

Li Zhaoyan, Zhao Chengfang
2018 International Journal of Online Engineering (iJOE)  
Then, the great permutation encryption algorithm (G-PEC) for WSN is proposed. Finally, a signature scheme against pollution attack based on linear network coding is improved.  ...  The G-PEC can effectively resist eavesdropping attack, and the new signature scheme does not need additional secure channels. The proposed mechanism also provides source message authentication.  ...  The homomorphic signature scheme is also improved.  ... 
doi:10.3991/ijoe.v14i08.9181 fatcat:n36nf3eic5dvtmxnf2tpxdueau

Towards authenticated network coding for named data networking

Ryma Boussaha, Yacine Challal, Malika Bessedik, Abdelmadjid Bouabdallah
2017 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM)  
coding scheme tailored for named data networking.  ...  We also propose an optimized authentication model based on homomorphic encryption to deal with the "pollution attacks" problem in which malicious nodes can flood the network with bad packets and prevent  ...  In Section II, we describe our optimization coding and homomorphic security model for network coding system and we present the construction satisfying our network architecture.  ... 
doi:10.23919/softcom.2017.8115565 dblp:conf/softcom/BoussahaCBB17 fatcat:clg4v2l23nadzivki646ordwwa

On security against pollution attacks in network coding enabled 5G networks

Vipindev Adat, Christos Tselios, Ilias Politis
2020 IEEE Access  
The survey goes a step further and includes a potential secure implementation of network coding enabled 5G networks, based on cooperating small cells.  ...  Network coding is arising once more as an enabler for satisfying the bandwidth requirements of future multimedia and resource hungry services.  ...  Homomorphic cryptographic schemes are again classified into homomorphic signature schemes and homomorphic message authentication codes (MACs).  ... 
doi:10.1109/access.2020.2975761 fatcat:vaz7xqagbrhatino4a3kuytaxu

An Unconditionally Secure Authentication Code For Multi-Source Network Coding

Hong Yang, Mingxi Yang
2012 International Journal of Wireless and Microwave Technologies  
In this paper, we proposed a novel unconditionally secure authentication code for multi-source network coding, which is robust against pollution attacks.  ...  For the authentication scheme based on theoretic strength, it is robust against those attackers that have unlimited computational resources, and the intermediate nodes therein can verify the integrity  ...  Since the research of multi-source network coding was studied fewer, our scheme about the security analysis is not perfect; it needs to be improved on.  ... 
doi:10.5815/ijwmt.2012.01.07 fatcat:fdngo3znmfeztkqj4a3qwije4i

A Secure Network Coding Based on Broadcast Encryption in SDN

Yue Chen, Hongyong Jia, Kaixiang Huang, Julong Lan, Xincheng Yan
2016 Mathematical Problems in Engineering  
In this paper, we propose a novel fast and secure switch network coding multicast (SSNC) on the software defined networks (SDN).  ...  By allowing intermediate nodes to encode the received packets before sending them out, network coding improves the capacity and robustness of multicast applications.  ...  [19] proposed a RIPPLE, a symmetric key based in-network solution for network coding authentication, which is on the basis of the homomorphic Mac and TESLA [20] .  ... 
doi:10.1155/2016/7145138 fatcat:ho4wxc4bcfgrxmmd6pxhdnfuiu

Iris Ciphertext Authentication System Based on Fully Homomorphic Encryption

Xinxia Song, Zhigang Chen, Dechao Sun
2020 Journal of Information Processing Systems  
on fully homomorphic encryption using the FV scheme.  ...  At the same time, the system does not require a trusted center for authentication, and the authentication is completed on the server side directly using the one-time MAC authentication method.  ...  Most of the existing authentication systems are based on the improvement of the above biometric template protection scheme, and there are few authentication systems based on fully homomorphic encryption  ... 
doi:10.3745/jips.03.0138 dblp:journals/jips/SongCS20 fatcat:twpckspojfa53b67a7nmwenr6e

RIPPLE Authentication for Network Coding

Yaping Li, Hongyi Yao, Minghua Chen, Sidharth Jaggi, Alon Rosen
2010 2010 Proceedings IEEE INFOCOM  
In this paper, we propose RIPPLE, a symmetric key based in-network scheme for network coding authentication.  ...  RIPPLE allows a node to efficiently detect corrupted packets and encode only the authenticated ones.  ...  Previous research on providing source authentication for network coding falls into two broad categories: end-to-end and in-network schemes.  ... 
doi:10.1109/infcom.2010.5462051 dblp:conf/infocom/LiYCJR10 fatcat:indebqfepvf6vnm2jq7chv4txy

Research on Secure Aggregation Scheme based on Stateful Public Key Cryptology in Wireless Sensor Networks

Danyang Qin, Shuang Jia, Songxiang Yang, Erfu Wang, Qun Ding
2016 Journal of Information Hiding and Multimedia Signal Processing  
For network security issues, this paper proposed a secure aggregation scheme based on Stateful Public Key Cryptography (SPKC) for WSNs, which employs a new stateful public key encryption to provide an  ...  Wireless sensor network (WSN) is an important part of the Internet of Things (IoT) and technical support for ubiquitous communication.  ...  HMAC (Hash-based Message Authentication Code) is a kind of scheme based on encryption hash function and it is always used to validate the data integrity and source.  ... 
dblp:journals/jihmsp/QinJYWD16 fatcat:dvejbfpyznbgvpg54vpi7ksjuy

Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment

Peng Peng
2024 Applied Mathematics and Nonlinear Sciences  
This paper proposes a dynamic security threat assessment model and a robust optimal control strategy to improve the efficiency of detecting network vulnerabilities and the accuracy of detecting network  ...  It also protects the privacy of the user's identity through a multi-factor continuous authentication method, encrypts and protects the user's data using a homomorphic encryption algorithm, and strengthens  ...  The lightweight continuous authentication protocol for computer networks proposed in this section, which consists of two static authentication phases and a continuous authentication phase, can realize  ... 
doi:10.2478/amns-2024-0171 fatcat:ypagrb2wabas5jyzd4mqzbxe2e

An Efficient Null Space-Based Homomorphic MAC Scheme Against Tag Pollution Attacks in RLNC

Alireza Esfahani, Georgios Mantas, Jonathan Rodriguez
2016 IEEE Communications Letters  
This paper presents a new homomorphic MAC-based scheme, called Dual-Homomorphic MAC (Dual-HMAC), for network coding-enabled wireless sensor networks.  ...  Network coding has shown a considerable improvement in terms of capacity and robustness compared to traditional store-andforward transmission paradigm.  ...  This work is based on a symmetric key based scheme for network coding authentication.  ... 
doi:10.1109/lcomm.2016.2547420 fatcat:e573q7zm7ze5jlhlvvmhg4e4xe

Secure Data Aggregation Aided by Privacy Preserving in Internet of Things

X. Liu, X. Wang, K. Yu, X. Yang, W. Ma, G. Li, X. Zhao
2022 Wireless Communications and Mobile Computing  
Firstly, we discuss an improved homomorphic message authentication code (iHMAC) which can verify the integrity of sensing data and eliminate the injection of false data.  ...  The security analysis and the simulation experiments verify that MASDA has better performances in terms of the security, the computation cost, the communication overhead, and the data accuracy.  ...  Shandong Graduate Education Quality Improvement Plan under Grants SDYY17138, SDYKC21097.  ... 
doi:10.1155/2022/4858722 doaj:287e5e4bbdd14792994d3ddbde758892 fatcat:peukep3yifgybkeu6fj5iwqulu

Analytical Literature Survey on Existing Schemes to Improve Data Security and Robustness in Cloud Computing

N. Abirami, S. Murugan
2016 International Journal of Engineering Research and  
This paper gives the various issues of cloud computing systems, the existing solutions to avoid the issues like security and data robustness, performance analysis of the schemes and comparison of the schemes  ...  their demand for hardware and software service offered by cloud infrastructure.  ...  This method is constructed as an improvement to erasure-coding and network coding-based systems in terms of reducing the computational cost compared to erasure coding and less storage cost compared to  ... 
doi:10.17577/ijertv5is100295 fatcat:qjvag43wsvho5iuvt6gn4q5vsy

Fast multicast scheme with secure network coding in cloud data centers

Kaixiang Huang, Yue Chen, Hongyong Jia, Julong Lan, Xincheng Yan, Zhiwei Wang
2016 Computer Science and Information Systems  
This paper proposes a novel, fast, and secure network-coding multicast on software-defined networks. This scheme separates the complicated secure multicast management from fast data transmission.  ...  Existing schemes mainly focus on homomorphic cryptographic technologies against such attacks.  ...  This work is supported by the National Basic Research Program of China (2012CB315901), and also supported by National Natural Science Foundation of China (61373006).  ... 
doi:10.2298/csis160222013h fatcat:v27ptppn4ve5fann7wu6ynfwry

E-HMAC: An Efficient Secure Homomorphic MAC Scheme for NC-Enabled WSNs

Haythem Hayouni
2021 EAI Endorsed Transactions on Mobile Communications and Applications  
In this paper, we improve their scheme by proposing a novel HMAC scheme for NC enabled WSNs, called E-HMAC, based on multi-linear space to check the integrity of coded packets.  ...  In 2015, Esfahani et al. proposed a dual-homomorphic MAC scheme based to the construction of two different MACs to ensure the integrity of coded packets.  ...  Proposed Scheme We present an Efficient Homomorphic MAC scheme based on multi-linear space for wireless sensor networks, called E-HMAC, to improve the security flaws of Esfahani et al.'  ... 
doi:10.4108/eai.29-9-2021.171189 fatcat:sl34wv6bevgdbkzkyc2fg22np4
« Previous Showing results 1 — 15 out of 3,400 results