Table of Content

    15 December 2019, Volume 5 Issue 12
    Survey on the Satisfaction of Internet Security of Chinese Netizen in 2019
    2019, 5(12):  1050-1058. 
    Asbtract ( )   PDF (3430KB) ( )  
    Related Articles | Metrics
    PrivacyPreserving MultiFunctional Data Aggregation Without TTP in Smart Grid
    2019, 5(12):  1059-1067. 
    Asbtract ( )   PDF (1387KB) ( )  
    References | Related Articles | Metrics
    In the smart grid, residents electricity usage needs to be periodically measured and reported for the purpose of better energy management. However, many studies have shown that realtime collection of residents electricity consumption may unfavorably incur privacy leakage. Most existing work is based on trusted third party (TTP), but this approach introduces large computational overhead. In this paper, we construct a new scheme which utilizes Shamirs secret sharing to allow smart meters to negotiate aggregation parameters in the absence of a TTP. This scheme efficiently supports multifunctional aggregation of the electricity readings and simultaneously preserves residents privacy. Theoretical analysis of this scheme is provided with regard to security and efficiency. Moreover, experimental data obtained from a prototype indicates that our proposal is efficient and feasible for practical deployment.
    A Review of Cyber-Physical Security in Smart Grids
    2019, 5(12):  1068-1075. 
    Asbtract ( )   PDF (1923KB) ( )  
    References | Related Articles | Metrics
    Smart grids integrate the power system engineering technology with the information and communication technology as a typical cyberphysical system. Resulting from the frequent cyberattacks on computer networks and communication networks, the smart grid has become the focus of cyberattacks. False data injection attack is one type of cyberphysical attacks, which has aroused public concern. It can physically tamper with the remote access utilities, intentionally intercept communication traffic flows or cooperatively manipulate data transmitted over the communication network to circumvent the power system integrity check and then malfunction equipment even collapse the whole power system. According to its attack targets, it can be divided into four categories: device attack, data attack, privacy attack and network availability attack. In order to defend against this kind of attack, fusion security measures are designed which can combine the characteristics of the power system and network data flow to detect the bad data and locate the failed physical equipment. With the development of advanced information technology, smart grids will face enormous challenges on fusion security.
    An Adaptive Security Mechanism of CAN Bus in Vehicle
    2019, 5(12):  1076-1088. 
    Asbtract ( )   PDF (3525KB) ( )  
    References | Related Articles | Metrics
    While the connected vehicles are promoting the development of important technologies such as intelligent transportation and smart cities, its security problems are increasingly severe at the same time. As the core bus network of connected vehicles, CAN bus is responsible for the transmission of sensor information and control instructions, therefore, the issue of its security protection attracts more and more attention. However,the existing security mechanism failed to consider the differentiated needs of messages and dynamic invehicle network environment. It is hard to balance security and network performance at the same time. Therefore, an adaptive security mechanism for CAN bus is proposed. Firstly, a factor set is established, and a differentiated security strategy and corresponding communication protocol are designed according to the requirement of message security and invehicle network environment. Then, the adaptive selection of security strategy is proposed based on the fuzzy decisionmaking idea and the consideration of the message requirements as well as the invehicle network factors. Finally, the feasibility and security of the proposed scheme are verified through theoretical analysis, Moreover, the experimental results indicated that the proposed scheme had limited computing cost, which made it suitable for ECU nodes with limited computing capacity and CAN bus networks with high realtime requirements.
    Design of an E-Signature Verification Platform Based on Block Chain
    2019, 5(12):  1089-1095. 
    Asbtract ( )   PDF (2705KB) ( )  
    References | Related Articles | Metrics
    At present, many digital certificate domains coexist under the conditions of different cryptographic algorithms, service domains and technical specifications, which leads to the problem of correlation between time and space verification of electronic signatures based on the construction of digital certificate system, and becomes a difficult problem that hinders the comprehensive promotion and application of electronic signatures. Facing this dilemma, an electronic signature verification platform design scheme is proposed based on block chain technology, which recorded electronic signature transaction data into the chain through alliance chain, a distributed and decentralized electronic signature verification service platform is constructed, which provides the secure, reliable, efficient and convenient verification services for electronic signatures to solve the timespace independence verification of electronic signatures and support comprehensive promotion of the electronic signatures in e-government, e-commerce and other public applications.
    A Trusted Networking Mechanism for Internet of Things Awareness Nodes
    2019, 5(12):  1096-1100. 
    Asbtract ( )   PDF (1362KB) ( )  
    References | Related Articles | Metrics
    The trusted networking of the IoTaware node is the basis for the trusted environment of the sensing environment, but there is no trusted networking mechanism suitable for the sensing node currently. Aiming at this problem, this paper proposes a trusted networking mechanism suitable for IoTaware nodes. It ensures efficient access and node networking through efficient authentication and twoway trusted authentication, which can ensure that the activation of the sensing node and the access are trusted, thus ensuring the trusted activation of the IoTaware node and the trusted sensing network. Simulation experiments show that compared with the traditional security mechanism, the trusted networking mechanism proposed in this paper is an active measurement and defense mechanism, which can effectively prevent malicious code, while low energy consumption, and does not affect the life cycle of the sensing node.
    The Enforcement of E-Forensics Knowledge Converging and Sharing
    2019, 5(12):  1101-1105. 
    Asbtract ( )   PDF (1256KB) ( )  
    References | Related Articles | Metrics
    E-forensics knowledge is reflected by performer wisdom during forensic performance, while it is always disappeared in individual case on actual performance. By making forensics knowledge standard, upgrading forensics software, remodeling forensics equipment, converging and processing forensics knowledge, these method can produce various forensics knowledge bases and share with performers by network mechanism. It will change the original state that forensics ability is completely relied on personal ability, promote the integration of personal ability and collective wisdom. Meanwhile, the mechanism will build up forensics knowledge ecology, promote positive cycle of forensics technology and bring qualitative leap for forensics performance.
    Research on Key Technologies of Cloud Computing Data Privacy Protection
    2019, 5(12):  1106-1109. 
    Asbtract ( )   PDF (944KB) ( )  
    References | Related Articles | Metrics
    With the rapid development of network information technology, cloud computing has gradually become a main technology to achieve information sharing. Because the storage and search of user data in cloud computing are all carried out in the cloud, the protection of user data privacy has been put forward higher requirements, and the protection of data privacy has become the most critical issue in cloud computing. From the point of view of cloud user data privacy protection technology in cloud computing, the key technologies of cloud user data privacy protection in cloud computing environment are analyzed in detail, and their advantages and disadvantages are pointed out in paper.
    Quantum Secure Communication Based on Stable Subcodes Under Noisy Conditions
    2019, 5(12):  1110-1113. 
    Asbtract ( )   PDF (894KB) ( )  
    References | Related Articles | Metrics
    Since quantum secure communication cannot avoid the influence of noise in the transmission process, there will always be the problems of bit loss and bit reversal after the transmission is completed. In order to solve the problem of error information, stable code was used to encode quantum information, and the information was corrected through the classical calibration matrix of information channel transmission error correction after the completion of the transfer, which overcame the bit flip problem caused by channel noise, the accuracy of quantum information transmission had corresponding improvement, the security of quantum information transmission was also guaranteed, which verified the feasibility and effectiveness of the algorithm.
    Research of Internet Application of Electronic Certificate About Project Declaration in Scientific and Technological Fields
    2019, 5(12):  1114-1119. 
    Asbtract ( )   PDF (2450KB) ( )  
    References | Related Articles | Metrics
    Electronic certificate is the primary solution of the internet plus government services in our country, which has been used as a pilot project in some districts. The electronic certificate is applied by using the technology of digital signature and electronic seal in order to ensure the truth and validity of the certificate. The users of the electronic certificate are citizens and legal persons in our country, and it will be used in many internet scenarios. The scenario of project declaration in scientific and technological fields is the typical example of electronic certificate application in the internet era. This paper analyzes the technical framework of electronic certificate. Some technical problems are presented according to the technology, management and application of electronic certificate, especially in internet environment, how to achieve the access security, transmission security and storage security of electronic certificate. An internet application solution combined cryptology technique of electronic certificate is also proposed about project declaration in scientific and technological fields in the last.
    Application of Domestic Cryptographic in Rural Credit Cooperatives
    2019, 5(12):  1120-1123. 
    Asbtract ( )   PDF (2180KB) ( )  
    References | Related Articles | Metrics
    This paper constructs a set of cryptogram security system for rural credit cooperatives based on domestic cryptographic algorithm. It transformed general cryptographic algorithm into domestic cryptographic algorithms for the system of corebank, frontbank, online bank, financial IC card and the second generation payment etc., which involved cryptographic applications. It solved the security problems of identity authentication, information integrity, repudiation and so on. It provided a secure and reliable cryptographic guarantee for the rural credit cooperatives. It enhanced selfcontrollable ability of information security core products and system for rural credit cooperatives, and improved the safety and security capability of rural credit cooperatives. It has a great significance to the popularization and application of domestic cryptographic algorithms.
    5G Network Security in Depth
    2019, 5(12):  1124-1128. 
    Asbtract ( )   PDF (784KB) ( )  
    References | Related Articles | Metrics
    The high bandwidth, low latency, and large connection features of 5G networks will greatly improve the informatization level of all industries in the whole society. It not only improves the speed and efficiency of communication between people, but also effectively expands the connection level and communication capability between people and things, and between things and things. In addition, 5G network new services, new technologies and massive terminal users pose new challenges to security and user privacy protection.ITU defined three service scenarios: eMBB, mMTC, and URLLC. IoT devices are massive and unattended, posing new challenges to network security management and security defense. In addition, services that require high reliability and high security, such as power distribution control, automatic driving, and remote surgery, involve industrial control systems and life safety systems, bringing more attention to 5G security. To improve the flexibility, scalability, and fast deployment of the communications system and reduce costs, the 5G network architecture will introduce technologies such as core network service-oriented architecture, network slicing, and multi-access edge computing. Based on the flexibility, scalability, and fast deployment of network functions, these technologies bring new challenges to 5G security.
    Theoretical Points of Industrial Control System Cyber Security
    2019, 5(12):  1129-1132. 
    Asbtract ( )   PDF (693KB) ( )  
    References | Related Articles | Metrics
    While the Devil Climbs a Post, the Priest Climbs Ten: The Endogenous Security Viewpoint of Industrial Control System
    2019, 5(12):  1133-1136. 
    Asbtract ( )   PDF (720KB) ( )  
    References | Related Articles | Metrics