Loading...
Toggle navigation
Home
About
About Journal
Editorial Board
Author Center
Current Issue
Just Accepted
Archive
Most Read Articles
Most Download Articles
Most Cited Articles
E-mail Alert
RSS
Reader Center
Online Submission
Manuscript Tracking
Instruction
Download
Review Center
Peer Review
Office Work
Editor-in-Chief
Subscription
Contact Us
中文
Table of Content
15 December 2019, Volume 5 Issue 12
Previous Issue
Next Issue
Survey on the Satisfaction of Internet Security of Chinese Netizen in 2019
2019, 5(12): 1050-1058.
Asbtract
(
)
PDF
(3430KB) (
)
Related Articles
|
Metrics
PrivacyPreserving MultiFunctional Data Aggregation Without TTP in Smart Grid
2019, 5(12): 1059-1067.
Asbtract
(
)
PDF
(1387KB) (
)
References
|
Related Articles
|
Metrics
In the smart grid, residents electricity usage needs to be periodically measured and reported for the purpose of better energy management. However, many studies have shown that realtime collection of residents electricity consumption may unfavorably incur privacy leakage. Most existing work is based on trusted third party (TTP), but this approach introduces large computational overhead. In this paper, we construct a new scheme which utilizes Shamirs secret sharing to allow smart meters to negotiate aggregation parameters in the absence of a TTP. This scheme efficiently supports multifunctional aggregation of the electricity readings and simultaneously preserves residents privacy. Theoretical analysis of this scheme is provided with regard to security and efficiency. Moreover, experimental data obtained from a prototype indicates that our proposal is efficient and feasible for practical deployment.
A Review of Cyber-Physical Security in Smart Grids
2019, 5(12): 1068-1075.
Asbtract
(
)
PDF
(1923KB) (
)
References
|
Related Articles
|
Metrics
Smart grids integrate the power system engineering technology with the information and communication technology as a typical cyberphysical system. Resulting from the frequent cyberattacks on computer networks and communication networks, the smart grid has become the focus of cyberattacks. False data injection attack is one type of cyberphysical attacks, which has aroused public concern. It can physically tamper with the remote access utilities, intentionally intercept communication traffic flows or cooperatively manipulate data transmitted over the communication network to circumvent the power system integrity check and then malfunction equipment even collapse the whole power system. According to its attack targets, it can be divided into four categories: device attack, data attack, privacy attack and network availability attack. In order to defend against this kind of attack, fusion security measures are designed which can combine the characteristics of the power system and network data flow to detect the bad data and locate the failed physical equipment. With the development of advanced information technology, smart grids will face enormous challenges on fusion security.
An Adaptive Security Mechanism of CAN Bus in Vehicle
2019, 5(12): 1076-1088.
Asbtract
(
)
PDF
(3525KB) (
)
References
|
Related Articles
|
Metrics
While the connected vehicles are promoting the development of important technologies such as intelligent transportation and smart cities, its security problems are increasingly severe at the same time. As the core bus network of connected vehicles, CAN bus is responsible for the transmission of sensor information and control instructions, therefore, the issue of its security protection attracts more and more attention. However,the existing security mechanism failed to consider the differentiated needs of messages and dynamic invehicle network environment. It is hard to balance security and network performance at the same time. Therefore, an adaptive security mechanism for CAN bus is proposed. Firstly, a factor set is established, and a differentiated security strategy and corresponding communication protocol are designed according to the requirement of message security and invehicle network environment. Then, the adaptive selection of security strategy is proposed based on the fuzzy decisionmaking idea and the consideration of the message requirements as well as the invehicle network factors. Finally, the feasibility and security of the proposed scheme are verified through theoretical analysis, Moreover, the experimental results indicated that the proposed scheme had limited computing cost, which made it suitable for ECU nodes with limited computing capacity and CAN bus networks with high realtime requirements.
Design of an E-Signature Verification Platform Based on Block Chain
2019, 5(12): 1089-1095.
Asbtract
(
)
PDF
(2705KB) (
)
References
|
Related Articles
|
Metrics
At present, many digital certificate domains coexist under the conditions of different cryptographic algorithms, service domains and technical specifications, which leads to the problem of correlation between time and space verification of electronic signatures based on the construction of digital certificate system, and becomes a difficult problem that hinders the comprehensive promotion and application of electronic signatures. Facing this dilemma, an electronic signature verification platform design scheme is proposed based on block chain technology, which recorded electronic signature transaction data into the chain through alliance chain, a distributed and decentralized electronic signature verification service platform is constructed, which provides the secure, reliable, efficient and convenient verification services for electronic signatures to solve the timespace independence verification of electronic signatures and support comprehensive promotion of the electronic signatures in e-government, e-commerce and other public applications.
A Trusted Networking Mechanism for Internet of Things Awareness Nodes
2019, 5(12): 1096-1100.
Asbtract
(
)
PDF
(1362KB) (
)
References
|
Related Articles
|
Metrics
The trusted networking of the IoTaware node is the basis for the trusted environment of the sensing environment, but there is no trusted networking mechanism suitable for the sensing node currently. Aiming at this problem, this paper proposes a trusted networking mechanism suitable for IoTaware nodes. It ensures efficient access and node networking through efficient authentication and twoway trusted authentication, which can ensure that the activation of the sensing node and the access are trusted, thus ensuring the trusted activation of the IoTaware node and the trusted sensing network. Simulation experiments show that compared with the traditional security mechanism, the trusted networking mechanism proposed in this paper is an active measurement and defense mechanism, which can effectively prevent malicious code, while low energy consumption, and does not affect the life cycle of the sensing node.
The Enforcement of E-Forensics Knowledge Converging and Sharing
2019, 5(12): 1101-1105.
Asbtract
(
)
PDF
(1256KB) (
)
References
|
Related Articles
|
Metrics
E-forensics knowledge is reflected by performer wisdom during forensic performance, while it is always disappeared in individual case on actual performance. By making forensics knowledge standard, upgrading forensics software, remodeling forensics equipment, converging and processing forensics knowledge, these method can produce various forensics knowledge bases and share with performers by network mechanism. It will change the original state that forensics ability is completely relied on personal ability, promote the integration of personal ability and collective wisdom. Meanwhile, the mechanism will build up forensics knowledge ecology, promote positive cycle of forensics technology and bring qualitative leap for forensics performance.
Research on Key Technologies of Cloud Computing Data Privacy Protection
2019, 5(12): 1106-1109.
Asbtract
(
)
PDF
(944KB) (
)
References
|
Related Articles
|
Metrics
With the rapid development of network information technology, cloud computing has gradually become a main technology to achieve information sharing. Because the storage and search of user data in cloud computing are all carried out in the cloud, the protection of user data privacy has been put forward higher requirements, and the protection of data privacy has become the most critical issue in cloud computing. From the point of view of cloud user data privacy protection technology in cloud computing, the key technologies of cloud user data privacy protection in cloud computing environment are analyzed in detail, and their advantages and disadvantages are pointed out in paper.
Quantum Secure Communication Based on Stable Subcodes Under Noisy Conditions
2019, 5(12): 1110-1113.
Asbtract
(
)
PDF
(894KB) (
)
References
|
Related Articles
|
Metrics
Since quantum secure communication cannot avoid the influence of noise in the transmission process, there will always be the problems of bit loss and bit reversal after the transmission is completed. In order to solve the problem of error information, stable code was used to encode quantum information, and the information was corrected through the classical calibration matrix of information channel transmission error correction after the completion of the transfer, which overcame the bit flip problem caused by channel noise, the accuracy of quantum information transmission had corresponding improvement, the security of quantum information transmission was also guaranteed, which verified the feasibility and effectiveness of the algorithm.
Research of Internet Application of Electronic Certificate About Project Declaration in Scientific and Technological Fields
2019, 5(12): 1114-1119.
Asbtract
(
)
PDF
(2450KB) (
)
References
|
Related Articles
|
Metrics
Electronic certificate is the primary solution of the internet plus government services in our country, which has been used as a pilot project in some districts. The electronic certificate is applied by using the technology of digital signature and electronic seal in order to ensure the truth and validity of the certificate. The users of the electronic certificate are citizens and legal persons in our country, and it will be used in many internet scenarios. The scenario of project declaration in scientific and technological fields is the typical example of electronic certificate application in the internet era. This paper analyzes the technical framework of electronic certificate. Some technical problems are presented according to the technology, management and application of electronic certificate, especially in internet environment, how to achieve the access security, transmission security and storage security of electronic certificate. An internet application solution combined cryptology technique of electronic certificate is also proposed about project declaration in scientific and technological fields in the last.
Application of Domestic Cryptographic in Rural Credit Cooperatives
2019, 5(12): 1120-1123.
Asbtract
(
)
PDF
(2180KB) (
)
References
|
Related Articles
|
Metrics
This paper constructs a set of cryptogram security system for rural credit cooperatives based on domestic cryptographic algorithm. It transformed general cryptographic algorithm into domestic cryptographic algorithms for the system of corebank, frontbank, online bank, financial IC card and the second generation payment etc., which involved cryptographic applications. It solved the security problems of identity authentication, information integrity, repudiation and so on. It provided a secure and reliable cryptographic guarantee for the rural credit cooperatives. It enhanced selfcontrollable ability of information security core products and system for rural credit cooperatives, and improved the safety and security capability of rural credit cooperatives. It has a great significance to the popularization and application of domestic cryptographic algorithms.
5G Network Security in Depth
2019, 5(12): 1124-1128.
Asbtract
(
)
PDF
(784KB) (
)
References
|
Related Articles
|
Metrics
The high bandwidth, low latency, and large connection features of 5G networks will greatly improve the informatization level of all industries in the whole society. It not only improves the speed and efficiency of communication between people, but also effectively expands the connection level and communication capability between people and things, and between things and things. In addition, 5G network new services, new technologies and massive terminal users pose new challenges to security and user privacy protection.ITU defined three service scenarios: eMBB, mMTC, and URLLC. IoT devices are massive and unattended, posing new challenges to network security management and security defense. In addition, services that require high reliability and high security, such as power distribution control, automatic driving, and remote surgery, involve industrial control systems and life safety systems, bringing more attention to 5G security. To improve the flexibility, scalability, and fast deployment of the communications system and reduce costs, the 5G network architecture will introduce technologies such as core network service-oriented architecture, network slicing, and multi-access edge computing. Based on the flexibility, scalability, and fast deployment of network functions, these technologies bring new challenges to 5G security.
Theoretical Points of Industrial Control System Cyber Security
2019, 5(12): 1129-1132.
Asbtract
(
)
PDF
(693KB) (
)
References
|
Related Articles
|
Metrics
While the Devil Climbs a Post, the Priest Climbs Ten: The Endogenous Security Viewpoint of Industrial Control System
2019, 5(12): 1133-1136.
Asbtract
(
)
PDF
(720KB) (
)
References
|
Related Articles
|
Metrics
Author Center
Online Submission
Instruction
Template
Copyright Agreement
Review Center
Peer Review
Editor Work
Editor-in-Chief
Office Work