The proceedings contain 32 papers. The special focus in this conference is on networksecurity and Blockchain Technology. The topics include: Exploring the Limits of Classical Random Number Generation and...
ISBN:
(纸本)9789819780501
The proceedings contain 32 papers. The special focus in this conference is on networksecurity and Blockchain Technology. The topics include: Exploring the Limits of Classical Random Number Generation and Unveiling Quantum Alternatives;LWT-Based Watermarking Scheme for Image Authentication;Robust Image Steganography Using DCT, GrabCut, and Quantization;spread-Spectrum Based a New Secured Robust Image Watermarking Scheme;Zero Trust network Access (ZTNA) Architecture: A Novel Perspective to Cloud security;Enhancing Healthcare IoT security: A CCN-Based Approach for FIB Establishment and Content Delivery;cryptanalysis and Countermeasures on Multivariate Cubic Polynomial-Based Digital Signature;Evaluation of Objective Functions of RPL in the Contiki Simulator on Various Radio Models;lattice-Based Authentication Scheme for Smart Agriculture system;lightweight Symmetric Key Exchange Protocols for Enhanced security in Elastic Optical Fiber Communication;Nonlinearity in AES Subkey Scheduling—An Augmented security;Privacy-Preserved Covid and Inter-BAN Communication Status Maintenance with Key and Random Value Update in Blockchain;Secure Sharing of CCTV Feed;some Notes on Deniability, Obfuscation, and Multiparty Computation;blockchain-Based Secured Ration Distribution system;autoBloc: Blockchain-Based Automotive Supply Chain Management;BHealth: A Blockchain-Based Platform for Healthcare Data;design of a Mechanism for the Analysis of Cybersecurity Breaches and Their Ripple Effect on Global Financial Market;Secure Management of Patient Test Data Using Blockchain and IPFS;intrusion Detection system Using Stacked Ensemble Learning with Light Gradient Boosting Machine and Decision Tree;A Post-benchmarking Framework Towards Evaluating and Ranking Deep Learning Models for Breast Cancer Detection Using Hybrid MCDM;case-Based Spam Filtering for Encrypted Emails;designing and Deploying Blockchain with Truffle and Smart Contracts;ESMDP: Encrypted ML Framework for Secure Medical Data Proc
Our everyday lives are getting increasingly connected with the Internet of Things, which presents serious worries about potential cybersecurity threats and the need for trustworthy solutions. Deep learning-based intru...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
Our everyday lives are getting increasingly connected with the Internet of Things, which presents serious worries about potential cybersecurity threats and the need for trustworthy solutions. Deep learning-based intrusion detection can increase the efficacy of the system. However, it is especially difficult to use these models in the Internet of Things. In this work, a lightweight intrusion detection model, using Feedforward Neural network, has been developed. Model compression techniques, such as weight and neuron pruning, are applied to feedforward neural network. Performance evaluations of the baseline intrusion detection model and the proposed model have been conducted. Based on experimental results, the proposed model outperforms the baseline in terms of training time by an average of 93% while exhibiting very little degradation in performance.
Push-to-talk over cellular (PoC) is a multicast half-duplex type of communication. However, modern cryptography faces potential threats posed by quantum computers. The objective of this study is to construct a secure ...
详细信息
As the development of new power systems progresses, the edge side exhibits emerging challenges such as diversified new network services, rapid extensions of access and local networks, and a dramatic increase in the nu...
详细信息
The networks of the Internet of Things are subject to fraudulent traffic now that day by day, the devices deployed are on the rise. We put forward in this paper an attention-enhanced neural network architecture-based ...
详细信息
The Internet of Things (IoT) has revolutionized agriculture by optimizing resource usage and enabling real-time field monitoring, but its widespread adoption brings security challenges. The protection of sensitive agr...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
The Internet of Things (IoT) has revolutionized agriculture by optimizing resource usage and enabling real-time field monitoring, but its widespread adoption brings security challenges. The protection of sensitive agricultural data requires robust authentication mechanisms, especially in the face of emerging quantum technologies that may render traditional security methods inadequate. A solution tailored for smart agriculture systems emerges as a lattice-based authentication scheme (LBSAS). With the leverage of complex mathematical problems like SIS or ISIS, LBSAS offers resilience against quantum attacks, ensuring the security of IoT-driven agricultural systems. The rigorous security analysis validates LB-SAS's effectiveness in safeguarding against quantum threats. In summary, as IoT continues to transform agriculture, implementing resilient security measures such as LB-SAS becomes paramount to mitigate risks and maintain the integrity of agricultural operations amid the increasing connectivity of the digital landscape.
With the promotion of industrial 4.0 and intelligent manufacturing, the networksecurity of industrial control system becomes particularly important. In the face of new network attacks, the traditional intrusion detec...
详细信息
There is a well-known trilemma in the blockchain: "A block-chain system can only at most have two of the following three features: decentralization, scalability, and security." In this article, we propose a ...
详细信息
ISBN:
(纸本)9789819780501;9789819780518
There is a well-known trilemma in the blockchain: "A block-chain system can only at most have two of the following three features: decentralization, scalability, and security." In this article, we propose a healthcare blockchain system for Electronic Health Records (EHRs) with all three features, namely decentralization, security, and scalability. We present a novel model for EHRs sharing that prioritizes all three features using InterPlanetary File system (IPFS) to store patient EHRs. The proposed system protects the privacy of content addresses and enables efficient access revocation by creating a pool on InterPlanetary Naming system (IPNS). In addition, the proposed system modifies the mapping whenever the patient revokes access of any doctor's address. The proposed system allows healthcare providers to add patients' EHRs after the patient's approval. The patient's approval ensures the authenticity and integrity of the patient's EHRs while sharing with other healthcare providers. As a result, the proposed system effectively addresses privacy concerns, enables access revocation, and ensures the authenticity and integrity of patient EHRs, thus offering a robust solution for secure and efficient EHRs sharing in the healthcare domain achieving all three features: decentralization, security, and scalability.
The research combines Deep Q-Learning(DQN) with a Mininet-based network simulation and Scapy intrusions detection system (IDS) for malicious traffic prioritizing. The RL agent continuously learns to act based on real-...
详细信息
Due to the limitations of their hardware and software capabilities, traditional industrial devices often cannot support new security features, thus creating potential security vulnerabilities and often proving inadequ...
详细信息
暂无评论