29 research outputs found

    Toward Data Transmission Security Based on Proxy Broadcast Re-encryption in Edge Collaboration

    Full text link
    With the development of IoT, more and more data is offloaded from the cloud to the edge for computing, eventually forming a collaborative computing model at the edge. However, in this model, the problem of secure data transmission has not been solved. In this model, data is transmitted and forwarded in multiple messaging systems, and existing security schemes cannot achieve end-to-end security in a multi-hop, broadcast transmission model. Therefore, in this paper, we propose a new security scheme based on proxy re-encryption and broadcast encryption techniques. Moreover, the performance and security of the scheme are further enhanced by using online-offline techniques and a trusted execution environment when integrating the scheme with edge collaboration. Finally, this paper proves the security of the scheme in theory, compares the functionality of the scheme, analyzes the theoretical performance of the scheme, and finally measures the actual performance of the scheme in the edge collaboration system

    Authentication and Key Agreement Based on Anonymous Identity for Peer-to-Peer Cloud

    Full text link
    Cross-cloud data migration is one of the prevailing challenges faced by mobile users, which is an essential process when users change their mobile phones to a different provider. However, due to the insufficient local storage and computational capabilities of the smart phones, it is often very difficult for users to backup all data from the original cloud servers to their mobile phones in order to further upload the downloaded data to the new cloud provider. To solve this problem, we propose an efficient data migration model between cloud providers and construct a mutual authentication and key agreement scheme based on elliptic curve certificate-free cryptography for peer-to-peer cloud. The proposed scheme helps to develop trust between different cloud providers and lays a foundation for the realization of cross-cloud data migration. Mathematical verification and security correctness of our scheme is evaluated against notable existing schemes of data migration, which demonstrate that our proposed scheme exhibits a better performance than other state-of-the-art scheme in terms of the achieved reduction in both the computational and communication cost

    Additive-Free Hydrogen Generation from Formic Acid Boosted by Amine-Functionalized Imidazolium-Based Ionic Polymers

    No full text
    Catalytic dehydrogenation of formic acid (FA) is an efficient approach to store and release hydrogen in fuel-cell-based hydrogen economy; it is still a daunting challenge to the design and synthesis of the additive-free heterogeneous catalytic systems. In this contribution, we present an amine-functionalized main-chain imidazolium-based ionic polymer (ImIP-1) for boosting additive-free hydrogen generation from FA. The ultrafine palladium nanoparticles (NPs) with uniform dispersion over ImIP-1 were readily obtained through simple anion exchange between chloride in ImIP-1 and tetrachloropalladate and subsequent reduction with NaBH<sub>4</sub>. The palladium NPs are synergetically stabilized by coordination interaction and electrostatic effect from ImIP-1. The amine groups in the host backbone of ImIP-1 serve as basic sites to accelerate the cleavage of O–H bond in FA. The catalytic system shows outstanding catalytic activity, high stability, and excellent recyclability in additive-free heterogeneous FA dehydrogenation under mild conditions. The initial TOF values at 50 and 25 °C are as high as 1593 and 356 h<sup>–1</sup>, respectively, which are 10 times higher than those in its counterpart without amine groups. The impressive catalytic performance ranks it among the state-of-the-art of those in heterogeneous catalytic systems based on supported palladium NPs

    Chaotic Map-Based Authentication Scheme Using Physical Unclonable Function for Internet of Autonomous Vehicle

    Full text link
    Autonomous Vehicles (AVs) are a highly discussed topic owing to their great performance and convenience. However, some requirements limit their wider deployment. Specifically, AV should be controlled by remote users during emergencies. It may lead to AV's system facing the risk of being intruded on by a malicious party, resulting in unreasonable decisions. We, therefore, design the Internet of autonomous vehicle (IoAV) model to mitigate the problems arising from these limitations. To promote a secure remote control of the AV, a reliable authentication scheme, which can be used in IoAV, must be performed. Our proposed chaotic map-based authenticated key agreement (CMAKA) method provides secure remote control features for AVs. In this method, users, data centers, and AV establish a secure communication channel through the negotiation of three independent session keys. Furthermore, a physical unclonable function (PUF) is employed to produce a trusted private key during the authentication. The security of our scheme is evaluated using game hopping through the widespread Real-or-Random (ROR) model. Compared with other existing three-factor authentication schemes, the performance of our protocol is higher in both security requirements and total cost

    Dual Modification of Stainless Steel by Small Molecule Oxalic Acid for Oxygen Evolution Reaction

    No full text
    A electrocatalyst with low cost and high performance is the key to achieve the industrial application of hydrogen energy. In this work, inexpensive commercial stainless steel is modified by a simple hydrothermal method. For the first time, surface corrosion modification and active substance loading are realized simultaneously with small-molecule oxalic acid. Compared with 304-type stainless steel mesh (SSM-304), the overpotential of the sample after two-step treatment (noted as OESSM) is largely decreased (125 mV), and exceptional stability (48 h) is achieved. In acidic hydrothermal corrosion, the metal on the surface of stainless steel is eroded into the solution. Then, the C2O42– recomplexes with the dissolved metal ions, and the oxalate is grown on the surface. The excellent catalytic activity and stability come from the unique framework structure of the metal oxalate crystals. Oxalic acid is widely available and with double carboxyl group in C2O42–. The electrons enriched in CO can enhance the adsorption energy on the catalyst surface and induce the production of active catalytic sites *OOH. In addition, the oxalate crystal framework provides critical support for maintaining positive catalytic activity and stability. This work creates the possibility of realizing the large-scale application of stainless steel-based electrocatalysts in actual production

    An Extensible and Effective Anonymous Batch Authentication Scheme for Smart Vehicular Networks

    Full text link
    In recent years, research on the security of Industry 4.0 and the Internet of Things (IoT) has attracted close attention from industry, government and the scientific community. Smart vehicular networks, as a type of industrial IoT, inevitably exchange large amounts of security and privacy-sensitive data, which make them attractive targets for attackers. For protecting network security and privacy, we have proposed an extensible and effective anonymous batch authentication scheme. In contrast to traditional pseudonym authentication schemes, the same system private key need not to be preloaded in our scheme, effectively avoiding a system failure when destroying a vehicle. Besides, the certificate revocation list (CRL) size is merely related to the number of vehicles that have been revoked, regardless of the number of pseudonym certificates for revoked vehicles. Moreover, this scheme maintains the effectiveness of the traditional scheme, effectively reduces the scale of the CRL, and employs an identity revocation scheme that supports rapid distribution. The scheme supports conditional privacy protection, namely, only the trusted authority (TA) can uniquely trace and revoke vehicles. For illegal vehicles, the TA releases the two hashed seeds to facilitate traceability by all entities in its domain. Furthermore, security analysis indicates that our solution is secure under the random oracle model and fulfills a series of security requirements of vehicular networks. Compared to existing authentication schemes, performance evaluations show that the scheme offers relatively good performance in terms of time consumption.</ul

    SMAKA: Secure Many-to-Many Authentication and Key Agreement Scheme for Vehicular Networks

    Full text link
    With the rising popularity of the Internet and communication technology, vehicles can analyze and judge the real-time data collected by various cloud service providers (CSPs) in a vehicular network. However, in a vehicular network environment, real-time data are transmitted via wireless channels, which can lead to security and privacy issues. To avoid illegal access by adversaries, vehicle authentication and key agreement mechanism has been considered as one of the promising security measures in vehicular network environments. Besides, most of the solutions focus on authentication between one vehicle and one CSP. In such strategies, the implementation of efficient authentication for multiple vehicles and CSPs simultaneously is usually challenging. Further, they are also subjected to performance limitations due to the overhead incurred. To solve these issues, we propose a many-to-many authentication and key agreement scheme for secure authentication between multiple vehicles and CSPs. The proposed scheme can prevent unauthorized access and provide SK-security even if temporary information is leaked. To improve the service, the CSP only needs to broadcast an anonymous message periodically instead of having to generate a unique anonymous message for each of vehicles. Similarly, when a vehicle wants to request the services of m CSPs, it only needs to send one request message instead of m . Therefore, the proposed scheme not only implements many-to-many communication but also significantly reduces the computation and communication overhead. Moreover, a thorough security analysis shows that the proposed scheme provides better security compared to other related schemes

    Intelligent Drone-assisted Anonymous Authentication and Key Agreement for 5G/B5G Vehicular Ad-Hoc Networks

    Full text link
    Drones (or unmanned aerial vehicles) can play many assistant roles in the complex communication network, and can be used as an air relay node to support ground communications. It is expected to solve the sustainable communication problem of 5G/ beyond 5G (B5G) vehicular ad-hoc networks by using drones in rural or mountainous areas where communication is limited. In this paper, considering the emergency of vehicular ad-hoc networks, we design an assistant communication scheme based on the intelligent drone to help vehicles securely communicate with each other under adversary but actual conditions. Besides, the real identity of the vehicle must also be protected to prevent illegal elements from obtaining, and using them for crimes. To effectively assist vehicle communication, and ensure that vehicle privacy is not compromised, we propose an intelligent drone-assisted anonymous authentication, and key agreement for 5G/B5G vehicular ad-hoc networks. Utilizing the widely-used Real-Or-Random (ROR) model, and the formal security analysis, the proposed scheme is proven to be resistant to several attacks. Moreover, the proposed scheme has better performance in terms of computation overhead, and communication overhead through performance evaluation

    Reliable and Efficient Content Sharing for 5G-Enabled Vehicular Networks

    Full text link
    Conditional privacy preservation and message authentication serve as the primary research issues in terms of security in vehicular networks. With the arrival of 5G era, the downloading speed of network services and the message transmission speed have significantly improved. Consequently, the content exchanged by users in vehicular networks is not limited to traffic information, and vehicles moving at high speeds can share a wide variety of contents. However, sharing content reliably and efficiently remains challenging owing to the fast-moving character of vehicles. To solve this problem, we propose a reliable and efficient content sharing scheme in 5G-enabled vehicular networks. The vehicles with content downloading requests quickly filter the adjacent vehicles to choose capable and suitable proxy vehicles and request them for content services. Thus, the purpose of obtaining a good hit ratio, saving network traffic, reducing time delay, and easing congestion during peak hours can be achieved. The security analysis indicates that the proposed scheme meets the security requirements of vehicular networks. Our cryptographic operations are based on the elliptic curve, and finally, the proposed scheme also displays favorable performance compared to other related schemes

    Broadcast Encryption Scheme for V2I Communication in VANETs

    Full text link
    Information dissemination in vehicular ad hoc networks (VANETs) is inseparable from the interaction between vehicles and infrastructure. The trust authority (TA) often plays a pivotal role in VANETs and requires interaction with multiple vehicles. However, when the TA sends the same message to multiple vehicles, there are many redundancies, as it needs to negotiate with each vehicle and send them different ciphertexts. This greatly reduces the work efficiency of the TA. To the best of our knowledge, there is no research on the problem of redundancy that occurs when the same message is sent to multiple vehicles in VANETs. The proposed scheme adopts identity-based broadcast encryption (IBBE) technology, which is a secure data-sharing scheme suitable for the vehicle-to-infrastructure communication mode, in VANETs for the first time. Thus, with only one encryption, the TA can generate a fixed-length ciphertext for a group of vehicles. When there are new vehicles that subsequently request a service, the TA can assign encryption tasks to the proxy server. In terms of security, our scheme meets the particular requirements of VANETs. The encryption overhead of the sender and the length of the ciphertext were comparatively analyzed. The results demonstrated that the performance of the scheme improved significantly. Thus, our scheme can prevent redundancies and effectively improve the work efficiency of TA
    corecore