scispace - formally typeset
Search or ask a question
JournalISSN: 1939-0122

Security and Communication Networks 

Hindawi Publishing Corporation
About: Security and Communication Networks is an academic journal published by Hindawi Publishing Corporation. The journal publishes majorly in the area(s): Computer science & Encryption. It has an ISSN identifier of 1939-0122. It is also open access. Over the lifetime, 4686 publications have been published receiving 41605 citations. The journal is also known as: Security & communication networks.


Papers
More filters
Journal ArticleDOI
TL;DR: FairAccess is introduced as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data in IoT.
Abstract: Security and privacy are huge challenges in Internet of Things (IoT) environments, but unfortunately, the harmonization of the IoT-related standards and protocols is hardly and slowly widespread. In this paper, we propose a new framework for access control in IoT based on the blockchain technology. Our first contribution consists in providing a reference model for our proposed framework within the Objectives, Models, Architecture and Mechanism specification in IoT. In addition, we introduce FairAccess as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data. To implement our model, we use and adapt the blockchain into a decentralized access control manager. Unlike financial bitcoin transactions, FairAccess introduces new types of transactions that are used to grant, get, delegate, and revoke access. As a proof of concept, we establish an initial implementation with a Raspberry PI device and local blockchain. Finally, we discuss some limitations and propose further opportunities. Copyright © 2017 John Wiley & Sons, Ltd.

550 citations

Journal ArticleDOI
TL;DR: In this paper, the privacy issues in the Internet of Things are analyzed in detail, pointing out the challenges that need to be overcome to ensure that the internet of Things becomes a reality.
Abstract: The Internet of Things paradigm envisions the pervasive interconnection and cooperation of smart things over the current and future Internet infrastructure. The Internet of Things is, thus, the evolution of the Internet to cover the real world, enabling many new services that will improve people's everyday lives, spawn new businesses, and make buildings, cities, and transport smarter. Smart things allow indeed for ubiquitous data collection or tracking, but these useful features are also examples of privacy threats that are already now limiting the success of the Internet of Things vision when not implemented correctly. These threats involve new challenges such as the pervasive privacy-aware management of personal data or methods to control or avoid ubiquitous tracking and profiling. This paper analyzes the privacy issues in the Internet of Things in detail. To this end, we first discuss the evolving features and trends in the Internet of Things with the goal of scrutinizing their privacy implications. Second, we classify and examine privacy threats in this new setting, pointing out the challenges that need to be overcome to ensure that the Internet of Things becomes a reality. Copyright © 2013 John Wiley & Sons, Ltd.

301 citations

Journal ArticleDOI
TL;DR: This paper presents a learning-based steganalysis/detection method to attack spatial domain least significant bit LSB matching steganography in grayscale images, which is the antetype of many sophisticated steganographic methods.
Abstract: This paper presents a learning-based steganalysis/detection method to attack spatial domain least significant bit LSB matching steganography in grayscale images, which is the antetype of many sophisticated steganographic methods. We model the message embedded by LSB matching as the independent noise to the image, and theoretically prove that LSB matching smoothes the histogram of multi-order differences. Because of the dependency among neighboring pixels, histogram of low order differences can be approximated by Laplace distribution. The smoothness caused by LSB matching is especially apparent at the peak of the histogram. Consequently, the low order differences of image pixels are calculated. The co-occurrence matrix is utilized to model the differences with the small absolute value in order to extract features. Finally, support vector machine classifiers are trained with the features so as to identify a test image either an original or a stego image. The proposed method is evaluated by LSB matching and its improved version "Hugo". In addition, the proposed method is compared with state-of-the-art steganalytic methods. The experimental results demonstrate the reliability of the new detector. Copyright © 2013 John Wiley & Sons, Ltd.

288 citations

Journal ArticleDOI
TL;DR: This paper considers the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them, and presents Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application provider policy.
Abstract: Smartphones are now ubiquitous. However, the security requirements of these relatively new systems and the applications they support are still being understood. As a result, the security infrastructure available in current smartphone operating systems is largely underdeveloped. In this paper, we consider the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them. We present Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application provider policy. An in-depth description of the semantics of application policy is presented. The architecture and technical detail of Saint are given, and areas for extension, optimization, and improvement are explored. We demonstrate through a concrete example and study of real-world applications that Saint provides necessary utility for applications to assert and control the security decisions on the platform. Copyright © 2012 John Wiley & Sons, Ltd.

250 citations

Journal ArticleDOI
TL;DR: This paper aims to shed light on SDN related issues and give insight into the challenges facing the future of this revolutionary network model, from both protocol and architecture perspectives, and present different existing solutions and mitigation techniques that address SDN scalability, elasticity, dependability, reliability, high availability, resiliency, security, and performance concerns.
Abstract: With the advent of cloud computing, many new networking concepts have been introduced to simplify network management and bring innovation through network programmability. The emergence of the software-defined networking (SDN) paradigm is one of these adopted concepts in the cloud model so as to eliminate the network infrastructure maintenance processes and guarantee easy management. In this fashion, SDN offers real-time performance and responds to high availability requirements. However, this new emerging paradigm has been facing many technological hurdles; some of them are inherent, while others are inherited from existing adopted technologies. In this paper, our purpose is to shed light on SDN related issues and give insight into the challenges facing the future of this revolutionary network model, from both protocol and architecture perspectives. Additionally, we aim to present different existing solutions and mitigation techniques that address SDN scalability, elasticity, dependability, reliability, high availability, resiliency, security, and performance concerns. Copyright © 2017 John Wiley & Sons, Ltd.

234 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2023232
20221,403
2021715
2020245
2019199
2018290