With the development of technology, Moore's law will come to an end, and scientists are trying to find a new way out in brain-like computing. But we still know very little about how the brain works. ...At the present stage of research, brain-like models are all structured to mimic the brain in order to achieve some of the brain's functions, and then continue to improve the theories and models. This article summarizes the important progress and status of brain-like computing, summarizes the generally accepted and feasible brain-like computing models, introduces, analyzes, and compares the more mature brain-like computing chips, outlines the attempts and challenges of brain-like computing applications at this stage, and looks forward to the future development of brain-like computing. It is hoped that the summarized results will help relevant researchers and practitioners to quickly grasp the research progress in the field of brain-like computing and acquire the application methods and related knowledge in this field.
With the rapid development of the Internet of Vehicles, a large amount of vehicle network data is being generated. The large amount of data presents network communication security challenges. ...Although intrusion detection technology can assist in safeguarding the system from malicious attacks, the substantial data generated within the vehicle network poses time-consuming detection challenges. Thus, we propose an intrusion detection model for the Internet of Vehicles, utilizing Gaussian random incremental principal component analysis (GRIPCA) and optimal weighted extreme learning machine (OWELM). First, we utilize GRIPCA to reduce data redundancy by projecting high-dimensional data into a low-dimensional space, thus reducing storage costs. Then, we utilize the dynamic inertia weight particle swarm optimization (DPSO) to optimize the parameters of the weighted extreme learning machine (WELM) to achieve the best performance. We utilize the NSL-KDD and CIC-IDS-2017 datasets to perform experiments and compare the results with other techniques. The experimental results show the excellence of the proposed model, achieving an accuracy rate of 91.02% on the NSL KDD dataset and 94.67% on the CIC-IDS-2017 dataset.
The proliferation of blockchain technology has resulted in diverse token standards, posing challenges for compatibility, security, and performance in existing cross-chain bridges. This paper ...introduces a novel framework capable of concurrently facilitating fungible token exchange, as well as the processing of both individual and batch non-fungible tokens (NFTs). We deploy token bridges that meet different token standards to support cross-chain staking and unlocking of ERC20, ERC721, and ERC1155. To minimize both waiting times and handling fees, we relocate processes necessitating frequent transactions and verifications to the sidechain. Additionally, we adopt a batch-processing approach for tokens necessitating cross-chain transfers, leveraging payment channels to facilitate efficiency. The system’s reliability is upheld through the validator group. Validators acquire an initial reputation value by making deposits and enhance both their rewards and reputation by successfully completing NFT auction tasks on the sidechain. We use OpenZeppelin’s security library functions to standardize token operations, and carefully design the validator’s reward, punishment, and reputation mechanisms. Our comprehensive contract security audit and system analysis validate our solution’s effectiveness in mitigating common vulnerabilities and internal threats. Implementation and testing with Ethereum and its test network demonstrate substantial reductions in transmission time for key cross-chain token steps by nearly half. Moreover, our framework showcases efficiency and cost-effectiveness with an average gas cost of 693,379.
Ensuring confidentiality of sensitive data is of paramount importance, since data leakage may not only endanger data owners’ privacy, but also ruin reputation of businesses as well as violate various ...regulations like HIPPA and Sarbanes-Oxley Act. To provide confidentiality guarantee, the data should be protected when they are preserved in the personal computing devices (i.e.,
confidentiality during their lifetime
); and also, they should be rendered irrecoverable after they are removed from the devices (i.e.,
confidentiality after their lifetime
). Encryption and secure deletion are used to ensure data confidentiality during and after their lifetime, respectively.
This work aims to perform a thorough literature review on the techniques being used to protect confidentiality of the data in personal computing devices, including both encryption and secure deletion. Especially for encryption, we mainly focus on the novel plausibly deniable encryption (PDE), which can ensure data confidentiality against both a coercive (i.e., the attacker can coerce the data owner for the decryption key) and a non-coercive attacker.
•Policy support and research status of cross-chain technology are illustrated.•Essential cross-chain machanisms and representive cross-chain projects are summarized, and a comparative analysis is ...completed.•Existing problems of cross-chain technology and corresponding solutions are presented.•Development prospects of cross-chain technology at multiple levels are shown.
After years of in-depth development of blockchain, various blockchains with different characteristics and suitable for different application scenarios coexist in large numbers. Due to the isolation of blockchains and the high degree of heterogeneity between chains, value transfer and data communication between existing blockchains are facing unprecedented challenges, and the phenomenon of value isolated island is gradually emerging. The cross-chain technology of blockchain is an important technical means to realize the interconnection of blockchains and improve the interoperability and scalability of blockchains. In this paper, the development and application of blockchain cross-chain technology are studied, the background and significance of cross-chain technology are described, the research status of cross-chain technology is expounded, the current mainstream cross-chain technologies and cross-chain projects are introduced, the mentioned cross-chain technologies and cross-chain projects are analyzed and compared. In addition, this paper also summarizes the difficulties existing in the current cross-chain technology and provides solutions for reference, so as to lead to the discussion of the development trend of cross-chain technology, and finally complete the summary of the research content of the full text and the prospect of cross-chain technology. It is hoped that the relevant summary results can help relevant researchers and practitioners quickly grasp the research progress in the field of blockchain interoperability, and obtain relevant knowledge and application methods in this field.
Display omitted
Electric vehicles (EVs) have rapidly developed over the last decade due to their environmental benefits. As a key component of EVs, electric vehicle chargers are becoming increasingly digital and ...intelligent. However, due to the vast attack surface and the lack of systematic study, EV chargers and charging management cloud platforms are facing cyber security problems. These problems include weak cryptographic mechanisms, insecure data communication, and malicious firmware attacks. Through specific vulnerabilities, attackers can tamper with the data communication or replay network requests between EV chargers and cloud platforms. It will cause threats such as user-level privacy leakage, power fluctuations in the smart grid, and damage to Electric vehicles, damaging public life and property safety. Given the above, this paper proposes a security protection scheme incorporating blockchain, zero trust, and ShangMi cryptographic (SM) algorithms. The scheme uses Hyperledger Fabric for key management and trust evaluation event storage to guarantee the authenticity, non-repudiation, and tamper-proof of keys and events. In addition, zero trust is applied to secure valuable resources and enforce identity and access management (IAM) for accessing entities. We adopt the dynamic trust evaluation method to assess the trustworthiness of accessing entities in real time to implement dynamic authorization. Furthermore, the SM algorithms SM2, SM3, and SM4 are used to protect data confidentiality, integrity, and authenticity. Experimental results demonstrate that our scheme can effectively resist replay and tampering attacks, securing data communication between EV chargers and cloud platforms. And the performance of the cryptographic algorithm, blockchain system, and Secure Sockets Layer (SSL) meets Chinese national and industry standards.
Display omitted
•We propose an EV charger protection schemebased on zero trust, blockchain, and SM algorithms.•A novel zero-trust-based architecture for EV chargers and the cloud platform is presented.•Hyperledger Fabric is used for key management and the support for trust evaluation.•SM algorithms are applied to implement enhanced authentication and data encrypted communication.•A security scheme for OTA updates based on threshold signatures and multi-signatures is designed.
With the maturity of Internet of Vehicles (IoV) technology and blockchain technology, numerous application scenarios have emerged, including urban Internet of Vehicles, Highway Internet of Vehicles, ...and Specific Area Internet of Vehicles. However, the urban Internet of Vehicles systems face data security and operational mode discretization challenges. To address these issues, we propose a data security cross-chain model for the urban Internet of Vehicles. Our model utilizes hash time lock contracts to exchange data between vehicles of the same brand and model but located in different urban areas. It also uses trusted relay chains to facilitate data exchange between vehicles of the same brands but varying models within the same urban area, thus solving the problem of difficult inter-system data exchange in the urban Internet of Vehicles. In the urban Internet of Vehicles, the transmitted data encompasses business and general data, which may have varying sensitivities. To ensure data confidentiality, we propose the HR-CP-ABE algorithm, which extends CP-ABE functionalities by incorporating hierarchical decryption and revocable vehicle attributes. And the fine-grained access control by setting different access tree structures and file access validity periods. This guarantees the confidentiality and security of urban data. Finally, experimental results demonstrate that the proposed model effectively satisfies the standards for cross-chain transactions as outlined in the Evaluation Requirements for Blockchain Application Security Technology(DB43/T 1842–2020) and Evaluation Requirements for Blockchain Network Security Technology(DB43/T 1840–2020). Additionally, our model demonstrates enhanced resilience against man-in-the-middle and replay attacks.
With the development of Medical Internet of Things (MIoT) technology and the global COVID-19 pandemic, hospitals gain access to patients' health data from remote wearable medical equipment. Federated ...learning (FL) addresses the difficulty of sharing data in remote medical systems. However, some key issues and challenges persist, such as heterogeneous health data stored in hospitals, which leads to high communication cost and low model accuracy. There are many approaches of federated distillation (FD) methods used to solve these problems, but FD is very vulnerable to poisoning attacks and requires a centralised server for aggregation, which is prone to single-node failure. To tackle this issue, we combine FD and blockchain to solve data sharing in remote medical system called FedRMD. FedRMD use reputation incentive to defend against poisoning attacks and store reputation values and soft labels of FD in Hyperledger Fabric. Experimenting on COVID-19 radiography and COVID-Chestxray datasets shows our method can reduce communication cost, and the performance is higher than FedAvg, FedDF, and FedGen. In addition, the reputation incentive can reduce the impact of poisoning attacks.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
Conventional encryption solutions cannot defend against a coercive attacker who can capture the device owner, and force the owner to disclose keys used for decrypting sensitive data. To defend ...against such a coercive adversary, Plausibly Deniable Encryption (PDE) was introduced to allow the device owner to deny the very existence of sensitive data. The existing PDE systems built for computing devices equipped with flash storage media, are problematic, since they cannot defend against multi-snapshot adversaries, who may have access to the storage medium of a user's device at different points of time. In this article, we propose MDEFTL, a secure multi-snapshot PDE system for mobile devices which incorporates plausible deniability into Flash Translation Layer (FTL). MDEFTL is the first practical design which integrates multi-snapshot PDE into FTL, a pervasively deployed layer in literally all the current mobile devices. A salient advantage of MDEFTL lies in its capability of achieving multi-snapshot plausible deniability while being able to accommodate the special nature of NAND flash as well as eliminate deniability compromises from it. We implemented MDEFTL using an open-source NAND flash controller. The experimental results show that, compared to conventional encryption which does not provide deniability, our MDEFTL only incurs a small overhead.
Mobile devices today have been increasingly used to store and process sensitive information, and Mobile Device Management (MDM) solution is provided in Android systems to manage the mobile devices. ...MDM solution enforces device policies through calling Device Administration APIs provided in Android system. However, these APIs are usually implemented in user space, thus make the system more vulnerable to be attacked. Potential adversary may bypass these secure policies by breaking through the isolation between processes. In this paper, we propose an approach based on the seccomp mechanism of Linux kernel to enforce device management policies on Android. Seccomp can restrict the system calls of Android process to enforce device management policies in a more secure way. Experiments results demonstrate that our work may work well and incur negligible overhead.