Idology and Its Applications in Public Security and Network Security

被引:1
|
作者
Su, Shenghui [1 ,3 ]
Zheng, Jianhua [2 ]
Lu, Shuwang [2 ,5 ]
Huang, Zhiqiu [3 ]
Li, Zhoujun [4 ]
Tang, Zhenmin [1 ]
机构
[1] Nanjing Univ Sci & Technol, Secur Innovat Ctr, Nanjing 210094, Jiangsu, Peoples R China
[2] Univ Chinese Acad Sci, Lab Informat Secur, Beijing 100039, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp, Nanjing 211106, Jiangsu, Peoples R China
[4] Beihang Univ, Sch Comp, Beijing 100191, Peoples R China
[5] BFID Corp, Lab Computat Complex, Beijing 100098, Peoples R China
来源
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017) | 2017年 / 10241卷
关键词
Idology; Symmetric identity; Asymmetric identity; Identification; Anti-fraud; Digital signature; Hash function; United verification platform; KEY CRYPTOSYSTEM; ANTI-FORGERY; SIGNATURES;
D O I
10.1007/978-3-319-57463-9_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fraud (swindling money, property, or authority by fictionizing, counterfeiting, forging, or imitating things, or by feigning persons privately) forms its threats against public security and network security. Anti-fraud is essentially the identification of a person or thing. In this paper, the authors first propose the concept of idology - a systematic and scientific study of identifications of persons and things, and give the definitions of a symmetric identity and an asymmetric identity. Discuss the converting symmetric identities (e.g., fingerprints) to asymmetric identities. Make a comparison between a symmetric identity and an asymmetric identity, and emphasize that symmetric identities cannot guard against inside jobs. Compare asymmetric RFIDs with BFIDs, and point out that a BFID is lightweight, economical, convenient, and environmentalistic, and more suitable for the anti-counterfeit and source tracing of consumable merchandise such as food, drugs, and cosmetics. The authors design the structure of a united verification platform for BFIDs and the composition of an identification system, and discuss the wide applications of BFIDs in public security and network security - antiterrorism and dynamic passwords for example.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [1] Network discovery and its security applications
    Storey, Dominic
    Network Security, 2007, 2007 (03) : 15 - 18
  • [2] Simulation aspects of security with regard to applications using public network protocols
    Iwu, FO
    Zobel, RN
    MODELLING AND SIMULATION 2001, 2001, : 524 - 528
  • [3] Attack distribution modeling and its applications in sensor network security
    Chen, Xiangqian
    Makki, Kia
    Yen, Kang
    Pissinou, Niki
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2008,
  • [4] Public Safety Network Security Considerations
    McGee, Andrew R.
    Coutiere, Matthieu
    Palamara, Maria E.
    BELL LABS TECHNICAL JOURNAL, 2012, 17 (03) : 79 - 86
  • [5] General structure of network security protocol and the analysis of its security
    Xie, Dongqing
    Li, Chao
    Zhou, Zhouyi
    Hunan Daxue Xuebao/Journal of Hunan University Natural Sciences, 2000, 27 (02): : 90 - 94
  • [6] Cross-Layer Device Fingerprinting and Its Applications to Network Security
    Xue, Li
    Obraczka, Katia
    Rezki, Zouheir
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 5253 - 5258
  • [7] EMS network security applications of the future
    Jamniczky, L
    IEEE COMPUTER APPLICATIONS IN POWER, 1996, 9 (02): : 42 - 46
  • [8] Applications of Visualization Technology for Network Security
    Tang Haina
    Han Chunjing
    Ge Jingguo
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 1038 - 1042
  • [9] Applications and techniques in information and network security
    Abawajy, Jemal H.
    Islam, Rafiqul
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (23):
  • [10] Network Architectures, Security, and Applications: An Introduction
    Grzenda, Maciej
    Furtak, Janusz
    Legierski, Jaroslaw
    Awad, Ali Ismail
    ADVANCES IN NETWORK SYSTEMS: ARCHITECTURES, SECURITY, AND APPLICATIONS, 2017, 461 : 1 - 10