Idology and Its Applications in Public Security and Network Security

被引:1
|
作者
Su, Shenghui [1 ,3 ]
Zheng, Jianhua [2 ]
Lu, Shuwang [2 ,5 ]
Huang, Zhiqiu [3 ]
Li, Zhoujun [4 ]
Tang, Zhenmin [1 ]
机构
[1] Nanjing Univ Sci & Technol, Secur Innovat Ctr, Nanjing 210094, Jiangsu, Peoples R China
[2] Univ Chinese Acad Sci, Lab Informat Secur, Beijing 100039, Peoples R China
[3] Nanjing Univ Aeronaut & Astronaut, Coll Comp, Nanjing 211106, Jiangsu, Peoples R China
[4] Beihang Univ, Sch Comp, Beijing 100191, Peoples R China
[5] BFID Corp, Lab Computat Complex, Beijing 100098, Peoples R China
来源
INTELLIGENCE AND SECURITY INFORMATICS (PAISI 2017) | 2017年 / 10241卷
关键词
Idology; Symmetric identity; Asymmetric identity; Identification; Anti-fraud; Digital signature; Hash function; United verification platform; KEY CRYPTOSYSTEM; ANTI-FORGERY; SIGNATURES;
D O I
10.1007/978-3-319-57463-9_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fraud (swindling money, property, or authority by fictionizing, counterfeiting, forging, or imitating things, or by feigning persons privately) forms its threats against public security and network security. Anti-fraud is essentially the identification of a person or thing. In this paper, the authors first propose the concept of idology - a systematic and scientific study of identifications of persons and things, and give the definitions of a symmetric identity and an asymmetric identity. Discuss the converting symmetric identities (e.g., fingerprints) to asymmetric identities. Make a comparison between a symmetric identity and an asymmetric identity, and emphasize that symmetric identities cannot guard against inside jobs. Compare asymmetric RFIDs with BFIDs, and point out that a BFID is lightweight, economical, convenient, and environmentalistic, and more suitable for the anti-counterfeit and source tracing of consumable merchandise such as food, drugs, and cosmetics. The authors design the structure of a united verification platform for BFIDs and the composition of an identification system, and discuss the wide applications of BFIDs in public security and network security - antiterrorism and dynamic passwords for example.
引用
收藏
页码:129 / 149
页数:21
相关论文
共 50 条
  • [41] ON DHCP SECURITY
    Dinu, Dumitru Daniel
    Togan, Mihai
    Bica, Ion
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2017, 18 : 403 - 412
  • [42] Technical solution for sensitive datum security in network tendering purchasing system
    Wang Xiuyan
    ADVANCES IN MANAGEMENT OF TECHNOLOGY, PROCEEDINGS, 2006, : 300 - 304
  • [43] Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding
    Cheng, Chi
    Lee, Jemin
    Jiang, Tao
    Takagi, Tsuyoshi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (05) : 993 - 1002
  • [44] Securing industry-wide EPCglobal Network with WS-Security
    Shih, DH
    Sun, PL
    Lin, BS
    INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2005, 105 (07) : 972 - 996
  • [45] Automated peer-to-peer security-update propagation network
    Tamin, Zakiya M.
    PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 555 - +
  • [46] A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security
    Su, Shenghui
    Lu, Shuwang
    Xu, Maozhi
    COMPUTING AND COMBINATORICS, 2015, 9198 : 674 - 686
  • [47] Attack-Tolerant Security Model for WS-Security
    Jesudoss, A.
    Subramaniam, N. P.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1536 - 1540
  • [48] Revisited-The Subliminal Channel in Blockchain and Its Application to IoT Security
    Chen, Tzung-Her
    Lee, Wei-Bin
    Chen, Hsing-Bai
    Wang, Chien-Lung
    SYMMETRY-BASEL, 2021, 13 (05):
  • [49] Enhance the Security in Smart Home Applications based on IOT-CoAP protocol
    Halabi, Dana
    Hamdan, Salam
    Almajali, Sufyan
    2018 SIXTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION, NETWORKING, AND WIRELESS COMMUNICATIONS (DINWC), 2018, : 81 - 85
  • [50] IoT Devices Modular Security Approach Using Positioning Security Engine
    Etibou, Jean G. V.
    Pierre, Samuel
    IEEE ACCESS, 2024, 12 : 147659 - 147670