Explore chapters and articles related to this topic
Cryptographic and Consensus Techniques Supporting Privacy and Security Management of Cryptocurrency Transactions
Published in Rajdeep Chakraborty, Anupam Ghosh, Valentina Emilia Bălaş, Ahmed A Elngar, Blockchain, 2023
The digital signature scheme usually includes two parts: a signing process and a verifying process. The signing process produces a digital signature on the message by using the signer's private key which is kept secret. The verifying process verifies the digital signature of the message by using the signer's public key which is distributed to the public. As a result, the individual who has to verify the signature may do so quickly. The digital signature is usually utilized for ensuring authentication, non-repudiation, identity verification, and integrity verification [22]. A digital signature is used to communicate and trust between nodes in a distributed network of blockchains.
On Nonfunctional Requirements
Published in Phillip A. Laplante, Mohamad H. Kassab, Requirements Engineering for Software and Systems, 2022
Phillip A. Laplante, Mohamad H. Kassab
An action taken against a computer system with the intention of doing harm is called an attack and can take a number of forms. It may be an unauthorized attempt to access data or services or to modify data, or it may be intended to deny services to legitimate users. The related concerns that are refined security are typically classified as “security” concerns. These concerns are typically: Confidentiality: The property that reflects the extent to which data and services are only available to those that are authorized to access them.Integrity: It reflects the extent to which data or services can be delivered as intended. This property can also refer to data or services.Non-repudiation: It refers to the ability to guarantee that the sender cannot later repudiate or deny having sent the message. It can also refer to the guarantee that the recipient cannot later deny having received the message.Availability: This is the property that reflects the extent to which the system will be available for legitimate use. A denial-of-service attack is meant to disrupt the availability of a system, and it is a security concern. Availability builds on reliability by adding the notion of recovery (repair). Fundamentally, availability is about minimizing service outage time by mitigating faults.
Introduction to Blockchain and Smart Contract – Principles, Applications, and Security
Published in Bharat Bhushan, Nitin Rakesh, Yousef Farhaoui, Parma Nand Astya, Bhuvan Unhelkar, Blockchain Technology in Healthcare Applications, 2022
Adarsh Singh, Ananya Smirti, Raghav Gupta, Chamitha de Alwis, Anshuman Kalla
Non-repudiation implies that any entity cannot deny/refute any activity once performed and committed on the blockchain [25]. The goal of non-repudiation service is to generate, gather, and preserve the evidence of the performed digital activities so that later the false denials can be proved [26]. In the blockchain, cryptographic techniques such as asymmetric encryption and digital signature enable the realization of non-repudiation [27,28]. Every transaction is digitally signed by the sender before it is pushed to the blockchain platform. Thanks to the non-repudiation property of blockchain technology, neither a sender can deny what it has sent nor a receiver can deny what it has received [27].
Security in Internet of Drones: A Comprehensive Review
Published in Cogent Engineering, 2022
Snehal Samanth, Prema K V, Mamatha Balachandra
Chen et al. have proposed a traceable and privacy-preserving authentication protocol that integrates different concepts like ECC, hash functions, and digital signatures for drone applications. The proposed scheme consists of four entities: A UAV manufacturing company, GCS, a mobile device (player), and TA center. Security analysis shows that mutual authentication happens between different entities in each phase, and BAN logic is used for the proof. Security analysis proves the integrity and confidentiality of the data transmission using ECC and Diffie Hellman algorithms. The use of digital signatures facilitates non-repudiation in the proposed scheme. The proposed scheme’s security analysis shows that it provides privacy and identity anonymity. Security analysis shows that it has the best security features among some existing schemes. However, the proposed scheme has higher overall computation and communication cost compared to that of an existing scheme (C.-L. Chen etal., 2020).
A metaprotocol-based Internet of Things architecture
Published in Automatika, 2022
L. Milić, L. Jelenković, I. Magdalenić
Since most transfer protocols include some security features that are usually optimized for targeted systems, the metaprotocol's security features should be used only rarely, because they may require a significant upgrade in computing power. In any case, the security provided by the metaprotocol includes encryption (digital envelope) and digital signature. Each node has its own private key and the public keys of all other nodes with which secure metaprotocol communication is to take place. These public keys are expected to be manually distributed to the nodes’ configurations prior to communication. If only the digital envelope is used, the attacker cannot eavesdrop, but he can modify messages and provide a false identification. If only the digital signature is used, naturally, the attacker can read the message content but cannot modify it or inject a forged message. When both the digital envelope and the digital signature are used, non-repudiation, privacy, integrity, and authentication are guaranteed (cannot be compromised).
Digital Transformation Security Challenges
Published in Journal of Computer Information Systems, 2023
Digitalization has impacted research on IS/IT strategy development, and several studies on IS/IT strategies have been conducted in the literature, providing various solutions, insights and frameworks that are relevant and useful for practitioners and academics (Arbanas & Hrustek, 2019). Considering the digital age and the high number of cybercrime incidents, several studies have urged organizations to incorporate security into their digital strategy.1 Factors like confidentiality, integrity and non- repudiation, are all fundamental elements in digital transformation security. The term “integrity” refers to the assurance that a communication or transaction has not been tampered with. Non-repudiation establishes the existence of a communication or transaction and assures that its contents cannot be challenged after it has been transmitted.1–4 Digital strategy encompasses both the technical and human activities within an organization and describes how the lifecycle of an organization”s digital strategy practices should be managed. Academics and practitioners have long been concerned about the security of digital strategies, and a survey conducted by the digital association found that cyber-attacks cost overUS $103 billion in 2018/2019, rising to 10.5 trillion US$ by 2025,5 highlighting the impact of cybersecurity on businesses as a whole. These issues show that companies need to recognize and address digital security as a strategic issue, not just an IT issue. In the past, risk management in traditional IS/IT strategy was based on cost structure and higher value, which is different from today’s IS/IT strategy where cybersecurity has become a strategic investment in information and communication technology (ICT)69 and a prerequisite for a company”s long-term sustainability. As a result, there remains a disconnect between risk management efforts and the development of key cybersecurity capabilities. Therefore, a critical assessment of the current state of the art in terms of academic initiatives and practitioner perspectives is required.