A secure and robust scheme for sharing confidential information in IoT systems

L Bu, M Isakov, MA Kinsy - Ad Hoc Networks, 2019 - Elsevier
Abstract In Internet of Things (IoT) systems with security demands, there is often a need to
distribute sensitive information (such as encryption keys, digital signatures, or login …

The application of the methodology for secure cyber–physical systems design to improve the semi-natural model of the railway infrastructure

D Levshun, I Kotenko, A Chechulin - Microprocessors and Microsystems, 2021 - Elsevier
The paper suggests a new methodology for secure cyber–physical systems design. The
proposed methodology consists of two main cycles. The main goal of the first cycle is in …

Applying cheating identifiable secret sharing scheme in multimedia security

Z Ma, Y Ma, X Huang, M Zhang, Y Liu - EURASIP Journal on Image and …, 2020 - Springer
In (k, n) secret sharing scheme, one secret is encrypted into n shares in such a way that only
k or more shares can decrypt the secret. Secret sharing scheme can be extended into the …

Design and verification methodology for secure and distributed cyber-physical systems

D Levshun, A Chechulin, I Kotenko… - 2019 10th IFIP …, 2019 - ieeexplore.ieee.org
The paper considers a new design and verification methodology for secure and distributed
cyber-physical systems, which contain microcontroller-based devices. The key idea of the …

Plaintext recovery attack on 3DES algorithm with different byte keys

J Gong - Journal of Intelligent & Fuzzy Systems, 2020 - content.iospress.com
Aiming at the problem of plaintext recovery attack on 3DES algorithm with different byte
keys, a plaintext recovery method for 3DES algorithm with different byte keys is proposed. In …

Models, algorithms and methodology for design of microcontroller-based physical security systems protected from cyber-physical attacks

D Levshun - 2021 - theses.hal.science
One of the possible ways to ensure the security of microcontroller-based systems is the
implementation of security by design approach. Unfortunately, existing approaches are not …

Методика проектирования и верификации защищенных киберфизических систем

ДС Левшун, АА Чечулин, ИВ Котенко - Вестник Санкт-Петербургского …, 2019 - elibrary.ru
В данной работе описана архитектура новой методики проектирования и верификации
защищенных киберфизических систем, содержащих устройства на основе …

Identity-based group devices authentication scheme for Internet of Things

J Shen, A Wang, L Yan, Y Ren, Q Liu - 11th EAI International Conference …, 2018 - eudl.eu
Internet of things (IoT) is used to provide real-time data collection and analysis of the target
area by the cooperation of low-cost devices. The authentication towards multiple devices …

A practical group authentication scheme for smart devices in IoT

A Wang, J Shen, L Yan, Y Ren, Q Liu - EAI Endorsed Transactions on …, 2018 - eudl.eu
Internet of things (IoT) is used to provide real-time data collection and analysis of the target
area by the cooperation of low-cost devices. The authentication towards multiple devices …

[PDF][PDF] An improved secure data transmission protocol based on d2d for mobile health system [j]

YN Zhang, HB Mu - Journal of Computers, 2019 - csroc.org.tw
Mobile-Health (M-Health) system is a growing field that enables physicians to monitor
remote patients' health status and facilitates the sharing of medical records among medical …