Information Security Technologies in the Decentralized Distributed Networks

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Author(s): Roman Oliynykov, Oleksandr Kuznetsov, Oleksandr Lemeshko, Tamara Radivilova
Series: Lecture Notes on Data Engineering and Communications Technologies, 115
Publisher: Springer
Year: 2022

Language: English
Pages: 314
City: Cham

Preface
About This Book
Contents
Methods of Ensuring Privacy in a Decentralized Environment
1 Introduction
2 Ways to Ensure Privacy in the Blockchain
2.1 Ways to Preserve the Anonymity of the Source of Income
2.2 Principles of Functioning of Other Anonymous Cryptocurrencies. Advantages and Disadvantages
2.3 Attitudes of Governments and Intelligence Services Towards Anonymous Cryptocurrencies
3 Groth16 Protocol for SNARK-Proof as a State-of-the-Art Mathematical Device that Allows to Maintain the Anonymity of Arbitrary Data
3.1 Transition from QAP to R1CS
3.2 Setup Protocol for Groth16
3.3 Construction of Proof for QAP
3.4 SNARK Proof for QAP
3.5 Correctness of SNARK-proof verification
3.6 Simulation (Forgery) of Proof
3.7 Recursive SNARKs
4 Summary
References
Application of Bluetooth, Wi-Fi and GPS Technologies in the Means of Contact Tracking
1 Introduction
2 Functional Purpose of Bluetooth, Wi-Fi and GPS Technologies in the Context of Implementation of Applications for Tracking Contacts
2.1 Advantages and Disadvantages of Using Bluetooth and GPS to Implement Contact Monitoring Applications
3 Analysis and Research of the Use of Bluetooth, Wi-Fi and GPS Technologies in Terms of Implementation of Application Building Protocols for Tracking Contacts
3.1 Exposure Notification Protocol
3.2 PEPP-PT Protocol
3.3 DP-3 T Protocol
4 Example and Comparison of Implementations of Contact Monitoring Applications Adopted at the Level of World Powers
4.1 COVIDSafe (Singapore)
4.2 Stopp Corona (Austria)
4.3 NHS (UK)
4.4 HaMagen (Israel)
4.5 Aarogya Setu (India)
4.6 AsistenciaCovid19 (Spain)
4.7 StayHomeSafe (Hong Kong)
4.8 NZ COVID Tracer (New Zealand)
4.9 VirusRadar (Hungary)
4.10 eRouška (Czech Republic)
4.11 COVID Tracker Ireland (Ireland)
4.12 Apturi Covid (Latvia)
4.13 Immuni (Italy)
4.14 STAYAWAY COVID (Portugal)
4.15 Koronavilkku (Finland)
4.16 SwissCovid (Switzerland)
4.17 TraceTogether (Singapore)
4.18 Comparison of World Applications in Terms of Technologies Used
5 Potential Attacks on Contact Monitoring Apps Using GPS, Bluetooth and Wi-Fi Technologies
5.1 Power Reduction Attacks
5.2 Relay Attack
5.3 Trolling Attacks
5.4 Connection Attacks
5.5 Attack Tracking
6 Summary
References
Analysis and Research of Threat, Attacker and Security Models of Data Depersonalization in Decentralized Networks
1 Introduction
2 Two Models of Attacks on Blockchain
2.1 Attack I
2.2 Attack II
3 Proof-of-Accuracy Consensus Protocol Parameters
3.1 Problem Statement
3.2 Markings, Definitions, and Assumptions
3.3 Defining the Security Boundary for the PoA Protocol
3.4 Selecting the Parameters of the PoA Consensus Protocol and Justifying the Choice
4 Summary
References
Cryptographic Transformations in a Decentralized Blockchain Environment
1 Introduction
2 Homomorphic Encryption
2.1 General Model of Homomorphic Encryption
2.2 Areas of Application
2.3 Partial Homomorphic Encryption
2.4 Fully Homomorphic Encryption
2.5 The Problem of Homomorphic Encryption
3 RingCT
3.1 MLSAG-Signature
3.2 Calculation of Challenges for the Signature
3.3 Pedersen Commitments
3.4 RingCT Simple
3.5 RingCT Full
3.6 Range Proofs
4 Ring Signature
4.1 The Essence of the Ring Signature Algorithm
5 Zero-Disclosure Protocols
5.1 Different Types of Zero Disclosure
5.2 Zk-SNARK
5.3 Zk-STARK
6 I2P—Anonymous Network
7 Summary
References
Statistical and Signature Analysis Methods of Intrusion Detection
1 Introduction
2 Intrusion Detection Systems Approaches
3 Fractal Random Processes and Models
4 Selection of the Optimal Set of Features for Detecting Intrusions
5 A Study of Statistical and Machine Learning Methods of Intrusion Detection
5.1 A Study of Statistical Methods for Analyzing Protocols
5.2 A Study of Behavior Analysis Methods Using Machine Learning
5.3 Simulation Results of Machine Learning Methods
References
Criteria and Indicators of Efficiency of Cryptographic Protection Mechanisms
1 Introduction
2 General Theoretical Information on the Criteria and Indicators for Assessing the Security of Symmetric Cryptocurrencies
2.1 General Criteria for Protection of Promising Block Symmetric Transformations with Respect to Cryptographic Stability
2.2 Special Security Criteria for Promising Block Symmetric Transformation
3 Basic Security Criteria for Hashing Functions for Cryptographic Applications in Pseudo-Random Sequence Generation Algorithms
3.1 Basic Security Criteria for Hash Functions for Cryptographic Applications in Key Installation Protocols
3.2 Basic Security Criteria for Hash Functions for Cryptographic Applications in Data Integrity Control Schemes Without the Use of Shared Secrecy
3.3 Basic Security Criteria for Hash Functions for Cryptographic Applications in Password Authentication Schemes
3.4 Generalization of the Main Criteria and Security Indicators for Hash Functions for Cryptographic Applications
4 Criteria and Indicators for Evaluating the Properties and Quality of Asymmetric Cryptographic Transformations on the Example of Electronic Signature Transformations
5 Evaluation Criteria and Indicators to Ensure the Efficiency, Objectivity of Decision-Making, Depersonalization, Reliability, Availability of Decentralized Storage
6 Summary
References
Methods of Evaluation and Comparative Research of Cryptographic Conversions
1 Introduction
2 Analysis of Contacts Tracking Applications Operating in the World, Regarding the Cryptographic Primitives Used in Them
3 Research of Blockchain Systems on the Used Cryptographic Primitives
4 Development of Methods for Evaluation and Comparative Studies of Block Symmetric Ciphers that Can Be Used for the Implementation of Monitoring Systems
5 Substantiation of Methods of Estimation and Comparative Researches of Hash Functions Which Can Be Applied for Realization of Monitoring Systems
6 Development of Methods for Evaluation and Comparative Studies of Asymmetric Cryptoalgorithms and Key Encapsulation Schemes That Can Be Used for the Implementation of Monitoring Systems
7 Development of Methods for Evaluation and Comparative Studies of Digital Signature Schemes that Can Be Used for the Implementation of Monitoring Systems
8 Substantiation of Evaluation Methods and Comparative Studies of Streaming Encryption Algorithms That Can Be Used for the Implementation of Monitoring Systems
9 Development of Methods for Comparing Algorithms for the Synthesis of Pseudo-random Sequences
References
Cryptographic Mechanisms that Ensure the Efficiency of SNARK-Systems
1 Introduction
2 Mathematical Models of HadesMiMC Block Encryption Algorithm and Poseidon Hash Function
3 Estimates of Cryptographic Security of HadesMiMC Block Encryption Algorithm and Poseidon Hash Function
3.1 Security Estimates of Non-binary HadesMiMC Block Encryption Algorithm Against Differential Cryptanalysis
3.2 Estimates of the Stability of the Nonbinary Block Encryption Algorithm HadesMiMC to Linear Cryptanalysis
4 S-Boxes Selection
5 The Number of Rounds with a Full and Partial Layer of S-Boxes and the Number of Constraints Required to Specify the Cipher
6 Numerical Results for MNT-Compliant Parameters
7 Summary
References
Comparative Analysis of Consensus Algorithms Using a Directed Acyclic Graph Instead of a Blockchain, and the Construction of Security Estimates of Spectre Protocol Against Double Spend Attack
1 Introduction
2 Comparative Analysis of Consensus Protocols on Blockgraphs
2.1 An Overview of the Main Problems that Require Blockchain Scaling
2.2 Review of the Main Consensus Protocols on Blockgraphs
2.3 Access Control Protocols
2.4 Protocols Without Access Control
3 Improvement of the SPECTRE Consensus Protocol and Substantiation of the Resistance of the Obtained Modification to a Double Spend Attack
3.1 Description of the SPECTRE Consensus Protocol
3.2 Description of a Hybrid Attack on the SPECTRE Protocol
3.3 Construction of the Upper Estimate of the Probability of a Hybrid Attack and Determination of the Required Number of Confirmation Blocks
3.4 Numerical Results for the Probability of Success of a Hybrid Attack
4 Summary
References
Models and Methods of Secure Routing and Load Balancing in Infocommunication Networks
1 Introduction
2 Basic Flow-Based Models of Traffic Routing in Infocommunication Networks
2.1 Basic Flow-Based Model of Traffic Routing in Infocommunication Networks Without Packet Loss
3 Quality of Service Ensuring Conditions in the Infocommunication Network
3.1 Service Models of Self-Similar Packet Flows in Infocommunication Networks
3.2 Tensor Generalization of the Infocommunication Network Mathematical Model
4 Classification of Secure Routing Metrics in Infocommunication Network
5 Research of Secure Routing Processes in Infocommunication Network Under Proposed Models and Methods
6 Conclusion
References
The Methods of Data Comparison in Residue Numeral System
1 Introduction
2 The Main Part
3 Conclusions of Research
References
The Data Control in the System of Residual Classes
1 Introduction
2 Method of Successive Subtractions
3 Parallel Subtraction Method
4 The Method of Successive Subtractions with Preliminary Analysis of the Residual of the Controlled Number
5 Parallel Subtraction Method with Preliminary Analysis of Subsequent Symmetric Residuals of the Controlled Number
6 Calculation and Comparative Analysis of the Main Characteristics of the Data Control Methods in the SRC
7 Conclusion
References
Traffic Monitoring and Abnormality Detection Methods for Decentralized Distributed Networks
1 Introduction
2 Intrusions and Attack Classification
3 Internet of Things Architecture
4 Anomaly-Based Network Intrusion Detection System Generic Architecture
5 Parameters that Used to Form Features for Traffic Anomality Detection
5.1 Statistical Parameters Used for Anomality Detection
5.2 Correlation Parameters Used for Anomality Detection
5.3 Informational Parameters Used for Anomality Detection
6 Traffic Abnormality Detection Method
6.1 Features Selection
6.2 Traffic Abnormality Detection Method Testing
7 Traffic Monitoring and Abnormality Detection Methods for Distributed IoT Networks Using Cloud ML-Based IDS Approach
8 Conclusions
References