Page 4 - Threat Modeling News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Threat modeling. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Threat Modeling Today - Breaking & Trending Today

"VRBC: A Verifiable Redactable Blockchain with Efficient Query and Inte" by Guohua Tian, Jianghong Wei et al.

Driven by various legal obligations and service requirements, the redactable blockchain was introduced to balance the modifiability and immutability of blockchain technology. However, such a blockchain inevitably generates one or even more acceptable versions for the same block data, enabling malicious full nodes to deceive light/new nodes with old data, and even disrupt the consistency of the blockchain ledger. In this paper, we introduce the concept of verifiable redactable blockchain (VRBC) to provide efficient validity verification for on-chain data. To this end, we design a novel authentication data structure, called blockchain authentication tree (BAT), which employs a chameleon hash function and aggregatable vector commitment to bind continuously-appended blocks. Based on this, we propose an efficient VRBC scheme supporting integrity auditing, which not only allows the light nodes to query and validate on-chain data, but also enables new nodes to check the integrity of the block ....

Lockchain Authentication Tree , Hameleon Hash Function , Data Structures , Hash Functions , Integrity Auditing , Threat Modeling , Erifiable Redactable Blockchain ,

O-RAN Fronthaul Security using MACsec

With 5G being deployed for time-sensitive applications, security is becoming an important consideration. At the same time, Open Radio Access Networks (RAN) are gaining more interest from mobile carriers and governments. Yet, Open RAN networks have serious security challenges, especially in the RAN fronthaul where there are strict timing requirements. This paper proposes MACsec as an efficient data link layer security solution that can assist in meeting these challenges. ....

Macsec Secys , Comcores Macsec , Bip Solutions , Reliable Low Latency Communications , Service Data Unit , Alliance Open Fronthaul , G Networks , Type Communications , Connectivity Association , Association Key , Radio Access Networks , Telecom Infra Project , Security Work Group , Network Protocol , Alliance Security Specifications , Security Focus Group , Cooperation Group , Denial Of Service Do , Information Association Number , Macsec Connectivity Association , Interface Network Configuration Access Control Model , Office For Information Security , Connectivity Association Key , Open Radio Access Networks , Long Term Evolution , Machine Type Communications ,