Next Article in Journal
A Comprehensive Review on AI-Enabled Models for Parkinson’s Disease Diagnosis
Next Article in Special Issue
ADSAttack: An Adversarial Attack Algorithm via Searching Adversarial Distribution in Latent Space
Previous Article in Journal
Data-Driven Constraint Handling in Multi-Objective Inductor Design
Previous Article in Special Issue
Dynamic Data Integrity Auditing Based on Hierarchical Merkle Hash Tree in Cloud Storage
 
 
Article
Peer-Review Record

Zero-Trust Security Authentication Based on SPA and Endogenous Security Architecture

Electronics 2023, 12(4), 782; https://doi.org/10.3390/electronics12040782
by Mingyang Xu 1, Junli Guo 2,*, Haoyu Yuan 1 and Xinyu Yang 1
Reviewer 1: Anonymous
Reviewer 2:
Electronics 2023, 12(4), 782; https://doi.org/10.3390/electronics12040782
Submission received: 12 January 2023 / Revised: 28 January 2023 / Accepted: 2 February 2023 / Published: 4 February 2023
(This article belongs to the Special Issue Advanced Techniques in Computing and Security)

Round 1

Reviewer 1 Report

This paper proposed to apply the SPA single-package authorization and endogenous security architecture to the zero-trust authentication system, which can realize the reliability, dynamism and diversity of system defense. 

The paper has the following issues:

1. The authors need to add the main findings of the study in the abstract.

2. The authors need to add the main implications in brief of the study in the abstract.

3. The related works is very poor. The authors need to add more recent studies in the cybersecurity. Please cite the following studies:

- Classification of cyber security threats on mobile devices and applications

- Improved security particle swarm optimization (PSO) algorithm to detect radio jamming attacks in mobile networks

- A new scheme for detecting malicious attacks in wireless sensor networks based on blockchain technology

- A new hybrid text encryption approach over mobile ad hoc network

- Cyber security threats in cloud: Literature review

- Cybersecurity in Smart City: A systematic mapping study

4. The authors must add comparison between the results of the proposed system and other systems in the literature. 

The paper can be accepted after performing the above comments.

Author Response

Thank you very much for your suggestion, the relevant response in the document.

Author Response File: Author Response.pdf

Reviewer 2 Report

<div><br class="Apple-interchange-newline">The paper presents an interesting idea, which is very important nowadays. But as a big minus of it, I can mention absolute absence of cryptographic review of such question. In the same time, cryptography lies on the frontier line of such questions.  Need to be made an overview of existing papers, for an example the works of Adi Shamir on zero knowledge proof algorithms, also in the paper when authors talks about authentication, what algorithms are taking into account? </div>

Author Response

Thank you very much for your suggestion, the relevant response in the document.

Author Response File: Author Response.pdf

Round 2

Reviewer 1 Report

All comments have been achieved. No further comments 

Reviewer 2 Report

The papaer can be accepted for the publication.

Back to TopTop