
Citation: Chia-Hao Hsieh, Wei-Chi Chen, Sheng-Hsiung Yang, Yu-Chiang Chao, Hsiao-Chin Lee, Chia-Ling Chiang, Ching-Yi Lin. A simple route to linear and hyperbranched polythiophenes containing diketopyrrolopyrrole linking groups with improved conversion efficiency[J]. AIMS Materials Science, 2017, 4(4): 878-893. doi: 10.3934/matersci.2017.4.878
[1] | Avner Neubauer, Shira Yochelis, Gur Mittelman, Ido Eisenberg, Yossi Paltiel . Simple down conversion nano-crystal coatings for enhancing Silicon-solar cells efficiency. AIMS Materials Science, 2016, 3(3): 1256-1265. doi: 10.3934/matersci.2016.3.1256 |
[2] | Aruna P. Wanninayake, Shengyi Li, Benjamin C. Church, Nidal Abu-Zahra . Electrical and optical properties of hybrid polymer solar cells incorporating Au and CuO nanoparticles. AIMS Materials Science, 2016, 3(1): 35-50. doi: 10.3934/matersci.2016.1.35 |
[3] | Wei-Chi Chen, Pin-Yao Chen, Sheng-Hsiung Yang . Solution-processed hybrid light emitting and photovoltaic devices comprising zinc oxide nanorod arrays and tungsten trioxide layers. AIMS Materials Science, 2017, 4(3): 551-560. doi: 10.3934/matersci.2017.3.551 |
[4] | Silvia Colodrero . Conjugated polymers as functional hole selective layers in efficient metal halide perovskite solar cells. AIMS Materials Science, 2017, 4(4): 956-969. doi: 10.3934/matersci.2017.4.956 |
[5] | Katrin Gossen, Marius Dotter, Bennet Brockhagen, Jan Lukas Storck, Andrea Ehrmann . Long-term investigation of unsealed DSSCs with glycerol-based electrolytes of different compositions. AIMS Materials Science, 2022, 9(2): 283-296. doi: 10.3934/matersci.2022017 |
[6] | Aruna P. Wanninayake, Benjamin C. Church, Nidal Abu-Zahra . Effect of ZnO nanoparticles on the power conversion efficiency of organic photovoltaic devices synthesized with CuO nanoparticles. AIMS Materials Science, 2016, 3(3): 927-937. doi: 10.3934/matersci.2016.3.927 |
[7] | Andrea Ehrmann, Tomasz Blachowicz . Recent coating materials for textile-based solar cells. AIMS Materials Science, 2019, 6(2): 234-251. doi: 10.3934/matersci.2019.2.234 |
[8] | Yong X. Gan . A review of electrohydrodynamic casting energy conversion polymer composites. AIMS Materials Science, 2018, 5(2): 206-225. doi: 10.3934/matersci.2018.2.206 |
[9] | Etsana Kiros Ashebir, Berhe Tadese Abay, Taame Abraha Berhe . Sustainable A2BⅠBⅢX6 based lead free perovskite solar cells: The challenges and research roadmap for power conversion efficiency improvement. AIMS Materials Science, 2024, 11(4): 712-759. doi: 10.3934/matersci.2024036 |
[10] | Ha Thanh Tung, Ho Kim Dan, Dang Huu Phuc . Effect of the calcination temperature of the FTO/PbS cathode on the performance of a quantum dot-sensitized solar cell. AIMS Materials Science, 2023, 10(3): 426-436. doi: 10.3934/matersci.2023023 |
With the increasing demand for supporting mobile device printing, network printers that support mobile functions such as WiFi direct connection, NFC printing and cloud printing have gradually become indispensable electronic devices in people's daily life and office. Schools, government departments, hospitals and other units and institutions all use printers. From a security perspective, as printing devices are deployed on internal networks, they can directly access various sensitive information, so their security is more important. However, due to its unique functionality, people often overlook its security, resulting in many printer security issues and a gradual increase in security incidents [1,2]. For example, a high school hacker from the UK, Stackoverflow, claimed to have used printer vulnerabilities to control over 150,000 printers. He attempted to directly transmit RAW protocol print jobs through port 9100 using printer process daemon (LPD) and Internet Printing Protocol (IPP), bypassing identity authentication. He also revealed that he had discovered an 0Day remote execution vulnerability (RCE) on Xerox's printer web management page. Columbia University researchers have found that a feature called "Remote Firmware Update" on some HP laser printers allows hackers to fully control the printer after installing malicious software on the machine, transmit printed files back to the hacker's computer, stop the printer from working and even cause the fixing device on the printer that heats and pressurizes the toner to continue heating until it catches fire. Now, someone has successfully invaded a printer connected to a public network. Andrew Auernheimer (codenamed "Weev" and previously a well-known hacker who was a member of the Goatse security team) admitted on his blog that he had invaded thousands of network printers and made them print content containing racist and anti-Semitic information. These are all very serious printer security incidents [3,4].
There have been many achievements in research on the security of data during network printing and the prevention of printing data leakage. First, Li [5] conducted research on network printer security risk analysis and prevention technologies. Li et al. [6] proposed suggestions for network printer security research and protection. Yan et al. [7] designed a security enhanced printer based on Trusted Computing 3.0, Feng et al. [8] evaluated and improved the network printing protocol based on the HCPN model detection method, Sulaiman et al. [9] developed a signature based Suricata network printer for theft prevention on PfSense, Huang et al. [10] designed a cloud based portable IoT inkjet printer, Nguyen et al. [11] designed a deep learning based micro print source printer recognition and Kakade et al. [12] designed an open IoT based real-time online monitoring system for FDM printers, The above achievements have achieved certain results in achieving network printing security.
This article is different from previous studies. In order to achieve security in data transmission of network printers, a FIB-DH data encryption technology scheme based on edge cloud collaboration is proposed. Network security is achieved through edge cloud collaboration and cryptographic methods. There have also been studies related to this. Cai et al. [13] designed an industrial internet intrusion detection method based on Res-CNN SRU, and Xiang et al. [14] proposed an APT attack detection event extraction method based on BERT BiGRU-CRF, Kimi et al. [15] conducted digital forensics for electronic IoT devices in smart cities, while Almuflih et al. [16] used efficient key exchange using identity-based encryption in a multipath TCP environment. Here, we combine the characteristics of the third-order Fibonacci matrix with Diffie-Hellman to ultimately achieve secure data transmission for network printers.
The major contributions of this paper include three aspects:
● By combining the third-order Fibonacci matrix with Diffie-Hellman through edge cloud collaboration, a FIB-DH data encryption technology architecture is designed.
● The process of implementing FIB-DH data encryption technology solution is provided.
● The feasibility of the FIB-DH scheme was verified through simulation attack experiments using the PRET tool and compared with normal network printing.
The paper is organized as follows: The second section of this article introduces the preliminary knowledge for implementing the technical solution of this paper, including the information flow of the printer, the risk of printing data transmission leakage, IPP protocol, the characteristics of the third-order Fibonacci matrix, Diffie-Hellman encryption technology and MQTT protocol; in Section 2, an architecture of FIB-DH encryption technology based on edge cloud collaboration was designed, providing the implementation process of the FIB-DH scheme; Section 3 conducted experiments and comparative analysis on the scheme through simulation; Finally, we summarize the entire article and propose future work.
The printer mostly consists of three parts: the host part (including driver program and PC storage), the control card part (including the main control chip CPU) and the printer core (including LSU, toner cartridge and mechanical structure) [17]. The laser printer is composed of a mechanical part and an electronic control part, which is a typical mechatronics product. The electronic control part is usually highly integrated on the printer control card. Used to control the mechanical part to complete the entire printing work. The composition structure of the printer is shown in Figure 1.
In response to the security risks of modules or components such as the printer's main control unit, data transmission unit, external interface, driver, printing protocol, etc., attackers usually use the built-in backdoor program of the printer, control of the printer port, plaintext transmission of printing information, printing business authentication and processing of printing information cache data to attack printer security vulnerabilities.
Although a printer is only one of the peripheral devices connected to a computer host, it has independent data processing capabilities and can interact with the host for data transmission, thus providing great security [18]. There are three main risks of printing data transmission leakage, as shown in Figure 2.
First, communication interface leaks. Modern printers are generally equipped with rich communication interfaces to meet diverse user needs. These interfaces can be divided into two categories: Wired communication interfaces such as USB, RJ45, RS232 and PCIExpress; the other type is wireless communication interfaces, such as Wi-Fi, GPRS, Bluetooth, infrared, etc. Although these interfaces extend the functionality of the printer, they also increase the avenues for unauthorized users to steal printing data.
Second, network access leaks. Currently, printers are developing towards comprehensive information management and output terminals, mostly integrating rich network functions. These functions not only improve work efficiency and enhance team collaboration capabilities, but also become a major channel for information leakage. When the printer is connected to an external network (such as the Internet), it will inevitably generate data exchange with the public network; in addition, some open ports can even be exploited by hackers, leading to illegal takeover of printers.
Third, data transmission leaks. During the process of sending print jobs to the printer, the computer needs to interact with the printer through data transmission media. During this process, if the printed data is not encrypted before transmission, once it is illegally hijacked by an intruder during transmission, the intruder can easily obtain the true printed data through protocol analysis tools.
IPP is the latest industry standard network printing protocol that can be used for client to server communication and server to printer communication. This protocol provides a basic model that includes printers and jobs, standard attributes of these printers and jobs and a set of standard operations that can be performed on these printers and jobs. Due to the standardization of objects, attributes and operations, IPP is a method used for communication between client and server systems, allowing users to perform remote printing and manage printing work through the internet [19].
The IPP protocol is based on the client/server mode. Network printers are connected to the internet or intranet through IPP, and users can directly observe the working and physical status of the printers. However, BinaryEdge normal scanning shows that on average, about 80000 printers are discovered through the IPP port every day, and these printers are exposed to the internet every day, which will cause many problems [20].
Therefore, the IPP protocol is not completely secure and is often exploited by attackers, Conduct an attack.
People have been interested in studying Fibonacci sequences for hundreds of years. It was an interesting sequence, also known as the golden sequence, introduced by the Italian mathematician Fibonacci in the 13th century to solve the problem of rabbit reproduction, which is a second-order recursive sequence: F0 = 0, F1 = 1, Fn + 1 = Fn + Fn-1, n = 1, 2, 3…. Fibonacci has many unique properties and is widely used in computational mathematics, mathematical statistics, geometry and other fields [21,22]. Previous research has shown that Fibonacci sequences can be represented by Fibonacci matrices, and second-order Fibonacci sequences can be represented by second-order Fibonacci matrix T2 [23], as shown in formula (1).
(Fn+1FnFnFn - 1)=(1110)n=T2nn=1,2,3… | (1) |
Third order Fibonacci sequence: F0 = 1, F1 = 1, F2 = 2, Fn + 1 = Fn + Fn-1 + Fn-2, n = 2, 3, 4…, can be represented by the third-order Fibonacci matrix T3 [24] as shown in formula (2).
(FnFn+1−FnFn−1Fn−1Fn−Fn−1Fn−2Fn−2Fn−1−Fn−2Fn−3)=(111100010)n=T3nn=3,4,5… | (2) |
Due to the determinant |T3| = 1, T3 is reversible, so T3−1 can be calculated, as shown in formula (3).
T3=(111100010)T−13=(0100011−1−1) | (3) |
Calculate T3n and (T3n) −1 using formulas (4) and (5), as shown in formula (6).
(111100010)k1+k2=(111100010)k1∗(111100010)k2 | (4) |
(0100011−1−1)k1+k2=(0100011−1−1)k1∗(0100011−1−1)k2 | (5) |
T3n=(111100010)n(T3n)−1=(0100011−1−1)n | (6) |
Using n as a parameter and formula (6), taking n = 4, calculate T34 and (T34)−1, as shown in formula (7).
T43=(764432221)(T43)−1=(−1200−122−2−3) | (7) |
Using formula (6), take n = 5 and calculate T35and (T35)−1, as shown in formula (8).
T53=(13117764432)(T53)−1=(0−122−2−3−351) | (8) |
Similarly, we can easily calculate T3n and (T3n)−1 by taking n = 6, 7, 8, 9, 10.
Finally, Fn is defined by formula (6), as shown in formula (9). By changing n, a third-order recursive sequence can be calculated.
Fn=T3n=(111100010)nFn−1=(T3n)−1=(0100011−1−1)n | (9) |
In this study, we utilized the unique feature of third-order Fibonacci matrices being reversible and easy to calculate. Using n as a parameter and applying Fn and Fn−1 to the printing data transmission process, we achieved anti tampering and encryption effects. The sender sends data to the receiver, and the process is shown in Figure 3.
The specific data communication process is as follows:
First, the sender and receiver have agreed on n, which is actually the agreement Fn and Fn-1.
1) Sender: Transform the original text M through a third-order Fibonacci matrix. M is defined as a matrix with the same three columns, M3 = (M, M, M), Calculate G3 = M3 × Fn = (M, M, M) × Fn = (G1, G2, G3) and send G3 to the intermediary.
2) Middle-party: There are three Middle-partys who receive G1, G2 and G3 and forward them to the receiver.
3) Receiver: The receiver receives (G1, G2, G3) and transforms G3 through the third-order Fibonacci inverse matrix to generate G3 × Fn−1 = (M1, M2, M3).
If there is no tampering during the transmission process, it should be: G3 × Fn−1 = (G1, G2, G3) × Fn−1 = (M, M, M) × Fn × Fn−1 = (M1, M2, M3), M1, M2 and M3 should all be equal. Therefore, the receiver can prevent data tampering by comparing whether M1, M2 and M3 are equal, Moreover, due to the change in n, the intermediary receives three different data sets G1, G2 and G3 from the original text, thus serving the purpose of encryption.
Diffie-Hellman is a key consistency algorithm published by Whitfield Diffie and Martin Hellman in 1976. It is a method of establishing key exchange, aimed at enabling two users to securely exchange a secret key for future message encryption. Its effectiveness depends on the difficulty of calculating discrete logarithms. Diffie-Hellman is an asymmetric encryption algorithm commonly used in blockchain encryption schemes and also a public key algorithm [25,26]. Its working principle is that each communication party generates a private key and a public key, and the private key is not public. After the public key is publicly exchanged, the communication parties can calculate the shared key, which is shared. Therefore, both parties can encrypt and decrypt messages through the shared key, thus achieving encrypted transmission of messages [27,28,29]. Diffie-Hellman can negotiate a shared key through unreliable channels and is widely used in PKI key distribution in many industrial level security protocols.
Sender sends plaintext M to Receiver for encrypted transmission, as shown in Figure 4.
1) Sender and receiver first agree on two parameters g and N, and randomly generate their own private keys x and y, and calculate their respective public keys X and Y using formula (10).
X=gxmodN,Y=gymodN | (10) |
2) Sender and Receiver exchange X and Y
3) Sender calculates key K through x and Y, while Receiver calculates key G through y and X, as shown in formula (11).
K=YxmodN=gxymodN,G=XymodN=gxymodN | (11) |
From formula (11), it can be seen that K and G are equal, and therefore can be used as dual shared keys.
4) Sender encrypts plaintext M through K, with Cm = Ek(M); The receiver decrypts DG(Cm) through G, and since K and G are equal, the receiver can obtain plaintext M = DG(EK(M)).
Diffie-Hellman is the foundation of authentication key exchange (AKE) schemes in the post quantum computing era [30]. It combines the third-order Fibonacci matrix with Diffie-Hellman encryption algorithm to form a new FIB-DH encryption technology scheme, which is a specific application of Diffie-Hellman in network printer encryption schemes.
The full name of the MQTT protocol is Message Queuing Telemetry Transport, which means Message Queuing Transport Detection. It is a client server-based message publish/subscribe transport protocol under the ISO standard, based on the TCP/IP protocol cluster, published by IBM in 1999. The biggest advantage of MQTT is that it is lightweight, simple, open and easy to implement. It can provide real-time and reliable messaging services for remote connected devices with minimal code and limited bandwidth. As a low-cost, low bandwidth instant messaging protocol, it has a wide range of applications in the Internet of Things, small devices, mobile applications and other fields [31,32].
Implementing the MQTT protocol requires communication between the client and server. During the communication process, there are three identities in the MOTT protocol: Publisher, Broker (server) and Subscriber. Both the publisher and subscriber of the message are the client, while the message broker is the server. The message publisher can simultaneously send messages to the subscriber [33,34], as shown in Figure 5.
From Figure 5, it can be seen that the subscriber has subscribed to topic data1 or data2. As long as the publisher publishes topic data1 or data2, the subscriber can receive it. Therefore, broadcasting transmission and reception can be achieved, which can be one-to-many or many-to-one.
The messages transmitted by MQTT are mostly divided into two parts: Topic and payload:
1) Topic: It can be understood as the type of message (the type of data command transmitted). After subscribing to (Subscribe), the subscriber will receive the message content (payload) of the topic.
2) Payload: Can be understood as the content of the message (transmitted data body content), referring to the specific content that the subscriber needs to use. Payload can contain printed data content.
The FIB-DH encryption technology scheme based on edge cloud collaboration mostly includes five parts: Client computer (CC), MQTT cloud server (MCS), edge computer (EC), printing computer (PC) and printer (PT). 1) Customer computer is a customer computer that allows users to operate network printing, which can be printed locally on a local area network or remotely on the internet; 2) MQTT cloud server, remote communication management between customers and printing computers, and FIB-DH edge cloud collaboration; 3) Edge computer, at the edge of local area network, mainly realizes FIB-DH edge cloud collaboration; 4) The printing computer is connected to the printer USB in the local LAN to achieve FIB-DH edge cloud collaboration and transmit the verified printing data to the printer; 5) Printer, responsible for printing document data. The scheme architecture is shown in Figure 6.
In the FIB-DH encryption technology scheme, users send printed data through the client's computer. When the system is implemented, the major tasks include two types: 1) User connection authentication, and 2) printing document data, as shown in Figure 7.
In the connection authentication stage, users use FIB-DH data encryption technology scheme to perform connection authentication. During the document printing phase, users encrypt, transmit and verify printed data through edge cloud collaboration and FIB-DH scheme to avoid man in the middle attacks and prevent leaked printed documents
By utilizing the characteristics of the third-order Fibonacci matrix and combining it with the Diffie-Hellman encryption algorithm, a new FIB-DH encryption algorithm is formed. In the FIB-DH encryption algorithm, first, due to the fact that each encryption key is random and undergoes Fibonacci transformation, the generated ciphertext is different each time. If the intermediary obtains the ciphertext, it is ambiguous to analyze. Second, due to the use of key vectors, it is necessary to compare and vote on the results to achieve verification purposes. The FIB-DH encryption process in which the user sends plaintext M to the terminal is shown in Figure 8.
1) Sender and Receiver first agree on three parameters g, N, n (n is the n in Fn in formula 9) and randomly generate their own private key vectors x = (x1, x2, x3) and y = (y1, y2, y3), and calculate their respective public key vectors X and Y through formula (12).
Y=(gy1modN,gy2modN,gy3modN) |
Y=(gy1modN,gy2modN,gy3modN) | (12) |
2) Sender and Receiver exchange X and Y.
3) Sender calculates the key vector K through x and Y, while Receiver calculates the key vector G through y and X, as shown in formula (13).
K=Yx=(gx1×y1modN,gx2×y2modN,gx3×yymodN) |
G=Xy=(gx1×y1modN,gx2×y2modN,gx3×y3modN) | (13) |
From formula (13), it can be seen that K and G are equal and can therefore serve as shared keys for both parties.
4) Sender encrypts plaintext M through K, with Cm = Ek(M), as shown in formulas (14) and (15); Calculate Em through Fn transformation, as shown in formulas (16) and (17); Then the sender sends {E1, E2, E3} to the intermediate party (Party A, Party B, Party C).
After receiving the data from the intermediary, the receiver calculates Cm through Fn-1 transformation, as shown in formula (18). Due to formula (19), formula (20) can be derived, and then DG(Cm) can be decrypted through G, as shown in formula (21). Due to the equality of K and G, the three data {M1, M2, M3} in formula (22) should be equal. Therefore, the original M can be obtained through a voting algorithm.
For example, if the original file M has 5 bytes (if the multi byte principle is the same), M = (m1, m2, m3, m4, m5), (if n bytes, the principle is the same).
Cm=Ek(M) | (14) |
Cm=(C11C12C13C21C22C23C31C32C33C41C42C43C51C52C53) | (15) |
Em=Cm×Fn=(E11E12E13E21E22E23E31E32E33E41E42E43E51E52E53) | (16) |
Em={E1,E2,E3} | (17) |
Cm=E×F−1n | (18) |
Fn×F−1n=(100010001) | (19) |
Cm=(C11C12C13C21C22C23C31C32C33C41C42C43C51C52C53) | (20) |
Mn=DG(Cm)=(M11M12M13M21M22M23M31M32M33M41M42M43M51M52M53) | (21) |
Mn={M1,M2,M3} | (22) |
Finally, perform a time complexity analysis of the algorithm:
In the FIB-DH encryption scheme, due to Em = Cm × Fn and Cm = E × Fn−1, based on the characteristics of the Fibonacci matrix, Fn and Fn−1 can be calculated in advance. Therefore, its time complexity is O(n). The Elliptic Encryption Algorithm (ECC) is a public key encryption system based on Diffie-Hellman and is commonly used on mobile devices to ensure data security. ECC defines (x, y) at a point on G using the elliptic curve [35] equation G: y2 + gxy + hy = x3 + ix2 + jx + k, using key X × G and Y × G transformations for encryption and decryption. Based on this feature, its time complexity is O(n3). Therefore, the FIB-DH encryption method has lower time and complexity compared to the Elliptic Encryption Algorithm (ECC).
Corresponding to Figure 8 of the FIB-DH scheme, the sender is Client Computer (CC), the receiver is Printer Computer (PC) and the intermediaries (Party A, Party B and Party C) are Edge Computer (EC), MQTT cloud server (MCS) and Printer Computer (PC). According to the FIB-DH encryption scheme in Section 3.1, the specific flowchart for implementing network printing is shown in Figure 9.
The implementation process is as follows:
Step1. CC set three parameters g, N and n, to randomly generate the private key x, and calculate X = mod N, Fn.
Step2. CC send three parameters g, N and n, and public key X to PC through the MQTT protocol.
CC = > PC:{ X, g, N, n}
Step3. PC randomly generates its own private key y and calculates Y = gen (g, y, N) based on the g, N transmitted by CC, Y serves as the public key of the PC; Simultaneously calculating encryption key G.
Step4. PC passes the public key Y to CC through the MQTT protocol. PC = > CC:{Y}
Step5. CC calculates the encryption key based on the Y transmitted from the PC.
K = mod N = mod N
Step6. CC input printing data, calculate Em = Ek(M) × Fn through key K and Fn, then send {E1, E2, E3} to PC, EC and MCS respectively.
CC- > PC:{E1}, CC- > EC:{E2}, CC- > MCS:{E3}
Step7. PC receives E2 and E3, merges them into Em and calculates Mn = DG (Em × Fn−1) through keys G and Fn, as shown in formula (22), compare M1, M2, M3 and vote for M.
Step8. Finally, the PC outputs to the PT via USB for printing.
In order to simulate attacks on network printers, during the testing process, we used the printer intrusion tool kit PRET. PRET is an automated program based on Python language that can simulate various attack tests on the target printer. In actual use, it is necessary to install the PRET third-party components as follows:
# pip install colorama pysnmp
# pip install win_unicode_console
# apt-get install imagemagick ghostscript
The format of the PRET command is as follows:
usage: pret.py [-h] [-s] [-q] [-d] [-i file] [-o file] target {ps, pjl, pcl}
Among them, the PRET command position arguments are shown in Table 1.
Arguments | Describe |
Target | Printer device or hostname |
{ps, pjl, pcl} | Printing language |
The PRET command optional arguments are shown in Table 2.
Arguments | Describe |
-h, --help | show this help message and exit |
-s, --safe | verify if language is supported |
-q, --quiet | suppress warnings and chit-chat |
-d, --debug | enter debug mode (show traffic) |
-i file, --load file | load and run commands from file |
-o file, --log file | log raw data sent to the target |
The PRET command can be used to conduct various attacks on network printers, including DoS attacks, authorization, print task control, remote code operation, information leakage, information tampering, etc. These attacks can be used to test the anti-attack ability of remote network printing on network printers.
Experimental comparison subjects: 1) Group 1: Local Network Printing (LN-PT), 2) Group 2: Remote Network Printing (RN-PT) and Group 3: FIB-DH Scheme Network Printing (FD-PT). Experimental address: In the IoT laboratory of the School of Artificial Intelligence. The system sets two parameters: 1) Set the number of network printing attacks using the PRET tool to simulate six network types of attacks: DoS attacks, authorization, print task control, remote code operation, information leakage and information tampering. The number of attacks for each type is shown in Table 3, with a total of 100 attacks. 2) Number of printing tasks, each task requires printing 10 2-page documents. In the experimental comparison, the number of printing tasks varies, and the accuracy of printing tasks is evaluated as the task burden increases.
Attack type | Number of attacks |
DoS attacks | 15 |
Authorization | 15 |
Print task control | 15 |
Remote code operation | 15 |
Information leakage | 20 |
Information tampering | 20 |
The first group (Group1): Local Network Printing (LN-PT), under the same experimental conditions, achieves document printing through user computers on a local area network. The number of printing tasks is constantly changing, and it also simulates attacks on printers through PRET, ultimately comparing the accuracy of printing.
The second group (Group2): Remote Network System (RN-PT), under the same experimental conditions, remotely prints documents through user computers on the Internet. The number of printing tasks is constantly changing, and while printing, PRET is also used to simulate attacks on printers, ultimately comparing the accuracy of printing.
The third group (Group3): FIB-DH scheme network printing (FD-PT), under the same experimental conditions, remotely printing documents through user computers on the Internet. The number of printing tasks is constantly changing, and while printing, PRET simulation is also used to attack the printer, ultimately comparing the accuracy of printing.
1) Comparison of printing accuracy
By conducting network printing comparative experiments on three groups of systems, the task size varied from 100 to 300 with an increment level of 20. Finally, the comparative results were obtained as shown in Table 4. From the table, it can be seen that the FIB-DH network printing has the best printing accuracy under the same task.
Number of printing tasks | Local network printing accuracy (LN-RT)(%) | Remote network printing accuracy (RN-PT)(%) | FIB-DH network printing accuracy (FD-PT)(%) |
100 | 92.0 | 90.1 | 98.2 |
120 | 92.2 | 90.3 | 98.3 |
140 | 92.3 | 90.4 | 98.4 |
160 | 92.4 | 90.6 | 98.6 |
180 | 92.6 | 90.7 | 98.7 |
200 | 92.8 | 90.9 | 98.9 |
220 | 92.9 | 91.1 | 99.0 |
240 | 93.0 | 91.3 | 99.1 |
260 | 93.2 | 91.6 | 99.3 |
280 | 93.3 | 91.8 | 99.4 |
300 | 93.5 | 92.1 | 99.6 |
When we set the number of printing tasks to 100,200 and 300, we compared the three groups of network printing. The bar chart is shown in Figure 10, which shows that FIB-DH network printing has more advantages.
The comparison of the printing accuracy of three sets of networks under different tasks is shown in Figure 11. From this line breaking chart, it can be clearly seen that the FIB-DH scheme has the best network printing accuracy under different tasks, with an improvement of about 6%.
2) Comparison of printing time cost
Similarly, we set the number of printing tasks to 100,200 and 300, and compare the time cost of three sets of network printing, the comparison results are shown in Table 5. Due to the fact that LN-RT is printed on a local network, the printing time cost is obviously lower than RN-PT and FD-PT. Therefore, we focus on comparing FD-PT and RN-PT. From the table, it can be seen that the printing time cost of FD-PT is slightly higher than that of FD-PT, and the difference is not significant, about 3%.
Number of printing tasks | Local network printing accuracy (LN-RT)(Min) | Remote network printing accuracy (RN-PT)(Min) | FIB-DH network printing accuracy (FD-PT)(Min) |
100 | 8.4 | 10.5 | 11.2 |
200 | 16.6 | 20.9 | 21.8 |
300 | 25.8 | 30.8 | 31.7 |
Summary of the experiment: 1) Compared the important indicator of network printing accuracy under three schemes, the FIB-DH scheme improved the network printing accuracy by about 6% under network attacks, making it more secure. 2) The FIB-DH scheme also has certain shortcomings in network printing. From the perspective of printing time cost, the FIB-DH scheme does not have an advantage in network printing, increasing by about 3% compared to others, but improving the printing accuracy by about 6%. In order to improve the security of network printing, it is inevitable to increase system complexity, and adding some printing time cost is not considered.
Network printers are a combination of traditional printers and internet applications, which perfectly solves the interconnection and sharing problems in office work and meets the office needs of government agencies. However, network printing poses security risks, and information leakage and network attacks may occur through network printing. In this article, we propose a FIB-DH data encryption technology scheme based on edge cloud collaboration to address the security of network printing, especially the risk of leakage during data transmission. By mining the characteristics of third-order Fibonacci matrices and combining Diffie-Hellman encryption technology, edge cloud collaboration is used to achieve the security of printed data. Through PRET tool simulation experiments, compared with conventional network printing, the accuracy of network printing data has been improved, effectively improving the security of network printing and preventing the leakage and tampering of printing information.
However, its technical scheme also has certain limitations. While improving network printing security, the complexity of its implementation has also increased. In future work, we will continue to compare and analyze privacy-protecting algorithms to improve their security while reducing the complexity of system implementation. This article can provide some reference for future research on network printing security models.
The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.
This study was supported by the Natural Science Foundation Project of China (61976118), the Natural Science Foundation Project of Jiangsu Province (BK20180142), and the key topics of the "13th five-year plan" for Education Science in Jiangsu Province (B-b /2020/01/18).
All authors declare no conflicts of interest in this paper.
[1] |
Loewe RS, Khersonsky SM, McCullough RD (1999) A simple method to prepare head-to-tail coupled, regioregular poly(3-alkylthiophenes) using Grignard metathesis. Adv Mater 11: 250–253. doi: 10.1002/(SICI)1521-4095(199903)11:3<250::AID-ADMA250>3.0.CO;2-J
![]() |
[2] |
Loewe RS, Ewbank PC, Liu J, et al. (2001) Regioregular, head-to-tail coupled poly(3-alkylthiophenes) made easy by the GRIM method: investigation of the reaction and the origin of regioselectivity. Macromolecules 34: 4324–4333. doi: 10.1021/ma001677+
![]() |
[3] |
Kim Y, Cook S, Tuladhar SM, et al. (2006) A strong regioregularity effect in self-organizing conjugated polymer films and high-efficiency polythiophene:fullerene solar cells. Nat Mater 5: 197–203. doi: 10.1038/nmat1574
![]() |
[4] |
Cheng YJ, Yang SH, Hsu CS (2009) Synthesis of conjugated polymers for organic solar cell applications. Chem Rev 109: 5868–5923. doi: 10.1021/cr900182s
![]() |
[5] |
Chang YT, Hsu SL, Chen GY, et al. (2008) Intramolecular donor–acceptor regioregular poly(3-hexylthiophene)s presenting octylphenanthrenyl-imidazole moieties exhibit enhanced charge transfer for heterojunction solar cell applications. Adv Funct Mater 18: 2356–2365. doi: 10.1002/adfm.200701150
![]() |
[6] |
Chang YT, Hsu SL, Su MH, et al. (2009) Intramolecular donor–acceptor regioregular poly(hexylphenanthrenyl-imidazole thiophene) exhibits enhanced hole mobility for heterojunction solar cell applications. Adv Mater 21: 2093–2097. doi: 10.1002/adma.200802379
![]() |
[7] |
Hou J, Tan Z, Yan Y, et al. (2006) Synthesis and photovoltaic properties of two-dimensional conjugated polythiophenes with bi(thienylenevinylene) side chains. J Am Chem Soc 128: 4911–4916. doi: 10.1021/ja060141m
![]() |
[8] |
Li Y, Zou Y (2008) Conjugated polymer photovoltaic materials with broad absorption band and high charge carrier mobility. Adv Mater 20: 2952–2958. doi: 10.1002/adma.200800606
![]() |
[9] |
Zhang Q, Cirpan A, Russell TP, et al. (2009) Donor–acceptor poly(thiophene-block-perylene diimide) copolymers: synthesis and solar cell fabrication. Macromolecules 42: 1079–1082. doi: 10.1021/ma801504e
![]() |
[10] |
Lanzi M, Paganin L, Errani F (2012) Synthesis, characterization and photovoltaic properties of a new thiophene-based double-cable polymer with pendent fullerene group. Polymer 53: 2134–2145. doi: 10.1016/j.polymer.2012.03.040
![]() |
[11] | Lanzi M, Salatelli E, Benelli T, et al. (2015) A regioregular polythiophene-fullerene for polymeric solar cells. J Appl Polym Sci 132: 42121. |
[12] |
Piereini F, Lanzi M, Nakielski P, et al. (2017) Single-Material Organic Solar Cells Based on Electrospun Fullerene-Grafted Polythiopene Nanofibers. Macromolecules 50: 4972–4981. doi: 10.1021/acs.macromol.7b00857
![]() |
[13] |
Zhou E, Tan Z, Yang Y, et al. (2007) Synthesis, hole mobility, and photovoltaic properties of cross-linked polythiophenes with vinylene-terthiophene-vinylene as conjugated bridge. Macromolecules 40: 1831–1837. doi: 10.1021/ma062633p
![]() |
[14] |
Tu G, Bilge A, Adamczyk S, et al. (2007) The influence of interchain branches on solid state packing, hole mobility and photovoltaic properties of poly(3-hexylthiophene) (P3HT). Macromol Rapid Comm 28: 1781–1785. doi: 10.1002/marc.200700239
![]() |
[15] | Mangold HS, Richter TV, Link S, et al. (2012) Optoelectronic properties of hyperbranched polythiophenes. J Phys Chem B 116: 154–159. |
[16] |
Yang SH, Lin TS, Huang YZ, et al. (2014) Synthesis of hyperbranched polythiophenes containing tetrachloroperylene bisimide as bridging moiety for polymer solar cells. Polymer 55: 6058–6068. doi: 10.1016/j.polymer.2014.09.046
![]() |
[17] |
Li W, Hendriks KH, Roelofs WSC, et al. (2013) Efficient small bandgap polymer solar cells with high fill factors for 300 nm thick films. Adv Mater 25: 3182–3186. doi: 10.1002/adma.201300017
![]() |
[18] |
Tan H, Deng X, Yu J, et al. (2013) A novel benzo[1,2-b:4,5-b']dithiophene-based conjugated polymer with a pendant diketopyrrolopyrrole unit for high-performance solar cells. Macromolecules 46: 113–118. doi: 10.1021/ma302243r
![]() |
[19] |
Kanimozhi C, Balraju P, Sharma GD, et al. (2010) Synthesis of diketopyrrolopyrrole containing copolymers: a study of their optical and photovoltaic properties. J Phys Chem B 114: 3095–3103. doi: 10.1021/jp909183x
![]() |
[20] |
Huo L, Hou J, Chen HY, et al. (2009) Bandgap and molecular level control of the low-bandgap polymers based on 3,6-dithiophen-2-yl-2,5-dihydropyrrolo[3,4-c]pyrrole-1,4-dione toward highly efficient polymer solar cells. Macromolecules 42: 6564–6571. doi: 10.1021/ma9012972
![]() |
[21] |
Roncali J (1997) Synthetic principles for bandgap control in linear π-conjugated systems. Chem Rev 97: 173–205. doi: 10.1021/cr950257t
![]() |
[22] |
Stefan MC, Javier AE, Osaka I, et al. (2009) Grignard metathesis method (GRIM): toward a universal method for the synthesis of conjugated polymers. Macromolecules 42: 30–32. doi: 10.1021/ma8020823
![]() |
[23] |
Chen WC, Chen PY, Yang SH (2017) Solution-processed hybrid light emitting and photovoltaic devices comprising zinc oxide nanorod arrays and tungsten trioxide layers. AIMS Mater Sci 4: 551–560. doi: 10.3934/matersci.2017.3.551
![]() |
[24] |
Huang WJ, Huang PH, Yang SH (2016) PCBM doped with fluorene-based polyelectrolytes as electron transporting layers for improving the performance of planar heterojunction perovskite solar cells. Chem Commun 52: 13572–13575. doi: 10.1039/C6CC07062K
![]() |
[25] |
Nunez CM, Chiou BS, Andrady AL, et al. (2000) Solution Rheology of Hyperbranched Polyesters and Their Blends with Linear Polymers. Macromolecules 33: 1720–1726. doi: 10.1021/ma991044z
![]() |
[26] | Lee JU, Jung JW, Emrick T, et al. (2010) Synthesis of C60-end capped P3HT and its application for high performance of P3HT/PCBM bulk heterojunction solar cells. J Mater Chem 20: 3287–3294. |
[27] | Stevens DM, Qin Y, Hillmyer MA, et al. (2009) Enhancement of the morphology and open circuit voltage in bilayer polymer/fullerene solar cells. J Phys Chem C 113: 11408–11415. |
[28] | Zhao Y, Yuan G, Roche P (1995) A calorimetric study of the phase transitions in poly(3-hexylthiophene). Polymer 36: 2211–2214. |
[29] | Zhao J, Swinnen A, Assche GV, et al. (2009) Phase diagram of P3HT/PCBM blends and its implication for the stability of morphology. J Phys Chem B 113: 1587–1591. |
[30] |
Kim Y, Choulis SA, Nelson J, et al. (2005) Device annealing effect in organic solar cells with blends of regioregular poly(3-hexylthiophene) and soluble fullerene. Appl Phys Lett 86: 063502. doi: 10.1063/1.1861123
![]() |
[31] |
Liao HC, Chantarat N, Chen SY, et al. (2011) Annealing effect on photovoltaic performance of hybrid P3HT/In-Situ grown CdS nanocrystal solar cells. J Electrochem Soc 158: E67–E72. doi: 10.1149/1.3585668
![]() |
[32] | Li G, Shrotriya V, Yao Y, et al. (2007) Manipulating regioregular poly(3-hexylthiophene): [6,6]-phenyl-C61-butyric acid methyl ester blends-route towards high efficiency polymer solar cells. J Mater Chem 17: 3126–3140. |
[33] |
Brown PJ, Thomas DS, Köhler A, et al. (2003) Effect of interchain interactions on the absorption and emission of poly(3-hexylthiophene). Phys Rev B 67: 064203. doi: 10.1103/PhysRevB.67.064203
![]() |
[34] |
Noriega R, Rivnay J, Vandewal K, et al. (2013) A general relationship between disorder, aggregation and charge transport in conjugated polymers. Nat Mater 12: 1038–1044. doi: 10.1038/nmat3722
![]() |
[35] | Yao K, Chen L, Li F, et al. (2012) Cooperative assembly donor–acceptor system induced by intermolecular hydrogen bonds leading to oriented nanomorphology for optimized photovoltaic performance. J Phys Chem C 116: 714–721. |
[36] |
Kim JY, Lee K, Coates NE, et al. (2007) Efficient tandem polymer solar cells fabricated by all-solution processing. Science 317: 222–225. doi: 10.1126/science.1141711
![]() |
[37] |
Scharber MC, Mühlbacher D, Koppe M, et al. (2006) Design rules for donors in bulk-heterojunction solar cells-towards 10% energy-conversion efficiency. Adv Mater 18: 789–794. doi: 10.1002/adma.200501717
![]() |
[38] |
Zhu R, Jiang CY, Liu B, et al. (2009) Highly efficient nanoporous TiO2-polythiophene hybrid solar cells based on interfacial modification using a metal-free organic dye. Adv Mater 21: 994–1000. doi: 10.1002/adma.200802388
![]() |
[39] |
Hou J, Chen TL, Zhang S, et al. (2009) An easy and effective method to modulate molecular energy level of poly(3-alkylthiophene) for high-VOC polymer solar cells. Macromolecules 42: 9217–9219. doi: 10.1021/ma902197a
![]() |
[40] | Sekiguchi H, Sekiguchi T (2014) Molecular ordering effect of regioregular poly(3-hexylthiophene) using sulfur K-edge X-ray absorption spectroscopy. Jpn J Appl Phys 53: 02BB07. |
[41] |
Chen HY, Hou J, Zhang S, et al. (2009) Polymer solar cells with enhanced open-circuit voltage and efficiency. Nat Photonics 3: 649–653. doi: 10.1038/nphoton.2009.192
![]() |
[42] | Huang JS, Chou CY, Lin CF (2014) Enhancing performance of organic-inorganic hybrid solar cells using a fullerene interlayer from all-solution processing. Sol Energ Mat Sol C 6: 466–471. |
[43] | Tan Z, Li L, Cui C, et al. (2012) Solution-processed tungsten oxide as an effective anode buffer layer for high-performance polymer solar cells. J Phys Chem C 116: 18626–18632. |
[44] |
Lampande R, Kim GW, Boizot J, et al. (2013) A highly efficient transition metal oxide layer for hole extraction and transport in inverted polymer bulk heterojunction solar cells. J Mater Chem A 1: 6895–6900. doi: 10.1039/c3ta10863e
![]() |
[45] |
Wang F, Tan Z, Li Y (2015) Solution-processable metal oxides/chelates as electrode buffer layers for efficient and stable polymer solar cells. Energ Environ Sci 8: 1059–1091. doi: 10.1039/C4EE03802A
![]() |
[46] |
Ma W, Yang C, Gong X, et al. (2005) Thermally stable, efficient polymer solar cells with nanocontrol of the interpenetrating network morphology. Adv Funct Mater 15: 1617–1622. doi: 10.1002/adfm.200500211
![]() |
[47] |
Li G, Shrotriya V, Yao Y, et al. (2005) Investigation of annealing effects and film thickness dependence of polymer solar cells based on poly(3-hexylthiophene). J Appl Phys 98: 043704. doi: 10.1063/1.2008386
![]() |
[48] |
Peet J, Kim Y, Coates NE, et al. (2007) Efficiency enhancement in low-bandgap polymer solar cells by processing with alkane dithiols. Nat Mater 6: 497–500. doi: 10.1038/nmat1928
![]() |
1. | Ayesha Kausar, 2021, 9780128224632, 129, 10.1016/B978-0-12-822463-2.00002-6 | |
2. | Ayesha Kausar, Epitome of Fullerene in Conducting Polymeric Nanocomposite—Fundamentals and Beyond, 2023, 62, 2574-0881, 618, 10.1080/25740881.2022.2121223 | |
3. | Ayesha Kausar, 2023, 9780323995153, 65, 10.1016/B978-0-323-99515-3.00003-1 | |
4. | Zhaoqiong Zhou, Yan Li, Pinyu Chen, Jinqiu Meng, Nan Luo, Liang Luo, Feng He, Xiangfeng Shao, Hao‐Li Zhang, Zitong Liu, Hyperbranched Diketopyrrolopyrrole‐based Polymers Constructed via Linear Side‐Chains towards Organic Field‐Effect Transistors, 2023, 0947-6539, 10.1002/chem.202203361 | |
5. | Zhaoqiong Zhou, Nan Luo, Xiangfeng Shao, Hao‐Li Zhang, Zitong Liu, Hyperbranched Polymers for Organic Semiconductors, 2023, 88, 2192-6506, 10.1002/cplu.202300261 | |
6. | Aleksei Maksimov, Bulat Yarullin, Kharlampii Kharlampidi, Gennadii Kutyrev, Advances in hyperbranched polymer chemistry, 2024, 1026-1265, 10.1007/s13726-024-01379-6 |
Arguments | Describe |
Target | Printer device or hostname |
{ps, pjl, pcl} | Printing language |
Arguments | Describe |
-h, --help | show this help message and exit |
-s, --safe | verify if language is supported |
-q, --quiet | suppress warnings and chit-chat |
-d, --debug | enter debug mode (show traffic) |
-i file, --load file | load and run commands from file |
-o file, --log file | log raw data sent to the target |
Attack type | Number of attacks |
DoS attacks | 15 |
Authorization | 15 |
Print task control | 15 |
Remote code operation | 15 |
Information leakage | 20 |
Information tampering | 20 |
Number of printing tasks | Local network printing accuracy (LN-RT)(%) | Remote network printing accuracy (RN-PT)(%) | FIB-DH network printing accuracy (FD-PT)(%) |
100 | 92.0 | 90.1 | 98.2 |
120 | 92.2 | 90.3 | 98.3 |
140 | 92.3 | 90.4 | 98.4 |
160 | 92.4 | 90.6 | 98.6 |
180 | 92.6 | 90.7 | 98.7 |
200 | 92.8 | 90.9 | 98.9 |
220 | 92.9 | 91.1 | 99.0 |
240 | 93.0 | 91.3 | 99.1 |
260 | 93.2 | 91.6 | 99.3 |
280 | 93.3 | 91.8 | 99.4 |
300 | 93.5 | 92.1 | 99.6 |
Number of printing tasks | Local network printing accuracy (LN-RT)(Min) | Remote network printing accuracy (RN-PT)(Min) | FIB-DH network printing accuracy (FD-PT)(Min) |
100 | 8.4 | 10.5 | 11.2 |
200 | 16.6 | 20.9 | 21.8 |
300 | 25.8 | 30.8 | 31.7 |
Arguments | Describe |
Target | Printer device or hostname |
{ps, pjl, pcl} | Printing language |
Arguments | Describe |
-h, --help | show this help message and exit |
-s, --safe | verify if language is supported |
-q, --quiet | suppress warnings and chit-chat |
-d, --debug | enter debug mode (show traffic) |
-i file, --load file | load and run commands from file |
-o file, --log file | log raw data sent to the target |
Attack type | Number of attacks |
DoS attacks | 15 |
Authorization | 15 |
Print task control | 15 |
Remote code operation | 15 |
Information leakage | 20 |
Information tampering | 20 |
Number of printing tasks | Local network printing accuracy (LN-RT)(%) | Remote network printing accuracy (RN-PT)(%) | FIB-DH network printing accuracy (FD-PT)(%) |
100 | 92.0 | 90.1 | 98.2 |
120 | 92.2 | 90.3 | 98.3 |
140 | 92.3 | 90.4 | 98.4 |
160 | 92.4 | 90.6 | 98.6 |
180 | 92.6 | 90.7 | 98.7 |
200 | 92.8 | 90.9 | 98.9 |
220 | 92.9 | 91.1 | 99.0 |
240 | 93.0 | 91.3 | 99.1 |
260 | 93.2 | 91.6 | 99.3 |
280 | 93.3 | 91.8 | 99.4 |
300 | 93.5 | 92.1 | 99.6 |
Number of printing tasks | Local network printing accuracy (LN-RT)(Min) | Remote network printing accuracy (RN-PT)(Min) | FIB-DH network printing accuracy (FD-PT)(Min) |
100 | 8.4 | 10.5 | 11.2 |
200 | 16.6 | 20.9 | 21.8 |
300 | 25.8 | 30.8 | 31.7 |