Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper proposes a novel entropy test to determine whether a MUX PUF is linear or not. Three MUX PUF configurations are considered, namely linear, feed-forward and modified feed-forward. In addition to these, we also consider feed-forward structures like overlap, cascade and separate configurations. The approach is focused on computing the conditional entropy of responses to a set of predefined...
Network engineers and security experts are constantly confronted with new threats that have yet to be handled. Mitigation of zero day attacks requires the implementation of machine learning algorithms for the detection of abnormalities and malicious behavior on the network. These processes are often time consuming and can add significant resource cost in terms of network speed and compute power. The...
This paper proposes a novel two-way free-space quantum key distribution (QKD) protocol, which can be implemented using standard free-space optical (FSO) systems with subcarrier intensity-modulation (SIM) binary phase-shift-keying (BPSK) and direct-detection (DD) receiver. Different eavesdropping threats, including unauthorized receiver, beam-splitting, and intercept-resend attacks, are considered...
KNX is a worldwide open standard for home and building automation, which originated from a classical fieldbus protocol. While the needs for interacting with the upcoming Internet of Things (IoT) were already partially addressed by the recent KNX Web Services application note, KNX IP networking still supports IPv4 only. This paper proposes the usage of IPv6 networking as native KNX medium. The most...
Android is built upon a permission-based structure, where apps require access to specific permissions in order to carry out specific functionality. While Android has provided a set of best practices intended to aid the developer in properly defining and manipulating these permissions on their source code, developers do not always adhere to these guidelines. Although some of the resulting issues may...
The incredible rapid development of internet technologies, primarily thanks to omnipresent access of high speed broadband internet access and supporting technologies like Big Data, Cloud Computing, REST/Web services as well as cheap electronic equipment that use new wireless communications standards, lead to equal rapid growth of number of smart devices - “things” - connected to the internet. Increased...
Near field communication (NFC) is a short-range type of communication technology used in various appliances, and more recently in contactless credit and debit bank cards. Most modern smartphones have the capability to receive and transmit NFC signals, which makes them a promising platform for mobile payment. However, payment systems always attract malicious users who try to use the technology to get...
DATEX II has been developed to provide a standardized way of communication and exchange of traffic information and it plays an important role for implementing integrated Intelligent Transportation Systems (ITS) in Europe. This standard is suggested for providing information services for safe and secure truck parking places which is considered one of the priority in the ITS Action Plan. The novelty...
In recent years, SRAM-based and other Weak PUFs have found applications in tamper sensitive key storage and ID generation. SRAM-based PUFs, for example, rely on intrinsic process variations to enable repeatable and unique start-up behavior of their outputs. However, noise in the system can compromise repeatability of SRAM start-up behavior. To obviate this problem, a number of solutions such as fuzzy...
Internet of Things (IoT) connect different types of devices to control different things or simply read data from then, such as room temperature, location, pressure and others, in a variety of application domains using the World Wide Web. This is a challenge for technology and Information Security (IS). Therefore, this paper surveys advances in IoT-based with an eye towards security, where discusses...
Certification schemes exist to regulate software systems and prevent them from being deployed before they are judged fit to use. However, practitioners are often unsatisfied with the efficiency of certification standards and processes. In this study, we analyzed two certification standards, Common Criteria and DO-178C, and collected insights from literature and from interviews with subject-matter...
Radio Frequency Identification (RFID) security has not been properly handled in numerous applications, such as in public transportation systems. In this paper, a methodology to reverse engineer and detect security flaws is put into practice. Specifically, the communications protocol of an ISO/IEC 14443-B public transportation card used by hundreds of thousands of people in Spain was analyzed. By applying...
This paper is presenting how teleprotection applications via packet switched wide area networks can be implemented guaranteeing required application specific performance parameters. The following different approaches are analyzed for differential protection: a. ITU-T compliant standard circuit emulation (CE) using SAToP/ CESoPSN. b. A novel approach of CE technology, using explicit clocks, developed...
For the mobile ad hoc networks (MANET) security is a vital element. For providing security against malicious nodes all the researchers are striving specially and particularly on all the security challenges in the MANETs. Within these wirelessnetworks some special techniques have been propounded for secure routing protocols. Our propounded work presents a more effective outcome to mitigate black hole...
We have developed a multi-tiered cloud security framework to facilitate cloud users’ need to match their security requirements with security provisions of cloud service providers (CSPs).Since the launch of Multi-Tiered Cloud Security Singapore standard (MTCS SS584) [1] in Oct 2013, the standard has been harmonized with several international security framework and standards [2] such as Cloud Security...
We demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and signature based detection methods. We measure the success of this potential attack against Hotmail, Gmail and Yahoo mail. While the attack is bothersome both in terms of...
Cyber-physical Production Systems (CPPS) are one of the technical driving forces behind the transformation of industrial production towards "digital factory of the future" in the context of Industry 4.0. Security is a major concern for such systems as they become more intelligent, interconnected, and coupled with physical devices. For various security activities from security analysis to...
The railway domain is a complex critical infras-tructure (CI) linking communication and control elements, and susceptible to multiple security threats similar to thoseencountered by industrial control systems. However, protectingmodern railway signalling systems is a challenging task giventhe rigorous human safety standards that must be adhered towhile augmenting the systems with security mechanisms...
Fault attacks are a type of physical attacks where an attacker injects faults to influence the cryptosystems. The attacker can exploit erroneous results, obtained after injecting the faults, to deduce secret keys. Various fault models are proposed, but random fault model remains the most realistic in the practice. In this paper, we show mathematically that current elliptic curve standards (e.g., NIST,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.