The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we discuss security issues of the current SSL/TLS protocol and pay attention to the security vulnerabilities of the expansion of SSL/TLS protocol based on the TPM (Trusted Platform Module). We experiment on one attacking technique that can damage the security of SSL/TLS protocol successfully. Finally, considering the application environment of SSL/TLS protocol, we propose a specific...
Wireless sensor network (WSN, Wireless Sensor Network) is a kind of autonomous network with sensor nodes. It is different from traditional RFID system that the WSN is through the distribution of sensor nodes in different locations to monitor environmental conditions. The collected data from sensor nodes were sent back to the base station for further analysis and processing to compensate the shortage...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Due to the resource constraints, pre-distribution secrets keys into sensor nodes before they are deployment are an applicable approach. Several key pre-distribution schemes have been proposed in literature to establish pairwise keys between sensor nodes. However, as the...
Based on IEEE 802.1AF, secure key agreement and management schemes are discussed, including secure key generation and distribution, identification of Live Peer Lists and Potential Live Peer Lists. Key Selection Protocol (KSP) and LAN-based Key Server (LKS) protocol are compared in this paper. To improve the security of Ethernet, a group based MAC key selection protocol (GKSP) for large Ethernet networks...
A gateway-oriented password-based authenticated key exchange (GPAKE) scheme allows a client to establish an authenticated session key with a gateway via the help of an authentication server, where the client has pre-shared a password with the server. The desirable security properties of a GPAKE include session key semantic security, key privacy against the server, and password guessing attacks resistance...
Mobile agent and its security are first introduced in this paper. Fundamental to the mentioned communication security properties are issues relating to the identification and authentication of sending and receiving parties. A security authentication scheme for mobile agent of multi domain is provided and a detail description is given in the paper. The scheme is based on identity-based public key cryptography,...
Network reprogramming is a crucial service in wireless sensor networks (WSNs) that relies on epidemic strategy for spreading software updates by just having a local view of the networks. Securing the process of network reprogramming is essential in some certain WSNs applications, state-of-the-art secure network reprogramming protocols for WSNs aim for the efficient source authentication and integrity...
A Bluetooth ad hoc network can be formed by interconnecting piconets. The security of the process of Bluetooth scatternet formation is a major factor to guarantee the applications of Bluetooth network. Through the analysis of the characteristics of Bluetooth scatternet formation algorithm and Bluetooth's security architecture, this paper gives out a scheme for Bluetooth scatternet security based on...
RFID technology can potentially be used in many applications. A typical RFID system involves a reader and a number of tags, which may range from the battery-powered tags that have Wi-Fi capabilities, to the low-cost tags that are constrained in computation capacities and hardware resources. Keeping RFID systems secure is crucial since RFID systems are vulnerable to a number of malicious attacks. As...
This paper proposes an efficient architecture to produce a hierarchical access control scheme for the multicast application environment. The architecture divides the group members into several subgroups with different access rights. In order to enhance the efficiency, the theory of Weil pairing is introduced to present a three party key agreement protocol. The advantages of this scheme are : (1) easy...
RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to the ubiquitous nature of RFID, attackers can easily launch attacks over wireless channel whenever there is a flaw on the RFID authentication protocol being used. A successful attack can imply a substantial loss in the enterprise and may trigger a series of problems. In this paper, we investigate a...
Secure multi-party computation has been a hot research topic of cryptograhy for about two decades, and the convex hulls problem is a special case of it. However, the precise convex hulls will certainly expose all vertexes and even bring about unfairness. Therefore the practical approximate convex hulls are in need. In this paper, we summarize and discuss the convex hulls problem, and then we present...
Since there is eavesdropping and MITM attack during establishing encryption key between two Bluetooth devices, a secure key agreement scheme is designed based on elliptic curves cryptography and interlock protocol. This scheme can defend two kinds of attacks mentioned above. It provides bidirectional authentication for two devices and key integrity verification by exchanging the keyspsila Hash-value...
The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key management scheme for group signature based VANETs, which is expected to considerably facilitate the revocation of malicious vehicles, location privacy protection, heterogenous security policies, and maintenance of the system,...
An ad hoc network is a collection of autonomous nodes that communicate with each other by forming a multi-top wireless network. Different from conventional wireless networks, the resource of the nodes in ad hoc networks is limited. As such, the costs of the nodes resource should be minimized when constructing a group key agreement protocol in the ad hoc networks. To achieve the goal, in this paper...
In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations. Furthermore, an RC4-based hash function for the generation of message authentication...
A fair exchange protocol allows two parties to exchange items in a fair way so that either each party gets the other's item or neither party does. In this paper, we propose a key-exposure-free chameleon hashing scheme based on the discrete logarithm assumption, and prove that it enjoys all advantages of previous schemes: collision resistant, semantic security, message hiding and key exposure freeness...
How to protect the security of vital data is one of the most important issues of the database security. An efficient method is to divide the vital data into multiple parts that are stored among a group of servers by secret sharing technique. In this paper, we propose a publicly verifiable dynamic sharing protocol for data secure storage. In this protocol, the important data can be publicly verifiably...
The fast growth of wireless networking has made data security an essential issue. Encryption mechanisms relying on a static key structure, such as WEP (802.11) and TKIP (802.1x), are vulnerable to key cracking via the capture of wireless packets. Although new standards have been developed to fill this gap, a stable security protocol has been lacking. In this paper, we present a lightweight and solid...
Although a contributory group key agreement is a promising solution to achieve access control in collaborative and dynamic group applications, the existing schemes have not achieved the performance lower bound in terms of time, communication, and computation costs. In this paper, we propose a contributory group key agreement that achieves the performance lower bound by utilizing a novel logical key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.