The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Node capture attack is a critical issue in Mobile WSNs where attacker-controlled replicas may act maliciously. In this paper, we present a novel Chinese remainder theorem based node capture resilience scheme that can be utilized to discover and revoke captured nodes. Moreover, our scheme can limit the ability of captured nodes to further compromise forward security, backward security, and launch collusion...
In this paper, we present the novel concept of fractional public keys and an efficient zero-round multi-party Diffie-Hellman key agreement scheme that is based on fractional public keys. Shared group keys are computed highly efficiently by using the fractional public keys of multiple participants as exponents. The scheme provides therefore an efficient and elegant way of multi-party key agreement...
Providing forward and backward secrecy is still a big challenge in unattended wireless sensor networks (UWSNs), though some storage schemes have been proposed. Additionally, high storage requirement needs efficient storage techniques. In this paper, we propose a novel homomorphic encryption and key-evolution based scheme for efficient and secure data storage, which supports both forward and backward...
Today, peer-to-peer SIP based communication systems have attracted much attention from both academia and industry. The decentralized nature of P2P might provide the distributed peer-to-peer communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g. privacy leaks, unpredictable availability, etc. In...
The paper describes an architecture for privacy-enhanced intrusion detection systems, that separates privacy-invasive and privacy-preserving operations. This can be useful in cases where less sensitive network monitoring is outsourced to a third party and more sensitive network monitoring operations and data forensics are performed in-house or by law enforcement agencies.
General purpose search engines provide users with lists of retrieved documents in response to their queries. The common structure of list elements includes the title of a document, its URL, and small snippet from the text. Snippets are evidence of occurrences of query's keywords in the document. The length of each snippet is just a couple of lines. They cannot play a role of summaries of retrieved...
Chord has been suggested as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than hops, where N is the total number of the peers in the overlay network. However, as a protocol originally designed for background downloading applications, Chord has a few drawbacks when supporting P2PSIP real-time communication...
In this paper, we propose a spatial role-based authorization framework which specifies authorization based on both role and location constrains in a wireless local area network with assistance from a sensor network. The framework performs a location-restricted verification scheme before granting a user with privileges for crucial resources access. Analysis and simulation results show that our framework...
In this paper we consider different approaches to technological protection of users' privacy in the world of internet of things. Particularly, we consider what kind of problems and which level of protection can be achieved by applying approaches using secure multi-party computations.
In this paper, we present three related and efficient cryptographic schemes for secure communication for hierarchically composed user groups. In such a group, each user is associated with a hierarchical level, so that the group members are divided into two or more hierarchical security classes. Most existing hierarchical cryptographic schemes provide hierarchical deduction of hierarchically arranged...
Electronic patient records (EPR) may contain highly confidential and sensitive medical data, and it is therefore essential that such information is properly protected. Medical teams that are providing care to a patient has a legitimate need to access the medical data of the concerning patient, and this could be a valid criteria for medical professionals to obtain access to such data. Moreover, since...
We propose an approach to trust management in data intensive sensor networks (DISN) based on subjective logic. We demonstrate that under given requirements for trustworthiness of data collected from sensors, the best sensor query processing strategy in the sense of time and energy efficiency can be considerably different from the strategies generated without trustworthiness requirements.
Nowadays, the Internet is the major source of information for millions of people. There are many search tools available on the net but finding appropriate text information is still difficult. The retrieval efficiency of the presently used systems cannot be significantly improved: "bag of words" interpretation causes loosing semantics of texts. We applied the functional approach to present...
In this paper we propose a solution to matching bitstrings in the bitstring encrypted by stream cipher. We consider the following problem setting. There is a bitstring encrypted with owner's secret key and allocated on the remote untrusted site. The owner of these data wants to find all occurrences of some pattern presented as a bit string in the string on the remote site without revealing either...
In this paper we demonstrate how the concept of trust can be used to increase security in wireless sensor networks. Since because of limited resources the traditional approach to security based on cryptography is not always can be utilized in secure sensor networks, we consider the way of protecting such networks by taking into consideration trustworthiness of individual sensors. We show how trustworthiness...
A common property of practically all multi-party key agreement protocols is that they are non-hierarchical, i.e., they do not support user hierarchies. However, in real life, it is likely that members of groups and organizations differ in ranking according to their job positions so that people of higher rankings are privileged the same and higher privileged information than people of lower rankings...
The paper presents a spatial role-based access control (SRBAC) framework and its application to healthcare information systems that allow wireless access to information. The framework secures access to medical information and resources accessible through mobile computing devices by healthcare personal and patients. The framework utilizes location information in access control decisions, in order to...
We propose to use pattern matching on data streams from sensors in order to monitor and detect events of interest. We consider a privacy preserving pattern matching problem where patterns are given as sequences of constraints on input elements. We describe a new privacy preserving pattern matching algorithm over an infinite alphabet A where a pattern P is given as a sequence {pi1, pi2,..., pim}...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.