The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Thanks to pervasive environment, users can remotely have access to various resources and services within their public or private living space. Consequently, several security and privacy issues are raised especially due to the wireless access used to get services and to the privacy aspect that could be involved. To securely deploy these services in multiple smart spaces, we propose a secured service...
Thanks to the dynamic and decentralized nature of their infrastructure, mobile ad-hoc networks (MANET) contribute significantly to the deployment of services in pervasive environments. In the small area environments (houses, workplaces, hotspots, public areas, etc), these networks are not completely as secure as expected, according to user privacy. Within this kind of environment, it is still a challenging...
Anonymous authentication is a means of authorizing a user without revealing his/her identification. Mobile technologies such as radiofrequency identification (RFID) tags, PDAs and mobile phone systems are increasingly being deployed in pervasive computing. These mobile devices have raised public concern regarding violation of privacy, anonymity and information confidentiality. Considering these concerns,...
The increasing progress in wireless mobile communication has attracted an important amount of attention on the security issue. To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session key. So far, several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area...
Security is an important feature to be considered for successfully deployment of PARTY protocol. In this paper, firstly, we will identify a variety of attacks that could affect and disturb network functionality. Without any authentication mechanism and incentive for cooperation, network performance can be severely degraded. Here we propose a preventive and corrective mechanism based in the token solution...
To provide secure communication for mobile devices, authenticated key agreement protocol is an important primitive for establishing session key. So far, several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a secure authenticated key agreement (EC-SAKA) protocol based on elliptic curve cryptography...
Several protocols have been proposed to provide robust mutual authentication and key establishment for wireless local area network (WLAN). In this paper we present a new secure authenticated key agreement (SAKA) protocol that provides secure mutual authentication, key establishment and key confirmation over an untrusted network. The new protocol achieves many of the required security and performance...
PARTY is a new routing protocol developed for wireless self-organizing networks, to overcome many inherent routing problems, like the overhead, and the scalability. From the security point of view, it is impossible to deploy this protocol in its actual phase. Thus this paper will demonstrate the vulnerability of this protocol against various kinds of attacks, we propose a preventive and corrective...
A few works deal with the forwarding attacks in self organized network, as most of research care for securing the routing process to minimize the effects of an attacker on the network stability. However, data packet forwarding behavior is a very important aspect that should be taken into account to achieve a high-quality performance in application and network stability. We propose in this paper an...
Securing a multicast architecture is a basic procedure in order to avoid attacks and guarantee the communication integrity and confidentiality. This becomes more vital when dealing with ad hoc network. The lack of physical and administrative infrastructure and the dynamic topology, make the ad-hoc network more arduous to be secured. In this paper, we propose a key management protocol to secure ad-hoc...
Owing to pervasive computing and advanced technology, particularly wireless and the Internet, a large number of connected smart devices are deployed within smart environments to provide services for elderly and handicapped users. The aim of this paper is to first give an overview of security requirements for smart environments which have been recently studied to better show the lack of security services...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.