The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless positioning in indoor environment is growing rapidly with the development of location based services. Among these technologies, fingerprinting positioning has been widely used, and its performance is satisfactory in precision requirement. The radio-map is the key to fingerprinting positioning. However, once the application scenarios changed, and the radio-map doesn't get updated in time,...
Wireless personal area network (WPAN) is small-ranged network centered at an individual for interconnecting personal devices. For such a network, the bootstrapping mechanism with which the devices establish a secure group key is of critical importance. Most existing bootstrapping mechanisms require out-of-band channels and involve human interactions for authentication. In this paper, we aim to develop...
He HMAC algorithm involves a hash function with a secret key. And SM3 is the only standard hash algorithm of China. HMAC-SM3 algorithm is based on the mixing of different algebraic operations, such as XOR and addition modulo 232, thus the classical side-channel attacks on it are mainly against these basic group operations and need to exploit multiple leakage models. Therefore, the attack procedures...
Elliptic Curve Cryptography (ECC) is becoming widely deployed in embedded cryptographic devices because of the reduced number of key bits. However, the side-channel attacks especially simple side-channel analysis (SPA) can obtain secret keys by measuring power consumption. To resist this attack there appear a number of countermeasures such as Montgomery ladder and double-and-add-always algorithm....
A k-out-of-n Extended Visual Cryptography Scheme (EVCS) is a secret sharing scheme which hides a secret image into n shares, which are also some images. The secret image can be recovered if at least k of the shares are superimposed, while nothing can be obtained if less than k shares are known. Previous EVCS schemes are either for black-and-white images or having pixel expansion. In this paper, we...
Service replication-based fault tolerant strategies use several web services as replicas to perform the same task and, therefore, become an effective approach to improve the reliability of service-oriented applications. A basic assumption of these strategies is that replicas are independent. However, it does not always hold in the web services environment since replicas could be composite services...
Performing mutual device authentication before providing services is a critical step for ensuring that the services are only accessible to legitimate users. This paper proposed a new form of biometric authentication, the Multiple Fingers Synchronization (MuFS) mutual authentication scheme which can be used for device mutual authentication. MuFS achieves comparable performance as traditional biometric...
Mobile ad hoc networks possess the following features: open transmission medium, dynamic topology structure, acentric management and distributed cooperation, and so on. Therefore, Ad Hoc Networks have high practical value, while at the same time it is difficult for which to guarantee the routing security, which is the most important component of the entire network's security, it is also a difficult...
A low-cost cryptographic processor for security embedded system is presented in this paper. The processor, without any assistance of dedicated cryptographic coprocessors, is scalable and very efficient for popular cryptographic algorithms such as RSA/ECC, AES, Hash, etc. Based on SMIC 0.18 um standard CMOS technology, the core circuit of the test chip has only about 32 k gates, and a max frequency...
Many wireless networks are susceptible to spoofing attacks, whereby an adversary imitates the network identifiers of legitimate devices. Conventionally, assuring the identity of the communicator and thereby detecting an adversarial presence is performed via device authentication. Unfortunately, full-scale authentication is not always desirable as it requires key management and more extensive computations...
Spoofing is a serious threat for both ad hoc and sensor networks, that can cause adverse effects on a network's operations. Although cryptographic authentication can assure the identity of a transmitter, authentication is not always desirable or possible as it requires key management and more extensive computations. In this paper we argue that it is desirable to have a functionality complementary...
Elliptic curve cryptography (ECC) serves as an excellent candidate for secure embedded multimedia applications due to its small key size and high security protection. With performance profiling, several major bottlenecks of the ECC implementation are identified, and some suitable integer multiplication schemes over the VLIW and SIMD architecture are proposed. In particular, FIR-based multiplication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.