The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid growth of the Internet, the current TCP/IP based network cannot well satisfy the requirements such as scalable content distribution, mobility, security and so on. The new networking architectures which aren't based on TCP/IP have been a trade of next generation networking such as Information-Centric Networking (ICN). In smart grid, parts of communication protocol in IEC 61850 are also...
As a kind of new technologies in smart grid, vehicle-to-grid (V2G) constructs a flexible and extensible inter-operation platform between electric vehicles and grids, in which the bidirectional charging can be performed between vehicles and grid based on the demands. In V2G, there are numerous challenges among which cyber security is a major one that needs to be addressed with priority. The software-defined...
Software-Defined Networking (SDN) and Network Function Virtualization (NFV) are emerging as promising innovations for future network, which make Virtual Network Service (VNS) possible to be implemented broadly. It is the common truth that VNS is realized by the collaborations of multi-providers in practical scenario, where potential risks are lying in the collaborations. The primary risk is the availability...
In the next generation (5G) wireless networks, device-to-device (D2D) communication is an important technology to improve frequency efficiency and provide proximity service. In this paper, we focus on a scenario where spare frequency resources in a cellular network are exploited by D2D users to provide local service. Considering the fact that the channel quality experienced by an end user varies from...
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Enhanced-Bivium is a reduced version of Trivium which is suitable for RFID system. In this paper, the security of Enhanced-Bivium is concerned under cube attack, which is one of the best known attack on the reduced round Trivium proposed by Dinur and Shamir at EUROCRYPT 09. Trivium...
RFID (radio frequency identification) is a small electronic device that consists of small chip and an antenna. The biggest challenge for RFID technology is to provide benefits without degrading the secutiry level. This paper proposes a new RFID authentication protocol based on the lightweight stream cipher Enhanced-Bivium. In terms of security we show that the protocol is robust under the attack of...
Software-defined Home Networks (SDHN) is a key development trend of smart home. Security is still an important issue in SDHN. In this paper, a multi-stage attack mitigation mechanism is proposed for SDHN using Software-Defined Networking (SDN) and Network Function Virtualization (NFV). Firstly, an evidence-driven security assessment method using SDN factors and NFV- based detection is designed to...
Trivium is a notable light-weight synchronous stream cipher submitted to the European eSTREAM project in April 2005. Quavium is a 4-round Trivium-like algorithm which is almost as fast as Trivium. In this paper, the structure of Quavium is studied and we study the security of Quavium under state recovering attack, which is the best known attack to Trivium, i.e., we try to recover the internal state...
For 5G, Software-Defined Networking have emerged as a future mobile network architecture. It is so called Software-Defined Networking based Mobile Networks (SDN-MN). Because of the dynamic and virtual features of SDN-MN, most traditional network vulnerability assessment methodologies cannot be applied in SDN-MN directly. As a result, a new methodology of vulnerability assessment for SDN-MN is needed...
The integration of Internet of Things (IoT) and social networks is the important trend of new network technologies, which is Social Internet of Tings (SIoT). In many application scenarios, SIoT are controlled by different authorities. And the network nodes belong to different domain can share the sensor data by standard protocols. Moreover, in a mission-critical application scenario various types...
Social Peer-to-Peer (P2P) is a novel model to organize sensor networks, which can establish social relationships in an autonomous way with the benefits of extending the network boundaries and enhancing the network scalability. However, the complexity and time dependence characteristics introduced by social P2P model raise difficulties for assessing and selecting security services accurately and effectively...
Many kinds of protocols have been designed to resolve the security and privacy problems of RFID systems. In this paper, we illustrate a new RFID authentication protocol based on Trivium, inspired from the Challenge-Response based RFID authentication protocol for distributed database environment. The proposed protocol can prevent many attacks including spoofing attack, replay attack, tracking and desynchronization...
Network attack graphs are originally used to evaluate what the worst security state will be if a network is under attack. Along with observed intrusion evidences, we can further use attack graphs to extrapolate the current security state of a concerned network. Methods have been proposed in recent years to use observed intrusion evidences to compute the node belief metric of network attack graphs...
In this paper, we propose a group-based trust model named F-PKI (Freely organized one level Public Key Infrastructure) in P2P system based on Trusted Computing (TC) technology which is used to enhance PC security by incorporating hardware platform. In this model, peers are organized freely by group, each of which is a one level PKI. Preliminary evaluation results show that the proposed model is realistic...
All current vulnerability assessment tools only can locate individual vulnerabilities on a single host without considering correlated effect of these vulnerabilities. Aiming at this issue, this paper proposes a method of generating attack graph based on privilege escalation. The vulnerabilities and known attacks with their prerequisites and consequences are modeled based on predicate logic theory...
Network security alert causal correlation aims at correlating causal related security alerts into comprehensible attack scenarios. In this paper, we propose a novel correlation criterion by evaluating the time expenses of the attacks that trigger security alerts. By taking the attack time expenses as random variables and studying their probabilistic distribution, we can calculate the temporal correlation...
OAEP is widely accepted because of its provable security and practicability. However, there was a twist in the security proof in the random oracle model. Shoup revealed a flaw in the original security proof by Bellare and Rogaway. In this paper, a revision of the security proof is presented to fix the flaw. Furthermore, compared with some existing improved prove methods, the revised proof is applicable...
Digital signature schemes based on public-key cryptosystems generally permit existential forgery, except the schemes are equipped with some message formatting mechanisms, such as using hash functions or padding redundancies. In 2004, Chang et al. proposed a new digital signature scheme, and claimed the scheme without using any hash function or padding any redundancy can resist forgery attacks. However,...
Nowadays digital Multimedia copyright protection is up against austere challenge. The watermarking and encryption used together is more and more important in digital multimedia security (DMS) application. So in this paper, a novel approximation zero-tree-wise wavelet watermarking with difference chaos shift key coding encryption method of DMS information security is present. Firstly the DMS information...
Active content transformation in Web is a hot topic in Internet content delivery research. In this paper, we proposed 3 different modes content transformation, which are whole-file buffering, byte-streaming, and chunk buffering. Based on the chunk dependence graph, we studied the performance for different modes and argued that the chunk streaming is the most appropriate transform model for Web intermediaries...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.