The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Vehicular ad hoc network (VANET) has attracted the attention of many researchers in recent years. It enables value-added services such as road safety and managing traffic on the road. Security issues are the challenging problems in this network. Sybil attack is one of the serious security threats that attacker tries to forge some identities. One of the main purposes for creating invalid identities...
In this paper we study probabilistic key management schemes for large scale wireless multi-hop networks. We propose a novel method in which a probabilistic scheme combined with location information is used for distributing symmetric keys among the nodes. In order to apply the location information of the nodes in key distribution process, we partition the network into some regions and use graph coloring...
This paper presents an efficient implementation of a fast and pipelined Bit-parallel Montgomery multiplier and squaring over GF(2m) generated by irreducible trinomials. The architecture of the multiplier is based on a parallel and independent computation of multiplication by negative powers of x as polynomial variable in multiplication and squaring. The structure has a regular and low complex architecture...
A transform-based watermarking technique is investigated in this study. The watermark signal is built by using a chaotic map and then is embedded to cosine coefficients of the scrambled host image. Experimental results confirm that the watermarked signal is robust against a range of signal processing and attacks which threatened a watermarking system.
One of the challenging tasks in face recognition is illumination variation. In this paper, we propose an encoding domain correlation technique for face recognition to handle the illumination problem. This technique is based on sparse representation of optical encryption of training images to form unconstrained minimum average correlation energy (UMACE) filter. Averages authentication rates for YaleB...
Online Social Networks (OSNs) have become widely popular in recent years. In spite of users' interest to join OSNs, sharing vast amounts of personal information and resources in these networks might result in privacy issues for them. In the centralized OSNs, access control policies defined by users are enforced by OSN providers. Moreover, as these shared resources are stored by providers, they can...
Diffusion layers are an important part of most symmetric ciphers and MDS matrices can be used to construct perfect diffusion layers. However, there are few techniques for constructing these matrices with low implementation cost in software/hardware. Conventional MDS matrices are constructed on finite fields and MDS matrices over commutative rings acting on modules have been characterized by Dong Dong...
TEA and XTEA are two lightweight Feistel block ciphers, each of which has a block size of 64 bits and a key size of 128 bits. These two ciphers have ARX structure, i.e. their round functions consist of modular addition, shift and XOR to be exact. Since each operation of TEA and XTEA can be done in a bitwise fashion, we are able to use early abort technique in the impossible differential attack that...
Recently, many lightweight authentication schemes have been designed for RFID systems since the release of the EPC Class1 Generation2 (EPC-C1G2) standard. In 2013, Pang et al. proposed a novel secure RFID authentication protocol, named SRP+, and claimed that their scheme efficiently guarantees the tag privacy and satisfies the security requirements. But later, Wang et al. showed that SRP+ is vulnerable...
Covert channel is one of the remarkable issues which are raised in computer network security. These channels use the computer network's resources to transmit information furtively. Since the purpose of covert channels is to stay hidden from the network security equipments, hence their detection will be difficult. The growth of wireless networks and their broadcast nature make them suitable environments...
Radio Frequency Identification (RFID) is an easy to use technology for quick and low-cost identification and authentication. Since RFID systems have found in various parts of our daily lives, security awareness about these systems has become one of the prominent topics for researchers. In this study, we investigate two RFID security schemes which both are under Electronic Product Code (EPC) standard...
Steganography is a choice in order to have a secret communication and it can be achieved by embedding a message inside a carrier object. JPEG as a common image format is a good target for steganography. In JPEG steganography, due to compression artifacts, it is not possible to embed data in pixels. As a result, most of the prevalent steganography methods for JPEG tend to embed data in JPEG coefficients...
LBlock is a lightweight block cipher proposed in ACNS 2011 as a solution to the security challenge in extremely constrained environments. Because biclique cryptanalysis had not been invented when this cipher was designed, the designers themselves evaluated the security of this cipher one year later in WISA 2012, where a modified key schedule was also suggested to make this cipher resistant against...
Field Programmable Gate Arrays (FPGAs) are quickly becoming a fundamental flexible integrated circuit building block of choice for many applications such as aerospace, military and defense systems. In addition, instead of using a large number of logic gates, FPGA today can be used to implement any circuits that you want. Furthermore, FPGAs can be configured as system on a chip (SoC). In June 2013...
We present a flexible hierarchical role based access control model based on simple and existing technologies that enables efficient function-level access control, prototyped in a system called LRBAC1, a Linux kernel module enforcing access control over program execution. The hierarchical design allows for easy maintenance of roles and access rights in an organization, effectively thwarting access...
Nowadays, to provide a picture of the current intrusive activities in the network, detection methods are important to tackle the probable risks of attackers' malicious behaviors. Intrusion Detection Systems (IDSs), as detection solutions, are one of the main devices to record and analyze suspicious activities. A huge number of low-level alerts generated by IDSs clearly reflect the need for a novel...
Code reuse attacks such as return oriented programming and jump oriented programming become the most popular exploitation methods among attackers. A large number of practical and non-practical defenses have been proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among them is to consider the common behavior of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.