The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper propose a signature scheme based Trusted Computing Platform with two secret keys, while, using smarty card for enhancing the security of the system. For preventing from tampering with the information on public channel, the information and the signature will be encrypted with one-time padding system by the user and signatory. Finally, the article finishes correctness confirmation and security...
Wireless sensor networks can be applied in power engineering such as marine gas turbine to monitor engine working surroundings and sense certain data such as air pressure, temperature, compressor speed, and rotor vibration etc. Such data may be stored locally at nodes and be collected on demand. Data confidentiality usually needs to be protected to defend against information exposure upon retrieval,...
Broadcast authentication is an essential security service in wireless sensor networks, as it allows a sender to broadcast messages to multiple nodes in an authenticated way. This paper propose a light-weight, scalable broadcast authentication scheme over a long period of time. Instead of using multi-level key chains as in multilevel ??TESLA, the scheme uses multiple short key chains to replace one...
Because of the special characteristics of the ad hoc networks, such as highly dynamic topology, open access of wireless channels, and the lack of regular network infrastructure, the routing and user data communication are more vulnerable. Therefore the nodes risk assessment is very important. The traditional assessment is subjective and unreliable due to the fact that some nodes reveal little information...
According to the MOV reduction theory, the identity-based encryption (IBE) scheme basing on the bilinear map will lose the high efficiency of elliptic curve. So it is meaningful to build the provably secure identity-based encryption scheme, but which is without the bilinear map. In this paper, based on this existing result and our new research, an improved IBE scheme will be proposed. But it is different...
On the basis of power-law approaches such as the frequency-degree, degree-rank, Internet topology modeling was studied and obvious power-law properties together with corresponding power exponents depicting characters of Internet topology structure were found. Then, an improvement of BA model was started to better charactering Internet topology by means of an optimization procedure with respect to...
The existing analytic models on network worm propagation rarely consider the effect of topology structure, and it usually considers the probability and spread parameter as fixed values. They are not coinciding with real situation. Here in the paper, a microstructure based propagation model is proposed to inflect the variability with time. In this model, many probability factors are considered, for...
One of the most prevalent security problems in network is the rampant propagation of email worms. In this paper game theory is suggested as a method for modeling and computing the probabilities of expected behaviors of email users in the email worm propagation process. The game situation models the actions of the email users under the condition that at the time they open an attachment, the system...
A chaotic worm propagation model is proposed to analyze early worm propagation process in this paper. Worm propagation is very complex, whose major transitions are between regular cycles and irregular, possibly chaotic epidemics. This paper deals with a discrete mathematical model of early worm propagation systems: Chaotic Susceptible-Infected (CSI) model. In the CSI model, three threshold values...
Insider threat is widely recognized as an utmost important issue for organization security management. Documents are often considered as the most important information assets so that they will be the chief target of insider misuse. The former coarse grained security policies, such as "the principle of least privilege" and "separate of duty", are not enough to address insider threat...
Two optimization strategies based on Bloom Filter are proposed for P2P security. In order to protect the privacy of trust information in P2P systems, BFManager using BloomFilter is employed to manager trust information, and builds a structure called trust bucket to store trust value and divides peers with different trust value into different trust buckets. The other is called as BFChecker to optimize...
The WAI (WLAN Authentication Infrastructure), which is composed of mutual certificate authentication and key agreement, is the authentication protocol in the Chinese Wireless LAN standard. In this paper, we analyze the WAI protocol using a finite-state verification tool Mur?? and find that the authentication protocol can't resist the denial of service attack. Attackers can forge the messages to produce...
In this paper, inspired by the change of antibody concentration in biological immune system, we present a novel computer virus detection method from ideas of immunology (NCVDMII). In NCVDMII, the concepts and formal definitions of antibody, antigen, nonself and detector are given. Then, NCVDMII get the specific antibody from the simulation of primary immune response and calculate the antibody number...
As the rapid growth of network attacking tools, patterns of network intrusion events change gradually. Although many researches have been proposed to analyze attackers' behaviors to improve the detection rate, they still suffer in high false rate in intrusion detection. Therefore, an effective intrusion detection system (IDS) deployment requires carefully planning, preparation, prototyping, testing,...
Anomaly detection of executable program is a security detection solution that examines whether security violation issues exist in programs. The paper presents a novel anomaly detection approach for executable program security (ADEPS), which monitors program executions and detects anomalous program behaviors. Through reverse analysis of executable program, critical behavior monitoring points can be...
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
Network covert channels can be used to transfer secret information in network protocols. For a kind of network covert channels hidden in overt sources with fixed probability distribution, we propose a modified Pearson chi-square test which improves detection accuracy. We incorporated adjacent probability values and divided the new distribution into two partitions sensitive to different hidden sections...
Modern large-scale multimedia networks, such as the Internet, are characterised by heterogeneity due to the versatile nature of the communication subsystems they consist of. We focus on heterogeneous networks where individual greedy, contention-resolution protocols are simultaneously running (composed) over different network queues. A question that arises in such settings of multimedia systems concerns...
Fully distributed file sharing systems, where participants share content and collaborate in a peer-to-peer (P2P) manner, have to deal with a highly dynamic environment to ensure that even when some nodes are unavailable, others can still perform the task through the coalition of cooperating parties. Therefore, cooperation-based services have been extensively deployed over the majority of P2P networks...
Attribute based encryption has become an active topic within the last few years, which can be regarded as a special identity based encryption integrated with flexible access structure. In this paper, we extend the concept of key encapsulation mechanisms to the attribute-based setting and proposed a key-policy attribute based key encapsulation scheme. The proposed scheme is proved to be IND-CCA2 secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.