The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We investigate the possibility of covert and secret key generation over a discrete memoryless channel model with one way public discussion. Protocols are required to conceal not only the key but also whether a protocol is being implemented. For some models, we show that covert secret key generation is possible and characterize the covert secret key capacity in special cases; in particular, the covert...
Large numbers of Internet of Things (IoT) devices are increasingly deployed in many aspects of modern life. Given their limited resources and computational power, verifying program integrity in such devices is a challenging issue. In this paper, we design MTRA, a Multiple-Tier Remote Attestation protocol, by exploiting differences in resources and computational power among various types of networked...
We study the secure storage of the output of a data source on a public database. We consider a rather large class of data sources. In order to prevent unauthorized users from learning the output of the data source we make use of the output of a biometric source or a physical unclonable function (PUF). As we regard the output of the PUF source as a resource, we are interested in the smallest possible...
Consider in an asymmetric scenario that Alice and Bob wish to communicate unequal amount of classical information, we propose an asymmetric quantum dialogue (QD) protocol based on the entanglement swapping between two-qubit bell state and four-qubit cluster state. In this scheme, assume that there are two legitimate participants Alice and Bob. In a dialogue, the information that is delivered by Alice...
This paper describes our blockchain architecture as a new system solution to supply a reliable mechanism for secure and efficient medical record exchanges. The Advanced Block-Chain (ABC) approach was designed to meet the demands in healthcare growth as well as in the new form of social interactive norms. It is going to revolutionize the e-Health industry with greater efficiency by eliminating many...
In Wyner wiretap II model of communication, Alice and Bob are connected by a channel that can be eavesdropped by an adversary with unlimited computation who can select a fraction of communication to view, and the goal is to provide perfect information theoretic security. Information theoretic security is increasingly important because of the threat of quantum computers that can effectively break algorithms...
The Smart Grid (SG) initiative introduces a two-way communication between utility companies and the consumers thanks to Advanced Metering Infrastructure (AMI) networks. One of the most crucial components that constitute an AMI network is smart meters (SMs). SMs execute some programs called firmware to rule the hardware. The firmware occasionally needs to be updated to fix bugs and improve the services...
Tor hidden services make it possible to hide Internet services' location. Via so-called rendezvous circuits, Tor users can communicate with hidden services without learning each other's location. In this paper, we propose a performance-enhanced rendezvous circuit, which consists of five instead of six relays. We show that omitting the client's middle relay in a rendezvous circuit brings significant...
With a growing amount of transferred data in an interconnected world, the insurance of a secure communication between two peers becomes a critical task in the software industry. A leak of critical data can cause tremendous costs in a financial, social but also political manner. For this sake, cryptographic protocols are implemented and regulate the data transfer, thus ensuring the safety of transferred...
As sensor nodes in a wireless network are tiny, very small, low-cost and deployed in an unattended environment, they are easily prone to many kinds of serious attacks. One such attack is Node Replication attack, where the attacker creates multiple clones /replicas of the legitimate node and deploys them at various paths in the network. As these replicas behave exactly like legitimate node, it is very...
The use of the Smartphones is increasing day by day and also used as an essential tool for everyday tasks. Most of the smartphone applications are used to fetch the data from the servers and transmit the sensitive user information to the server. This communication is carried on a wireless network, which is more vulnerable than the wired network. This insecure communication channel needs to be protected...
Cloud computing is a growing technology that offers compute, storage and network resources as a service over the internet. It enables the individuals, clients or the enterprises to outsource their data and application software to the cloud server. The services are offered by a cloud service provider (CSP) and the users need to pay for what they use. There are many security concerns needs to be addressed...
The Controller Area Network (CAN) is a broadcast communications network invented by Robert Bosch GmbH in 1986. CAN is the standard communication network found in automobiles, industry equipment, and many space applications. To be used in these environments, CAN is designed for efficiency and reliability, rather than security.
Due to resolving the key escrow problem and public key authentication problem, certificateless public key cryptography has drawn many attentions from numerous scholars and experts in recent years and becomes a hotspot for cryptography research. Most recently, the scholars of He and Du proposed a forward secure certificateless proxy blind signature scheme. Through the security analysis on the forward...
The current IPsec gateway integrates many functions of IPsec operation, tunnel management and forwarding decision, which makes the IPsec gateway complicated in maintenance and deployment. The problem of maintaining such devices prevents IPsec VPN from applying widely. The emergence of SDN provides an innovative way to decouple the control plane and data plane. In this paper, a Software-Defined IPsec...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
5G Networks are anticipated to provide a diverse set of services over Network Slices (NS) using Network Function Virtualization (NFV) technologies. We propose solutions to enable NS selection and routing of traffic routing through a NS. A framework for enabling negotiation, selection and assignment of NSs for requesting applications in 5G networks is presented. A definition for service description...
In modern years we see some growth in technology and for better traffic control on road with these some technologies the moving vehicle can do the better communication in Ad-hoc network which developed a new kind of technology like Vehicular Ad-hoc Network(VANET). VANET provides wireless communication with vehicle to road side unit. VANET can perform the communication between V2V, V2I, I2I. VANET...
The centralized zone data service (CZDS) was initiated by the Internet Corporation for Assigned Names and Numbers (ICANN), a global Internet overseer, to facilitate sharing and access to zone data as hundreds of new generic Top-Level Domains (gTLDs) are added to the Internet. The goal of CZDS is to improve the security and transparency of the naming system. In this study, we explore CZDS's transparency...
In this paper, for secure routing optimization we are introducing dynamic trust management protocol in information centric network and delay tolerant network (DTN) environments. In the existing system, dynamic trust management for DTN is used to deal with the detection of the selfish, malicious misbehaving nodes and genuine loss nodes. To disrupt DTN operations, malicious nodes performing trust-related...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.