The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
E-payment systems by their nature are complex. Thus, with lack of well-designed formal models to provide a suitable method for their modelling and monitoring many challenging tasks will remain unsolvable. The present work aims at designing and implementing an e-Payment Protocols Formalism, PPF, to allow properties examination and verification for e-payment protocols. The proposed formalism was built...
the goal of this paper is to survey access control models, protocols and frameworks in IoT. We provide a literature overview and discuss in a qualitative way the most relevant IoT related-projects over recent years.
We are discussing a framework for formally modeling and analyzing the security of trusted boot processes. The presented framework is based on actor networks. It considers essential cyber-physical features of the system and how to check the authenticity of the software it is running.
In only a few ten years payment systems have undergone an incredible evolution passing from a physical transfer of cash to transactions exchanging money as digital data. Mobile Payment (m-payment) refers to one type of electronic payment, performed through mobile devices, such as mobile phones, smartphones, and tablets. To ensure trust and avoid frauds severe security requirements must be imposed...
The architecture of TETRA digital trunking protocol stack is described in this paper. The procedure and development of energy economy mode are stated in details. The protocol conformance tests of energy economy mode are implemented in the simulation environment, and simulation test results show that the devolopmented protocol stacks of energy economy mode are in accordance with “ETS 300 392-2 TETRA...
This thesis puts forward an innovative model of health management service grid, and gives the overall architecture of health management grid platform system by which a health management service model can be established based on the analysis of present condition of health management in China. This paper also presents a new integrated model about the health management service resources by using the...
Wireless sensor-based Body Area Networks (BAN) can play a major role in providing individualized health-care. Given their limited power sources, sensors in BAN have to be energy-efficient to ensure longevity and safety of the network. Recent years have seen the emergence of a new class of security solutions for BANs, called cyber-physical security solutions, which enable plug-n-play secure communication...
This paper considers the possible application of ride share services in vehicular area networks. We propose a system architecture and protocol for this specific application using the vehicle to vehicle (V2V) and vehicle to road (V2R) communications. We present how the system would integrate with the current VANET infrastructure and the On-Board Unit, and present algorithms for selection of ride share...
When humans interact with machines in their daily networks, it is important that security of the communications is offered, and where the involved shared secrets used to achieve this are easily remembered by humans. Password-based authenticated group key exchange (PAGKE) schemes allow group users to share a session key based on a human-memorizable password. In this paper, we consider two PAGKE schemes...
The use of the Internet and the wide-ranging computer networks have brought about enormous changes in trade and business. The speed, efficiency, the decrease of cost and the use of the passing opportunities are among the advantages which make the employment of the electronic trade inevitable. A thorough procedure of the electronic trade consists of marketing, negotiation, entering into an agreement,...
Ambient intelligence (AmI) refers to an environment that is sensitive, responsive, interconnected, contextualized, transparent, intelligent, and acting on behalf of humans. AmI environments impose some constraints in the connectivity framework, power computing as well as energy budget. This makes of AmI a significantly different case within distributed systems. The combination of heterogeneity, dynamism,...
Biometric technology has been adopted in important elements of the national infrastructure, such as electronic passports and immigration control systems. However, the threats of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. We introduce nine telebiometrics authentication models and a biometric...
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of intellectual property or secrets to a remote party with a reasonable security that such secrets will...
Today, e-mail is one of the most popular communication facilities. E-mail list service (ELS) is a useful facility for scientific, commercial and social user groups. The main concern about ELS is how to manage and control the access of different users. To secure ELS by using security protocols and encryption/decryption mechanisms as well as user authentication, the computational overhead of servers...
A wireless security protocol can be modeled as a Kripke structure M. The model checking problem for a logic L is: given a formula phiisinL decide if phi holds in the states of M. The alternating time temporal logic (ATL) is expanded and the alternating time temporal logics of knowledge is considered. We propose an efficient algorithm to model-check ATL of knowledge properties.
Biometrics-based authentication systems are being increasingly used to control physical access to high-security facilities. In the case of biometrics authentication through an open network, there are many vulnerabilities which need to be addressed. After analyzing the possible vulnerabilities of a biometrics-based network authentication system, this paper presents a biometrics-based network authentication...
The seamless combining with context-aware sensors and numerous devices and e-home server will soon become a part of our home environment in the near future. We name it as a context-aware home based on ubiquitous computing concept. This context-aware home reduces participations of users in order to realize a ubiquitous computing and automates various services. Therefore, the risk of privacy violation...
With an increased focus on national security and public safety communications, the US Congress revisited its plan to reclaim television broadcaster frequencies to be reallocated and auctioned by the FCC and it specifically allocated a portion of that spectrum for use by public safety. The FCC was charged with the duty of auctioning this spectrum and licensing it to create a public safety network....
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
The security of wireless sensor networks is ever more important nowadays. Most of the proposed security protocols in wireless sensor networks are based on authentication and encryption. But all of them only address part of the problem of security in wireless sensor networks. Recently, the use of reputation and trust systems has become an important secure mechanism in wireless sensor networks. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.