The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Securing the Internet of Things, more precisely, the ETSI Machine to Machine (M2M) architecture is a difficult task, since there is a need to secure heterogeneous wireless communications (cellular, wireless, wired), devices (sensor or mobile phone) and applications (programming language, framework, database). In this article, we present the state of the art concerning the security ontologies in various...
An RFID tag ownership transfer scheme named ROTIV is analyzed in this paper. ROTIV consists of three sub-protocols: mutual authentication sub-protocol, issuer verification sub-protocol and ownership transfer sub-protocol, and the designers claim that it has the merits of constant-time authentication of a tag to a reader, tag privacy-preserved, and issuer verification. Especially, the formal proof...
Radio Frequency Identification (RFID) technology is one of the important techniques of the Internet of Things, it has many security problems for it runs in open environment. In order to solve the communication security problem between the RFID tag and the reader, in this article, we proposed a RFID security protocol based on hash chain and Three-way Handshake. We also analyzed the security of the...
This paper presents the implementation and the performance comparisons of two Bulk-Synchronous Parallel (BSP) algorithms to compute the discrete state space of models. These algorithms are simple to express and the first one is the most general one whereas the second is dedicated for structured models of security protocols. Benchmarks of security protocol scenarios has been done showing the benefits...
Wireless sensor networks are often deployed in hostile and unattended environments. Then two important problems for key management are presented. First, how to establish the encryption keys among sensor nodes to ensure the security of the network applications. Second, how to avoid the key being obtained especially the sensor be captured. In this paper, we proposed a novel key management method based...
Remote trusted operation is essential for many types of sensors in an even greater number of applications. It is often crucial to secure guarantees that a particular sensor sample is taken by a specific sensor at a particular time and stated location. We present the first generic system architecture and security protocol that provides low cost, low power, and low latency trusted remote sensing. The...
Formal analysis and verification for security protocol is a difficult and essential problem in network security. In this paper, one important formal analysis tool --protocol composition logic (PCL) is introduced. Its precursor PDS, structure and central idea are analyzed. After sketching the environment of security protocol, we develop a framework for formal analysis and verification of security protocols...
Due to the resource limitations of sensor nodes, providing security protocols is a particular challenge in sensor networks. A popular proposed method is the neighborhood based key agreement protocol (NEKAP), which is an improvement over the well-known Localized Encryption and Authentication Protocol (LEAP). NEKAP is an efficient and light-weight protocol, but includes loopholes through which adversaries...
Real world sensor network deployments and prototype implementations are still a challenging research and development area for scientists and engineers. We present a prototype implementation of a ubiquitous monitoring system (UBIMOS) applying wireless sensor networks. The monitoring system is designed for use by various operation teams, especially by critical rescue and communication teams. With its...
The degree to which a cryptographic protocol is susceptible to successful attacks or penetrations cannot be accurately calculated because of the more fine and fast algorithms to break ciphers, being introduced. To deal with the issue, analysis of a cryptographic protocol becomes more vital; and more exhaustive search for vulnerabilities is required. Kerberos is a widely used security protocol for...
Wireless Industrial communications is emerging technology after the Fieldbus in industrial field. Since the industrial control application is needed in wireless industrial technologies, WIA-PA standard is defining the protocol suite, system management, gateway, and security for low-data-rate wireless connectivity with fixed, portable, and moving devices supporting limited power consumption requirements...
Security protocols are hard to design, even under the assumption of perfect cryptography. This is especially true when a protocol involves different timing aspects such as timestamps, timeout, delays and a set of timing constraints. In this paper, we propose a methodology for modeling and analyzing security protocols that are aware of timing aspects. We develop a formalism for modeling security protocols...
Based on strand spaces, this paper formally analyzes an important authentication protocol- the Yahalom-Paulson protocol from the aspects of both secrecy and authentication. The result shows that the session key distributed by the server is secure, but there is a flaw in the protocol, even if the responder and initiator receive keys, they may receive different keys. And then an improvement to this...
The course titled Network Security Protocols is critical for graduate students interesting in research on information security, with two education goals focusing on protocol design and analysis. Due to the absence of proper textbooks on network security protocols, it is a little hard to propose efficient education schemes. In this paper, a compositive education purpose solution is proposed for knowledge...
The RFID technique is spot-lighted as the main technology in ubiquitous era to identify the information of the objects. Because the communication on the RFID system is operated in the wireless, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol which is good for the low-cost tags based on ECC and AES. By using AES, the protocol could minimize tag...
In this paper we present PasS (privacy as a service); a set of security protocols for ensuring the privacy and legal compliance of customer data in cloud computing architectures. PasS allows for the secure storage and processing of users' confidential data by leveraging the tamper-proof capabilities of cryptographic coprocessors. Using tamper-proof facilities provides a secure execution domain in...
We modified the multi-agent negotiation test-bed auction scheme which was proposed by Collins et al. In 2004, Jaiswal et al. have modified Collins's scheme, but Jaiswal's scheme still has some security weaknesses: such as replay data attack and DOS (denial-of-service) attack, collision between customers and a certain supplier. So the proposed protocol tries to reduce DOS attack and avoid replay data...
This paper considers the privacy issues in attribute-based access control systems, and presents a privacy-preserving access control protocol named as symmetrically oblivious envelope protocol. Its important property is symmetric privacy, i.e., the resource owner can't learn attribute values of the resource requester, and the resource requester can't learn access control policies established by resource...
Security becomes the major concern in a modernized electricity network. The IEC 61850 standard has been developed for substation automation, providing more enhancing communication functionalities. The standard defines several kinds of messages for data exchange between nodes in the substation. Among them, two critical messages have very stringent performance requirement for secure substation operation...
As a special kind of security protocol, ecommerce protocols have been analyzed with many formal methods in recent years. However, there is no general specification and verification model checking method to be applied effectively to the four special properties in ecommerce protocols--non-repudiation, accountability, fairness, and timeliness. Based on our previous work on the suitability of colored...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.