The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Broadcast authentication is a critical security service in wireless sensor networks (WSNs). However, due to resource constrains of sensor nodes, providing authentication mechanism for broadcast message is difficult. ??TESLA is a lightweight broadcast authentication protocol, which use a one-way hash chain and the delayed disclosure of keys to provide the authentication service. However, it suffers...
Internet has sponsored some revolutionary changes in the ways in which we interact with human society. One of the greatest dreams of the true Internet revolutionary was to enable cash to be available on the Internet. Thus helping the couch potato in increasing productivity. The last decade has seen many protocols for this concept. However, they failed in many aspects such as scalability of database,...
Classic encryption methods used in our life based on mathematical ideas are unsafe actually, so quantum encryption is proposed nowadays. Although quantum encryption is the unique method to protect datas and data transmission in theory, more processes are required during the production of quantum key to the achievement of encryption and decryption. Firstly, basic quantum key distribution protocol process...
Broadcast communication prevails for data dissemination and resource discovery. In mission-critical applications, extensive information sharing and coordination endow broadcast with new features: a large number of active broadcast sources, probabilistic broadcast reception and high receiving rate. We identify this type of broadcast traffic as ASP Bcast traffic. Many efforts have been made to authenticate...
Freshness is one of the most desired security properties of sensor network communication architecture. And sequence number is a common technique that is used as a freshness identifier to achieve freshness transmission. However, due to characteristics of wireless sensor network, such as resource-constrained and attack prone, it is vulnerable and energy-expensive to transmit sequence number directly...
Multicast research has explored the security challenges faced in group communications. Multicast transport and multicast security need to work in close collaboration to realise a multicast service. However, there has been comparatively little work to combine the two technologies. In this paper the authors is presenting an example of partially integrating timed efficient stream loss-tolerant authentication...
A deniable authentication allows the receiver to identify the source of the received messages but cannot prove it to any third party. However, the deniability of the content, which is called restricted deniability in this paper, is concerned in electronic voting and some other similar application. At present, most non-interactive deniable authentication protocols cannot resist weaken key-compromise...
The user-based security model and its replay protection principium are firstly introduced and then a replay protection scheme based on random number is proposed to avoid baleful replay attack because of the inefficiency of the USM. A random number is used as the authentication between manager and agent in this scheme, and the number is changed on each message exchange to ensure the agent can identify...
A deniable authentication can be used to provide secure negotiation on the Internet. Although many deniable authentication protocols have been proposed, most of them are interactive or vulnerable to various cryptanalytic attacks. To find a secure and efficient deniable authentication protocol, by encrypting a random and the time stamp and signing the corresponding ciphertext and the message to be...
Security for wired embedded networks is becoming a greater concern as connectivity to the outside world increases. Protocols used in these networks omit support for authenticating messages to prevent masquerade and replay attacks. The unique constraints of embedded control systems make incorporating existing multicast authentication schemes impractical. Our approach provides multicast authentication...
The deniable authentication protocols are very useful for providing secure negotiations over the Internet. An ID-based deniable authentication protocol has the advantages of an ID- based cryptosystem. To enhance the efficiency and the security of the ID-based deniable authentication protocols, based on the Cha-Cheon signature scheme, by encrypting a random element and the time stamp and signing the...
A framework of three attributes for video surveillance systems is underlined: availability, accessibility and authenticity. Under this framework, a scenario in which surveillance cameras can be accessed by remote devices, such as mobile phones, PDAs, over IP is addressed. Some security drawbacks of an off-the-shelf product are depicted and a new solution is proposed which uses cryptographic authentication...
In the emergency broadcast system (or emergency alert system) which aims to broadcast a warning information immediately in time of emergency such as a natural or civil disaster, computational power-restricted devices such as, pocket terminals and sensors need to instantly and securely verify correctness and integrity of the received message packets. Though a lot of broadcast authentication systems...
A deniable authentication can be used to provide secure negotiation on the Internet. Although many deniable authentication protocols have been proposed, most of them are vulnerable to various cryptanalytic attacks. Recently, a new deniable authentication protocol was proposed by Lee et al. However, Lee et al.??s protocol is not flawless yet due to its susceptibility to KCI attack. Then, based on ElGamal...
The proposed broadcast authentication protocols for wireless sensor networks can be divided into two categories, protocols based on digital signature and protocols based on improved message authentication code. This paper implements and evaluates the performance of two broadcast authentication: TinyECC, which is based on ECDSA, and GBA, which is based on improved MAC. Through analysis of the performance...
Broadcast encryption deals with broadcasting an encrypted message, so that only a set users termed privileged can decrypt it. These privileged set can be formed by selecting t users among n users within the group. To make sure that the data is available only to privileged users in the group the secret key is used which is known only to members of privileged set at any instant of time. Using secret...
OT (oblivious transfer) is an important e-commerce technique to make information buyers be able to get desired information and preserve privacy at the sametime. Recently, Kim et al. proposed two 1-out-of-2 NIOT (non-interactive OT) schemes. They claimed the message sender can be verified in their schemes. Unfortunately, their schemes are insecure. In this paper, we will make thorough discussions on...
Traditional methods for message authentication are based on the cryptographic verification of received data using some sort of a shared secret. While this task is not critical for traditional networks, Wireless Sensor Networks (WSNs) may pay a high price for the gained protection - sensor nodes are forced to invest their already scarce resources in receiving a message and executing cryptographic computations,...
Multicasting has not been widely adopted until now, due to lack of receiver or end user (EU) access control. We have developed the Internet group management protocol with access control (IGMP-AC), an extended version of IGMPv3, which provides EU access control by incorporating the AAA framework into the existing multicast service model. Furthermore, IGMP-AC works as an extensible authentication protocol...
ASP mode-based networked manufacturing system is a resource sharing platform, and network securities especially the authentication is essential to this system. This article studied USB key based digital certificate authentication mode, and then analyzed its merits and limitations, finally applied challenge-response and time-stamp technologies to form a new authentication protocol to enhance the validity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.