The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Industrial Wireless communications is emerging technology after the Fieldbus in industrial field. For industrial control application with wireless industrial technologies, the WIA-PA standard defines the protocol suite, system management, gateway, and security for low-data-rate wireless connectivity with fixed, portable, and moving devices supporting the limited power consumption requirements. In...
The current state for security research in sensor networks presents many approaches for all possible security services. Upon network deployment protocols must be selected and made to work together so that they meet application requirements like security level, dynamics or power consumption. This is a non-trivial process and requires an expert in both security and networks, and can definitely not be...
BAN logic can prove whether a protocol can reach expected target and find some flaws in the protocol. The paper analyzed constitute of BAN logic and analysis steps. On the basis of the above work, BAN logic was used to construct an ideal model of the Otway-Rees protocol and the security of the protocol was analyzed with the initial hypothesis and the logic postulate. The paper also pointed out various...
The security of protocols for Web services needs to be verified for variety and internal semi-structure of XML messages and composition of standard Web services specifications. Relying on the specifications of WS-Trust and WS-Secure Conversation, a secure session protocol based on trust brokering model has been presented, which protects a SOAP message as well as protects a session between Web services...
An overview of the EAP-based handover procedures of the IEEE 802.16e standard is introduced and their security vulnerabilities are analyzed. Possible solutions for secure handover in IEEE 802.16e networks that guarantee a backward and forward secrecy are described and formally verified using Scyther, a specialized model checker for security protocols. These solutions showed a few drawbacks in the...
Kerberos protocol is one of the popular security protocols used to authenticate the identities of the communication participants. The key distribution mechanism in this protocol is suitable for other secure applications. We formalize the protocol using CSP methods. Based on the formal model, the mechanism of the protocol is exposed to us clearly. Principles and tools support the verification of the...
Mobile ad hoc networks (MANETs) have many well-known applications in military settings as well as in emergency and rescue operations. However, a lack of infrastructure and centralized control make MANETs inherently insecure, and therefore specialized security services are needed for their deployment. Self-certification is an essential and fundamental security service in MANETs. It is needed to securely...
VoIP provides multimedia (audio and video, etc) services through Internet Network. Due to the characteristic of Internet, there are many attacks and threats in Internet, so are VoIP. Therefore, user authentication, confidentiality, and integrity of signaling message, media stream are required for secure communication. TLS and S/MIME are proposed for SIP signaling message protection and SRTP for media...
Authentication and encryption technology are the core components of the DRM (Digital Rights Management) system. In this paper, a security protocol basing on the identity-based signcryption scheme is proposed to implement these technologies simultaneously. According to the comparison with the PKI (public key infrastructure)-based DRM system, the advantages of this protocol are proved. However, in practice...
To secure wireless sensor networks, a particularly challenging problem is how to feasibly deal with the internal attacks against the routing protocols, such as Byzantine attacks. In this paper, we proposed a secure routing a lightweight security protocol for detecting Byzantine attacks. In this paper, we develop: (1) an secure cluster header selection and clustering scheme that a source node can authenticate...
This paper proposes a new security protocol with satisfying the lightweight requirements of the security of RFID system - A Minimalist Mutual Authentication Protocol for RFID System Based on EPC C1G2 Standard. The scheme makes sufficiently use of the limited resources of RFID system to encrypt, decrypt and implement mutual authentication between readers and tags, Then the paper gives qualitative analysis...
The inductive approach has been used successfully to analyse local area network protocols, Internet protocols, e-commerce protocols and smart card protocols, But the theorems proofs method is very complex and is very difficult to master. lt requires that a user must guide the proof process, and select the tactic to be applied etc. Proofs are cumbersome and security properties are not built into the...
In addition to existing voice call service, the GSM platform has evolved to include various multimedia services and 3G services enabling international roaming. On that ground, safe data transmission and receiving technology and protection of privacy have become the key elements for the GSM service. However, many researchers have pointed out the problems inherent to the security algorithm and protocol...
In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations. Furthermore, an RC4-based hash function for the generation of message authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.