The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
High accurate time synchronization is very important for many applications and industrial environments. In a computer network, synchronization of time for connected devices is provided by the Precision Time Protocol (PTP), which in principal allows for device time synchronization down to microsecond level. However, PTP and network infrastructures are vulnerable to cyber-attacks, which can de-synchronize...
Collaborative technologies have gained popularity due to the widespread adoption of cloud computing and web applications. Services like Google Docs, Office 365 can make one's documents accessible from everywhere, allowing real-time cooperative editing by multiple authors. From a security standpoint, they may offer transport protection by means of TLS, but the users's confidential data can still be...
We formalize in this work a model for node capture attack in a secure wireless sensor networks (WSNs). The adversary starts by overhearing exchanged messages to learn about the network because of all data transmissions nature (all in the air). Then, it has the physical access to the node, and with appropriate tools, it can read the secret information (like keys, programs, etc.) stored in the victim...
The Network Time Security specification provides measures which are designed to add security to time synchronization protocols, while considering their specific timing-related requirements. The development of the specification is accompanied by formal analysis of its security model. Special attention is paid to the Network Time Protocol, for which an implementation of those measures is in progress.
With the continuous development of the space technology, increasing communication between spacecrafts. To ensure the spacecrafts keep a uniform time standard, time synchronization protocol plays an crucial role. Taking account the characteristics of deep-space: poor link quality, limited node computing power, and the GNSS service is unstable, through the improving of IEEE1588 protocol, a autonomous...
The volume of personal information and data most Internet users find themselves amassing is ever increasing, and the fast pace of the modern world results in most people requiring instant access to their files. Millions of these users turn to cloudbased file synchronisation services, such as Dropbox, Microsoft SkyDrive, Apple iCloud and Google Drive, to enable "alwayson" access to their...
We present a demonstration of a novel protocol for secure transmissions on a Ultra-wideband impulse radio that includes distance bounding. Distance bounding requires radios to be within a certain radius to communicate. This new protocol can be used in body area networks for medical devices where security is imperative. Many current wireless medical devices were not designed with security as a priority...
In supporting many distributed applications, such as group text messaging, file sharing, and joint editing, a basic requirement is the efficient and robust synchronization of knowledge about the dataset such as text messages, changes to the shared folder, or document edits. We propose ChronoSync protocol, which exploits the features of the Named Data Networking architecture to efficiently synchronize...
TTEthernet is a communication platform for mixed-criticality systems, which are systems capable of hosting applications with differing criticality requirements. For example, one use case of TTEthernet is the communication bus for distributed Integrated Modular Avionics (IMA) systems.
In this paper, we propose a simple random key pre-distribution (RKP) scheme with self-healing for multiphase wireless sensor networks (WSNs) without even lightweight operations such as a hash function, in which the link compromised by node-capture attack in a WSN automatically self-heals with time. Our scheme can enhance the resiliency of existing RKP schemes by only updating the key pool of a server...
Dropbox, a popular cloud storage provider, pose several threats especially in terms of file security and unauthorized access. An Android and a web application which implemented Serpent cryptographic algorithm and One-Time Password (OTP) mechanism to secure files on Dropbox and a web application was built as a solution by utilizing Dropbox Application Programming Interface (API) and Bouncy Castle library...
This contribution is focused on securing end-to-end unicast communications in heterogeneous sensor networks comprising satellite links, while maintaining effective network performance. The proposed protocol extends the LOCKSAT (LOCal Key Synchronization and generation for data security in sATellite communication) key management procedure, and is able to guarantee a frequent key renewal while overcoming...
This contribution focuses on securing end-to-end unicast communications in heterogeneous wireless sensor networks comprising satellite links, while maintaining effective network performance. The proposed protocol extends the LOCKSAT key management procedure, and is able to guarantee a frequent key renewal while overcoming limitations of each subnetwork (e.g., sensor and satellite). The effectiveness...
In state-of-the-art automotive controllers, test in the field cannot use features dedicated to production test. However, the enhanced testability by access to features such as scan-chains can increase the effectivity and the diagnostic features of tests in the field significantly. Therefore, an appropriate test access to the integrated test-technology is required. In this paper, we describe the possibilities...
Message freshness and time synchronization are nowadays essential services in secure communication. Many network protocols can work correctly only when freshness of messages sent between participants is assured and when internal clocks protocol's parties are adjusted. In this paper we present a novel, secure and fast procedure which can be used to ensure data freshness and clock synchronization between...
Vehicular Networks by means of Car-to-X (C2X) communication aims to enhance road safety and traffic efficiency by exchanging foresighted traffic information. For successfully establishing this technology on the market, C2X messages have to be secured and the driver's privacy must not be violated. However, currently applied pseudonymization strategies provide only basic protection against profiling...
Key exchange is one of the major concerns in cryptology. Mutual learning between two neural networks has been used to address this issue. However, there is still a need to extend the concept so that a group of parties can share a common key. This work suggests an algorithm that employs and extends the mutual learning process to accommodate the much needed group secure communication. Here, a recursive...
This paper investigates on the security of time -- triggered transmission channels, which are used to establish a predictable and timely message transfer in a distributed embedded system with potential safety constraints. Within such a system, safety and security are closely related, because malicious attacks can have an impact on a system's safety and thereby cause severe damage. An attacker could...
Authentication has been a cornerstone of computer security for decades. A considerable number of authentication protocols have been specified and implemented. This paper compares most common families of client-server authentication protocols and shows the benefits of the combined use of One Time Password (OTP) with Password Authenticated Key Exchange (PAKE) protocols. Then, the paper addresses a particular...
In order to increase the resilience against spam, we design and implement a protocol based on cryptographic puzzles for an open-source web based e-mail client. Our proposal is compatible with existing e-mail infrastructure and does not require modifications on the server side. The only add-on is a stand-alone ticketing server that is used to deliver the current cost to each sender. The puzzles that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.