Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Research into the security of the Internet of things is increasingly attracting the attention of the scientific community. This study examines three key security requirements, with an emphasis on Internet systems of things: authentication, privacy and access control. Attention is focused on security issues that have not been resolved to date, and also addresses the problems and future trends in the...
Building secure networks is one of the most important tasks of information security. The paper describes the main technologies of dynamic networks and technologies for secure communication in them. Also this paper reviews and compares the system developed by the authors for the secure exchange of data in dynamic networks using encryption with data technology.
Recently, the implementation of IoT technology development has been growing rapidly. One of IoT applications is smart home system. In this system, in-home hardwares are connected to the internet. Thus, residents can access them using any internet-connected devices, such as mobile phones. Since the main concern of the IoT system is communication, the design of an efficient and secure communication...
In this paper, we initiate the study of garbled protocols — a generalization of Yaos garbled circuits construction to distributed protocols. More specifically, in a garbled protocol construction, each party can independently generate a garbled protocol component along with pairs of input labels. Additionally, it generates an encoding of its input. The evaluation procedure takes as input...
Security protocols are critical components for the construction of secure and dependable distributed applications, but their implementation is challenging and error prone. Therefore, tools for formal modelling and analysis of security protocols can be potentially very useful to support software engineers. However, despite such tools have been available for a long time, their adoption outside the research...
By applying power usage statistics from smart meters, users are able to save energy in their homes or control smart appliances via home automation systems. However, owing to security and privacy concerns, it is recommended that smart meters (SM) should not have direct communication with smart appliances. In this paper, we propose a design for a smart meter gateway (SMGW) associated with a two-phase...
We consider the problem of a client efficiently, privately and securely delegating the computation of multiple group exponentiations to a computationally more powerful server (e.g. a cloud server). We provide the first practical and provable solutions to this batch delegation problem for groups commonly used in cryptography, based on discrete logarithm and RSA hardness assumptions. Previous results...
The IoT is a technology that enables the inter-connection of smart physical and virtual objects and provides advanced services. Objects or things are generally constrained devices which are limited by their energy, computing and storage capacity. A Wireless Sensor Networks (WSN) is a network composed of devices managed by a CPAN (Personal Area Network Coordinator). The network is used in order to...
Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and...
As the use of IoT devices is explosively increasing in everyday life, OCF has tried to make a specification to give interoperability between IoT devices. In this paper, we propose a new packet format and a new GATT service definition to support CoAP messages over BLE transmission for the OCF specification. Also, OCF resources in the CoAP packets can be exchanged between OCF devices via BLE-GATT protocol...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
Glossy is a flooding-based communication primitive for low-power wireless networks that leverages constructive interference to achieve high reliability. The Low-power Wireless Bus (LWB) uses Glossy to abstract an entire wireless network into a shared bus like topology. As Glossy is not designed as a secure communication protocol, Glossy and hence LWB are vulnerable to unauthorised eavesdropping and...
The rapid development of information technology to bring convenience to people but also to the data and information security has brought great challenges, how to protect the data, safe communication is a popular research direction. In the paper, we propose a necessary and sufficient condition for constructing an invertible matrix on the finite field, which can produce a large number of reversible...
HTTPS has become a vital component of the WWW ecosystem. However, today's application-layer middleboxes in the cloud are largely “blind” to HTTPS traffic. We propose a novel system infrastructural solution, called CloudEye, that allows middleboxes to selectively manipulate HTTPS traffic. A key design philosophy of CloudEye is to hide all the complexity from client and server applications (thus being...
Nowadays the easiest way to connect with people is chatting by using Mobile Chatting Applications which offers us a lot of helpful facilities. Though different Chat Applications offers different security to users but leads to increase in vulnerabilities & risks of attack on data. Not only for business conversations also for normal conversations our data must be secured because, someone's data...
With the increasing of mobile devices, Device-to-Device(D2D) communication is considered as a promising technology for achieving direct communication of devices. But the security issues still remain to be solved. In this paper, We utilize D2D communication between UEs in proximity to share epidemic media contents. We propose a Secure Content Sharing Protocol(SCSP) that combine with the credibility...
Message Locked Encryption (MLE) provides a way to achieve deduplication of data over the cloud in a secured and efficient manner. Various cryptographic protocols that are variants of the MLE scheme have been introduced, but they are either vulnerable to poison attack or consume a large amount of bandwidth. We introduce a new client-side deduplication protocol, called DICE (Dual Integrity Convergent...
Elliptic Curve Cryptosystem (ECC) schemes are public-key mechanisms that provide encryption, digital signature and key exchange capabilities. The advantage of elliptic curves is that they ensure a level of security equivalent to that of existing public key systems but with shorter key lengths. In this paper, we take an interest in public-key exchange of Diffie-Hellman. We propose a new approach of...
In this paper, we present an innovative quantum dialogue protocol for multiple users to get private information from each other without leaking any information. In our protocol, a semi-honest third party (TP) is introduced to assist multiple participants for exchanging their private information. Specifically, exploiting multi-particle entangled GHZ states as the information carriers, we investigate...
Ongoing research in the field of positioning in cellular devices has led to several Location Based Services (LBSs) and its application flooding the market. However, these applications are neglecting user privacy in order to generate highly accurate results for user queries. While most traditional Location Based Service use the K-anonymity principle to blur user?s exact location information, these...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.