The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Forward-secure logging protects old log entries in a log file against an adversary compromising the log device. However, we show that previous work on forward-secure logging is prone to crash-attacks where the adversary removes log entries and then crashes the log device. As the state of the log after a crash-attack is indistinguishable from the state after a real crash, e.g., power failure, the adversary...
We propose AccountTrade, a set of accountable protocols, for big data trading among dishonest consumers. To secure the big data trading environment, our protocols achieve book-keeping ability and accountability against dishonest consumers who may misbehave throughout the dataset transactions. Specifically, we study the responsibilities of the consumers in the dataset trading and design AccountTrade...
This paper introduces a new lightweight key exchange (KE) protocol which can be suitably implemented on resource-constrained smart devices to protect the privacy of communications in mobile networks. The most attractive features of this new KE protocol are provable security and lightweight. The security of this new KE protocol is based on the known impossibility of finding the unique values for variables...
Hopper and Blum suggested a human authentication protocol (HB) for unaided humans based on shared secrets. It does not require specialized hardware or software and it works based on learning parity with noise. Evidently both human and the low cost pervasive devices cannot perform cryptographic authentication as they have inherent resource constraints. The human computer security can be used for pervasive...
Decentralized Continuous Double Auctioning offers a flexible marketing approach to power distribution in resource constrained (RC) smart micro-grids. Grid participants (buyers and sellers) can obtain power at a suitable price both at on or off-peak periods. Decentralized CDA schemes are however vulnerable to two attacks, namely - 'Victim Strategy Downgrade' and 'Collusion'. Both attacks foil the CDA...
Traditional flow monitoring provides a high-level view of network communications by reporting the addresses, ports, and byte and packet counts of a flow. This data is valuable, but it gives little insight into the actual content or context of a flow. To obtain this missing insight, we investigated intra-flow data, that is, information about events that occur inside of a flow that can be conveniently...
Zigbee is an IEEE 802.15.4-based specification for low-power wireless mesh networks. Being a protocol with several known vulnerabilities, it continues to attract extensive research interest due to its potential applications in the Internet-of-Things (IoT). One of Zigbee's weak points lies in the network coordinator's initial handshake with a joining device, which is unencrypted. Our paper proposes...
In this paper, we are proposing a new formal framework for reasoning on authentication in security protocols based on analytic functions. We give sufficient conditions that, if satisfied, the protocol is declared correct with respect to authentication. We validate our approach on the Yahalom-Lowe protocol. First, we show that it satisfies these few conditions, thus, we conclude that it is correct...
An asymmetric secret sharing scheme (A-SSS) can set the number of servers at less than k, because it makes up to k-1 shares from one key of the owner of the secret. Therefore, the secret is not revealed even if all the servers are attacked. However, when the owner's key is stolen and attacked, shares may be leaked. Therefore, in this paper we propose a proactive secret sharing scheme suitable for...
As the dependency on Internet is increasing, the service providers are launching numerous web applications to facilitate the users. Due to threat of unauthorized access they want to identify their users accurately. In the same way, leakage of sensitive information makes clients aware enough to make sure whom they are dealing with. This leads to the requirement of a Centralized Authentication System(CAS)...
Security Solutions can never be completely and permanently developed. It may be true that One Time Pad might be one of the most complete Cryptosystems ever designed. That being said, it's not always that One Time Pad can be used. There are many applications where a lightweight but powerful Cryptosystem is required. This is where CRYPSTER comes in. The CRYPSTER is a modification on the platform of...
In the classical Secret-Key generation model, Common Randomness is generated by two terminals based on the observation of correlated components of a common source, while keeping it secret from a non-legitimate observer. It is assumed that the statistics of the source are known to all participants. In this work, the Secret-Key generation model based on a compound source is studied where the source...
The Internet of Things (IoT) drives the world towards an always connected paradigm by interconnecting wide ranges of network devices irrespective of their resource capabilities and local networks. This would inevitably enhance the requirements of constructing dynamic and secure end-to-end (E2E)connections among the heterogenous network devices with imbalanced resource profiles and less or no previous...
Since the novel ideas on secret sharing were first proposed in 1979, a number of variants have been invented, based on these two schemes. The secret sharing schemes have selectively been applied to many distributed storage systems connected by both wired and wireless communication links for securely storing files. However, when gathering file fragments necessary to recover a file from network-based...
Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. In this paper we present pCloud, a distributed system that constitutes the first attempt towards...
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network...
In this work we seek to achieve VoIP end users' profile privacy without violating the QoS constraints on the throughput, end to end delay, and jitter, as these parameters are the most sensitive factors in multimedia applications. We propose an end-to-end user anonymity design that takes into consideration these constraints in a hybrid environment that involves ad-hoc and infrastructure networks. Using...
Remote diagnostics protocols have generally only considered correct authentication to be enough to grant access to vehicles. However, as diagnostics equipment or their keys can be stolen or copied, these devices can not be trusted. Thus, authentication alone is not enough to prevent unauthorized access to vehicles. In previous work, we proposed an authorization protocol to prevent unauthorized access...
The quantity of data that is captured, collected, and stored by a wide variety of organizations is growing at an exponential rate. The potential for such data to support scientific discovery and optimization of existing systems is significant, but only if it can be integrated and analyzed in a meaningful way by a wide range of investigators. While many believe that data sharing is desirable, there...
An RFID tag ownership transfer scheme named ROTIV is analyzed in this paper. ROTIV consists of three sub-protocols: mutual authentication sub-protocol, issuer verification sub-protocol and ownership transfer sub-protocol, and the designers claim that it has the merits of constant-time authentication of a tag to a reader, tag privacy-preserved, and issuer verification. Especially, the formal proof...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.