The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
Mobile Ad hoc Network (MANET ) is a collection of independent wireless mobile nodes, which is deployable on the fly. This work addresses the critical problem of key distribution in MANET by mining the traffic in network layer to extract the meta-data patterns and utilize them as tokens in application layer. A simple, fault-tolerant, and scalable approach with no prerequisite is introduced. It explains...
Voice service is vulnerable to a number of attacks that can compromise the confidentiality, integrity and authenticity of voice communication. This paper describes the design of communication protocols for securing SIP based VOIP communication. It presents the architectural principles involved and the overall security solution comprising the design of secure extensions to SIP messages. Finally it...
We analyze the problem of Trusted Network Connection (TNC) and descript Direct Anonymous Attestation protocol (DAA). A new key distribution scheme based on host integrity and identity is taken out for identity verify, host integrity checking and group key distribution. After this, we bring forward members join protocol and members remove protocol. At Last this paper analyzes the security of this scheme.
This paper first analyzes authentication and key agreement protocol adopted by 3rd generation partnership project (3GPP) system architecture evolution (SAE) release 8 standard, and points out the security problems solved and not solved in contrast with third generation wireless communications. Then we focus on several security defects in the protocol, and based on public key cryptosystem, puts forward...
The emerging wireless mesh networks (WMN) is a broadband access technology. However, the introduction of multi-hop and self-organization properties of WMN disables the adoption of IEEE 802.11i security scheme which is widely used in WLAN networks. This paper mainly focuses on the studies of secure authentication protocols of mesh security association (MSA) architecture proposed by IEEE 802.11s task...
Key management in sensor networks is the core security protocols for wireless sensor networks (WSNs) in the hostile environment. Sensor nodes have highly constrained resource like limited battery power, memory, processing capabilities, etc. These limitations make infeasible to apply traditional key management techniques such as public key cryptography in the WSNs. For the existing key pre-distribution...
We present a calculus of concurrent objects for specification and security analysis of ad hoc security protocols. The communicating nodes and the network are modeled by objects, while the interactions between them are modeled by asynchronous method invocations. The internal state of an object is represented by a constant method which can be overridden. The approach is complemented by a control flow...
Security is extremely important for the deployment of a mobile ad-hoc networks (MANET) due to its openness to attackers, the absence of an infrastructure, and the lack of centralized administration. Most research efforts have been focused on secure routing protocols, the distributed certificate authority, and key distribution, while a few projects have focused on secure autoconfiguration. However,...
This paper presents a multi-agent security architecture, which utilizes the agent characteristics to cater for security processes in online communications. The multilayer communication approach (MLC) is used to determine the security processes, which uses cryptography protocols to secure data and communication channel. Agents are skilled to perform certain tasks. At the sender's host, agents interact...
Recently, several research contributions have justified that wireless communication is not only a security burden. Its unpredictable and erratic nature can also be turned against an adversary and used to augment conventional security protocols, especially key agreement. In this paper, we are inspired by promising studies on such key agreement schemes, yet aim for releasing some of their limiting assumptions...
In this paper we suggest a protocol for secure data distribution in a one-way communication scenario aimed at time distribution for sensor networks. Our protocol is designed to support timestamps in any format, including repeating, resettable, and incomplete timestamps. The protocol requires a trusted powerful source node. We show that the protocol is immune to attacks including replay attacks, wormhole...
The cluster-based routing of wireless sensor networks (WSNs) requires secure, robust protocols for wireless communication. Unfortunately, existing protocols are unsuitable due to the limited storage space of nodes. Although symmetric-key-based solutions have been available, all of them suffer from possible severe attacks, and the problem of limited storage space. These issues are truly critical in...
Universal network and pervasive service is one kind of new network architecture. In this architecture, in order to guarantee the security of access network and terminal, terminal access control and access network authentication must both be implemented. Terminal unified access control method based on identifier realizes unified access control of various terminals, authentication of authentication...
A gateway-oriented password-based authenticated key exchange (GPAKE) scheme allows a client to establish an authenticated session key with a gateway via the help of an authentication server, where the client has pre-shared a password with the server. The desirable security properties of a GPAKE include session key semantic security, key privacy against the server, and password guessing attacks resistance...
The complexity of the initial secrecy problem for protocols in restricted form, with bounded length messages, unbounded number of protocol sessions, bounded existentials, disequality tests and an intruder with existentials remained open. In this paper, we prove that the problem above is undecidable, using exactly the same setting and formalism as in the paper in that the problem was initially stated...
Pairing devices over insecure wireless channels is a difficult task, especially when there is no trusted third party or when either the delivering network or the third party itself can't be trusted. In this work we present a light-weight yet sophisticated protocol for establishing secure communications channels between devices. The protocol uses any asymmetric cryptosystem's keys and a novel exchange...
A new three-party quantum secure direct communication protocol with authentication is proposed. The advantage of the scheme is that through authentication one can confirm the sender's legitimate identity, partially entangled states used as information carrier are easy to prepare and store, there is no need to transmit quantum states with secret message in quantum channel and two users can simultaneously...
Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric cryptographic protocols are not suitable for the resource-constrained wireless sensor nodes. Several key pre-distribution schemes have been proposed in literature to establish pairwise key between sensor nodes, but most of which only...
Most proposed multi-bank e-cash protocols in the literature have been developed based on group signatures in which the member revocation problem is inevitable. In this paper, we propose a new multi-bank e-cash protocol by using blind ring signatures and linkable ring signatures, by which the client anonymity control and bank anonymity control are achieved respectively. Since our blind ring signature...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.