The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol [16]. As a distinguishing feature, AugMQTT does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides. Also, we discuss several aspects of AugMQTT followed by performance overhead of the AugPAKE protocol...
Zigbee is an IEEE 802.15.4-based specification for low-power wireless mesh networks. Being a protocol with several known vulnerabilities, it continues to attract extensive research interest due to its potential applications in the Internet-of-Things (IoT). One of Zigbee's weak points lies in the network coordinator's initial handshake with a joining device, which is unencrypted. Our paper proposes...
Although Mental Imagery based Brain-Computer Interfaces (MI-BCIs) seem to be very promising for many applications, they are still rarely used outside laboratories. This is partly due to suboptimal training protocols, which provide little help to users learning how to control the system. Indeed, they do not take into account recommendations from instructional design. However, it has been shown that...
Proofs of Retrievability (POR) is a scheme to build a verifiable storage on a remote server that a client can access the data randomly, and periodically execute an efficient Audit protocol to ensure that the data is intact. In dynamic POR, the difficulties are to maintain the latest version of the data while achieving efficient Update and Audit. In this paper, we propose PDPOR that achieves the best...
DFAs (Deterministic Finite Automata) and DTMCs (Discrete Time Markov Chain) have been proposed for modeling Modbus/TCP for intrusion detection in SCADA (Supervisory Control and Data Acquisition) systems. While these models can be used to learn the behavior of the system, they require the designer to know the appropriate amount of training data for building the model, to retrain models when configuration...
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
With the increasing proliferation of mobile devices, location-based services enjoy increasing popularity. At the same time, this raises concerns regarding location privacy, as seen in many publicized cases when user location is illegitimately tracked both by malicious users and by invasive service providers. This paper is focused on privacy for the location proximity problem, with the goal of revealing...
In this paper, we are proposing a new formal framework for reasoning on authentication in security protocols based on analytic functions. We give sufficient conditions that, if satisfied, the protocol is declared correct with respect to authentication. We validate our approach on the Yahalom-Lowe protocol. First, we show that it satisfies these few conditions, thus, we conclude that it is correct...
Extensive use of computer network and huge amount of data had led several works to focus on intrusion detection system, which are based on single dataset or to combine multiple detection techniques to analyze detection rate and false positive flag.
Error-related potentials (ErrP) have been increasingly studied in psychophysical experiments as well as for brain-machine interfacing. In the latter case, the generalisation capabilities of ErrP decoders is a crucial element to avoid frequent recalibration processes, thus increasing their usability. Previous studies have suggested that ErrP signals are rather stable across recording sessions. Also,...
Trace anonymity is an extension of the formulation of anonymity by Schneider and Sidiropoulos. To prove the trace anonymity of infinite-state or unbounded systems, we have introduced proof techniques in which we find a binary relation called an anonymous simulation. There are two sorts of anonymous simulation methods — a forward-style method and a backward-style method. In our previous work, we discussed...
In this paper, we tackled a problem: Given a security specification and its implementation, does the implementation satisfy the security specification? We first formalized the problem in terms of Petri nets. Next, we gave a polynomial time procedure to solve the problem based on Petri nets' analysis technique. Then we illustrated the procedure with an example to show the effectiveness.
An asymmetric secret sharing scheme (A-SSS) can set the number of servers at less than k, because it makes up to k-1 shares from one key of the owner of the secret. Therefore, the secret is not revealed even if all the servers are attacked. However, when the owner's key is stolen and attacked, shares may be leaked. Therefore, in this paper we propose a proactive secret sharing scheme suitable for...
The paper is a study of an active sensory technology network with a new DASH7 protocol. The main aim was to establish the basis for implementing localization of moving objects in real time. Due to its low power consumption, long range, and good permeability resulting from the application of the DASH7 protocol, the technology under analysis can contribute to the development of a system of real-time...
Mobile Ad-hoc Networks (MANETs) are one possible solution for infrastructure-independent communication in disaster scenarios. In such scenarios, communication is essential to coordinate first responders and safe lives. But mobile nodes in large areas face several challenges related to connectivity, resulting in frequent partitions and intermittent connections. Protocols as well as network access technologies...
Web-based service-oriented grid computing refers to a distributed computing system comprising a collection of interconnected and virtual computers that provides web-based services via the Internet. These services are based on Service Level Agreements (SLAs) established by negotiation between service providers and consumers. SLAs are contractual obligations that define the mutually agreed understandings...
Understanding tradeoffs among stakeholder requirements regarding liveness (something good happens) and safety (nothing bad happens) is crucial for designing sociotechnical systems (STSs). Safety-focused specifications restrict agents' actions to avoid undesired executions. However, such restrictions hinder liveness. We formalize such tradeoffs using the elements of an STS specification to understand...
The protocols underlying large-scale geo-replicated storage systems implement a wide spectrum of transactional consistency criteria. These protocols typically execute in two phases: ● In the Execution phase, a transaction reads from a database snap-shot and buffers its updates. ● In the Termination phase, a multicast/2PC protocol commits updates atomically while performing a so-called certification...
Low-power embedded platforms are widely used in various data collection scenarios to capture physical world phenomena in micro-scale. Given that many applications require long operation times, it is important for nodes to employ various schemes to maximize their lifetime. Within the sensor network research community, schemes such as low-power listening (LPL) and low-power probing (LPP) have been actively...
The electromyography (EMG) reflects the electrical behavior generated by muscles movements. According the movement, muscles fibers are activated and the EMG signal reflects changes of different electromagnetic components of these fibers in time. In this paper, we describe the methodology applied for the detection of fiber muscle activation, which required the creation of digital data base with EMG...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.