首页 > 最新文献

2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)最新文献

英文 中文
Password-protected secret sharing scheme with the same threshold in distribution and restoration 具有相同分发和恢复阈值的密码保护秘密共享方案
Pub Date : 2018-03-09 DOI: 10.1109/MOBISECSERV.2018.8311441
Kentaro Tsujishita, Keiichi Iwamurra
Conventional password-protected secret sharing (PPSS) based on Shamir's (k, n) secret sharing scheme requires 2k − 1 shares for reconstructing a search result. However, it can reconstruct the secret by leveraging k shares, because it performs secure multiplication. In this case, it is easier to restore the secret than the search result. In this paper, we propose a novel PPSS with the same distribution threshold for the secret as well as the restoration of the search result. We use the TUS2 method proposed by Aminuddin et al. However, it cannot include 0 as a secret. Therefore, we improve the TUS2 method such that it can include 0 as secret. In addition, we evaluate the security of our scheme, and prove that it is secure. Furthermore, we compare the computational cost of the conventional PPSS and our scheme.
基于Shamir (k, n)秘密共享方案的传统密码保护秘密共享(PPSS)需要2k−1个共享才能重建一个搜索结果。但是,它可以通过利用k个共享来重建秘密,因为它执行安全乘法。在这种情况下,恢复秘密比恢复搜索结果更容易。在本文中,我们提出了一种具有相同秘密分布阈值和搜索结果恢复的新型PPSS。我们使用Aminuddin等人提出的TUS2方法。但是,它不能包含0作为秘密。因此,我们改进了TUS2方法,使其可以包含0作为秘密。此外,我们还对方案的安全性进行了评估,证明了方案是安全的。此外,我们还比较了传统的PPSS和我们的方案的计算成本。
{"title":"Password-protected secret sharing scheme with the same threshold in distribution and restoration","authors":"Kentaro Tsujishita, Keiichi Iwamurra","doi":"10.1109/MOBISECSERV.2018.8311441","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311441","url":null,"abstract":"Conventional password-protected secret sharing (PPSS) based on Shamir's (k, n) secret sharing scheme requires 2k − 1 shares for reconstructing a search result. However, it can reconstruct the secret by leveraging k shares, because it performs secure multiplication. In this case, it is easier to restore the secret than the search result. In this paper, we propose a novel PPSS with the same distribution threshold for the secret as well as the restoration of the search result. We use the TUS2 method proposed by Aminuddin et al. However, it cannot include 0 as a secret. Therefore, we improve the TUS2 method such that it can include 0 as secret. In addition, we evaluate the security of our scheme, and prove that it is secure. Furthermore, we compare the computational cost of the conventional PPSS and our scheme.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast secure computation based on a secret sharing scheme for n < 2k − 1 基于n < 2k−1的秘密共享方案的快速安全计算
Pub Date : 2018-03-09 DOI: 10.1109/MOBISECSERV.2018.8311438
Keiichi Iwamura, Kyohei Tokita
Secure computation is a major issue that affects the utilization of Big Data. Two main approaches are employed to achieve secure computation: homomorphic encryption (HE). and secret sharing schemes (SSSs), where the computational cost of the latter is generally much less than that of HE. Aminuddin et al. proposed a secure product-sum computation that allows secure multiplication for n < 2k − 1 by using the (scalar value x polynomial) approach. However, this approach requires a polynomial calculation because it uses Shamir's SSS, so it cannot be processed rapidly. In this study, we propose a fast secure computation method based on the XOR scheme, and we evaluate its performance and security.
安全计算是影响大数据利用的主要问题。实现安全计算主要采用两种方法:同态加密(HE)。秘密共享方案(SSSs),后者的计算成本通常比HE少得多。Aminuddin等人提出了一种安全的乘积和计算,该计算允许使用(标量值x多项式)方法对n < 2k−1进行安全乘法。然而,这种方法由于使用Shamir的SSS,需要多项式计算,因此不能快速处理。本文提出了一种基于异或方案的快速安全计算方法,并对其性能和安全性进行了评价。
{"title":"Fast secure computation based on a secret sharing scheme for n < 2k − 1","authors":"Keiichi Iwamura, Kyohei Tokita","doi":"10.1109/MOBISECSERV.2018.8311438","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311438","url":null,"abstract":"Secure computation is a major issue that affects the utilization of Big Data. Two main approaches are employed to achieve secure computation: homomorphic encryption (HE). and secret sharing schemes (SSSs), where the computational cost of the latter is generally much less than that of HE. Aminuddin et al. proposed a secure product-sum computation that allows secure multiplication for n < 2k − 1 by using the (scalar value x polynomial) approach. However, this approach requires a polynomial calculation because it uses Shamir's SSS, so it cannot be processed rapidly. In this study, we propose a fast secure computation method based on the XOR scheme, and we evaluate its performance and security.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An evaluation of a virtual network function for real-time threat detection using stream processing 利用流处理对实时威胁检测的虚拟网络功能进行评估
Pub Date : 2018-02-24 DOI: 10.1109/MOBISECSERV.2018.8311440
Martin Andreoni Lopez, A. Lobato, O. Duarte, G. Pujolle
Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. Real-time traffic monitoring and fast security threat detection is a challenge to reduce the risk of great damages. In this paper, we propose a virtualized network function in an Open Source Platform for providing a real-time threat detection service. Our function combines cloud computing and distributed stream processing techniques to accurately and quickly detect threats. The proposed virtualized network function shows a good elasticity shrinking and scaling accordingly to the required load. The results show that the proposed function is able to scale dynamically, analyzing more than five million messages per second. In addition, the function easily migrates sensor elements to reduce latency, allowing the sensor to be located as near as possible to the client.
网络功能虚拟化(NFV)为高效、低成本的安全解决方案提供了新的机遇。实时的流量监控和快速的安全威胁检测是降低巨大损失风险的挑战。在本文中,我们提出了一个开源平台的虚拟化网络功能,以提供实时威胁检测服务。我们的功能结合了云计算和分布式流处理技术,可以准确快速地检测威胁。所提出的虚拟化网络功能具有良好的弹性,可根据所需的负载进行收缩和扩展。结果表明,所提出的功能能够动态扩展,每秒分析超过500万条消息。此外,该功能可以轻松地迁移传感器元素以减少延迟,从而使传感器尽可能靠近客户端。
{"title":"An evaluation of a virtual network function for real-time threat detection using stream processing","authors":"Martin Andreoni Lopez, A. Lobato, O. Duarte, G. Pujolle","doi":"10.1109/MOBISECSERV.2018.8311440","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311440","url":null,"abstract":"Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. Real-time traffic monitoring and fast security threat detection is a challenge to reduce the risk of great damages. In this paper, we propose a virtualized network function in an Open Source Platform for providing a real-time threat detection service. Our function combines cloud computing and distributed stream processing techniques to accurately and quickly detect threats. The proposed virtualized network function shows a good elasticity shrinking and scaling accordingly to the required load. The results show that the proposed function is able to scale dynamically, analyzing more than five million messages per second. In addition, the function easily migrates sensor elements to reduce latency, allowing the sensor to be located as near as possible to the client.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs) 基于图的移动自组网虫洞攻击检测
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311439
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, A. Mammeri
A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.
移动自组织网络(MANET)是一组节点,它们使用无线媒介以协作的方式进行通信,没有任何中央管理。由于其固有的开放性和缺乏基础设施,与其他网络相比,安全是一个复杂的问题。也就是说,这些网络很容易受到不同网络层的各种攻击。在网络层面,恶意节点可以进行从被动窃听到主动干扰的多种攻击。虫洞是最近备受关注的严重攻击的一个例子。它涉及通过虫洞隧道重定向两个终端节点之间的流量,并操纵路由算法,使彼此相距很远的节点产生邻居的错觉。为了解决这个问题,我们提出了一种新的检测模型,允许节点检查假定的最短路径是否包含虫洞隧道。我们的方法是基于虫洞隧道大大缩短了通过它的路径长度这一事实。
{"title":"Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)","authors":"M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, A. Mammeri","doi":"10.1109/MOBISECSERV.2018.8311439","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311439","url":null,"abstract":"A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improvement and implementation of digital content protection scheme using identity based signature 基于身份签名的数字内容保护方案的改进与实现
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311449
Mutsumi Fujisaki, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda
The progress of the Internet makes enables a consumer to edit contents already exhibited on the Internet and thus create new content as secondary content. However, technology that protects the right of the author of original content in the secondary content is also required. Hence, this study involves proposing a content protection scheme that can control secondary use of content based on the intention of the author by using ID-based signature. The objective of the study involves verifying the practicality of the scheme by mounting it. Therefore, the scheme was applied to contents that were created by using "MikuMikuDance," a content editing tool for 3D CG movies, and a content protection system was mounted. The study illustrated the method, using which this system was mounted and described the evaluation of the processing speed in a simulation environment.
互联网的进步使得消费者能够编辑已经在互联网上展示的内容,从而创造新的内容作为次要内容。但是,在二次内容中保护原创内容作者权利的技术也是必需的。因此,本研究涉及提出一种内容保护方案,通过基于身份的签名,可以根据作者的意图控制内容的二次使用。研究的目的包括通过安装来验证该方案的实用性。因此,利用3D CG电影的内容编辑工具“MikuMikuDance”制作的内容适用了该方案,并设置了内容保护系统。研究说明了该系统的安装方法,并描述了在仿真环境下对处理速度的评估。
{"title":"Improvement and implementation of digital content protection scheme using identity based signature","authors":"Mutsumi Fujisaki, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda","doi":"10.1109/MOBISECSERV.2018.8311449","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311449","url":null,"abstract":"The progress of the Internet makes enables a consumer to edit contents already exhibited on the Internet and thus create new content as secondary content. However, technology that protects the right of the author of original content in the secondary content is also required. Hence, this study involves proposing a content protection scheme that can control secondary use of content based on the intention of the author by using ID-based signature. The objective of the study involves verifying the practicality of the scheme by mounting it. Therefore, the scheme was applied to contents that were created by using \"MikuMikuDance,\" a content editing tool for 3D CG movies, and a content protection system was mounted. The study illustrated the method, using which this system was mounted and described the evaluation of the processing speed in a simulation environment.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards improving the security of mobile systems using virtualization and isolation 利用虚拟化和隔离技术提高移动系统的安全性
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311435
Jeremias Eppler, Yong Wang
Mobile devices are used for various activities ranging from entertainment to banking. Bring Your Own Devices (BYODs) and telecommuting allow employees to use their mobile devices in the environment of an organization and at home. The convergence of work and personal life introduces several security and privacy problems. This paper presents a technical approach to balance security and privacy needs of the employees and the organization as well as to reduce the risks associated with the BYODs and the telecommuting. The fundamental building block of the technical approach is virtualization. This paper presents an incremental mobile virtual machine operating system design and implements the first phase of the design by using the Xen hypervisor and a smartphone-like development board.
移动设备用于从娱乐到银行等各种活动。自带设备(byod)和远程办公允许员工在公司和家里使用他们的移动设备。工作和个人生活的融合带来了一些安全和隐私问题。本文提出了一种技术方法来平衡员工和组织的安全和隐私需求,并降低与byod和远程办公相关的风险。该技术方法的基本组成部分是虚拟化。本文提出了一种增量式移动虚拟机操作系统的设计,并利用Xen管理程序和类似智能手机的开发板实现了第一阶段的设计。
{"title":"Towards improving the security of mobile systems using virtualization and isolation","authors":"Jeremias Eppler, Yong Wang","doi":"10.1109/MOBISECSERV.2018.8311435","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311435","url":null,"abstract":"Mobile devices are used for various activities ranging from entertainment to banking. Bring Your Own Devices (BYODs) and telecommuting allow employees to use their mobile devices in the environment of an organization and at home. The convergence of work and personal life introduces several security and privacy problems. This paper presents a technical approach to balance security and privacy needs of the employees and the organization as well as to reduce the risks associated with the BYODs and the telecommuting. The fundamental building block of the technical approach is virtualization. This paper presents an incremental mobile virtual machine operating system design and implements the first phase of the design by using the Xen hypervisor and a smartphone-like development board.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Concept network design for a young Mars science station and Trans-planetary communication 一个年轻的火星科学站和跨行星通信的概念网络设计
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311448
Keely Hill, K. Gagneja
NASA is planning to send a satellite with some people on it to Mars in 2019. They are calling it manned mission to Mars. This paper presents a high-level networking design to provide high bandwidth for a young and growing Mars settlement and science station. A physical network topology is described consisting of a high power ground station to communicate with orbiters. Different parts and devices of the station are connected with network infrastructure. Some examples are given for various non-obvious use cases of the network. Additionally, an upper level networking protocol is described to handle reliable communication between planets. This trans-planetary Data Mailing Protocol (TDMP) operates three processes working together: a database of retrievable files and user inbox files; a ‘parcel’ structure for data to be contained; and parcel piece fragmenting for asynchronous pipelined transmission and loss handling. Together, these systems allow ease of connection between people, scientists, and experiments.
美国宇航局计划在2019年向火星发射一颗载有人员的卫星。他们称之为载人火星任务。本文提出了一个高层次的网络设计,为一个年轻的和不断增长的火星定居和科学站提供高带宽。描述了一个由高功率地面站与轨道器通信组成的物理网络拓扑结构。该站的各个部件和设备都与网络基础设施相连。对于网络的各种不明显的用例,给出了一些示例。此外,还描述了一个上层网络协议来处理行星之间的可靠通信。这个跨行星数据邮件协议(TDMP)操作三个共同工作的进程:可检索文件和用户收件箱文件的数据库;包含数据的“包”结构;以及用于异步流水线传输和丢失处理的包裹碎片。总之,这些系统使人们、科学家和实验之间的联系变得容易。
{"title":"Concept network design for a young Mars science station and Trans-planetary communication","authors":"Keely Hill, K. Gagneja","doi":"10.1109/MOBISECSERV.2018.8311448","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311448","url":null,"abstract":"NASA is planning to send a satellite with some people on it to Mars in 2019. They are calling it manned mission to Mars. This paper presents a high-level networking design to provide high bandwidth for a young and growing Mars settlement and science station. A physical network topology is described consisting of a high power ground station to communicate with orbiters. Different parts and devices of the station are connected with network infrastructure. Some examples are given for various non-obvious use cases of the network. Additionally, an upper level networking protocol is described to handle reliable communication between planets. This trans-planetary Data Mailing Protocol (TDMP) operates three processes working together: a database of retrievable files and user inbox files; a ‘parcel’ structure for data to be contained; and parcel piece fragmenting for asynchronous pipelined transmission and loss handling. Together, these systems allow ease of connection between people, scientists, and experiments.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132420755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile road pothole classification and reporting with data quality estimates 移动道路坑洼分类和报告与数据质量估计
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311437
A. Vora, L. Reznik, I. Khokhlov
Harnessing the power of mobile computing platforms has opened up newer possibilities of gathering and classifying data by leveraging the use of crowd-sourcing. In the current generation that is being dominated by the mobile computing platform namely smart-phones, crowd-sourcing can be achieved in a relatively hassle-free yet effective means of collecting data from a large set of ordinary users. Tapping into this source pool, however, has a drawback of unspecified data quality and security and hence the lack of trust in the data collected. This paper proposes an approach that aims to realize the most influential factors related to destructiveness of potholes that are encountered on roadways, while supplementing the data with quality estimates derived from the completeness of the data and security and quality factors of the input device itself that is involved in the data collection process, thereby addressing the drawback of data trust. The mobile application design is described. The application use cases are presented and discussed.
利用移动计算平台的力量,通过利用众包为收集和分类数据开辟了新的可能性。在以移动计算平台即智能手机为主导的当前时代,众包可以以一种相对轻松但有效的方式从大量普通用户那里收集数据。然而,利用这个源池有一个缺点,即数据质量和安全性未确定,因此对收集的数据缺乏信任。本文提出了一种方法,旨在实现与道路上遇到的坑洼破坏性相关的最具影响因素,同时在数据收集过程中,通过数据的完整性和输入设备本身的安全和质量因素来补充数据的质量估计,从而解决数据信任的缺点。描述了移动应用程序的设计。介绍并讨论了应用程序用例。
{"title":"Mobile road pothole classification and reporting with data quality estimates","authors":"A. Vora, L. Reznik, I. Khokhlov","doi":"10.1109/MOBISECSERV.2018.8311437","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311437","url":null,"abstract":"Harnessing the power of mobile computing platforms has opened up newer possibilities of gathering and classifying data by leveraging the use of crowd-sourcing. In the current generation that is being dominated by the mobile computing platform namely smart-phones, crowd-sourcing can be achieved in a relatively hassle-free yet effective means of collecting data from a large set of ordinary users. Tapping into this source pool, however, has a drawback of unspecified data quality and security and hence the lack of trust in the data collected. This paper proposes an approach that aims to realize the most influential factors related to destructiveness of potholes that are encountered on roadways, while supplementing the data with quality estimates derived from the completeness of the data and security and quality factors of the input device itself that is involved in the data collection process, thereby addressing the drawback of data trust. The mobile application design is described. The application use cases are presented and discussed.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"146 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Overview of the EMV Protocol and Its Security Vulnerabilities EMV协议及其安全漏洞概述
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311444
Nour El Madhoun, E. Bertin, G. Pujolle
EMV (Europay Mastercard Visa) is the international standard implemented to secure purchase and deposit/withdrawal transactions. It represents a set of security rules and messages exchanged between the transaction actors in order to guarantee important security properties (such as authentication, authorization, integrity, etc.). However, several recent research studies have analyzed the EMV security standard and show that it is vulnerable to attacks. This paper presents an overview of the EMV protocol and its security vulnerabilities.
EMV (Europay Mastercard Visa)是一种国际标准,用于确保购买和存取款交易的安全。它表示一组安全规则和在事务参与者之间交换的消息,以保证重要的安全属性(如身份验证、授权、完整性等)。然而,最近的几项研究分析了EMV安全标准,表明它很容易受到攻击。本文概述了EMV协议及其安全漏洞。
{"title":"An Overview of the EMV Protocol and Its Security Vulnerabilities","authors":"Nour El Madhoun, E. Bertin, G. Pujolle","doi":"10.1109/MOBISECSERV.2018.8311444","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311444","url":null,"abstract":"EMV (Europay Mastercard Visa) is the international standard implemented to secure purchase and deposit/withdrawal transactions. It represents a set of security rules and messages exchanged between the transaction actors in order to guarantee important security properties (such as authentication, authorization, integrity, etc.). However, several recent research studies have analyzed the EMV security standard and show that it is vulnerable to attacks. This paper presents an overview of the EMV protocol and its security vulnerabilities.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132432597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance evaluation of MAC-layer trust zones over virtual network interfaces 基于虚拟网络接口的mac层信任区域性能评估
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311442
A. Wall, Hannes Raddatz, Michael Rethfeldt, P. Danielis, D. Timmermann
In smart building scenarios there are a lot of vulnerable devices that could be exploited to run attacks against other devices within the same LAN. Even though existing solutions mostly tackle the problem by cluster-based authentication and key management schemes, none of them leverages the potential of isolating traffic by network interface virtualization. Thus, we proposed in a previous work a concept to avoid unauthorized communication by considering separating applications with virtual MAC interfaces as the consequence. The decreased attack surface, as the main advantage, is achieved by isolating communication through virtual MAC interfaces based on application-specific demands. To demonstrate the efficiency of this concept we developed an implementation based on state-of-the-art communication protocols. We applied our interface virtualization concept to the IEEE 802.11s WLAN mesh technology, combining it with a lightweight RESTful web service for security credentials deployment. The resulting proof-of-concept implementation in a real-world multi-hop scenario shows performance of the credentials deployment and the impact of the MAC-layer parallelization. The promising results, e.g., no drop of the overall throughput using multiple virtual MAC interfaces, show that our concept can be an efficient solution for future smart buildings.
在智能建筑场景中,有许多易受攻击的设备可以被利用来对同一局域网内的其他设备进行攻击。尽管现有的解决方案主要通过基于集群的身份验证和密钥管理方案来解决这个问题,但它们都没有利用通过网络接口虚拟化隔离流量的潜力。因此,我们在之前的工作中提出了一个概念,通过考虑将应用程序与虚拟MAC接口分离,从而避免未经授权的通信。其主要优点是基于特定的应用需求,通过虚拟MAC接口隔离通信,从而减少了攻击面。为了证明这个概念的有效性,我们开发了一个基于最先进的通信协议的实现。我们将接口虚拟化概念应用于IEEE 802.11s WLAN网状技术,并将其与用于安全凭据部署的轻量级RESTful web服务相结合。在真实的多跳场景中得到的概念验证实现显示了凭据部署的性能和mac层并行化的影响。有希望的结果,例如,使用多个虚拟MAC接口的总吞吐量没有下降,表明我们的概念可以成为未来智能建筑的有效解决方案。
{"title":"Performance evaluation of MAC-layer trust zones over virtual network interfaces","authors":"A. Wall, Hannes Raddatz, Michael Rethfeldt, P. Danielis, D. Timmermann","doi":"10.1109/MOBISECSERV.2018.8311442","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311442","url":null,"abstract":"In smart building scenarios there are a lot of vulnerable devices that could be exploited to run attacks against other devices within the same LAN. Even though existing solutions mostly tackle the problem by cluster-based authentication and key management schemes, none of them leverages the potential of isolating traffic by network interface virtualization. Thus, we proposed in a previous work a concept to avoid unauthorized communication by considering separating applications with virtual MAC interfaces as the consequence. The decreased attack surface, as the main advantage, is achieved by isolating communication through virtual MAC interfaces based on application-specific demands. To demonstrate the efficiency of this concept we developed an implementation based on state-of-the-art communication protocols. We applied our interface virtualization concept to the IEEE 802.11s WLAN mesh technology, combining it with a lightweight RESTful web service for security credentials deployment. The resulting proof-of-concept implementation in a real-world multi-hop scenario shows performance of the credentials deployment and the impact of the MAC-layer parallelization. The promising results, e.g., no drop of the overall throughput using multiple virtual MAC interfaces, show that our concept can be an efficient solution for future smart buildings.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121436886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1