首页 > 最新文献

2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)最新文献

英文 中文
Improvement of privacy protection surveillance camera system and its applications 隐私保护监控摄像系统的改进及其应用
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311446
Kota Hoshino, Keiichi Iwamura, Kitahiro Kaneda
Kobayashi et al. proposed a privacy protection surveillance camera system (PPSCS) [4]. PPSCS can maintain the secrecy of the facial image of subject persons (SPs) captured by a surveillance camera, according to their intentions, by using techniques such as mosaicking. In PPSCS, the system cannot remove the mosaicking unless the SP commits a crime. In this study, we propose new applications for the PPSCS and demonstrate its validity. Moreover, we employ necessary improvements to the PPSCS to allow these proposed applications to be implemented, evaluate the risks incurred by the new applications, and demonstrate how the improved PPSCS includes risk countermeasures.
Kobayashi等人提出了一种隐私保护监控摄像系统(PPSCS)[4]。PPSCS可以通过使用马赛克等技术,对监控摄像机捕捉到的受试者(SPs)的面部图像进行保密。在PPSCS中,除非SP犯罪,否则系统无法移除马赛克。在本研究中,我们提出了PPSCS的新应用,并验证了其有效性。此外,我们对PPSCS进行了必要的改进,以允许这些拟议的应用得以实施,评估新应用产生的风险,并展示改进后的PPSCS如何包括风险对策。
{"title":"Improvement of privacy protection surveillance camera system and its applications","authors":"Kota Hoshino, Keiichi Iwamura, Kitahiro Kaneda","doi":"10.1109/MOBISECSERV.2018.8311446","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311446","url":null,"abstract":"Kobayashi et al. proposed a privacy protection surveillance camera system (PPSCS) [4]. PPSCS can maintain the secrecy of the facial image of subject persons (SPs) captured by a surveillance camera, according to their intentions, by using techniques such as mosaicking. In PPSCS, the system cannot remove the mosaicking unless the SP commits a crime. In this study, we propose new applications for the PPSCS and demonstrate its validity. Moreover, we employ necessary improvements to the PPSCS to allow these proposed applications to be implemented, evaluate the risks incurred by the new applications, and demonstrate how the improved PPSCS includes risk countermeasures.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133706538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure authentication key sharing between mobile devices based on owner identity 基于所有者身份的移动设备之间的安全认证密钥共享
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311436
Hideo Nishimura, Yoshihiko Omori, T. Yamashita, Satoru Furukawa
The public key based Web authentication can be securely implemented using modern mobile devices with a hardware-assisted trusted environment such as the Trusted Execution Environment (TEE) as a secure storage of private keys. As a private key is strictly kept secret within the TEE and never leaves the device, there is a usability issue: the user must register the key separately on each device and Web site, which is burdensome for users who start using a new device. The aim of this research is to provide a solution with enhanced usability in key management by relaxing the restriction that the keys never leave the device and allowing the private keys to be shared among the devices while still maintaining an acceptable level of security. We introduce a third party that is responsible for supervising the key-sharing between devices in an authentication system. The third party performs the identification of the owner of each device to mitigate the risk of the keys being illegally shared to another person's device. Also, we propose a secure method for copying keys from the TEE of one device to that of another through a certificate-based mutually authenticated channel. We implemented the copying method in the ARM TrustZone-based TEE and showed that our approach is feasible on a commercially available smartphone.
使用具有硬件辅助的可信环境(如可信执行环境TEE)作为私钥的安全存储的现代移动设备,可以安全地实现基于公钥的Web身份验证。由于私钥在TEE内严格保密,并且永远不会离开设备,因此存在可用性问题:用户必须在每个设备和Web站点上分别注册密钥,这对于开始使用新设备的用户来说是很麻烦的。本研究的目的是提供一种解决方案,通过放松密钥永远不会离开设备的限制,并允许私钥在设备之间共享,同时仍然保持可接受的安全级别,从而增强密钥管理的可用性。我们引入第三方,负责监督认证系统中设备之间的密钥共享。第三方执行每个设备所有者的身份识别,以降低密钥被非法共享到另一个人的设备的风险。此外,我们还提出了一种安全的方法,通过基于证书的相互身份验证通道将密钥从一个设备的TEE复制到另一个设备的TEE。我们在基于ARM trustzone的TEE中实现了复制方法,并证明了我们的方法在商用智能手机上是可行的。
{"title":"Secure authentication key sharing between mobile devices based on owner identity","authors":"Hideo Nishimura, Yoshihiko Omori, T. Yamashita, Satoru Furukawa","doi":"10.1109/MOBISECSERV.2018.8311436","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311436","url":null,"abstract":"The public key based Web authentication can be securely implemented using modern mobile devices with a hardware-assisted trusted environment such as the Trusted Execution Environment (TEE) as a secure storage of private keys. As a private key is strictly kept secret within the TEE and never leaves the device, there is a usability issue: the user must register the key separately on each device and Web site, which is burdensome for users who start using a new device. The aim of this research is to provide a solution with enhanced usability in key management by relaxing the restriction that the keys never leave the device and allowing the private keys to be shared among the devices while still maintaining an acceptable level of security. We introduce a third party that is responsible for supervising the key-sharing between devices in an authentication system. The third party performs the identification of the owner of each device to mitigate the risk of the keys being illegally shared to another person's device. Also, we propose a secure method for copying keys from the TEE of one device to that of another through a certificate-based mutually authenticated channel. We implemented the copying method in the ARM TrustZone-based TEE and showed that our approach is feasible on a commercially available smartphone.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131185310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The impact of sand propagation environment on the performance of wireless sensor networks 沙粒传播环境对无线传感器网络性能的影响
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311447
Abdallah Aldosary, Abdulaziz S. Alsayyari, Saad Almesalm
A comparative methodology for performance evaluation of the wireless sensor network (WSN) protocols deployed in sand environment is proposed. This methodology is created based on the usage of empirical radio frequency (RF) propagation model that is able to include environmental factors influencing signal propagation of wireless sensor nodes deployed in sandy environment. Furthermore, radio energy model for predicting energy dissipation of WSN deployed in such environment is derived. In order to demonstrate the performance variances of WSN in this particular environment, a comparison between the simulations of WSN deployments is presented. This comparison shows great differences in the lifetime, and, hence, in the throughput. Moreover, a comparison between the generated results using sand, free space, and two-ray propagation models indicates the imprecision of using these theoretical propagation models to evaluate the performance of WSNs.
提出了一种沙地环境下无线传感器网络(WSN)协议性能评估的比较方法。该方法是基于使用经验射频(RF)传播模型创建的,该模型能够包括环境因素影响部署在沙质环境中的无线传感器节点的信号传播。在此基础上,建立了无线传感器网络能量耗散预测模型。为了证明无线传感器网络在这种特殊环境下的性能差异,对不同部署的无线传感器网络进行了仿真比较。这种比较显示了生命周期的巨大差异,因此也显示了吞吐量的巨大差异。此外,将砂土、自由空间和双射线传播模型的结果进行比较表明,使用这些理论传播模型来评估WSNs的性能是不精确的。
{"title":"The impact of sand propagation environment on the performance of wireless sensor networks","authors":"Abdallah Aldosary, Abdulaziz S. Alsayyari, Saad Almesalm","doi":"10.1109/MOBISECSERV.2018.8311447","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311447","url":null,"abstract":"A comparative methodology for performance evaluation of the wireless sensor network (WSN) protocols deployed in sand environment is proposed. This methodology is created based on the usage of empirical radio frequency (RF) propagation model that is able to include environmental factors influencing signal propagation of wireless sensor nodes deployed in sandy environment. Furthermore, radio energy model for predicting energy dissipation of WSN deployed in such environment is derived. In order to demonstrate the performance variances of WSN in this particular environment, a comparison between the simulations of WSN deployments is presented. This comparison shows great differences in the lifetime, and, hence, in the throughput. Moreover, a comparison between the generated results using sand, free space, and two-ray propagation models indicates the imprecision of using these theoretical propagation models to evaluate the performance of WSNs.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards secure elements for trusted transactions in blockchain and blochchain IoT (BIoT) Platforms. Invited paper 区块链和区块链物联网(BIoT)平台中可信交易的安全元素。邀请报告
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311445
P. Urien
This paper introduces some trust issues for blockchain transactions. Such transactions rely on ECDSA signature based on 32 bytes secret keys. Because these keys can be stolen or hacked, we suggest to prevent these risks by using javacard secure elements. We detailed the interface of a Crypto Currency Smart Card (CCSC) designed over a JC3.04 standard platform. We details two use cases. First deals with deployment of the CCSC application in low cost low power object powered by an open hardware (arduino) platform, and integrates sensor data in ethereum transactions. Second proposes the deployment in the cloud of CCSC javacards plugged to RACS servers, in order to enable the remote and safe use of ECDSA signature.
本文介绍了区块链交易中的一些信任问题。这种交易依赖于基于32字节密钥的ECDSA签名。由于这些密钥可能被窃取或黑客攻击,我们建议通过使用javacard安全元素来防止这些风险。详细介绍了基于JC3.04标准平台设计的加密货币智能卡(CCSC)的接口。我们详细介绍了两个用例。首先处理CCSC应用程序在开放硬件(arduino)平台支持的低成本低功耗对象上的部署,并将传感器数据集成到以太坊事务中。第二,提出将CCSC javacard部署到RACS服务器上,以实现ECDSA签名的远程安全使用。
{"title":"Towards secure elements for trusted transactions in blockchain and blochchain IoT (BIoT) Platforms. Invited paper","authors":"P. Urien","doi":"10.1109/MOBISECSERV.2018.8311445","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311445","url":null,"abstract":"This paper introduces some trust issues for blockchain transactions. Such transactions rely on ECDSA signature based on 32 bytes secret keys. Because these keys can be stolen or hacked, we suggest to prevent these risks by using javacard secure elements. We detailed the interface of a Crypto Currency Smart Card (CCSC) designed over a JC3.04 standard platform. We details two use cases. First deals with deployment of the CCSC application in low cost low power object powered by an open hardware (arduino) platform, and integrates sensor data in ethereum transactions. Second proposes the deployment in the cloud of CCSC javacards plugged to RACS servers, in order to enable the remote and safe use of ECDSA signature.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132318806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Attacks and vulnerability analysis of e-mail as a password reset point 将电子邮件作为密码重置点的攻击和漏洞分析
Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311443
Caleb Routh, Brandon DeCrescenzo, Swapnoneel Roy
In this work, we perform security analysis of using an e-mail as a self-service password reset point, and exploit some of the vulnerabilities of e-mail servers' forgotten password reset paths. We perform and illustrate three different attacks on a personal Email account, using a variety of tools such as: public knowledge attainable through social media or public records to answer security questions and execute a social engineering attack, hardware available to the public to perform a man in the middle attack, and free software to perform a brute-force attack on the login of the email account. Our results expose some of the inherent vulnerabilities in using emails as password reset points. The findings are extremely relevant to the security of mobile devices since users' trend has leaned towards usage of mobile devices over desktops for Internet access.
在这项工作中,我们对使用电子邮件作为自助密码重置点进行了安全性分析,并利用了电子邮件服务器忘记密码重置路径的一些漏洞。我们对个人电子邮件帐户执行并说明了三种不同的攻击,使用各种工具,例如:通过社交媒体或公共记录可获得的公共知识来回答安全问题并执行社会工程攻击,公众可用的硬件来执行中间人攻击,以及免费软件来执行暴力攻击登录的电子邮件帐户。我们的研究结果揭示了使用电子邮件作为密码重置点的一些固有漏洞。这些发现与移动设备的安全性密切相关,因为用户倾向于使用移动设备而不是桌面设备进行互联网访问。
{"title":"Attacks and vulnerability analysis of e-mail as a password reset point","authors":"Caleb Routh, Brandon DeCrescenzo, Swapnoneel Roy","doi":"10.1109/MOBISECSERV.2018.8311443","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311443","url":null,"abstract":"In this work, we perform security analysis of using an e-mail as a self-service password reset point, and exploit some of the vulnerabilities of e-mail servers' forgotten password reset paths. We perform and illustrate three different attacks on a personal Email account, using a variety of tools such as: public knowledge attainable through social media or public records to answer security questions and execute a social engineering attack, hardware available to the public to perform a man in the middle attack, and free software to perform a brute-force attack on the login of the email account. Our results expose some of the inherent vulnerabilities in using emails as password reset points. The findings are extremely relevant to the security of mobile devices since users' trend has leaned towards usage of mobile devices over desktops for Internet access.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131877031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1