首页 > 最新文献

2008 New Technologies, Mobility and Security最新文献

英文 中文
On the Authentication of RFID Systems with Bitwise Operations 基于位运算的RFID系统认证研究
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.74
Basel Alomair, R. Poovendran
Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authentication via bitwise operations. Following each proposal, a series of papers have been published to point out serious limitations on the security of such protocols. In this paper, we provide a detailed analysis of the security of bitwise authentication protocols in the presence of active adversaries. We divide bitwise operations into two main categories and address the security limitations of each category. Our work aims to provide guidelines for protocol designers in order to avoid pitfalls that can dangerously undermine the security of the designed protocols.
由于低成本RFID标签严格的计算能力,最近提出了许多轻量级认证协议,旨在通过位操作实现安全认证。在每一项提议之后,都发表了一系列论文,指出这种协议的安全性存在严重的局限性。在本文中,我们提供了一个详细的分析,在主动对手存在的情况下,按位认证协议的安全性。我们将按位操作分为两个主要类别,并解决每个类别的安全限制。我们的工作旨在为协议设计者提供指导方针,以避免可能危险地破坏所设计协议的安全性的陷阱。
{"title":"On the Authentication of RFID Systems with Bitwise Operations","authors":"Basel Alomair, R. Poovendran","doi":"10.1109/NTMS.2008.ECP.74","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.74","url":null,"abstract":"Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authentication via bitwise operations. Following each proposal, a series of papers have been published to point out serious limitations on the security of such protocols. In this paper, we provide a detailed analysis of the security of bitwise authentication protocols in the presence of active adversaries. We divide bitwise operations into two main categories and address the security limitations of each category. Our work aims to provide guidelines for protocol designers in order to avoid pitfalls that can dangerously undermine the security of the designed protocols.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks 无线网状网络的安全需求、攻击与网络集成综述
Pub Date : 2008-11-25 DOI: 10.1109/FCST.2008.15
Hassen Redwan, Ki-Hyung Kim
Nowadays, security is considered as one of the most critical parameter for the acceptance of any wireless networking technology. Nevertheless, security in wireless mesh network (WMN) is still in its infancy as little attention has been rendered to this topic by the research community. So far the security issue in wireless mesh networking has rarely been addressed. As entire security of the network is as strong as the weakest component, integration of security mechanisms of heterogeneous wireless networks in the open wireless network environment has paramount significance. In this paper, we analyze the security- related characteristics, the fundamental security requirements and possible security attacks of wireless mesh network. We also propose a heterogeneous wireless network integration model along with the description of security reference points at the boundaries of the heterogeneous wireless networks. Finally, a possible application scenario based on our proposed model is described.
如今,安全性被认为是任何无线网络技术被接受的最关键的参数之一。然而,无线网状网络(WMN)的安全性仍处于起步阶段,研究领域对这一课题的关注甚少。到目前为止,无线网状网络的安全问题很少得到解决。由于整个网络的安全性与最弱的组件一样强,因此在开放的无线网络环境中集成异构无线网络的安全机制具有至关重要的意义。本文分析了无线网状网络的安全特性、基本安全要求以及可能受到的安全攻击。我们还提出了一个异构无线网络集成模型,并描述了异构无线网络边界上的安全参考点。最后,描述了基于该模型的一个可能的应用场景。
{"title":"Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks","authors":"Hassen Redwan, Ki-Hyung Kim","doi":"10.1109/FCST.2008.15","DOIUrl":"https://doi.org/10.1109/FCST.2008.15","url":null,"abstract":"Nowadays, security is considered as one of the most critical parameter for the acceptance of any wireless networking technology. Nevertheless, security in wireless mesh network (WMN) is still in its infancy as little attention has been rendered to this topic by the research community. So far the security issue in wireless mesh networking has rarely been addressed. As entire security of the network is as strong as the weakest component, integration of security mechanisms of heterogeneous wireless networks in the open wireless network environment has paramount significance. In this paper, we analyze the security- related characteristics, the fundamental security requirements and possible security attacks of wireless mesh network. We also propose a heterogeneous wireless network integration model along with the description of security reference points at the boundaries of the heterogeneous wireless networks. Finally, a possible application scenario based on our proposed model is described.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131970043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
On Improved Event Scheduling Mechanisms for Wireless Communications Simulation Modelling 改进的无线通信仿真建模事件调度机制
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.73
P. Papazoglou, Dimitrios Alexios Karras, R. C. Papademetriou
An improved simulation model is presented in this paper for modeling resource allocation strategies in wireless communications based on new event scheduling mechanisms involving real time systems methodologies. Such mechanisms are more suitable than the currently utilized Calendar Queue algorithm for simulating concurrent events in cellular networks. The proposed simulation model is based on a novel real time event scheduling algorithm extending the known in Discrete Event Simulation methodology, Calendar Queue algorithm. The new algorithm is analyzed and its implementation issues involving multithreading technology are discussed. The application of the new scheme in modeling GSM cellular networks shows significant enhancements with regards to network modeling performance compared to rival simulation modeling techniques.
本文提出了一种改进的仿真模型,用于模拟无线通信中的资源分配策略,该模型基于涉及实时系统方法的新的事件调度机制。这种机制比目前使用的Calendar Queue算法更适合于模拟蜂窝网络中的并发事件。所提出的仿真模型是基于一种新的实时事件调度算法,扩展了离散事件仿真方法中已知的日历队列算法。对新算法进行了分析,并讨论了涉及多线程技术的实现问题。新方案在GSM蜂窝网络建模中的应用表明,与竞争对手的仿真建模技术相比,该方案在网络建模性能方面有显著增强。
{"title":"On Improved Event Scheduling Mechanisms for Wireless Communications Simulation Modelling","authors":"P. Papazoglou, Dimitrios Alexios Karras, R. C. Papademetriou","doi":"10.1109/NTMS.2008.ECP.73","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.73","url":null,"abstract":"An improved simulation model is presented in this paper for modeling resource allocation strategies in wireless communications based on new event scheduling mechanisms involving real time systems methodologies. Such mechanisms are more suitable than the currently utilized Calendar Queue algorithm for simulating concurrent events in cellular networks. The proposed simulation model is based on a novel real time event scheduling algorithm extending the known in Discrete Event Simulation methodology, Calendar Queue algorithm. The new algorithm is analyzed and its implementation issues involving multithreading technology are discussed. The application of the new scheme in modeling GSM cellular networks shows significant enhancements with regards to network modeling performance compared to rival simulation modeling techniques.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interactions Between Agents As Shared Resources in Multi-Agents Systems 多智能体系统中作为共享资源的智能体之间的交互
Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.52
A. Sayouti, Fatima Qrichi Aniba, H. Medromi
In this paper we defend the advantages of a representation of agent behaviors, based on the concept of interaction. Although the behavior of an agent is usually included in its structure, we dissociate here the concept of agent from that of interaction, each one being associated with a specific ontology. This approach is especially valuable for increasing the reutilisability of the interactions, which are very often generic even in contexts where the agents are not. In a first part, we describe and compare our approach to the classic one. Then a list of properties is given to show the benefit to consider an interaction, not only as a communication means, but also as an entity shared by all agents and not reserved to some of them. An illustration of our approach is given in a road traffic application using VRML.
在本文中,我们捍卫了基于交互概念的代理行为表示的优势。尽管智能体的行为通常包含在其结构中,但我们在这里将智能体的概念与交互的概念分离开来,每个智能体都与特定的本体相关联。这种方法对于提高交互的可重用性特别有价值,交互通常是通用的,即使在代理不通用的上下文中也是如此。在第一部分中,我们将描述并比较我们的方法与经典方法。然后给出一个属性列表,以显示考虑交互的好处,不仅作为通信手段,而且作为所有代理共享的实体,而不是为其中一些代理保留。在一个使用VRML的道路交通应用程序中给出了我们的方法的示例。
{"title":"Interactions Between Agents As Shared Resources in Multi-Agents Systems","authors":"A. Sayouti, Fatima Qrichi Aniba, H. Medromi","doi":"10.1109/NTMS.2008.ECP.52","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.52","url":null,"abstract":"In this paper we defend the advantages of a representation of agent behaviors, based on the concept of interaction. Although the behavior of an agent is usually included in its structure, we dissociate here the concept of agent from that of interaction, each one being associated with a specific ontology. This approach is especially valuable for increasing the reutilisability of the interactions, which are very often generic even in contexts where the agents are not. In a first part, we describe and compare our approach to the classic one. Then a list of properties is given to show the benefit to consider an interaction, not only as a communication means, but also as an entity shared by all agents and not reserved to some of them. An illustration of our approach is given in a road traffic application using VRML.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing 利用秘密共享实现外包数据库的高效超加密
Pub Date : 2008-11-01 DOI: 10.1109/NTMS.2008.ECP.100
Shuai Liu, Wei Li, Lingyu Wang
Over-encryption is a technique for managing evolving access control requirements in outsourced databases. In over-encryption, a data owner and outsourcing server collectively encrypt resources in such a way that users' accesses can be effectively controlled without the need for shipping the resources back to the owner. One potential limitation of the original over-encryption scheme is that it requires publishing a large amount of tokens. In this paper, we present a new key-assignment approach based on secret sharing. We first give two different key derivation schemes, and then we combine them as one scheme. We analyze the amount of public tokens required by the original over-encryption scheme and our scheme, and we show that our scheme can provide the same over-encryption capability more efficiently.
过度加密是一种用于管理外包数据库中不断变化的访问控制需求的技术。在过度加密中,数据所有者和外包服务器共同以这样一种方式对资源进行加密,从而可以有效地控制用户的访问,而无需将资源发送回所有者。原始过度加密方案的一个潜在限制是,它需要发布大量令牌。本文提出了一种新的基于秘密共享的密钥分配方法。我们首先给出了两个不同的密钥派生方案,然后将它们合并为一个方案。我们分析了原始的过度加密方案和我们的方案所需的公共令牌数量,并表明我们的方案可以更有效地提供相同的过度加密功能。
{"title":"Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing","authors":"Shuai Liu, Wei Li, Lingyu Wang","doi":"10.1109/NTMS.2008.ECP.100","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.100","url":null,"abstract":"Over-encryption is a technique for managing evolving access control requirements in outsourced databases. In over-encryption, a data owner and outsourcing server collectively encrypt resources in such a way that users' accesses can be effectively controlled without the need for shipping the resources back to the owner. One potential limitation of the original over-encryption scheme is that it requires publishing a large amount of tokens. In this paper, we present a new key-assignment approach based on secret sharing. We first give two different key derivation schemes, and then we combine them as one scheme. We analyze the amount of public tokens required by the original over-encryption scheme and our scheme, and we show that our scheme can provide the same over-encryption capability more efficiently.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125573712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
TLS Tandem TLS串联
Pub Date : 2008-11-01 DOI: 10.1109/NTMS.2008.ECP.99
M. Badra, P. Urien
Nowadays, the TLS protocol (transport layer security) is the de facto standard for securing transactions across the Internet. It provides end-to-end secure communications with one way or mutual authentication between two network nodes. However, this protocol suffers from serious vulnerabilities because classical software implementations are not trusted and allow the use of falsified credentials (e.g. revoked and false certificates) and provide an unsecured storage of credentials (private keys, passwords, etc.). In this paper, we introduce the TLS smart card to prevent those issues and we describe the TLS Tandem protocol, a TLS extension cohabiting between two TLS software installed in both a docking host and a smart card. The card of our architecture, after which the TLS authentication is successfully performed, derives secret keys from the master secret key, and transmits these values to the TLS software installed in the docking host. We discuss the performance and the efficiency of TLS Tandem. The implementation and performances analysis are performed using smart cards and Java Card libraries.
如今,TLS协议(传输层安全性)是保护Internet上的事务的事实上的标准。它在两个网络节点之间提供单向或相互认证的端到端安全通信。然而,该协议存在严重的漏洞,因为经典的软件实现不受信任,并且允许使用伪造的证书(例如吊销和虚假的证书),并提供不安全的证书存储(私钥,密码等)。在本文中,我们介绍了TLS智能卡来防止这些问题,并描述了TLS串联协议,这是一种同时安装在对接主机和智能卡上的两个TLS软件之间的TLS扩展。我们的架构卡在TLS认证执行成功后,从主密钥中提取密钥,并将这些值传输给安装在对接主机上的TLS软件。讨论了TLS串联的性能和效率。使用智能卡和Java Card库进行实现和性能分析。
{"title":"TLS Tandem","authors":"M. Badra, P. Urien","doi":"10.1109/NTMS.2008.ECP.99","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.99","url":null,"abstract":"Nowadays, the TLS protocol (transport layer security) is the de facto standard for securing transactions across the Internet. It provides end-to-end secure communications with one way or mutual authentication between two network nodes. However, this protocol suffers from serious vulnerabilities because classical software implementations are not trusted and allow the use of falsified credentials (e.g. revoked and false certificates) and provide an unsecured storage of credentials (private keys, passwords, etc.). In this paper, we introduce the TLS smart card to prevent those issues and we describe the TLS Tandem protocol, a TLS extension cohabiting between two TLS software installed in both a docking host and a smart card. The card of our architecture, after which the TLS authentication is successfully performed, derives secret keys from the master secret key, and transmits these values to the TLS software installed in the docking host. We discuss the performance and the efficiency of TLS Tandem. The implementation and performances analysis are performed using smart cards and Java Card libraries.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 New Technologies, Mobility and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1