首页 > 最新文献

ISC Int. J. Inf. Secur.最新文献

英文 中文
An efficient certificateless signcryption scheme in the standard model 标准模型下的一种高效的无证书签名加密方案
Pub Date : 2017-01-31 DOI: 10.22042/ISECURE.2017.70117.368
Parvin Rastegari, Mehdi Berenjkoub
Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which provides the goals of signing and encrypting, simultaneously. In 2010, Liu et al. presented the first certificateless signcryption (CLSC) scheme in the standard model, but their scheme is vulnerable against different attacks presented in the literature, till now. In this paper, we improve their scheme and propose a new CLSC scheme, which is semantically secure against adaptive chosen ciphertext attack under the (Ѕ2, 5)-BDHE-Set assumption and existentially unforgeable against adaptive chosen message attack under the 3-CDHE assumption in the standard model. Our scheme is more efficient than all other secure CLSC schemes in the standard model proposed up to now.
无证书公钥加密(CL-PKC)是一种同时解决传统公钥基础设施(即管理证书需要大量的计算、存储和通信成本)和基于id的公钥加密(即密钥托管问题)问题的有效方法。签名加密方案是密码协议中的一个重要原语,它同时提供了签名和加密的目标。2010年,Liu等人在标准模型中提出了第一个无证书签名加密(CLSC)方案,但他们的方案容易受到文献中提出的不同攻击,直到现在。在本文中,我们改进了他们的方案,提出了一种新的CLSC方案,该方案在(Ѕ2, 5)-BDHE-Set假设下对自适应选择密文攻击具有语义安全,在标准模型的3-CDHE假设下对自适应选择消息攻击具有存在不可伪造性。该方案比目前提出的标准模型中的所有安全CLSC方案都要高效。
{"title":"An efficient certificateless signcryption scheme in the standard model","authors":"Parvin Rastegari, Mehdi Berenjkoub","doi":"10.22042/ISECURE.2017.70117.368","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.70117.368","url":null,"abstract":"Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which provides the goals of signing and encrypting, simultaneously. In 2010, Liu et al. presented the first certificateless signcryption (CLSC) scheme in the standard model, but their scheme is vulnerable against different attacks presented in the literature, till now. In this paper, we improve their scheme and propose a new CLSC scheme, which is semantically secure against adaptive chosen ciphertext attack under the (Ѕ2, 5)-BDHE-Set assumption and existentially unforgeable against adaptive chosen message attack under the 3-CDHE assumption in the standard model. Our scheme is more efficient than all other secure CLSC schemes in the standard model proposed up to now.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An automatic test case generator for evaluating implementation of access control policies 用于评估访问控制策略实现的自动测试用例生成器
Pub Date : 2017-01-31 DOI: 10.22042/ISECURE.2017.0.0.3
Marzieh Safarzadeh, Mahboubeh Taghizadeh, B. Zamani, B. T. Ladani
One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more reliable. Although several researches are conducted for automated testing of the specification of access control policies at the design phase, there is not enough research on testing their implementation. In addition, since access control is amongst non-functional requirements of the system, it is not easy to test them along with other requirements of the system by usual methods. To address this challenge, in this paper, we propose an automated method for testing the implementation of access control in a system. This method, as a model based technique, is able to extract test cases for evaluating the access control policies of the system under test. To generate test cases automatically, a combination of behavior model of the system and the specification of access control policies are used. The experimental results show that the proposed approach is able to find the failures and cover most of the code that is related to access control policies.
提供软件安全性的主要需求之一是执行访问控制策略,其目的是保护系统资源免遭未经授权的访问。在执行这些政策时,任何错误都可能导致不良后果。为了测试访问控制策略的执行情况,最好使用自动化的方法,这样更快、更可靠。虽然在设计阶段对访问控制策略规范的自动化测试进行了一些研究,但对其实现的测试研究还不够。此外,由于访问控制是系统的非功能需求之一,因此不容易通过常规方法将它们与系统的其他需求一起进行测试。为了应对这一挑战,在本文中,我们提出了一种自动化的方法来测试系统中访问控制的实现。该方法作为一种基于模型的技术,能够提取测试用例来评估被测系统的访问控制策略。为了自动生成测试用例,使用了系统行为模型和访问控制策略规范的组合。实验结果表明,该方法能够发现故障并覆盖大部分与访问控制策略相关的代码。
{"title":"An automatic test case generator for evaluating implementation of access control policies","authors":"Marzieh Safarzadeh, Mahboubeh Taghizadeh, B. Zamani, B. T. Ladani","doi":"10.22042/ISECURE.2017.0.0.3","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.0.0.3","url":null,"abstract":"One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more reliable. Although several researches are conducted for automated testing of the specification of access control policies at the design phase, there is not enough research on testing their implementation. In addition, since access control is amongst non-functional requirements of the system, it is not easy to test them along with other requirements of the system by usual methods. To address this challenge, in this paper, we propose an automated method for testing the implementation of access control in a system. This method, as a model based technique, is able to extract test cases for evaluating the access control policies of the system under test. To generate test cases automatically, a combination of behavior model of the system and the specification of access control policies are used. The experimental results show that the proposed approach is able to find the failures and cover most of the code that is related to access control policies.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115788758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A new security proof for FMNV continuous non-malleable encoding scheme 一种新的FMNV连续不可延性编码方案的安全性证明
Pub Date : 2017-01-31 DOI: 10.22042/ISECURE.2017.74050.371
Amir S. Mortazavi, M. Salmasizadeh, A. Daneshgar
A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have already been formalized and defined in current literature, among which continuous non-malleability is the setup in which the messages are protected against adversaries who may issue polynomially many tampering queries. The first continuous non-malleable encoding scheme has been proposed by Faust et al. (FMNV) in 2014. In this article, we propose a new proof of continuous non-malleability of the FMNV scheme. The new proof will give rise to an improved and more efficient version of this scheme. Also, the new proof shows that one may achieve continuous non-malleability of the same security by using a leakage resilient storage scheme with fewer bits for the leakage bound. This shows that the new scheme is more efficient and practical for tamper-resilient applications.
不可延展性代码是一种编码方案的变体,它可以抵御篡改攻击。不可延展性编码背后的主要思想是,攻击者不应该能够获得关于消息的任何有价值的信息。不可延展性代码用于抗篡改加密和保护存储器免受篡改攻击。当前文献中已经形式化和定义了许多不同类型的非延展性,其中连续非延展性是一种设置,在这种设置中,消息被保护免受可能发出多项式多个篡改查询的攻击者的攻击。Faust等人(FMNV)于2014年提出了第一个连续非延展性编码方案。在本文中,我们提出了FMNV方案连续非延展性的一个新的证明。新的证明将产生该方案的改进和更有效的版本。此外,新的证明表明,使用泄漏弹性存储方案可以实现相同安全性的连续非延展性,泄漏边界的位数较少。这表明新方案在防篡改应用中更加有效和实用。
{"title":"A new security proof for FMNV continuous non-malleable encoding scheme","authors":"Amir S. Mortazavi, M. Salmasizadeh, A. Daneshgar","doi":"10.22042/ISECURE.2017.74050.371","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.74050.371","url":null,"abstract":"A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have already been formalized and defined in current literature, among which continuous non-malleability is the setup in which the messages are protected against adversaries who may issue polynomially many tampering queries. The first continuous non-malleable encoding scheme has been proposed by Faust et al. (FMNV) in 2014. In this article, we propose a new proof of continuous non-malleability of the FMNV scheme. The new proof will give rise to an improved and more efficient version of this scheme. Also, the new proof shows that one may achieve continuous non-malleability of the same security by using a leakage resilient storage scheme with fewer bits for the leakage bound. This shows that the new scheme is more efficient and practical for tamper-resilient applications.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132833070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dwarf Frankenstein is still in your memory: tiny code reuse attacks 矮人弗兰肯斯坦仍然在你的记忆中:微小的代码重用攻击
Pub Date : 2017-01-30 DOI: 10.22042/ISECURE.2017.0.0.4
AliAkbar Sadeghi, Farzane Aminmansour, H. Shahriari
Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common behaviour of code reuse attacks, which is the construction of a gadget chain. Therefore, the implication of a gadget and the minimum size of an attack chain are a matter of controversy. Conservative or relaxed thresholds may cause false positive and false negative alarms, respectively. The main contribution of this paper is to provide a tricky aspect of code reuse techniques, called tiny code reuse attacks (Tiny-CRA) that demonstrates the ineffectiveness of the threshold based detection methods. We show that with bare minimum assumptions, Tiny-CRA can reduce the size of a gadget chain in shuch a way that no distinction can be detected between normal behavior of a program and a code-reuse execution. To do so, we exhibit our Tiny-CRA primitives and introduce a useful gadget set available in libc. We demonstrate the effectiveness of our approach by implementing nine different shell-codes and exploiting real-world buffer overflow vulnerability in HT Editor 2.0.20.
面向返回编程和面向跳转编程等代码重用攻击是攻击者最常用的攻击方法。提出了大量实用和非实用的防御方法,它们在开销、源代码要求、检测率和实现依赖关系方面存在差异。然而,在这些方法中,一个常见的方面是考虑代码重用攻击的常见行为,即构造小部件链。因此,小工具的含义和攻击链的最小规模是一个有争议的问题。保守或宽松的阈值可能分别引起假阳性和假阴性警报。本文的主要贡献是提供了代码重用技术的一个棘手的方面,称为微小代码重用攻击(tiny - cra),它证明了基于阈值的检测方法的有效性。我们展示了在最简单的假设下,Tiny-CRA可以减少小部件链的大小,从而在程序的正常行为和代码重用执行之间无法检测到任何区别。为此,我们展示了我们的Tiny-CRA原语,并介绍了lib中可用的一个有用的小工具集。我们通过在HT Editor 2.0.20中实现9个不同的shell代码和利用真实世界的缓冲区溢出漏洞来证明我们方法的有效性。
{"title":"Dwarf Frankenstein is still in your memory: tiny code reuse attacks","authors":"AliAkbar Sadeghi, Farzane Aminmansour, H. Shahriari","doi":"10.22042/ISECURE.2017.0.0.4","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.0.0.4","url":null,"abstract":"Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation dependencies. However, a usual aspect among these methods is consideration of the common behaviour of code reuse attacks, which is the construction of a gadget chain. Therefore, the implication of a gadget and the minimum size of an attack chain are a matter of controversy. Conservative or relaxed thresholds may cause false positive and false negative alarms, respectively. The main contribution of this paper is to provide a tricky aspect of code reuse techniques, called tiny code reuse attacks (Tiny-CRA) that demonstrates the ineffectiveness of the threshold based detection methods. We show that with bare minimum assumptions, Tiny-CRA can reduce the size of a gadget chain in shuch a way that no distinction can be detected between normal behavior of a program and a code-reuse execution. To do so, we exhibit our Tiny-CRA primitives and introduce a useful gadget set available in libc. We demonstrate the effectiveness of our approach by implementing nine different shell-codes and exploiting real-world buffer overflow vulnerability in HT Editor 2.0.20.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Side channel parameter characteristics of code injection attacks 码注入攻击的侧信道参数特征
Pub Date : 2017-01-29 DOI: 10.22042/isecure.2017.0.0.5
Ehsan Aerabi, M. Kaykha, M. Fazeli, A. Patooghy, A. Akbari
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. The architectural simulation for execution time, power usage and temperature on benchmarks shows that these parameters disclose meaningful and distinguishable behaviours in case of attack.
嵌入式系统是近年来代码注入攻击的潜在目标。软件保护机制和一般的计算机通常不适用于嵌入式系统,因为它们具有有限的资源,如内存和处理能力。本文研究了嵌入式系统的侧信道特性及其在代码注入攻击检测中的适用性。在基准测试上对执行时间、功耗和温度的体系结构模拟表明,这些参数揭示了攻击情况下有意义且可区分的行为。
{"title":"Side channel parameter characteristics of code injection attacks","authors":"Ehsan Aerabi, M. Kaykha, M. Fazeli, A. Patooghy, A. Akbari","doi":"10.22042/isecure.2017.0.0.5","DOIUrl":"https://doi.org/10.22042/isecure.2017.0.0.5","url":null,"abstract":"Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. The architectural simulation for execution time, power usage and temperature on benchmarks shows that these parameters disclose meaningful and distinguishable behaviours in case of attack.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122730436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring LPKP:基于位置的大规模无线传感器网络的概率密钥预分配方案
Pub Date : 2017-01-22 DOI: 10.22042/ISECURE.2017.0.0.1
A. Ahadipour, A. Keshavarz-Haddad
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper, we propose a novel probabilistic key pre-distribution scheme, for large-scale wireless sensor networks which utilizes location information in order to improve the performance of random key pre-distribution substantially. In order to apply the location information of the nodes in key distribution process, we partition the network into some regions and use graph coloring techniques to efficiently assign the random keys. The proposed scheme has a superior scalability by supporting larger number of nodes and also increasing the probability of existence of a shared exclusive key among the nearby nodes, i.e., the probability of having an isolated node is significantly reduced in comparison with the existing random key pre-distribution schemes. Our simulation results verify these terms.
无线传感器网络的通信安全是通过给节点分配密钥来实现的。由于这种网络中的资源限制,随机密钥预分发方案备受关注。虽然这些方案大多不考虑位置信息,但也存在节点部署后可以获取位置信息的场景。本文针对大规模无线传感器网络,提出了一种利用位置信息的概率密钥预分发方案,从而大大提高了随机密钥预分发的性能。为了在密钥分配过程中应用节点的位置信息,我们将网络划分为若干区域,并利用图着色技术有效地分配随机密钥。该方案通过支持更大数量的节点,并且增加了附近节点之间存在共享排他密钥的概率,即与现有的随机密钥预分发方案相比,存在孤立节点的概率显着降低,具有优越的可扩展性。我们的仿真结果验证了这些条款。
{"title":"LPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring","authors":"A. Ahadipour, A. Keshavarz-Haddad","doi":"10.22042/ISECURE.2017.0.0.1","DOIUrl":"https://doi.org/10.22042/ISECURE.2017.0.0.1","url":null,"abstract":"Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper, we propose a novel probabilistic key pre-distribution scheme, for large-scale wireless sensor networks which utilizes location information in order to improve the performance of random key pre-distribution substantially. In order to apply the location information of the nodes in key distribution process, we partition the network into some regions and use graph coloring techniques to efficiently assign the random keys. The proposed scheme has a superior scalability by supporting larger number of nodes and also increasing the probability of existence of a shared exclusive key among the nearby nodes, i.e., the probability of having an isolated node is significantly reduced in comparison with the existing random key pre-distribution schemes. Our simulation results verify these terms.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128619268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving 简要介绍安全协议形式化验证的两种方法:模型检查和定理证明
Pub Date : 2016-07-02 DOI: 10.22042/ISECURE.2016.8.1.1
Mohsen Pourpouneh, Rasoul Ramezanian
In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all deferent behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this approach and then we model and verify some famous security protocols using Scyther . Theorem proving is based on deriving the desired goals from assumption of protocols via a deduction system. We define a deduction system named Simple Logic for Authentication to formally define the notion of authenticated communication based on the structure of the messages, and then we several famous protocols using our proposed deduction system and compare it with the verification results of Scyther model checking.
在本文中,我们简要回顾了验证安全协议的两种正式方法;模型检验和定理证明。模型检查是通过生成协议的所有不同行为,并检查在所有实例中期望的目标是否得到满足来研究协议的行为。我们研究Scyther操作语义作为这种方法的一个例子,然后我们使用Scyther建模和验证一些著名的安全协议。定理证明的基础是通过演绎系统从协议的假设推导出期望的目标。我们定义了一个基于消息结构的Simple Logic for Authentication推理系统,对认证通信的概念进行了形式化的定义,然后使用我们提出的推理系统对几个著名的协议进行了比较,并将其与Scyther模型检验的验证结果进行了比较。
{"title":"A short introduction to two approaches in formal verification of security protocols: model checking and theorem proving","authors":"Mohsen Pourpouneh, Rasoul Ramezanian","doi":"10.22042/ISECURE.2016.8.1.1","DOIUrl":"https://doi.org/10.22042/ISECURE.2016.8.1.1","url":null,"abstract":"In this paper, we shortly review two formal approaches in verification of security protocols; model checking and theorem proving. Model checking is based on studying the behavior of protocols via generating all deferent behaviors of a protocol and checking whether the desired goals are satisfied in all instances or not. We investigate Scyther operational semantics as n example of this approach and then we model and verify some famous security protocols using Scyther . Theorem proving is based on deriving the desired goals from assumption of protocols via a deduction system. We define a deduction system named Simple Logic for Authentication to formally define the notion of authenticated communication based on the structure of the messages, and then we several famous protocols using our proposed deduction system and compare it with the verification results of Scyther model checking.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122217459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel key management scheme for heterogeneous sensor networks based on the position of nodes 一种基于节点位置的异构传感器网络密钥管理新方案
Pub Date : 2016-07-01 DOI: 10.22042/ISECURE.2016.8.2.3
Taha Yasin Rezapour, Reza Ebrahimi Atani, M. S. Abolghasemi
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol between sensor nodes to achieve maximum security with minimum cost. The main motivation of this paper is to apply the position of the sensor nodes as part of their identity for key management in heterogeneous sensor networks. In the proposed scheme, the position of sensor nodes is considered as a part of their identity and it is used for authentication and dedicating key to all network links. Comparing the proposed technique with other schemes shows that it has a higher level of scalability, security, and reliability with less memory complexity. © 2016 ISC. All rights reserved.
无线传感器网络(WSNs)在商业、军事和环境要求等领域有着广泛的应用。对于低成本传感器节点的部署和有限的能量资源,这些网络面临着许多安全挑战。在无线传感器网络中准备安全无线通信的基本方法是在传感器节点之间提出一种有效的加密密钥管理协议,以最小的成本实现最大的安全性。本文的主要动机是将传感器节点的位置作为其身份的一部分应用于异构传感器网络中的密钥管理。在该方案中,传感器节点的位置被视为其身份的一部分,并用于所有网络链路的认证和专用密钥。与其他方案的比较表明,该方案具有较高的可扩展性、安全性和可靠性,且内存复杂度较低。©2016 isc。版权所有。
{"title":"A novel key management scheme for heterogeneous sensor networks based on the position of nodes","authors":"Taha Yasin Rezapour, Reza Ebrahimi Atani, M. S. Abolghasemi","doi":"10.22042/ISECURE.2016.8.2.3","DOIUrl":"https://doi.org/10.22042/ISECURE.2016.8.2.3","url":null,"abstract":"Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol between sensor nodes to achieve maximum security with minimum cost. The main motivation of this paper is to apply the position of the sensor nodes as part of their identity for key management in heterogeneous sensor networks. In the proposed scheme, the position of sensor nodes is considered as a part of their identity and it is used for authentication and dedicating key to all network links. Comparing the proposed technique with other schemes shows that it has a higher level of scalability, security, and reliability with less memory complexity. © 2016 ISC. All rights reserved.","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"497 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115327886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A note on the security of two improved RFID protocols 关于两个改进的RFID协议的安全性的说明
Pub Date : 2016-07-01 DOI: 10.22042/ISECURE.2016.8.2.6
M. Safkhani, N. Bagheri
{"title":"A note on the security of two improved RFID protocols","authors":"M. Safkhani, N. Bagheri","doi":"10.22042/ISECURE.2016.8.2.6","DOIUrl":"https://doi.org/10.22042/ISECURE.2016.8.2.6","url":null,"abstract":"","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125426421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory 软件安全定量评价:基于UML/SecAM和证据理论的方法
Pub Date : 2016-07-01 DOI: 10.22042/ISECURE.2016.8.2.5
Ali Sedaghatbaf, M. A. Azgomi
{"title":"Quantitative evaluation of software security: an approach based on UML/SecAM and evidence theory","authors":"Ali Sedaghatbaf, M. A. Azgomi","doi":"10.22042/ISECURE.2016.8.2.5","DOIUrl":"https://doi.org/10.22042/ISECURE.2016.8.2.5","url":null,"abstract":"","PeriodicalId":436674,"journal":{"name":"ISC Int. J. Inf. Secur.","volume":"85 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131716036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
ISC Int. J. Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1