2016 11th Asia Joint Conference on Information Security (AsiaJCIS)最新文献

筛选
英文 中文
NFC-based Mobile Payment Protocol with User Anonymity 基于nfc的用户匿名移动支付协议
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.30
Shan Chen, R. Tso
{"title":"NFC-based Mobile Payment Protocol with User Anonymity","authors":"Shan Chen, R. Tso","doi":"10.1109/AsiaJCIS.2016.30","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.30","url":null,"abstract":"Following the developments of wireless and mobile communication technologies, mobile-commerce (M-commerce) has become more and more popular. However, most of the existing M-commerce protocols do not consider the user anonymity during transactions. This means that it is possible to trace the identity of a payer from a M-commerce transaction. Luo et al. in 2014 proposed an NFC-based anonymous mobile payment protocol. It used an NFC-enabled smartphone and combined a built-in secure element (SE) as a trusted execution environment to build an anonymous mobile payment service. But their scheme has several problems and cannot be functional in practice. In this paper, we introduce a new NFC-based anonymous mobile payment protocol. Our scheme has the following features:(1) Anonymity. It prevents the disclosure of user's identity by using virtual identities instead of real identity during the transmission. (2) Efficiency. Confidentiality is achieved by symmetric key cryptography instead of public key cryptography so as to increase the performance. (3) Convenience. The protocol is based on NFC and is EMV compatible. (4) Security. All the transaction is either encrypted or signed by the sender so the confidentiality and authenticity are preserved.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116417591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Securing Smart Meters Data for AMI Using RBAC 使用RBAC保护AMI智能电表数据
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.16
E. Barka, Nedaa Al Hussien, K. Shuaib
{"title":"Securing Smart Meters Data for AMI Using RBAC","authors":"E. Barka, Nedaa Al Hussien, K. Shuaib","doi":"10.1109/AsiaJCIS.2016.16","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.16","url":null,"abstract":"Smart grid is considered as the next-generation power grid that promises to make power generation and delivery more reliable, efficient, and environment-friendly. This can be achieved using the Advanced Metering Infrastructure (AMI), as it is one of the vital smart grid components. AMI facilitates demand/response management by collecting data from smart meters across the entire grid. However, securing this data is crucial for the overall performance of the grid. In this paper, we focus on securing smart meters data stored in the Meter Data Management (MDM) database at the utility control center of the smart grid service provider. We propose an architecture to secure meter data based on the well-known Role Based Access Control (RBAC) model. In our architecture, we integrate RBAC with the MDM system to ensure that smart meters' data is protected. Through proper assignment of users, roles, and permissions, meters' data will be accessed only by authorized users.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125611065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Partial Server Side Parameter Selection in Private Information Retrieval 私有信息检索中的部分服务器端参数选择
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.27
Thomas Vannet, N. Kunihiro
{"title":"Partial Server Side Parameter Selection in Private Information Retrieval","authors":"Thomas Vannet, N. Kunihiro","doi":"10.1109/AsiaJCIS.2016.27","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.27","url":null,"abstract":"Over recent years, many Private Information Retrieval (PIR) schemes have been designed aiming for computational efficiency and overall real-world practicality. In particular, some preprocessing techniques have been studied to reach those goals. Our main contribution is a new preprocessing technique that reduces overall computation and communication and allows the client and server to share some of the computational burden without significantly reducing the security of the scheme and requires little to no additional space on the server's side. We show how this technique is naturally compatible with at least two schemes. One based on the Approximate GCD assumption and the other on the Ring-LWE problem. We provide theoretical complexities and show that in some cases we can achieve a less-than-n complexity in a single server PIR scheme for the first time through the combination of multiple optimization techniques.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133865793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of arithmetic building blocks for cryptographic systems 密码系统的算术构建块设计
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/ASIAJCIS.2016.15
M. Abd-El-Barr, Aisha Al-Noori
{"title":"Design of arithmetic building blocks for cryptographic systems","authors":"M. Abd-El-Barr, Aisha Al-Noori","doi":"10.1109/ASIAJCIS.2016.15","DOIUrl":"https://doi.org/10.1109/ASIAJCIS.2016.15","url":null,"abstract":"The Advanced Encryption Standard (AES) is the current world standard symmetric key block cipher cryptosystem for data encryption/decryption. Multi-valued logic (MVL) is a propositional calculus that goes beyond binary in terms of the number of truth values. There has been intensive research work conducted attempting to enhance the performance of cryptographic systems in terms of speed and area. We have previously presented the gate-level logic design of a number of Modulo-4 and Galois field (GF) arithmetic operations using both binary and MVL. In this paper, we follow up on our previous work by presenting the CMOS (Complementary Metal Oxide Semiconductor) design, implementation, and PSpice simulation of Modulo-4 and Galois field (GF) arithmetic operations using MVL. The design objective is to minimize the chip area (measured by the number of transistors in the CMOS circuit implementation). Also reported is the transient analysis using the 0.18μm CMOS technology parameters. A comparison is conducted between our proposed CMOS implementation and those reported in the literature. The chip area (measured in terms of number of transistors) required for our implementation is less than those needed by the existing implementations.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network 基于旋转森林的分类器集成设计增强无线网络入侵检测
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.13
Bayu Adhi Tama, K. Rhee
{"title":"Classifier Ensemble Design with Rotation Forest to Enhance Attack Detection of IDS in Wireless Network","authors":"Bayu Adhi Tama, K. Rhee","doi":"10.1109/AsiaJCIS.2016.13","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.13","url":null,"abstract":"This paper is devoted to discover the appropriate base classifier algorithms while employing Rotation Forest as an ensemble learning method for intrusion detection system (IDS) in wireless network. Twenty different classification algorithms are involved in the experiment and their detection performances are assessed using the value of area under receiver operating characteristic curve (AUC) performance metric. The performance result of an ensemble learner are evaluated, including its significant improvement while using diverse machine leaning algorithms as base classifiers. From the experimental result and classifier significant test, it can be revealed that the performance of Rotation Forest has brought significant improvement over the base classifiers.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123109489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1 基于nlfsr的流密码的新条件差分密码分析及其在Grain v1中的应用
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.26
Yuhei Watanabe, Yosuke Todo, M. Morii
{"title":"New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1","authors":"Yuhei Watanabe, Yosuke Todo, M. Morii","doi":"10.1109/AsiaJCIS.2016.26","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.26","url":null,"abstract":"Grain v1 is an NLFSR-based stream cipher designed by Hell, Johansson, and Meier in 2005. This algorithm was selected in the eSTREAM hardware profile. At Asiacrypt 2010, Knellwolf, Meier, and Naya-Plasencia showed a conditional differential cryptanalysis and applied it to Grain v1. They showed distinguishing and key-recovery attacks on Grain v1 with 104 rounds by using 235 chosen IVs. Sarkar then extended the distinguisher up to 106 rounds. Knellwolf et al. also showed a conditional differential cryptanalysis for the related-key setting, where they analyzed both forward and inverse key initializations. Since differences quickly spread to the whole of the state, this technique works in the related-key setting because the key is loaded directly into the state in the NLFSR-based stream ciphers. In this paper, we propose a new method to find conditional differential characteristics on NLFSR-based stream ciphers. Our method is similar to the previous one on the related-key setting, but we look for conditional differential characteristics so as to prevent differences from spreading to the key. Therefore, we can efficiently find characteristics without the related-key setting. On the other hand, since the found characteristic has many conditions, it generally works in the weak-key setting. We apply our technique to Grain v1. We show the conditional differential distinguisher on Grain v1 up to 114 rounds and have 240 weak keys. Our distinguisher can be executed in a practical time by using 232 chosen IVs. Moreover, we propose a key recovery attack. We distinguish the weak key from the randomly chosen key by using our distinguisher. After distinguishing the weak key, we obtain the 1-bit key from the condition on both key and IV.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"898 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132273642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants ({1,3},n)一种基于少量不可或缺参与者异或操作的分层秘密共享方案
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.11
Koji Shima, H. Doi
{"title":"({1,3},n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants","authors":"Koji Shima, H. Doi","doi":"10.1109/AsiaJCIS.2016.11","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.11","url":null,"abstract":"Blakley and Shamir independently introduce the basic idea of a (k, n) threshold secret sharing scheme in 1979. Shamir also recognize the concept of a hierarchical scheme, and suggests accomplishing the scheme by giving the participants of the more capable levels a greater number of shares. Some of hierarchical secret sharing schemes are known in the way that the secret is shared among a group of participants that is partitioned into levels. We look at hierarchical secret sharing schemes in the purpose of the ease of deleting the secret after it is distributed, that is, the reliability of data deletion depends on the deletion of the shares of the indispensable participants, and focus on providing a fast method and practicality. In this paper, we introduce Fujii et al.'s XOR-based secret sharing scheme and Kurihara et al.'s XOR-based secret sharing scheme, and propose a perfect and ideal ({1,3},n) hierarchical secret sharing scheme based on Fujii et al.'s XOR-based secret sharing scheme for a small number of indispensable participants to place practicality. Our implementation system on a PC with Intel Celeron G1820 2.70GHz and 3.6GB RAM can recover the secret in the processing of around 7.0Gbps.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129848011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
How to Design Practical Client Honeypots Based on Virtual Environment 如何基于虚拟环境设计实用的客户端蜜罐
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.19
Jinhak Park, Jangwon Choi, Jungsuk Song
{"title":"How to Design Practical Client Honeypots Based on Virtual Environment","authors":"Jinhak Park, Jangwon Choi, Jungsuk Song","doi":"10.1109/AsiaJCIS.2016.19","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.19","url":null,"abstract":"Honeypot is known as the most famous and widely deployed tool for collecting malwares on the Internet. Conventional honeypots lure attackers into them by simulating vulnerable applications, programs and services, and are able to collect malwares by monitoring malicious activities of attackers. While client honeypots visit websites linked to URLs which are previously provided by users and collect malwares by analyzing the websites. Since attackers mainly use websites for spreading their well-crafted malwares or compromising their target systems, client honeypots have a remarkable attention for the purpose of collecting malwares effectively. However, most existing approaches focus on only collecting malwares by using open source client honeypots such as Capture-HPC, HoneyClient, HoneyMonkey, etc and analyzing them. In this paper, we present how to design practical client honeypots based on virtual environment. The proposed client honeypots are able to help users who want to develop their own client honeypots and deploy them. The experimental results show that the proposed client honeypots visited 2,276,733 URLs, identified 28,831 malicious URLs and succeeded in collecting 2,115 malwares.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125734744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers 家庭网络安全:模拟功耗以检测和防止对家庭网络路由器的攻击
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.10
B. Silverajan, Markku Vajaranta, Antti Kolehmainen
{"title":"Home Network Security: Modelling Power Consumption to Detect and Prevent Attacks on Homenet Routers","authors":"B. Silverajan, Markku Vajaranta, Antti Kolehmainen","doi":"10.1109/AsiaJCIS.2016.10","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.10","url":null,"abstract":"Future home networks are expected to become extremely sophisticated, yet only the most technically adept persons are equipped with skills to secure them. In this paper, we provide a novel solution to detect and prevent attacks on home routers based on anomalous power consumption. We developed a means of measuring power consumption that could be used in a wide variety of home networks, although our primary focus on is on profiling Homenet-based residential routers, specifically to detect attacks against homenet routing infrastructure. Several experimental results are presented when the infrastructure is exposed to various types of attacks, which show strong evidence of the feasibility of our approach.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121273599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SDNort: A Software Defined Network Testing Framework Using Openflow SDNort:使用Openflow的软件定义网络测试框架
2016 11th Asia Joint Conference on Information Security (AsiaJCIS) Pub Date : 2016-08-01 DOI: 10.1109/AsiaJCIS.2016.12
Po-Wen Chi, Ming-Hung Wang, Chengtah Lin, Jing-Wei Guo, C. Lei, N. Huang
{"title":"SDNort: A Software Defined Network Testing Framework Using Openflow","authors":"Po-Wen Chi, Ming-Hung Wang, Chengtah Lin, Jing-Wei Guo, C. Lei, N. Huang","doi":"10.1109/AsiaJCIS.2016.12","DOIUrl":"https://doi.org/10.1109/AsiaJCIS.2016.12","url":null,"abstract":"Network performance evaluation tools play important roles in network researches. However, most tools will cause highly CPU utilization and high monetary cost. Moreover, it is not easy to set up a test environment anytime and anywhere. To solve this problem, we build a lightweight network performance evaluation tool, SDNort, through the OpenFlow architecture. Through our evaluation tool, users can generate high throughput traffic to testing targets and collect related statistics via OpenFlow commands. Furthermore, users can easily customize testing packets for application evaluation. Finally, we virtualize our work as a VNF (Virtual Network Function) and deployed to a cloud system.","PeriodicalId":213242,"journal":{"name":"2016 11th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122241844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信