2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)最新文献

筛选
英文 中文
Password-protected secret sharing scheme with the same threshold in distribution and restoration 具有相同分发和恢复阈值的密码保护秘密共享方案
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-03-09 DOI: 10.1109/MOBISECSERV.2018.8311441
Kentaro Tsujishita, Keiichi Iwamurra
{"title":"Password-protected secret sharing scheme with the same threshold in distribution and restoration","authors":"Kentaro Tsujishita, Keiichi Iwamurra","doi":"10.1109/MOBISECSERV.2018.8311441","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311441","url":null,"abstract":"Conventional password-protected secret sharing (PPSS) based on Shamir's (k, n) secret sharing scheme requires 2k − 1 shares for reconstructing a search result. However, it can reconstruct the secret by leveraging k shares, because it performs secure multiplication. In this case, it is easier to restore the secret than the search result. In this paper, we propose a novel PPSS with the same distribution threshold for the secret as well as the restoration of the search result. We use the TUS2 method proposed by Aminuddin et al. However, it cannot include 0 as a secret. Therefore, we improve the TUS2 method such that it can include 0 as secret. In addition, we evaluate the security of our scheme, and prove that it is secure. Furthermore, we compare the computational cost of the conventional PPSS and our scheme.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122867281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast secure computation based on a secret sharing scheme for n < 2k − 1 基于n < 2k−1的秘密共享方案的快速安全计算
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-03-09 DOI: 10.1109/MOBISECSERV.2018.8311438
Keiichi Iwamura, Kyohei Tokita
{"title":"Fast secure computation based on a secret sharing scheme for n < 2k − 1","authors":"Keiichi Iwamura, Kyohei Tokita","doi":"10.1109/MOBISECSERV.2018.8311438","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311438","url":null,"abstract":"Secure computation is a major issue that affects the utilization of Big Data. Two main approaches are employed to achieve secure computation: homomorphic encryption (HE). and secret sharing schemes (SSSs), where the computational cost of the latter is generally much less than that of HE. Aminuddin et al. proposed a secure product-sum computation that allows secure multiplication for n < 2k − 1 by using the (scalar value x polynomial) approach. However, this approach requires a polynomial calculation because it uses Shamir's SSS, so it cannot be processed rapidly. In this study, we propose a fast secure computation method based on the XOR scheme, and we evaluate its performance and security.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127092539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An evaluation of a virtual network function for real-time threat detection using stream processing 利用流处理对实时威胁检测的虚拟网络功能进行评估
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-24 DOI: 10.1109/MOBISECSERV.2018.8311440
Martin Andreoni Lopez, A. Lobato, O. Duarte, G. Pujolle
{"title":"An evaluation of a virtual network function for real-time threat detection using stream processing","authors":"Martin Andreoni Lopez, A. Lobato, O. Duarte, G. Pujolle","doi":"10.1109/MOBISECSERV.2018.8311440","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311440","url":null,"abstract":"Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. Real-time traffic monitoring and fast security threat detection is a challenge to reduce the risk of great damages. In this paper, we propose a virtualized network function in an Open Source Platform for providing a real-time threat detection service. Our function combines cloud computing and distributed stream processing techniques to accurately and quickly detect threats. The proposed virtualized network function shows a good elasticity shrinking and scaling accordingly to the required load. The results show that the proposed function is able to scale dynamically, analyzing more than five million messages per second. In addition, the function easily migrates sensor elements to reduce latency, allowing the sensor to be located as near as possible to the client.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126891739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Graph-based wormhole attack detection in mobile ad hoc networks (MANETs) 基于图的移动自组网虫洞攻击检测
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311439
M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, A. Mammeri
{"title":"Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)","authors":"M. Rmayti, Y. Begriche, R. Khatoun, L. Khoukhi, A. Mammeri","doi":"10.1109/MOBISECSERV.2018.8311439","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311439","url":null,"abstract":"A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network level, malicious nodes can perform several attacks ranging from passive eavesdropping to active interfering. Wormhole is an example of severe attack that has attracted much attention recently. It involves the redirection of traffic between two end-nodes through a Wormhole tunnel, and manipulates the routing algorithm to give illusion that nodes located far from each other are neighbors. To handle with this issue, we propose a novel detection model to allow a node to check whether a presumed shortest path contains a Wormhole tunnel or not. Our approach is based on the fact that the Wormhole tunnel reduces significantly the length of the paths passing through it.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133975698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improvement and implementation of digital content protection scheme using identity based signature 基于身份签名的数字内容保护方案的改进与实现
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311449
Mutsumi Fujisaki, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda
{"title":"Improvement and implementation of digital content protection scheme using identity based signature","authors":"Mutsumi Fujisaki, Keiichi Iwamura, Masaki Inamura, Kitahiro Kaneda","doi":"10.1109/MOBISECSERV.2018.8311449","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311449","url":null,"abstract":"The progress of the Internet makes enables a consumer to edit contents already exhibited on the Internet and thus create new content as secondary content. However, technology that protects the right of the author of original content in the secondary content is also required. Hence, this study involves proposing a content protection scheme that can control secondary use of content based on the intention of the author by using ID-based signature. The objective of the study involves verifying the practicality of the scheme by mounting it. Therefore, the scheme was applied to contents that were created by using \"MikuMikuDance,\" a content editing tool for 3D CG movies, and a content protection system was mounted. The study illustrated the method, using which this system was mounted and described the evaluation of the processing speed in a simulation environment.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132491806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards improving the security of mobile systems using virtualization and isolation 利用虚拟化和隔离技术提高移动系统的安全性
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311435
Jeremias Eppler, Yong Wang
{"title":"Towards improving the security of mobile systems using virtualization and isolation","authors":"Jeremias Eppler, Yong Wang","doi":"10.1109/MOBISECSERV.2018.8311435","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311435","url":null,"abstract":"Mobile devices are used for various activities ranging from entertainment to banking. Bring Your Own Devices (BYODs) and telecommuting allow employees to use their mobile devices in the environment of an organization and at home. The convergence of work and personal life introduces several security and privacy problems. This paper presents a technical approach to balance security and privacy needs of the employees and the organization as well as to reduce the risks associated with the BYODs and the telecommuting. The fundamental building block of the technical approach is virtualization. This paper presents an incremental mobile virtual machine operating system design and implements the first phase of the design by using the Xen hypervisor and a smartphone-like development board.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Concept network design for a young Mars science station and Trans-planetary communication 一个年轻的火星科学站和跨行星通信的概念网络设计
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311448
Keely Hill, K. Gagneja
{"title":"Concept network design for a young Mars science station and Trans-planetary communication","authors":"Keely Hill, K. Gagneja","doi":"10.1109/MOBISECSERV.2018.8311448","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311448","url":null,"abstract":"NASA is planning to send a satellite with some people on it to Mars in 2019. They are calling it manned mission to Mars. This paper presents a high-level networking design to provide high bandwidth for a young and growing Mars settlement and science station. A physical network topology is described consisting of a high power ground station to communicate with orbiters. Different parts and devices of the station are connected with network infrastructure. Some examples are given for various non-obvious use cases of the network. Additionally, an upper level networking protocol is described to handle reliable communication between planets. This trans-planetary Data Mailing Protocol (TDMP) operates three processes working together: a database of retrievable files and user inbox files; a ‘parcel’ structure for data to be contained; and parcel piece fragmenting for asynchronous pipelined transmission and loss handling. Together, these systems allow ease of connection between people, scientists, and experiments.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132420755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Mobile road pothole classification and reporting with data quality estimates 移动道路坑洼分类和报告与数据质量估计
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311437
A. Vora, L. Reznik, I. Khokhlov
{"title":"Mobile road pothole classification and reporting with data quality estimates","authors":"A. Vora, L. Reznik, I. Khokhlov","doi":"10.1109/MOBISECSERV.2018.8311437","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311437","url":null,"abstract":"Harnessing the power of mobile computing platforms has opened up newer possibilities of gathering and classifying data by leveraging the use of crowd-sourcing. In the current generation that is being dominated by the mobile computing platform namely smart-phones, crowd-sourcing can be achieved in a relatively hassle-free yet effective means of collecting data from a large set of ordinary users. Tapping into this source pool, however, has a drawback of unspecified data quality and security and hence the lack of trust in the data collected. This paper proposes an approach that aims to realize the most influential factors related to destructiveness of potholes that are encountered on roadways, while supplementing the data with quality estimates derived from the completeness of the data and security and quality factors of the input device itself that is involved in the data collection process, thereby addressing the drawback of data trust. The mobile application design is described. The application use cases are presented and discussed.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"146 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Overview of the EMV Protocol and Its Security Vulnerabilities EMV协议及其安全漏洞概述
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311444
Nour El Madhoun, E. Bertin, G. Pujolle
{"title":"An Overview of the EMV Protocol and Its Security Vulnerabilities","authors":"Nour El Madhoun, E. Bertin, G. Pujolle","doi":"10.1109/MOBISECSERV.2018.8311444","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311444","url":null,"abstract":"EMV (Europay Mastercard Visa) is the international standard implemented to secure purchase and deposit/withdrawal transactions. It represents a set of security rules and messages exchanged between the transaction actors in order to guarantee important security properties (such as authentication, authorization, integrity, etc.). However, several recent research studies have analyzed the EMV security standard and show that it is vulnerable to attacks. This paper presents an overview of the EMV protocol and its security vulnerabilities.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132432597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Performance evaluation of MAC-layer trust zones over virtual network interfaces 基于虚拟网络接口的mac层信任区域性能评估
2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2018-02-01 DOI: 10.1109/MOBISECSERV.2018.8311442
A. Wall, Hannes Raddatz, Michael Rethfeldt, P. Danielis, D. Timmermann
{"title":"Performance evaluation of MAC-layer trust zones over virtual network interfaces","authors":"A. Wall, Hannes Raddatz, Michael Rethfeldt, P. Danielis, D. Timmermann","doi":"10.1109/MOBISECSERV.2018.8311442","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2018.8311442","url":null,"abstract":"In smart building scenarios there are a lot of vulnerable devices that could be exploited to run attacks against other devices within the same LAN. Even though existing solutions mostly tackle the problem by cluster-based authentication and key management schemes, none of them leverages the potential of isolating traffic by network interface virtualization. Thus, we proposed in a previous work a concept to avoid unauthorized communication by considering separating applications with virtual MAC interfaces as the consequence. The decreased attack surface, as the main advantage, is achieved by isolating communication through virtual MAC interfaces based on application-specific demands. To demonstrate the efficiency of this concept we developed an implementation based on state-of-the-art communication protocols. We applied our interface virtualization concept to the IEEE 802.11s WLAN mesh technology, combining it with a lightweight RESTful web service for security credentials deployment. The resulting proof-of-concept implementation in a real-world multi-hop scenario shows performance of the credentials deployment and the impact of the MAC-layer parallelization. The promising results, e.g., no drop of the overall throughput using multiple virtual MAC interfaces, show that our concept can be an efficient solution for future smart buildings.","PeriodicalId":281294,"journal":{"name":"2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121436886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信