2016 Second International Conference on Mobile and Secure Services (MobiSecServ)最新文献

筛选
英文 中文
Improvising performance of Advanced Encryption Standard algorithm 高级加密标准算法的即兴性能
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-03-24 DOI: 10.1109/MOBISECSERV.2016.7440224
Vandan Pendli, Mokshitha Pathuri, Subhakar Yandrathi, A. Razaque
{"title":"Improvising performance of Advanced Encryption Standard algorithm","authors":"Vandan Pendli, Mokshitha Pathuri, Subhakar Yandrathi, A. Razaque","doi":"10.1109/MOBISECSERV.2016.7440224","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440224","url":null,"abstract":"The requirement of information security on a network has become highly challenging. Cryptography is a method to provide information confidentiality, authenticity and integrity. The cryptography overcomes several challenges such as execution time, memory requirement, and computation power. However, we cannot get desired outcomes by using sequential computation. In this paper, we introduce parallel computation using multicore processors by parallelizing the execution of the algorithm in multiple cores. We analyze the effectiveness of the Advanced Encryption Standard (AES) algorithm on dual core processor by using OpenMP API to reduce the execution time. This process is validated using JAVA platform. Based on the results, it is confirmed that parallel computation reduced execution time as compared with sequential computation.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114610574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Towards secure elements for the Internet of Things: The eLock use case: Work in progress — Invited paper 面向物联网的安全元素:eLock用例:正在进行的工作-邀请论文
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-03-24 DOI: 10.1109/MOBISECSERV.2016.7440228
P. Urien
{"title":"Towards secure elements for the Internet of Things: The eLock use case: Work in progress — Invited paper","authors":"P. Urien","doi":"10.1109/MOBISECSERV.2016.7440228","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440228","url":null,"abstract":"Security and trust are major prerequisites for the deployment of Internet of Things (IoT) infrastructures. In this paper we present secure elements providing TLS and DTLS stacks, and running the CoAP protocol dedicated to IoT systems. These secure elements are used in an electronic lock context, in which the lock is a CoAP server and the key a CoAP client. We define two main security domains one for key interaction with the lock, and the other for key generation. These two domains are associated to applications running in SIM cards managed by mobile applications. Key generators are hosted in secure elements plugged in key servers, built over the RACS protocol. We introduce an innovative double TLS concept that avoids application tampering by cloud provider. Finally we discuss scalability issues of this approach.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
NFC4Sure: Mobile ticketing system NFC4Sure:移动票务系统
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-03-24 DOI: 10.1109/MOBISECSERV.2016.7440229
Diogo Antunes, João Lima, Goncalo Pereira, Nelson Escravana, Carlos Ribeiro
{"title":"NFC4Sure: Mobile ticketing system","authors":"Diogo Antunes, João Lima, Goncalo Pereira, Nelson Escravana, Carlos Ribeiro","doi":"10.1109/MOBISECSERV.2016.7440229","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440229","url":null,"abstract":"Modern public transportation ticketing systems are now evolving from the usage of contactless smartcards to mobile devices based on Near Field Communication and Host Card Emulation. NFC4Sure ticketing solution proposed in this work integrates seamlessly with existing ticketing technologies, without requiring a hardware secure element in the mobile phone and a permanent online interaction1.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114566035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimized Node Selection Process for quality of service provisioning over wireless multimedia sensor networks 无线多媒体传感器网络服务质量优化节点选择过程
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-03-24 DOI: 10.1109/MOBISECSERV.2016.7440227
A. Alanazi, K. Elleithy
{"title":"Optimized Node Selection Process for quality of service provisioning over wireless multimedia sensor networks","authors":"A. Alanazi, K. Elleithy","doi":"10.1109/MOBISECSERV.2016.7440227","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440227","url":null,"abstract":"Several quality of service (QoS) routing strategies focus on the improvement of throughput and end-to-end delays in wireless sensor networks (WSNs). With emergence of wireless multimedia sensor networks (WMSNs), data traffic can be poised into reliability-demanding data packets and time-sensitive data packets. In such situations, node optimization and load balancing can improve QoS provisioning. Thus, the trade-off between network lifetime and ensuring the QoS provisioning has been of paramount importance. This paper introduces the Optimized Node Selection Process (ONSP) approach for robust multipath QoS routing for WMSNs. This approach is based on determining the optimized node that helps resilient route discovery for improving the QoS parameters. The selection of optimized nodes make the solid chain for route selection using residual energy and received signal strength indicator (RSSI). The second goal of this approach is to prolong the network lifetime by introducing the load-balancing algorithm, which determines the optimized and braided paths. These paths avoid bottlenecks and improves throughput, end-to-end delay, on-time packet delivery and prolongs the network lifetime.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124266504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An online security protocol for NFC payment: Formally analyzed by the scyther tool NFC支付的在线安全协议:由scyther工具正式分析
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-02-26 DOI: 10.1109/MOBISECSERV.2016.7440225
Nour El Madhoun, F. Guenane, G. Pujolle
{"title":"An online security protocol for NFC payment: Formally analyzed by the scyther tool","authors":"Nour El Madhoun, F. Guenane, G. Pujolle","doi":"10.1109/MOBISECSERV.2016.7440225","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440225","url":null,"abstract":"Nowadays, NFC technology is integrated into bank cards, smartphones and sales point terminals in order to immediately execute payment transactions without any physical contact. EMV is the standard intended to secure both contact (traditional) and contactless-NFC payment operations. In fact, researchers in recent years have detected some security vulnerabilities in this protocol (EMV). Therefore, in this paper, we introduce the risks entailed by the vulnerabilities of EMV and particularly those at stake in the case of NFC payment. Hence, in order to overcome EMV weaknesses, we propose a new security protocol based on an online communication with a trusted entity. The proposal is destined to secure contactless-NFC payment transactions using NFC bank cards that are unconnected client payment devices (without Wi-Fi or 4G). A security verification tool called Scyther is used to analyze the correctness of the proposal.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117030831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Investigating the keylogging threat in android — User perspective (Regular research paper) 调查android中的键盘记录威胁-用户视角(常规研究论文)
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-02-01 DOI: 10.1109/MOBISECSERV.2016.7440223
Fadi Mohsen, Emmanuel Bello-Ogunu, Mohamed Shehab
{"title":"Investigating the keylogging threat in android — User perspective (Regular research paper)","authors":"Fadi Mohsen, Emmanuel Bello-Ogunu, Mohamed Shehab","doi":"10.1109/MOBISECSERV.2016.7440223","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440223","url":null,"abstract":"Keylogging threats have been reasonably studied in computer systems but poorly covered in the domain of mobile operating systems. Android took the lead among the other mobile operating systems in allowing developers to build custom third-party keyboards to replace the stock Android on-screen keyboard. This opened the door for malicious developers to create keyloggers for the purpose of spying and/or phishing for users' sensitive data. A malicious developer may build a keylogger from scratch or utilize an existing keyboard. Furthermore, users may unknowingly install keyloggers from the online app markets or may use a keylogger that a malicious user with physical access has installed on their devices. In this paper, we discuss users' and keyboard developers' roles in increasing/decreasing the chance of successful keylogger attacks. We developed an Android app, KBsChecker, and asked participants to install it on their devices. The app collects data from participants' devices and prompts them to complete a survey. We also asked a number of developers to answer a few questions with regard to their experiences in building third-party keyboards. Our study showed that keylogging threat is of high probability due to the current security configurations and the choices of users and developers. Moreover, the study showed that the risk can be mitigated by educating users and by adopting new development approaches.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129245433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile payment security, threats, and challenges 移动支付安全、威胁和挑战
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-02-01 DOI: 10.1109/MOBISECSERV.2016.7440226
Yong Wang, Christen Hahn, K. Sutrave
{"title":"Mobile payment security, threats, and challenges","authors":"Yong Wang, Christen Hahn, K. Sutrave","doi":"10.1109/MOBISECSERV.2016.7440226","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440226","url":null,"abstract":"Mobile payment systems can be divided into five categories including mobile payment at the POS, mobile payment as the POS, mobile payment platform, independent mobile payment system, and direct carrier billing. Although mobile payment has gained its popularity in many regions due to its convenience, it also faces many threats and security challenges. In this paper, we present a mobile payment processing model and introduce each type of mobile payment systems. We summarize the security services desired in mobile payment systems and also the security mechanisms which are currently in place. We further identify and discuss three security threats, i.e., malware, SSL/TLS vulnerabilities, and data breaches, and four security challenges, i.e., malware detection, multi-factor authentication, data breach prevention, and fraud detection and prevention, in mobile payment systems.","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127967180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Fraud on host card emulation architecture: Is it possible to fraud a payment transaction realized by a mobile phone using an "Host Card Emulation" system of security ? Invited paper 主机卡仿真体系结构上的欺诈:使用“主机卡仿真”安全系统是否有可能对移动电话实现的支付交易进行欺诈?邀请报告
2016 Second International Conference on Mobile and Secure Services (MobiSecServ) Pub Date : 2016-02-01 DOI: 10.1109/MOBISECSERV.2016.7440230
M. Pasquet, Sylvie Gerbaix
{"title":"Fraud on host card emulation architecture: Is it possible to fraud a payment transaction realized by a mobile phone using an \"Host Card Emulation\" system of security ? Invited paper","authors":"M. Pasquet, Sylvie Gerbaix","doi":"10.1109/MOBISECSERV.2016.7440230","DOIUrl":"https://doi.org/10.1109/MOBISECSERV.2016.7440230","url":null,"abstract":"Mobile payment transactions with a NFC device are secured by two main architectures. The first is in using a \"Secure Element\" included in the mobile phone, the second using an external \"Host Card Emulation\" architecture where the banking card emulation is realized in a grid connected by the air to the mobile phone. That last solution seems to be the preferred solution today. Is it possible to fraud this type of transaction?","PeriodicalId":296302,"journal":{"name":"2016 Second International Conference on Mobile and Secure Services (MobiSecServ)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信