{"title":"A hierarchical access control scheme in ad-hoc wireless networks","authors":"C. Hernández-Goya, P. Caballero-Gil","doi":"10.1109/CCST.2005.1594870","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594870","url":null,"abstract":"The restrictions of resources present in the environment of mobile ad hoc networks (MANETs) have forced the adaptation of the existing tools for guaranteeing security basic services in this new framework. The set of restrictions associated to computational, communication and power supply resources is the main barrier when providing them with security mechanisms. The solutions outlined so far for authentication based on classical tools have result non satisfactory for this setting. That is why examining the possibility of using advanced protocols should be explored. Following this trend, a new authentication protocol specifically designed for this setting is proposed in this work. A hard on average problem and an NP-complete one, belonging both to graph theory, are combined in order to design simultaneously an admission control protocol (ACP) and a node authentication protocol (NAP) using identification schemes belonging to the set of zero-knowledge interactive proofs (ZKIP). Using this technique is a way to avoid the nuisances derived from the utilization of PKT.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122088542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication services and biometrics: network security issues","authors":"O.S. Benavente, R. Piccio-Marchetti","doi":"10.1109/CCST.2005.1594871","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594871","url":null,"abstract":"The Internet is increasingly becoming a public vehicle for remote operations. Integrating biometric information in the authentication chain exposes new problems. Remote virtual identity is starting to play in the way towards an eEurope, and applications for e-government integrate biometrics. Remote identity of subjects should be unambiguously stated. Several features drive the spread of biometric authentication in network applications, in order to provide end-to-end security across the authentication chain aliveness detection and fake-resistive methods, network protocols, security infrastructure, integration of biometrics and public key infrastructure (PKI), etc. This paper proposes a mid-layer interoperable architecture furnished with a set of generic interfaces and protocol definitions. This scheme enables a future introduction of new modules and applications with a minimal development effort.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124538577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured key exchange protocol in wireless mobile ad hoc networks","authors":"S. Liaw, Pin-Chang Su, H. Chang, E. Lu, S. Pon","doi":"10.1109/CCST.2005.1594839","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594839","url":null,"abstract":"Wireless mobile ad hoc networks (MANET) are an emerging area of mobile computing. Security issues concerning MANET are attracting increasing attention nowadays. MANET is a new wireless networking paradigm without a fixed infrastructure, and includes base stations or mobile switching centers. Mobile nodes rely on each other to maintain the network connection. In this paper, a secured identity-based key exchange protocol is proposed for networks in environments without any public key infrastructure. This investigation proposes a secured key exchange protocol without the auxiliary of certification authority for application to wireless mobile ad hoc networks. This protocol solved the security problem in the MANET and is suitable for application to other wired network structures.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of security inspection networking system development in China airports and its trend in the future","authors":"D. Li, Huimin Chen","doi":"10.1109/CCST.2005.1594825","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594825","url":null,"abstract":"A new security inspection networking system, meeting objectives and functions required by the scheme of flow renovation of security inspection (FRSI) from Civil Aviation Administration of China (CAAC), was first developed and quickly deployed in many airports in China in the 1990's for 100% checked bag screening. During these years, the system was modified and retrofitted to integrate data from different inspection equipment, together packed with data of passenger and screener. This guarantees the consistency of the images and relevant passengers and keep screeners highly alert on duty. A broad marketing demand is still existed nowadays due to its special advantages. Although newly developed screening equipment such as advanced technology (AT) equipment and explosive detection system (EDS) have been widely used today, we still face the challenge of building a networked security inspection management system for all enforcement departments in airport. More work should be done to meet the needs and the forward steps never stop.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128035711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent video systems for perimeter and secured entry access control","authors":"D.L. Wilson","doi":"10.1109/CCST.2005.1594822","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594822","url":null,"abstract":"The continued threat of terrorism has spurred the development of sophisticated systems that enhance transportation security and monitoring. Much emphasis has been placed on systems that facilitate threat identification and responder intervention and enable the tracking and identification of people inside, outside or along perimeters of transportation facilities (airports, railways, ports, etc.). The most unpredictable element in any transportation facility is the sheer number of people having access. Identifying a suspicious individual or a threatening activity and then monitoring a person or threat through a crowded and unpredictable path present a most challenging task for even the most experienced of security personnel. Automated intelligent video systems are gaining in popularity and capitalize on advances in computer, camera and networking hardware, as well as the maturation of computer imaging and vision algorithms. These systems are designed to integrate with legacy systems and enhance existing infrastructure protection to facilitate an effective and risk favorable apprehension of security violators/intruders.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New detection algorithm of extended targets for radar and electro optical sensors","authors":"J.C. Gallego, F.P. Martinez, A. Asensio-López","doi":"10.1109/CCST.2005.1594851","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594851","url":null,"abstract":"This paper presents a new technique able to detect extended targets (small ones and big ones) (Ostrovityanov and Basalov, 1985), under very low signal to noise ratios (SNR) and signal to clutter ratios (SCR) with a high probability of detection and a low probability of false alarm. The method is based on the calculation of some modified statistical descriptors (Gonzalez and Woods, 2002), and the peak plots (Rihaczek and Hershkowitz, 2000) from raw sensor image. The peak plots are extracted by means of the shift-and-convolution technique (Perez Martinez et al., 2001). Experimental results are also presented demonstrating the quality of this technique. Experimental results have been obtained with ARIES radar (Perez et al., 2002), a surface marine and coast surveillance LFM-CW high resolution radar (HRR) (Wehner, 1995) developed by INDRA SISTEMAS S.A. in collaboration with the Technical University of Madrid. The Spanish Ministry of Defence has founded this research.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"33 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114059419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Navarro, J. A. Ortega-Ruiz, J. Garcia, S. Robles
{"title":"Secure agent-based management for pervasive environments","authors":"G. Navarro, J. A. Ortega-Ruiz, J. Garcia, S. Robles","doi":"10.1109/CCST.2005.1594864","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594864","url":null,"abstract":"A typical pervasive computing scenario may consist of a wide range of devices interconnected through ad-hoc networks. One of the problems that pervasive computing introduces is the management and interaction between these devices, as well as the security implications of this management. We present in this paper an architecture, which provides initial mechanisms to solve these problems. Inspired by trust management systems, our architecture is built on top of a multi-agent system. However, our proposal is sufficiently open to allow the integration with other technologies. Results of our work can be easily applied to existing pervasive computing software and associated technologies.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"515 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123080175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Perimeter intruder detection systems performance standard","authors":"D. Armstrong, C. Peile","doi":"10.1109/CCST.2005.1594845","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594845","url":null,"abstract":"This paper includes discussion of the main high level principles upon which the development of the standards is based. These are: impartiality; objectivity; reproducibility (precision by other organisations); repeatability (precision by the same tester); validity and, of course, accuracy. A comparison is made between application and technology specific based testing in order to demonstrate why the former is most suited to the PIDS performance standard. The paper then addresses the key characteristics of a PIDS (false alarm rate, detection rate, and vulnerability to defeat) and suggest how these could be assessed as part of a general evaluation methodology in order to give the end user the required level of information. Finally, an update on the progress of the drafting of the standard is given","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130968069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital text watermarking: secure content delivery and data hiding in digital documents","authors":"M. Qadir, I. Ahmad","doi":"10.1109/MAES.2006.284353","DOIUrl":"https://doi.org/10.1109/MAES.2006.284353","url":null,"abstract":"Secure communication of data over public channel is one of the most important challenges. Both the activities to secure contents and to break security are very hot. In order to reduce the chances of attack, security need to be made invisible. Need to preserve originality, ownership information and integrity of text documents in a way that cannot be identified by every one is being felt badly. Watermarking of the documents is a step towards achieving these objectives. However to watermark a plain text document (ASCII) in a way that original text is not changed and it would be very difficult to break it, is a great challenge. We have developed a novel encoding scheme, which can be used to insert information in a plain text without changing the text. A system has been developed based upon this encoding scheme. This paper describes the system and demonstrates its working.","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A security evaluation methodology for smart cards against electromagnetic analysis","authors":"Huiyun Li, A. T. Markettos, S. Moore","doi":"10.1109/CCST.2005.1594857","DOIUrl":"https://doi.org/10.1109/CCST.2005.1594857","url":null,"abstract":"Cryptographic processors can be vulnerable in electromagnetic analysis (EMA) attacks due to their EM side-channel leakage. A design-time security evaluation methodology has been proposed to assess the security level of cryptographic processors against EMA attacks. This EM simulation methodology involves current flow simulation, chip layout parasitics extraction then data processing to simulate direct EM emissions or modulated emissions. The proposed simulation methodology can be easily employed in the framework of an integrated circuit (IC) design flow to perform a systematic EM characteristics analysis","PeriodicalId":411051,"journal":{"name":"Proceedings 39th Annual 2005 International Carnahan Conference on Security Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123980057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}