2008 New Technologies, Mobility and Security最新文献

筛选
英文 中文
On the Authentication of RFID Systems with Bitwise Operations 基于位运算的RFID系统认证研究
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.74
Basel Alomair, R. Poovendran
{"title":"On the Authentication of RFID Systems with Bitwise Operations","authors":"Basel Alomair, R. Poovendran","doi":"10.1109/NTMS.2008.ECP.74","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.74","url":null,"abstract":"Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authentication via bitwise operations. Following each proposal, a series of papers have been published to point out serious limitations on the security of such protocols. In this paper, we provide a detailed analysis of the security of bitwise authentication protocols in the presence of active adversaries. We divide bitwise operations into two main categories and address the security limitations of each category. Our work aims to provide guidelines for protocol designers in order to avoid pitfalls that can dangerously undermine the security of the designed protocols.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"361 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115933512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks 无线网状网络的安全需求、攻击与网络集成综述
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/FCST.2008.15
Hassen Redwan, Ki-Hyung Kim
{"title":"Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks","authors":"Hassen Redwan, Ki-Hyung Kim","doi":"10.1109/FCST.2008.15","DOIUrl":"https://doi.org/10.1109/FCST.2008.15","url":null,"abstract":"Nowadays, security is considered as one of the most critical parameter for the acceptance of any wireless networking technology. Nevertheless, security in wireless mesh network (WMN) is still in its infancy as little attention has been rendered to this topic by the research community. So far the security issue in wireless mesh networking has rarely been addressed. As entire security of the network is as strong as the weakest component, integration of security mechanisms of heterogeneous wireless networks in the open wireless network environment has paramount significance. In this paper, we analyze the security- related characteristics, the fundamental security requirements and possible security attacks of wireless mesh network. We also propose a heterogeneous wireless network integration model along with the description of security reference points at the boundaries of the heterogeneous wireless networks. Finally, a possible application scenario based on our proposed model is described.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131970043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
On Improved Event Scheduling Mechanisms for Wireless Communications Simulation Modelling 改进的无线通信仿真建模事件调度机制
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.73
P. Papazoglou, Dimitrios Alexios Karras, R. C. Papademetriou
{"title":"On Improved Event Scheduling Mechanisms for Wireless Communications Simulation Modelling","authors":"P. Papazoglou, Dimitrios Alexios Karras, R. C. Papademetriou","doi":"10.1109/NTMS.2008.ECP.73","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.73","url":null,"abstract":"An improved simulation model is presented in this paper for modeling resource allocation strategies in wireless communications based on new event scheduling mechanisms involving real time systems methodologies. Such mechanisms are more suitable than the currently utilized Calendar Queue algorithm for simulating concurrent events in cellular networks. The proposed simulation model is based on a novel real time event scheduling algorithm extending the known in Discrete Event Simulation methodology, Calendar Queue algorithm. The new algorithm is analyzed and its implementation issues involving multithreading technology are discussed. The application of the new scheme in modeling GSM cellular networks shows significant enhancements with regards to network modeling performance compared to rival simulation modeling techniques.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132402033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interactions Between Agents As Shared Resources in Multi-Agents Systems 多智能体系统中作为共享资源的智能体之间的交互
2008 New Technologies, Mobility and Security Pub Date : 2008-11-25 DOI: 10.1109/NTMS.2008.ECP.52
A. Sayouti, Fatima Qrichi Aniba, H. Medromi
{"title":"Interactions Between Agents As Shared Resources in Multi-Agents Systems","authors":"A. Sayouti, Fatima Qrichi Aniba, H. Medromi","doi":"10.1109/NTMS.2008.ECP.52","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.52","url":null,"abstract":"In this paper we defend the advantages of a representation of agent behaviors, based on the concept of interaction. Although the behavior of an agent is usually included in its structure, we dissociate here the concept of agent from that of interaction, each one being associated with a specific ontology. This approach is especially valuable for increasing the reutilisability of the interactions, which are very often generic even in contexts where the agents are not. In a first part, we describe and compare our approach to the classic one. Then a list of properties is given to show the benefit to consider an interaction, not only as a communication means, but also as an entity shared by all agents and not reserved to some of them. An illustration of our approach is given in a road traffic application using VRML.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130629711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing 利用秘密共享实现外包数据库的高效超加密
2008 New Technologies, Mobility and Security Pub Date : 2008-11-01 DOI: 10.1109/NTMS.2008.ECP.100
Shuai Liu, Wei Li, Lingyu Wang
{"title":"Towards Efficient Over-Encryption in Outsourced Databases Using Secret Sharing","authors":"Shuai Liu, Wei Li, Lingyu Wang","doi":"10.1109/NTMS.2008.ECP.100","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.100","url":null,"abstract":"Over-encryption is a technique for managing evolving access control requirements in outsourced databases. In over-encryption, a data owner and outsourcing server collectively encrypt resources in such a way that users' accesses can be effectively controlled without the need for shipping the resources back to the owner. One potential limitation of the original over-encryption scheme is that it requires publishing a large amount of tokens. In this paper, we present a new key-assignment approach based on secret sharing. We first give two different key derivation schemes, and then we combine them as one scheme. We analyze the amount of public tokens required by the original over-encryption scheme and our scheme, and we show that our scheme can provide the same over-encryption capability more efficiently.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125573712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
TLS Tandem TLS串联
2008 New Technologies, Mobility and Security Pub Date : 2008-11-01 DOI: 10.1109/NTMS.2008.ECP.99
M. Badra, P. Urien
{"title":"TLS Tandem","authors":"M. Badra, P. Urien","doi":"10.1109/NTMS.2008.ECP.99","DOIUrl":"https://doi.org/10.1109/NTMS.2008.ECP.99","url":null,"abstract":"Nowadays, the TLS protocol (transport layer security) is the de facto standard for securing transactions across the Internet. It provides end-to-end secure communications with one way or mutual authentication between two network nodes. However, this protocol suffers from serious vulnerabilities because classical software implementations are not trusted and allow the use of falsified credentials (e.g. revoked and false certificates) and provide an unsecured storage of credentials (private keys, passwords, etc.). In this paper, we introduce the TLS smart card to prevent those issues and we describe the TLS Tandem protocol, a TLS extension cohabiting between two TLS software installed in both a docking host and a smart card. The card of our architecture, after which the TLS authentication is successfully performed, derives secret keys from the master secret key, and transmits these values to the TLS software installed in the docking host. We discuss the performance and the efficiency of TLS Tandem. The implementation and performances analysis are performed using smart cards and Java Card libraries.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信