{"title":"多通道覆盖协议:在社交媒体平台上实现自组织消息身份验证","authors":"Charles A. Clarke, E. Pfluegel, D. Tsaptsinos","doi":"10.1109/CyberSA.2015.7166118","DOIUrl":null,"url":null,"abstract":"As businesses, governments and professional institutions progressively seek to engage with consumers via social media platforms (SMPs), the capacity of SMP users to validate the source of received content and its integrity, becomes increasingly significant. Historically, SMPs have an associated legacy of security concerns, many of which pertain to content integrity. In this paper, we present designs for multi-channel overlay protocols, that are used to implement ad-hoc authentication of user-generated content (messages), in social media platforms. Our approach draws inspiration from protocols that are conventionally used for pairing wireless devices in ad-hoc networks. Hence, we compare and contrast conventional device pairing protocols with our own, as well as consider the security characteristics, benefits and limitations of our protocols.","PeriodicalId":432356,"journal":{"name":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms\",\"authors\":\"Charles A. Clarke, E. Pfluegel, D. Tsaptsinos\",\"doi\":\"10.1109/CyberSA.2015.7166118\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As businesses, governments and professional institutions progressively seek to engage with consumers via social media platforms (SMPs), the capacity of SMP users to validate the source of received content and its integrity, becomes increasingly significant. Historically, SMPs have an associated legacy of security concerns, many of which pertain to content integrity. In this paper, we present designs for multi-channel overlay protocols, that are used to implement ad-hoc authentication of user-generated content (messages), in social media platforms. Our approach draws inspiration from protocols that are conventionally used for pairing wireless devices in ad-hoc networks. Hence, we compare and contrast conventional device pairing protocols with our own, as well as consider the security characteristics, benefits and limitations of our protocols.\",\"PeriodicalId\":432356,\"journal\":{\"name\":\"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-06-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CyberSA.2015.7166118\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSA.2015.7166118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Multi-channel overlay protocols: Implementing ad-hoc message authentication in social media platforms
As businesses, governments and professional institutions progressively seek to engage with consumers via social media platforms (SMPs), the capacity of SMP users to validate the source of received content and its integrity, becomes increasingly significant. Historically, SMPs have an associated legacy of security concerns, many of which pertain to content integrity. In this paper, we present designs for multi-channel overlay protocols, that are used to implement ad-hoc authentication of user-generated content (messages), in social media platforms. Our approach draws inspiration from protocols that are conventionally used for pairing wireless devices in ad-hoc networks. Hence, we compare and contrast conventional device pairing protocols with our own, as well as consider the security characteristics, benefits and limitations of our protocols.