The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The 802.11 Wireless Standard defines methods for improving reliability and security on Wireless Local Area Networks (WLANs). Two methods that are especially desirable to enterprise networks are handoff and Remote Authentication Dial-In User Service (RADIUS). Handoff allows seamless mobility on a wireless network, thus providing users with the ability to roam among enterprise wireless access points...
TLS (Transport Layer Security) is the de facto standard that provides end-to-end secure communications with mutual authentication between two communicating entities. TLS has been designed to run from end to end, in which case intermediate hosts are considered as man in the middle attacks. Recently, TLS is widely deployed by applications and networks to exchange keys between more than two entities,...
Near Field Communication (NFC) is a short-range communication technology and has been applied around the world. The most common service of NFC will be micropayments. Technically, the card emulation mode of NFC will simulate mobile devices such as cell phones into stored value cards, and then debit from external readers. Apart from simulating cell phones as stored value cards, read-write mode of NFC...
This paper is a survey on how the Kerberos V5 can be transported over TLS protocol in order to provide additional security features. This document describes an extensibility mechanism for Kerberos V5 protocol which improve the security in TLS protocol.
The security management of group key is essential to secure multicast. This paper analyzes the advantages and disadvantages of a key management scheme for secure multicast, and proposes a new rekeying scheme based on it. By adding one-way hash function, some users can calculate the keys along the path from their own point to root by themselves, and during a departure procedure, one user is selected...
Mobile ad hoc network is a new multi-hop wireless communication network. It has wide application, but it is exposed to kinds of security threats. Key management is vital important in ad hoc network security research field. Firstly the related work about key management in mobile ad hoc network is analyzed, and then an algorithm is proposed based on identity-based generalized signcryption. Lastly a...
The massive deployment of RFID tag to various systems raises some issues regarding security and privacy. RFID system without trust enhancement poses security threat because secret data can be easily revealed to adversary system by due to unverified platform. Numerous works revealed that the unverified RFID platform can be compromised either by malicious codes or man in the middle attack. For such...
If the results of the latest studies of ABI Research for Internet usage are to be believed, worldwide twelve million TV consumers will be using Internet Protocol Television (IPTV) instead of the traditional TV broadcasting by the end of 2010. Furthermore, analysts of Informa Telecoms & Media are forecasting the worldwide grow in revenue of IPTV to be ten billion US dollar by 2010. The revolution...
This paper proposes an evaluation result of a high security distribution and rake technology for realizing disaster recovery. In an experimental evaluation, the encryption and spatial scrambling performance and the average response time have been estimated in terms of the file data size. Discussion is also provided on an effective shuffling algorithm to determine the dispersed location sites. Finally,...
Recent study has demonstrated that quite a few well-know pairwise key establishment schemes are susceptible to key-swapping collusion attack aiming to subvert crucial applications that require cooperative efforts, e.g., data fusion algorithms, routing protocols, etc. Previous works against this attack have shown their own limitations. To overcome these limitations, we propose a new countermeasure...
We introduce a non-interactive RSA time-lock puzzle scheme whose level of difficulty can be arbitrarily chosen by artificially enlarging the public exponent. Solving a puzzle for a message m means for Bob to encrypt m with Alice's public puzzle key by repeated modular squaring. The number of squarings to perform determines the puzzle complexity. This puzzle is non-parallelizable. Thus, the solution...
The appearance of Mobile CSCW made people have much more understanding on Computer Supported Cooperative Work. With the help of Mobile CSCW, the efficiency of cooperative work has been improved,even some work has become viable what could not before. In this paper, we analyzed the characters and system model of Mobile CSCW, discussed the related developing technology and information security. Simultaneity,...
Phishing is continually shown to be a problem in network security. Phishing is trickery towards the user believing that he or she is communicating with a trusted source. Most phishing attacks are focused on the financial infrastructure such as financial institutions like banks and services like Paypal. We proposed a different interface than the traditional browsers which prove through past research...
Group key agreement (GKA) protocols are used to secure group communications in wireless networks but most current GKA protocols do not consider privacy protection. GKA protocols for wireless networks should also handle dynamic group membership events such as user join and leave events. The Join and Leave Protocols provide backward and forward secrecy respectively, that is, the Join Protocol must ensure...
This paper analyzes the processes of the mobile payment, and proposes that secure communication between user mobile terminal and mobile payment platform is the key element of the mobile payment system. Then it presents a TTP-based security mobile payment model and from the two aspects secure including authentication and information transmission it analyzes security policy of the model that can achieve...
Compared with traditional static Client/Server architecture, the P2P architecture is more suitable for anonymous communication systems because it is more flexible and can keep load balance better. However, in order to make the system usable and reliable, some system designs make tradeoffs between anonymity and performance such as reliability, latency and throughput. Tradeoffs are sometimes unavoidable...
Establishment of pairwise keys in wireless sensor networks is a fundamental security service, which forms the basis of other security services such as authentication and encryption. However, due to the resource constraints on sensor nodes, establishing pairwise keys in wireless sensor networks is not a trivial task. For the existing key pre-distribution schemes, as the number of compromised nodes...
Encryption has been a widely used technology for protecting secure data. However, recent threats show that encrypted data are being hacked and decrypted. A 128-bit encryption can be broken by a few weeks of supercomputing processing. These data are very critical to an organization and could be lethal if accessed by unauthorized group. Here a new transmission model is proposed for securing structured...
The rapid consumer adoption of high-speed Internet connections has lead to the unprecedented interconnection of home networks. Consequently, the number of domestic home automation networks offering Internet connectivity has increased. These home automation networks are increasingly comprised of resource limited wireless sensor networks (WSN). This creates the potential for malicious users from across...
In an overview paper called State of the Art: Embedding Security in Vehicles, Wolf et al. give a general state-of- the-art overview of IT security in vehicles and describe core security technologies and relevant security mechanisms. In this paper we show that a formal analysis of many of the related properties is possible. This indicates that many expected aspects in the design of vehicular security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.