The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a secure protocol for authenticating Electronic Control Units (ECUs) in the Controller Area Network (CAN) bus and establishing session keys between them. These keys are used to introduce message source authentication for the CAN network. Our method is based on the elliptic curve cryptography (ECC) which is more suitable for embedded systems where computational power and memory...
We examine the power of statistical zero knowledge proofs (captured by the complexity class SZK) and their variants. First, we give the strongest known relativized evidence that SZK contains hard problems, by exhibiting an oracle relative to which SZK (indeed, even NISZK) is not contained in the class UPP, containing those problems solvable by randomized algorithms with unbounded error. This answers...
Non-malleable commitments, introduced by Dolev, Dwork and Naor (STOC 1991), are a fundamental cryptographic primitive, and their round complexity has been a subject of great interest. And yet, the goal of achieving non-malleable commitments with only one or two rounds} has been elusive. Pass (TCC 2013) captured this difficulty by proving important impossibility results regarding two-round non-malleable...
Non-malleable commitments are a fundamental cryptographic tool for preventing against (concurrent) man-in-the-middle attacks. Since their invention by Dolev, Dwork, and Naor in 1991, the round-complexity of non-malleable commitments has been extensively studied, leading up to constant-round concurrent non-malleable commitments based only on one-way functions, and even 3-round concurrent non-malleable...
With the development of Internet, network protocol became increasingly complex. This brought a sharp increase in network traffic based on these protocols. How to implement the efficient identification of network protocols has been a problem of network development. In this paper, we focus on protocol identification based on traffic analysis. The theme is that we just need to analysis the headers of...
Location-based queries have brought challenging privacy issues for mobile users. Having access to data, anytime from anywhere, raises many security concerns. One of these concerns is user's location privacy, where a user must reveal her location to get the desired result. The question is how to benefit from such queries without endangering user's location privacy. This paper presents a new method...
Often considered as the brain of an industrial process, Industrial control systems are presented as the vital part of today's critical infrastructure due to their crucial role in process control and monitoring. Any failure or error in the system will have a considerable damage. Their openness to the internet world raises the risk related to cyber-attacks. Therefore, it's necessary to consider cyber...
Internet of Things (IoT) is slowly but steadily becoming part of different aspects of our lives, with its applications ranging from smart homes, to wearable devices, to healthcare, etc. This wide spectrum of applications results in shared data containing large amount of users' private information. The security of such information becomes a paramount concern. The IoT security requirements include data...
This research paper focuses and examines the quantum key distribution using the BB84 protocol in the case of encoding on the single-photon polarization and shows the influence of optical components parameters on the quantum key distribution. We also introduce the Quantum Bit Error Rate (QBER) to better interpret our results and show its relationship with the intrusion of the eavesdropper called Eve...
Wireless Sensor Networks (WSNs), deployed in distributed Internet of Things (IoT) applications, measure data, process, exchange information, and function collaboratively with other sensor nodes and end-users, which can be internal or external to the network. To maintain the reliable connectivity and the accessibility of distributed IoT, it is vital to establish secure links for end-to-end communication...
As more and more Internet of Things (IoT) devices are connected to the cloud services, fog computing has emerged as a new computing model to provide analytic and intelligent services to the end users for fast response time. Among the application layer protocols used for IoT, MQTT and CoAP are two well-known lightweight protocols that run on top of TCP and UDP, respectively. MQTT supports publish/subscribe...
Nowadays the easiest way to connect with people is chatting by using Mobile Chatting Applications which offers us a lot of helpful facilities. Though different Chat Applications offers different security to users but leads to increase in vulnerabilities & risks of attack on data. Not only for business conversations also for normal conversations our data must be secured because, someone's data...
As more and more Internet of Things (IoT) devices are connected to the cloud services, fog computing has emerged as a new computing model to provide analytic and intelligent services to the end users for fast response time. Among the application layer protocols used for IoT, MQTT and CoAP are two well-known lightweight protocols that run on top of TCP and UDP, respectively. MQTT supports publish/subscribe...
In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research,...
Outsourcing computation to cloud server has recently become popular in cloud computing. Cloud computing technologies enable clients with limited computational resources to outsource their massive computations to powerful cloud servers. Outsourcing computation has some new concerns, such as outsourced data and result privacy, verifiability and efficiency. Matrix multiplication is one of the most basic...
Elliptic Curve Cryptosystem (ECC) schemes are public-key mechanisms that provide encryption, digital signature and key exchange capabilities. The advantage of elliptic curves is that they ensure a level of security equivalent to that of existing public key systems but with shorter key lengths. In this paper, we take an interest in public-key exchange of Diffie-Hellman. We propose a new approach of...
Use of digital token — which certifies the bearer's rights to some kind of products or services — is quite common nowadays for its convenience, ease of use and cost-effectiveness. Many of such digital tokens, however, are produced with software alone, making them vulnerable to forgery, including alteration and duplication. For a more secure safeguard for both token owner's right and service provider's...
Forward-secure logging protects old log entries in a log file against an adversary compromising the log device. However, we show that previous work on forward-secure logging is prone to crash-attacks where the adversary removes log entries and then crashes the log device. As the state of the log after a crash-attack is indistinguishable from the state after a real crash, e.g., power failure, the adversary...
This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.