The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of secure communication with the multi-antenna transmission in fading channel is an essential task. The fading channel is one of media for the eavesdropper to intercept when transmitting data. We investigate method for security in wireless communication. In particular, we focus on confidential transmission of pseudo-random location of subcarrier to increase security. This security method...
High accurate time synchronization is very important for many applications and industrial environments. In a computer network, synchronization of time for connected devices is provided by the Precision Time Protocol (PTP), which in principal allows for device time synchronization down to microsecond level. However, PTP and network infrastructures are vulnerable to cyber-attacks, which can de-synchronize...
In this study a numerical cryptanalysis of a random number generator (RNG) which is built on a continuous-time chaotic oscillator is introduced. In order to scrutinize the security weaknesses of the RNG, a master-slave synchronization approach is presented as the basis of an attack scheme. By proposing this attack scheme, it is aimed to verify whether there exist any possibility to divulge the hidden...
Network signatures are used in network intrusion detection systems that try to detect an Internet worm by monitoring network packets. There are many ways to make polymorphic worms. One technique depends on encrypting the body, which erases both signatures and statistical characteristics of the worm byte string. Currently, intrusion detection system reads all the incoming packets and tries to find...
Collaborative technologies have gained popularity due to the widespread adoption of cloud computing and web applications. Services like Google Docs, Office 365 can make one's documents accessible from everywhere, allowing real-time cooperative editing by multiple authors. From a security standpoint, they may offer transport protection by means of TLS, but the users's confidential data can still be...
In this work, numerical cryptanalysis of a random number generator (RNG) designed using a continuous time chaotic oscillator is presented. For the purpose of examining the vulnerabilities of the RNG, a master-slave synchronization approach was presented as a basis for an attack scheme. By suggesting this attack scheme, we intend to verify whether there is the possibility of revealing the secret information...
Today, UAVs are used in various fields such as monitor, search and rescue missions as well as military. UAVs are useful in various fields, but security has always been a major concern. Additionally, UAV carries sensitive information related to people's privacy and it causes critical problems if the data is exploited by malicious attackers. There were many attempts to solve security problems of UAVs...
A multi-observer is designed in this paper using stabilization conditions for chaotic discrete-time multi-models synchronization The proposed stabilization conditions are based on the aggregation techniques for stability study associated to the arrow form matrix for system description. A cryptographic scheme based on Hénon (Hitzl-Zele) multimodels taken as a key is considered and numerical results...
Security and real-time communication becomes more and more important for the widely application of industrial wireless technology in industrial system. However, it is difficult to guarantee both security and the real-time performance at same time in deterministic industrial wireless networks. Through the analysis of industrial wireless network requirements, a novel security mechanism in chip is proposed...
We formalize in this work a model for node capture attack in a secure wireless sensor networks (WSNs). The adversary starts by overhearing exchanged messages to learn about the network because of all data transmissions nature (all in the air). Then, it has the physical access to the node, and with appropriate tools, it can read the secret information (like keys, programs, etc.) stored in the victim...
In this article, cryptanalysis and improvement of a chaos-based random number generator (RNG) are described. An attack system was proposed to explore the security weaknesses of the chaos-based RNG. The convergence of the attack system has been proven using the scheme of master-slave synchronization. Future evaluation of the RNG was derived from a scalar time series where the only available information...
One of the problems of cryptography based on the tree parity machine is how to recognize that two tree parity machines are synchronized. In this paper, one of the possible solutions based on polynomial function is described. The proposed method is focused on obtaining of one unique number by polynomial function. Consequently, two possible forms of an attack on the number are presented. The first one...
In this study, an algebraic security analysis of a random number generator (RNG) which is built on a double-scroll chaotic circuit is put forward. An attack system is proposed to discover the security weaknesses of the RNG. The proposed attack system is proved to be valid by showing its convergence to the targeted system. Here, a master-slave synchronization scheme, which takes only the RNG structure...
Multi sender attribute-based broadcast authentication scheme for the network containing resource constrained nodes is the main focus of this research. In this paper, we proposed a framework in which each element of a set of authorized users whose attributes satisfy a special sign control policy can generate a valid signature. In this framework, there exists a trusted server who receives and verifies...
In this paper we study how to develop an efficient real-time auditing and proof of violation (POV) scheme for cloud storage systems. A POV scheme enables a user or a service provider to produce cryptographic proofs which can be used to prove either the occurrence of the violation of properties or the innocence of the service provider. POV schemes are solutions for obtaining mutual nonrepudiation between...
In this paper, a new robust finite-time hyperchaotic secure communication scheme is proposed by combining robust finite-time synchronization of two hyperchaotic systems and hyperchaotic multiplication masking technique. The mentioned synchronization is achieved by introducing new terminal sliding mode controllers. As a main novelty of the introduced scheme, an adjustable total finite time is obtained...
“Wireless Sensor Networks (WSNs) are currently using in various application areas like as military, health care, ecological, medical, process management, environmental, industrial, agriculture etc. In this article we discussed about the security issues in WSNs. First of all we constraints on the obstacles in WSNs, requirement for security and different attacks at various levels with their solutions...
The Network Time Security specification provides measures which are designed to add security to time synchronization protocols, while considering their specific timing-related requirements. The development of the specification is accompanied by formal analysis of its security model. Special attention is paid to the Network Time Protocol, for which an implementation of those measures is in progress.
The focus on k-anonymity enhancements along the last decade, allows this method to be elected as the point of start for many anonymization researches. In this paper we propose « Contra-Loss », a novel anonymization approach applied at internal level, to enhance local privacy where data is at rest and « Flexible k- anonymity » which aims to apply k-anonymity in most situations by defining a semantic...
Information sharing among a group of friends or colleagues in real life is usually a distributed process: we tell each other interesting or important news without any mandatory assistance or approval from a third party. Surprisingly, this is not what happens when sharing files among a group of friends over the Internet. While the goal of file sharing is to disseminate files among multiple parties,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.