The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is estimated that in the near future vehicles will be equipped with electronic devices allowing communication among vehicles. This communication should enable the exchange of traffic data, such as accidents, traffic jams or the approaching of emergency vehicles. This exchange, however, cannot be done through simple messages. It is necessary to perform it as safe and efficient as possible, avoiding...
The Controller Area Network (CAN) is a broadcast communications network invented by Robert Bosch GmbH in 1986. CAN is the standard communication network found in automobiles, industry equipment, and many space applications. To be used in these environments, CAN is designed for efficiency and reliability, rather than security.
Most of the existing authentication protocols are based on either asymmetric cryptography like public-key infrastructure (PKI) or symmetric cryptography. The PKI-based authentication protocols are strongly recommended for solving security issues in VANETs. However, they have following shortcomings: (1) lengthy certificates lead to transmission and computation overheads, and (2) lack of privacy-preservation...
In large-scale vehicular ad hoc networks, in order to speed up the anonymous message authentication and realize scalability, the forwarding node combined signatures and with the help of the Road Side Units (RSU) for quick authentication and dissemination method still some key questions: when the vehicle sends a message to RSU authentication and dissemination, the forwarding nodes using combined signature...
Industrial control system is a general term that addresses several types of control systems, including supervisory control and data acquisition systems, distributed control systems, Programmable Logic Controllers and etc. There is no doubt that protecting PLCs from cyber-attacks is very important as they directly control industrial processes. In critical infrastructure, any successful attack on PLC...
The Network Time Security specification provides measures which are designed to add security to time synchronization protocols, while considering their specific timing-related requirements. The development of the specification is accompanied by formal analysis of its security model. Special attention is paid to the Network Time Protocol, for which an implementation of those measures is in progress.
Routing-driven key management schemes integrated with centralized routing for heterogeneous sensor networks (HSNs) mainly have two shortcomings: high communication energy consumption, and large storage requirements. To address the above problems, we propose a distributed key management scheme for HSNs. Taking advantage of distributed routing protocol, the scheme achieves to reduce communication cost...
Security has become a primary concern in order to provide protected communication between mobile nodes in a hostile environment. Unlike the wireline networks, the unique characteristics of mobile ad hoc networks pose a number of nontrivial challenges to security design, such as open peer-to-peer network architecture, shared wireless medium, stringent resource constraints, and highly dynamic network...
An Unattended Wireless Sensor Network (UWSN) is a type of sensor network where a trusted sink visits each node periodically to collect the data. Due to the offline nature of this network, every node has to secure its data until the next visit of the sink which makes the network susceptible of attacks focusing on the data collected. In this work, we focus on the data authentication in the presence...
Modern computer communication technologies make it possible to create very flexible Data delivery service (DDS) design that can efficiently meet the quality-of-service needs of a wide variety of power system control and monitoring applications, some which only become possible with better communications. One aspect of the smart grid is that multiple applications will use data from each location. Furthermore,...
with the development of cloud computing, cloud security issues have recently gained traction in the research community. Although much of the efforts are focused on securing the operation system and virtual machine, or securing data storage inside a cloud system, this paper takes an alternative perspective to cloud security-the security of data migration between different clouds. First, we describe...
eCommerce has rapidly turned into a trillion dollar a year industry. Now an integral part of modern economies, it is continuing to expand, especially in the form of M-commerce. Numerous solutions have been proposed to secure consumer-level eCommerce and M-commerce transactions. The recent shift toward chip-and-PIN cards in some jurisdictions, and similar technologies that require pre-transaction customer...
Services such as sending a pre-crash sensing warning and traffic condition warning are expected to be provided in car-to-car/infrastructure (C2X) communication systems. Maintaining message integrity is essential for these services because wrong messages may cause collision accidents and congestion. A message authentication code (MAC) generated by using a symmetric key is used to authenticate a message...
This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and Applications, Importance of Security: A Scenario of Terrorists Attack, What are Biometric Technologies? Biometrics: Analysis vs Synthesis, Analysis: Interactive Pattern Recognition Concept, Importance of Measurement, How it...
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery...
JXTA is a set of open protocols that enable the creation and deployment of peer-to-peer (P2P) networks, allowing the execution of services in a distributed manner. Being a generic P2P middleware, it has slowly evolved in order to appeal a broad set of different applications. Part of this evolution includes providing basic security capabilities in its protocols in order to achieve some degree of message...
We consider various security vulnerabilities of deploying Advanced Metering Infrastructure (AMI) in smart grid, and explore the issues related to confidentiality for customer privacy and customer behavior as well as message authentication for meter reading and control messages. There are only a very few research work on AMI authentications, and no work exists on confidentiality for user privacy and...
VANET is very important for improving traffic safety and efficiency. So the messages in VANET must be trustworthy and disseminated very fast. In this paper, an efficient and secure scheme is proposed for VANET messages authentication, group signature is used for the messages from private vehicles and identity-based signature for public vehicles and RSU, further more, it employs batch message-processing...
Mobile Ad-Hoc Network (MANET) is an emerging area with practical applications. An Ad-Hoc network consists of a collection of wireless mobile nodes that are capable of communicating with each other without the use of a network infrastructure. However, routing security in MANETs appears to be a problem due to open medium, dynamic topology and constrained capability. The proposed work estimates the applicability...
The primary defect of current authentication schemes for Radio Frequency Identification (RFID) tags lies in that in order to identify only one single tag they require a linear computational complexity on the server side. We propose a secure RFID mutual authentication scheme in this paper. It not only provides confidentiality, untraceability and mutual authentication, but also have efficiency in terms...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.