155 Hits in 6.7 sec

A compact and fast hybrid signature scheme for multicast packet authentication

Pankaj Rohatgi
1999 Proceedings of the 6th ACM conference on Computer and communications security - CCS '99  
This paper proposes a compact and fast hybrid signature scheme that can be used to solve the problem of packet source authentication for multicast.  ...  This scheme can be viewed as an improvement to off-line/on-line signature schemes, in that the signature size overhead is much smaller.  ...  scheme and to Shai Halevi and Charanjit Jutla for help in the design of the primitives.  ... 
doi:10.1145/319709.319722 dblp:conf/ccs/Rohatgi99 fatcat:bywfh2m7vvatdlzo3l6vmosco4

Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

Q. Wang, H. Khurana, Y. Huang, K. Nahrstedt
2009 IEEE INFOCOM 2009 - The 28th Conference on Computer Communications  
Desirable properties for a multicast authentication scheme also include small communication overhead, tolerance to packet loss, and resistance against malicious attacks.  ...  It provides fast signing/verification and buffering-free data processing, which make it one of the fastest multicast authentication schemes to date in terms of end-to-end computational latency (on the  ...  TV-HORS has a much smaller signature size and strong security for stream multicast authentication. IX.  ... 
doi:10.1109/infcom.2009.5062037 dblp:conf/infocom/WangKHN09 fatcat:v3imwufv6vc5poap34tmx6zuei

A Survey on Future Internet Security Architectures

Wenxiu Ding, Zheng Yan, Robert H. Deng
2016 IEEE Access  
Motivated by emerging demands for security, mobility, and distributed networking, many research projects have been initiated to design the future Internet from a clean slate.  ...  Furthermore, we compare these projects and discuss their pros and cons. Open security issues are pointed out for directing future research.  ...  Besides the content-centric network architectures, the MobilityFirst is designed to deal with the names and network addresses to achieve mobility, which is actually a hybrid name and address scheme.  ... 
doi:10.1109/access.2016.2596705 fatcat:ny3dd4naaref7ktsmu32xzosbe

A Survey of Applications of Identity-Based Cryptography in Mobile Ad-Hoc Networks

Shushan Zhao, Akshai Aggarwal, Richard Frost, Xiaole Bai
2012 IEEE Communications Surveys and Tutorials  
This is a survey on application of Identity-Based Cryptography in mobile ad hoc networks.  ...  It also discusses future directions and open problems of general Identity-Based Cryptography and its application in mobile ad hoc networks.  ...  and an authenticated broadcast scheme based on symmetric keys and a corresponding signature scheme.  ... 
doi:10.1109/surv.2011.020211.00045 fatcat:bcgqnhfzxrdvlfoq6tmucsjdea

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down  ...  Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols.  ...  [115] presented ELMO, a multicast scheme based on programmable P4 switches for datacenter applications.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
This open-design paradigm is paving the way for an unprecedented wave of innovation and experimentation by reducing the time of designing, testing, and adopting new protocols; enabling a customized, top-down  ...  Traditionally, the data plane has been designed with fixed functions to forward packets using a small set of protocols.  ...  ACKNOWLEDGEMENT This material is based upon work supported by the National Science Foundation under grant numbers 1925484 and 1829698, funded by the Office of Advanced Cyberinfrastructure (OAC).  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia

Recent Advances in Information-Centric Networking based Internet of Things (ICN-IoT) [article]

Sobia Arshad, Muhammad Awais Azam, Mubashir Husain Rehmani, Jonathan Loo
2018 arXiv   pre-print
Obvious benefits of ICN in terms of fast and efficient data delivery and improved reliability raises ICN as highly promising networking model for Internet of Things (IoTs) like environments.  ...  Subsequently, we present a comprehensive survey on ICN based caching, naming, security and mobility approaches for IoTs with appropriate classification.  ...  ACKNOWLEDGMENT This research is supported by the Computer Engineering Department (CPED) of the University of Engineering and Technology (UET), Taxila, Pakistan under a Full-time research scholarship, and  ... 
arXiv:1710.03473v3 fatcat:psedk3gg3bbjjhxvit5vae5xxu

Real Tournament – mobile context‐aware gaming for the next generation

Maomao Wu, Keith Mitchell, Duncan McCaffery, Joe Finney, Adrian Friday
2004 Electronic library  
Through the process of development, deployment, and evaluation of the game, we can have a better view of the impact of Mobile IPv6 on future network services and applications.  ...  As part of the new research collaboration between Lancaster University, Cisco Systems, Microsoft Research and Orange -MIPv6 Systems Research Lab (MSRL), such a mobile context-aware multiplayer game is  ...  In essence, our packet marking scheme is a hybrid way of digitally signing the whole IP packet, including the headers and payload, and this is placed in an IPv6 extension header.  ... 
doi:10.1108/02640470410520113 fatcat:w6st7uv5gzdh5fq6jdrjnh4uye

Theory and Practice of Bloom Filters for Distributed Systems

Sasu Tarkoma, Christian Esteve Rothenberg, Eemil Lagerspetz
2012 IEEE Communications Surveys and Tutorials  
This survey article presents a number of frequently used and useful probabilistic techniques.  ...  In this survey, we give an overview of the basic and advanced techniques, reviewing over 20 variants and discussing their application in distributed systems, in particular for caching, peer-to-peer systems  ...  ACKNOWLEDGEMENTS This work was supported by TEKES as part of the Future Internet program of TIVIT (Finnish Strategic Centre for Science, Technology and Innovation in the field of ICT).  ... 
doi:10.1109/surv.2011.031611.00024 fatcat:ziz4fwmd5jhizjvjpltaejhnmy

2020 Index IEEE Transactions on Vehicular Technology Vol. 69

2020 IEEE Transactions on Vehicular Technology  
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex  ...  Revocable Data-Sharing Scheme in VANETs; TVT Dec. 2020 15933-15946 Hoseini, S.A., Ding, M., Hassan, M., and Chen, Y., Analyzing the Impact of Molecular Re-Radiation on the MIMO Capacity in High-Frequency  ...  ., +, TVT Dec. 2020 15668-15681 Authentication A Lightweight Authentication and Attestation Scheme for In-Transit Vehi- cles in IoV Scenario.  ... 
doi:10.1109/tvt.2021.3055470 fatcat:536l4pgnufhixneoa3a3dibdma

Named Data Networking: A survey

Divya Saxena, Vaskar Raychoudhury, Neeraj Suri, Christian Becker, Jiannong Cao
2016 Computer Science Review  
Internet was developed as a packet data network where users and data sources (server) with specific IP addresses interacted over a pre-established communication channel.  ...  result of either packet loss or lifetime expiry), and time-to-completion (total time required to satisfy a content request), etc.  ...  It is used to authenticate a given key for a particular packet in an application [8] . Pournaghshband, et al.  ... 
doi:10.1016/j.cosrev.2016.01.001 fatcat:z256vu3lwrdnpkzsdnruxtlosi

Wireless Sensor Network Security

An Liu, Mihui Kim, Leonardo B. Oliveira, Hailun Tan
2013 International Journal of Distributed Sensor Networks  
Acknowledgements We wish to thank Alexander Becher and Maximillian Dornseif for many helpful discussions and the delightful previous cooperation in breaking sensors [6] which formed the basis of Section  ...  The information in this document reflects only the author's views, is provided as is and no guarantee or warranty is given that the information is fit for any particular purpose.  ...  For the LDM and the LDW a new public key becomes active after every signature, for the HORS scheme this happens after r signatures.  ... 
doi:10.1155/2013/362385 fatcat:2ph46uukonbtbdkc5q6t4mvgcq

Active network vision and reality

David Wetherall
1999 Proceedings of the seventeenth ACM symposium on Operating systems principles - SOSP '99  
However, we believe that we have made substantial progress towards providing a more flexible network layer while at the same time addressing the performance and security concerns raised by the presence  ...  In this paper, we argue our progress towards the original vision and the difficulties that we have not yet resolved in three areas that characterize a "pure" active network: the capsule model of programmability  ...  We are grateful to the members of the SDS group at MIT, and in particular wish to thank Tom Anderson, Steve Garland, John Guttag, Hank Levy and David Tennenhouse for their encouragement and guidance.  ... 
doi:10.1145/319151.319156 dblp:conf/sosp/Wetherall99 fatcat:wyijun2dhjcwbmdpifcwg7shli

Privacy, Discovery, and Authentication for the Internet of Things [article]

David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh
2017 arXiv   pre-print
To address the need for better privacy in both the IoT and the mobile landscape, we develop two protocols for private service discovery and private mutual authentication.  ...  Finally, we discuss some privacy limitations of the Apple AirDrop protocol (a peer-to-peer file sharing mechanism) and show how to improve the privacy of Apple AirDrop using our private mutual authentication  ...  We thank Bruno Blanchet for his help in verifying the unlinkability property of our modified private mutual authentication protocol in Section 4.  ... 
arXiv:1604.06959v3 fatcat:45marxb3xzekflyu35yx2b3uay

Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges

Hakima Khelifi, Senlin Luo, Boubakr Nour, Hassine Moungla, Yasir Faheem, Rasheed Hussain, Adlen Ksentini
2019 IEEE Communications Surveys and Tutorials  
Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET.  ...  Inspired by the extensive research results in NDN-based VANET, in this paper, we provide a detailed and systematic review of NDN-driven VANET.  ...  Bouk et al. extended this work with efficient Compact Trie management scheme for VCCN in [105] .  ... 
doi:10.1109/comst.2019.2894816 fatcat:qxljrw7bcrdgfko3itxprhsige
« Previous Showing results 1 — 15 out of 155 results