Filters








255 Hits in 4.4 sec

Design of Cryptographic Hardware Architecture for Mobile Computing

Moo-Seop Kim, Young-Sae Kim, Hyun-Sook Cho
2009 Journal of Information Processing Systems  
This paper presents compact cryptographic hardware architecture suitable for the Mobile Trusted Module (MTM) that requires low-area and low-power characteristics.  ...  The proposed cryptographic hardware has a chip area of 38K gates for RSA and 12.4K gates for unified SHA-1 and SHA-256 respectively on a 0.25um CMOS process.  ...  TCG recently published specifications for Mobile Trusted Module (MTM) [1] , which is a modified version of the Trusted Platform Module (TPM) that is the counterpart for PC platforms.  ... 
doi:10.3745/jips.2009.5.4.187 fatcat:g2ika2m5o5gcrkoyg6vhax2iqy

Toward Flexible Security and Trust Hardware Structures for Mobile-Portable Systems

Apostolos Fournaris
2012 IEEE Latin America Transactions  
We focus our analysis on the Trusted Computing Group initiative for mobile trust and highlight the design and implementation problems of such endeavor.  ...  a high level of trust to related mobile applications.  ...  At the moment, the TPM functionality supports only the RSA algorithm with 2048 bit keys and 160 bit hashing through SHA 1 algorithm.  ... 
doi:10.1109/tla.2012.6222576 fatcat:cofpxqnwdbao3llypoz6bw4jv4

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks

Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally
2018 IEEE Access  
To address this challenge, we propose a new implementation of the SHA-3, which has a compact hardware architecture.  ...  INDEX TERMS Body sensor network, cryptographic hash function, encryption, FPGA, hardware, IoT, SHA-3, wireless. 40128 2169-3536  ...  However, to date, little work has been undertaken on the design of compact hardware implementation of the SHA-3 for WBSNs.  ... 
doi:10.1109/access.2018.2855408 fatcat:3f7jx7n7dbeurg4mpv46fb3jju

Designing Efficient Smart Home Management with IoT Smart Lighting: A Case Study

Tran Anh Khoa, Le Mai Bao Nhu, Hoang Hai Son, Nguyen Minh Trong, Cao Hoang Phuc, Nguyen Thi Hoang Phuong, Nguyen Van Dung, Nguyen Hoang Nam, Dong Si Thien Chau, Dang Ngoc Minh Duc, Hui Cheng
2020 Wireless Communications and Mobile Computing  
Security efficiency can be enhanced by using a Secure Hash Algorithm 256 (SHA-256), which is an authentication mechanism that, with the help of the user, can authenticate each interaction of a given device  ...  The monitoring framework is developed on the strength of the web application to obtain real-time display, storage, and warning functions for local or remote monitoring control.  ...  Acknowledgments This work is supported by the Faculty of Electrical and Electronics Engineering, Ton Duc Thang University.  ... 
doi:10.1155/2020/8896637 fatcat:s53zac6wobfmfahvcojww4uvwm

SAKGP: Secure Authentication Key Generation Protocol in WLAN

Latha P.H, Vasantha R
2014 International Journal of Computer Applications  
Hence, this study presents a technique that uses the most recent versions of cryptographic hash functions to ensure the bidirectional authentication between the nodes and WLAN router.  ...  Literatures also share evidence that such issues are yet unsolved and call for a serious modeling of issues and testing the security efficiencies.  ...  [27] model that used SHA1 hash function that is usually deployed for performing computation on a compact depiction of a message.  ... 
doi:10.5120/16807-6537 fatcat:5tlq2m2mgjam5clul66i2utuvu

On the exploitation of a high-throughput SHA-256 FPGA design for HMAC

Harris E. Michail, George S. Athanasiou, Vasilis Kelefouras, George Theodoridis, Costas E. Goutis
2012 ACM Transactions on Reconfigurable Technology and Systems  
High-throughput and area-efficient designs of hash functions and corresponding mechanisms for Message Authentication Codes (MACs) are in high demand due to new security protocols that have arisen and call  ...  In this paper a high-throughput and small-size SHA-256 hash function FPGA design and the corresponding HMAC FPGA design is presented.  ...  authentication of mobile trusted platforms.  ... 
doi:10.1145/2133352.2133354 fatcat:easu2jzndvgnpdnkajntjbuu6e

A Trusted Platform Module for Near Field Communication

Michael Hutter, Ronald Toegl
2010 2010 Fifth International Conference on Systems and Networks Communications  
As a proof-of-concept, we implemented an NFC-enabled TPM platform and show that a trust decision can be realized with commodity smart phones.  ...  In this paper, we propose an NFC-enabled Trusted Platform Module (TPM) architecture that allows users to verify the security status of public terminals.  ...  ACKNOWLEDGMENTS The authors would like to thank Markus Pelnar for his valuable support in the practical realization of our investigations.  ... 
doi:10.1109/icsnc.2010.27 fatcat:yab7rzjysncnlmfmahdmexxgme

TPA Auditing to Enhance the Privacy and Security in Cloud Systems

Sunil Kumar, Dilip Kumar, Hemraj Shobharam Lamkuche
2021 Journal of Cyber Security and Mobility  
We proposed in this paper a trusted third-party auditor (TPA) model which uses lightweight cryptographic system and lightweight hashing technique to ensure data security and data integrity to audit the  ...  The time complexity of our proposed system is less as compared with other TPA model.  ...  hashing function Hash Generation Time File (Type) File (Size in KB) MD-5 SHA-1 SHA-256 BLAKE 3 1.pdf 224 0.24 0.19 0.17 0.14 0.12 2.pdf 318 0.31 0.26 0.22 0.19 0.17 3.pdf 408 0.39 0.33  ... 
doi:10.13052/jcsm2245-1439.1033 fatcat:4wxp2zfs4fdoleg3riyh7vpmda

MoteAODV – An AODV Implementation for TinyOS 2.0 [chapter]

Werner Backes, Jared Cordasco
2010 Lecture Notes in Computer Science  
Prior work in this context includes TinyAODV [29] , an implementation of AODV for version 1.x of the TinyOS operating system.  ...  Instead, it is necessary to use hash functions and symmetric key encryption to provide message integrity and prevent eavesdropping by outside attackers.  ...  Our assembler implementation gives us more than 30% reduction Hash Functions MD5 and SHA-256 We implemented the hash functions MD5 [25] and SHA-256 [2] for the TelosB motes in order to integrity  ... 
doi:10.1007/978-3-642-12368-9_11 fatcat:5c4ty32beze4xfin4ky5a37yt4

UACAP: A Unified Auxiliary Channel Authentication Protocol

Rene Mayrhofer, Fub, Iulia Ion
2013 IEEE Transactions on Mobile Computing  
devices and lack of appropriate user interfaces in mobile devices, and the requirement for unobtrusive user interaction.  ...  This protocol and a selection of auxiliary channels aimed at authentication of mobile devices has been implemented and released in an open source ubiquitous authentication toolkit (OpenUAT).  ...  [19, Sec. 5 ] and a discussion of practical proposals for h such as standard hash functions like SHA DBL -256).  ... 
doi:10.1109/tmc.2012.43 fatcat:wyozktdsr5brbizhr7n2ftidne

A Review on Software-Based and Hardware-Based Authentication Mechanisms for the Internet of Drones

Emmanouel T. Michailidis, Demosthenes Vouyioukas
2022 Drones  
Additionally, this paper provides a review of effective hardware-based solutions for the identification and authentication of network nodes within the IoD that are based on Trusted Platform Modules (TPMs  ...  ), Hardware Security Modules (HSMs), and Physically Unclonable Functions (PUFs).  ...  However, more recent implementations (e.g., truncated SHA-2, SHA-3, BLAKE2, and BLAKE3) can resist these types of attacks.  ... 
doi:10.3390/drones6020041 fatcat:ye34o3pjjjhovbe7ob3ch4mswa

Plug-n-trust

Jacob M. Sorber, Minho Shin, Ron Peterson, David Kotz
2012 Proceedings of the 10th international conference on Mobile systems, applications, and services - MobiSys '12  
We describe our implementation, designed for Java-based smart cards and Android phones, in which we use a split-computation model with a novel path hashing technique to verify proper behavior without exposing  ...  Mobile computing and sensing technologies present exciting opportunities for healthcare.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the sponsors  ... 
doi:10.1145/2307636.2307665 dblp:conf/mobisys/SorberSPK12 fatcat:4knkpnvelvfzfly5spqfu54zme

Security Architecture and Protocol for Trust Verifications Regarding the Integrity of Files Stored in Cloud Services

Alexandre Pinheiro, Edna Dias Canedo, Rafael de Sousa Junior, Robson de Oliveira Albuquerque, Luis García Villalba, Tai-Hoon Kim
2018 Sensors  
Ideally, owners of large amounts of data should trust their data to be in the cloud for a long period of time, without the burden of keeping copies of the original data, nor of accessing the whole content  ...  Extensive tests and simulations of the proposed architecture and protocol validate their functional behavior and performance.  ...  The SHA family is composed of algorithms named as SHA-1, SHA-256, SHA-512, which differ regarding the respective security level and the output hash length, that can vary from 160 to 512 bits.  ... 
doi:10.3390/s18030753 pmid:29498641 pmcid:PMC5876826 fatcat:72v24pz7wvb4hcl5h2tkdqbsdy

Enabling the Remote Acquisition of Digital Forensic Evidence through Secure Data Transmission and Verification [article]

Mark Scanlon
2017 arXiv   pre-print
This is achieved through the implementation of a secure, verifiable client/server imaging architecture.  ...  Providing the ability to any law enforcement officer to remotely transfer an image from any suspect computer directly to a forensic laboratory for analysis, can only help to greatly reduce the time wasted  ...  I would like to thank the staff in the School of Computer Science and Informatics, University College Dublin (UCD) for providing me with the opportunity to learn, facilities to perform my research, and  ... 
arXiv:1712.02529v1 fatcat:p23sefutpfexxghu5wl55ka7ra

Token-Based Authentication Framework for 5G MEC Mobile Networks

Wojciech Niewolski, Tomasz W. Nowak, Mariusz Sepczuk, Zbigniew Kotulski
2021 Electronics  
MEC technology provides a distributed computing environment in 5G mobile networks for application and service hosting.  ...  with the standard requirements of MEC-hosted services in 5G networks.  ...  It only introduces the main MEC Enabler modules and the functions they perform to define the basics of the implementation requirements of the respective modules.  ... 
doi:10.3390/electronics10141724 fatcat:meyc7fiqejdsbjohcv4pfjgsey
« Previous Showing results 1 — 15 out of 255 results