27,087 Hits in 11.9 sec

Designing and Verifying Core Protocols for Location Privacy [chapter]

David von Oheimb, Jorge Cuellar
2006 Lecture Notes in Computer Science  
In the design phase of such protocols, numerous variants are to be considered and evaluated.  ...  In this paper we propose and discuss new protocols representing the core of Geopriv, with particular focus on the security requirements stated in the IETF's RFC 3693.  ...  We thank Hariharan Rajasekaran and some anonymous referees for their comments on earlier versions of this paper.  ... 
doi:10.1007/11836810_36 fatcat:diqgfuldjzalvpquiublrbopw4

Security and Privacy of Protocols and Software with Formal Methods [chapter]

Fabrizio Biondi, Axel Legay
2016 Lecture Notes in Computer Science  
for what purpose.  ...  The complexity of modern systems make it impossible for software architect to create secure software that correctly implements privacy policies without the help of automated tools.  ...  Finally, the authors describe the extension of the above model to a generalized notion for location privacy, called l-privacy capturing both (D,e)-location privacy and also the recent notion of geo-indistinguishability  ... 
doi:10.1007/978-3-319-47166-2_61 fatcat:ygef2jw6dneabg7dgdskc26pz4

Verifiable Location-Encrypted Spatial Aggregation Computing for Mobile Crowd Sensing

Kun Niu, Changgen Peng, Weijie Tan, Zhou Zhou, Yi Xu
2021 Security and Communication Networks  
To address these problems, a verifiable location-encrypted spatial aggregation computing (LeSAC) scheme is proposed for MCS privacy protection.  ...  Those are challenges in the trust computation and privacy protection, especially for sensitive data aggregation with spatial information.  ...  For example, based on mobile edge computing architecture and Paillier homomorphic encryption scheme, a distance-based secure location computing protocol is designed in [26] , and base station is regarded  ... 
doi:10.1155/2021/6654539 doaj:543fe6938a244792b79103f327ff5bce fatcat:bzdfikt6cfbpllvwc6nuaey6rm

Resilient Collaborative Privacy for Location-Based Services [chapter]

Hongyu Jin, Panos Papadimitratos
2015 Lecture Notes in Computer Science  
We provide an analysis of security and privacy concerns and countermeasures, as well as a performance evaluation of basic protocol operations showing the practicality of our design.  ...  This is the motivation of both centralized and decentralized location privacy protection schemes for LBSs: anonymizing and obfuscating LBS queries to not disclose exact information, while still getting  ...  collusion of the LBS server, the LTCA and the PCA would expose users Performance Evaluation Sony Xperia Ultra Z with Quad-core 2.2 GHz Krait 400 CPU Bouncy Castle library for crypto operations (only one  ... 
doi:10.1007/978-3-319-26502-5_4 fatcat:lzxaz2getnefnisd6jod2mq5r4

Privacy preserving localization for smart automotive systems

Siam U. Hussain, Farinaz Koushanfar
2016 Proceedings of the 53rd Annual Design Automation Conference on - DAC '16  
We design and optimize GC netlists of the functions required for computation of location by leveraging conventional logic synthesis tools.  ...  This localization application is one of the very first location-based services that does not sacrifice accuracy to maintain privacy.  ...  For example, Intel Atom Processor E3845, designed for in-vehicle solutions, has four cores operating at 1.91GHz and an L2 cache of 2MB [24] . The protocol requires transmission of about 1MB of data.  ... 
doi:10.1145/2897937.2898071 dblp:conf/dac/HussainK16 fatcat:zpqzid5tnbdrlcqfb6pyf5yfk4

5G Security and Privacy: A Research Roadmap [article]

Elisa Bertino, Syed Rafiul Hussain, Omar Chowdhury
2020 arXiv   pre-print
research challenges, including formal and comprehensive analyses of cellular protocols as defined by the standardization groups, verification of the software implementing the protocols, the design of  ...  In this white paper, we outline recent approaches supporting systematic analyses of 4G LTE and 5G protocols and their related defenses and introduce an initial security and privacy roadmap, covering different  ...  We would like to thank our CCC colleagues Sujata Banerjee, Khari Douglas, Mark Hill, Daniel Lopresti, and Jennifer Rexford for the interesting comments and suggestions on the white paper.  ... 
arXiv:2003.13604v1 fatcat:wvu4dbry75b4dgdz5xt7lxbreq

Security-Oriented Network Architecture

Weiyu Jiang, Bingyang Liu, Chuang Wang, Xue Yang, Salvatore D'Antonio
2021 Security and Communication Networks  
Then, the system design of NAIS is elaborated with particular design philosophies and four security techniques.  ...  Such philosophies and techniques intertwine internally and contribute to a communication environment with authenticity, privacy, accountability, confidentiality, integrity, and availability.  ...  NAIS Design Overview is section describes the system design of NAIS. We firstly introduce five core network functions with security ability and then give the assumptions and the threat model.  ... 
doi:10.1155/2021/6694650 fatcat:ta3azw6canerlahszyhvuxvhde

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go

Aristeidis Farao, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis
2021 Sensors  
Our scheme is complemented by the MASKER protocol, used to protect the consumption readings, and the FIDO2 protocol for strong and passwordless authentication.  ...  This paper presents P4G2Go, a novel privacy-preserving scheme that provides strong security and privacy assertions for roaming consumers against honest but curious entities of the smart grid.  ...  exchange infor for tracking a specific Consumer's movement activities and disclose their private mation will fail (P2-Location privacy).  ... 
doi:10.3390/s21082686 pmid:33920337 fatcat:be7kfo5cjrelnmsfe6rnqxatlm

Exploring the use of Intel SGX for Secure Many-Party Applications

Kubilay Ahmet Küçük, Andrew Paverd, Andrew Martin, N. Asokan, Andrew Simpson, Robin Ankele
2016 Proceedings of the 1st Workshop on System Software for Trusted Execution - SysTEX '16  
Examples of this type of many-party application include privacy-preserving energy metering, location-based services, and mobile network roaming.  ...  Using privacy-preserving energy metering as a case study, we design and implement a prototype TRE using SGX, and compare its performance to a previous system based on the Trusted Platform Module (TPM).  ...  We thank the reviewers for their helpful comments and we thank Ç aglayan Aras for help with measurements.  ... 
doi:10.1145/3007788.3007793 dblp:conf/middleware/KucukPMASA16 fatcat:ckys46jscna7xbvf434ulkpphm

An Introduction: Context-aware Computing for Secure Message Transmission System in M2M

Byungwook Jin
2013 The Smart Computing Review  
Therefore, this paper designs a situational recognition system for protection of privacy in M2M systems, and studies safe message transmission protocols accordingly.  ...  So this paper designs a situational recognition system for device certificates in M2M systems and message privacy protection.  ...  For example, if the user accesses the service to search for people close by, the user can get that information from location-based services.  ... 
doi:10.6029/smartcr.2013.06.003 fatcat:eixc3jcmuzgaveummoly3e6qla

CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap

Levente Butty´n, M´rk Felegyh´zi, Boldizs´r Bencs´th
2011 2011 First SysSec Workshop  
We will discuss network-and wireless system security, the core competences of CrySyS.  ...  The Laboratory of Cryptography and System Security (CrySyS) is dedicated to conduct research in the field of computer security and user privacy.  ...  The core infrastructure is facing the major shift from legacy protocols to future Internet design. Naming and addressing, and the corresponding security mechanisms have to adapt to this change.  ... 
doi:10.1109/syssec.2011.15 dblp:conf/dimva/ButtyanFB11 fatcat:qnytn6poubgdlkkok7eywh6z6e

Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative Analysis

Faheem Zafar, Abid Khan, Adeel Anjum, Carsten Maple, Munam Ali Shah
2020 Electronics  
In this paper, we investigate the state of the art in location proof systems, examining design challenges and implementation considerations for application in the real world.  ...  Furthermore, we have identified future trends for this increasingly important area of investigation and development.  ...  Acknowledgments: We would also like to add special thanks to Elixir Technologies Pakistan for all support in accomplishing the research work. Maple would like to acknowledge the support of EPSRC.  ... 
doi:10.3390/electronics9111776 fatcat:4cz2xveimngdrj3a2pdqmpcloe

Privacy-Preserving Observation in Public Spaces [chapter]

Florian Kerschbaum, Hoon Wei Lim
2015 Lecture Notes in Computer Science  
We analyze our protocol for computational efficiency and show that it can be efficiently implemented even on platforms with limited computing resources, such as smart cards and smart phones.  ...  The probability can be set high enough to allow for spot checking, but in all other cases privacy is perfectly preserved.  ...  [21] designed an anonymous payment protocol for enhancing the location privacy of electric vehicles.  ... 
doi:10.1007/978-3-319-24177-7_5 fatcat:mgqzms4tgjfs7jnlteyxpsabxy

Privacy and accountability for location-based aggregate statistics

Raluca Ada Popa, Andrew J. Blumberg, Hari Balakrishnan, Frank H. Li
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
This paper develops and evaluates PrivStats, a system for computing aggregate statistics over location data that simultaneously achieves two properties: first, provable guarantees on location privacy even  ...  PrivStats achieves these properties using a new protocol for uploading and aggregating data anonymously as well as an efficient zero-knowledge proof of knowledge protocol we developed from scratch for  ...  ACKNOWLEDGMENTS We thank Nickolai Zeldovich, Mike Walfish, Arvind Narayanan, and the anonymous reviewers for useful comments and feedback.  ... 
doi:10.1145/2046707.2046781 dblp:conf/ccs/PopaBBL11 fatcat:x6sttccsjncabcdmrobw6p2wxy

PE-TLBS: Secure Location Based Services Environment with Emphasis on Direct Anonymous Attestation Protocol

Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan
2011 International Journal of Multimedia and Image Processing  
Thus, this paper presents Privacy Enhanced-Trusted Location Based Services (PE-TLBS) framework which create more trusted and privacy preserving services on top of existing Mobile Location Protocol (MLP  ...  Significantly, the proliferation of Location Based Services in mobile and wireless communication has also increased the need to address security, privacy and trust issues.  ...  In the next section we discuss the role of an anonymizer and the attestation protocol in fulfilling privacy preserving requirement Current Mobile Location Protocol The core of location based service  ... 
doi:10.20533/ijmip.2042.4647.2011.0006 fatcat:k2cu7xvyafgsnm3vqd2dqvmmki
« Previous Showing results 1 — 15 out of 27,087 results