Filters








109 Hits in 7.7 sec

Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI

C.I. Djamaludin, E. Foo, P. Corke
2013 Computers & security  
A Delay Tolerant Network (DTN) is one where nodes can be highly mobile, with long message delay times forming dynamic and fragmented networks.  ...  In this paper, we utilise a key distribution model based on the Web of Trust principle, and employ a simple leverage of common friends trust system to establish initial trust in autonomous DTN's.  ...  DTN networks without a centralised PKI (Seth and Keshav, 2005) have employed identity based cryptography.  ... 
doi:10.1016/j.cose.2013.08.007 fatcat:kdyienvnyzaivb4wdd7o7vnyj4

Cryptographic Key Management in Delay Tolerant Networks: A Survey

Sofia Anna Menesidou, Vasilios Katos, Georgios Kambourakis
2017 Future Internet  
Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs) have gradually evolved, spurring the development of a variety of methods and protocols for making  ...  Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a) security initialization, (b) key establishment  ...  This is based on a DTN without a centralised PKI that ensures entity authentication and utilises the LCF trust system presented in [33] .  ... 
doi:10.3390/fi9030026 fatcat:fmacr4hrjrd27efi677m7cja7m

SOMA: Self-Organised Mesh Authentication [chapter]

Foivos F. Demertzis, Christos Xenakis
2011 Lecture Notes in Computer Science  
Our goal is to create a large-scale authentication system for mesh networks without the need of a Trusted Third Party.  ...  Community mesh networks have emerged rapidly in every metropolis around the world, however many of the security methods applied are counter-intuitive and usually disrupt the autonomous characteristics  ...  This introduces a delay in the initial stages of network and can cause problems when there are insufficient trust relationships.  ... 
doi:10.1007/978-3-642-22633-5_3 fatcat:pzmbsou3bvelhdjbz7ijyud2bu

A First Look at Identity Management Schemes on the Blockchain [article]

Paul Dunphy, Fabien A.P. Petitcolas
2018 arXiv   pre-print
These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control in transactions that involve identity information; but, given the historical challenge  ...  Although there are no trusted third parties in the PKI-sense on Sovrin, users must rely on agencies that will act on their behalf on the Sovrin network and on the stewards maintaining the ledger.  ...  However, due to the lack of a central authority, trust of these attributes currently relies upon ad-hoc trust establishment between organisations.  ... 
arXiv:1801.03294v1 fatcat:7ghpg3trkze5bmojenxq24pns4

Secure Inter-Domain Routing Based on Blockchain: A Comprehensive Survey

Lukas Mastilak, Pavol Helebrandt, Marek Galinski, Ivan Kotuliak
2022 Sensors  
The BGP plays a significant role in routing, but its behaviour is essentially naive, trusting neighbours without authenticating advertised IP prefixes.  ...  The whole Internet consists of thousands of autonomous systems that transfer data with one another.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.  ... 
doi:10.3390/s22041437 pmid:35214339 pmcid:PMC8876475 fatcat:pm5wd3iuprdoxbillm5olvrz2m

Blockchain challenges and opportunities: a survey

Zibin Zheng, Shaoan Xie, Hong Ning Dai, Xiangping Chen, Huaimin Wang
2018 International Journal of Web and Grid Services  
in tackling the challenges.  ...  Although a number of studies focus on using the blockchain technology in various application aspects, there is no comprehensive survey on the blockchain technology in both technological and application  ...  Acknowledgement The work described in this paper was supported by the National Key  ... 
doi:10.1504/ijwgs.2018.095647 fatcat:tstcy73a7bajbcfutreco44hmu

Machine Learning for Authentication and Authorization in IoT: Taxonomy, Challenges and Future Research Direction

Kazi Istiaque Ahmed, Mohammad Tahir, Mohamed Hadi Habaebi, Sian Lun Lau, Abdul Ahad
2021 Sensors  
In this paper, recent advances in authentication and authorization techniques for IoT networks are reviewed.  ...  In order to overcome challenges due to various constraints of IoT networks, there is a significant interest in using machine learning techniques to assist in the authentication and authorization process  ...  Therefore, in specialised and autonomous sensor networks, memory usage optimization is critical [51] .  ... 
doi:10.3390/s21155122 fatcat:auzbla5c4rhzfdtnhmxeedyymq

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance

Sotirios Brotsis, Konstantinos Limniotis, Gueltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles
2021 Computer Networks  
If the underlying consensus protocols performance and fault tolerance is also considered, then only a small number of platforms meet the requirements of our reference IoT domain.  ...  Blockchain and distributed ledger technologies have received significant interest in various areas beyond the financial sector, with profound applications in the Internet of Things (IoT), providing the  ...  networks delays can cause severe consequences.  ... 
doi:10.1016/j.comnet.2021.108005 fatcat:35tosxqpxjawzilnxoco5u2b5q

GDPR-Compliant Personal Data Management: A Blockchain-based Solution

Nguyen Binh Truong, Kai Sun, Gyu Myoung Lee, Yike Guo
2019 IEEE Transactions on Information Forensics and Security  
By honestly participating in the platform, a service provider can be endorsed by the blockchain network that it is fully GDPR-compliant; otherwise, any violation is immutably recorded and is easily figured  ...  The platform enables data owners to impose data usage consent, ensures only designated parties can process personal data, and logs all data activities in an immutable distributed ledger using smart contract  ...  This solution approach is designed under a centralised client-server mindset that imposes unsolvable challenges in complying with the new GDPR requirements and in establishing trust with clients [14]  ... 
doi:10.1109/tifs.2019.2948287 fatcat:f2rc4z7p7zb7vbhckwskmdy4ha

Towards 6G-enabled Internet of Vehicles: Security and Privacy

D. P. Moya Osorio, I. Ahmad, J. D. Vega Sanchez, A. Gurtov, J. Scholliers, M. Kutila, P. Porambage
2022 IEEE Open Journal of the Communications Society  
In this paper, we provide a timely deliberation of the role that promissory 6G enabling technologies such as artificial intelligence, network softwarisation, network slicing, blockchain, edge computing  ...  The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number  ...  the ledger of a member is corrupted, it will be rejected by the majority of the members in the network, thus facilitating trust establishment among nodes [76] .  ... 
doi:10.1109/ojcoms.2022.3143098 fatcat:vfuwuncr3vaotly7yw7yx25xyu

The Kiss Principle In Software-Defined Networking: A Framework For Secure Communications

Diego Kreutz, Jiangshan Yu, Paulo Esteves-Verissimo, Cátia Magalhães, Fernando Ramos
2017 Zenodo  
Security is an increasingly fundamental requirement in Software-Defined Networking (SDN).  ...  To address these challenges we propose KISS, a secure SDN control plane communications architecture that includes innovative solutions in the context of key distribution and secure channel support.  ...  We believe that this is one first step towards lightweight but effective security for control plane communication, and potentially for SDN in general.  ... 
doi:10.5281/zenodo.1053803 fatcat:2beyvzaiwzf5toq6zvhhh5gea4

Legal Education in the Blockchain Revolution

Mark Fenwick, Wulf A. Kaal, Erik P. M. Vermeulen
2017 Social Science Research Network  
It proposes eight scenarios for the application of the Blockchain in an education context, based on the current state of technology development and deployment. i  ...  , autonomous, networked organisations.  ...  The distributed ledgers contribute to trust by establishing a fact at a given point in time, which can then be trusted.  ... 
doi:10.2139/ssrn.2939127 fatcat:7jvxzzixazf77hpevogzuuwtn4

The Case of Diem: A Distributed Ledger Technology-based Alternative Financial Infrastructure Built by a Centralised Multisided Platform

Golnaz Abdollahi Jafari, Malte-Christian Gruber
2021 Zenodo  
Under these circumstances, the chance of success of the Diem project clearly depends on the extent to which the aforementioned concerns can be dispelled and whether public trust can be established.  ...  social networks governed and controlled by private entities.  ...  In a PKI infrastructure, the identifier mechanism where risks associated with profiling and registry is generally managed by a centralised correlation are minimised  ... 
doi:10.5281/zenodo.5833740 fatcat:dvg4xmuu2rc3lbeu5cwihhtniq

Privacy-Preserving Mechanism in Smart Home using Blockchain

Amjad Qashlan, Priyadarsi Nanda, Xiangian He, Manoranjan Mohanty
2021 IEEE Access  
To solve these challenges, an approach to data privacy and security in a smart home using blockchain technology is proposed in this paper.  ...  The IoT, or Internet of Things has been a major talking point amongst technology enthusiasts in recent years.  ...  PKI techniques based on blockchain are decentralised, which eliminates the need for a centralised access point or a trusted third-party [12] .  ... 
doi:10.1109/access.2021.3098795 fatcat:my4mp6pufjeftj2gbvmggker4i

Zero Trust Architecture (ZTA): A Comprehensive Survey

Naeem Firdous Syed, Syed W. Shah, Arash Shaghaghi, Adnan Anwar, Zubair Baig, Robin Doss
2022 IEEE Access  
We describe the role of authentication and access control in Zero Trust Architectures (ZTA) and present an in-depth discussion of state-of-the-art techniques for authentication and access control in different  ...  We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing number of advocates in the critical infrastructure risk management space.  ...  The authors use average delay (AD) and packet delivery ratio (PDR) as the statistical parameters for trust calculation, as data plane attacks can affect the delay of critical packets or even target the  ... 
doi:10.1109/access.2022.3174679 fatcat:w7c27guoqzfdffhjnpgerlnnse
« Previous Showing results 1 — 15 out of 109 results