1,247 Hits in 5.2 sec

STAMP: Enabling Location Privacy for Mobile Users While Using Public Wi-Fi

Navya Davis
2018 International Journal for Research in Applied Science and Engineering Technology  
In this paper we propose a Spatial Temporal Provenance Assurance with Mutual Proofs (STAMP). It is used for ad-hoc mobile users generating location proofs in distributed settings.  ...  A semi trusted CA is used for cryptographic key distribution as well as guard uses against collusion by a light-entropy based trust model.  ...  In this paper the introduced scheme is Spatial Temporal Provenance Assurance with mutual proofs (STAMP) [1] .  ... 
doi:10.22214/ijraset.2018.3129 fatcat:mxrseac2tvdjhle6gzyd4arj4y

A survey on security and privacy issues in IoV

Tanvi Garg, Navid Kagalwalla, Prathamesh Churi, Ambika Pawar, Sanjay Deshmukh
2020 International Journal of Electrical and Computer Engineering (IJECE)  
Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the  ...  Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving.  ...  -Basic operation for pseudonym management: security messages along with a certificate, and time-stamp that notify the user to change its pseudonym.  ... 
doi:10.11591/ijece.v10i5.pp5409-5419 fatcat:jbtkki2nlbh4vbsrxxsuyganc4

Privacy-Preserving Quick Authentication in Fast Roaming Networks

Jun Liu, Xiaoyan Hong, Qunwei Zheng, Lei Tang
2006 Local Computer Networks (LCN), Proceedings of the IEEE Conference on  
A vehicular network provides a vehicular user not only chances to communicate with peer vehicles but also to use Internet through roadside access points (APs).  ...  They also greatly reduce response time for authentication when roaming. The paper then analyzes the security and privacy properties of these schemes as well as the efficiency of them.  ...  The schemes proposed here, share the same security guarantees as supposed to traditional AAA architecture with strengthened privacy and reduced authentication time.  ... 
doi:10.1109/lcn.2006.322211 dblp:conf/lcn/LiuHZT06 fatcat:dk4brp6ndvdm7ondwt2aeysnre

Improving the Handoff Latency of the Wireless Mesh Networks Standar

Reham Abdellatif Abouhogail
2016 International Journal of Security and Its Applications  
Forgery Attack The proposed protocol uses symmetric encryption two times, the first time, when the HBS sends information to its neighbors, the second time, when the HBS makes the MS's ticket.  ...  Using of the encryption function gives the protocol more security strength, and prevents forgery attack. In this section, we present a formal verification of the proposed scheme using BAN Logic [21].  ...  In this scheme, the MS and BS can complete the mutual authentication without need to communicate with the AS server, thus the handoff latency is improved.  ... 
doi:10.14257/ijsia.2016.10.5.07 fatcat:jd2q637vd5asflckmmpqeen5re

Security and Privacy in Location-Based Services for Vehicular and Mobile Communications: An Overview, Challenges and Countermeasures

Philip Asuquo, Haitham Cruickshank, Jeremy Morley, Chibueze P. Anyigor Ogah, Ao Lei, Waleed Hathal, Shihan Bao, Zhili Sun
2018 IEEE Internet of Things Journal  
Location-based Services (LBS) have gained popularity as a result of the advances in mobile and communication technologies. LBS provide users with relevant information based on their location.  ...  A Spatial-Temporal provenance Assurance with Mutual Proofs (STAMP) scheme is proposed by [136] .  ...  This is done to create time-stamped location proofs.  ... 
doi:10.1109/jiot.2018.2820039 fatcat:y2gdcllac5fbpdd2nnxn4tib2i

Transaction pseudonyms in mobile environments

Oliver Jorns, Oliver Jung, Gerald Quirchmayr
2007 Journal in Computer Virology  
If no privacy protection is foreseen, the user's identity could be used maliciously which renders such applications dangerous.  ...  This fosters the development of a new class of innovative context aware applications that are operated by third party application providers.  ...  Therefore, users store their location information together with a time stamp and an associated pseudonym at a location server.  ... 
doi:10.1007/s11416-007-0049-x fatcat:bpkyn5del5bjvcb3uad6er3ena

The challenge of decentralized marketplaces [article]

Bas van IJzendoorn
2017 arXiv   pre-print
The main challenges are how to set up a good trust system, how to deal with security issues and how to deal with strategic users trying to cheat on the system.  ...  Billions of dollars of products and services are traded through electronic commerce, files are shared among large peer-to-peer networks and smart contracts can potentially replace paper contracts with  ...  In the paper is not a new incentive scheme proposed. This is an example of a Sybil attack where pseudonyms leave the system and later rejoin to renew download speed.  ... 
arXiv:1703.05713v1 fatcat:7wf4mgdixvg6hfvzfv3yvmiaoe

A Secure Mutual Batch Authentication Scheme for Patient Data Privacy Preserving in WBAN

Martin Konan, Wenyong Wang
2019 Sensors  
Therefore, several schemes have been proposed to guarantee data integrity and privacy during their transmission between the client/controller (C) and the AP.  ...  Unfortunately, the related solution presents security shortcomings, where AP can with ease impersonate a given C. Hence, this existing scheme cannot fully guarantee C's data privacy and integrity.  ...  stamp.  ... 
doi:10.3390/s19071608 fatcat:7ni3dbgxdvcs3p42ugsnzmdlzy

Anonymous Mobility Management for Third Generation Mobile Networks [chapter]

S. Hoff, K. Jakobs, D. Kesdogan
1996 IFIP Advances in Information and Communication Technology  
With the increasing use of mobile and nomadic communication devices requirements for security and privacy are rising as well.  ...  Following brief surveys of existing approaches to mobility management, general security considerations for UMTS and confidential storing of location information we introduce the ideas and concepts behind the new  ...  In addition, the specific communication profiles of subscribers as well as the applications and services they use (e.g. speech, fax, X.400, etc.) require new management schemes, see (Spaniol et al., 1995  ... 
doi:10.1007/978-0-387-35083-7_7 fatcat:z3aeeylxvrelxbnnbvsgcoyqja

Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System

Zhichao Zhu, Guohong Cao
2013 IEEE Transactions on Mobile Computing  
Periodically changed pseudonyms are used by the mobile devices to protect source location privacy from each other, and from the untrusted location proof server.  ...  APPLAUS can be implemented with existing network infrastructure, and can be easily deployed in Bluetooth enabled mobile devices with little computation or power cost.  ...  We compare our APPLAUS scheme with a baseline scheme. In the baseline scheme, each node does not change pseudonyms based on Poisson distribution.  ... 
doi:10.1109/tmc.2011.237 fatcat:stugrgfzezbpfp7qobytk32kam

Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems

Richard Au, Peter Croll
2008 Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008)  
Utilizing a consumer-centric approach, the healthcare consumer maintains a pool of pseudonymous identifiers for use in different healthcare services.  ...  A new framework of privacy-preserving identity management for distributed e-Health systems is proposed.  ...  Alternatively, time-stamps can be also used (instead of a nonce). Hence, the improved protocol is secure against replay and substitution attacks.  ... 
doi:10.1109/hicss.2008.101 dblp:conf/hicss/AuC08 fatcat:woi4m7b23fdkpe6st4gqgaggni

Efficient Privacy-Preserving and Secure Authentication for Electric-Vehicle-to-Electric-Vehicle-Charging System Based on ECQV

Abdullah M. Almuhaideb, Sammar S. Algothami
2022 Journal of Sensor and Actuator Networks  
The proposed scheme utilizes the ECQV implicit-certificate mechanism to create credentials and authenticate EVs.  ...  Several V2V-charging systems with security and privacy features have been proposed.  ...  Acknowledgments: We would like to thank Imam Abdulrahman Bin Faisal University for facilitating access to the resources used in this paper.  ... 
doi:10.3390/jsan11020028 fatcat:a62hmgdkpjhsfmiaabqtqat6t4

Security and Privacy Issues in Wireless Mesh Networks: A Survey [article]

Jaydip Sen
2013 arXiv   pre-print
Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication  ...  Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol  ...  Self-generation of pseudonyms by clients incurs very low overhead and hence, the clients can use it frequently to regenerate their pseudonyms.  ... 
arXiv:1302.0939v1 fatcat:4bxooy2dubeopa3qbcyg5yvi3y

Anonymous Authentication Protocols for IoT Based Healthcare: A Survey

Mahmoud Rajallah Asassfeh, Nadim Obeid, Wesam Almobaideen
2020 International Journal of Communication Networks and Information Security  
Moreover, 80%of authentication schemes use certificateless authentication. This type of authentication has low computation cost and saves energy which is convenient to the constrained devices.  ...  used such as WSN and RFID.  ...  Li et al [19] Time stamp Certificateless Informal security analysis Mobile + __ authentication Stationary Challa et al [20] Time stamp Authentication with Real Or Random model Mobile __ certificate (ROR  ... 
dblp:journals/ijcnis/AsassfehOA20 fatcat:nmcpjm67ebftdlw4txv2ksftse

Vehicular Internet: Security & Privacy Challenges and Opportunities

Kamran Zaidi, Muttukrishnan Rajarajan
2015 Future Internet  
Vehicles use DSRC radios to communicate with each other, i.e., vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. The communication range of DSRC is between 300 and 1000 m.  ...  The advantages of using cloud are huge as the opportunities for applications are virtually limitless. The communication environment with both LTE and DSRC is shown in Figure 1 .  ...  ., transport authority) is tasked with issuing new blocks of pseudonyms/certificates to the vehicles, to be used while communicating with the Road Side Units (RSUs).  ... 
doi:10.3390/fi7030257 fatcat:6jx6vgzldjb7zbctsr43jfiiuq
« Previous Showing results 1 — 15 out of 1,247 results