Filters








53 Hits in 8.0 sec

On the Implementation Aspects of Sponge-Based Authenticated Encryption for Pervasive Devices [chapter]

Tolga Yalçın, Elif Bilge Kavun
2013 Lecture Notes in Computer Science  
New ideas such as permutation-based authenticated encryption have to be explored. This scheme has been made possible by the introduction of sponge functions.  ...  In this study, we make such an attempt by implementing the new SpongeWrap authenticated encryption schemes on all existing sponge functions and show that it is possible to realize a low-latency scheme  ...  Conclusion In this study, we have implemented the newly proposed sponge-based DonkeySponge and MonkeyDuplex authenticated encryption schemes for all known sponge functions in the literature.  ... 
doi:10.1007/978-3-642-37288-9_10 fatcat:brm5dzavmzgepgqnd4o3yfu6oi

Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

Manju Lata, Adarsh Kumar
2014 International Journal of Communication Networks and Information Security  
This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems.  ...  There is a strong need to employ lightweight cryptographic primitives for many security applications because of the tight cost and constrained resource requirement of sensor based networks.  ...  It is based on universal re-encryption scheme. In this protocol re-encryption does not require the knowledge of the key initially used for encryption.  ... 
dblp:journals/ijcnis/LataK14 fatcat:3dpqpm7lnzcbrlhb6uj2nbi7j4

Lightweight Cryptography for Embedded Systems – A Comparative Analysis [chapter]

Charalampos Manifavas, George Hatzivasilis, Konstantinos Fysarakis, Konstantinos Rantos
2014 Lecture Notes in Computer Science  
In the context of embedded systems, however, the problem at hand is exacerbated by the resource-constrained nature of the devices, in conjunction with the persistent need for smaller size and lower production  ...  This paper provides a comparative analysis of lightweight cryptographic algorithms applicable to such devices, presenting recent advances in the field for symmetric and asymmetric algorithms as well as  ...  It is based on a sponge construction instantiated with a PRESENT-type permutation, following the hermetic sponge strategy.  ... 
doi:10.1007/978-3-642-54568-9_21 fatcat:parncxw2ynhfzpxnx22iwo52ga

IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space

Musa G. Samaila, Joao B. F. Sequeiros, Tiago Simoes, Mario M. Freire, Pedro R. M. Inacio
2020 IEEE Access  
While this can be seen as a boost for innovation in the IoT, some of these companies produce IoT devices and smart apps with security vulnerabilities.  ...  Algorithms Recommendation (LWCAR) component, each of them servicing one of the aforementioned features.  ...  ACKNOWLEDGMENT The authors wish to thank the Centre for Geodesy and Geodynamics, National Space Research and Development Agency, Toro, Bauchi State, Nigeria for supporting this work.  ... 
doi:10.1109/access.2020.2965925 fatcat:ihp7nmfrizeutdtsfyiw4r2hku

Symmetric Cryptography (Dagstuhl Seminar 18021)

Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg, Michael Wagner
2018 Dagstuhl Reports  
This report documents the program and the outcomes of Dagstuhl Seminar 18021 "Symmetric  ...  I wish to thank Eli Biham for discussions related to conditional linear cryptanalysis and Céline Blondeau for suggestions how to improve the presentation.  ...  We first discussed some inherent limitations and restrictions before showing a first attempt how the framework could be instantiated. Instantiating the Whitened Swap-Or-Not Construction  ... 
doi:10.4230/dagrep.8.1.1 dblp:journals/dagstuhl-reports/DaemenILN18 fatcat:qffcmfhvu5bappymycvy5pbxvy

Privacy in Internet of Things: from Principles to Technologies

Chao Li, Balaji Palanisamy
2018 IEEE Internet of Things Journal  
In this paper, we review the state-of-the-art principles of privacy laws, the architectures for IoT and the representative privacy enhancing technologies (PETs).  ...  Ubiquitous deployment of low-cost smart devices and widespread use of high-speed wireless networks have led to the rapid development of the Internet of Things (IoT).  ...  The lightweight hash functions are designed based on either the Merkle-Damgård or P-Sponge and T-Sponge.  ... 
doi:10.1109/jiot.2018.2864168 fatcat:ylasv2g72bghfnzu3do4wiksxq

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms

Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin
2020 IACR Transactions on Symmetric Cryptology  
In this article, we propose two new families of very lightweight and efficient authenticated encryption with associated data (AEAD) modes, Romulus and Remus, that provide security beyond the birthday bound  ...  Actually, our comparisons show that both our designs present superior performances when compared to all other recent lightweight AEAD modes, being BC-based, TBC-based or sponge-based, in the nonce-respecting  ...  Acknowledgments The authors would like to thank the anonymous referees and Christoph Dobraunig for their helpful comments and suggestions.  ... 
doi:10.13154/tosc.v2020.i1.43-120 dblp:journals/tosc/IwataKMP20 fatcat:6awk43sy55av7fnczsrf3fynqa

Quantum-Resistant Security for Software Updates on Low-power Networked Embedded Devices [article]

Gustavo Banegas
2021 arXiv   pre-print
Taking the open-source implementation of SUIT available in RIOT as a case study, we overview post-quantum considerations, and quantum-resistant digital signatures in particular, focusing on lowpower, microcontroller-based  ...  We interpret our benchmark results in the context of SUIT, and estimate the real-world impact of post-quantum alternatives for a range of typical software update categories.  ...  ACKNOWLEDGMENTS H2020 SPARTA and the RIOT-fp project partly funded this work.  ... 
arXiv:2106.05577v2 fatcat:pcg64enerzgqhe3qw6ime2vksi

The Security of IP-Based Video Surveillance Systems

Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici
2020 Sensors  
Over the last decade, video surveillance systems have become a part of the Internet of Things (IoT).  ...  These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one's own home.  ...  Regardless, IP-based video surveillance systems have become affordable due to the popular and pervasive Internet of Things (IoT).  ... 
doi:10.3390/s20174806 pmid:32858840 fatcat:3fp4iwcbojcszft4iqtkjmmvhq

Wearable Sensors for Healthcare: Fabrication to Application

Subhas Chandra Mukhopadhyay, Nagender Kumar Suryadevara, Anindya Nag
2022 Sensors  
It also highlights sensing products that are currently available on the market for a comparative study of their performances.  ...  This paper presents a substantial review of the deployment of wearable sensors for healthcare applications.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22145137 pmid:35890817 pmcid:PMC9323732 fatcat:jcod74edtzhuhft55skxbn7kpu

Kickstarting Reconnection: An Approach to Legal Problems Arising from Emerging Technologies

Kayleen Manwaring
2018 Deakin Law Review  
A new model, or 'third wave', of computing is emerging, based on the widespread use of processors with data handling and communications capabilities embedded in a variety of objects and environments that  ...  Early and rigorous identification and categorisation of legal problems is crucial for emerging technologies, to assist in avoiding two problems: the first being the stifling of beneficial innovation by  ...  IT manufacturers); the small size of some devices may not support the processing power needed for strong security measures such as encryption; and most of the devices are not designed to accommodate software  ... 
doi:10.21153/dlr2017vol22no1art722 fatcat:os6olg37czddpghksb4npr3l4u

Ambient Intelligence and the Right to Privacy: The Challenge of Detection Technologies

Shara Monteleone
2011 Social Science Research Network  
The objective of this study is to envisage some of the main legal challenges posed by the new Ambient Intelligence technologies (AmI) and in particular by the new security enforcement technologies for  ...  If, on the one hand, the new developments promise to make people's lives more comfortable or more secure, on the other hand, complex social and legal issues arise, in terms of fundamental rights and freedoms  ...  Unobtrusive multimodal biometrics for ensuring privacy and information security with personal devices, in Pervasive Computing, Proceedings of the 4th International Conference, PERVASIVE 2006 , Dublin,  ... 
doi:10.2139/ssrn.1953939 fatcat:pz4egipn35a2piwbynhlci4bsq

Anywhere at Anytime Internet: Google Loon Balloons

Sheba Jiju George, K. R. Remesh Babu
2015 Journal of Network and Information Security  
Google implemented Loon project in New Zealand in June 2013 as a pilot experiment and now improvements are being made in Loon technology based on the pilot test results.  ...  Loon Balloons, the network of balloons which provides Internet for people in rural and remote area, is a recent project undertaken by Google.  ...  They generously granted me the freedom to work on the topic of my choice while inspiring me by their example of academic work that matters in-and outside of academia.  ... 
doi:10.21863/jnis/2015.3.1.004 fatcat:mnuojdd4dra7rhweawn45u6bwa

Decrypting the city: The global process of urbanisation as the core of capitalism, coloniality and the destruction of democratic politics of our times [chapter]

Ricardo Sanín-Restrepo, Instituto Tecnológico Autónomo de México
2021 Cities, space and power  
The book serves as a declaration of authenticity.  ...  Based on substantiation and references to numerous other sources and authors, alternative theoretical frameworks for the study of the built environment are developed.  ...  The delimitation of the urban we propose is then based on the encryption of power.  ... 
doi:10.4102/aosis.2020.bk159.01 fatcat:atmog56n3vapfgjdszlqx7zuja

Conclusion [chapter]

Amira Osman, Tshwane University of Technology
2021 Cities, space and power  
The delimitation of the urban we propose is then based on the encryption of power.  ...  The modern suburb is a monumental sponge built to absorb surplus value and to create every condition for exploitation and encryption of power.  ...  This approach implies also a radical criticism of the professional and educational structures that reproduce practices and knowledge based on ethnic and social inequality, while appearing open to innovation  ... 
doi:10.4102/aosis.2020.bk159.05 fatcat:djnywqjwxzdfpiboqk6g7soybu
« Previous Showing results 1 — 15 out of 53 results