A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
ARQ Security in Wi-Fi and RFID Networks
[article]
2010
arXiv
pre-print
However, each scheme is tailored to best suit the requirements of its respective paradigm. In Wi-Fi networks, we overlay, rather than completely replace, the current Wi-Fi security protocols. ...
Our proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively. ...
Security Analysis 1) Passive Eavesdropping: The security of this protocol in the presence of a passive Eve directly builds on the results provided in [6] , [8] . ...
arXiv:1010.3294v1
fatcat:qtscgy3z4jcatgm7snjjytdzq4
An integrated approach for energy efficient handover and key distribution protocol for secure NC-enabled small cells
2022
Computer Networks
The performance analysis of the protocol during handover scenarios indicates its suitability for ensuring high level of security against pollution attacks in dense small cell environments with multiple ...
Additionally, the mobility requirements in small cell environments are more challenging and demanding in terms of signaling overhead. ...
This analysis done for both the security of the approaches as well as the signaling cost. ...
doi:10.1016/j.comnet.2022.108806
fatcat:b6fqchixk5d2jh72zfumpid5vm
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
2008
2008 Third International Conference on Communications and Networking in China
We functionally compare GSA with the proposed secure multicast overlay approach, showing that the overlay approach provides not only the same level of security, but also a reduced risk of denial of service ...
In sight of this, we propose to adopt a secure multicast overlay approach as a possible short-term solution, thanks to its straightforward deployment. ...
With a MAC algorithm, every group member can use the MAC key to create a valid MAC tag, whether or not they are the authentic originator of the group application's data. ...
doi:10.1109/chinacom.2008.4685257
fatcat:x35zvh5aczglba4m24txawiwpm
User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)
2008
Security and Communication Networks
We functionally compare GSA with the proposed secure multicast overlay approach, showing that the overlay approach provides not only the same level of security, but also a reduced risk of denial of service ...
In sight of this, we propose to adopt a secure multicast overlay approach as a possible short-term solution, thanks to its straightforward deployment. ...
With a MAC algorithm, every group member can use the MAC key to create a valid MAC tag, whether or not they are the authentic originator of the group application's data. ...
doi:10.1002/sec.73
fatcat:6sxwu2w6mbgvpo4naualboeuaq
An application layer architecture for seamless roaming
2009
2009 Sixth International Conference on Wireless On-Demand Network Systems and Services
The paper provides an analysis of these components as well. ...
The research challenges are on mobility management, security, QoE management, overlay routing, node positioning, mobility modeling and prediction, middleware and handover. ...
An important challenge is to reduce the security signaling latency, which originates (up to 90 %, with values of hundreds of ms) from the Extensible Authentication Protocol (EAP) signaling. ...
doi:10.1109/wons.2009.4801840
fatcat:kqowrqxqzrattajmole3ezjaty
Regular and lightweight mobility management in the HIP-based M2M overlay network
2016
International Journal of Autonomous and Adaptive Communications Systems
A SA is a set of security parameters agreed by two hosts in order to encrypt and authenticate transferred data. ...
Our analysis showed that our solution efficiently handles the mobility within our M2M overlay network without causing a signalling storm. ...
doi:10.1504/ijaacs.2016.079628
fatcat:lspng73k4faxjo44myfqw5jmry
We conjecture that the network edge constitutes a major source of DoS, resilience and mobility issues to the network, and propose a new solution to this problem, namely the General Internet Signaling Transport ...
We propose an alternative overlay network architecture by introducing a set of generic functions in network edges and end hosts. ...
In addition, Andreas Pashalidis and Hannes Tschofenig provided helpful feedbacks to the initial version of this paper. ...
doi:10.1145/1378191.1378214
dblp:conf/nossdav/FuC06
fatcat:juremwutzvaedjcz4xqsu7tepy
Design of a smart security registration plate for seagoing motorized non-mechanical crafts
2017
OCEANS 2017 - Aberdeen
RFID belongs to Self-Monitoring Analysis and Reporting Technology (SMART), provides promising opportunities for the implementation of new services in vessel monitoring and secures authentication [4] . ...
Smart Security Registration plate (SSRP) using RFID tag is designed here to provide secure authentication and effective distribution of the government benefits. ...
doi:10.1109/oceanse.2017.8084868
fatcat:kf6r47te4ncbjibwrhjs4z3coi
RFID Product Authentication in EPCglobal Network
[chapter]
2009
Development and Implementation of RFID Technology
In fact, product authentication has stronger requirements on security and needs a more complex system to implement. ...
Recently, RFID was reportedly used in product authentication solutions to achieve a higher degree of automation when checking the authenticity of a product. ...
information; and side channel attack, where an adversary uses timing analysis, power analysis or electro-magnetic analysis (e.g., [24] ) to extract tag information. ...
doi:10.5772/6533
fatcat:iigq3vsyvjgc5flxrsdwugie4q
Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography
2013
IEEE Transactions on Very Large Scale Integration (vlsi) Systems
This article presents the design and implementation of a complete Near-Field Communication (NFC) tag system that supports high-security features. ...
All components have been highly optimized to meet the fierce requirements of passively powered RFID devices while providing a high level of flexibility and security. ...
The security features cover tag authentication and reader authentication based on challenge-response protocols using the commands: INTERNAL AUTHENTICATE, GET CHALLENGE, and EXTERNAL AUTHENTICATE. ...
doi:10.1109/tvlsi.2012.2227849
fatcat:sahsybcl4bdb3iztme5knjhv7a
Secure eHealth-Care Service on Self-Organizing Software Platform
2014
Mathematical Problems in Engineering
This paper proposes a security framework for health information management of the SoSp. The proposed framework was designed to ensure easy detection of identification information for typical users. ...
In addition, it provides powerful protection of the user's health information. ...
Acknowledgment This work was supported by the IT R&D program of MSIP/ KEIT (10041145, Self-Organizing Software platform (SoSp) for Welfare Devices). ...
doi:10.1155/2014/350876
fatcat:s5mkz4lcnjhx3h64lcressztxi
Session-based security enhancement of RFID systems for emerging open-loop applications
2014
Personal and Ubiquitous Computing
In this paper, the security demands of RFID tags in emerging open-loop applications are summarized and two example protocols for authorization, authentication and key establishment based on symmetric cryptography ...
The authorization and authentication of the mobile RFID readers need to take stronger security measures to address the privacy or security issues that may arise in the emerging open-loop applications. ...
Analysis of security demands in emerging open-loop RFID applications In this section, we investigate the existing security measures in the EPC Gen2 and EPC Gen2v2 protocols before analyzing the security ...
doi:10.1007/s00779-014-0788-x
fatcat:w4suux3dmzhqniyqryzmg5vbqi
Using Existing Hardware Services for Malware Detection
2014
2014 IEEE Security and Privacy Workshops
Second, we sketch a defense-in-depth security model that combines such detection with hardwareaided proof-carrying code and input validation. ...
First, we describe our experiments in using hardware-based metrics such as those collected by the BPU and MMU for detection of malware activity at runtime. ...
Sergey Bratus for their help with the preparation of this research paper. ...
doi:10.1109/spw.2014.49
dblp:conf/sp/Kompalli14
fatcat:d4eyeq7zwrhuxjlil62jsnem5u
A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis
2019
Technologies
Then, open hardware and open source tools like: Proxmark3 and Ubertooth as well as BtleJuice and Bleah are used as part of the practical analysis. ...
First, a review of the main vulnerabilities, security risk, and threats affecting both technologies are carried out. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/technologies7010015
fatcat:krm6sbbocnar7c7gb3c7ghnubu
MOTAG: Moving Target Defense against Internet Denial of Service Attacks
2013
2013 22nd International Conference on Computer Communication and Networks (ICCCN)
In this paper, we propose MOTAG, a moving target defense mechanism that secures service access for authenticated clients against flooding DDoS attacks. ...
Distributed Denial of Service (DDoS) attacks still pose a significant threat to critical infrastructure and Internet services alike. ...
To reach the protected service, authenticated ...
doi:10.1109/icccn.2013.6614155
dblp:conf/icccn/JiaSS13
fatcat:2rebj22hivgqlfyedqsmsxvk6i
« Previous
Showing results 1 — 15 out of 2,090 results