Filters








2,090 Hits in 3.3 sec

ARQ Security in Wi-Fi and RFID Networks [article]

Mohamed Elsabagh, Yara Abdallah, Moustafa Youssef, Hesham El Gamal
2010 arXiv   pre-print
However, each scheme is tailored to best suit the requirements of its respective paradigm. In Wi-Fi networks, we overlay, rather than completely replace, the current Wi-Fi security protocols.  ...  Our proposed schemes enhance the confidentiality and authenticity functions of these networks, respectively.  ...  Security Analysis 1) Passive Eavesdropping: The security of this protocol in the presence of a passive Eve directly builds on the results provided in [6] , [8] .  ... 
arXiv:1010.3294v1 fatcat:qtscgy3z4jcatgm7snjjytdzq4

An integrated approach for energy efficient handover and key distribution protocol for secure NC-enabled small cells

Vipindev Adat Vasudevan, Muhammad Tayyab, George P. Koudouridis, Xavier Gelabert, Ilias Politis
2022 Computer Networks  
The performance analysis of the protocol during handover scenarios indicates its suitability for ensuring high level of security against pollution attacks in dense small cell environments with multiple  ...  Additionally, the mobility requirements in small cell environments are more challenging and demanding in terms of signaling overhead.  ...  This analysis done for both the security of the approaches as well as the signaling cost.  ... 
doi:10.1016/j.comnet.2022.108806 fatcat:b6fqchixk5d2jh72zfumpid5vm

User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)

Simone Teofili, Michele Di Mascolo, Giuseppe Bianchi, Stefano Salsano, Alf Zugenmaier
2008 2008 Third International Conference on Communications and Networking in China  
We functionally compare GSA with the proposed secure multicast overlay approach, showing that the overlay approach provides not only the same level of security, but also a reduced risk of denial of service  ...  In sight of this, we propose to adopt a secure multicast overlay approach as a possible short-term solution, thanks to its straightforward deployment.  ...  With a MAC algorithm, every group member can use the MAC key to create a valid MAC tag, whether or not they are the authentic originator of the group application's data.  ... 
doi:10.1109/chinacom.2008.4685257 fatcat:x35zvh5aczglba4m24txawiwpm

User plane security alternatives in the 3G evolved Multimedia Broadcast Multicast Service (e-MBMS)

Simone Teofili, Michele Di Mascolo, Cristina Basile, Giuseppe Bianchi, Stefano Salsano, Alf Zugenmaier
2008 Security and Communication Networks  
We functionally compare GSA with the proposed secure multicast overlay approach, showing that the overlay approach provides not only the same level of security, but also a reduced risk of denial of service  ...  In sight of this, we propose to adopt a secure multicast overlay approach as a possible short-term solution, thanks to its straightforward deployment.  ...  With a MAC algorithm, every group member can use the MAC key to create a valid MAC tag, whether or not they are the authentic originator of the group application's data.  ... 
doi:10.1002/sec.73 fatcat:6sxwu2w6mbgvpo4naualboeuaq

An application layer architecture for seamless roaming

Adrian Popescu, Dragos Ilie, David Erman, Markus Fiedler, Alexandru Popescu, Karel de Vogeleer
2009 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services  
The paper provides an analysis of these components as well.  ...  The research challenges are on mobility management, security, QoE management, overlay routing, node positioning, mobility modeling and prediction, middleware and handover.  ...  An important challenge is to reduce the security signaling latency, which originates (up to 90 %, with values of hundreds of ms) from the Extensible Authentication Protocol (EAP) signaling.  ... 
doi:10.1109/wons.2009.4801840 fatcat:kqowrqxqzrattajmole3ezjaty

Regular and lightweight mobility management in the HIP-based M2M overlay network

Amine Dhraief, Abdelfettah Belghith, Khalil Drira
2016 International Journal of Autonomous and Adaptive Communications Systems  
A SA is a set of security parameters agreed by two hosts in order to encrypt and authenticate transferred data.  ...  Our analysis showed that our solution efficiently handles the mobility within our M2M overlay network without causing a signalling storm.  ... 
doi:10.1504/ijaacs.2016.079628 fatcat:lspng73k4faxjo44myfqw5jmry

GONE

Xiaoming Fu, Jon Crowcroft
2006 Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video - NOSSDAV '06  
We conjecture that the network edge constitutes a major source of DoS, resilience and mobility issues to the network, and propose a new solution to this problem, namely the General Internet Signaling Transport  ...  We propose an alternative overlay network architecture by introducing a set of generic functions in network edges and end hosts.  ...  In addition, Andreas Pashalidis and Hannes Tschofenig provided helpful feedbacks to the initial version of this paper.  ... 
doi:10.1145/1378191.1378214 dblp:conf/nossdav/FuC06 fatcat:juremwutzvaedjcz4xqsu7tepy

Design of a smart security registration plate for seagoing motorized non-mechanical crafts

Sajan Amabdiyil, Soumya Jose, V. P. Mahadevan Pillai, Radhakrishna Prabhu
2017 OCEANS 2017 - Aberdeen  
RFID belongs to Self-Monitoring Analysis and Reporting Technology (SMART), provides promising opportunities for the implementation of new services in vessel monitoring and secures authentication [4] .  ...  Smart Security Registration plate (SSRP) using RFID tag is designed here to provide secure authentication and effective distribution of the government benefits.  ... 
doi:10.1109/oceanse.2017.8084868 fatcat:kf6r47te4ncbjibwrhjs4z3coi

RFID Product Authentication in EPCglobal Network [chapter]

Tieyan Li, Wei He
2009 Development and Implementation of RFID Technology  
In fact, product authentication has stronger requirements on security and needs a more complex system to implement.  ...  Recently, RFID was reportedly used in product authentication solutions to achieve a higher degree of automation when checking the authenticity of a product.  ...  information; and side channel attack, where an adversary uses timing analysis, power analysis or electro-magnetic analysis (e.g., [24] ) to extract tag information.  ... 
doi:10.5772/6533 fatcat:iigq3vsyvjgc5flxrsdwugie4q

Security-Enabled Near-Field Communication Tag With Flexible Architecture Supporting Asymmetric Cryptography

Thomas Plos, Michael Hutter, Martin Feldhofer, Maksimiljan Stiglic, Francesco Cavaliere
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
This article presents the design and implementation of a complete Near-Field Communication (NFC) tag system that supports high-security features.  ...  All components have been highly optimized to meet the fierce requirements of passively powered RFID devices while providing a high level of flexibility and security.  ...  The security features cover tag authentication and reader authentication based on challenge-response protocols using the commands: INTERNAL AUTHENTICATE, GET CHALLENGE, and EXTERNAL AUTHENTICATE.  ... 
doi:10.1109/tvlsi.2012.2227849 fatcat:sahsybcl4bdb3iztme5knjhv7a

Secure eHealth-Care Service on Self-Organizing Software Platform

Im Y. Jung, Gil-Jin Jang, Soon-Ju Kang
2014 Mathematical Problems in Engineering  
This paper proposes a security framework for health information management of the SoSp. The proposed framework was designed to ensure easy detection of identification information for typical users.  ...  In addition, it provides powerful protection of the user's health information.  ...  Acknowledgment This work was supported by the IT R&D program of MSIP/ KEIT (10041145, Self-Organizing Software platform (SoSp) for Welfare Devices).  ... 
doi:10.1155/2014/350876 fatcat:s5mkz4lcnjhx3h64lcressztxi

Session-based security enhancement of RFID systems for emerging open-loop applications

Junyu Wang, Christian Floerkemeier, Sanjay E. Sarma
2014 Personal and Ubiquitous Computing  
In this paper, the security demands of RFID tags in emerging open-loop applications are summarized and two example protocols for authorization, authentication and key establishment based on symmetric cryptography  ...  The authorization and authentication of the mobile RFID readers need to take stronger security measures to address the privacy or security issues that may arise in the emerging open-loop applications.  ...  Analysis of security demands in emerging open-loop RFID applications In this section, we investigate the existing security measures in the EPC Gen2 and EPC Gen2v2 protocols before analyzing the security  ... 
doi:10.1007/s00779-014-0788-x fatcat:w4suux3dmzhqniyqryzmg5vbqi

Using Existing Hardware Services for Malware Detection

Sarat Kompalli
2014 2014 IEEE Security and Privacy Workshops  
Second, we sketch a defense-in-depth security model that combines such detection with hardwareaided proof-carrying code and input validation.  ...  First, we describe our experiments in using hardware-based metrics such as those collected by the BPU and MMU for detection of malware activity at runtime.  ...  Sergey Bratus for their help with the preparation of this research paper.  ... 
doi:10.1109/spw.2014.49 dblp:conf/sp/Kompalli14 fatcat:d4eyeq7zwrhuxjlil62jsnem5u

A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis

Santiago Figueroa Lorenzo, Javier Añorga Benito, Pablo García Cardarelli, Jon Alberdi Garaia, Saioa Arrizabalaga Juaristi
2019 Technologies  
Then, open hardware and open source tools like: Proxmark3 and Ubertooth as well as BtleJuice and Bleah are used as part of the practical analysis.  ...  First, a review of the main vulnerabilities, security risk, and threats affecting both technologies are carried out.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/technologies7010015 fatcat:krm6sbbocnar7c7gb3c7ghnubu

MOTAG: Moving Target Defense against Internet Denial of Service Attacks

Quan Jia, Kun Sun, Angelos Stavrou
2013 2013 22nd International Conference on Computer Communication and Networks (ICCCN)  
In this paper, we propose MOTAG, a moving target defense mechanism that secures service access for authenticated clients against flooding DDoS attacks.  ...  Distributed Denial of Service (DDoS) attacks still pose a significant threat to critical infrastructure and Internet services alike.  ...  To reach the protected service, authenticated  ... 
doi:10.1109/icccn.2013.6614155 dblp:conf/icccn/JiaSS13 fatcat:2rebj22hivgqlfyedqsmsxvk6i
« Previous Showing results 1 — 15 out of 2,090 results