544 Hits in 4.2 sec

Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps [chapter]

Manuel Barbosa, Pooya Farshim
2009 Lecture Notes in Computer Science  
In the timed CK model we concentrate on modular design and analysis of protocols, and propose a more efficient timed authenticator relying on timestamps.  ...  Finally, we use our timed extension to the BR model to establish the security of an efficient ISO protocol for key transport and unilateral entity authentication.  ...  The second author was also supported in part by the Scientific and Technological Research Council of Turkey (TÜBİTAK) while at Middle East Technical University.  ... 
doi:10.1007/978-3-642-02384-2_15 fatcat:c3hjqggvi5arppe3k3qsgzprde

VTE-AKA: an optimum vector time encoding scheme for synchronising authenticated key agreements in cognitive radio ad hoc networks

Sanjay Kumar Dhurandher, Gaurav Indra
2020 IET Communications  
VTE-AKA is simulated and validated in a cognitive scenario where results validate the adeptness of VTE-AKA in PU's and MU's detection, average network throughput, and overall channel utilisation.  ...  In this study, an optimal vector time encoding technique infused with an optimised authenticated key agreement scheme, termed as VTE-AKA is proposed for logically synchronising localised clocks at authenticated  ...  as the timestamp mechanism in VTE-AKA ensures the welltimed conclusion of authentication and key agreement phase.  ... 
doi:10.1049/iet-com.2019.1010 fatcat:x3sy4beqofgkbiwghfa2wgjvzi

PUF Based Authentication Protocol for IoT

An Braeken
2018 Symmetry  
key generation and key agreement in order to avoid an attacker to take over the identity of a tampered device, whose key material has been extracted.  ...  This paper shows that the key agreement scheme of a recently proposed PUF based protocol, presented by Chatterjee et al., for Internet of Things (IoT) is vulnerable for man-in-the-middle, impersonation  ...  The scheme consists of a PUF based key agreement protocol and a secure communication protocol. The PUF is used to generate the public key of each device in the key agreement protocol.  ... 
doi:10.3390/sym10080352 fatcat:xlwby35vpvbpleflecmnv4mt2a

EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications

Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang
2013 International Journal of Distributed Sensor Networks  
Detailed security analysis has shown that the proposed EG-AKA protocol is secure in terms of user and group identity protection and resistance to several attacks.  ...  In this paper, we propose a group authentication and key agreement protocol, called EG-AKA, for machine-type communications combining elliptic curve Diffie-Hellman (ECDH) based on EAP framework.  ...  Acknowledgments This work is supported by China Scholarship Council and the National Natural Science Foundation of China under Grant no. 61170261.  ... 
doi:10.1155/2013/304601 fatcat:5mfblstutvc2daihowi4wuqrw4

Analysing the Combined Kerberos Timed Authentication Protocol and Frequent Key Renewal Using CSP and Rank Functions

2014 KSII Transactions on Internet and Information Systems  
The analysis and verification of authentication properties and results are presented and discussed.  ...  This paper presents an application of rank functions approach to an authentication protocol that combines delaying the decryption process with timed authentication while keys are dynamically renewed under  ...  [17] proved security properties, such as secrecy of passwords and the keys, and non-injective agreements of network protocols that use public and symmetric key cryptography.  ... 
doi:10.3837/tiis.2014.12.021 fatcat:qw35jl7ov5gghgrfsuivk2tuki

Secure and privacy-aware proxy mobile IPv6 protocol for vehicle-to-grid networks

Mahmoud Hashem Eiza, Qi Shi, Angelos Marnerides, Thomas Owens
2016 2016 IEEE International Conference on Communications (ICC)  
We evaluate the SP-PMIPv6 protocol in terms of its authentication overhead and the information-theoretic uncertainty derived by the mutual information metric to show the high level of achieved anonymity  ...  In this paper, we employ certificate-less public key cryptography in synergy with the restrictive partially blind signature technique to construct a secure and privacy-aware proxy mobile IPv6 (SP-PMIPv6  ...  Security & Privacy Analysis This section provides an analysis of the security and privacy properties of the proposed SP-PMIPv6 protocol in order to determine whether or not it satisfies the security and  ... 
doi:10.1109/icc.2016.7510934 dblp:conf/icc/EizaSMO16 fatcat:e32it6t7dbee5gs6a4574gaq4i

Energy-Efficient Mining on a Quantum-Enabled Blockchain Using Light

Adam J Bennet, Shakib Daryanoosh
2019 Ledger  
To demonstrate the energy efficiency of the mining protocol, we elaborate upon the results of two previous experiments (one performed over 1km of optical fibre) as applied to this work.  ...  The network is hybridised, utilising digital systems for sharing and processing classical information combined with a fibre-optic infrastructure and quantum devices for transmitting and processing quantum  ...  Authentication round-The authentication round utilises a decoy-state variant of the quantum secure authentication (QSA) protocol, [96] [97] [98] allowing for hardware-based authentication of clients.  ... 
doi:10.5195/ledger.2019.143 fatcat:uunelm2n7ngglplmass2peijza

Energy efficient mining on a quantum-enabled blockchain using light [article]

Adam J Bennet, Shakib Daryanoosh
2019 arXiv   pre-print
To demonstrate the energy efficiency of the mining protocol, we elaborate upon the results of two previous experiments (one performed over 1km of optical fibre) as applied to this work.  ...  The network is hybridised, utilising digital systems for sharing and processing classical information combined with a fibre--optic infrastructure and quantum devices for transmitting and processing quantum  ...  Authentication Round-The authentication round utilises a decoy-state variant of the quantum secure authentication (QSA) protocol, 97, 98, 99 allowing for hardware-based authentication of clients.The  ... 
arXiv:1902.09520v2 fatcat:kzkq4jvvd5eyrf5nv6ug47m7be

Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges

Palak Bagga, Ashok Kumar Das, Mohammad Wazid, Joel J. P. C. Rodrigues, Youngho Park
2020 IEEE Access  
A detailed comparative analysis among various state-of-art authentication protocols proposed in the related IoV environment is provided to show their effectiveness as well as security and functionality  ...  Next, a taxonomy of security protocols is given that is essential to provide IoV data security.  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers and the Associate Editor for their valuable feedback on the paper which helped us to improve its quality as well as presentation.  ... 
doi:10.1109/access.2020.2981397 fatcat:mnndbufii5dudeiexbv7gj2jra

SD2PA: a fully safe driving and privacy-preserving authentication scheme for VANETs

Saad Ali Alfadhli, Songfeng Lu, Abdulaziz Fatani, Haider Al-Fedhly, Mahmut Ince
2020 Human-Centric Computing and Information Sciences  
In this paper, we analyse recent VANET schemes that utilise a group authentication technique and found important vulnerabilities in terms of driving safety.  ...  Privacy and security are the main concerns for meeting the safety aims of the VANET system.  ...  Authors' contributions ASS proposed the main conception of the work and designed it. ASS and HA analyzed and discussed the results. AF and MI defined the overall organization of the manuscript.  ... 
doi:10.1186/s13673-020-00241-x fatcat:oyv63cp6a5brxj7dxna7e4ikcu

Formal Modelling and Security Analysis of Bitcoin's Payment Protocol [article]

Paolo Modesti, Siamak F. Shahandashti, Patrick McCorry, Feng Hao
2021 arXiv   pre-print
In this paper, we give the first formal model of the protocol and formalise the refund address security goals for the protocol, namely refund address authentication and secrecy.  ...  The formal model utilises communication channels as abstractions conveying security goals on which the protocol modeller and verifier can rely.  ...  Acknowledgements The second and forth authors were supported by the European Research Council (ERC) Starting Grant (No. 306994).  ... 
arXiv:2103.08436v1 fatcat:ncvwqslocjh3hhrwqg4libc6ya

A Holistic Systems Security Approach Featuring Thin Secure Elements for Resilient IoT Deployments

Soodamani Ramalingam, Hock Gan, Gregory Epiphaniou, Emilio Mistretta
2020 Sensors  
Subsequently, a key agreement based on an asymmetric cryptographic scheme, namely B-SPEKE was used to validate and authenticate the source.  ...  We utilise STRIDE/DREAD approaches to identify vulnerabilities using a thin secure element that is an embedded, tamper proof microprocessor chip that allows the storage and processing of sensitive data  ...  Acknowledgments: Research Assistant, Marcus Lee for development of the security procedures in this work. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s20185252 pmid:32937974 fatcat:6mfmloue75d2fdhbe7c7ihi37e

Survey of security services on group communications

P. Sakarindr, N. Ansari
2010 IET Information Security  
Of all proposals reported, most have focused on addressing the issue of key management to SGC systems.  ...  security services, and describe challenges for any future research works in designing a secure GCS.  ...  [4] secured group communications with a secure service from the proposed robust and contributory key agreement protocol and the virtual synchrony semantics.  ... 
doi:10.1049/iet-ifs.2009.0261 fatcat:gnwkayl35jfi7jwns6a7irtpvm

Securing Health Sensing Using Integrated Circuit Metric

Ruhma Tahir, Hasan Tahir, Klaus McDonald-Maier
2015 Sensors  
The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation.  ...  The generated symmetric key is used to securely communicate the health records and data of the patient.  ...  The ICMetric generation scheme was designed and simulated by Hasan Tahir. He also performed a security analysis of the scheme and its simulation results.  ... 
doi:10.3390/s151026621 pmid:26492250 pmcid:PMC4634399 fatcat:cijbg3a6bvdetj6roowqy5smlu

Identity-based and anonymous key agreement protocol for fog computing resistant in the Canetti–Krawczyk security model

Simone Patonico, An Braeken, Kris Steenhaut
2019 Wireless networks  
In this paper, we propose an identitybased, mutual authenticated key agreement protocol for this fog architecture, in which end device and fog are able to establish a secure communication without leakage  ...  The scheme is very efficient as it only utilises elliptic curve operations and basic symmetric key operations.  ...  Attack analysis We demonstrate that our authenticated key agreement protocol is secure against several attacks which can endanger the privacy of users and the confidentiality of the exchanged data.  ... 
doi:10.1007/s11276-019-02084-6 fatcat:nsd2p6l6rbanpmwa7rwgzdwhp4
« Previous Showing results 1 — 15 out of 544 results