Filters








5,794 Hits in 4.3 sec

Towards Denial-of-Service-Resilient Key Agreement Protocols [chapter]

Douglas Stebila, Berkant Ustaoglu
2009 Lecture Notes in Computer Science  
Denial of service resilience is an important practical consideration for key agreement protocols in any hostile environment such as the Internet.  ...  There are well-known models that consider the security of key agreement protocols, but denial of service resilience is not considered as part of these models.  ...  The authors are grateful for the helpful advice of Alfred Menezes and Ian Goldberg.  ... 
doi:10.1007/978-3-642-02620-1_27 fatcat:y3g3lnqvnvd43jbg6fecz5snj4

Security analysis for Delay/Disruption Tolerant satellite and sensor networks

N. Bhutta, G. Ansa, E. Johnson, N. Ahmad, M. Alsiyabi, H. Cruickshank
2009 2009 International Workshop on Satellite and Space Communications  
of Service attacks and user anonymity.  ...  This paper presents a DTN security architecture that focuses on the requirements for lightweight key management; lightweight AAA-like architecture for authentication/authorisation; resilience to Denial  ...  ACKNOWLEDGMENTS This work was supported by the EU Information Society Technologies SatNEx II Network of Excellence [14].  ... 
doi:10.1109/iwssc.2009.5286339 fatcat:ctjwpklj6zbzfnldbjmmmewyb4

SNAuth-SPMAODV: Secure Neighbor Authentication Strict Priority Multipath AODV against Denial of Service attack for MANET in Military Scenario

D. DeviAruna, P.Subashini P.Subashini
2012 International Journal of Computer Applications  
Due to this nature of MANET; it is possible that there could be some malicious and selfish nodes that try to compromise the routing protocol functionality and makes MANET vulnerable to Denial of Service  ...  This paper consider military scenarios and evaluate the performance of Securityenhanced-Multipath AODV (Ad hoc On-demand Distance Vector Routing) routing protocol called SNAuth-SPMAODV (Secure Neighbor  ...  REVIEW OF LITERATURE This chapter briefly describes denial of service attack and routing protocols for MANETS.  ... 
doi:10.5120/7333-9047 fatcat:nljo2kr26fhijitymqfgcbksnu

Qualitative Assessment on Effectiveness of Security Approaches towards safeguarding NFC Devices & Services

Anusha R, Veena Devi Shastrimat V
2018 International Journal of Electrical and Computer Engineering (IJECE)  
Thus, there exist research work towards strengthing security system, but there is yet to report on any standard security protocol or framework to ensure the highest resiliency.  ...  This paper provides a comprehensive visualization towards the effectiveness of existing research approaches to formulate the research trend and gap.</span>  ...  Study towards mutual authentication scheme was also carried out by Fan et al. [18] , [19] that implements logical operation of XOR for resisting denial-of-service attacks.  ... 
doi:10.11591/ijece.v8i2.pp1214-1221 fatcat:cdyp7oh2jrewveo4y4atctwnca

Towards Resilience Metrics for Future Cloud Applications

Marko Novak, Syed Noorulhassan Shirazi, Aleksandar Hudic, Thomas Hecht, Markus Tauber, David Hutchison, Silia Maksuti, Ani Bicaku
2016 Proceedings of the 6th International Conference on Cloud Computing and Services Science  
Using a cloud computing use case we identify potential resilience metrics that can shed light on the security properties of the system.  ...  An analysis of new technologies can yield insight into the way these technologies will be used.  ...  ACKNOWLEDGEMENTS The research presented in this paper has been funded by the European Union (FP7 Project SECCRIT, grant agreement no. 312758).  ... 
doi:10.5220/0005910502950301 dblp:conf/closer/NovakSHHTHMB16 fatcat:vbnjp4gqczd2hpxwamartvn3em

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices

Sanaz Kavianpour, Bharanidharan Shanmugam, Sami Azam, Mazdak Zamani, Ganthan Narayana Samy, Friso De Boer
2019 Journal of Computer Networks and Communications  
Internet of Things (IoT) has become one of the most significant technologies in recent years because of possessing the diverse application domains.  ...  The variety of applications results in a large amount of users' private information diffusion that will pose a paramount security concern.  ...  Conflicts of Interest e authors declare that there are no conflicts of interest regarding the publication of this paper.  ... 
doi:10.1155/2019/5747136 fatcat:dps6x5rtlrgznhi5rjuv4dtlji

Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks

Fadi Al-Turjman, Yoney Kirsal Ever, Enver Ever, Huan X. Nguyen, Deebak Bakkiam David
2017 IEEE Access  
INDEX TERMS Secure public safety networks, Internet of Things, cloud systems, session-key agreement, bilinear pairing.  ...  attacks related with data confidentiality, mutual authentication, session-key agreement, user anonymity, password guessing, and key impersonation.  ...  Hence, the proposed S-SAKA framework is resilient to denial of service attack. 11) RESILIENT TO MANY LOGGED-IN USERS WITH THE SAME LOGIN IDENTITY ATTACK In the proposed S-SAKA framework, the user must  ... 
doi:10.1109/access.2017.2766090 fatcat:xhwa35rbtfdqziysn46fjp7r4q

Towards Secure and Dependable Authentication and Authorization Infrastructures

Diego Kreutz, Alysson Bessani, Eduardo Feitosa, Hugo Cunha
2014 2014 IEEE 20th Pacific Rim International Symposium on Dependable Computing  
This architecture employs intrusiontolerant replication, trusted components and untrusted gateways to provide survivable services ensuring compatibility with standard protocols.  ...  We propose a resilience architecture for improving the security and dependability of authentication and authorization infrastructures, in particular the ones based on RADIUS and OpenID.  ...  In this work we tackle the problem of increasing the resilience of AAIs, which represent key services for ensuring the security and reliability of most networked environments.  ... 
doi:10.1109/prdc.2014.14 dblp:conf/prdc/KreutzBFC14 fatcat:j7xmwj2zb5a65fkkqqoycdrday

AN EFFICIENT TWO-SERVER AUTHENTICATION AND KEY EXCHANGE PROTOCOL FOR ACCESSING SECURE CLOUD SERVICES

Durbadal Chattaraj, Monalisa Sarma, Debasis Samanta
2018 Jordanian Journal of Computers and Information Technology  
Towards the solution, a number of single server authenticated key agreement protocols have been reported recently.  ...  To avail cloud services; namely, Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), ...etc. via insecure channel, it is necessary to establish a symmetric key  ...  ACKNOWLEDGEMENTS The authors thank the anonymous reviewers and the Editor-in Chief for their valuable suggestions, which helped us improve significantly the presentation and quality of the paper.  ... 
doi:10.5455/jjcit.71-1513237171 fatcat:jostmwzqa5gmxl32ebkxh2soqy

An Investigation towards Paradigm Shift of Cloud Computing Approach and Need of New Security Protocol

Veena R.S., Ramachandra V., Indiramma M.
2015 International Journal of Computer Applications  
This paper mainly focus on understanding the changing trends of usage of cloud computing platform for various services, fundamental research approaches towards cloud security and finally need of requirements  ...  The facts, concept and statistics illustrated in this paper is of extensive use to the researchers, industries and academicians towards developing new mechanisms and protocol for future secured cloud framework  ...  The most frequently reported an attack over cloud environment is Distributed Denial-of-Services that can potentially disrupt all the three forms of cloud services.  ... 
doi:10.5120/ijca2015907114 fatcat:z7bxshcyhbg5zkt7vb5ur7qkla

An Efficient and Novel Key Establishment Scheme for Internet Enabled Wireless Sensor Network in the Context of IOT

Karthikeyan. M, J.Selvakumar J.Selvakumar, Amal Twinkle Mathew
2015 International Journal of Computer Applications  
Keywords Internet of Things (IoT), Wireless sensor network (WSN), Key establishment , Internet Protocol for Smart Objects.  ...  They are node mobility, authentication process between nodes, resilience, Bit/signal transmission distance, Key connectivity, energy efficiency, bandwidth and Scalability.  ...  Figure 6 illustrates the comparison Denial of Service (DoS) attacks against our solution would consist in unfair playing or malicious proxy trying to disrupt the collaborative key establishment protocol  ... 
doi:10.5120/20057-2038 fatcat:iwapai3f7jgcrhocg5km77oxmi

Distributed Systems Security Knowledge Area [article]

Neeraj Suri
2019 Zenodo  
the distribution of resources without having to deal with the technical mechanisms providing the varied forms of distributed resource and service orchestrations.  ...  ) from the distributed resources to provide (an illusion of) a logically centralised/coordinated resource or service.  ...  denial of service attacks). .  ... 
doi:10.5281/zenodo.3941852 fatcat:ag6uugbkybg65iacezz6yjmemq

A Survey on Various Kinds of Security Attacks Facing in Vehicle to Vehicle and Vehicle to Infrastructure Communication

Jyothi. N, Dr. Rekha Patil, P.D.A College of Engineering ,Kalaburagi,Karnataka,India
2020 International Journal of Engineering Research and  
These vehicles provide communication services among one another or with Road Side Infrastructure (RSU) based on wireless Local Area network (LAN) technologies.  ...  Vehicular Ad-hoc Networks (VANETs) is also known as a subset of Mobile Ad-hoc Networks (MANETs) which refers to a set of smart vehicles used on the road.  ...  The state-of-the-art and show its availability, resiliency, and scalability towards a cost-effective VPKI deployment [9] .  ... 
doi:10.17577/ijertv9is010012 fatcat:rzakjizspfgmlnrlvhkybpfa3e

A Survey of Voice over IP Security Research [chapter]

Angelos D. Keromytis
2009 Lecture Notes in Computer Science  
We present a survey of Voice over IP security research.  ...  We also briefly discuss the implications of our findings with respect to actual vulnerabilities reported in a variety VoIP products.  ...  [33] examine the usability and security of ZRTP, a key agreement protocol based on the Diffie Hellman key exchange, designed for use in VoIP environments that lack pre-established secret keys among  ... 
doi:10.1007/978-3-642-10772-6_1 fatcat:5z7aiao4vjhh7fqx2enkbexu3i

The evolving field of distributed storage

P.N. Yianilos, S. Sobti
2001 IEEE Internet Computing  
Anderson, "The Eternity Service," 12 proposed a storage medium with properties similar to the Internet in order to resist denial-of-service attacks aimed at censorship.  ...  fragments of each data object to a diverse set of servers, (3) a subsystem that runs a Byzantine agreement protocol to serialize and authenticate updates to data objects, and (4) a set of algorithms that  ... 
doi:10.1109/4236.957893 fatcat:4ifi25uhofhu5l7l25rb2mc64u
« Previous Showing results 1 — 15 out of 5,794 results