Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








3,841 Hits in 4.9 sec

Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs

Adarsh Kumar, Krishna Gopal, Alok Aggarwal
2016 International Journal of Network Security  
In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to  ...  Group or subgroups boundaries are limited through distance bounding protocols. Trust management plays the role of maintaining the relationship between nodes for long endeavor.  ...  Introduction Radio frequency identification (RFID) devices are the low cost computing devices for automatic identification, locating and tracking objects using radio frequency (RF).  ... 
dblp:journals/ijnsec/KumarGA16 fatcat:iqxshqc7lrgyfm5vei2wgubyay

Cryptographic Authentication of Navigation Protocols [article]

Sam Bretheim
2005 arXiv   pre-print
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements.  ...  Further analysis of the security of similar distance-bounding protocols can be found in [5] and [6] .  ...  Hence, receiving a single non-meaconed navaid signal sets an upper bound for undetected meaconing delay; unfortunately, that bound represents a distance error on the order of the distance between navaids  ... 
arXiv:cs/0510022v1 fatcat:dzemly7445e3fen3rx4l7mzjgu

Security Vulnerabilities in RFID Networks

Junaid Ahsenali Chaudhry, Malrey Lee
2013 International journal of advanced smart convergence  
Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security.  ...  As the nature of radio frequency signal, it can go everywhere and everyone can receive this signal, which is an insecure channel.  ...  The Radio Frequency (RF) includes different bands from 30 MHz to 300 MHz.  ... 
doi:10.7236/ijasc2013.2.2.7 fatcat:lsynrr4srvcttpdredyqjkh57i

Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures [article]

Kaveh Bakhsh Kelarestaghi, Mahsa Foruhandeh, Kevin Heaslip, Ryan Gerdes
2019 arXiv   pre-print
These access technologies extend from DSRC, Satellite Radio, and Bluetooth to VLC and 5G.  ...  of this study is of critical importance, because of two main reasons: (1) independent studies on security of VANETs on different strata need to come together and to be covered from a whole end-to-end system  ...  Distance-bounding protocol aims to provide upper bound for a distance between authorized nodes, by timing the delay between transmission and response [71] .  ... 
arXiv:1903.01541v1 fatcat:ntanpbw3z5benhlbzn6vzqm7ne

Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks

Manju Lata, Adarsh Kumar
2014 International Journal of Communication Networks and Information Security  
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications.  ...  This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems.  ...  An RFID Distance Bounding Protocol: First distance bounding protocol for RFID systems was proposed in 2005 by Hancke and Kuhn in 2005 [83]. It is based on ultrawideband pulse communication.  ... 
dblp:journals/ijcnis/LataK14 fatcat:3dpqpm7lnzcbrlhb6uj2nbi7j4

Research on Security Issues of the Internet of Things

Chen Qiang, Guang-ri Quan, Bai Yu, Liu Yang
2013 International Journal of Future Generation Communication and Networking  
And it provides a new approach for researchers in certain IOT application and design, through analyzing and summarizing the security of ITO from various angles.  ...  There are many problems in security of Internet of Things (IOT) crying out for solutions, such as RFID tag security, wireless security, network transmission security, privacy protection, information processing  ...  RFID Tag Information Security RFID radio frequency identification is a non-contact automatic identification technology, through radio frequency signal to automatic identify target recognition and access  ... 
doi:10.14257/ijfgcn.2013.6.6.01 fatcat:zdi35qwvyvb45e3ostlr7lozgm

Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative Analysis

Faheem Zafar, Abid Khan, Adeel Anjum, Carsten Maple, Munam Ali Shah
2020 Electronics  
In this paper, we investigate the state of the art in location proof systems, examining design challenges and implementation considerations for application in the real world.  ...  Applications of location proof systems include safety, asset management and operations monitoring in health care, supply chain tracking, and Internet-of-Things (IoT)-based location intelligence in businesses  ...  Acknowledgments: We would also like to add special thanks to Elixir Technologies Pakistan for all support in accomplishing the research work. Maple would like to acknowledge the support of EPSRC.  ... 
doi:10.3390/electronics9111776 fatcat:4cz2xveimngdrj3a2pdqmpcloe

Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective

Aleksandr Ometov, Sergey Bezzateev, Vadim Davydov, Anna Shchesniak, Pavel Masek, Elena Lohan, Yevgeni Koucheryavy
2019 Sensors  
In particular, said information might be misused or stolen at the infrastructure side conventionally assumed to be trusted.  ...  Today, the Intelligent Transportation Systems (ITS) are already in deep integration phase all over the world.  ...  Distance Determination without Anonymity In 2004, authors proposed a distance-bounding protocol in [86] , we further refer to it as protocol P-04.  ... 
doi:10.3390/s19071603 fatcat:raqvw3ivajh3zjv66gbimkrh4e

A Study of Security Vulnerabilities in Mobile environment

Suk-jin Kim, Hyangran Lee, Malrey Lee
2015 The International Journal of Advanced Culture Technology  
Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security.  ...  As the nature of radio frequency signal, it can go everywhere and everyone can receive this signal, which is an insecure channel.  ...  ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015.  ... 
doi:10.17703/ijact.2015.3.2.149 fatcat:dbf3vgagajf7va4pdxxbkqy4le

Locanyms

Sebastien Gambs, Marc-Olivier Killijian, Matthieu Roy, Moussa Traore
2012 Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience - ARMOR '12  
Recent advances in geolocated capacities, secure and verified positioning techniques, ubiquitous connectivity, as well as mobile and embedded systems, have led to the development of a plethora of Location-Based  ...  Thus, beyond the benefits they provide, users have started to be worried about the privacy breaches caused by such systems.  ...  INTRODUCTION Due to the rapid advances in positioning technologies such as Global Positioning System (GPS), Global System for Mobile Communication (GSM), Radio Frequency IDentification (RFID), and WiFi  ... 
doi:10.1145/2222436.2222437 fatcat:skdomivpxrg75ir4c63kgjdimi

A Survey on Non-transferable Anonymous Credentials [chapter]

Sebastian Pape
2009 IFIP Advances in Information and Communication Technology  
There are at least two principal approaches to prevent users from sharing their anonymous credentials: adding valuable secrets into the system the user does not want to share or embedding biometric access  ...  However, assuming that anonymous credentials will probably not be used in high-security environments, both approaches might be sufficient to prevent sharing in some applications.  ...  Acknowledgement The author is grateful to Lexi Pimenidis for helpful discussions and comments on an earlier version of this work and to the anonymous reviewers for their feedback and suggestions.  ... 
doi:10.1007/978-3-642-03315-5_8 fatcat:5ko6mzvwv5hdxf6ep3c77brdym

Secure positioning in wireless networks

S. Capkun, J.-P. Hubaux
2006 IEEE Journal on Selected Areas in Communications  
In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks.  ...  We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations.  ...  In Section II, we review positioning techniques and analyze attacks against them. In Section III, we describe a technique for radio frequency distance bounding.  ... 
doi:10.1109/jsac.2005.861380 fatcat:owefro7r7jgnxgzfp7hkeygij4

Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries

M. Burmester, B. De Medeiros, R. Motta
2008 International Journal of Applied Cryptography  
In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation between tags and a trusted  ...  In some protocols, tags recover by replaying previously used values, thus compromising unlinkability of their transcripts; other schemes require servers to search through the set of issued keys, incurring  ...  Introduction Radio-Frequency Identification Devices or tags (RFIDs), with their limited computational capabilities and constrained power source, represent the extreme low-end of computational devices that  ... 
doi:10.1504/ijact.2008.021082 fatcat:tyhnrpv6mzhqvhzhze53rgtvuy

Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey

Liang Chen, Sarang Thombre, Kimmo Jarvinen, Elena Simona Lohan, Anette Alen-Savikko, Helena Leppakoski, M. Zahidul H. Bhuiyan, Shakila Bu-Pasha, Giorgia Nunzia Ferrara, Salomon Honkala, Jenna Lindqvist, Laura Ruotsalainen (+2 others)
2017 IEEE Access  
VOLUME 5, 2017 • Intentional and unintentional system failures. These can affect all actors in Fig. 1 . • Intentional and unintentional Radio Frequency interferences (RFI).  ...  These include robustness against system level and service level faults, robustness against unintentional interference due to atmospheric conditions and RF transmissions in other frequency bands, robustness  ...  This is a wide class of positioning systems without GNSS that encompasses everything from cellular signals to Ultra Wide band (UWB), WLAN, BLE, or Radio Frequency Identification (RFID) signals.  ... 
doi:10.1109/access.2017.2695525 fatcat:bekltci7nndmlmgkqzcafip5lu

Towards Provable Security for Ubiquitous Applications [chapter]

Mike Burmester, Tri Van Le, Breno de Medeiros
2006 Lecture Notes in Computer Science  
Mobile ad hoc networks (MANET), sensor networks and radio frequency identification (RFID) systems are all examples of such pervasive systems.  ...  In our approach we shall use optimistic protocols for which the overhead is minimal when the adversary is passive.  ...  In particular, protocols that enable migration of the network to a fault-free state. 2. Secure Radio Frequency Identification (RFID).  ... 
doi:10.1007/11780656_25 fatcat:dcj6wxvgerekbfihi7727jaa5m
« Previous Showing results 1 — 15 out of 3,841 results