A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Design and Analysis of Lightweight Trust Mechanism for Secret Data using Lightweight Cryptographic Primitives in MANETs
2016
International Journal of Network Security
In postquantum cryptosystems, error correcting codes (ECC) help in code based cryptography for lightweight identification, authentication, distance bounding and tag with ownership transfer protocols to ...
Group or subgroups boundaries are limited through distance bounding protocols. Trust management plays the role of maintaining the relationship between nodes for long endeavor. ...
Introduction Radio frequency identification (RFID) devices are the low cost computing devices for automatic identification, locating and tracking objects using radio frequency (RF). ...
dblp:journals/ijnsec/KumarGA16
fatcat:iqxshqc7lrgyfm5vei2wgubyay
Cryptographic Authentication of Navigation Protocols
[article]
2005
arXiv
pre-print
We examine the security of existing radio navigation protocols and attempt to define secure, scalable replacements. ...
Further analysis of the security of similar distance-bounding protocols can be found in [5] and [6] . ...
Hence, receiving a single non-meaconed navaid signal sets an upper bound for undetected meaconing delay; unfortunately, that bound represents a distance error on the order of the distance between navaids ...
arXiv:cs/0510022v1
fatcat:dzemly7445e3fen3rx4l7mzjgu
Security Vulnerabilities in RFID Networks
2013
International journal of advanced smart convergence
Nowaday's application, that is focused more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that became important for security. ...
As the nature of radio frequency signal, it can go everywhere and everyone can receive this signal, which is an insecure channel. ...
The Radio Frequency (RF) includes different bands from 30 MHz to 300 MHz. ...
doi:10.7236/ijasc2013.2.2.7
fatcat:lsynrr4srvcttpdredyqjkh57i
Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures
[article]
2019
arXiv
pre-print
These access technologies extend from DSRC, Satellite Radio, and Bluetooth to VLC and 5G. ...
of this study is of critical importance, because of two main reasons: (1) independent studies on security of VANETs on different strata need to come together and to be covered from a whole end-to-end system ...
Distance-bounding protocol aims to provide upper bound for a distance between authorized nodes, by timing the delay between transmission and response [71] . ...
arXiv:1903.01541v1
fatcat:ntanpbw3z5benhlbzn6vzqm7ne
Survey on Lightweight Primitives and Protocols for RFID in Wireless Sensor Networks
2014
International Journal of Communication Networks and Information Security
The use of radio frequency identification (RFID) technologies is becoming widespread in all kind of wireless network-based applications. ...
This paper mainly focuses on the security analysis of lightweight protocols and algorithms proposed for the security of RFID systems. ...
An RFID Distance Bounding Protocol: First distance bounding protocol for RFID systems was proposed in 2005 by Hancke and Kuhn in 2005 [83]. It is based on ultrawideband pulse communication. ...
dblp:journals/ijcnis/LataK14
fatcat:3dpqpm7lnzcbrlhb6uj2nbi7j4
Research on Security Issues of the Internet of Things
2013
International Journal of Future Generation Communication and Networking
And it provides a new approach for researchers in certain IOT application and design, through analyzing and summarizing the security of ITO from various angles. ...
There are many problems in security of Internet of Things (IOT) crying out for solutions, such as RFID tag security, wireless security, network transmission security, privacy protection, information processing ...
RFID Tag Information Security RFID radio frequency identification is a non-contact automatic identification technology, through radio frequency signal to automatic identify target recognition and access ...
doi:10.14257/ijfgcn.2013.6.6.01
fatcat:zdi35qwvyvb45e3ostlr7lozgm
Location Proof Systems for Smart Internet of Things: Requirements, Taxonomy, and Comparative Analysis
2020
Electronics
In this paper, we investigate the state of the art in location proof systems, examining design challenges and implementation considerations for application in the real world. ...
Applications of location proof systems include safety, asset management and operations monitoring in health care, supply chain tracking, and Internet-of-Things (IoT)-based location intelligence in businesses ...
Acknowledgments: We would also like to add special thanks to Elixir Technologies Pakistan for all support in accomplishing the research work. Maple would like to acknowledge the support of EPSRC. ...
doi:10.3390/electronics9111776
fatcat:4cz2xveimngdrj3a2pdqmpcloe
Positioning Information Privacy in Intelligent Transportation Systems: An Overview and Future Perspective
2019
Sensors
In particular, said information might be misused or stolen at the infrastructure side conventionally assumed to be trusted. ...
Today, the Intelligent Transportation Systems (ITS) are already in deep integration phase all over the world. ...
Distance Determination without Anonymity In 2004, authors proposed a distance-bounding protocol in [86] , we further refer to it as protocol P-04. ...
doi:10.3390/s19071603
fatcat:raqvw3ivajh3zjv66gbimkrh4e
A Study of Security Vulnerabilities in Mobile environment
2015
The International Journal of Advanced Culture Technology
Now day's application had focus more on the security and Radio Frequency Identification (RFID) had become one of the major technologies that become important for security. ...
As the nature of radio frequency signal, it can go everywhere and everyone can receive this signal, which is an insecure channel. ...
ACKNOWLEDGEMENTS This work (Grants No: 1401001175) was supported by Business for Academic-industrial Cooperative establishments funded Korea Small and Medium Business Administration in 2015. ...
doi:10.17703/ijact.2015.3.2.149
fatcat:dbf3vgagajf7va4pdxxbkqy4le
Locanyms
2012
Proceedings of the 1st European Workshop on AppRoaches to MObiquiTous Resilience - ARMOR '12
Recent advances in geolocated capacities, secure and verified positioning techniques, ubiquitous connectivity, as well as mobile and embedded systems, have led to the development of a plethora of Location-Based ...
Thus, beyond the benefits they provide, users have started to be worried about the privacy breaches caused by such systems. ...
INTRODUCTION Due to the rapid advances in positioning technologies such as Global Positioning System (GPS), Global System for Mobile Communication (GSM), Radio Frequency IDentification (RFID), and WiFi ...
doi:10.1145/2222436.2222437
fatcat:skdomivpxrg75ir4c63kgjdimi
A Survey on Non-transferable Anonymous Credentials
[chapter]
2009
IFIP Advances in Information and Communication Technology
There are at least two principal approaches to prevent users from sharing their anonymous credentials: adding valuable secrets into the system the user does not want to share or embedding biometric access ...
However, assuming that anonymous credentials will probably not be used in high-security environments, both approaches might be sufficient to prevent sharing in some applications. ...
Acknowledgement The author is grateful to Lexi Pimenidis for helpful discussions and comments on an earlier version of this work and to the anonymous reviewers for their feedback and suggestions. ...
doi:10.1007/978-3-642-03315-5_8
fatcat:5ko6mzvwv5hdxf6ep3c77brdym
Secure positioning in wireless networks
2006
IEEE Journal on Selected Areas in Communications
In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. ...
We then show how this mechanism can be used to secure positioning in sensor networks. We analyze our system through simulations. ...
In Section II, we review positioning techniques and analyze attacks against them. In Section III, we describe a technique for radio frequency distance bounding. ...
doi:10.1109/jsac.2005.861380
fatcat:owefro7r7jgnxgzfp7hkeygij4
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries
2008
International Journal of Applied Cryptography
In the absence of sufficiently optimised public key constructions, anonymous authentication for Radio-Frequency Identification Devices (RFIDs) requires state synchronisation between tags and a trusted ...
In some protocols, tags recover by replaying previously used values, thus compromising unlinkability of their transcripts; other schemes require servers to search through the set of issued keys, incurring ...
Introduction Radio-Frequency Identification Devices or tags (RFIDs), with their limited computational capabilities and constrained power source, represent the extreme low-end of computational devices that ...
doi:10.1504/ijact.2008.021082
fatcat:tyhnrpv6mzhqvhzhze53rgtvuy
Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey
2017
IEEE Access
VOLUME 5, 2017 • Intentional and unintentional system failures. These can affect all actors in Fig. 1 . • Intentional and unintentional Radio Frequency interferences (RFI). ...
These include robustness against system level and service level faults, robustness against unintentional interference due to atmospheric conditions and RF transmissions in other frequency bands, robustness ...
This is a wide class of positioning systems without GNSS that encompasses everything from cellular signals to Ultra Wide band (UWB), WLAN, BLE, or Radio Frequency Identification (RFID) signals. ...
doi:10.1109/access.2017.2695525
fatcat:bekltci7nndmlmgkqzcafip5lu
Towards Provable Security for Ubiquitous Applications
[chapter]
2006
Lecture Notes in Computer Science
Mobile ad hoc networks (MANET), sensor networks and radio frequency identification (RFID) systems are all examples of such pervasive systems. ...
In our approach we shall use optimistic protocols for which the overhead is minimal when the adversary is passive. ...
In particular, protocols that enable migration of the network to a fault-free state. 2. Secure Radio Frequency Identification (RFID). ...
doi:10.1007/11780656_25
fatcat:dcj6wxvgerekbfihi7727jaa5m
« Previous
Showing results 1 — 15 out of 3,841 results