36 research outputs found

    Performances of CS-DCSK UWB communication system in the presence of narrow band interferers

    No full text
    Conference Name:11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012. Conference Address: Liverpool, United kingdom. Time:June 25, 2012 - June 27, 2012.University of Bradford; IEEE Technical Committee on Scalable Computing (TCSC); IEEE; IEEE Computer SocietyThis paper evaluates the bit error rate (BER) performance of a code-shifted differential chaos shift keying (CS-DCSK) ultra-wide bandwidth (UWB) system over indoor communication channels under the impact of both single and multiple narrow band interference (NBI) signals. We analyze the BERs both in single NB interferer and multiple NB interferes. The analytic results and simulation results show that NBI signal has a noticeable impact on the performance of UWB systems which are independent of the carrier frequency. 漏 2012 IEEE

    A SURVEY ON ENCRYPTION ALGORITHMS AND PROTOCOLS IN SMART CARD FOR USER CENTRIC OWNERSHIP MODEL

    Get PDF
    User Centric Ownership Model (UCOM) enables the smart card users to install/delete application they prefer in their smart card. UCOM provides smart card users to have any number of applications installed on their smart cards. Though UCOM provides flexibility for the smart card users, it lacks centralized authority. UCOM creates major problem if the user has more than one application installed in his/her smart card.  Smart card may contain applications from the provider that may interrupt the proper working of the neighbor applications.  Smart card user may hack his way to a known aboutapplication through a smart card simulator. Thus, there is no security for an application in the smart card for UCOM model. This survey paper includes background and motivation about the available encryption algorithms for smart cards such as RSA, ECC, AES, DES, T-DES, ECDSA and the smart card protocols which can be used to overcome the problem of security for the applications in smart card for UCOM model

    A Novel Consumer-Centric Card Management Architecture and Potential Security Issues

    Get PDF
    International audienceMulti-application smart card technology has gained momentum due to the Near Field Communication (NFC) and smart phone revolution. Enabling multiple applications from different application providers on a single smart card is not a new concept. Multi-application smart cards have been around since the late 1990s; however, uptake was severely limited. NFC has recently reinvigorated the multi-application initiative and this time around a number of innovative deployment models are proposed. Such models include Trusted Service Manager (TSM), User Centric Smart Card Ownership Model (UCOM) and GlobalPlatform Consumer-Centric Model (GP-CCM). In this paper, we discuss two of the most widely accepted and deployed smart card management architectures in the smart card industry: GlobalPlatform and Multos. We explain how these architectures do not fully comply with the UCOM and GP-CCM. We then describe our novel flexible consumer-centric card management architecture designed specifically for the UCOM and GP-CCM frameworks, along with ways of integrating the TSM model into the proposed card management architecture. Finally, we discuss four new security issues inherent to any architecture in this context along with the countermeasures for our proposed architecture

    Joint source-channel coding based on P-LDPC codes for radiography images transmission

    No full text
    Conference Name:11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012. Conference Address: Liverpool, United kingdom. Time:June 25, 2012 - June 27, 2012.University of Bradford; IEEE Technical Committee on Scalable Computing (TCSC); IEEE; IEEE Computer SocietyAs the demand for e-Health care increases quickly, the transmission of medical images has been a crucial problem which needs to be solved as soon as possible. In the last decade, joint source-channel coding (JSCC), which combines the source coding with the channel coding reasonably to build an integral system so as to obtain significant improvement of system performance has attracted much attention. A framework of transmitting medical images by a P-JSCC scheme constructed from protograph low-density parity-check (P-LDPC) codes is proposed in this paper. Without loss of generality, we exploit a typical radiography image for simulation, and experimental results show that the receiver can recover the transmitted radiography image with good quality even at a very low signal-to-noise ratio (SNR); the P-JSCC scheme outperforms irregular-JSCC and regular-JSCC. 漏 2012 IEEE

    An efficient, secure and trusted channel protocol for avionics wireless networks

    Get PDF
    Avionics networks rely on a set of stringent reliability and safety requirements. In existing deployments, these networks are based on a wired technology, which supports these requirements. Furthermore, this technology simplifies the security management of the network since certain assumptions can be safely made, including the inability of an attacker to access the network, and the fact that it is almost impossible for an attacker to introduce a node into the network. The proposal for Avionics Wireless Networks (AWNs), currently under development by multiple aerospace working groups, promises a reduction in the complexity of electrical wiring harness design and fabrication, a reduction in the total weight of wires, increased customization possibilities, and the capacity to monitor otherwise inaccessible moving or rotating aircraft parts such as landing gear and some sections of the aircraft engines. While providing these benefits, the AWN must ensure that it provides levels of safety that are at minimum equivalent to those offered by the wired equivalent. In this paper, we propose a secure and trusted channel protocol that satisfies the stated security and operational requirements for an AWN protocol. There are three main objectives for this protocol. First, the protocol has to provide the assurance that all communicating entities can trust each other, and can trust their internal (secure) software and hardware states. Second, the protocol has to establish a fair key exchange between all communicating entities so as to provide a secure channel. Finally, the third objective is to be efficient for both the initial start-up of the network and when resuming a session after a cold and/or warm restart of a node. The proposed protocol is implemented and performance measurements are presented based on this implementation. In addition, we formally verify our proposed protocol using CasperFDR.Comment: 10 pages, 2 figures, 4 tables, IEEE DAS

    Error performance analysis of opportunistic relaying system based on DCSK

    No full text
    Conference Name:11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012. Conference Address: Liverpool, United kingdom. Time:June 25, 2012 - June 27, 2012.University of Bradford; IEEE Technical Committee on Scalable Computing (TCSC); IEEE; IEEE Computer SocietyIn this paper, a differential chaos shift keying (DCSK) opportunistic relaying scheme is proposed and the system performance is analyzed over multipath Rayleigh fading channel, where all the relays adopt decode-and-forward (DF) strategy. Considering the effect of the path loss, the best relay is chosen by max-min selection criterion. We derive the probability density function (PDF) of the signal noise ratio (SNR) in each hop, and give the expression of the end-to-end bit error rate (BER). The effects of the number of relays, the propagation distance and the spread-spectrum factor on the system performance are investigated. It is shown that the BER performances are proportional to the number of relays and the propagation distance, while they are inverse ratio to the spread-spectrum factor. Numerical results prove an excellent match between simulations and our analysis expressions. 漏 2012 IEEE

    Security and accuracy of fingerprint-based biometrics: A review

    Get PDF
    Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper

    Security and accuracy of fingerprint-based biometrics: A review

    Get PDF
    Biometric systems are increasingly replacing traditional password- and token-based authentication systems. Security and recognition accuracy are the two most important aspects to consider in designing a biometric system. In this paper, a comprehensive review is presented to shed light on the latest developments in the study of fingerprint-based biometrics covering these two aspects with a view to improving system security and recognition accuracy. Based on a thorough analysis and discussion, limitations of existing research work are outlined and suggestions for future work are provided. It is shown in the paper that researchers continue to face challenges in tackling the two most critical attacks to biometric systems, namely, attacks to the user interface and template databases. How to design proper countermeasures to thwart these attacks, thereby providing strong security and yet at the same time maintaining high recognition accuracy, is a hot research topic currently, as well as in the foreseeable future. Moreover, recognition accuracy under non-ideal conditions is more likely to be unsatisfactory and thus needs particular attention in biometric system design. Related challenges and current research trends are also outlined in this paper

    Evaluation of Large Integer Multiplication Methods on Hardware

    Get PDF
    corecore