934 research outputs found

    Giving You back Control of Your Data: Digital Signing Practical Issues and the eCert Solution

    No full text
    As technologies develop rapidly, digital signing is commonly used in eDocument security. However, unaddressed issues exist. An eCertificate system represents the problem situation, and therefore is being used as case study, in a project called eCert, to research for the solution. This paper addresses these issues, explores the gap between current tools and the desired system, through analysis of the existing services and eCertificate use cases, and the identified requirements, thereby presenting an approach which solves the above problems. Preliminary results indicate that the recommendation from this research meets the design requirements, and could form the foundation of future study of solving digital signing issues

    THE CASE FOR DYNAMIC KEY DISTRIBUTION FOR PKI-BASED VANETS

    Get PDF
    ABSTRACT Vehicular Ad hoc Networks (VANETs) are becoming a reality where secure communication is a prerequisite. Public key infrastructure (PKI) can be used to secure VANETs where an onboard tamper proof device (TPD) stores a number of encryption keys which are renewed upon visiting a certificate authority (CA). We previously proposed a dynamic key distribution protocol for PKI-based VANETs [1] to reduce the role of the TPD. A vehicle dynamically requests a key from its nearest road side unit. This request is propagated through network infrastructure to reach a CA cloud and a key is securely returned. A proposed key revocation mechanism reduced the number of messages needed for revocation through Certificate Revocation List (CRL) distribution. In this paper, performance evaluation and security of the proposed dynamic key distribution is investigated analyticall

    Evaluation of Trust and Revocation of Malicious Nodes in MANETs

    Get PDF
    Mobile adhoc network (MANET) is formed by a set of mobile hosts which communicate via radio waves within the transmission range. Manets are wireless communication where nodes can freely move within the network. Manets operate in the absence of base station and central access point. Applications of Manets are different in various areas. Manets are famous because of its self configuring, wireless and dispersed. The main factor in Manet is its security. The features of Manets are actually nontrivial problems to the security design in Manets. Manets are vulnerable to attacks due to the absence of the centralized control, dynamic topologies. Hence it’s very important to protect Manets from various types of attacks and revocate the certificate of the malicious nodes

    A PKC-Based Node Revocation Scheme in Wireless Sensor Networks

    Get PDF
    [[abstract]]Generally deployed in an unattended environment, a sensor network can be easily assaulted or compromised by adversaries. Network security becomes a major problem. A distributed node revocation scheme is effective in reducing the damages a compromised node may cause to a sensor network, but its operation tends to consume large-scale memory space of the hardware-constrained sensor nodes. To reduce such complexity, this paper presents a new distributed voting revocation scheme based on the one-way hash chain, the concept of threshold secret sharing, the certificate revocation list and the public-key cryptography.[[conferencetype]]國際[[conferencedate]]20071206~20071208[[iscallforpapers]]Y[[conferencelocation]]Jeju, Kore

    Status of This Memo

    Get PDF
    This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This document specifies how to establish secure connection-oriented media transport sessions over the Transport Layer Security (TLS) protocol using the Session Description Protocol (SDP). It defines a new SDP protocol identifier, ’TCP/TLS’. It also defines the syntax and semantics for an SDP ’fingerprint ’ attribute that identifies the certificate that will be presented for the TLS session. This mechanism allows media transport over TLS connections to b

    Application of security technologies in the public websites of banks in Serbia

    Get PDF
    In this publication, the collected data in the course of a survey are summarized, systemized and analyzed. The survey is conducted in the autumn of 2018 and is focused on the usage of the HTTPS protocol in the public web sites of Serbian banks. The scope of the survey is limited only to the public site of the particular bank and 27 web sites were explored. All of them belong to Serbian banks, which are licensed by the National Bank of Serbia. The HTTPS protocol in the last years is used as the default protocol by many web applications. The study shows that from all 27 Serbian banks licensed by the Serbian National Bank, 81.5% (22 banks) of the surveyed bank's sites are using HTTPS without problems, 11.1% (3 banks) are using HTTPS with some problems and 7,4% (2 banks) are not using HTTPS at all. From banks that are using HTTPS without any problems, the majority - 72.7% (16 banks) use simple Domain Validation (DV), and the rest - 27.2% (6 banks) use Extended Validation (EV) types of certificates. The most popular certification authorities are Thawte with share of 27.2% (6 banks), Go Daddy Secure Certificate Authority and GeoTrust - each with share of 18.1% (4 banks), cPanel Inc. Certification Authority - 13.6% (3 banks), and etc. One bank uses free certificate from Let's Encrypt Authority X3. The validity period varies from 3 months (typically issued from cPanel and Let's Encrypt) to 3 years (typically issued from Go Daddy). Only 7.4% (2 banks) of all Serbian banks are using the latest HTTP/2 protocol
    • …
    corecore