92 research outputs found
Two-Party Threshold Key Agreement Protocol for MANETs using Pairings
In MANET environment, the nodes are mobile i.e., nodes move in and out dynamically. This causes difficulty in maintaining a central trusted authority say Certification Authority CA or Key Generation Centre KCG. In addition most of cryptographic techniques need a key to be shared between the two communicating entities. So to introduce security in MANET environment, there is a basic need of sharing a key between the two communicating entities without the use of central trusted authority. So we present a decentralized two-party key agreement protocol using pairings and threshold cryptography ideas. Our model is based on Joux2019;s three-party key agreement protocol which does not authenticate the users and hence is vulnerable to man-in-the-middle attack. This model protects from man-in-the-middle attack using threshold cryptography
A Survey on Wireless Sensor Network Security
Wireless sensor networks (WSNs) have recently attracted a lot of interest in
the research community due their wide range of applications. Due to distributed
nature of these networks and their deployment in remote areas, these networks
are vulnerable to numerous security threats that can adversely affect their
proper functioning. This problem is more critical if the network is deployed
for some mission-critical applications such as in a tactical battlefield.
Random failure of nodes is also very likely in real-life deployment scenarios.
Due to resource constraints in the sensor nodes, traditional security
mechanisms with large overhead of computation and communication are infeasible
in WSNs. Security in sensor networks is, therefore, a particularly challenging
task. This paper discusses the current state of the art in security mechanisms
for WSNs. Various types of attacks are discussed and their countermeasures
presented. A brief discussion on the future direction of research in WSN
security is also included.Comment: 24 pages, 4 figures, 2 table
Secure Chaotic Maps-based Group Key Agreement Scheme with Privacy Preserving
Abstract Nowadays chaos theory related to cryptography has been addressed widely, so there is an intuitive connection between group key agreement and chaotic maps. Such a connector may lead to a novel way to construct authenticated and efficient group key agreement protocols. Many chaotic maps based two-party/three-party password authenticated key agreement (2PAKA/3PAKA) schemes have been proposed. However, to the best of our knowledge, no chaotic maps based group (N-party) key agreement protocol without using a timestamp and password has been proposed yet. In this paper, we propose the first chaotic maps-based group authentication key agreement protocol. The proposed protocol is based on chaotic maps to create a kind of signcryption method to transmit authenticated information and make the calculated consumption and communicating round restrict to an acceptable bound. At the same time our proposed protocol can achieve members' revocation or join easily, which not only refrains from consuming modular exponential computing and scalar multiplication on an elliptic curve, but is also robust to resist various attacks and achieves perfect forward secrecy with privacy preserving
EBAKE-SE: a novel ECC-based authenticated key exchange between industrial IoT devices using secure element
Industrial IoT (IIoT) aims to enhance services provided by various industries, such as manufacturing and product processing. IIoT suffers from various challenges, and security is one of the key challenge among those challenges. Authentication and access control are two notable challenges for any Industrial IoT (IIoT) based industrial deployment. Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors, actuators, fog devices and gateways. Thus, articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security. In this paper, first, we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al. and prove that their scheme is vulnerable to various traditional attacks such as device anonymity, MITM, and DoS. We then put forward an inter-device authentication scheme using an ECC (Elliptic Curve Cryptography) that is highly secure and lightweight compared to other existing schemes for a similar environment. Furthermore, we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel. In this paper, we present comparison of the proposed scheme with existing schemes based on communication cost, computation cost and security index to prove that the proposed EBAKE-SE is highly efficient, reliable, and trustworthy compared to other existing schemes for an inter-device authentication. At long last, we present an implementation for the proposed EBAKE-SE using MQTT protocol
Privacy protection for e-health systems by means of dynamic authentication and three-factor key agreement
During the past decade, the electronic healthcare (e-health) system has been evolved into a more patient-oriented service with smaller and smarter wireless devices. However, these convenient smart devices have limited computing capacity and memory size, which makes it harder to protect the user’s massive private data in the e-health system. Although some works have established a secure session key between the user and the medical server, the weaknesses still exist in preserving the anonymity with low energy consumption. Moreover, the misuse of biometric information in key agreement process may lead to privacy disclosure, which is irreparable. In this study, we design a dynamic privacy protection mechanism offering the biometric authentication at the server side whereas the exact value of the biometric template remains unknown to the server. And the user anonymity can be fully preserved during the authentication and key negotiation process because the messages transmitted with the proposed scheme are untraceable. Furthermore, the proposed scheme is proved to be semantic secure under the Real-or-Random Model. The performance analysis shows that the proposed scheme suits the e-health environment at the aspect of security and resource occupation
Secure Messaging with in-app user defined schemes
Cryptography has been the culmination of human trials and mistrials in an attempt to
keep information safe from unintended access. We have learned from our mistakes in
the past, and today with the help of both academician and software developers, we have
robust cryptographic technologies. Cryptography however, is a race between increasing
processing power of modern machines and the complexity of cryptographic systems.
With quantum computing on the horizon, our present cryptographic systems seem to fall
behind in this race. There is a need to catalyze research in the field.
Here, an application is proposed, which empowers users to write their own cryptographic
schemes. It hopes to create a platform where people can share their cryptographic
schemes and have an application that can help them share information securely. The
author hopes, that an application which sources cryptographic schemes from users, would
help catalyze research in the field. An application where the security implementation
is dependent on the whim of the user could prove a hard target for attack. The thesis
starts with a preliminary study of the Android platform. The thesis then analyzes im-
plementations of a few secure messaging applications and then delves into details of NFC.
Using the background information accumulated during the course of this study, the
authors attempt to formulate a sound implementation of a messaging application. The
thesis is also accompanied with a proof-of-concept Android application that checks the
viability of concepts discussed herein
Supporting NAT traversal and secure communications in a protocol implementation framework
Dissertação apresentada na Faculdade de Ciências e Tecnologia da Universidade Nova de Lisboa para obtenção do Grau de Mestre em Engenharia Electrotécnica e de ComputadoresThe DOORS framework is a versatile, lightweight message-based framework developed in ANSI C++. It builds upon research experience and subsequent knowledge garnered from the use and development of CVOPS and OVOPS, two well known protocol development frameworks that have obtained widespread acceptance and use in both the Finnish industry and academia. It conceptually resides between the operating system and the application, and provides a uniform development environment shielding the developer from operating system speci c issues. It can be used for developing network services, ranging from simple
socket-based systems, to protocol implementations, to CORBA-based applications and object-based gateways.
Originally, DOORS was conceived as a natural extension from the OVOPS framework to
support generic event-based, distributed and client-server network applications. However,
DOORS since then has evolved as a platform-level middleware solution for researching the provision of converged services to both packet-based and telecommunications networks, enterprise-level integration and interoperability in future networks, as well as studying application development, multi-casting and service discovery protocols in heterogeneous IPv6 networks.
In this thesis, two aspects of development work with DOORS take place. The rst is
the investigation of the Network Address Translation (NAT) traversal problem to give
support to applications in the DOORS framework that are residing in private IP networks to interwork with those in public IP networks. For this matter this rst part focuses on the development of a client in the DOORS framework for the Session Traversal Utilities for NAT (STUN) protocol, to be used for IP communications behind a NAT. The second aspect involves secure communications. Application protocols in communication networks are easily intercepted and need security in various layers. For this matter the second part
focuses on the investigation and development of a technique in the DOORS framework
to support the Transport Layer Security (TLS) protocol, giving the ability to application protocols to rely on secure transport layer services
- …