13 research outputs found

    Security in Distributed, Grid, Mobile, and Pervasive Computing

    Get PDF
    This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security

    Energy Conservation and Security Enhancement in Wireless End-to-end Secure Connections

    Get PDF
    Wireless channels are vulnerable to interception. In some applications an end-to-end secure data transfer is required. However the use of cryptographic functions in communication over a wireless channel increases sensitivity to channel errors. As a result, the connection characteristics in terms of delay, throughput, and transmission energy worsen. Transmission energy is a key issue in some secure end-to-end wireless applications especially if they are running on mobile handheld devices with a limited source of energy such as batteries. That is why in most secure end-to-end wireless connections, the connection is dropped in poor channel conditions. In this thesis, models are proposed by which the performance is improved and transmission energy is lowered. A combination of a cross-layer controller, K Best Likelihood (K-BL) channel decoder, and a keyed error detection algorithm in the novel model supports the authorized receivers by a higher throughput, lower delay mean, and less transmission energy in a certain range of the Signal to Noise Ratio (SNR). This is done at the expense of additional computation at the receiving end. Ttradeoffs are examined and the simulation results of the new model are compared with those of conventional wireless communication systems. Another model is devised to mitigate the energy consumption of the Turbo Code channel decoder. The overall decoding energy consumption for each packet can be lowered by reducing the average number of iterations in the Turbo Code channel decoder. The proposed models achieve better energy consumption by reducing the number of iterations in a channel decoder that uses the Turbo decoder and by reducing the number of retransmissions in a trellis channel decoder. Furthermore, the security enhancement of the novel models is assessed in terms of the extent to which the enhancement is fully achieved

    Authentication and Data Protection under Strong Adversarial Model

    Get PDF
    We are interested in addressing a series of existing and plausible threats to cybersecurity where the adversary possesses unconventional attack capabilities. Such unconventionality includes, in our exploration but not limited to, crowd-sourcing, physical/juridical coercion, substantial (but bounded) computational resources, malicious insiders, etc. Our studies show that unconventional adversaries can be counteracted with a special anchor of trust and/or a paradigm shift on a case-specific basis. Complementing cryptography, hardware security primitives are the last defense in the face of co-located (physical) and privileged (software) adversaries, hence serving as the special trust anchor. Examples of hardware primitives are architecture-shipped features (e.g., with CPU or chipsets), security chips or tokens, and certain features on peripheral/storage devices. We also propose changes of paradigm in conjunction with hardware primitives, such as containing attacks instead of counteracting, pretended compliance, and immunization instead of detection/prevention. In this thesis, we demonstrate how our philosophy is applied to cope with several exemplary scenarios of unconventional threats, and elaborate on the prototype systems we have implemented. Specifically, Gracewipe is designed for stealthy and verifiable secure deletion of on-disk user secrets under coercion; Hypnoguard protects in-RAM data when a computer is in sleep (ACPI S3) in case of various memory/guessing attacks; Uvauth mitigates large-scale human-assisted guessing attacks by receiving all login attempts in an indistinguishable manner, i.e., correct credentials in a legitimate session and incorrect ones in a plausible fake session; Inuksuk is proposed to protect user files against ransomware or other authorized tampering. It augments the hardware access control on self-encrypting drives with trusted execution to achieve data immunization. We have also extended the Gracewipe scenario to a network-based enterprise environment, aiming to address slightly different threats, e.g., malicious insiders. We believe the high-level methodology of these research topics can contribute to advancing the security research under strong adversarial assumptions, and the promotion of software-hardware orchestration in protecting execution integrity therein

    2016 - The Twenty-first Annual Symposium of Student Scholars

    Get PDF
    The full program book from the Twenty-first Annual Symposium of Student Scholars, held on April 21, 2016. Includes abstracts from the presentations and posters.https://digitalcommons.kennesaw.edu/sssprograms/1015/thumbnail.jp

    Modèles algorithmes et méthodologie pour la conception de systèmes de sécurité physique basés sur des microcontrôleurs protégés des attaques cyber-physiques

    Get PDF
    Un moyen d'assurer la sécurité de systèmes basés sur des micro-contrôleurs (mCS) est de considérer une approche de génération à partir de spécifications. Malheureusement, les approches existantes souffrent d'inconvénients, et le but de la méthodologie présentée dans cette thèse est de les éviter dans le cas particulier des mCS pour la sécurité physique (mCS-Sec). Les principaux résultats de ce travail sont le développement de modèles, d'algorithmes, et d'une méthodologie originale de création de mCS-Sec, et leur implémentation. L'applicabilité de la méthode a été évaluée sur un système de robot de surveillance d'une zone. Dans ce cas, notre évaluation a montré que l'approche développée satisfaisait toutes les contraintes imposées, tout en offrant certains avantages par rapport aux solutions existantes. Nous pensons que cette approche permettra de réduire le nombre de faiblesses et les problèmes d'architecture dans les mCS, ce qui en réduira la surface d'attaque.One of the possible ways to ensure the security of microcontroller-based systems is the implementation of security by design approach. Unfortunately, existing approaches are not without drawbacks, that is why this thesis is aimed at developing the new one. Moreover, among all possible systems, in this work, only physical security systems were chosen as an area of the application. The main findings of the work are containing original models, algorithms, methodology and software implementation. Their correctness was checked on a system of mobile robots for perimeter monitoring. The evaluation of the developed solution showed that it satisfies all requirements while having advantages over commercial and scientific analogues, which means that the goal of this work was reached. It is assumed that the use of the developed solution will help to reduce the number of weak places and architectural defects in microcontroller-based systems, thereby significantly reducing their attack surface

    Framing and Counterframing of the Middle East Peace Process in the Arab -Israeli Press: a Comparative Analysis of Assafir and The Jerusalem Post .

    Get PDF
    The Arabs and Israelis have been negotiating peace for the past ten years; however, the conflict still ignites with no apparent hope for any near resolution. Understanding the rhetorical construction of the peace reality may help in managing this conflict. This study examines the symbolic construction of the peace process in the Arab and Israeli press. It comparatively studies how the Arab and Israeli press, through language choice, define peace, elucidate its implications, and judge actors and actions involved in the peace process. This study identifies the metaphors used and the dominant rival frames constructed in two conflicting newspapers, Assafir (Lebanese newspaper) and The Jerusalem Post (Israeli newspaper) in their coverage of the peace process in 1993 and 1996. Then the study contrasts the different perspectives of the two papers in order to specify the point of conflict and check if any basis of shared values exists across the perspectives that might be useful as a basis for negotiations. The analysis is based on the media framing and agenda setting theories as well as Johnson and Lakoff\u27s metaphorical analysis paradigm. This study reveals the power of metaphors, images, and symbols in the discourse of peace. This discourse is surrounded with language of violence, victimhood and accusations; a discourse that casts pessimism on any chance for cooperation and peaceful resolutions. Similar terms repeat themselves but are treated differently. The image of victimhood is present in both papers but attached to two different parties. In their characterization of actors, both papers follow the same strategy with similar agenda setting geared toward two different groups. Both papers discipline their readers with opposite doxas. The study concludes that both papers are involved in a rhetoric of stasis. Both seem to cooperate in producing a deadlock. This dissertation reveals that rival perspectives can be collaborative as well as competitive. Both can cooperate to spread an atmosphere of ambiguity, passivity and pessimism. Finally, the use of framing contributed less to the understanding of the dilemma than the patterns of imagery. Future studies should look at how imagery opens options and creates new ways of considering solutions

    LOST IN PEACE. RISE AND DECLINE OF LABOR PARTY IN THE FRAMEWORK OF ISRAELI POLITICAL HISTORY (1948 - 2001).

    Get PDF
    La tesi analizza il contemporaneo declino elettorale del Partito Laburista israeliano in relazione agli eventi storici, ai cambiamenti sociali e demografici che hanno portato ad un effettivo cambiamento del sistema politico. In particolar modo la ricerca si sofferma sulla lettura dei risultati elettorali, cercando di sottolineare come le dinamiche sopra indicate abbiano influenzato i trend elettorali e l'offerta politica del partito stesso. Fino a giungere agli anni Novanta, passaggio fondamentale in cui cogliere le ragioni per le quali il Partito Laburista sembra tutt'ora non riuscire invertire il trend negativo degli ultimi quindici anni.This thesis analyzes the contemporary electoral decline of the Israeli Labor Party in relation to historical events, social and demographic changes that have led to an effective change in the Israeli political system. In particular, the research focuses on the electoral results, trying to underline how the dynamics indicated above have influenced the electoral trends and the political offer of the party itself. The Nineties represent a fundamental passage in which it is possibleto understand the reasons why the Labor Party seems unable, still today, to reverse the negative trend of the last fifteen years

    Advances in cryptographic voting systems

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2006.Includes bibliographical references (p. 241-254).Democracy depends on the proper administration of popular elections. Voters should receive assurance that their intent was correctly captured and that all eligible votes were correctly tallied. The election system as a whole should ensure that voter coercion is unlikely, even when voters are willing to be influenced. These conflicting requirements present a significant challenge: how can voters receive enough assurance to trust the election result, but not so much that they can prove to a potential coercer how they voted? This dissertation explores cryptographic techniques for implementing verifiable, secret-ballot elections. We present the power of cryptographic voting, in particular its ability to successfully achieve both verifiability and ballot secrecy, a combination that cannot be achieved by other means. We review a large portion of the literature on cryptographic voting. We propose three novel technical ideas: 1. a simple and inexpensive paper-base cryptographic voting system with some interesting advantages over existing techniques, 2. a theoretical model of incoercibility for human voters with their inherent limited computational ability, and a new ballot casting system that fits the new definition, and 3. a new theoretical construct for shuffling encrypted votes in full view of public observers.by Ben Adida.Ph.D

    Design of Reliable and Secure Devices Realizing Shamir's Secret Sharing

    No full text
    corecore