35 research outputs found

    Cryptographic algorithms for communicating results from distributed electronic voting systems

    Get PDF
    Electronic voting systems are increasingly used in electoral processes ranging from specialized stand alone machines, up to complete paperless and remote voting system. Votes secrecy and confidence are necessary in any electoral process. Public or private key cryptographic systems can be used in LAN or WAN facilities. Low level cryptographic structures and basic algorithms are mentioned. Enhancement of security levels in distributed voting schemes, are shown based in concatenated operations before transmission. Finally, processing time reduction with specialized hardware and mixed cryptosystems are discussedVI Workshop de Procesamiento Distribuido y Paralelo (WPDP

    Review of Basic Secure Routing Protocols for MANETs

    Get PDF
    A Mobile ad hoc networks faces challenges in secure communications. The resource constraints on nodes in MANETs limit the cryptographic measures used to secure messages. Thus it is susceptible to link attacks ranging from passive eavesdropping to active impersonation, message replay and message distortion. Secure routing in MANETs is one of the most emerging areas of research. Designing a foolproof secure routing protocol is a challenging task due to its unique network characteristics. Number of secure routing protocols already developed but these are not work under different attacks.Availability of network services, confidentiality and integrity of the data can be achieved by ensuring that security issues have been met. In this paper the basic secured routing protocols used for MANETs are reviewed. Further this study will help the researchers to get an overview of the existing secure routing protocols and suggest which protocols may perform better with respect to varying network scenarios under different attacks

    Secure Pairing and Identification of BLE Devices

    Get PDF
    Today, pairing of Bluetooth Low Energy (BLE) capable devices with user devices is neither secure nor trivial. Secure pairing and identification of BLE devices is described. A service (e.g., web service) provides a list of unique identifiers (UIDs) and an encrypted UID to a BLE device manufacturer without a decryption key. The manufacturer provisions each beacon of each BLE device with a UID generated by the service. The manufacturer also generates a quick response (QR) code to print on the BLE device. To pair with the BLE device, a user uses a camera or other scanner of the end-user device to simply scan the QR code. In response, the end-user device queries the service to resolve the UID, then scans for, identifies, and connects to the beacon. The end-user device also configures the beacon to broadcast an ephemeral identifier (EID), which changes over time, preventing third parties from identifying the paired beacon

    Cryptographic algorithms for communicating results from distributed electronic voting systems

    Get PDF
    Electronic voting systems are increasingly used in electoral processes ranging from specialized stand alone machines, up to complete paperless and remote voting system. Votes secrecy and confidence are necessary in any electoral process. Public or private key cryptographic systems can be used in LAN or WAN facilities. Low level cryptographic structures and basic algorithms are mentioned. Enhancement of security levels in distributed voting schemes, are shown based in concatenated operations before transmission. Finally, processing time reduction with specialized hardware and mixed cryptosystems are discussedVI Workshop de Procesamiento Distribuido y Paralelo (WPDP)Red de Universidades con Carreras en Informática (RedUNCI

    Secure Precise Clock Synchronization for Interconnected Body Area Networks

    Get PDF
    Secure time synchronization is a paramount service for wireless sensor networks (WSNs) constituted by multiple interconnected body area networks (BANs). We propose a novel approach to securely and efficiently synchronize nodes at BAN level and/or WSN level. Each BAN develops its own notion of time. To this effect, the nodes of a BAN synchronize with their BAN controller node. Moreover, controller nodes of different BANs cooperate to agree on a WSN global and/or to transfer UTC time. To reduce the number of exchanged synchronization messages, we use an environmental-aware time prediction algorithm. The performance analysis in this paper shows that our approach exhibits very advanced security, accuracy, precision, and low-energy trade-off. For comparable precision, our proposal outstands related clock synchronization protocols in energy efficiency and risk of attacks. These results are based on computations

    SmartState: A Protocol-driven Human Interface

    Full text link
    Since the inception of human research studies, researchers must often interact with participants on a set schedule to collect data. Researchers manually perform many interactions, leading to considerable time and financial expenses. Usually, user-provided data collection consists of surveys administered via telephone or email. These methods are tedious for the survey administrators, which could cause fatigue and potentially lead to collection mistakes. This project leverages recent advancements in automatic speech recognition, speech-to-text, natural language understanding (NLU), and finite-state machines to automate research protocols. This generalized application is fully customizable and irrespective of any research study. New research protocols can be quickly created based on these parameters once envisioned. Thus, we present SmartState, a fully-customizable, state-driven protocol manager combined with supporting AI components to autonomously manage user data and intelligently determine users' intentions through chat and end-device interactions.Comment: 8 pages, 8 figure

    A distributed cyber-security framework for heterogeneous environments

    Get PDF
    Evolving business models, computing paradigms, and management practices are rapidly re-shaping the usage models of ICT infrastructures, and demanding for more flexibility and dynamicity in enterprise security, beyond the traditional "security perimeter" approach. Since valuable ICT assets cannot be easily enclosed within a trusted physical sandbox any more, there is an increasing need for a new generation of pervasive and capillary cyber-security paradigms over distributed and geographically-scattered systems. Following the generalized trend towards virtualization, automation, software-definition, and hardware/software disaggregation, in this paper we elaborate on a multi-tier architecture made of a common, programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms. Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments, including legacy enterprise networks, IoT installations, and virtual resources deployed in the cloud

    An Overview of Wireless IoT Protocol Security in the Smart Home Domain

    Full text link
    While the application of IoT in smart technologies becomes more and more proliferated, the pandemonium of its protocols becomes increasingly confusing. More seriously, severe security deficiencies of these protocols become evident, as time-to- market is a key factor, which satisfaction comes at the price of a less thorough security design and testing. This applies especially to the smart home domain, where the consumer-driven market demands quick and cheap solutions. This paper presents an overview of IoT application domains and discusses the most important wireless IoT protocols for smart home, which are KNX-RF, EnOcean, Zigbee, Z-Wave and Thread. Finally, it describes the security features of said protocols and compares them with each other, giving advice on whose protocols are more suitable for a secure smart home.Comment: 8 pages, 4 figure
    corecore