676,138 research outputs found
Timed Analysis of Security Protocols
We propose a method for engineering security protocols that are aware of
timing aspects. We study a simplified version of the well-known Needham
Schroeder protocol and the complete Yahalom protocol, where timing information
allows the study of different attack scenarios. We model check the protocols
using UPPAAL. Further, a taxonomy is obtained by studying and categorising
protocols from the well known Clark Jacob library and the Security Protocol
Open Repository (SPORE) library. Finally, we present some new challenges and
threats that arise when considering time in the analysis, by providing a novel
protocol that uses time challenges and exposing a timing attack over an
implementation of an existing security protocol
Single-photon Resolved Cross-Kerr Interaction for Autonomous Stabilization of Photon-number States
Quantum states can be stabilized in the presence of intrinsic and
environmental losses by either applying active feedback conditioned on an
ancillary system or through reservoir engineering. Reservoir engineering
maintains a desired quantum state through a combination of drives and designed
entropy evacuation. We propose and implement a quantum reservoir engineering
protocol that stabilizes Fock states in a microwave cavity. This protocol is
realized with a circuit quantum electrodynamics platform where a Josephson
junction provides direct, nonlinear coupling between two superconducting
waveguide cavities. The nonlinear coupling results in a single photon resolved
cross-Kerr effect between the two cavities enabling a photon number dependent
coupling to a lossy environment. The quantum state of the microwave cavity is
discussed in terms of a net polarization and is analyzed by a measurement of
its steady state Wigner function.Comment: 8 pages, 6 figure
Towards an unified experimentation framework for protocol engineering
The design and development process of complex systems require an adequate methodology and efficient instrumental support in order to early detect and correct anomalies in the functional and non-functional properties of the solution. In this article, an Unified Experimentation Framework (UEF) providing experimentation facilities at both design and development stages is introduced. This UEF provides a mean to achieve experiment in both simulation mode with UML2 models of the designed protocol and emulation mode using real protocol implementation. A practical use case of the experimentation framework is illustrated in the context of satellite environment
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new security and control protocol for Voice over Internet
Protocol (VoIP) service is presented. It is the alternative for the IETF's
(Internet Engineering Task Force) RTCP (Real-Time Control Protocol) for
real-time application's traffic. Additionally this solution offers
authentication and integrity, it is capable of exchanging and verifying QoS and
security parameters. It is based on digital watermarking and steganography that
is why it does not consume additional bandwidth and the data transmitted is
inseparably bound to the voice content.Comment: 8 pages, 4 figures, 1 tabl
Assessing and improving an approach to delay-tolerant networking
Delay-tolerant networking (DTN) is a term invented to describe and encompass
all types of long-delay, disconnected, disrupted or intermittently-connected
networks, where mobility and outages or scheduled contacts may be experienced.
'DTN' is also used to refer to the Bundle Protocol, which has been proposed as
the one unifying solution for disparate DTN networking scenarios, after
originally being designed solely for use in deep space for the 'Interplanetary
Internet.' We evaluated the Bundle Protocol by testing it in space and on the
ground. We have found architectural weaknesses in the Bundle Protocol that may
prevent engineering deployment of this protocol in realistic delay-tolerant
networking scenarios, and have proposed approaches to address these weaknesses.Comment: 2 pages; First Annual CCSR Research Symposium (CRS 2011), Centre for
Communication Systems Research, 30 June 201
Improving lifecycle query in integrated toolchains using linked data and MQTT-based data warehousing
The development of increasingly complex IoT systems requires large
engineering environments. These environments generally consist of tools from
different vendors and are not necessarily integrated well with each other. In
order to automate various analyses, queries across resources from multiple
tools have to be executed in parallel to the engineering activities. In this
paper, we identify the necessary requirements on such a query capability and
evaluate different architectures according to these requirements. We propose an
improved lifecycle query architecture, which builds upon the existing Tracked
Resource Set (TRS) protocol, and complements it with the MQTT messaging
protocol in order to allow the data in the warehouse to be kept updated in
real-time. As part of the case study focusing on the development of an IoT
automated warehouse, this architecture was implemented for a toolchain
integrated using RESTful microservices and linked data.Comment: 12 pages, worksho
- …