108 research outputs found
Critical Perspectives on Provable Security: Fifteen Years of Another Look Papers
We give an overview of our critiques of “proofs” of security and a guide to
our papers on the subject that have appeared over the past decade and a half. We also
provide numerous additional examples and a few updates and errata
Lightweight payload encryption-based authentication scheme for advanced metering infrastructure sensor networks
The Internet of Things (IoT) connects billions of sensors to share and collect data at any time and place. The Advanced Metering Infrastructure (AMI) is one of the most important IoT applications. IoT supports AMI to collect data from smart sensors, analyse and measure abnormalities in the energy consumption pattern of sensors. However, two-way communication in distributed sensors is sensitive and tends towards security and privacy issues. Before deploying distributed sensors, data confidentiality and privacy and message authentication for sensor devices and control messages are the major security requirements. Several authentications and encryption protocols have been developed to provide confidentiality and integrity. However, many sensors in distributed systems, resource constraint smart sensors, and adaptability of IoT communication protocols in sensors necessitate designing an efficient and lightweight security authentication scheme. This paper proposes a Payload Encryption-based Optimisation Scheme for lightweight authentication (PEOS) on distributed sensors. The PEOS integrates and optimises important features of Datagram Transport Layer Security (DTLS) in Constrained Application Protocol (CoAP) architecture instead of implementing the DTLS in a separate channel. The proposed work designs a payload encryption scheme and an Optimised Advanced Encryption Standard (OP-AES). The PEOS modifies the DTLS handshaking and retransmission processes in PEOS using payload encryption and NACK messages, respectively. It also removes the duplicate features of the protocol version and sequence number without impacting the performance of CoAP. Moreover, the PEOS attempts to improve the CoAP over distributed sensors in the aspect of optimised AES operations, such as parallel execution of S-boxes in SubBytes and delayed Mixcolumns. The efficiency of PEOS authentication is evaluated on Conitki OS using the Cooja simulator for lightweight security and authentication. The proposed scheme attains better throughput while minimising the message size overhead by 9% and 23% than the existing payload-based mutual authentication PbMA and basic DTLS/CoAP scheme in random network topologies with less than 50 nodes
Attribute Based Encryption for Secure Data Access in Cloud
Cloud computing is a progressive computing worldview, which empowers adaptable, on-request, and ease use of Information Technology assets. However, the information transmitted to some cloud servers, and various protection concerns are arising out of it. Different plans given the property-based encryption have been proposed to secure the Cloud Storage. In any case, most work spotlights on the information substance security and the get to control, while less consideration towards the benefit control and the character protection. In this paper, a semi-anonymous benefit control conspires AnonyControl to address the information protection, as well as the client character security in existing access control plans. AnonyControl decentralizes the central authority to restrain the character spillage and accordingly accomplishes semi-anonymity. Furthermore, it likewise sums up the document get to control to the benefit control, by which advantages of all operations on the cloud information managed in a fine-grained way. Along these lines, display the AnonyControl-F, which ultimately keeps the character spillage and accomplish the full secrecy. Our security assessment demonstrates that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie-Hellman presumption, and our execution assessment shows the attainability of our plans.
Index Terms: Anonymity, multi-authority, attribute-based encryption
Formal Models and Techniques for Analyzing Security Protocols: A Tutorial
International audienceSecurity protocols are distributed programs that aim at securing communications by the means of cryptography. They are for instance used to secure electronic payments, home banking and more recently electronic elections. Given The financial and societal impact in case of failure, and the long history of design flaws in such protocol, formal verification is a necessity. A major difference from other safety critical systems is that the properties of security protocols must hold in the presence of an arbitrary adversary. The aim of this paper is to provide a tutorial to some modern approaches for formally modeling protocols, their goals and automatically verifying them
User-friendly Formal Methods for Security-aware Applications and Protocols
Formal support in the design and implementation of security-aware applications increases the assurance in the final artifact. Formal methods techniques work by
setting a model that unambiguously defines attacker capabilities, protocol parties behavior, and expected security properties.
Rigorous reasoning can be done on the model about the interaction of the external attacker with the protocol parties, assessing whether the security
properties hold or not.
Unfortunately, formal verification requires a high level of expertise to be used properly and, in complex systems, the model analysis requires an amount of resources (memory and time) that are not available with current technologies.
The aim of this thesis is to propose new interfaces and methodologies that facilitate the usage of formal verification techniques applied to security-aware protocols and distributed applications. In particular, this thesis presents: (i) Spi2JavaGUI, a framework for the model-driven development of security protocols, that combines (for the first time in literature) an intuitive user interface, automated formal verification and code generation; (ii) a new methodology that enables the model-driven development and the automated formal analysis of distributed applications, which requires less resources and formal verification knowledge to complete the verification process, when compared to previous approaches; (iii) the formal verification of handover procedures defined by the Long Term Evolution (LTE) standard for mobile communication networks, including the results and all the translation rules from specification documents to formal models, that facilitates the application of formal verification to other parts of the standard in the future
Secure and efficient routing in highly dynamic WLAN mesh networks
Recent advances in embedded systems, energy storage, and communication interfaces,
accompanied by the falling prices of WLAN routers and a considerable
increase in the throughput of a WLAN (IEEE 802.11), have facilitated the proliferation
of WLAN Mesh Network (WMN) applications. In addition to their
current deployments in less dynamic community networks, WMNs have become
a key solution in various highly dynamic scenarios. For instance, WMNs are intended
to interconnect self-organized, cooperative, and small Unmanned Aerial
Vehicles (UAVs) in a wide range of applications, such as emergency response, environmental
monitoring, and ad-hoc network provisioning. Nevertheless, WMNs
still face major security challenges as they are prone to routing attacks. Consequently,
the network can be sabotaged and, in the case of UAV-WMN-supported
missions, the attacker might manipulate payload data or even hijack UAVs.
Contemporary security standards, such as the IEEE 802.11i and the security
mechanisms of the IEEE 802.11s mesh standard, are vulnerable to routing attacks,
as experimentally shown in this research. Therefore, a secure routing
protocol is indispensable for making feasible the deployment of WMNs in critical
scenarios, such as UAV-WMN-assisted applications. As far as the author of
this thesis knows, none of the existing research approaches for secure routing in
WMNs have gained acceptance in practice due to their high overhead or strong
assumptions.
In this research, a new approach, which is called Position-Aware, Secure, and
Efficient mesh Routing (PASER), is proposed. This new proposal defeats more
attacks than the IEEE 802.11s/i security mechanisms and the well-known, secure
routing protocol Authenticated Routing for Ad-hoc Networks (ARAN), without
making restrictive assumptions. It is shown that PASER achieves —in realistic
UAV-WMN scenarios— similar performance results as the well-established, nonsecure
routing protocols Hybrid Wireless Mesh Protocol (HWMP) combined with
the IEEE 802.11s security mechanisms. Two representative scenarios are considered:
(1) on-demand ubiquitous network access and (2) efficient exploration of
sizable areas in disaster relief. The performance evaluation results are produced
using an experimentally validated simulation model of WMNs, realistic mobility
patterns of UAVs, and an experimentally derived channel model for the air-to-air
WMN link between UAVs. The findings of this evaluation are justified by the
route discovery delay and the message overhead of the considered solutions
Low-resolution ADC receiver design, MIMO interference cancellation prototyping, and PHY secrecy analysis.
This dissertation studies three independent research topics in the general field of wireless communications. The first topic focuses on new receiver design with low-resolution analog-to-digital converters (ADC). In future massive multiple-input-multiple-output (MIMO) systems, multiple high-speed high-resolution ADCs will become a bottleneck for practical applications because of the hardware complexity and power consumption. One solution to this problem is to adopt low-cost low-precision ADCs instead. In Chapter II, MU-MIMO-OFDM systems only equipped with low-precision ADCs are considered. A new turbo receiver structure is proposed to improve the overall system performance. Meanwhile, ultra-low-cost communication devices can enable massive deployment of disposable wireless relays. In Chapter III, the feasibility of using a one-bit relay cluster to help a power-constrained transmitter for distant communication is investigated. Nonlinear estimators are applied to enable effective decoding. The second topic focuses prototyping and verification of a LTE and WiFi co-existence system, where the operation of LTE in unlicensed spectrum (LTE-U) is discussed. LTE-U extends the benefits of LTE and LTE Advanced to unlicensed spectrum, enabling mobile operators to offload data traffic onto unlicensed frequencies more efficiently and effectively. With LTE-U, operators can offer consumers a more robust and seamless mobile broadband experience with better coverage and higher download speeds. As the coexistence leads to considerable performance instability of both LTE and WiFi transmissions, the LTE and WiFi receivers with MIMO interference canceller are designed and prototyped to support the coexistence in Chapter IV. The third topic focuses on theoretical analysis of physical-layer secrecy with finite blocklength. Unlike upper layer security approaches, the physical-layer communication security can guarantee information-theoretic secrecy. Current studies on the physical-layer secrecy are all based on infinite blocklength. Nevertheless, these asymptotic studies are unrealistic and the finite blocklength effect is crucial for practical secrecy communication. In Chapter V, a practical analysis of secure lattice codes is provided
Aggregating privatized medical data for secure querying applications
This thesis analyses and examines the challenges of aggregation of sensitive data and data querying on aggregated data at cloud server. This thesis also delineates applications of aggregation of sensitive medical data in several application scenarios, and tests privatization techniques to assist in improving the strength of privacy and utility
- …