13,115 research outputs found
Still Wrong Use of Pairings in Cryptography
Several pairing-based cryptographic protocols are recently proposed with a
wide variety of new novel applications including the ones in emerging
technologies like cloud computing, internet of things (IoT), e-health systems
and wearable technologies. There have been however a wide range of incorrect
use of these primitives. The paper of Galbraith, Paterson, and Smart (2006)
pointed out most of the issues related to the incorrect use of pairing-based
cryptography. However, we noticed that some recently proposed applications
still do not use these primitives correctly. This leads to unrealizable,
insecure or too inefficient designs of pairing-based protocols. We observed
that one reason is not being aware of the recent advancements on solving the
discrete logarithm problems in some groups. The main purpose of this article is
to give an understandable, informative, and the most up-to-date criteria for
the correct use of pairing-based cryptography. We thereby deliberately avoid
most of the technical details and rather give special emphasis on the
importance of the correct use of bilinear maps by realizing secure
cryptographic protocols. We list a collection of some recent papers having
wrong security assumptions or realizability/efficiency issues. Finally, we give
a compact and an up-to-date recipe of the correct use of pairings.Comment: 25 page
Economic incentive patterns and their application to ad hoc networks
While research about cooperation incentives for mobile ad hoc
networks (MANETs) is done only for a relative short period,
there exists tremendous knowledge in the economic and social
areas. Based on a new categorization of incentive patterns, we
examine the relevant properties of each pattern and
demonstrate their respective design alternatives and occurring
challenges for the application to ad hoc networks. With a focus
on trade based patterns, we found that negotiation about actions
proves to be very complex or inefficient in MANETs. Another
approach, the introduction of an artificial currency,
also implies several problems like how to equip the entities
with means of payment and how to secure liquidity. As a novelty,
we introduce a new kind of incentive pattern following the
concept of company shares.
It suits well for MANETs because it can be shown that through
the creation of individual currencies the above mentioned
problems disappear
Hybrid routing in delay tolerant networks
This work addresses the integration of today\\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented
Hybrid Routing in Delay Tolerant Networks
This work addresses the integration of today\u27s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented
Design and Implementation of a Direct/Indirect Hybrid Trust Model for Secure Authentication in a Mobile Ad Hoc Network
We investigated the problem of cryptographic key authentication in a mobile ad hoc network (MANET). Using the theory of digital trust, we propose an authentication scheme for MANETs that includes a hybrid trust model between the direct and indirect approaches. Our hybrid trust model supplies trust data to a decentralized web of trust in order to authenticate nodes in a MANET. We ran some simulations of our authentication scheme to verify its security and investigate potential trust threshold values. Also, we designed and implemented a proof-of-concept iOS application that implements our authentication scheme. Some future work includes investing several implications of the mobility aspect of MANETs on trust management, such as the maximum levels of trust concatenation
- …