104 research outputs found

    Secure and Efficient Construction of Broadcast Encryption with Dealership

    Get PDF
    Broadcast encryption with dealership (BED) has been proposed to achieve more innovative and scalable business models for broadcast services. It has an extensive application future. However, designing secure BED is a challenging task. The only known BED construction sofar is by Gritti et al. We aim to raise the profile of BED primitives which has not received much attention despite of its importance. This paper presents a selectively chosen plaintext attack (CPA) secure BED scheme supporting maximum number of accountability and privacy (hides the group of users from broadcaster). Our scheme is a key encapsulation mechanism and practically more efficient. It reduces the parameter sizes and computation cost compared to Gritti et al. More interestingly, the broadcaster does not need to rely on users to detect the dishonest dealer. We provide concrete security analysis of our design under reasonable assumptions

    Broadcast encryption with dealership

    Get PDF
    In this paper, we introduce a new cryptographic primitive called broadcast encryption with dealership. This notion, which has never been discussed in the cryptography literature, is applicable to many realistic broadcast services, for example subscription-based television service. Specifically, the new primitive enables a dealer to bulk buy the access to some products (e.g., TV channels) from the broadcaster, and hence, it will enable the dealer to resell the contents to the subscribers with a cheaper rate. Therefore, this creates business opportunity model for the dealer. We highlight the security consideration in such a scenario and capture the security requirements in the security model. Subsequently, we present a concrete scheme, which is proven secure under the decisional bilinear Diffie-Hellman exponent and the Diffie-Hellman exponent assumptions

    Media Ownership Control: To What Extent Is Competition Law And Policy Sufficient to Provide for Diversity and Plurality in the Media?

    Get PDF
    In modern economies and societies, the availability of information is central to better decision making by citizens and consumers. In most countries, citizens and consumers receive the information they need through the media, including newspapers, television radio, internet and etc. After 1990s, technological and economic developments have evolved the media sector by converging it to telecommunications and IT sectors and by leading to new interactive broadcasting services transmitted by different technologies. These developments also increased mergers and joint ventures both at global level and national level. As well as these developments, the private benefits of media have increased concentration of ownership in these sectors. There are many people who argue that concentration in media markets has a negative effect on diversity and plurality. Because of increasing concentration in media markets in recent years all over the world, many concerns as to whether competition law and policy is sufficient to ensure the diversity and pluralism in media have arisen. Competition rules can address issues of concentration, efficiency and choice and will tend to encourage dispersed ownership and new entry. However, they cannot guarantee any of it. Competition law cannot therefore provide the certainty we need that a significant number of different media voices will continue to be heard, or that prospective new entrants to the market will be able to add their voice. Moreover, it cannot directly address concerns over editorial freedom or community voice. Therefore, if competition law and policy is assessed as a whole in the context of media, it can be stated that it guarantees diversity to some extent. However, because of the objectives and criteria of competition law is an important part of regulation, it is not designed to deliver diversity and plurality in the media. Special media ownership rules exist across the world because the market alone, even regulated by competition law, is not thought to provide the best results for society and for democracy.

    Preserving Privacy in Automotive Tire Pressure Monitoring Systems

    Get PDF
    The automotive industry is moving towards a more connected ecosystem, with connectivity achieved through multiple wireless systems. However, in the pursuit of these technological advances and to quickly satisfy requirements imposed on manufacturers, the security of these systems is often an afterthought. It has been shown that systems in a standard new automobile that one would not expect to be vulnerable can be exploited for a variety of harmful effects. This thesis considers a seemingly benign, but government mandated, safety feature of modern vehicles; the Tire Pressure Monitoring System (TPMS). Typical implementations have no security-oriented features, leaking data that can be used for reliable tracking by a determined attacker, and being completely open to spoofing attacks. This research investigates potential privacy concerns of TPMS, first by demonstrating the feasibility of both identifying vehicles and reconstructing their routes without prohibitive cost or expertise. Then, an ID obfuscating scheme is proposed, called TPMS Obfuscation through Rolling ID (TORI), to mitigate these privacy threats while remaining true to the design requirements of TPMS. Various conditions are tested using a modified traffic simulator, which validate the ability to reconstruct the identities of vehicles even from sparse detections

    Security in automotive microcontrollers of next generation

    Get PDF
    Information technology – we define broadly as being systems based on digital hardware and software – has gained central importance for many new automotive applications and services.On the production side we observe that the cost for electronics and IT is approaching the 50% threshold of all manufacturing costs.One aspect of modern IT systems has hardly been addressed in the context of automotive applications: IT security. Security is concerned with protection against the manipulation of IT systems by humans. After a brief review of the evolution in the last five years of the IT security in the automotive environment, we will see the state of art of the security features of the automotive microcontrollers.laslty it will be presented an hardware module that ensure the privacy aspect, of the IT security, in a bus communication in an automotive environment

    Reconceptualizing Privacy: An Examination Of The Developing Regulatory Regime For Facial Recognition Technology

    Get PDF
    ABSTRACT The National Telecommunications and Information Administration have convened a series of meetings to create a voluntary code of conduct for the commercial use of facial recognition technology. This research asks and answers three questions related to the creation of the voluntary code of conduct: 1) How is the regulatory regime of FRT emerging in the U.S.? 2) What are the roles of the various stakeholders in shaping the commercial regulation of FRT? 3) How does FRT challenge our current conceptions of privacy? Data has been gathered to answer these questions using participant observation and semi-structured interviews. The data was analyzed via mediated discourse analysis. Findings of the research include: the highly sensitive nature of the biometric data that facial recognition technology collects, the data’s ability to be linked across multiple databases, the surreptitious way the data can be collected, the potential chilling effect the technology can have on the First Amendment, and the various threats the technology poses to privacy. Keywords: Privacy, Facial Recognition Technology, Multistakeholder, and Biometric Dat

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Designing a Pseudo Tire Pressure Monitoring System Transmitter using Software Defined Radios

    Get PDF
    The purpose of this project is to create a software defined radio based transmitter that can mimic the signals of the Tire Pressure Monitoring System (TPMS) sensors. The team used an amplifying receiver to read signals as well as decode data. The transmitter was built using a software defined radio running MATLAB code. The team conducted a series of tests to verify the functionality of the pseudo transmitter using both computer simulation and over-the-air and with a real vehicle. The results of the tests verified that the pseudo transmitter can communicate properly with the receiver of the previous project as well as a real TPMS receiver in a vehicle. The results of this project are useful in identifying breaches in the TPMS security and offering data for developing a more secure TPMS
    • …
    corecore