15,086 research outputs found

    Secure Message Transmission In Asynchronous Directed Networks

    Get PDF
    We study the problem of information-theoretically secure message transmission (SMT) in asynchronous directed networks. In line with the literature, the distrust and failures of the network is captured via a computationally unbounded Byzantine adversary that may corrupt some subset of nodes. We give a characterization of networks over which SMT from sender S to receiver R is possible in both the well-known settings, namely perfect SMT (PSMT) and unconditional SMT (USMT). We distinguish between two variants of USMT: one in which R can output an incorrect message (with small probability) and another in which R never outputs a wrong message, but may choose to abort (with small probability). We also provide efficient protocols for an important class of networks

    Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks

    Get PDF
    In this paper we propose Time Synchronized One-Time-Password scheme to provide secure wake up authentication. The main constraint of wireless sensor networks is their limited power resource that prevents us from using radio transmission over the network to transfer the passwords. On the other hand computation power consumption is insignificant when compared to the costs associated with the power needed for transmitting the right set of keys. In addition to prevent adversaries from reading and following the timeline of the network, we propose to encrypt the tokens using symmetric encryption to prevent replay attacks.Comment: International Journal Of Advanced Smart Sensor Network Systems (IJASSN), Vol 3, No.1, January 2013 http://airccse.org/journal/ijassn/papers/3113ijassn01.pd

    Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction

    Get PDF
    Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction opportunities in accordance with their situation. However, it is difficult to secure spontaneous interaction as this requires authentication of the encountered device, in the absence of any prior knowledge of the device. In this paper we present a method for establishing and securing spontaneous interactions on the basis of emphspatial references that capture the spatial relationship of the involved devices. Spatial references are obtained by accurate sensing of relative device positions, presented to the user for initiation of interactions, and used in a peer authentication protocol that exploits a novel mechanism for message transfer over ultrasound to ensures spatial authenticity of the sender

    Synchronous Perfectly Secure Message Transmission with Optimal Asynchronous Fallback Guarantees

    Get PDF
    Secure message transmission (SMT) constitutes a fundamental network-layer building block for distributed protocols over incomplete networks. More specifically, a sender S\mathbf{S} and a receiver R\mathbf{R} are connected via β„“\ell disjoint paths, of which at most tt paths are controlled by the adversary. Perfectly-secure SMT protocols in synchronous and asynchronous networks are resilient up to β„“/2\ell/2 and β„“/3\ell/3 corruptions respectively. In this work, we ask whether it is possible to achieve a perfect SMT protocol that simultaneously tolerates ts<β„“/2t_s < \ell/2 corruptions when the network is synchronous, and ta<β„“/3t_a < \ell/3 when the network is asynchronous. We completely resolve this question by showing that perfect SMT is possible if and only if 2ta+ts<β„“2t_a + t_s < \ell. In addition, we provide a concretely round-efficient solution for the (slightly worse) trade-off ta+2ts<β„“t_a + 2t_s < \ell. As a direct application of our results, following the recent work by Appan, Chandramouli, and Choudhury [PODC\u2722], we obtain an nn-party perfectly-secure synchronous multi-party computation protocol with asynchronous fallback over any network with connectivity β„“\ell, as long as ta+3ts<nt_a + 3t_s <n and 2ta+ts<β„“2t_a + t_s < \ell
    • …
    corecore