360,590 research outputs found
Crypton: CRYptographic Prefixes for Route Optimization in NEMO
Proceedings of: 2010 IEEE International Conference on Communications (ICC 2010), 23-27 May, 2010, Cape Town, South AfricaThe aviation community is in the process of designing the next generation Aeronautical Telecommunications
Network (ATN), based on Internet standards, to provide airground
communications for the aircraft. Support for mobile
networks in the current Internet architecture is provided by
the NEtwork Mobility (NEMO) protocol. As currently defined,
NEMO Basic Support protocol lacks of Route Optimization
support which is an essential requirement for its adoption as
part of the next generation ATN. This paper presents a novel
security tool, the Crypto Prefixes, and their application to the
Route Optimization in Nemo (CRYPTRON). The Crypto Prefixes
are IPv6 prefixes with embedded cryptographic information that
enable the Mobile Network Prefix proof-of ownership without
any centralized trust infrastructure. In CRYPTRON, the Crypto
Prefixes are used to protect the establishment of the bindings on
the Correspondent Nodes for the whole Mobile Network PrefixEuropean Community's Seventh Framework ProgramPublicad
On the Security of the Automatic Dependent Surveillance-Broadcast Protocol
Automatic dependent surveillance-broadcast (ADS-B) is the communications
protocol currently being rolled out as part of next generation air
transportation systems. As the heart of modern air traffic control, it will
play an essential role in the protection of two billion passengers per year,
besides being crucial to many other interest groups in aviation. The inherent
lack of security measures in the ADS-B protocol has long been a topic in both
the aviation circles and in the academic community. Due to recently published
proof-of-concept attacks, the topic is becoming ever more pressing, especially
with the deadline for mandatory implementation in most airspaces fast
approaching.
This survey first summarizes the attacks and problems that have been reported
in relation to ADS-B security. Thereafter, it surveys both the theoretical and
practical efforts which have been previously conducted concerning these issues,
including possible countermeasures. In addition, the survey seeks to go beyond
the current state of the art and gives a detailed assessment of security
measures which have been developed more generally for related wireless networks
such as sensor networks and vehicular ad hoc networks, including a taxonomy of
all considered approaches.Comment: Survey, 22 Pages, 21 Figure
Strongly Secure Communications Over the Two-Way Wiretap Channel
We consider the problem of secure communications over the two-way wiretap
channel under a strong secrecy criterion. We improve existing results by
developing an achievable region based on strategies that exploit both the
interference at the eavesdropper's terminal and cooperation between legitimate
users. We leverage the notion of channel resolvability for the multiple-access
channel to analyze cooperative jamming and we show that the artificial noise
created by cooperative jamming induces a source of common randomness that can
be used for secret-key agreement. We illustrate the gain provided by this
coding technique in the case of the Gaussian two-way wiretap channel, and we
show significant improvements for some channel configurations.Comment: 11 pages, 7 figures, submitted to IEEE Transactions on Information
Forensics and Security, Special Issue: "Using the Physical Layer for Securing
the Next Generation of Communication Systems
Performance evaluation of a technology independent security gateway for Next Generation Networks
With the all IP based Next Generation Networks being deployed around the world, the use of real-time multimedia service applications is being extended from normal daily communications to emergency situations. However, currently different emergency providers utilise differing networks and different technologies. As such, conversations could be terminated at the setup phase or data could be transmitted in plaintext should incompatibility issues exit between terminals. To this end, a novel security gateway that can provide the necessary security support for incompatible terminals was proposed, developed and implemented to ensure the successful establishment of secure real-time multimedia conversations. A series of experiments were conducted to evaluate the security gateway through the use 40 Boghe softphone acting as the terminals. The experimental results demonstrate that the best performance of the prototype was achieved by utilising a multithreading and multi-buffering technique, with an average of 582 microseconds processing overhead. Based upon the ITU-Ts 150 milliseconds one way delay recommendation for voice communications, it is envisaged that such a marginal overhead will not be noticed by users in practice
Recommended from our members
PLECO: New energy-aware programming languages and eco-systems for the Internet of Things
This paper outlines the aims of the Programming Language ECO-system (PLECO) to create new energy-aware programming languages and eco-systems for the Internet of Things (IoT). It builds upon the Lantern language and focuses on energy-awareness, security, resilience and communications for the large infrastructure underpinning the next generation of IoT. The paper outlines how IoT applications and deployments need to be developed in an energy-aware, secure and cost-effective manner using new secure, robust and energy-focused programming languages and the importance of taking such an approach
- …