34 research outputs found

    Lightweight certificateless and provably-secure signcryptosystem for the internet of things

    Get PDF
    International audienceIn this paper, we propose an elliptic curve-based signcryption scheme derived from the standardized signature KCDSA (Korean Certificate-based Digital Signature Algorithm) in the context of the Internet of Things. Our solution has several advantages. First, the scheme is provably secure in the random oracle model. Second, it provides the following security properties: outsider/insider confidentiality and unforgeability; non-repudiation and public verifiability, while being efficient in terms of communication and computation costs. Third, the scheme offers the certificateless feature, so certificates are not needed to verify the user's public keys. For illustration, we conducted experimental evaluation based on a sensor Wismote platform and compared the performance of the proposed scheme to concurrent scheme

    Secure P2P Data Storage and Maintenance

    Get PDF
    P2P data storage requires strong reliability and security assurances. Existing data storage solutions have been designed for centralized as well as distributed settings; yet they do not address the security and cooperation issues raised by self-organization. P2P systems also introduce new needs regarding data availability due to the dynamicity of the infrastructure, which are unaddressed so far. This paper first discusses the approaches for tackling these problems. A solution is then introduced that relies on self-organizing security mechanisms in conjunction with a data rejuvenation scheme using erasure codes

    Network Security in Industrial Wireless Sensor Networks

    No full text
    International audienceWireless sensor networks (WSNs) consist of a large number of autonomous devices that are spatially distributed to monitor physical or environmental conditions. WSNs can be deployed anywhere and do not require heavy infrastructure or wires. Such flexibility and inexpensive deployment motivate their wide adoption, notably by industrial applications. WSNs are then used to monitor and control industrial processes, assets, and physical environments, as well as to track mobile workers and monitor their health

    Probabilistically secure cooperative distributed storage

    No full text

    Securing ad hoc storage through probabilistic cooperation assessment

    No full text

    Secure P2P data storage and maintenance

    No full text

    Securing cooperative backup for mobile systems

    No full text

    A game theoretical approach in securing P2P storage against whitewashers

    No full text

    Securing P2P storage with a self-organizing payment scheme

    No full text

    A reputation system for self-organizing storage

    No full text
    corecore