13 research outputs found

    Secure and authenticated access to LLN resources through policy constraints

    Get PDF
    Ubiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great challenge. When these nodes are associated with applications that might have an impact in user’s privacy or even become life threatening, the security issues are of primary concern. Access to these resources should be appropriately controlled to ensure that such wearable nodes are adequately protected. On the other hand, it is very important to not restrict access to only a very closed group of entities. This work presents a service oriented architecture that utilizes policy-based, unified, cross-platform and flexible access control to allow authenticated entities consume the services provided by wearable nodes while protecting their valuable resources

    Lightweight password hashing scheme for embedded systems

    Get PDF
    Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized. The limited and old-fashioned solutions led the international cryptographic community to conduct the Password Hashing Competition (PHC). The competition will propose a small portfolio of schemes suitable for widespread usage until 2015. Embedded systems form a special application domain, utilizing devices with inherent computational limitations. Lightweight cryptography focuses in designing schemes for such devices and targets moderate levels of security. In this paper, a lightweight poly PHS suitable for lightweight cryptography is presented. At first, we design two lightweight versions of the PHC schemes Catena and PolyPassHash. Then, we integrate them and implement the proposed scheme – called LightPolyPHS. A fair comparison with similar proposals on mainstream computer is presented

    Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis

    No full text
    International audienc

    Nonlinear mixed Volterra-Fredholm integrodifferential equation with nonlocal condition

    Get PDF
    summary:The aim of the present paper is to investigate the global existence of mild solutions of nonlinear mixed Volterra-Fredholm integrodifferential equations, with nonlocal condition. Our analysis is based on an application of the Leray-Schauder alternative and rely on a priori bounds of solutions

    SHIELD technology demonstrators

    No full text
    SHIELD technology demonstrators have been conceived to illustrate the functionalities of specific security, privacy, and dependability (SPD) technologies that, being domain independent, might be adopted in several application scenarios. The selected technologies have been introduced in Chapter 3, while this chapter provides more detailed information on their usage from a wider perspective. SHIELD technology demonstrators consist of laboratory prototypes and experiments that allow to test and evaluate all the functionalities offered by a SPD technology, rather than focusing on the specific functionality subset used in the domains presented in the previous chapters
    corecore