13 research outputs found
Secure and authenticated access to LLN resources through policy constraints
Ubiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. Their intrinsic resource limitations however constitute critical requirements, such as security, a great challenge. When these nodes are associated with applications that might have an impact in user’s privacy or even become life threatening, the security issues are of primary concern. Access to these resources should be appropriately controlled to ensure that such wearable nodes are adequately protected. On the other hand, it is very important to not restrict access to only a very closed group of entities. This work presents a service oriented architecture that utilizes policy-based, unified, cross-platform and flexible access control to allow authenticated entities consume the services provided by wearable nodes while protecting their valuable resources
Recommended from our members
The THREAT-ARREST Cyber-Security Training Platform
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations. This paper presets a cyber security training platform, called THREAT-ARREST. The various platform modules can analyze an organization’s system, identify the most critical threats, and tailor a training program to its personnel needs. Then, different training programmes are created based on the trainee types (i.e. administrator, simple operator, etc.), providing several teaching procedures and accomplishing diverse learning goals. One of the main novelties of THREAT-ARREST is the modelling of these programmes along with the runtime monitoring, management, and evaluation operations. The platform is generic. Nevertheless, its applicability in a smart energy case study is detailed
Lightweight password hashing scheme for embedded systems
Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized. The limited and old-fashioned solutions led the international cryptographic community to conduct the Password Hashing Competition (PHC). The competition will propose a small portfolio of schemes suitable for widespread usage until 2015. Embedded systems form a special application domain, utilizing devices with inherent computational limitations. Lightweight cryptography focuses in designing schemes for such devices and targets moderate levels of security. In this paper, a lightweight poly PHS suitable for lightweight cryptography is presented. At first, we design two lightweight versions of the PHC schemes Catena and PolyPassHash. Then, we integrate them and implement the proposed scheme – called LightPolyPHS. A fair comparison with similar proposals on mainstream computer is presented
Lightweight Cryptography for Resource-Constrained Devices: A Comparative Study and Rectangle Cryptanalysis
International audienc
Nonlinear mixed Volterra-Fredholm integrodifferential equation with nonlocal condition
summary:The aim of the present paper is to investigate the global existence of mild solutions of nonlinear mixed Volterra-Fredholm integrodifferential equations, with nonlocal condition. Our analysis is based on an application of the Leray-Schauder alternative and rely on a priori bounds of solutions
SHIELD technology demonstrators
SHIELD technology demonstrators have been conceived to illustrate the functionalities of specific security, privacy, and dependability (SPD) technologies that, being domain independent, might be adopted in several application scenarios. The selected technologies have been introduced in Chapter 3, while this chapter provides more detailed information on their usage from a wider perspective. SHIELD technology demonstrators consist of laboratory prototypes and experiments that allow to test and evaluate all the functionalities offered by a SPD technology, rather than focusing on the specific functionality subset used in the domains presented in the previous chapters
A New Lightweight Encryption Approach for Correlated Content Exchange in Internet of Things
International audienc