18 research outputs found
Flexible Authentication in Vehicular Ad hoc Networks
A Vehicular Ad-Hoc Network (VANET) is a form of Mobile ad-hoc network, to
provide communications among nearby vehicles and between vehicles and nearby
fixed roadside equipment. The key operation in VANETs is the broadcast of
messages. Consequently, the vehicles need to make sure that the information has
been sent by an authentic node in the network. VANETs present unique challenges
such as high node mobility, real-time constraints, scalability, gradual
deployment and privacy. No existent technique addresses all these requirements.
In particular, both inter-vehicle and vehicle-to-roadside wireless
communications present different characteristics that should be taken into
account when defining node authentication services. That is exactly what is
done in this paper, where the features of inter-vehicle and vehicle-to-roadside
communications are analyzed to propose differentiated services for node
authentication, according to privacy and efficiency needs
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
This paper proposes a speed-up of a known-plaintext attack on some stream ciphers
based on Linear Feedback Shift Registers (LFSRs). The algorithm consists of two basic steps:
first, to guess the initial seed value of one of the LFSRs, and then to use the resulting binary
sequence in order to deduce useful information about the cipher parameters. In particular, the
proposed divide-and-conquer attack is based on a combination of graph-based techniques with
edit distance concepts. While the original edit distance attack requires the exhaustive search over
the set of all possible initial states of the involved LFSR, this work presents a new heuristic optimization
that avoids the evaluation of an important number of initial states through the identification
of the most promising branches of the search graph. The strongest aspects of the proposal
are the facts that the obtained results from the attack are absolutely deterministic, and that many
inconsistent initial states of the target LFSRs are recognized and avoided during search.This work was supported by the Spanish Ministry of Science and Innovation and European
FEDER Fund under Project TIN2008-02236/TSI as well as by CDTI (Spain)and the companies INDRA, Unin Fenosa, Tecnobit, Visual Tool, Brainstorm, SAC and
Technosafe under Project Cenit-HESPERIA.Peer reviewe
Secret Sharing Based on a Hard-on-Average Problem
The main goal of this work is to propose the design of secret sharing schemes
based on hard-on-average problems. It includes the description of a new
multiparty protocol whose main application is key management in networks. Its
unconditionally perfect security relies on a discrete mathematics problem
classiffied as DistNP-Complete under the average-case analysis, the so-called
Distributional Matrix Representability Problem. Thanks to the use of the search
version of the mentioned decision problem, the security of the proposed scheme
is guaranteed. Although several secret sharing schemes connected with
combinatorial structures may be found in the bibliography, the main
contribution of this work is the proposal of a new secret sharing scheme based
on a hard-on-average problem, which allows to enlarge the set of tools for
designing more secure cryptographic applications
Fuzzy-based forest fire prevention and detection by wireless sensor networks
Forest fires may cause considerable damages both in ecosystems and lives.
This proposal describes the application of Internet of Things and wireless
sensor networks jointly with multi-hop routing through a real time and dynamic
monitoring system for forest fire prevention. It is based on gathering and
analyzing information related to meteorological conditions, concentrations of
polluting gases and oxygen level around particular interesting forest areas.
Unusual measurements of these environmental variables may help to prevent
wildfire incidents and make their detection more efficient. A forest fire risk
controller based on fuzzy logic has been implemented in order to activate
environmental risk alerts through a Web service and a mobile application. For
this purpose, security mechanisms have been proposed for ensuring integrity and
confidentiality in the transmission of measured environmental information.
Lamport's signature and a block cipher algorithm are used to achieve this
objective
Deterministic Cryptanalysis of some Stream Ciphers
A new graph-based approach to edit distance cryptanalysis
of some clock-controlled generators is here presented in order to simplify
search trees of the original attacks. In particular, the proposed improve-
ment is based on cut sets de¯ned on some graphs so that only the most
promising branches of the search tree have to be analyzed because cer-
tain shortest paths provide the edit distances. The strongest aspects of
the proposal are: a) the obtained results from the attack are absolutely
deterministic and b) many inconsistent initial states are recognized be-
forehand and avoided during search.Peer reviewe
Differentiated Services to Provide Efficient Node Authentication in VANETs*
Node authentication in VANETs is one of the most
important research topics nowadays. VANETs
present unique challenges such as high node
mobility, real-time constraints, scalability, gradual
deployment and privacy. No existent technique
addresses all these requirements. In particular, both
inter-vehicle and vehicle-to-roadside wireless
communications present different characteristics
that should be taken into account when defining
node authentication services. That is exactly what is
done in this paper, where the features of intervehicle
and vehicle-to-roadside communications are
analyzed to propose differentiated services for node
authentication, according to privacy and efficiency
needs.Research partially supported by Spanish TIN2008-02236/TSI Project and HESPERIA
project within program CENITPeer reviewe