96 research outputs found
Privacy-Preserving Authenticated Key Exchange for Constrained Devices
In this paper we investigate the field of privacy-preserving authenticated key exchange protocols (PPAKE). First we make a cryptographic analysis of a previous PPAKE protocol. We show that most of its security properties, including privacy, are broken, despite the security proofs that are provided. Then we describe a strong security model which captures the security properties of a PPAKE: entity authentication, key indistinguishability, forward secrecy, and privacy. Finally, we present a PPAKE protocol in the symmetric-key setting which is suitable for constrained devices. We formally prove the security of this protocol in our model
Extended 3-Party ACCE and Application to LoRaWAN 1.1
LoRaWAN is an IoT protocol deployed worldwide. Whereas the first version 1.0 has been shown to be weak against several types of attacks, the new version 1.1 has been recently released, and aims, in particular, at providing corrections to the previous release. It introduces also a third entity, turning the original 2-party protocol into a 3-party protocol. In this paper, we provide the first security analysis of LoRaWAN 1.1 in its 3-party setting using a provable approach, and show that it suffers from several flaws. Based on the 3(S)ACCE model of Bhargavan et al., we then propose an extended framework that we use to analyse the security of LoRaWAN-like 3-party protocols, and describe a generic 3-party protocol provably secure in this extended model. We use this provable security approach to propose a slightly modified version of LoRaWAN 1.1. We show how to concretely instantiate this alternative, and formally prove its security in our extended model
Symmetric-key Authenticated Key Exchange (SAKE) with Perfect Forward Secrecy
Key exchange protocols in the asymmetric-key setting are known to provide stronger security properties than protocols in symmetric-key cryptography. In particular, they can provide perfect forward secrecy, as illustrated by key exchange protocols based on the Diffie-Hellman scheme. However public-key algorithms are too heavy for low-resource devices, which can then not benefit from forward secrecy. In this paper, we describe a scheme that solves this issue. Using a nifty resynchronisation technique, we propose an authenticated key exchange protocol in the symmetric-key setting that guarantees perfect forward secrecy. We prove that the protocol is sound, and provide a formal security proof
WfBench: Automated Generation of Scientific Workflow Benchmarks
The prevalence of scientific workflows with high computational demands calls
for their execution on various distributed computing platforms, including
large-scale leadership-class high-performance computing (HPC) clusters. To
handle the deployment, monitoring, and optimization of workflow executions,
many workflow systems have been developed over the past decade. There is a need
for workflow benchmarks that can be used to evaluate the performance of
workflow systems on current and future software stacks and hardware platforms.
We present a generator of realistic workflow benchmark specifications that
can be translated into benchmark code to be executed with current workflow
systems. Our approach generates workflow tasks with arbitrary performance
characteristics (CPU, memory, and I/O usage) and with realistic task dependency
structures based on those seen in production workflows. We present experimental
results that show that our approach generates benchmarks that are
representative of production workflows, and conduct a case study to demonstrate
the use and usefulness of our generated benchmarks to evaluate the performance
of workflow systems under different configuration scenarios
How genomics can help biodiversity conservation
The availability of public genomic resources can greatly assist biodiversity assessment, conservation, and restoration efforts by providing evidence for scientifically informed management decisions. Here we survey the main approaches and applications in biodiversity and conservation genomics, considering practical factors, such as cost, time, prerequisite skills, and current shortcomings of applications. Most approaches perform best in combination with reference genomes from the target species or closely related species. We review case studies to illustrate how reference genomes can facilitate biodiversity research and conservation across the tree of life. We conclude that the time is ripe to view reference genomes as fundamental resources and to integrate their use as a best practice in conservation genomics.info:eu-repo/semantics/publishedVersio
The era of reference genomes in conservation genomics
Progress in genome sequencing now enables the large-scale generation of reference genomes. Various international initiatives aim to generate reference genomes representing global biodiversity. These genomes provide unique insights into genomic diversity and architecture, thereby enabling comprehensive analyses of population and functional
genomics, and are expected to revolutionize conservation genomics
- …