210 research outputs found
BAN-GZKP: Optimal Zero Knowledge Proof based Scheme for Wireless Body Area Networks
BANZKP is the best to date Zero Knowledge Proof (ZKP) based secure
lightweight and energy efficient authentication scheme designed for Wireless
Area Network (WBAN). It is vulnerable to several security attacks such as the
replay attack, Distributed Denial-of-Service (DDoS) attacks at sink and
redundancy information crack. However, BANZKP needs an end-to-end
authentication which is not compliant with the human body postural mobility. We
propose a new scheme BAN-GZKP. Our scheme improves both the security and
postural mobility resilience of BANZKP. Moreover, BAN-GZKP uses only a
three-phase authentication which is optimal in the class of ZKP protocols. To
fix the security vulnerabilities of BANZKP, BAN-GZKP uses a novel random key
allocation and a Hop-by-Hop authentication definition. We further prove the
reliability of our scheme to various attacks including those to which BANZKP is
vulnerable. Furthermore, via extensive simulations we prove that our scheme,
BAN-GZKP, outperforms BANZKP in terms of reliability to human body postural
mobility for various network parameters (end-to-end delay, number of packets
exchanged in the network, number of transmissions). We compared both schemes
using representative convergecast strategies with various transmission rates
and human postural mobility. Finally, it is important to mention that BAN-GZKP
has no additional cost compared to BANZKP in terms memory, computational
complexity or energy consumption
BANZKP: a Secure Authentication Scheme Using Zero Knowledge Proof for WBANs
-Wireless body area network(WBAN) has shown great potential in improving
healthcare quality not only for patients but also for medical staff. However,
security and privacy are still an important issue in WBANs especially in
multi-hop architectures. In this paper, we propose and present the design and
the evaluation of a secure lightweight and energy efficient authentication
scheme BANZKP based on an efficient cryptographic protocol, Zero Knowledge
Proof (ZKP) and a commitment scheme. ZKP is used to confirm the identify of the
sensor nodes, with small computational requirement, which is favorable for body
sensors given their limited resources, while the commitment scheme is used to
deal with replay attacks and hence the injection attacks by committing a
message and revealing the key later. Our scheme reduces the memory requirement
by 56.13 % compared to TinyZKP [13], the comparable alternative so far for Body
Area Networks, and uses 10 % less energy
Optimal byzantine resilient convergence in oblivious robot networks
Given a set of robots with arbitrary initial location and no agreement on a
global coordinate system, convergence requires that all robots asymptotically
approach the exact same, but unknown beforehand, location. Robots are
oblivious-- they do not recall the past computations -- and are allowed to move
in a one-dimensional space. Additionally, robots cannot communicate directly,
instead they obtain system related information only via visual sensors. We draw
a connection between the convergence problem in robot networks, and the
distributed \emph{approximate agreement} problem (that requires correct
processes to decide, for some constant , values distance
apart and within the range of initial proposed values). Surprisingly, even
though specifications are similar, the convergence implementation in robot
networks requires specific assumptions about synchrony and Byzantine
resilience. In more details, we prove necessary and sufficient conditions for
the convergence of mobile robots despite a subset of them being Byzantine (i.e.
they can exhibit arbitrary behavior). Additionally, we propose a deterministic
convergence algorithm for robot networks and analyze its correctness and
complexity in various synchrony settings. The proposed algorithm tolerates f
Byzantine robots for (2f+1)-sized robot networks in fully synchronous networks,
(3f+1)-sized in semi-synchronous networks. These bounds are optimal for the
class of cautious algorithms, which guarantee that correct robots always move
inside the range of positions of the correct robots
Dynamic FTSS in Asynchronous Systems: the Case of Unison
Distributed fault-tolerance can mask the effect of a limited number of
permanent faults, while self-stabilization provides forward recovery after an
arbitrary number of transient fault hit the system. FTSS protocols combine the
best of both worlds since they are simultaneously fault-tolerant and
self-stabilizing. To date, FTSS solutions either consider static (i.e. fixed
point) tasks, or assume synchronous scheduling of the system components. In
this paper, we present the first study of dynamic tasks in asynchronous
systems, considering the unison problem as a benchmark. Unison can be seen as a
local clock synchronization problem as neighbors must maintain digital clocks
at most one time unit away from each other, and increment their own clock value
infinitely often. We present many impossibility results for this difficult
problem and propose a FTSS solution when the problem is solvable that exhibits
optimal fault containment
Dynamic Probabilistic Input Output Automata
We present probabilistic dynamic I/O automata, a framework to model dynamic probabilistic systems. Our work extends dynamic I/O Automata formalism of Attie & Lynch [Paul C. Attie and Nancy A. Lynch, 2016] to the probabilistic setting. The original dynamic I/O Automata formalism included operators for parallel composition, action hiding, action renaming, automaton creation, and behavioral sub-typing by means of trace inclusion. They can model mobility by using signature modification. They are also hierarchical: a dynamically changing system of interacting automata is itself modeled as a single automaton. Our work extends all these features to the probabilistic setting. Furthermore, we prove necessary and sufficient conditions to obtain the monotonicity of automata creation/destruction with implementation preorder. Our construction uses a novel proof technique based on homomorphism that can be of independent interest. Our work lays down the foundations for extending composable secure-emulation of Canetti et al. [Ran Canetti et al., 2007] to dynamic settings, an important tool towards the formal verification of protocols combining probabilistic distributed systems and cryptography in dynamic settings (e.g. blockchains, secure distributed computation, cybersecure distributed protocols, etc)
Optimal deterministic ring exploration with oblivious asynchronous robots
We consider the problem of exploring an anonymous unoriented ring of size
by identical, oblivious, asynchronous mobile robots, that are unable to
communicate, yet have the ability to sense their environment and take decisions
based on their local view. Previous works in this weak scenario prove that
must not divide for a deterministic solution to exist. Also, it is known
that the minimum number of robots (either deterministic or probabilistic) to
explore a ring of size is 4. An upper bound of 17 robots holds in the
deterministic case while 4 probabilistic robots are sufficient. In this paper,
we close the complexity gap in the deterministic setting, by proving that no
deterministic exploration is feasible with less than five robots whenever the
size of the ring is even, and that five robots are sufficient for any that
is coprime with five. Our protocol completes exploration in O(n) robot moves,
which is also optimal
Peak Transmission Rate Resilient Crosslayer Broadcast for Body Area Networks
International audienc
Tight Mobile Byzantine Tolerant Atomic Storage
This paper proposes the first implementation of an atomic storage tolerant to
mobile Byzantine agents. Our implementation is designed for the round-based
synchronous model where the set of Byzantine nodes changes from round to round.
In this model we explore the feasibility of multi-writer multi-reader atomic
register prone to various mobile Byzantine behaviors. We prove upper and lower
bounds for solving the atomic storage in all the explored models. Our results,
significantly different from the static case, advocate for a deeper study of
the main building blocks of distributed computing while the system is prone to
mobile Byzantine failures
RoboCast: Asynchronous Communication in Robot Networks
This paper introduces the \emph{RoboCast} communication abstraction. The
RoboCast allows a swarm of non oblivious, anonymous robots that are only
endowed with visibility sensors and do not share a common coordinate system, to
asynchronously exchange information. We propose a generic framework that covers
a large class of asynchronous communication algorithms and show how our
framework can be used to implement fundamental building blocks in robot
networks such as gathering or stigmergy. In more details, we propose a RoboCast
algorithm that allows robots to broadcast their local coordinate systems to
each others. Our algorithm is further refined with a local collision avoidance
scheme. Then, using the RoboCast primitive, we propose algorithms for
deterministic asynchronous gathering and binary information exchange
- âŠ