In this paper, an authorization framework toward the protection of sensitive resources in the context of cross-enterprise scenarios is presented. The proposed framework is founded on the utilization of a semantic information model, which integrates individual privacy preferences, organizational access control rules, and information handling policies into the authorization determination procedure. Partners within the framework are organized in a bridged federated architecture in order to ensure the semantic and trust interoperability of the emerging transactions.
In this work, we intend to carry out optimized spread-spectrum multiuser data hiding under a given digital image. We give an orthogonal set of embedding spread-spectrum signatures that achieve maximum sum signal-to-interference-plus-noise ratio (sum-SINR) at the output of the linear-filter receivers for any fixed embedding amplitude values. Then, for any given total embedding distortion constraint, we present the optimal multi-signature assignment and amplitude allocation that maximizes the sum capacity of the concealment procedure.
In this paper, we propose the notion of n-evasive all-but-many lossy trapdoor functions and show two constructions of it. The first construction is based on the decisional composite residuosity assumption, and the second one is from chameleon hash functions and all-but-n lossy trapdoor functions. Both of the constructions are based on reasonable assumptions with tight security reductions.
This paper presents a new encryption algorithm that addresses the strict avalanche criterion in wireless communication channels. The performance of the proposed algorithm is evaluated in different channel conditions and is shown to outperform well-known standardized encryption algorithms in terms of the probability of correct reception, security, and complexity.
We design a novel and complete cloud storage system with the following contributions: (i) our proposed protocol possesses essential functionalities, such as user anonymity, data dynamics, and data integrity; (ii) our scheme not only can protect users but also guarantees cloud server providers against loss; (iii) our scheme can resist most famous attacks; and (iv) we implement the system on our workstation and apply the result to show that the performance of our proposed scheme is efficient.
In order to maximize the data security and secure transmission around radio frequency identification (RFID) network, theoretical model of the quantum key management system based on RFID is introduced. Novelties in this research are security keys of which quantum cryptography is being utilized in RFID network with continuous key updates. To maximize the security and minimize the complexity in key management, quantum cryptography with Grover's algorithm is introduced as a method in RFID network environments and is proved.
Authentication is crucial for large-scale advanced metering infrastructure (AMI), which is one of the most prominent features of smart grids. However, AMI's natural requirements—efficiency, scalability, fault diagnoses, and reliability—cannot be fully satisfied by existing authentication schemes. Our efficient authentication architecture is proposed for AMI. We not only integrate a set of efficient authentication schemes but also design corresponding fault diagnosis algorithms. Our system is implemented on emulated smart meters and commodity servers. Experimental results demonstrate its high efficiency.
In this paper, we suggest a single authentication through, a scheme to access any ubiquitous service with single authentication at initial stage for efficiently identifying an object moving multiple convergences spaces. This is performed by enabling distributed smart cameras to deliver identifiers temporarily generated during the object's handover.
Using pseudonyms and dummy distance to destination information, the proposed location preserved contention based routing protocol can achieve 11.7% improvement on network performance and a higher level of location privacy protection compared with the second best protocol-contention-based forwarding active selection.
This non-cryptographic authentication scheme, with relay of one-time key, offers an efficient security solution to medical cyber-physical systems. The holistic analysis of medical processes and healthcare adversaries leads to utilizing the unique features present in wireless body area network. The novel design builds on a secure architecture across physical world and cyber space with strategic resource allocation for economic security.
Multi-Factor Biometric Authentication (MFBA) comes to be a promising technology to enhance the security in wireless communication. Several attacks to some existing MFBA schemes have been demonstrated. A modified MFBA scheme has been proposed with security formal analysis using BAN-logic, which demonstrates that the modified scheme with slight high computation costs can protect against several possible attacks.
Securing authentication and verification for ad hoc vehicles permits a new vehicle to join in a platoon through collaborating with t existing vehicles and thereby to accomplish identity authentication and integrity verification.
We proposed a distributed node replica detection mechanism in mobile wireless sensor networks. The mechanism uses residual energy information of a node to detect replica in the network. The proposed mechanism has higher detection probability, and lower detection time and communication overhead.
Automated Covert Channel Modeling is an accurate and reliable approach that converts the general description of covert channel algorithms to a fully functional executable code. This code can be used in a simulation environment or a real network platform to establish a covert communication channel. The main objective of defining this framework is to observe and analyze the behavior of diverse covert channel algorithms and their characteristic, in order to be able to study effective solutions for detecting and disrupting covert communication.
In this article, we propose three channel impulse response (CIR) based physical layer authentication schemes, which exploit the inherent properties of CIR to enhance the authentication reliability under a binary hypothesis testing in mobile communications. Specifically, the reliability of authentication is enhanced by mitigating the noise components of CIR estimates, deriving CIR difference based on a channel predictor, and observing multiple CIR differences in the final decision, respectively.
Observe that some special properties of the diffusion layers of word-oriented substitution-permutation network block ciphers can be exploited to facilitate the meet-in-the-middle fault attacks on the ciphers. Mount efficient meet-in-the-middle fault attacks on ARIA and AES are based on our observations.
Please check your email for instructions on resetting your password.
If you do not receive an email within 10 minutes, your email address may not be registered,
and you may need to create a new Wiley Online Library account.
Request Username
Can't sign in? Forgot your username?
Enter your email address below and we will send you your username
If the address matches an existing account you will receive an email with instructions to retrieve your username