SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "L773:9781450320030 "

Sökning: L773:9781450320030

  • Resultat 1-3 av 3
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Alexiou, Nikolaos, 1985-, et al. (författare)
  • VeSPA : Vehicular security and privacy-preserving architecture
  • 2013
  • Ingår i: HotWiSec 2013. - New York, NY, USA : ACM. - 9781450320030 ; , s. 19-23
  • Konferensbidrag (refereegranskat)abstract
    • Vehicular Communications (VC) are reaching a near deploment phase and will play an important role in improving road safety, driving efficiency and comfort. The industry and the academia have reached a consensus for the need of a Public Key Infrastructure (PKI), in order to achieve security, identity management, vehicle authentication, as well as preserve vehicle privacy. Moreover, a gamut of proprietary and safety applications, such as location-based services and pay-as-you-drive systems, are going to be offered to the vehicles. The emerging applications are posing new challenges for the existing Vehicular Public Key Infrastructure (VPKI) architectures to support Authentication, Authorization and Accountability (AAA), without exposing vehicle privacy. In this work we present an implementation of a VPKI that is compatible with the VC standards. We propose the use of tickets as cryptographic tokens to provide AAA and also preserve vehicle privacy against adversaries and the VPKI. Finally, we present the efficiency results of our implementation to prove its applicability.
  •  
2.
  • Giannetsos, Thanassis, et al. (författare)
  • Spy-sense : Spyware tool for executing stealthy exploits against sensor networks
  • 2013
  • Ingår i: HotWiSec 2013 - Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy. - New York, NY, USA : ACM. - 9781450320030 ; , s. 7-11
  • Konferensbidrag (refereegranskat)abstract
    • As the domains of pervasive computing and sensor networking are expanding, a new era is emerging, enabling the design and proliferation of intelligent sensor-based applications. At the same time, it is important to maintain a high degree of confidentiality, integrity and availability of both the data and network resources. However, a common threat that is often overlooked in the design of secure sensor network applicationsis the existence of spyware programs. This work demonstrates Spy-Sense, a spyware tool that allows the injection of stealthy exploits in the nodes of a sensor network. Spy-Sense is hard to recognize and get rid of, and once activated, it runs discretely in the background without interfering or disrupting normal network operation. To the best of our knowledge, this is the first instance of a spyware program that can be used to attack the confidentiality and functionality of a sensor network.
  •  
3.
  • Hummen, Rene, et al. (författare)
  • Towards viable certificate-based authentication for the Internet of Things
  • 2013
  • Ingår i: HotWiSec 2013 - Proceedings of the 2013 ACM Workshop on Hot Topics on Wireless Network Security and Privacy. - New York, NY, USA : ACM. - 9781450320030 ; , s. 37-41
  • Konferensbidrag (refereegranskat)abstract
    • The vision of the Internet of Things considers smart objects in the physical world as first-class citizens of the digital world. Especially IP technology and RESTful web services on smart objects promise simple interactions with Internet services in the Web of Things, e.g., for building automation or in e-health scenarios. Peer authentication and secure data transmission are vital aspects in many of these scenarios to prevent leakage of personal information and harmful actuating tasks. While standard security solutions exist for traditional IP networks, the constraints of smart objects demand for more lightweight security mechanisms. Thus, the use of certificates for peer authentication is predominantly considered impracticable. In this paper, we investigate if this assumption is valid. To this end, we present preliminary overhead estimates for the certificate-based DTLS handshake and argue that certificates - with improvements to the handshake - are a viable method of authentication in many network scenarios. We propose three design ideas to reduce the overheads of the DTLS handshake. These ideas are based on (i) pre-validation, (ii) session resumption, and (iii) handshake delegation. We qualitatively analyze the expected overhead reductions and discuss their applicability. 
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-3 av 3

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy