SwePub
Sök i SwePub databas

  Extended search

Träfflista för sökning "WFRF:(Peris Lopez P.) "

Search: WFRF:(Peris Lopez P.)

  • Result 1-23 of 23
Sort/group result
   
EnumerationReferenceCoverFind
1.
  •  
2.
  •  
3.
  •  
4.
  •  
5.
  •  
6.
  •  
7.
  •  
8.
  •  
9.
  •  
10.
  •  
11.
  •  
12.
  • Aumasson, J.P., et al. (author)
  • A note on a privacy-preserving distance-bounding protocol
  • 2011
  • In: Proceedings of the13th International Conference on Information and Communications Security (ICICS 2011). - Berlin, Heidelberg : Springer Berlin Heidelberg. - 9783642252426
  • Conference paper (peer-reviewed)abstract
    • Distance bounding protocols enable a device to establish an upper bound on the physical distance to a communication partner so as to prevent location spoofing, as exploited by relay attacks. Recently, Rasmussen and Čapkun (ACM-CCS'08) observed that these protocols leak information on the location of the parties to external observers, which is undesirable in a number of applications-for example if the leaked information leads to the identification of the parties among a group of devices. To remedy this problem, these authors proposed a "privacy-preserving" distance bounding protocol, i.e. that leaks no information on the location of the parties. The present paper reports results from an in-depth security analysis of that new protocol, with as main result an attack that recovers the ephemeral secrets as well as the location information of the two parties for particular choices of parameters. Overall, our results do not contradict the preliminary security analysis by the designers, but rather extends it to other parts of the attack surface. © 2011 Springer-Verlag.
  •  
13.
  • Mishra, Devesh, et al. (author)
  • Parabrachial Interleukin-6 Reduces Body Weight and Food Intake and Increases Thermogenesis to Regulate Energy Metabolism
  • 2019
  • In: Cell Reports. - : Elsevier BV. - 2211-1247. ; 26:11
  • Journal article (peer-reviewed)abstract
    • Chronic low-grade inflammation and increased serum levels of the cytokine IL-6 accompany obesity. For brain-produced IL-6, the mechanisms by which it controls energy balance and its role in obesity remain unclear. Here, we show that brain-produced IL-6 is decreased in obese mice and rats in a neuro-anatomically and sex-specific manner. Reduced IL-6 mRNA localized to lateral parabrachial nucleus (IPBN) astrocytes, microglia, and neurons, including paraventricular hypothalamus-innervating IPBN neurons. IL-6 microinjection into IPBN reduced food intake and increased brown adipose tissue (BAT) thermogenesis in male lean and obese rats by increasing thyroid and sympathetic outflow to BAT. Parabrachial IL-6 interacted with leptin to reduce feeding. siRNA-mediated reduction of IPBN IL-6 leads to increased weight gain and adiposity, reduced BAT thermogenesis, and increased food intake. Ambient cold exposure partly normalizes the obesity-induced suppression of IPBN IL-6. These results indicate that IPBN-produced IL-6 regulates feeding and metabolism and pinpoints (patho)physiological contexts interacting with IPBN IL-6.
  •  
14.
  • Mitrokotsa, Aikaterini, 1978, et al. (author)
  • Reid et al.'s distance bounding protocol and mafia fraud attacks over noisy channels
  • 2010
  • In: IEEE Communications Letters. - 1558-2558 .- 1089-7798. ; 14:2, s. 121-123
  • Journal article (peer-reviewed)abstract
    • Distance bounding protocols are an effective countermeasure against relay attacks including distance fraud, mafia fraud and terrorist fraud attacks. Reid et al. proposed the first symmetric key distance bounding protocol against mafia and terrorist fraud attacks [1]. However, [2] claims that this is only achieved with a (7/8) n probability of success for mafia fraud, rather than the theoretical value of (3/4) n (for n rounds) achieved by distance bounding protocols without a final signature. We prove that the mafia fraud attack success using the Reid et al. protocol is bounded by (3/4) n and reduces as noise increases. The proof can be of further interest as it is the first - to the best of our knowledge - detailed analysis of the effects of communication errors on the security of a distance bounding protocol. © 2010 IEEE.
  •  
15.
  • Ortiz-Martin, L., et al. (author)
  • Are the Interpulse Intervals of an ECG signal a good source of entropy? An in-depth entropy analysis based on NIST 800-90B recommendation
  • 2020
  • In: Future Generation Computer Systems-the International Journal of Escience. - : Elsevier BV. - 0167-739X. ; 105, s. 346-360
  • Journal article (peer-reviewed)abstract
    • In recent years many authors have explored the use of biological signals for security issues. In the context of cardiac signals, the use of Inter-Pulse Interval (IPI) values as a source of entropy is one of the most widely used solutions in the literature. To date, there is a broad consensus that the four least significant bits of each IPI are highly entropic and can be used, for instance, in the generation of a cryptographic key. In this article, we demonstrate that the choice of the IPI bits used to date may not be the most correct (e.g., the combination of bits 2638 are much better that the common assumed 5678). To come to our conclusions, we have done a rigorous and in-depth study, analyzing cardiac signals from more than 160,000 files from 19 databases of the Physionet public repository and basing our analysis on the NIST 800-90B recommendation. (C) 2019 Elsevier B.V. All rights reserved.
  •  
16.
  • Ortiz-Martin, Lara, et al. (author)
  • Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors
  • 2019
  • In: Future Generation Computer Systems. - : Elsevier BV. - 0167-739X. ; 96, s. 283-296
  • Journal article (peer-reviewed)abstract
    • In this paper we address the problem of how two devices that are sensing the same heart signal can generate the same cryptographic token by extracting them from the Inter-Pulse Intervals (IPIs) of each cardiac signal. Our analysis is based on the use of a run-time monitor, which is extracted from a formal model and verified against predefined properties, combined with a fuzzy extractor to improve the final result. We first show that it is impossible, in general, to correct the differences between the IPIs derived from two captured electrocardiogram (ECG) signals when using only error correction techniques, thus being impossible to corroborate previous claims on the feasibility of this approach. Then, we provide a large-scale evaluation of the proposed method (run-time monitor and fuzzy extractor) over 19 public databases from the Physionet repository containing heart signals. The results clearly show the practicality of our proposal achieving a 91% of synchronization probability for healthy individuals. Additionally, we also conduct an experiment to check how long the sensors should record the heart signal in order to generate tokens of 32, 64 and 128 bits. Contrarily to what it is usually assumed (6, 12, and 24 s for individuals with a heart rate of 80 beats-per-minute), the sensors have to wait 13, 28 and 56.5 s on median, respectively, to derive the same token from both sensors.
  •  
17.
  • Ortiz-Martin, L., et al. (author)
  • Heartbeats Do Not Make Good Pseudo-Random Number Generators: An Analysis of the Randomness of Inter-Pulse Intervals
  • 2018
  • In: Entropy. - : MDPI AG. - 1099-4300. ; 20:2, s. 1-19
  • Journal article (peer-reviewed)abstract
    • The proliferation of wearable and implantable medical devices has given rise to an interest in developing security schemes suitable for these systems and the environment in which they operate. One area that has received much attention lately is the use of (human) biological signals as the basis for biometric authentication, identification and the generation of cryptographic keys. The heart signal (e.g., as recorded in an electrocardiogram) has been used by several researchers in the last few years. Specifically, the so-called Inter-Pulse Intervals (IPIs), which is the time between two consecutive heartbeats, have been repeatedly pointed out as a potentially good source of entropy and are at the core of various recent authentication protocols. In this work, we report the results of a large-scale statistical study to determine whether such an assumption is (or not) upheld. For this, we have analyzed 19 public datasets of heart signals from the Physionet repository, spanning electrocardiograms from 1353 subjects sampled at different frequencies and with lengths that vary between a few minutes and several hours. We believe this is the largest dataset on this topic analyzed in the literature. We have then applied a standard battery of randomness tests to the extracted IPIs. Under the algorithms described in this paper and after analyzing these 19 public ECG datasets, our results raise doubts about the use of IPI values as a good source of randomness for cryptographic purposes. This has repercussions both in the security of some of the protocols proposed up to now and also in the design of future IPI-based schemes.
  •  
18.
  • Pastrana, S., et al. (author)
  • Evaluation of classification algorithms for intrusion detection in MANETs
  • 2012
  • In: Knowledge-Based Systems. - : Elsevier BV. - 0950-7051. ; 36, s. 217-225
  • Journal article (peer-reviewed)abstract
    • Mobile Ad hoc Networks (MANETs) are wireless networks without fixed infrastructure based on the cooperation of independent mobile nodes. The proliferation of these networks and their use in critical scenarios (like battlefield communications or vehicular networks) require new security mechanisms and policies to guarantee the integrity, confidentiality and availability of the data transmitted. Intrusion Detection Systems used in wired networks are inappropriate in this kind of networks since different vulnerabilities may appear due to resource constraints of the participating nodes and the nature of the communication. This article presents a comparison of the effectiveness of six different classifiers to detect malicious activities in MANETs. Results show that Genetic Programming and Support Vector Machines may help considerably in detecting malicious activities in MANETs. © 2012 Elsevier B.V. All rights reserved.
  •  
19.
  • Peris-Lopez, P., et al. (author)
  • A comprehensive RFID solution to enhance inpatient medication safety
  • 2011
  • In: International Journal of Medical Informatics. - : Elsevier BV. - 1386-5056. ; 80:1, s. 13-24
  • Journal article (peer-reviewed)abstract
    • Errors involving medication administration can be costly, both in financial and in human terms. Indeed, there is much potential for errors due to the complexity of the medication administration process. Nurses are often singled out as the only responsible of these errors because they are in charge of drug administration. Nevertheless, the interventions of every actor involved in the process and the system design itself contribute to errors (Wakefield et al. (1998) [23]). Proper inpatient medication safety systems can help to reduce such errors in hospitals. In this paper, we review in depth two recent proposals (Chien et al. (2010) [7]; Huang and Ku (2009) [12]) that pursue the aforementioned objective. Unfortunately, they fail in their attempt mainly due to their security faults but interesting ideas can be drawn from both. These security faults refer to impersonation and replay attacks that could produce the generation of a forged proof stating that certain medication was administered to an inpatient when it was not. We propose a leading-edge solution to enhance inpatient medication safety based on RFID technology that overcomes these weaknesses. Our solution, named Inpatient Safety RFID system (IS-RFID), takes into account the Information Technology (IT) infrastructure of a hospital and covers every phase of the drug administration process. From a practical perspective, our system can be easily integrated within hospital IT infrastructures, has a moderate cost, is very ease to use and deals with security aspects as a key point. © 2010 Elsevier Ireland Ltd.
  •  
20.
  • Safkhani, M., et al. (author)
  • On the traceability of tags in SUAP RFID authentication protocols
  • 2012
  • In: 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012. ; , s. 292-296
  • Conference paper (peer-reviewed)abstract
    • RFID technology is one of the most pervasive computing technologies with important advantages and a wide range of applications. Nevertheless, the widespread adoption of RFID technology mainly depends on fixing the security and privacy concerns of this technology. Using a tagged object should not lead to the traceability of this object. This concern is a challenging issue that has motivated the proposal of several authentication protocols that attempted to fix the traceability problem. In this paper, we analyze the security of three authentication protocols that have been recently proposed by Morshed et al. [2]. Our security analysis clearly highlights important security pitfalls in these protocols that lead to their vulnerability against traceability. The proposed attacks require only several runs of the protocols while the adversary's advantages to trace the tagged object are maximal. © 2012 IEEE.
  •  
21.
  • Safkhani, M., et al. (author)
  • Weaknesses in another Gen2-based RFID authentication protocol
  • 2012
  • In: 2012 IEEE International Conference on RFID-Technologies and Applications, RFID-TA 2012. ; , s. 80-84
  • Conference paper (peer-reviewed)abstract
    • There is a high need for secure authentication protocols conforming with the EPC Class-1 Generation 2 (Gen2 in short) standard. The security analyses of the new born authentication protocols provide some guidelines and lessons that should be considered in the design of new proposals. In this paper, we scrutinize the security of a Gen2 based RFID authentication protocol which has been recently proposed by Yi et al. [8]. Our security analysis highlights important security pitfalls in this proposal. More precisely, we show a simple approach to desynchronize the tag and the reader. Moreover, we present tag impersonation and reader impersonation attacks. Finally, we show how the use of random numbers does not prevent traceability attack. The success probability of all the proposed attacks is 1 and their complexity is minimal since at most one eavesdropped session of the protocol is required. © 2012 IEEE.
  •  
22.
  • Seepers, R.M., et al. (author)
  • Peak misdetection in heart-beat-based security: Characterization and tolerance
  • 2014
  • In: 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2014; Chicago; United States; 26 August 2014 through 30 August 2014. - 9781424479290 ; , s. 5401-5405
  • Conference paper (peer-reviewed)abstract
    • The Inter-Pulse-Interval (IPI) of heart beats has previously been suggested for security in mobile health (mHealth) applications. In IPI-based security, secure communication is facilitated through a security key derived from the time difference between heart beats. However, there currently exists no work which considers the effect on security of imperfect heart-beat (peak) detection. This is a crucial aspect of IPI-based security and likely to happen in a real system. In this paper, we evaluate the effects of peak misdetection on the security performance of IPI-based security. It is shown that even with a high peak detection rate between 99.9% and 99.0%, a significant drop in security performance may be observed (between -70% and -303%) compared to having perfect peak detection. We show that authenticating using smaller keys yields both stronger keys as well as potentially faster authentication in case of imperfect heart beat detection. Finally, we present an algorithm which tolerates the effect of a single misdetected peak and increases the security performance by up to 155%.
  •  
23.
  • Strydis, C., et al. (author)
  • A System Architecture, Processor, and Communication Protocol for Secure Implants
  • 2013
  • In: Transactions on Architecture and Code Optimization. - : Association for Computing Machinery (ACM). - 1544-3973 .- 1544-3566. ; 10:4, s. artcle nr. 57-23
  • Journal article (peer-reviewed)abstract
    • Secure and energy-efficient communication between Implantable Medical Devices (IMDs) and authorized external users is attracting increasing attention these days. However, there currently exists no systematic approach to the problem, while solutions from neighboring fields, such as wireless sensor networks, are not directly transferable due to the peculiarities of the IMD domain. This work describes an original, efficient solution for secure IMD communication. A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores. Wireless communication goes through a custom security ASIP, called SISC (Smart-Implant Security Core), which runs an energy-efficient security protocol. The security core is powered by RF-harvested energy until it performs external-reader authentication, providing an elegant defense mechanism against battery Denial-of-Service (DoS) and other, more common attacks. The system has been evaluated based on a realistic case study involving an artificial pancreas implant. When synthesized for a UMC 90nm CMOS ASIC technology, our system architecture achieves defense against unauthorized accesses having zero energy cost, running entity authentication through harvesting only 7.45 mu J of RF energy from the requesting entity. In all other successfully authenticated accesses, our architecture achieves secure data exchange without affecting the performance of the main IMD functionality, adding less than 1% (1.3mJ) to the daily energy consumption of a typical implant. Compared to a singe-core, secure reference IMD, which would still be more vulnerable to some types of attacks, our secure system on chip (SoC) achieves high security levels at 56% energy savings and at an area overhead of less than 15%.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-23 of 23

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view