Institut Eurecom

Displaying 1-20 of 20 results

  • White Papers // May 2013

    Privacy Preserving Products Tracking in Clustered Supply Chain

    One of the main applications of supply chain management is product tracking. The authors define it as tracing the product path along the supply chain. In this paper, they propose a solution to track the product while preserving the privacy of the supply chain actors involved and the path traced....

    Provided By Institut Eurecom

  • White Papers // Jan 2013

    Towards Network Containment in Malware Analysis Systems

    This paper focuses on the containment and control of the network interaction generated by malware samples in dynamic analysis environments. A currently unsolved problem consists in the existing dependency between the execution of a malware sample and a number of external hosts (e.g. C&C servers). This dependency affects the repeatability...

    Provided By Institut Eurecom

  • White Papers // Jan 2012

    Have Things Changed Now - an Empirical Study on Input Validation Vulnerabilities in Web Applications

    Web applications have become important services in the people daily lives. Millions of users use web applications to obtain information, perform financial transactions, have fun, socialize, and communicate. Unfortunately, web applications are also frequently targeted by attackers. Recent data from SANS institute estimates that up to 60% of Internet attacks...

    Provided By Institut Eurecom

  • White Papers // Jan 2012

    2LQoS - Two-Layered Quality-of-Service Model for Routing in Mobile Ad Hoc Networks

    This paper presents a quality of service routing model for mobile ad hoc networks. The authors' model considers the characteristics of MANET and emulates Intserv and Diffserv in that at application layer it uses end-to-end mechanisms for path establishment and at the network layer it utilizes a coding scheme to...

    Provided By Institut Eurecom

  • White Papers // Feb 2011

    Diversity-Multiplexing Tradeoff for the Non-Separated Two-Way Relay DF Channel

    This paper establishes Diversity-Multiplexing Trade-off (DMT) of the four-phase Decode-and-Forward (DF) protocol in the half-duplex, non-separated two-way relay channel. The authors consider a fading channel model where the source relay links are Rayleigh distributed but the direct link between sources is left more general as Nakagami-m distributed and investigate for...

    Provided By Institut Eurecom

  • White Papers // Feb 2011

    Tracker: Security and Privacy for RFID-Based Supply Chains

    The counterfeiting of pharmaceutics or luxury objects is a major threat to supply chains today. As different facilities of a supply chain are distributed and difficult to monitor, malicious adversaries can inject fake objects into the supply chain. This paper presents TRACKER, a protocol for object genuineness verification in RFID...

    Provided By Institut Eurecom

  • White Papers // Feb 2011

    PPS: Privacy-Preserving Statistics Using RFID Tags

    As RFID applications are entering the daily life, many new security and privacy challenges arise. However, current research in RFID security focuses mainly on simple authentication and privacy-preserving identification. In this paper, the authors widen the scope of RFID security and privacy by introducing a new application scenario. The suggested...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Efficient Multicast Packet Authentication

    Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote distribution. However, this turns out to be a quite...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Improving Proactive Routing in VANETs With the MOPR Movement Prediction Framework

    Wireless vehicular communications are attracting more and more interests for applied research in industries. Most of the efforts are spent in deploying Vehicular Mobile Ad-Hoc NETworks (VANETs) for applications such as active safety and Internet services. This paper addresses routing problem in VANETs for applications related to comfort and infotainment...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    On Stability and Sampling Schemes for Wireless Sensor Networks

    The authors consider a wireless sensor network in which the sensor nodes are sources of delay insensitive traffic that needs to be transferred in a multi-hop fashion to a common processing center. They consider two data sampling schemes: the sensor nodes have a sampling process independent of the transmission scheme,...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Analyzing the Performance of a Self Organizing Framework for Wireless Sensor-Actuator Networks

    Wireless Sensor-Actuator Networks (WSANs) refer to a group of sensors and actuators linked by a wireless medium to perform distributed sensing and acting tasks. In order to provide effective sensing and acting, coordination mechanisms are required among sensors and actuators. The authors have presented the architectural design of a self...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    On the Application of Mobility Predictions to Multipoint Relaying in MANETs: Kinetic Multipoint Relays

    In this paper, the authors discuss the improvements multipoint relays may experience by the use of mobility predictions. Multi-Point Relaying (MPR) is a technique to reduce the number of redundant retransmissions while diffusing a broadcast message in the network. The algorithm creates a dominating set where only selected nodes are...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Analysis of Content Distribution Architectures in P2P Systems

    This paper takes a novel perspective to P2P networking. Can a P2P system be used for the distribution of files with time-critical data such as relevant software patches or virus footprints updates? The authors examine and compare different distribution architectures based on linear and tree topologies built on top of...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Overview of the WIDENS Architecture, a Wireless Ad Hoc Network for Public Safety

    This paper highlights preliminary results and status for the European Project entitled WIreless DEployable Network System (WIDENS). The purpose of this Industry/Academia collaborative research effort is to design, prototype and validate a vertically integrated rapidly deployable and scalable communication system for future public safety, emergency and disaster applications. In such...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Low-Energy, Adaptive, and Distributed MAC Protocol for Wireless Sensor-Actuator Networks

    Sensor-actuator networks are often limited in battery capacity and processing power. Therefore, it is exigent to develop solutions that are both energy and delay efficient. In this paper, the authors propose a low-energy and delay-sensitive TDMA based MAC for Wireless Sensor-Actuator Networks (WSANs). These networks are organized into clusters and...

    Provided By Institut Eurecom

  • White Papers // Sep 2010

    Distributed Multicell-MISO Precoding Using the Layered Virtual SINR Framework

    In this paper, the authors address the problem of distributed multi-antenna cooperative transmission in a cellular system. Most research in this area has so far assumed that base stations not only have the data dedicated to all the users but also share the full Channel State Information (CSI). In what...

    Provided By Institut Eurecom

  • White Papers // Jun 2010

    An Optimal Probabilistic Solution for Information Confinement, Privacy, and Security in RFID Systems

    In this paper, the authors provide the following contributions to enhance the security of RFID based systems. First, they assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, they devise a technique to make RFID identification...

    Provided By Institut Eurecom

  • White Papers // Mar 2010

    Team Decision for the Cooperative MIMO Channel With Imperfect CSIT Sharing

    The authors consider the problem of joint MIMO precoding across multiple distant cooperating transmitters. The transmitters are assumed to be sharing user data and aim at serving a group of users in a distributed MIMO broadcast-like fashion. Among application scenarios, they find the so-called network MIMO setup. The novelty of...

    Provided By Institut Eurecom

  • White Papers // Jan 2010

    Implementation and Validation of a Multicast Routing Protocol in an Ad Hoc Network Testbed

    Authors present the experiences in implementing and validating the Multicast Routing protocol with Dynamic Core (MRDC) in a real wireless ad hoc network testbed. The testbed consists of portable PCs and PDAs to reduce hardware cost and facilitate mobility test. The architecture of MRDC has been designed and introduced into...

    Provided By Institut Eurecom

  • White Papers // Aug 2009

    Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring

    Hop-by-hop data aggregation is a very important technique used to reduce the communication overhead and energy expenditure of sensor nodes during the process of data collection in a Wireless Sensor Network (WSN). However, the unattended nature of WSNs calls for data aggregation techniques to be secure. Indeed, sensor nodes can...

    Provided By Institut Eurecom

  • White Papers // Jan 2010

    Implementation and Validation of a Multicast Routing Protocol in an Ad Hoc Network Testbed

    Authors present the experiences in implementing and validating the Multicast Routing protocol with Dynamic Core (MRDC) in a real wireless ad hoc network testbed. The testbed consists of portable PCs and PDAs to reduce hardware cost and facilitate mobility test. The architecture of MRDC has been designed and introduced into...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Efficient Multicast Packet Authentication

    Providing authentication mechanisms for IP-Multicast streams is paramount for the development of large scale commercial multicast content delivery applications. This need is particularly strong for the delivery of real time content, such as live video/audio news events or financial stock quote distribution. However, this turns out to be a quite...

    Provided By Institut Eurecom

  • White Papers // Feb 2011

    Tracker: Security and Privacy for RFID-Based Supply Chains

    The counterfeiting of pharmaceutics or luxury objects is a major threat to supply chains today. As different facilities of a supply chain are distributed and difficult to monitor, malicious adversaries can inject fake objects into the supply chain. This paper presents TRACKER, a protocol for object genuineness verification in RFID...

    Provided By Institut Eurecom

  • White Papers // Feb 2011

    PPS: Privacy-Preserving Statistics Using RFID Tags

    As RFID applications are entering the daily life, many new security and privacy challenges arise. However, current research in RFID security focuses mainly on simple authentication and privacy-preserving identification. In this paper, the authors widen the scope of RFID security and privacy by introducing a new application scenario. The suggested...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Improving Proactive Routing in VANETs With the MOPR Movement Prediction Framework

    Wireless vehicular communications are attracting more and more interests for applied research in industries. Most of the efforts are spent in deploying Vehicular Mobile Ad-Hoc NETworks (VANETs) for applications such as active safety and Internet services. This paper addresses routing problem in VANETs for applications related to comfort and infotainment...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    On Stability and Sampling Schemes for Wireless Sensor Networks

    The authors consider a wireless sensor network in which the sensor nodes are sources of delay insensitive traffic that needs to be transferred in a multi-hop fashion to a common processing center. They consider two data sampling schemes: the sensor nodes have a sampling process independent of the transmission scheme,...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Analyzing the Performance of a Self Organizing Framework for Wireless Sensor-Actuator Networks

    Wireless Sensor-Actuator Networks (WSANs) refer to a group of sensors and actuators linked by a wireless medium to perform distributed sensing and acting tasks. In order to provide effective sensing and acting, coordination mechanisms are required among sensors and actuators. The authors have presented the architectural design of a self...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    On the Application of Mobility Predictions to Multipoint Relaying in MANETs: Kinetic Multipoint Relays

    In this paper, the authors discuss the improvements multipoint relays may experience by the use of mobility predictions. Multi-Point Relaying (MPR) is a technique to reduce the number of redundant retransmissions while diffusing a broadcast message in the network. The algorithm creates a dominating set where only selected nodes are...

    Provided By Institut Eurecom

  • White Papers // Sep 2010

    Distributed Multicell-MISO Precoding Using the Layered Virtual SINR Framework

    In this paper, the authors address the problem of distributed multi-antenna cooperative transmission in a cellular system. Most research in this area has so far assumed that base stations not only have the data dedicated to all the users but also share the full Channel State Information (CSI). In what...

    Provided By Institut Eurecom

  • White Papers // Feb 2011

    Diversity-Multiplexing Tradeoff for the Non-Separated Two-Way Relay DF Channel

    This paper establishes Diversity-Multiplexing Trade-off (DMT) of the four-phase Decode-and-Forward (DF) protocol in the half-duplex, non-separated two-way relay channel. The authors consider a fading channel model where the source relay links are Rayleigh distributed but the direct link between sources is left more general as Nakagami-m distributed and investigate for...

    Provided By Institut Eurecom

  • White Papers // Mar 2010

    Team Decision for the Cooperative MIMO Channel With Imperfect CSIT Sharing

    The authors consider the problem of joint MIMO precoding across multiple distant cooperating transmitters. The transmitters are assumed to be sharing user data and aim at serving a group of users in a distributed MIMO broadcast-like fashion. Among application scenarios, they find the so-called network MIMO setup. The novelty of...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Analysis of Content Distribution Architectures in P2P Systems

    This paper takes a novel perspective to P2P networking. Can a P2P system be used for the distribution of files with time-critical data such as relevant software patches or virus footprints updates? The authors examine and compare different distribution architectures based on linear and tree topologies built on top of...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Overview of the WIDENS Architecture, a Wireless Ad Hoc Network for Public Safety

    This paper highlights preliminary results and status for the European Project entitled WIreless DEployable Network System (WIDENS). The purpose of this Industry/Academia collaborative research effort is to design, prototype and validate a vertically integrated rapidly deployable and scalable communication system for future public safety, emergency and disaster applications. In such...

    Provided By Institut Eurecom

  • White Papers // Jan 2012

    Have Things Changed Now - an Empirical Study on Input Validation Vulnerabilities in Web Applications

    Web applications have become important services in the people daily lives. Millions of users use web applications to obtain information, perform financial transactions, have fun, socialize, and communicate. Unfortunately, web applications are also frequently targeted by attackers. Recent data from SANS institute estimates that up to 60% of Internet attacks...

    Provided By Institut Eurecom

  • White Papers // Jun 2010

    An Optimal Probabilistic Solution for Information Confinement, Privacy, and Security in RFID Systems

    In this paper, the authors provide the following contributions to enhance the security of RFID based systems. First, they assume that among multiple servers storing the information related to the tags some of them can be compromised. For this new threat scenario, they devise a technique to make RFID identification...

    Provided By Institut Eurecom

  • White Papers // Jan 2011

    Low-Energy, Adaptive, and Distributed MAC Protocol for Wireless Sensor-Actuator Networks

    Sensor-actuator networks are often limited in battery capacity and processing power. Therefore, it is exigent to develop solutions that are both energy and delay efficient. In this paper, the authors propose a low-energy and delay-sensitive TDMA based MAC for Wireless Sensor-Actuator Networks (WSANs). These networks are organized into clusters and...

    Provided By Institut Eurecom

  • White Papers // Aug 2009

    Confidentiality and Integrity for Data Aggregation in WSN Using Peer Monitoring

    Hop-by-hop data aggregation is a very important technique used to reduce the communication overhead and energy expenditure of sensor nodes during the process of data collection in a Wireless Sensor Network (WSN). However, the unattended nature of WSNs calls for data aggregation techniques to be secure. Indeed, sensor nodes can...

    Provided By Institut Eurecom

  • White Papers // Jan 2012

    2LQoS - Two-Layered Quality-of-Service Model for Routing in Mobile Ad Hoc Networks

    This paper presents a quality of service routing model for mobile ad hoc networks. The authors' model considers the characteristics of MANET and emulates Intserv and Diffserv in that at application layer it uses end-to-end mechanisms for path establishment and at the network layer it utilizes a coding scheme to...

    Provided By Institut Eurecom

  • White Papers // Jan 2013

    Towards Network Containment in Malware Analysis Systems

    This paper focuses on the containment and control of the network interaction generated by malware samples in dynamic analysis environments. A currently unsolved problem consists in the existing dependency between the execution of a malware sample and a number of external hosts (e.g. C&C servers). This dependency affects the repeatability...

    Provided By Institut Eurecom

  • White Papers // May 2013

    Privacy Preserving Products Tracking in Clustered Supply Chain

    One of the main applications of supply chain management is product tracking. The authors define it as tracing the product path along the supply chain. In this paper, they propose a solution to track the product while preserving the privacy of the supply chain actors involved and the path traced....

    Provided By Institut Eurecom