International Journal of Network Security

Displaying 1-40 of 94 results

  • White Papers // Nov 2013

    A Study of Attribute-based Proxy Re-encryption Scheme in Cloud Environments

    Attribute-Based Proxy Re-Encryption (ABPRE) scheme is one of the proxy cryptography, which can delegate the re-encryption capability to the proxy and re-encrypt the encrypted data by using the re-encryption key. ABPRE extending the traditional proxy cryptography and attributes plays an important role. In ABPRE, users are identified by attributes, and...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Privacy Protection Data Access Control

    For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information brings the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi and WiMAX

    As wireless networks are finally coming of age, people and organizations start to implement critical applications and infrastructures based on them. As most wireless net-work standards have been designed with security as an afterthought, severe security shortcomings were the results and several improvements and amendments were necessary to fix the...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Robust and Efficient Timestamp-Based Remote User Authentication Scheme with Smart Card Lost Attack Resistance

    Password-based authentication scheme with smart card is an important part of security for accessing remote servers. In 2011, Awasthi et al. proposed an improved timestamp-based remote user authentication scheme to eliminate the attacks in Shen et al.'s. However, the authors find that their scheme is vulnerable to the privileged insider,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    Secure Requirement Prioritized Grid Scheduling Model

    Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important aspect of distributed computing. As grid computing is a form of distributed computing with heterogeneous resources working...

    Provided By International Journal of Network Security

  • White Papers // Nov 2013

    A Secure and Energy E

    Data dissemination is important concept in Wireless Sensor Networks (WSN). In this paper, the authors propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. These metric guides those routes to be chosen that consume...

    Provided By International Journal of Network Security

  • White Papers // Oct 2013

    Analysis of the WSN MAC Protocols under Jamming DoS Attack

    Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Security Analysis of a Dynamic ID-Based Authentication Scheme for Multi-Server Environment Using Smart Cards

    As one of the simplest and the most convenient mechanism to ensure secure communication in open networks, user authentication scheme has been studied widely. To guarantee secure communications in multi-server environment, Lee et al. proposed a dynamic ID-based remote user authentication scheme using smart card. They also demonstrated that their...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    ID-Based Deniable Authentication Protocol Based on Diffie-Hellman Problem on Elliptic Curve

    Now-a-days, authentication had emerged to be an essential communication process in key establishment. Deniable authentication protocol enables a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for providing secure negotiation...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    Wireless Honeypot: Framework, Architectures and Tools

    Even though a spectrum of security solutions exists, the lack of knowledge about the exploitation methods used to compromise wireless networks is threatening the free and easy usage of wireless technologies in commercial world. Wireless Honeypot has come up as a recent solution to evaluate and assess the security in...

    Provided By International Journal of Network Security

  • White Papers // Sep 2013

    A Survey on Various Cyber Attacks and Their Classification

    The role of computers and the Internet in modern society is well recognized. Recent developments in the fields of networking and cyberspace have greatly benefited mankind, but the rapid growth of cyberspace has also contributed to unethical practices by individuals who are bent on using the technology to exploit others....

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks

    Many Denial-Of-Service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly. This becomes more important in a cognitive wireless network employing Dynamic Spectrum Access (DSA), where it is easier for the attackers to launch DOS attacks....

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    The Impact of Resource Consumption Attack on Mobile Ad-Hoc Network Routing

    Mobile Ad Hoc NETwork (MANET) is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure and no centralized control. Each mobile node in such a scenario acts as both a router and host. Security is an important issue in...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    A Survey on Attribute-Based Encryption Schemes of Access Control in Cloud Environments

    In Attribute-Based Encryption (ABE) scheme, attributes play a very important role. Attributes have been exploited to generate a public key for encrypting data and have been used as an access policy to control users' access. The access policy can be categorized as either key-policy or ciphertext-policy. The key-policy is the...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Security Flaw of an ECC-Based Signcryption Scheme with Anonymity

    Confidentiality, integrity, non-repudiation and authentication are the important requirements for many cryptographic applications. A traditional approach to achieve these requirements is to sign-then-encrypt the message. Signcryption, first proposed by the researchers, is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

    RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications,...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model

    A lattice Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme is presented, in which the ciphertext policy achieved is the AND-gates on multi-valued attributes. The previous construction with AND-gates on multi-valued attributes as ciphertext policy is based on bilinear paring technology. In this paper, inspired by the recent progress of lattice...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of a Secure Batch Verification with Group Testing for VANET

    Vehicular communication networking can provide well-suited traffic messages, emergency warning messages and infotainment dissemination, and improve driving condition for drivers. The authentication of these information is particularly important in VANET since the wrong traffic information may result in traffic accident and traffic jam. And VANET requires short verifying delay to...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Trust-based Multi-Path Routing for Enhancing Data Security in MANETs

    Mobile Ad hoc NETworks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    A Fault Based Attack on MDS-AES

    In this paper a fault based attack on MDS-AES has been proposed. It has been shown that inducing random byte fault at the input of the ninth round of the MDS-AES algorithm the key can be retrieved. Simulation shows that two faulty cipher text pairs are required to deduce the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Comments on FHH Anonymous Multireceiver Encryption

    Anonymous multi-receiver identity-based encryption, which holds the security of confidentiality and anonymity, has many practical applications such as pay-TV, secure email delivery and copyright distribution and so on. Since Boneh and Franklin construct a practical identity-based encryption with bilinear pairing, several multi-receiver identity-based encryptions were proposed. Recently, in order to...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Anonymous Multi-Receiver Encryption Based on RSA

    With the rapid development of information and network technologies, communication security has become an important issue in many applications. There are many public-key based encryption schemes proposed in the literature. Network applications are no longer just one-to-one type of communication; but it involves multiple receivers (>1) (e.g., multicast transmission). One-to-one...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    An Access Control Mechanism Based on the Generalized Aryabhata Remainder Theorem

    In this paper, the authors propose a novel access control mechanism using the single-key-lock system and the Generalized Aryabhata Remainder Theorem (GART), in which each user is associated with a key and each digital file with a lock. Their mechanism possesses three unique features, a high efficiency of constructing the...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Provably Secure Conference Key Distribution Mechanism Preserving the Forward and Backward Secrecy

    Due to the explosive development of emerging applications such as, Multicast service, Pay-TV systems, Teleconference, and Collaborate tasks, engineers have proposed many conference key distribution mechanisms. Hwang et al. recently proposed an efficient group key exchange method for providing secure multicast communications, which is a transformation from the two-party key...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection

    Bots are malicious software components used for generating Spams, launching denial of service attacks, phishing, identity theft and information exhfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here, the authors propose a bot detection mechanism for a single host. A user...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    Cryptanalysis of NTRU with two Public Keys

    The NTRU public key cryptosystem is a ring-based cryptosystem that was first introduced in the rump session at Crypto'96. It is one of the fastest public-key cryptosystems, offering both encryption (NTRUencrypt) and digital signatures (NTRUSign). It is a relatively new cryptosystem that appears to be more efficient than the current...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    A Steganographic Method Based on DCT and New Quantization Technique

    In this paper, an efficient data hiding technique based on the Discrete Cosine Transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits are embedded in all frequency component of the quantized DCT coefficient using Least Significant-Bit...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Improved Fault Attack Against Eta Pairing

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been developed. With the enhancement of implementation efficiency, the algorithms of pairings are usually embedded in identity aware devices such as smartcards. Although many fault attacks and countermeasures for public key and elliptic curve cryptographic systems...

    Provided By International Journal of Network Security

  • White Papers // Feb 2013

    Fault Attack Against Miller's Algorithm for Even Embedding Degree

    In recent years, an increasing number of cryptographic protocols based on bilinear pairings have been proposed. Pairing based cryptosystems are usually embedded in resource constrained devices such as FPGAs and smart cards. While side channel attacks have imposed serious threats to such cryptography applications. Miller's algorithm is a critical step...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    Provably Secure Routing Protocol for Wireless Mesh Networks

    Ensuring security of an underlying routing protocol in Wireless Mesh Network (WMN) is a crucial issue because of the multi-hop communication environment and wireless media. This has been realized by various researchers, and several secure routing protocols have been proposed to ad-dress the security vulnerabilities. In this paper, the authors...

    Provided By International Journal of Network Security

  • White Papers // Dec 2012

    An Efficient MQV Key Agreement Scheme

    The researcher proposed the first key agreement protocol (MQV) that employs a signature to sign Diffe-Hellman public keys without using a one-way hash function. The IEEE Standard Committee adopted the MQV protocol as a standard. In order to establish multiple common secret keys between two parties, Harn and Lin proposed...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secured Rfid Mutual Authentication Scheme for Mifare Systems

    This research study and analyze the various attacks RFID card on Mifare's disadvantage and safety concerns crux of the problem. The key recovery attack method depends on a plaintext-ciphertext pair on the existing relationship, as well as the secret parameters of the pseudo random number for use of the timing...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Malware Detection, Supportive Software Agents and Its Classification Schemes

    Over time, the task of curbing the emergence of malware and its dastard activities has been identified in terms of analysis, detection and containment of malware. Malware is a general term that is used to describe the category of malicious software that is part of security threats to the computer...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Quantum Based Challenge-Response User Authentication Scheme Over Noiseless Channel

    In this paper, the authors propose a quantum user authentication protocol with a single photon based on short shared secret key and quantum bit error ratio verification. In this scheme, usage of proposed deterministic quantum key distribution technique and simple verification in a public channel culminate reduced photon transmission. Security's...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Modelling and Verification of Extensible Authentication Protocol Using SPIN Model Checker

    The Extensible Authentication Protocol (EAP) is a framework for transporting authentication credentials. EAP offers simpler interoperability and compatibility across authentication methods. EAP supports multiple authentication methods. In this paper, the authors have modeled the Extensible Authentication Protocol as a finite state machine. The various entities in their model are Authenticator,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Secure Key Management Protocol in WIMAX

    The Worldwide Interoperability for Microwave Access (WIMAX /IEEE 802.16), is new technology based on wireless metropolitan area network. Security of connections access in WIMAX /IEEE 802.16 is complete with respect to the Privacy Key Management (PKM) protocol. The protocol is responsible for providing the secure distribution of keying data from...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    A Novel Multipoint Relay Based Secure Routing in MANET

    Security in routing is a challenging issue in Mobile Ad-hoc (MANET) NETwork because of its open nature, infrastructure less property, mobility and energy constraints. Messages typically roam in multi-hopped fashion and nodes may be powered by limited energy source and with limited physical security. So, the authors proposed a new...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Network Threat Characterization in Multiple Intrusion Perspectives Using Data Mining Technique

    For effective security incidence response on the network, a reputable approach must be in place at both protected and unprotected region of the network. This is because compromise in the demilitarized zone could be precursor to threat inside the network. The improved complexity of attacks in present times and vulnerability...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Removal of Certificates from Set Protocol Using Certificateless Public Key Cryptography

    Secure Electronic Transaction (SET) is a standard e-commerce protocol for securing credit card transactions over insecure networks. In a transaction using SET, all the members need public key certificates in order to authenticate their public key. Certificates are created by Certificate Authorities (CAs), The process of getting certificates from a...

    Provided By International Journal of Network Security

  • White Papers // Nov 2012

    Review on IPv6 Security Vulnerability Issues and Mitigation Methods

    One of the main purposes of Internet Protocol version 6 (IPv6) developments was to solve the IP address depletion concern due to the burgeoning growth of the Internet users. The new Internet protocol provides end-to-end communication, enhanced security and extensibility apart from the other features such as address auto-configuration or...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Parallel Misuse and Anomaly Detection Model

    In this paper, a novel hybrid model is being proposed for misuse and anomaly detection. C4.5 based binary decision trees are used for misuse and CBA (Classification Based Association) based classifier is used for anomaly detection. Firstly, the C4.5 based decision tree separates the network traffic into normal and attack...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Differential Epidemic Model of Virus and Worms in Computer Network

    A differential electronic Susceptible-Infectious-Removed-Susceptible (e-SIRS) epidemic model of virus and worms in a computer network has been formulated. Latent period, immune period and time for self replication have been considered. Stability of the result is stated in terms of the threshold parameter. The authors have derived an explicit formula for...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    A New Secure Route Discovery Protocol for MANETs to Prevent Hidden Channel Attacks

    In this paper, the authors propose a new secure route discovery protocol for MANETs that overcomes the vulnerabilities of Ariadne and EndairA, due to hidden channel attacks. It uses 'authentic neighborhood' for route discovery process which potentially protects hidden channels of routing control packets, besides ensuring authenticity and integrity of...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Securing Harari's Authentication Scheme

    Code-based authentication schemes are very fast and efficient for implementation in small devices. The security of these schemes and the size of underlying coding matrices are often the main barriers to their use in practice. In this paper, the authors remove the security flaw of a classical code-based authentication scheme...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Reliable and Low Cost RFID Based Authentication System for Large Scale Deployment

    Identification is very important nowadays; whether there is need to identify persons, animals or objects, RFIDs provide a very good solution to the problem of identification and authentication. No one can deny the importance of authentication, it is done at the airport, at the railway station, in the library etc,...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing

    Only identities of the server and the user are authenticated in traditional smart cards based password authentication schemes, but the platform does not be verified, and which cannot provide enough protection on personal information of the user. A mutual authentication scheme based on smart cards and password is proposed under...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    An Efficient Password Authentication Scheme for Smart Card

    Remote user authentication using smart cards is a good solution for many e-based applications. Smart card implementation ensures secure communications. Several schemes using timestamp for remote authentication have already been proposed. However these are vulnerable to certain types of forgery attack. Yang-Wang-Chang proposed an improved timestamp associated password authentication scheme...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings

    A non-interactive, simple and efficient Publicly Verifiable Secret Sharing (PVSS) is constructed based on the bi-linear pairing on elliptic curves, which has all advantages of Schoenmakers' PVSS. Moreover, in the scheme's distribution of shares phase, only using bilinearity of bilinear paring, anybody can verify that the participants received whether correct...

    Provided By International Journal of Network Security

  • White Papers // May 2012

    Enhancing Koyama Scheme Using Selective Encryption Technique in RSA-Based Singular Cubic Curve with AVK

    In this paper, the authors analyze application of Selective Encryption with Automatic Variable Key (AVK) for text based documents in Koyama Public Key Cryptosystem (PKC). In this paper, a new robust and simple PKC based singular cubic curve cryptosystem over the ring Zn, using selective encryption with Automatic Variable Key...

    Provided By International Journal of Network Security

  • White Papers // Nov 2010

    A Novel Digital Envelope Approach for A Secure E-Commerce Channel

    Data privacy and integrity will be the crucial and significant factors in recent times for trade which will be transacted over the Internet through e-commerce and m-commerce channels. To deal with these anxieties, various security etiquettes related to symmetric and asymmetric key types have been framed. Digital Envelope is one...

    Provided By International Journal of Network Security

  • White Papers // Jul 2009

    A Survey on Distributed Access Control Systems for Web Business Processes

    Middleware influenced the research community in developing a number of systems for controlling access to distributed resources. Now-a-days a new paradigm for lightweight integration of business resources has started to hold Business Processes for Web Services. Authorization and access control policies for Web Services protocols and distributed systems are well-studied...

    Provided By International Journal of Network Security

  • White Papers // Nov 2010

    A New Secure Remote User Authentication Scheme with Smart Cards

    Remote user authentication scheme is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. These types of schemes are applicable to the areas such as computer networks, wireless networks, remote login systems, operation systems and database management systems. The goal of...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Trust-based Multi-Path Routing for Enhancing Data Security in MANETs

    Mobile Ad hoc NETworks (MANETs) are comprised of highly mobile nodes that communicate with each other without relying on a pre-existing network infrastructure. Therefore they are ideally suited for use in rescue and emergency operations. Due to their applications in situations such as emergencies, crisis management, military and healthcare, message...

    Provided By International Journal of Network Security

  • White Papers // May 2010

    Using Predicate-based Model Checker for Verifying E-Commerce Protocols

    Over the past decade, researchers have demonstrated that the technique of model checking can be extremely effective when applied to security or E-commerce protocols. Model checking is the process of determining whether a formal model of the analyzed system satisfies a correctness property specified as a temporal logic formula. Model...

    Provided By International Journal of Network Security

  • White Papers // Jun 2012

    A Pairing-free ID-based Key Agreement Protocol with Different PKGs

    In this paper, the authors proposed an identity based key agreement protocol based on Elliptic Curve Cryptography (ECC) between users of different networks with independent Private Key Generations (PKGs). Instead of bilinear pairings which commonly used for contracting identity based schemes, the proposed protocol makes use of elliptic curves to...

    Provided By International Journal of Network Security

  • White Papers // Sep 2012

    A Biometric Approach for Continuous User Authentication by Fusing Hard and Soft Traits

    Most existing computer and network systems authenticate a user only at the initial login session. This could be a critical security weakness, especially for high-security systems because it enables an impostor to access the system resources with the initial access permission. To address this security flaw, Continuous authentication of the...

    Provided By International Journal of Network Security

  • White Papers // Jan 2010

    A Secure and Energy Efficient Data Dissemination Protocol for Wireless Sensor Networks

    Data dissemination is important concept in Wireless Sensor Networks (WSN). In this paper, the authors propose a secure and energy efficient data dissemination protocol for WSN. A routing metric is defined to choose the best route from the available routes. These metric guides those routes to be chosen that consume...

    Provided By International Journal of Network Security

  • White Papers // Oct 2007

    Security for Mobile Operators in Practice

    Mobile operators are organizations that have to manage a great amount of critical information, including legal sensitive subscriber data. A number of assessment projects on the infrastructures of major mobile operators, revealed a number of vulnerabilities that if exploited may lead to important business impact. This paper is to publish...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    User Traffic Profile for Traffic Reduction and Effective Bot C&C Detection

    Bots are malicious software components used for generating Spams, launching denial of service attacks, phishing, identity theft and information exhfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here, the authors propose a bot detection mechanism for a single host. A user...

    Provided By International Journal of Network Security

  • White Papers // May 2013

    Comments on FHH Anonymous Multireceiver Encryption

    Anonymous multi-receiver identity-based encryption, which holds the security of confidentiality and anonymity, has many practical applications such as pay-TV, secure email delivery and copyright distribution and so on. Since Boneh and Franklin construct a practical identity-based encryption with bilinear pairing, several multi-receiver identity-based encryptions were proposed. Recently, in order to...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of a Secure Batch Verification with Group Testing for VANET

    Vehicular communication networking can provide well-suited traffic messages, emergency warning messages and infotainment dissemination, and improve driving condition for drivers. The authentication of these information is particularly important in VANET since the wrong traffic information may result in traffic accident and traffic jam. And VANET requires short verifying delay to...

    Provided By International Journal of Network Security

  • White Papers // Oct 2013

    Analysis of the WSN MAC Protocols under Jamming DoS Attack

    Wireless Sensor Network (WSN) is a wireless network consisting of small nodes with sensing, computation, and wireless communications capabilities. The design of wireless sensor networks depends of many factors, such as transmission errors, network topology and power consumption. Many routing protocols, protocols for data transmission, are specifically designed for wireless...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    The Impact of Resource Consumption Attack on Mobile Ad-Hoc Network Routing

    Mobile Ad Hoc NETwork (MANET) is a temporary network of mobile nodes where mobile nodes communicate with each other through wireless links with no fixed infrastructure and no centralized control. Each mobile node in such a scenario acts as both a router and host. Security is an important issue in...

    Provided By International Journal of Network Security

  • White Papers // Jul 2013

    Quickest Detection of Denial-of-Service Attacks in Cognitive Wireless Networks

    Many Denial-Of-Service (DOS) attacks in wireless networks, such as jamming, will cause significant performance degradation to the network and thus need to be detected quickly. This becomes more important in a cognitive wireless network employing Dynamic Spectrum Access (DSA), where it is easier for the attackers to launch DOS attacks....

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    Lattice Ciphertext Policy Attribute-based Encryption in the Standard Model

    A lattice Ciphertext Policy Attribute Based Encryption (CP-ABE) scheme is presented, in which the ciphertext policy achieved is the AND-gates on multi-valued attributes. The previous construction with AND-gates on multi-valued attributes as ciphertext policy is based on bilinear paring technology. In this paper, inspired by the recent progress of lattice...

    Provided By International Journal of Network Security

  • White Papers // Jun 2013

    On the Security of Moessner's and Khan's Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

    RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. Due to the increasing popularity of RFID applications,...

    Provided By International Journal of Network Security

  • White Papers // Jul 2009

    On the Order of Round Components in the AES

    In this paper, the authors analyses all 24 possible round constructions using different combinations of the four round components of the AES cipher: SubBytes, ShiftRows, AddRoundKey and MixColumns. They investigate how the different round orderings affect the security of AES against differential, linear, multiset, impossible differential and boomerang attacks. The...

    Provided By International Journal of Network Security

  • White Papers // Jul 2009

    A New Involutory MDS Matrix for the AES

    This paper proposes a new, large diffusion layer for the AES block cipher. This new layer replaces the ShiftRows and MixColumns operations by a new involutory matrix in every round. The objective is to provide complete diffusion in a single round, thus sharply improving the overall cipher security. Moreover, the...

    Provided By International Journal of Network Security

  • White Papers // Mar 2013

    A Steganographic Method Based on DCT and New Quantization Technique

    In this paper, an efficient data hiding technique based on the Discrete Cosine Transform (DCT) of image is proposed. In this technique, the DCT coefficient is quantized using a predefined mathematical operation then the secret bits are embedded in all frequency component of the quantized DCT coefficient using Least Significant-Bit...

    Provided By International Journal of Network Security

  • White Papers // Sep 2009

    Acceleration of the Elliptic Cryptography with Vector Finite Fields

    The most computationally efficient Digital Signature (DS) algorithms are based on Elliptic Curves (ECs) over finite fields. The well known DS standards ECDSA and GOST R 34.10 specify EC-based algorithms over the ground fields GF(p). However in many cases of the practical use of DS algorithms there are required the...

    Provided By International Journal of Network Security

  • White Papers // Sep 2009

    An Adaptive Chosen-Plaintext Attack of the Improved Cellular Message Encryption Algorithm

    In this paper, the authors analyzes the improved Cellular Message En-cryption Algorithm (CMEA-I) which is an improved version of the Telecommunication Industry Association's Cellular Message Encryption Algorithm (CMEA). They present a chosen-plaintext attack of CMEA-I which requires less than 850 plaintexts in its adaptive version. This demonstrates that the improvements...

    Provided By International Journal of Network Security

  • White Papers // Nov 2009

    Knapsack Based ECC Encryption and Decryption

    Elliptic Curve Cryptography provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman Key Exchange algorithm. Encryption and Decryption of texts and messages have also been attempted. This paper presents the implementation of ECC by first transforming the message into an affine point on the EC,...

    Provided By International Journal of Network Security

  • White Papers // Nov 2009

    A Proxy Blind Signature Scheme Over Braid Groups

    Proxy signatures, Introduced by Mambo, Usuda and Okamoto, allow a designated person called proxy signer, to sign on behalf of an original signer. According to the delegation type, the proxy signatures are classified as full delegation, partial delegation and delegation by warrant. The proxy signature plays an important role in...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    On Post Decryption Error Probability in Counter Mode Operation with Explicit Counter Transmittal

    Communications channels are prone to errors due to various physical impairments. Although application of error correcting codes overcomes or reduces the impact of these errors, residual errors can pass through undetected in some cases. These residual errors can in turn have significant impact on the transmitted data if it is...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    A New Secure Multicast Key Distribution Protocol Using Combinatorial Boolean Approach

    In this paper, the authors propose a new protocol for a scalable multicast key distribution protocol. The proposed protocol is based on Key Management using Boolean Function Minimization (KM-BFM) technique. It is considered one of the best solutions proposed for solving the scalability of multicast security protocols depending on a...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    Short Signatures from Difficulty of Factorization Problem

    Public key cryptosystems based on hard mathematical problems are well approved for information authentication with digital signatures. An important practical problem is developing Digital Signature Schemes (DSSes) with short signature length. In general the minimum signature length provided by a DSS depends on the required security level that can be...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    Ordered Semiring-Based Trust Establish Model with Risk Evaluating

    Distributed trust management supports the provision of the required levels in a flexible and scalable manner by locally discriminating between the entities with which a principal should interact. However, there is a tension between the preservation of privacy and the controlled release of information when an entity submits credentials for...

    Provided By International Journal of Network Security

  • White Papers // Jan 2009

    The New Block Cipher: BC2

    In this paper, the authors propose a new block cipher called BC2 (Block Cipher 2). They make a cipher using components that are believed secure. The structure of BC2 is very simple. They use Feistel network with input-output 128 bits, matrix Maximum Distance Separable (MDS) 8x8 with branch number 9...

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Improving Security Through Analysis of Log Files Intersections

    In today's business environment almost all companies have their computers connected to the public Internet. As the number of companies with computers and services accessible to the Internet increases, a corresponding increase in the number of attacks against these businesses is also observed. Network-based attacks on business computers have been...

    Provided By International Journal of Network Security

  • White Papers // Jul 2008

    Parallel Hardware Architectures for the Cryptographic Tate Pairing

    Pairings play an important role in Identity-Based Encryption (IBE). Such form of cryptography was introduced by Shamir where a public key is derived from public identifiable information such as an e-mail address, and the corresponding private key is created by binding the user identity with a trusted authority's secret key....

    Provided By International Journal of Network Security