Politecnico di Torino

Displaying 1-40 of 85 results

  • White Papers // Dec 2013

    Efficient Protocols for Secure Broadcast in Controller Area Networks

    Controller Area Network (CAN) is a bus commonly used by controllers inside vehicles and in various industrial control applications. In the past controllers were assumed to operate in secure perimeters, but today these environments are well connected to the outside world and recent incidents showed them extremely vulnerable to cyber-attacks....

    Provided By Politecnico di Torino

  • White Papers // Oct 2013

    Bridging Dolev-Yao Adversaries and Control Systems with Time-Sensitive Channels

    Defining security objectives for industrial control scenarios is a challenging task due to the subtle interactions between system components and because security goals are often far from obvious. Moreover, there is a persistent gap between formal models for channels and adversaries (usually, transition systems) and models for control systems (differential...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks

    Despite realistic concerns, security inside vehicular buses (such as CAN) is still absent mostly due to technical challenges: low bandwidth and processing power, low cost margins, etc. Here, the authors design an efficient protocol based entirely on simple symmetric primitives that takes advantage of two interesting procedures which they call...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    A Layer-Based, Matric Oriented Business Process Simulation Solution

    In this paper, the authors review and compare different business process modeling techniques, reveal their capabilities and use a combination of their elements to create a model of applicable simulation solution that is easy to understand on the one hand but enables integration of innovative complex dynamics on the other...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    Knowledge Intensive Processes as a Challenge for Business Process Simulation

    This paper presents literature review and theoretical background for simulation of knowledge intensive processes. In the beginning it describes the concept of knowledge economy - environment, in which most modern organizations have to operate. In the next step it tries to define what knowledge intensity means as well as what...

    Provided By Politecnico di Torino

  • White Papers // May 2013

    Features and Functions of a Business Process Modeler

    Business Process Modeling (BPM) is defined as the activity of representing processes of an enterprise, so that the current process may be analyzed and improved. Modeling is further connected with activities of simulation, evaluation, and optimization. BPM is typically performed by business analysts who are seeking to improve process efficiency...

    Provided By Politecnico di Torino

  • White Papers // Feb 2013

    Cryptographic Puzzles and DoS Resilience, Revisited

    Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step toward rigorous models and proofs of security of applications...

    Provided By Politecnico di Torino

  • White Papers // Oct 2012

    Benefits of Using Enterprise Resource Planning Systems

    During the last years several enterprises have used significant amounts of money for their resource planning systems. In ideal situations these investments have proven to help enterprises to have more efficient business processes. They have also enabled significant cost savings and better information sharing. However, many enterprises have also got...

    Provided By Politecnico di Torino

  • White Papers // Sep 2012

    Business Process Management in Practice of Czech Companies

    The purpose of this paper is to provide an overview of applications of principles of Business Process Management in department of energetics in company Barum Continental, Ltd. which ensures the energy operation of manufacturing and office building of this company. The paper aims to point out the potential of increasing...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Secure Broadcast with One-Time Signatures in Controller Area Networks

    Broadcast authentication in Controller Area Networks (CAN) is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose, the authors study here the use of one-time signatures which can be built on the most computationally efficient one-way functions. They use an enhancement...

    Provided By Politecnico di Torino

  • White Papers // Jul 2012

    Revisiting Difficulty Notions for Client Puzzles and DoS Resilience

    Cryptographic puzzles are moderately difficult problems that can be solved by investing non-trivial amounts of computation and/or storage. Devising models for cryptographic puzzles has only recently started to receive attention from the cryptographic community as a first step towards rigorous models and proofs of security of applications that employ them...

    Provided By Politecnico di Torino

  • White Papers // Apr 2012

    Offloading Cellular Networks Through ITS Content Download

    Content downloading by mobile users is expected to significantly increase the cellular network load. Vehicular users, in particular, are likely to engage in information retrieval on the move: in this context, Intelligent Transportation Systems (ITS) can play an important role in offloading the cellular infrastructure. The authors investigate the effectiveness...

    Provided By Politecnico di Torino

  • White Papers // Feb 2012

    Broadcast Authentication in a Low Speed Controller Area Network

    Controller Area Network (CAN) is a communication bus that has no cryptographic protection against malicious adversaries. Once isolated, the environments in which CAN operates are now opened to intruders and assuring broadcast authentication becomes a concern. To achieve this, public key primitives are not a solution because of the computational...

    Provided By Politecnico di Torino

  • White Papers // Dec 2011

    Knowledge Applications Solutions at the SME Level in the E-Enterprise Business Intelligence

    The paper presents the knowledge management and business, intelligent concepts in order to analyze enterprise internal and external resources based on the knowledge transfer and capitalization processes. The virtual enterprise business network purposed solution expect to improve Small and Medium-sized Enterprises (SMEs) involvement in new product manufacturing networking efforts in...

    Provided By Politecnico di Torino

  • White Papers // Oct 2011

    Protocol Vulnerabilities in Practice: Causes, Modeling and Automatic Detection

    Starting from practical scenarios the authors underline that the most relevant security vulnerabilities in practice come from weak protocol design or implementation flaws rather than from weak or flawed cryptography. In particular, they outline security vulnerabilities in several kinds of scenarios starting from well explored fields such as computer networks...

    Provided By Politecnico di Torino

  • White Papers // Sep 2011

    Exploiting Traffic Dynamics in Power-Aware Logical Topology Design

    The authors propose the Multi-Period Power-Aware Logical Topology Design. They compared two different heuristics and show that exploiting the day-night fluctuations of the traffic can lead to significant power savings at a low reconfiguration cost. Recent studies show that the Information and Communication Technologies (ICT) sector is responsible for a...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Proactive Seeding for Information Cascades in Cellular Networks

    In today's Internet, Online Social Networks (OSNs) play an important role in informing users about content. At the same time, mobile devices provide ubiquitous access to this content through the cellular infrastructure. In this paper, the authors propose Proactive Seeding - a technique for minimizing the peak load of cellular...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Switch-Off Transients in Cellular Access Networks With Sleep Modes

    The introduction of sleep modes in the operations of base stations is today considered one of the most promising approaches to reduce the energy consumption of cellular access networks. Several papers have considered this option, assuming that the switch-on and switch-off transients are of negligible duration. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jul 2011

    Bounds on QoS-Constrained Energy Savings in Cellular Access Networks With Sleep Modes

    Sleep modes are emerging as a promising technique for energy-efficient networking: by adequately putting to sleep and waking up network resources according to traffic demands, proportionality between energy consumption and network utilization can be approached, with important reductions in energy consumption. Previous studies have investigated and evaluated sleep modes for...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Passive Characterization of SopCast Usage in Residential ISPs

    In this paper, the authors present an extensive analysis of traffic generated by SopCast users and collected from operative networks of three national ISPs in Europe. After more than a year of continuous monitoring, they present results about the popularity of SopCast which is the largely preferred application in the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Customizing Protocol Specifications for Detecting Resource Exhaustion and Guessing Attacks

    Model checkers for security protocols often focus on basic properties, such as confidentiality or authentication, using a standard model of the Dolev-Yao intruder. In this paper, the authors explore how to model other attacks, notably guessing of secrets and denial of service by resource exhaustion, using the AVANTSSAR platform with...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Some Security Issues in SCALANCE Wireless Industrial Networks

    The authors discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Investigating Overlay Topologies and Dynamics of P2P-TV Systems: the Case of SopCast

    Several successful commercial P2P-TV applications are already available. Unfortunately, some algorithms and protocols they adopt are unknown, since many follow a closed and proprietary design. This calls for tools and methodologies that allow the investigation of the application behavior. In this paper, the authors present a novel approach to analyze...

    Provided By Politecnico di Torino

  • White Papers // May 2011

    Design and Control of Next Generation Distribution Frames

    Today, the permutation of circuits in the Main Distribution Frames (MDF), which connect the subscriber lines to POTS and to DSLAMs, is still operated manually. However, new market regulations, allowing subscribers to change network operator frequently, and the new schemes to concentrate active ADSL users into few DSLAMs during off-peak...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Management of Business Processes Through Reengineering

    Re-engineering is considered to be a means of transforming the organization into a flexible, knowledge-based and structured to serve clients needs system and allows and allow fundamental rethinking and radical redesign of business processes to achieve dramatic improvements in business indicators considered critical in evaluating performance - cost, quality, service...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Application of System Dynamics Model and GIS in Sustainability Assessment of Urban Residential Development

    Considering rapid population growth and urbanization, sustainability assessment of residential development has become increasingly necessary for understanding environmental impacts and supporting urban planning. In this paper, due to the urban activities cause impacts not only on local level but also a broader scale, a simulation model, using System Dynamics (SD)...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Business Networks in the Internationalization of B-to-B-Services

    This paper focuses on business networks in the internationalization of b-to-b-services. The literature includes vast amount of knowledge of internationalization of a firm in general. A great deal of this literature is based on the concept of incremental stepwise internationalization process and empirical findings in manufacturing companies. So far, little...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Experiences of Internet Traffic Monitoring With Tstat

    Since the early days of the Internet, network traffic monitoring has always played a strategic role in understanding and characterize users' activities. In this paper, the authors present their experience in engineering and deploying Tstat, an open source passive monitoring tool that has been developed in the past ten years....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Creating Portable and Efficient Packet Processing Applications

    Network processors are special-purpose programmable units deployed in many modern high-speed network devices, which combine flexibility and high performance. However, software development for these platforms is traditionally cumbersome due both to the lack of adequate programming abstractions and to the impossibility of reusing the same software on different hardware platforms....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Concealable, Low-Cost Paper-Printed Antennas for WISP-Based RFIDs

    Paper-based, inkjet-printed antennas are proposed in this paper as replacement for the typical antennas used on the WISP RFID tag. These antennas are designed to be as concealable as possible. The designs presented exploit meandered techniques in order to achieve significantly reduced dimensions. In particularly, text-based meandered line techniques are...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Requirements Elicitation Using BPM Notations: Focusing on the Strategic Level Representation

    Business Process Models (BPM) can be useful for requirements elicitation, among other uses. Since the active participation of all stakeholders is a key factor for successful requirements engineering, it is important that BPM be shared by all stakeholders. Unfortunately, organizations may end up with inconsistent BPM not covering all stakeholders'...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    A Wireless Sensor Network-Based Approach to Large-Scale Dimensional Metrology

    In many branches of industry, dimensional measurements have become an important part of the production cycle, in order to check product compliance with specifications. This task is not trivial especially when dealing with large-scale dimensional measurements: the bigger the measurement dimensions are, the harder is to achieve high accuracies. Nowadays,...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Business Model for Mobility and Interactivity in Heterogeneous Convergent Environment - A Study Case

    This paper presents a study for a business model applied to heterogeneous systems for a mobility and interactivity framework. The main idea is a system based in heterogeneity and convergence technological oriented to end-user. Now-a-days, the conventional systems are formed only by homogeneous systems and not always end-to-end. For this...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Linked Data Approach for Selection Process Automation in Systematic Reviews

    A systematic review is a literature review performed to answer a set of research questions and has to be performed according to a pre-defined protocol describing how primary sources are selected and categorized. It strives to produce an objective evaluation of findings available on a certain topic, reducing as much...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Mining Unclassified Traffic Using Automatic Clustering Techniques

    In this paper, the authors present a fully unsupervised algorithm to identify classes of traffic inside an aggregate. The algorithm leverages on the K-means clustering algorithm, augmented with a mechanism to automatically determine the number of traffic clusters. The signatures used for clustering are statistical representations of the application layer...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Modeling Sleep Modes Gains With Random Graphs

    Nowadays two main approaches are being pursued to reduce energy consumption of network devices: the use of sleep modes in which devices can be put in low-power state, and the adoption of energy proportional approaches where the device architecture is designed to make energy consumption proportional to the actual load....

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    10-year Experience of Internet Traffic Monitoring With Tstat

    Network monitoring has always played a key role in understanding telecommunication networks since the pioneering time of the Internet. Today, monitoring traffic has become a key element to characterize network usage and users' activities, to understand how complex applications work, to identify anomalous or malicious behaviors. In this paper, the...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Design of Fault-Tolerant Logical Topologies in Wavelength-Routed Optical IP Networks

    In this paper the authors illustrate a new methodology for the design of fault-tolerant logical topologies in wavelength-routed optical networks exploiting wavelength division multiplexing, and supporting both unicast and multicast IP datagram flows. The approach to protection and restoration generalizes the "Design protection" concepts, and relies on the dynamic capabilities...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Efficient Broadcasting of Safety Messages in Multihop Vehicular Networks

    Broadcasting of safety messages is one of the fundamental services in multihop vehicular networks. These services typically require to deliver the information to all vehicles traveling over a geographical area, with high reliability and low delay. The authors focus on a unidirectional vehicular network supporting safety applications, and they present...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Adaptive H.264 Video Transmission Over 802.11 Inter-Vehicular Ad Hoc Networks

    This paper focuses on video communications in inter-vehicular environments using the 802.11 ad hoc network protocol. In the first part of the paper the authors present the results of transmission experiments between two cars equipped with 802.11 devices in two typical driving scenarios, urban and highway. Various video bitrates and...

    Provided By Politecnico di Torino

  • White Papers // Jul 2009

    A Review of Localization Algorithms for Distributed Wireless Sensor Networks in Manufacturing

    Wireless Sensor Networks (WSNs) typically consist of a large number of densely populated sensor nodes. Due to important advances in integrated circuits and radio technologies, the use of distributed sensor networks is becoming increasingly widespread for a variety of applications, e.g. indoor navigation, environmental monitoring, people and object tracking, logistics,...

    Provided By Politecnico di Torino

  • White Papers // May 2010

    An Empirical Regressive Model to Improve the Metrological Performance of Mobile Spatial Coordinate Measuring Systems

    The Mobile Spatial coordinate Measuring system (MScMS) is a system to perform dimensional measurements of large-scale objects. It consists of a wireless measuring probe with UltraSonic (US) transceivers, the position of which is determined using a distributed constellation of analogous transceivers arranged around the measuring area. The principle is to...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    A Wireless Sensor Network-Based Approach to Large-Scale Dimensional Metrology

    In many branches of industry, dimensional measurements have become an important part of the production cycle, in order to check product compliance with specifications. This task is not trivial especially when dealing with large-scale dimensional measurements: the bigger the measurement dimensions are, the harder is to achieve high accuracies. Nowadays,...

    Provided By Politecnico di Torino

  • White Papers // Sep 2009

    A Lightweight Distributed Solution to Content Replication in Mobile Networks

    Performance and reliability of content access in mobile networks is conditioned by the number and location of content replicas deployed at the network nodes. Facility location theory has been the traditional, centralized approach to study content replication: computing the number and placement of replicas in a network can be cast...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Design of Fault-Tolerant Logical Topologies in Wavelength-Routed Optical IP Networks

    In this paper the authors illustrate a new methodology for the design of fault-tolerant logical topologies in wavelength-routed optical networks exploiting wavelength division multiplexing, and supporting both unicast and multicast IP datagram flows. The approach to protection and restoration generalizes the "Design protection" concepts, and relies on the dynamic capabilities...

    Provided By Politecnico di Torino

  • White Papers // Nov 2010

    Reliable SPARQL Queries With Consistent Results Over P2P-Shared RDF Storage

    One aim of the semantic web is to build large knowledge bases distributed over the internet. Knowledge management systems that gather, merge and make available the information physically stored in multiple locations suffer from consistency and data fragmentation issues due to node failures. In this paper the authors address such...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    High-Performance H.264/SVC Video Communications in 802.11e Ad Hoc Networks

    This work focuses on improving the performance of video communications based on the recently developed H.264 Scalable Video Coding (SVC) standard over 802.11e wireless networks. The H.264/SVC standard is particularly suitable for wireless communications because of its compression efficiency and the ability to adapt to different network scenarios. The adoption...

    Provided By Politecnico di Torino

  • White Papers // Feb 2011

    Linked Data Approach for Selection Process Automation in Systematic Reviews

    A systematic review is a literature review performed to answer a set of research questions and has to be performed according to a pre-defined protocol describing how primary sources are selected and categorized. It strives to produce an objective evaluation of findings available on a certain topic, reducing as much...

    Provided By Politecnico di Torino

  • White Papers // Jun 2010

    Distributed Semantic Video Tagging for Peer-to-Peer Authoring System

    The paper is aimed at the development of a cooperative and distributed Authoring System to facilitate the production, sharing, and integration of new and existing content from various domains, this paper addresses problems related to locating, annotating and reusing audio and video streams distributed over the Internet. The Authoring System...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    Service Providers Indexing Using P2P Systems

    The idea of sharing resources across the network has become very popular during the last few years, leading to a diversified scenario in which shared resources include not only files and videos but also storage and CPU cycles. A new trend is to extend this paradigm toward a distributed architecture...

    Provided By Politecnico di Torino

  • White Papers // Aug 2010

    Optimizing Deep Packet Inspection for High-Speed Traffic Analysis

    Deep Packet Inspection (DPI) techniques are considered extremely expensive in terms of processing costs and therefore are usually deployed in edge networks, where the amount of data to be processed is limited. This paper demonstrates that, in case the application can tolerate some compromises in terms of accuracy (such as...

    Provided By Politecnico di Torino

  • White Papers // Jun 2010

    SPAF: Stateless FSA-Based Packet Filters

    The authors propose a stateless packet filtering technique based on Finite-State Automata (FSA). FSAs provide a comprehensive framework with well-defined composition operations that enable the generation of stateless filters from high-level specifications and their compilation into efficient executable code without resorting to various opportunistic optimization algorithms. In contrast with most...

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Creating Portable and Efficient Packet Processing Applications

    Network processors are special-purpose programmable units deployed in many modern high-speed network devices, which combine flexibility and high performance. However, software development for these platforms is traditionally cumbersome due both to the lack of adequate programming abstractions and to the impossibility of reusing the same software on different hardware platforms....

    Provided By Politecnico di Torino

  • White Papers // Mar 2011

    Application of System Dynamics Model and GIS in Sustainability Assessment of Urban Residential Development

    Considering rapid population growth and urbanization, sustainability assessment of residential development has become increasingly necessary for understanding environmental impacts and supporting urban planning. In this paper, due to the urban activities cause impacts not only on local level but also a broader scale, a simulation model, using System Dynamics (SD)...

    Provided By Politecnico di Torino

  • White Papers // Jul 2010

    Turbo Code Design for H-ARQ With Cross-Packet Channel Coding

    In wireless scenarios a simple and effective method to increase the reliability for time-varying channels is the Hybrid Automatic Repeat reQuest (H-ARQ) protocol. Recently, a H-ARQ scheme with Cross-Packet Channel coding (CPC) has been proposed to increase the maximum coding rate at which full-diversity can be achieved. In this paper,...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Modeling Sleep Modes Gains With Random Graphs

    Nowadays two main approaches are being pursued to reduce energy consumption of network devices: the use of sleep modes in which devices can be put in low-power state, and the adoption of energy proportional approaches where the device architecture is designed to make energy consumption proportional to the actual load....

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Vehicular Mobility Simulation for VANETs

    During the last few years, continuous progresses in wireless communications have opened new research fields in computer networking, aimed at extending data networks connectivity to environments where wired solutions are impracticable. Among these, vehicular traffic is attracting a growing attention from both academia and industry, due to the amount and...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Adaptive H.264 Video Transmission Over 802.11 Inter-Vehicular Ad Hoc Networks

    This paper focuses on video communications in inter-vehicular environments using the 802.11 ad hoc network protocol. In the first part of the paper the authors present the results of transmission experiments between two cars equipped with 802.11 devices in two typical driving scenarios, urban and highway. Various video bitrates and...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Hybrid Bitrate/PSNR Control for H.264 Video Streaming to Roaming Users

    In wireless communications, the available throughput depends on several parameters, like physical layer, base station distance, fading and interference. Users experience changes in bandwidth within a cell and among same-technology cells, but also among different networks. Moreover, in case of video transmission, the user may specify a desired quality level....

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Variable Time-Scale Streaming for Multimedia Transmission Over IP Networks

    Multimedia applications over IP networks are currently at the center of an extraordinary deal of attention. However, for this appealing class of applications to succeed, several major problems need to be solved. Among them, perhaps the most challenging one is how to best deal with the strongly time-varying nature of...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Variable Time-Scale Audio Streaming Over 802.11 Inter-Vehicular Ad-Hoc Networks

    This paper presents an analysis of audio streaming in an inter-vehicular network based on 802.11b wireless devices. In such a scenario characterized by strong link availability variations, the authors investigate the performance of an adaptive packet scheduling policy that adapts the inter-packet transmission interval to the channel conditions. Network simulations...

    Provided By Politecnico di Torino

  • White Papers // Jan 2011

    Efficient Broadcasting of Safety Messages in Multihop Vehicular Networks

    Broadcasting of safety messages is one of the fundamental services in multihop vehicular networks. These services typically require to deliver the information to all vehicles traveling over a geographical area, with high reliability and low delay. The authors focus on a unidirectional vehicular network supporting safety applications, and they present...

    Provided By Politecnico di Torino

  • White Papers // Feb 2010

    Hy-Sim: Model Based Hybrid Simulation Framework for WSN Application Development

    By bringing the physical world and the virtual one closer, one is able to expand the possibilities of accelerating and easing embedded system design. In case of Wireless Sensor Network (WSNs), which require testing of the developed applications in hundreds to thousands of nodes, this is even more useful. The...

    Provided By Politecnico di Torino

  • White Papers // Jan 2010

    NETPDL: An Extensible XML-Based Language for Packetheader Description

    Although several applications need to know the format of network packets to perform their tasks, till now, each application uses its own packet description database. This paper addresses this problem by proposing the NetPDL, an XML-based language for describing packet headers, which has the potential of enabling the realization of...

    Provided By Politecnico di Torino

  • White Papers // Aug 2009

    Dimensioning Rules Regarding Radio Resources in GSM/GPRS Networks

    Many paper have studied traffic modeling in GSM/GPRS networks trying to establish different performance parameters needed for dimensioning purposes. An important element of these networks is the radio resources. Sharing resources between different users and different services is a key concept of radio resources dimensioning in GSM/GPRS networks. In this...

    Provided By Politecnico di Torino

  • White Papers // Aug 2009

    Traffic Models and Associated Parameters in GSM/(E)GPRS Networks

    GSM/ (E)GPRS networks support a mixture of traffic consisting of voice and data. A key concept of dimensioning radio resources in such networks is represented by sharing resources between different users and different services. In this paper, the authors address the problem of voice and data traffic models according to...

    Provided By Politecnico di Torino

  • White Papers // Apr 2008

    Cryptographic Authentication on the Communication From an 8051 Based Development Board Over UDP

    Implementing cryptography on devices with low computational power is a necessity as they became involved in communications over public networks. Even more, these devices became ubiquitous and are used in a large area of applications, from home-office systems to industrial control systems. The authors deal with the design and implementation...

    Provided By Politecnico di Torino

  • White Papers // Jul 2009

    A Calculus to Detect Guessing Attacks

    The authors present a calculus for detecting guessing attacks, based on oracles that instantiate cryptographic functions. Adversaries can ob-serve oracles, or control them either on-line or off-line. These relations can be established by protocol analysis in the presence of a Dolev-Yao intruder, and the derived guessing rules can be used...

    Provided By Politecnico di Torino

  • White Papers // Feb 2009

    Towards Developing Secure Video Surveillance Systems Over IP

    A framework of three attributes for video surveillance systems is underlined: availability, accessibility and authenticity. Under this framework, a scenario in which surveillance cameras can be accessed by remote devices, such as mobile phones, PDAs, over IP is addressed. Some security drawbacks of an off-the-shelf product are depicted and a...

    Provided By Politecnico di Torino

  • White Papers // Aug 2006

    Construction Techniques for One-Way Chains and Their Use in Authentication

    Authentication is one of the most important security objectives. The use of one-way chains in authentication was proved to be a very successful technique which encountered applications even in constrained environments such as ah-hoc sensor networks. This paper surveys some of the most efficient construction techniques for one-way chains and...

    Provided By Politecnico di Torino

  • White Papers // Apr 2006

    On Cryptographic Chained Puzzles

    Cryptographic puzzles provide an elegant solution in combating denial of services attacks. In this paper, the authors introduce the concept of chained puzzles and they define two kinds of chained puzzles: linearly chained puzzles and randomly chained puzzles. These construnstions prove to be very useful in some scenarios, from which...

    Provided By Politecnico di Torino

  • White Papers // Feb 2007

    Using One-Way Chains to Provide Message Authentication without Shared Secrets

    In this paper, the authors propose a cryptographic protocol which provides authenticity in the exchange of information between two entities without using any shared secret and by using only one-way chains. Such a protocol may have many applications and may be of interest especially in constrained environments where computational power...

    Provided By Politecnico di Torino

  • White Papers // Apr 2007

    Implementation of an Authentication Protocol for Sending Audio-Video Information in Java

    An application for assuring the authenticity of audio-video information is developed. The application is implemented in Java by using Java media framework to send audio and video information over RTP (Real-time Transport Protocol). In order to guarantee that information is not altered during transmission over public networks by malicious adversaries...

    Provided By Politecnico di Torino

  • White Papers // Jan 2007

    An Extension of the RSA Trapdoor in a KEM/DEM Framework

    Public key cryptosystems are vital primitives for today's information systems security. The basic task in which public key cryptosystems are involved, is in assuring the transfer of some secret information over a channel that is unsecured. In order to achieve this objective a trapdoor one-way function can be used. Although...

    Provided By Politecnico di Torino

  • White Papers // Jan 2007

    On the Use of One-Way Chain Based Authentication Protocols in Secure Control Systems

    The use of one-way chains in authentication protocols is a technique of great importance which has many applications. Employing cryptographic techniques in the area of industrial control systems has gained significant interest in the last few years. This paper proposes the use of a one-way chain based authentication protocol in...

    Provided By Politecnico di Torino

  • White Papers // Nov 2007

    Broadcast Authentication with Practically Unbounded One-Way Chains

    A protocol for assuring the authenticity of information broadcasted over long periods of time is proposed. The protocol is based on time synchronization and uses one-way chains constructed with the squaring function which gives the possibility to construct a one-way chain of whose length is unbounded in practice. Although the...

    Provided By Politecnico di Torino

  • White Papers // Jun 2008

    On the Security of Some Authentication Mechanisms From Windows

    In this paper, the authors investigate some authentication mechanisms used in windows. In particular, the NTLM authentication protocol, which is commonly used in several solutions from Microsoft, is analyzed. The NTLM authentication is completely unsafe in several variants of use and some of its weaknesses previously known. A critical analysis...

    Provided By Politecnico di Torino

  • White Papers // Dec 2008

    Experimenting with the Secure Control of a Robot Over TCP/IP

    An authentication protocol, based on cryptographic techniques, is implemented and used in the communication necessary for the control of a mobile robot over a public network. The robot is connected via an 802.11 wireless network to a local computer; however the control of the robot is done from a remote...

    Provided By Politecnico di Torino

  • White Papers // Jun 2011

    Some Security Issues in SCALANCE Wireless Industrial Networks

    The authors discuss some security weaknesses of Scalance wireless access points and clients. These devices, developed by Siemens, are commonly used for wireless communication in network control systems. After the identification of the Stuxnet worm, which targeted PLCs from uranium enrichment facilities in Iran, these devices become of increased interest...

    Provided By Politecnico di Torino

  • White Papers // Jun 2013

    LiBrA-CAN: Lightweight Broadcast Authentication for Controller Area Networks

    Despite realistic concerns, security inside vehicular buses (such as CAN) is still absent mostly due to technical challenges: low bandwidth and processing power, low cost margins, etc. Here, the authors design an efficient protocol based entirely on simple symmetric primitives that takes advantage of two interesting procedures which they call...

    Provided By Politecnico di Torino