SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks
|
|
|
- Juliet Millicent Walton
- 10 years ago
- Views:
Transcription
1 IEEE ICC 23 - Wireless Networking Symposium SAFE: A Social Based Updatable Filtering Protocol with Privacy-preserving in Mobile Social Networks Kuan Zhang, Xiaohui Liang, Rongxing Lu, and Xuemin (Sherman) Shen Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, Ontario, Canada, N2L 3G {k2zhang, x27liang, rxlu, xshen}@bbcr.uwaterloo.ca Abstract Mobile Social Networks (MSN), as an emerging social networking platform, facilitates social interaction and information sharing among users in the proximity. Spam filtering protocols are extremely important to reduce communication and storage overhead when many spam packets without specific destinations are diffused in MSNs. In this paper, we propose an effective social based updatable filtering protocol (SAFE) with privacy preservation in MSNs. Specifically, we firstly construct a filter Hash tree based on the properties of Merkle tree. Then, we exploit social relationships, and select those users with more than a specific number of common attributes with the filter creator. The selected users are able to store filters in order to block spams or relay regular packets. Furthermore, we develop a cryptographic filtering scheme without disclosing the creator s private information or interests. In addition, we propose a filter update mechanism to allow users to update their distributed filters in time. The security analysis demonstrates that the SAFE can protect user s private information from filter s disclosure to other users and resist filter forgery attack. Through extensive trace-driven simulations, we show that the SAFE is effective and efficient to filter spam packets in terms of delivery ratio, average delay, and communication overhead. I. INTRODUCTION Mobile Social Networks (MSNs) [] are emerging social networking platforms that enable information sharing and social interaction among surrounding neighbors via Bluetooth or WiFi modules on their equipped smartphones. MSN applications engage in our daily life, and help people discover friends, exchange traffic, shopping or health information, and even share image or video files with each other. Simultaneously, many stores and service providers usually broadcast their service information, like advertisements or flyers, most of which might be considered as spams in the eyes of users. For example, Alice is looking for cosmetics on sale in a business street. She only needs the service information of cosmetic stores rather than the restaurants or groceries. Intuitively, Alice can send some filters including her requirements to other people for selecting the useful service information and blocking the useless advertisements. But the question is: who can help Alice? On the other hand, during the lunch time, she requires the information of the nearby restaurants instead. Since the requirements from Alice vary with time due to some personal reasons, the second question comes: how can Alice update the previous filters in a timely fashion? Therefore, an effective spam packet filtering protocol with an update mechanism is essential to block spam information and reduce communication costs. In the last decade, researchers develop many spam filtering protocols. Some sophisticated filtering protocols use blacklist [2], whitelist, or graph [3] to extract spam or admit legitimate senders. On the other hand, some research works focus on content filtering either by using keyword list [4] to match spam packets, or through machine learning, like Bayesian approaches [], to probabilistically detect spams. Recently, social characteristics are introduced to enhance the filtering effectiveness. Li et al. [6] introduce a social network based filter framework (SOAP) to detect spam s by employing social closeness, social dis(interest) and trust management. They collect and utilize social information to distinguish regular and spam s. Sirivianos et al. [7] also exploit social trust to achieve collaborative spam filtering. The trustworthiness of spam reporters could be used to resist Sybil attack and gather the correct spam reports. However, these protocols [6], [7] rely on an online trusted third party or Bayesian approaches [], which require a large number of history log. As a result, most of the existing filtering protocols are inefficient and impractical when being applied in MSNs. Recently, Lu et al. [4] propose, a decentralized keyword based filtering protocol in Delay Tolerant Networks (DTNs). The lets relay users store the filters and detect spam packets before they are transmitted to the destinations. Simultaneously, the encrypted keyword filters preserve user privacy. Nevertheless, the neither efficiently distributes filters, nor dynamically updates the distributed filters. At the same time, security concerns raise many challenges when designing protocols for MSNs. For example, if the filters distributed by Alice include some sensitive or private information, such as preferences or health condition, other people would easily obtain them and violate Alice s privacy. Alice might suffer from a huge amount of loss. In addition, some malicious users might try to forge and re-distribute Alice s filters in order to block regular packets and enable spam packets diffuse, which produce extra communication cost and degrade the network performance. The existing filtering protocols, including the, have not addressed filter forgery attacks before. Therefore, these challenging issues motivate us to further improve filtering effectiveness and enhance the security level. In this paper, we propose an effective social based updatable filtering protocol (SAFE) with privacy preservation in MSNs. The SAFE is characterized by social based filter distribution, private keyword filtering, and efficient filter update. Specifi /3/$3. 23 IEEE 64
2 cally, the major contributions of this paper are twofold. Firstly, we exploit Merkle tree and develop a filter authentication scheme to resist the filter forgery attack. Furthermore, based on social relationship, like common attributes, filters are purposefully distributed, which reduces the filter transmission overhead. Then, we propose Merkle tree based filter update mechanism in the SAFE to cope with the variation of user s filtering requirements. Secondly, we evaluate the performance of the proposed SAFE protocol through extensive trace-driven simulations. Our simulation results validate that the SAFE reduces the communication and storage overheads and guarantee the regular packet delivery with a reasonable delay. In addition, the security analysis demonstrates that the SAFE can preserve user s privacy against inside curious attackers and resist the filter forgery attack. The remainder of this paper is organized as follows: Network model and design goals are presented in Section II. In Section III, we present the details of the SAFE, followed by the security analysis and the performance evaluation in Sections IV and V, respectively. Finally, Section VI closes the paper with concluding remarks. II. PROBLEM DEFINITION In this section, we formulate the network model and identify our design goals to improve filtering efficiency and satisfy the security requirements. A. Network model We consider a homogenous MSN consisting of a trust authority (TA) and N mobile users. The details of these components are presented as follows. Trust Authority (TA) is a trustable, powerful, and storagerich entity, and bootstraps the entire network in the initialization phase. Afterwards, TA will not be involved in communication and filtering. When bootstrapping, TA generates secret master keys, which are going to be used for individual legitimate user to produce the session keys. In addition, TA issues legal certificates to legitimate users after their registration. During the operating time, TA will receive attack reports from mobile users if they detect some malicious users. Mobile users are denoted by U = {u,u 2,..., u N }. Each mobile user is equipped with a portable communication and storage device. Suppose that these devices bi-directionally communicate with each other within the equal communication range. Due to the practical constraints, the power and storage occupancy of such devices are limited. An individual mobile user should first register to TA for the profile and key information. For example, each legitimate user will obtain a unique identity, certificates and key materials which should be securely kept and used in each session to generate session keys. In packet transmission and filtering phases, mobile users should be able to not only produce their own identity and filter signatures but also verify other users identities. B. Threat model Malicious users exist in the whole network, and get involved in both packet delivery and spam filtering phases. We address two types of attacks: inside curious attack (ICA) and outside forgery attack (OFA). In specific, some of the filter holders are curious about other users personal interests or profiles. The goal of them is to illegally obtain other users private or sensitive information. We focus on the privacy issues during filter storage and packet delivery and filtering phases. On the other hand, some outside adversaries are not able to obtain other users profiles and filters. But they are likely to forge some filters to block the regular packets or enable spam packets diffuse in MSNs, which consumes a large amount of communication overheads. C. Design goals Our design goal is to develop an effective and updatable filtering protocol in MSNs. The user privacy should be preserved at the same time. ) Efficiency goals: Due to the intermitted end-to-end connection and constrained resources, we aim to design an effective and efficient filtering scheme to block the spam packets in MSNs. The proposed protocol should efficiently block such spam packets without using too many extra communication, storage, and computing overheads. Furthermore, the useful packets should be neither filtered nor delayed during the transmission. In addition, the distributed filters should be as fresh as possible and efficiently updated if the filter creator changes the former filters. 2) Security goals: Our security goal is to protect from ICA and OFA. On one hand, the proposed filtering protocol should preserve the filter creator s privacy from disclosing. The filters cannot appear in plaintext when distributed to other users. When filtering, the keyword should be securely kept in ciphertext. On the other hand, the filter authentication mechanism should be established and enable users to verify every filter s validity. Any forged filter can be detected by mobile users. III. PROPOSED SAFE PROTOCOL In this section, we present the details of our proposed SAFE protocol. Firstly, we propose a privacy-preserving filter authentication scheme, which protects from modifying filters. Furthermore, we explore social relationship to efficiently distribute filters. We then concretely present an effective filter update mechanism. A. Filter Authentication Scheme To authenticate user s filter, we take the advantage of Merkle tree [8], a chain of cryptographic Hash. In this section, we will elaborate procedures of constructing a filter Hash tree and propose a Hash tree based filter authentication scheme. Merkle tree is a binary tree with 2 N leaf nodes, where N is the depth of Merkle tree. Any parent node h i j = H(h i h j ), is the one-way Hash value of its two children nodes. For example, in Fig., given the leaf node h and 2 646
3 h -2 h h 2 Fig.. h -8 h -4 h -8 h 3-4 h 3 h 4 h -6 h h 6 Hash tree based filter authentication h 7-8 h 7 h 8 h 2, their parent node h 2 = H(h h 2 ). Then, h 2 and h 3 4 are concatenated to obtain h 4. Similarly, the root node h 8 = H(h 4 h 8 ). Finally, the path from the leaf node h to the root h 8 is stored as PH = {h 2,h 3 4,h 8 }. An individual user u i can establish its own keyword list W ui = {W ui,,...,w ui,k}, where W ui,k( k K) is the keyword selected by u i. These keywords are set as the leaf node in filter tree FR ui. During the authentication, the path information PH k is used as the certificate for each independent keyword. Other users check whether the concatenated hash value of PH k is equal to the root R ui or not. If so, the keyword is valid; otherwise, it is forged. Finally, the concatenated value of H(R ui ID ui ) is set as the creator u i s certificate. As a result, the identifier (root value) and the path from the root to every leaf node are verifiable. Suppose a Hash tree consisting of 2 N leaf nodes, N Hash operations are required for each independent verification. In addition, the signature size is N L, where L is the length of Hash value. B. Social Based Private Filtering As discussed above, not only could the spam packets consume the communication and storage overhead, but also would the filters take a large number of transmission and storage. In this section, we will solve the question: How to efficiently distribute the filters and preserve user s privacy? Initialization: When bootstrapping, TA assigns key materials to each user. Let G and G 2 be two cyclic groups with the same order q, and P be a generator of G. Suppose there exists a bilinear pairing [9], [] between G and G 2 that can be efficiently calculated: e: G G G 2, such that e(ap, bp )=e(p, P) ab for random numbers a, b Z q, P G. A bilinear parameter generator G is a probabilistic algorithm [] that gets a security parameter K as input, and outputs a tuple (q, G, G 2, e, G, P, H ), where q is a large prime. Filter generation: The creator u i firstly selects a random number x i Z q, and calculates its public key as PK i = x i P. The private key SK i is x i. Given a keyword W ui,k, its filter is F ui,k =< W ui,k,λ >, where W i = H(W u i,k) x i+h (W ui,k) P, λ = e(pk i,p). Filter distribution: When u i meets another user u j, they do the authentication and private match their profiles to determine the amount of common attributes. If they have more than TH common attributes, where TH is a preset threshold, u i sends the filter F i to u j. Algorithm Social based private filtering : Procedure: Social based private filtering 2: u s sends a packet with keyword W x to u i 3: u s and u j are encountered 4: if u j and u i have more than common attributes then : u j will check whether the packet owns the valid keyword or not 6: if u j keeps u i s filter then 7: u s sends Λ s = λ + PK i to u j 8: u j calculates e(λ s, W i ) 9: if e(λ s, W i )=λ then : u s duplicates the packet to u j : else 2: u j blocks this packet 3: end if 4: else : u s duplicates the packet to u j 6: end if 7: end if 8: return VSS = {VSS,VSS 2,..., V SS M } 9: end procedure Algorithm 2 Filter update : Procedure: Filter update 2: u i changes its own keyword W ui,k, and constructs a new filter tree FR u i with the root node R u i 3: if The encountered user u j is keeping u i s keyword W ui,k then 4: u j sends R ui to u i for the authentication : if R ui is valid then 6: if R ui R u i then 7: u i duplicates FR u i to u j 8: u j updates the kept u i s filter as FR u i 9: end if : else : u j forged u i s filter 2: end if 3: end if 4: end procedure Filtering: When a sender u s would like to send a packet with keyword W x and meets u j, u j will help u i to detect whether this packet should be blocked or not. u s firstly sends Λ s = λ +PK i to u j, where λ = H P. (W x) Upon receiving Λ s, u j checks e(λ s, W i ) =? λ. If it holds, the keyword W x passes the filter check and the packet can be forwarded by u j ; otherwise, this packet will be blocked. The details of the SAFE are illustrated in Algorithm. C. Efficient Filter Update The users might change their former filters. In that case, the filters should be efficiently updated as quickly as possible in order to successfully block or relay the coming packets. In this section, we will answer the question: How to quickly update the filters? According to the properties of Merkle tree, the root will change if any leaf node varies. As a result, we do not need to check every keyword one by one. The creator u i checks the root R ui of u i s filter tree FR ui stored by its filter holder u j. If the root is different, u i sends the updated filter tree FR u i to u j as illustrated in Algorithm 2. Therefore, the SAFE will dramatically improve the searching efficiency in the phase of filter updating
4 IV. SECURITY ANALYSIS In this section, we will discuss privacy and security properties of our proposed SAFE protocol. We will focus on the two types of attacks discussed in section II. Inside Curious Attack: To protect from ICA, each filter cannot be duplicated to others as plaintext. To achieve the privacy-preserving goal, the SAFE encrypts the user s filters based on bilinear pairing. The relay user u j can effectively check whether the keyword exists in u i s filter or not without disclosing any u i s information. We have e(pk i,p) = e( x i P, P) =e(p, P) x i. e(λ s, W i ) H (W = e(λ + PK i, x i + H (W P ) = e( H (W x ) P + H (W P, x i x i + H (W P ) = e( x i + H (W x ) H (W P, H (W x )x i x i + H (W P ) e(p, P) x i, If W ui,k = W x ; = [x i +H (Wx)]H (W ui,k ) H e(p, P) (Wx)x i [x i +H (W ui,k )], otherwise. The packet with valid keywords will be forwarded by u j, while others will be blocked. Due to the properties of elliptic curve groups and bilinear pairing, it is infeasible to calculate H (W from W i = H(W u i,k) x i+h (W ui,k) P. Therefore, the keyword is securely kept so that the creator u i s sensitive and private information is preserved. Outside Forgery Attack: the SAFE resists filter forgery attack by using Merkle tree based filter authentication. The root value of each Merkle tree is the concatenated hash value of the nodes in a specific path, and it is the unique certificate H(R ui ID ui ) created by the filter creator u i. Any user can verify this root value by using the creator s public key. As a result, each leaf node, which is the independent keyword, is uniquely defined and verifiable with its hash tree path information. Once the creator u i changes the former filters, the new certificate is updated as H(R u i ID ui ). Before the update in each u i s friends, the former certificate is still valid. The resilience of OFA is based on the security level of hash function used to construct the Merkle tree. From the above security analysis, the SAFE protects user privacy from being disclosed or eavesdropped by the ICA or outside attacks. Merkle tree based authentication scheme resists the outside forgery attacks with tolerant communication and computing overheads. Note that we do not consider the privacy issues during profile matching [2]. In addition, TA operates in an off-line manner, and generates the essential cryptographic master keys in the initialization phase. Therefore, the SAFE can securely operate in a decentralized manner. V. PERFORMANCE EVALUATION To evaluate the effectiveness and efficiency of the SAFE, we simulate it through Infocom6 trace [3]. A. Simulation Setup The Infocom6 trace [3] contains 78 mobile users in a conference during four days. Each mobile user is equipped with a dedicated Bluetooth device, which can detect the Bluetooth devices appearing in the proximity. As a result, the mobility and contacts of these mobile users can be recorded in the log. We collect 28, 979 useful contacts, and divide them into two portions: the first one third of the data set as a training set producing user s attributes and the residual data as the experiment set used for the simulation. Then, we utilize maximal clique to define attributes. We select attributes each of which contains more users and the sum of all the edges is large enough. We simulate the SAFE with these attributes in the later simulation. Each of these selected attributes consists of at least 28 users, while each user participates in 38 communities on average. B. Simulation results We evaluate the performance of our proposed SAFE protocol compared with and protocols. Each mobile user generates 78 packets with different keywords according to their attributes. As Fig. 2(a) and 2(b) shown, the SAFE achieves higher delivery ratio with higher delay compared with. protocol, where a user distributes filters to any encountered ones, gains the highest delivery ratio and lowest delay, but it consumes too many communication and storage overheads to be operated in the real world. With different THs, which are equal to the number of common attributes that both users have, delivery ratio and average delay do not change at all. The reason is that the SAFE forwards packets according to the common attributes of the destination. The change of TH only impacts on the number of distributed filters rather than the filters themselves. As a result, the useful packets cannot be filtered at any time. In Fig. 2(c), we can observe that the SAFE with TH =2 blocks more spam packets, while the SAFE with TH = blocks much fewer spam packets. As shown in Fig. 2(d), the SAFE with TH =dramatically reduce the communication costs. Even though the SAFE with TH =2blocks more spam packets as shown in Fig. 2(c), it still leads to a large number of copies. Since the distributed filters decreases with TH =2, more mobile users not having the relevant filter generate more spam packets. Furthermore, from Fig. 2(c) and 2(d), the SAFE with TH = trades off the number of blocked spam packets and the number of copies compared with other protocols. In Fig. 2(e), the number of distributed filters increases with the growth of threshold TH. The smaller TH of distributing filters causes more users qualified to hold filters. The and (denoted as PF and Ep in Fig. 2(e), respectively) filtering schemes distribute more filters to mobile users. This is because the SAFE purposely distributes the filters to the users having some common attributes with the destinations. As shown in Fig. 2(f), the higher TH results in more copies during transmission. Since the higher threshold limits the 4 648
5 Delivery ratio (%) SAFE TH= SAFE TH= Average delay () SAFE TH= SAFE TH= Number of the blocked spam packets SAFE TH= SAFE TH=2 PreFilter Copy number of the transmitted packets SAFE TH= SAFE TH= (a) Delivery ratio (b) Average delay (c) Number of the blocked spam packets (d) Number of copies Number of filters Ep PF (e) Number of filters vs. TH Number of copies x Number of blocked spam (f) Number of copies vs. TH (g) Number of blocked packets vs. TH Fig. 2. Performance comparison Number of Search operation Binary Search SAFE Number of filters (h) Update comparison amount of distributed filters, fewer filters cannot resist the flooding of spam packets. In Fig. 2(g), the growth of TH results in more blocked spam packets. When TH is small, for example, or, many users hold filters so that they will not produce spam packets at all. In such case, spam packets are blocked in the phase of producing. When TH increases, not that many users keep these filters. As a result, the amount of produced spam packets increases, and the distributed filters can block more spam packets. With the continuous increase of TH, fewer users hold filters. Not only do the produced spam packets increase, but also will the filtering capability degrade. This is the reason why the further growth of TH causes the decrease of the blocked spam packets when TH is greater than 4. Therefore, the SAFE with TH =achieves the trade-off between the amount of distributed filters and the number of copies, and effectively blocks spam packets. In Fig. 2(h), the SAFE performs fewer search operation when update filtering, since the only operation is to check the root of Merkle tree. Other algorithms, like binary search algorithm, performs considerable operations when the number of distributed filters increases. Therefore, the effectiveness and efficiency of the SAFE is demonstrated from the above simulation results. VI. CONCLUSION In this paper, we have proposed a social based updatable filtering protocol (SAFE) with privacy- preserving in MSNs. Firstly, analyzing the social relationships among users, we have introduced common attributes to effectively and efficiently distribute filters. According to Merkle tree, the SAFE updates the filters to adjust the various requirements from users. Furthermore, the security analysis demonstrates that user s private information embedded in the filters can be protected, while the extensive simulation results show that the SAFE can significantly reduce communication and storage overhead with high efficiency and low delay. To the best of our knowledge, this paper is the first work addressing filter update in MSNs. In our future work, we intend to explore the adaptive filter update to further improve the update efficiency. REFERENCES [] X. Liang, X. Li, R. Lu, X. Lin, and S. Shen, SEER: A secure and efficient service review system for service-oriented mobile social networks, in Proc. of IEEE ICDCS, 22, pp [2] F. Soldo, A. Le, and A. Markopoulou, Blacklisting recommendation system: Using spatio-temporal patterns to predict future attacks, IEEE JSAC, vol. 29, no. 7, pp , 2. [3] A. Ramachandran and N. Feamster, Understanding the network-level behavior of spammers, in Proc. of ACM SIGCOMM, 26, pp [4] R. Lu, X. Lin, T. H. Luan, X. Liang, X. Li, L. Chen, and X. Shen, : An efficient privacy-preserving relay filtering scheme for delay tolerant networks, in Proc. of IEEE INFOCOM, 22, pp [] B. Agrawal, N. Kumar, and M. Molle, Controlling spam s at the routers, in Proc. of IEEE ICC, 2, pp [6] Z. Li and H. Shen, SOAP: A social network aided personalized and effective spam filter to clean your box, in Proc. of IEEE INFOCOM, 2, pp [7] M. Sirivianos, K. Kim, and X. Yang, Socialfilter: Introducing social trust to collaborative spam mitigation, in Proc. of IEEE INFOCOM, 2, pp [8] R. Merkle, Protocols for public key cryptosystems, in Proc. of IEEE Symposium on Security and Privacy, Apr. 98, pp [9] Boneh and Franklin, Identity-based encryption from the weil pairing, SICOMP: SIAM Journal on Computing, vol. 32, 23. [] R. Lu, X. Lin, and X. Shen, Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks, in Proc. of IEEE INFOCOM, 2, pp [] F. Zhang, R. Safavi-Naini, W. Susilo, and W. Susilo, An efficient signature scheme from bilinear pairings and its applications. in Proc. of Public Key Cryptography, 24, pp [2] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, Fine-grained identification with real-time fairness in mobile social networks, in Proc. of IEEE ICC, 2, pp.. [3] J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, CRAWDAD trace cambridge/haggle/imote/infocom (v ). 649
Electronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
Efficient Unlinkable Secret Handshakes for Anonymous Communications
보안공학연구논문지 (Journal of Security Engineering), 제 7권 제 6호 2010년 12월 Efficient Unlinkable Secret Handshakes for Anonymous Communications Eun-Kyung Ryu 1), Kee-Young Yoo 2), Keum-Sook Ha 3) Abstract The technique
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
Signature Amortization Technique for Authenticating Delay Sensitive Stream
Signature Amortization Technique for Authenticating Delay Sensitive Stream M Bruntha 1, Dr J. Premalatha Ph.D. 2 1 M.E., 2 Professor, Department of Information Technology, Kongu Engineering College, Perundurai,
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED
A SECURE DATA TRANSMISSION FOR CLUSTER- BASED WIRELESS SENSOR NETWORKS IS INTRODUCED J Karunamayi 1, Annapurna V K 2 1 Student, Computer Network and Engineering,The National Institute of Engineering, Mysuru,
Single Sign-On Secure Authentication Password Mechanism
Single Sign-On Secure Authentication Password Mechanism Deepali M. Devkate, N.D.Kale ME Student, Department of CE, PVPIT, Bavdhan, SavitribaiPhule University Pune, Maharashtra,India. Assistant Professor,
Wireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Capture Resilient ElGamal Signature Protocols
Capture Resilient ElGamal Signature Protocols Hüseyin Acan 1, Kamer Kaya 2,, and Ali Aydın Selçuk 2 1 Bilkent University, Department of Mathematics [email protected] 2 Bilkent University, Department
A Topology-Aware Relay Lookup Scheme for P2P VoIP System
Int. J. Communications, Network and System Sciences, 2010, 3, 119-125 doi:10.4236/ijcns.2010.32018 Published Online February 2010 (http://www.scirp.org/journal/ijcns/). A Topology-Aware Relay Lookup Scheme
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
3-6 Toward Realizing Privacy-Preserving IP-Traceback
3-6 Toward Realizing Privacy-Preserving IP-Traceback The IP-traceback technology enables us to trace widely spread illegal users on Internet. However, to deploy this attractive technology, some problems
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
New Efficient Searchable Encryption Schemes from Bilinear Pairings
International Journal of Network Security, Vol.10, No.1, PP.25 31, Jan. 2010 25 New Efficient Searchable Encryption Schemes from Bilinear Pairings Chunxiang Gu and Yuefei Zhu (Corresponding author: Chunxiang
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network
The Feasibility of SET-IBS and SET-IBOOS Protocols in Cluster-Based Wireless Sensor Network R.Anbarasi 1, S.Gunasekaran 2 P.G. Student, Department of Computer Engineering, V.S.B Engineering College, Karur,
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood
An Introduction to Identity-based Cryptography CSEP 590TU March 2005 Carl Youngblood One significant impediment to the widespread adoption of public-key cryptography is its dependence on a public-key infrastructure
Network Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
Secure Communication in a Distributed System Using Identity Based Encryption
Secure Communication in a Distributed System Using Identity Based Encryption Tyron Stading IBM, Austin, Texas 78758, USA [email protected] Abstract Distributed systems require the ability to communicate
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment
Sharing Of Multi Owner Data in Dynamic Groups Securely In Cloud Environment Deepa Noorandevarmath 1, Rameshkumar H.K 2, C M Parameshwarappa 3 1 PG Student, Dept of CS&E, STJIT, Ranebennur. Karnataka, India
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography
Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography Liang Yan, Chunming Rong, and Gansen Zhao University of Stavanger, Norway {liang.yan,chunming.rong}@uis.no
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks
JOURNAL PAPER, ACCEPTED 1 Secure and Efficient Data Transmission for Cluster-based Wireless Sensor Networks Huang Lu, Student Member, IEEE, Jie Li, Senior Member, IEEE, Mohsen Guizani, Fellow, IEEE Abstract
[email protected] [email protected]
S. Sumathy 1 and B.Upendra Kumar 2 1 School of Computing Sciences, VIT University, Vellore-632 014, Tamilnadu, India [email protected] 2 School of Computing Sciences, VIT University, Vellore-632 014,
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Key Management. CSC 490 Special Topics Computer and Network Security. Dr. Xiao Qin. Auburn University http://www.eng.auburn.edu/~xqin xqin@auburn.
CSC 490 Special Topics Computer and Network Security Key Management Dr. Xiao Qin Auburn University http://www.eng.auburn.edu/~xqin [email protected] Slide 09-1 Overview Key exchange Session vs. interchange
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
Efficient Data Transmission For Wireless Sensor Networks
Volume: 2, Issue: 4, 221-225 April 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Girijalaxmi M.Tech scholar, Department of computer Vasudev S Senior assistant
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
III. Our Proposal ASOP ROUTING ALGORITHM. A.Position Management
Secured On-Demand Position Based Private Routing Protocol for Ad-Hoc Networks Ramya.R, Shobana.K, Thangam.V.S [email protected], k [email protected],[email protected] Department of Computer Science,
Strengthen RFID Tags Security Using New Data Structure
International Journal of Control and Automation 51 Strengthen RFID Tags Security Using New Data Structure Yan Liang and Chunming Rong Department of Electrical Engineering and Computer Science, University
Secure Data Aggregation and Data Recovery in Wireless Sensor Networks
International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 49 8958, Volume-, Issue-3, February 3 Secure Data Aggregation and Data Recovery in Wireless Sensor Networks John Major. J, Shajin
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW
HLA BASED PUBLIC AUDITING ARCHITECTURE TO FIND MALICIOUS NODE IN AD HOC NETWORK - A REVIEW Aejaz Ahmed 1, H C Sateesh Kumar 2 1 M.Tech student, Department of Telecommunication Engineering, DSCE, [email protected]
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme
Group Security Model in Wireless Sensor Network using Identity Based Cryptographic Scheme Asha A 1, Hussana Johar 2, Dr B R Sujatha 3 1 M.Tech Student, Department of ECE, GSSSIETW, Mysuru, Karnataka, India
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK
DETECTING AND PREVENTING THE PACKET FOR TRACE BACK DDOS ATTACK IN MOBILE AD-HOC NETWORK M.Yasodha 1, S.Umarani 2, D.Sharmila 3 1 PG Scholar, Maharaja Engineering College, Avinashi, India. 2 Assistant Professor,
A Road Map on Security Deliverables for Mobile Cloud Application
A Road Map on Security Deliverables for Mobile Cloud Application D.Pratiba 1, Manjunath A.E 2, Dr.N.K.Srinath 3, Dr.G.Shobha 4, Dr.Siddaraja 5 Asst. Professor, Department of Computer Science and Engineering,
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
Secured Data Transmissions In Manet Using Neighbor Position Verfication Protocol
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue3 March, 2014 Page No. 5067-5071 Secured Data Transmissions In Manet Using Neighbor Position Verfication
Protecting Privacy Secure Mechanism for Data Reporting In Wireless Sensor Networks
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
Quality of Service Routing Network and Performance Evaluation*
Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks
A Practical Authentication Scheme for In-Network Programming in Wireless Sensor Networks Ioannis Krontiris Athens Information Technology P.O.Box 68, 19.5 km Markopoulo Ave. GR- 19002, Peania, Athens, Greece
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
A Novel Packet Marketing Method in DDoS Attack Detection
SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun
18-731 Midterm. Name: Andrew user id:
18-731 Midterm 6 March 2008 Name: Andrew user id: Scores: Problem 0 (10 points): Problem 1 (10 points): Problem 2 (15 points): Problem 3 (10 points): Problem 4 (20 points): Problem 5 (10 points): Problem
Efficient File Sharing Scheme in Mobile Adhoc Network
Efficient File Sharing Scheme in Mobile Adhoc Network 1 Y. Santhi, 2 Mrs. M. Maria Sheeba 1 2ndMECSE, Ponjesly College of engineering, Nagercoil 2 Assistant professor, Department of CSE, Nagercoil Abstract:
Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu
Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds
Distributed Attribute Based Encryption for Patient Health Record Security under Clouds SHILPA ELSA ABRAHAM II ME (CSE) Nandha Engineering College Erode Abstract-Patient Health Records (PHR) is maintained
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
Keywords: Authentication, Third party audit, cloud storage, cloud service provider, Access control.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Identity Based
Security in Structured P2P Systems
P2P Systems, Security and Overlays Presented by Vishal thanks to Dan Rubenstein Columbia University 1 Security in Structured P2P Systems Structured Systems assume all nodes behave Position themselves in
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC
MESSAGE AUTHENTICATION IN AN IDENTITY-BASED ENCRYPTION SCHEME: 1-KEY-ENCRYPT-THEN-MAC by Brittanney Jaclyn Amento A Thesis Submitted to the Faculty of The Charles E. Schmidt College of Science in Partial
Signature Schemes. CSG 252 Fall 2006. Riccardo Pucella
Signature Schemes CSG 252 Fall 2006 Riccardo Pucella Signatures Signatures in real life have a number of properties They specify the person responsible for a document E.g. that it has been produced by
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Digital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA [email protected] Yunghsiang
The Mathematics of the RSA Public-Key Cryptosystem
The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
An Investigation of DOS Flooding Attack in VANET.
A B S T R A C T International Journal of Advance Foundation and Research in Computer (IJAFRC) An Investigation of DOS Flooding Attack in VANET. Vikash Porwal, Rajeev Patel, Dr. R. K. Kapoor. National Institute
Secure Routing in Wireless Sensor Networks
Secure Routing in Wireless Sensor Networks Introduction to Wireless Sensor Networks Ida Siahaan / Leonardo Fernandes DIT Ida Siahaan / Leonardo Fernandes (DIT) Secure Routing in Wireless Sensor Networks
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud
An Efficient Security Based Multi Owner Data Sharing for Un-Trusted Groups Using Broadcast Encryption Techniques in Cloud T.Vijayalakshmi 1, Balika J Chelliah 2,S.Alagumani 3 and Dr.J.Jagadeesan 4 1 PG
International Journal of Advanced Research in Computer Science and Software Engineering
Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental
A Comprehensive Data Forwarding Technique under Cloud with Dynamic Notification
Research Journal of Applied Sciences, Engineering and Technology 7(14): 2946-2953, 2014 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2014 Submitted: July 7, 2013 Accepted: August
Compter Networks Chapter 9: Network Security
Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau
Access Control And Intrusion Detection For Security In Wireless Sensor Network
Access Control And Intrusion Detection For Security In Wireless Sensor Network Sushma J. Gaurkar, Piyush K.Ingole Abstract: In wireless sensor networks (WSN), security access is one of the key component.
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
Certificate Based Signature Schemes without Pairings or Random Oracles
Certificate Based Signature Schemes without Pairings or Random Oracles p. 1/2 Certificate Based Signature Schemes without Pairings or Random Oracles Joseph K. Liu, Joonsang Baek, Willy Susilo and Jianying
