3/25/ /25/2014 Sensor Network Security (Simon S. Lam) 1
|
|
- Isaac French
- 8 years ago
- Views:
Transcription
1 Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1
2 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84, Lecture Notes in Computer Science, Springer-Verlag, 209: , Wenliang Du, Jing Deng, Yunghsiang S. Han, and Pramod Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington DC, October /25/2014 Sensor Network Security (Simon S. Lam) 2 2
3 Motivation Ad hoc networks with no trusted infrastructure support Sensors have limited computation, storage, and energy resources Standard solutions to enable key agreement between computing devices are not appropriate o Public key algorithms o Trusted server 3/25/2014 Sensor Network Security (Simon S. Lam) 3 3
4 Pre-distribution of symmetric keys Naïve solution each node has the same master key o One node compromised => entire network compromised m For a network of N nodes, each node is preinstalled with N-1 symmetric keys for all other nodes o Not scalable 3/25/2014 Sensor Network Security (Simon S. Lam) 4 4
5 Random key pre-distribution Each node has a random subset of k symmetric keys from a large pool of keys Key-sharing graph (G,V) nodes i and j in V have an edge between them if and only if: o Node i and j are within transmission range of each other, and o Nodes i and j have a common key o [Eschenauer and Gligor 2002] Suppose nodes are randomly distributed. o Increase the transmission range of nodes => The key-sharing graph is connected with a high probability o If two nodes have a path between them in G, they can use the path (each edge is protected by a key) to exchange a symmetric key for subsequent communications More scalable but o nodes need to be trusted o communications relayed by a compromised node are compromised 3/25/2014 Sensor Network Security (Simon S. Lam) 5 5
6 Blom s key pre-distribution scheme -secure property When an adversary compromises less than or equal to nodes, uncompromised nodes are perfectly secure. When an adversary compromises more than nodes, all pairwise keys of the entire network are compromised 3/25/2014 Sensor Network Security (Simon S. Lam) 6 6
7 Pre-deployment phase A trusted controller first constructs a ( +1)xN matrix, G, over a finite field GF(q), where o N is the number of nodes o G is public information o q is a prime number larger than n (number of bits in key) Then the controller o creates a random ( +1)x( +1) symmetric matrix D over GF(q) o Matrix D is secret known only to the controller o The controller computes an Nx( +1) matrix A= (D.G) T where (D.G) T is the transpose of matrix D.G 3/25/2014 Sensor Network Security (Simon S. Lam) 7 7
8 Pre-deployment phase (2) Because D is symmetric, we have A.G = (D.G) T.G = G T.D T.G = G T.D.G = G T.A T = (AG) T Thus, AG is a symmetric matrix to be denoted by K = AG, where K ij = K ji, for all 1 i, j N, which can be used as the pairwise key between nodes i and j 3/25/2014 Sensor Network Security (Simon S. Lam) 8 8
9 Blom s key pre-distribution The controller stores the kth row of matrix A in node k, and the kth column of matrix G at node k When nodes i and j need to communicate confidentially, o they first exchange their columns of G (which is public info) in plaintext o then i and j compute K ij and K ji, respectively, using each node s private info (row of A) and received column of G 3/25/2014 Sensor Network Security (Simon S. Lam) 9 9
10 Blom s scheme illustrated private public Node i has Node j has If any +1 columns of G are linearly independent, then the above scheme is -secure 3/25/2014 Sensor Network Security (Simon S. Lam) 10 10
11 An example of matrix G Let each pairwise key be an element in the finite field feld GF(q), where q is the smallest prime number larger than 2 n o for keys represented by n bits Let s be a primitive element of GF(q) and N < q. o each nonzero element in GF(q) can be represented by some power of s o s i s j for i j 3/25/2014 Sensor Network Security (Simon S. Lam) 11 11
12 An example of matrix G (cont.) A Vandermonde matrix any +1 columns of G are linearly independent s, s 2, s N are all distinct any +1 columns of G are linearly independent only the seed s k of the kth column is stored in node k 3/25/2014 Sensor Network Security (Simon S. Lam) 12 12
13 Key pre-distribution idea of Du et al. (2003) The controller creates ω key spaces. For each key space, a tuple (D,G) is created as in Blom s scheme The controller pre-installs matrix rows and columns of a random subset of key spaces in each node 3/25/2014 Sensor Network Security (Simon S. Lam) 13 13
14 A key-sharing graph is also used Nodes i and j have an edge between them if and only if: o Nodes i and j are within transmission range of each other o Nodes i and j have a common key space Suppose nodes are randomly distributed. o Key-sharing graph is connected with a higher probability if There are more key spaces per node Each node has a longer transmission range o Two nodes with a path between them in the graph can communicate by first exchanging a key using encrypted links in the path but forwarding nodes need to be trustedt 3/25/2014 Sensor Network Security (Simon S. Lam) 14 14
15 Comparison with Blom s For a fixed node memory size, they compare Blom s scheme for a single key space with a larger and a deterministic -secure threshold ω key spaces, each node is randomly assigned key spaces. The threshold property is probabilistic: Given that x nodes are captured by an adversary, calculate the probability of at least one key space is compromised It is a soft threshold h which h is higher h than Blom s deterministic threshold, 3/25/2014 Sensor Network Security (Simon S. Lam) 15 15
16 Soft thresholds Fixed node memory size m =200, ω = 50 Du s m =( + 1) =5 =4 =3 Blom s is -secure, = m -1 = 199, deterministic i ti 3/25/2014 Sensor Network Security (Simon S. Lam) 16 16
17 Proposal of Du et al. (more) Given x nodes are compromised, some communications of other nodes are compromised since nodes also serve as relays Authors claim scalability, flexibility, and higher resilience to node capture compared to prior work More details in the paper 3/25/2014 Sensor Network Security (Simon S. Lam) 17 17
18 The End 3/25/2014 Sensor Network Security (Simon S. Lam) 18 18
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks
A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks Wenliang Du Systems Assurance Institute Department of Electrical Engineering and Computer Science Syracuse University Syracuse, NY 3244-24,
More informationSECURE KEY MANAGEMENT FOR DYNAMIC SENSOR NETWORKS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 83-88 SECURE KEY MANAGEMENT FOR DYNAMIC SENSOR NETWORKS 1 N. Suganthi, 2 V. Sumathi and 3 R. S. Mohanapriyha 1 Dept of Information
More informationBabel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks
Babel: Using a Common Bridge Node to Deliver Multiple Keys in Wireless Sensor Networks Jing Deng Department of Computer Science University of New Orleans New Orleans, LA 7048, USA jing@cs.uno.edu Yunghsiang
More informationExpander Graph based Key Distribution Mechanisms in Wireless Sensor Networks
Expander Graph based Key Distribution Mechanisms in Wireless Sensor Networks Seyit Ahmet Çamtepe Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 Email: camtes@cs.rpi.edu
More informationRestricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik
Restricted and Mobile: Security in Mobile Wireless Sensor Networks Kısıtlı ve Hareketli: Mobil Telsiz Duyarga Ağlarında Güvenlik Albert Levi levi@sabanciuniv..edu Sabancı University Computer Science and
More informationCombinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Seyit A. Çamtepe 1, Bülent Yener 1 Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY 12180, USA.
More informationADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL
ADVANCED NETWORK SECURITY SYSTEM FOR SETUP STAGE OF LEACH PROTOCOL 1 Rajesh C. Ramannavar, 2 Suma K.V 1 Student, 2 Assistant Professor M S Ramaiah Institute of Technology,Bengaluru,India Email: 1 raaj.rc586@gmail.com,
More informationEfficient Networking and Management Mechanism
Key Distribution Mechanisms for Wireless Sensor Networks: a Survey SEYIT A. ÇAMTEPE and BÜLENT YENER Rensselaer Polytechnic Institute Advances in technology introduce new application areas for sensor networks.
More informationSecured Communication in Wireless Sensor Networks
Secured Communication in Wireless Sensor Networks Jian Wang \ University of Teas at Arlington, Arlington, TX 77843 Email: {wang_jane@lycos.com} Abstract Recent advancement in wireless communications and
More informationFast and Scalable Key Establishment in. Sensor Networks
Fast and Scalable Key Establishment in 1 Sensor Networks Tassos Dimitriou, Ioannis Krontiris and Fotios Nikakis Athens Information Technology [tdim, ikro, fnik]@ait.gr Abstract We present a protocol for
More informationSECURING WIRELESS SENSOR NETWORKS: A SURVEY
3RD QUARTER 2008, VOLUME 10, NO. 3 IEEE COMMUNICATIONS SURVEYS www.comsoc.org/pubs/surveys SECURING WIRELESS SENSOR NETWORKS: A SURVEY YUN ZHOU AND YUGUANG FANG, UNIVERSITY OF FLORIDA YANCHAO ZHANG, NEW
More informationA New Scalable Key Pre-distribution Scheme for WSN
A New Scalable Key Pre-distribution Scheme for WSN Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah To cite this version: Walid Bechkit, Yacine Challal, Abdelmadjid Bouabdallah. A New Scalable Key
More informationSecure Key Management Architecture Against Sensor-node Fabrication Attacks
1 Secure Key Management Architecture Against Sensor-node Fabrication Attacks Jeffrey Dwoskin Dahai Xu Jianwei Huang Mung Chiang Ruby Lee {jdwoskin, dahaixu, jianweih, chiangm, rblee}@princeton.edu Department
More informationSimulation Modeling of Secure Wireless Sensor Networks
Simulation Modeling of Secure Wireless Sensor Networks Tuan Manh Vu Carey Williamson Reihaneh Safavi-Naini Department of Computer Science University of Calgary ABSTRACT This paper describes an extensible
More informationCS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: dstinson@uwaterloo.ca my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
More informationIdentity-Based Key Agreement and Encryption For Wireless Sensor Networks
182 IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 Identity-Based Key Agreement and Encryption For Wireless Sensor Networks Geng Yang 1, Chunming Rong 2, Christian
More informationSecurity Platform For Sensory Networks
Providing Transparent Security Services to Sensor Networks Hamed Soroush Athens Information Technology Email: hsor@ait.edu.gr Mastooreh Salajegheh Athens Information Technology Email: msal@ait.edu.gr Tassos
More informationEfficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without Encryption
Efficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without Encryption Yongge Wang Department of SIS, UNC Charlotte, USA yonwang@uncc.edu Abstract. LDPC codes, LT codes,
More informationHow To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
More informationUsing Adversary Structures to Analyze Network Models,
MTAT.07.007 Graduate seminar in cryptography Using Adversary Structures to Analyze Network Models University of Tartu db@ut.ee 1 Outline of the talk Problems in distributed systems Adversary Structure
More informationMODEL FOR SECURE DATA TRANSMISSION IN DEEP SPACE NETWORKS ARAVIND KUMAR. Master of Science in Information Technology.
MODEL FOR SECURE DATA TRANSMISSION IN DEEP SPACE NETWORKS By ARAVIND KUMAR Master of Science in Information Technology Anna University Chennai, Tamilnadu 2004 Submitted to the Faculty of the Graduate College
More informationTHIS: THreshold security for Information aggregation in Sensor networks
THIS: THreshold security for Information aggregation in Sensor networks Hai Vu Neeraj Mittal S. Venkatesan Department of Computer Science The University of Texas at Dallas Richardson, TX 75083, USA hai.vu@student.utdallas.edu
More informationSecure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution
Secure Network Discovery in Wireless Sensor Networks Using Combinatorial Key Pre-Distribution Kevin Henry Cryptography, Security, and Privacy (CrySP) Lab Cheriton School of Computer Science University
More informationSECURITY SCHEMES FOR WIRELESS SENSOR NETWORKS WITH MOBILE SINK
SECURITY SCHEMES FOR WIRELESS SENSOR NETWORKS WITH MOBILE SINK A Dissertation by AMAR ADNAN RASHEED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements
More informationSECTIONS 1.5-1.6 NOTES ON GRAPH THEORY NOTATION AND ITS USE IN THE STUDY OF SPARSE SYMMETRIC MATRICES
SECIONS.5-.6 NOES ON GRPH HEORY NOION ND IS USE IN HE SUDY OF SPRSE SYMMERIC MRICES graph G ( X, E) consists of a finite set of nodes or vertices X and edges E. EXMPLE : road map of part of British Columbia
More informationEnergy-Memory-Security Tradeoffs in Distributed Sensor Networks
Energy-Memory-Security Tradeoffs in Distributed Sensor Networks David D. Hwang 1,2, Bo-Cheng Charles Lai 1, and Ingrid Verbauwhede 1,2 1 University of California Los Angeles, Electrical Engineering Dept.,
More informationSecurity Sensor Network. Biswajit panja
Security Sensor Network Biswajit panja 1 Topics Security Issues in Wired Network Security Issues in Wireless Network Security Issues in Sensor Network 2 Security Issues in Wired Network 3 Security Attacks
More informationWireless Network Security 14-814 Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #8 Broadcast Security & Key Mgmt 1 Announcements 2 Broadcast Communication Wireless networks can leverage the broadcast advantage property
More informationDATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
More informationA Survey on Wireless Sensor Network Security
A Survey on Wireless Sensor Network Security Jaydip Sen Tata Consultancy Services Limited, Wireless & Multimedia Innovation Lab, Bengal Intelligent Park, Salt Lake Electronics Complex, Kolkata 700091,
More informationSecure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 25, 1691-1705 (2009) Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks Computer Engineering Department Gazi University
More informationSECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
More informationA KEY RE-DISTRIBUTION AND AUTHENTICATION BASED TECHNIQUE FOR SECURED COMMUNICATION IN CLUSTERED WIRELESS SENSOR NETWORKS WITH NODE MOBILITY
A KEY RE-DISTRIBUTION AND AUTHENTICATION BASED TECHNIQUE FOR SECURED COMMUNICATION IN CLUSTERED WIRELESS SENSOR NETWORKS WITH NODE MOBILITY Saswati Mukherjee 1, Matangini Chattopadhyay 1, Samiran Chattopadhyay
More informationReferences: Adi Shamir, How to Share a Secret, CACM, November 1979.
Ad Hoc Network Security References: Adi Shamir, How to Share a Secret, CACM, November 1979. Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang, Providing Robust and Ubiquitous Security Support
More informationDeveloping and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
More informationMobile Security Wireless Mesh Network Security. Sascha Alexander Jopen
Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks
More informationA Secure Key Management Scheme in Wireless Mesh Networks
A Secure Key Management Scheme in Wireless Mesh Networks Farah Kandah, Weiyi Zhang, Xiaojiang Du, Yashaswi Singh Department of Computer Science, North Dakota State University, Fargo, ND 585 Department
More informationEvolutionary Design of Secrecy Amplification Protocols for Wireless Sensor Networks
Evolutionary Design of Secrecy Amplification Protocols for Wireless Sensor Networks Petr Švenda, Lukáš Sekanina, Václav Matyáš Masaryk University and University of Technology, Brno, Czech Republic {svenda,
More informationSecure Neighbor Discovery in Wireless Sensor Networks
Purdue University Purdue e-pubs ECE Technical Reports Electrical and Computer Engineering 8-16-2007 Secure Neighbor Discovery in Wireless Sensor Networks Saurabh Bagchi Purdue University, sbagchi@purdue.edu
More informationWireless Sensor Networks
Scaling Laws of Key Pre-distribution Protocols in 1 Wireless Sensor Networks Wenjun Gu, Xiaole Bai and Sriram Chellappan Abstract A host of key pre-distribution (KP) protocols have been proposed for secure
More informationDesign of LDPC codes
Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm observing the degree distribution of the code
More informationGROUP KEY DISTRIBUTION VIA LOCAL COLLABORATION IN WIRELESS SENSOR NETWORKS ANUJ CHADHA. Presented to the Faculty of the Graduate School of
GROUP KEY DISTRIBUTION VIA LOCAL COLLABORATION IN WIRELESS SENSOR NETWORKS by ANUJ CHADHA Presented to the Faculty of the Graduate School of The University of Texas at Arlington in Partial Fulfillment
More informationComparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control
Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control Haodong Wang, Bo Sheng, Chiu C. Tan, Qun Li College of William and Mary Williamsburg,
More informationA SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES
A SURVEY ON WIRELESS SENSOR NETWORKS SECURITY WITH THE INTEGRATION OF CLUSTERING AND KEYING TECHNIQUES V K Singh 1 and Kalpana Sharma 2 1 Department of Computer Science & Engineering, Sikkim Manipal Institute
More informationSPSF: Server Predominant Security Framework for Wireless Sensor Network in Mission-Critical Applications
SPSF: Server Predominant Security Framework for Wireless Sensor Network in Mission-Critical Applications Liu Qiang, Cui Yimin, Kuang Xiaohui, Liu Li, Sun Xiaoxia National Key Laboratory of Science and
More informationOn the Distribution and Revocation of Cryptographic Keys in Sensor Networks
On the Distribution and Revocation of Cryptographic Keys in Sensor Networks Haowen Chan Carnegie Mellon University haowenchan@cmu.edu Adrian Perrig Carnegie Mellon University perrig@cmu.edu Virgil Gligor
More informationSecuring MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 Karanvirk09@gmail.com 2
More informationMultiuser Message Authentication, Application to Verifiable Secret Sharing and Key Management Schemes
Computer Science and Information Technology 1(2): 97-104, 2013 DOI: 10.13189/csit.2013.010204 http://www.hrpub.org Multiuser Message Authentication, Application to Verifiable Secret Sharing and Key Management
More informationSECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS
SECURE ROUTING IN WIRELESS SENSOR NETWORKS: ROUTING PROTOCOLS 1 A.Senthilkumar and 2 Dr.C.Chandrasekar 1 Assistant.Professor, Department of MCA, Sengunthar Engineering College, Tiruchengode - 637205, Tamilnadu,
More informationVoteID 2011 Internet Voting System with Cast as Intended Verification
VoteID 2011 Internet Voting System with Cast as Intended Verification September 2011 VP R&D Jordi Puiggali@scytl.com Index Introduction Proposal Security Conclusions 2. Introduction Client computers could
More informationMasao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
More informationOPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION
OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationSecure Data Aggregation with Multiple Encryption
Secure Data Aggregation with Multiple Encryption Melek Önen and Refik Molva Institut Eurécom Sophia-Antipolis, France {melek.onen,refik.molva}@eurecom.fr Abstract. Data aggregation has been put forward
More informationAn Application of Visual Cryptography To Financial Documents
An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University
More informationLecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
More informationKEY DISTRIBUTION TECHNIQUES FOR SENSOR NETWORKS Haowen Chan, Adrian Perrig, and Dawn Song Carnegie Mellon University
Chapter 1 KEY DISTRIBUTION TECHNIQUES FOR SENSOR NETWORKS Haowen Chan, Adrian Perrig, and Dawn Song Carnegie Mellon University {haowenchan, perrig, dawnsong}@cmu.edu Abstract. This chapter reviews several
More informationA NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK
A NEW APPROACH TO ENHANCE SECURITY IN MPLS NETWORK S.Veni 1 and Dr.G.M.Kadhar Nawaz 2 1 Research Scholar, Barathiar University, Coimbatore, India venii_k@yahoo.com 2 Director, Dept. of MCA, Sona College
More informationSystems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
More informationIEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 56, NO. 10, OCTOBER 2011 2345
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 56, NO 10, OCTOBER 2011 2345 Compositional Modeling and Analysis of Multi-Hop Control Networks Rajeev Alur, Fellow, IEEE, Alessandro D Innocenzo, Karl H Johansson,
More informationA COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS
A COMPARATIVE STUDY OF SECURE SEARCH PROTOCOLS IN PAY- AS-YOU-GO CLOUDS V. Anand 1, Ahmed Abdul Moiz Qyser 2 1 Muffakham Jah College of Engineering and Technology, Hyderabad, India 2 Muffakham Jah College
More informationAn Application-Oriented Framework for Wireless Sensor Network Key Establishment
Electronic Notes in Theoretical Computer Science 192 (2008) 31 41 www.elsevier.com/locate/entcs An Application-Oriented Framework for Wireless Sensor Network Key Establishment Keith M. Martin 2 Maura Paterson
More informationApplying General Access Structure to Metering Schemes
Applying General Access Structure to Metering Schemes Ventzislav Nikov Department of Mathematics and Computing Science, Eindhoven University of Technology P.O. Box 513, 5600 MB, Eindhoven, the Netherlands
More informationHost-Oblivious Security for Content-Based Networks
Host-Oblivious Security for Content-Based Networks Jongmin Jeong Seoul National University jmjeong@mmlab.snu.ac.kr Ted "Taekyoung" Kwon Seoul National University tk@mmlab.snu.ac.kr Yanghee Choi Seoul National
More informationNetwork Coding for Security and Error Correction
Network Coding for Security and Error Correction NGAI, Chi Kin A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Doctor of Philosophy in Information Engineering c The Chinese
More informationSecurity Aspects of. Database Outsourcing. Vahid Khodabakhshi Hadi Halvachi. Dec, 2012
Security Aspects of Database Outsourcing Dec, 2012 Vahid Khodabakhshi Hadi Halvachi Security Aspects of Database Outsourcing Security Aspects of Database Outsourcing 2 Outline Introduction to Database
More informationAsking Hard Graph Questions. Paul Burkhardt. February 3, 2014
Beyond Watson: Predictive Analytics and Big Data U.S. National Security Agency Research Directorate - R6 Technical Report February 3, 2014 300 years before Watson there was Euler! The first (Jeopardy!)
More informationOn the Security of Wireless Sensor Networks
On the Security of Wireless Sensor Networks Rodrigo Roman 1, Jianying Zhou 1, and Javier Lopez 2 1 Institute for Infocomm Research, 21 Heng Mui Keng Terrace, Singapore 119613 roman@lcc.uma.es, jyzhou@i2r.a-star.edu.sg
More informationNetwork Security. Computer Networking Lecture 08. March 19, 2012. HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23
Network Security Computer Networking Lecture 08 HKU SPACE Community College March 19, 2012 HKU SPACE CC CN Lecture 08 1/23 Outline Introduction Cryptography Algorithms Secret Key Algorithm Message Digest
More informationBinary vs Analogue Path Monitoring in IP Networks
Binary vs Analogue Path Monitoring in IP Networks Hung X. Nguyen and Patrick Thiran School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland {hung.nguyen, patrick.thiran}@epfl.ch
More informationCountermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks
Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks Jing Deng Richard Han Shivakant Mishra Computer Science Department University of Colorado at Boulder Boulder, Colorado, USA
More informationDirect Methods for Solving Linear Systems. Matrix Factorization
Direct Methods for Solving Linear Systems Matrix Factorization Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011
More informationRSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
More informationGENERATING SETS KEITH CONRAD
GENERATING SETS KEITH CONRAD 1 Introduction In R n, every vector can be written as a unique linear combination of the standard basis e 1,, e n A notion weaker than a basis is a spanning set: a set of vectors
More information(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
More informationRandom Key Predistribution Schemes for Sensor Networks
Random Key Predistribution Schemes for Sensor Networks Haowen Chan Adrian Perrig Dawn Song Carnegie Mellon University {haowenchan, perrig, dawnsong}@cmu.edu Abstract Key establishment in sensor networks
More informationLEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks SENCUN ZHU The Pennsylvania State University and SANJEEV SETIA George Mason University and SUSHIL JAJODIA George Mason University
More informationEmbedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Embedding more security in digital signature system by using combination of public
More informationSECRET sharing schemes were introduced by Blakley [5]
206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has
More informationCryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
More informationThe Quadratic Sieve Factoring Algorithm
The Quadratic Sieve Factoring Algorithm Eric Landquist MATH 488: Cryptographic Algorithms December 14, 2001 1 Introduction Mathematicians have been attempting to find better and faster ways to factor composite
More informationOn the representability of the bi-uniform matroid
On the representability of the bi-uniform matroid Simeon Ball, Carles Padró, Zsuzsa Weiner and Chaoping Xing August 3, 2012 Abstract Every bi-uniform matroid is representable over all sufficiently large
More informationCSC 774 Advanced Network Security. Outline. Related Work
CC 77 Advanced Network ecurity Topic 6.3 ecure and Resilient Time ynchronization in Wireless ensor Networks 1 Outline Background of Wireless ensor Networks Related Work TinyeRync: ecure and Resilient Time
More informationWarshall s Algorithm: Transitive Closure
CS 0 Theory of Algorithms / CS 68 Algorithms in Bioinformaticsi Dynamic Programming Part II. Warshall s Algorithm: Transitive Closure Computes the transitive closure of a relation (Alternatively: all paths
More informationEfficient Recovery of Secrets
Efficient Recovery of Secrets Marcel Fernandez Miguel Soriano, IEEE Senior Member Department of Telematics Engineering. Universitat Politècnica de Catalunya. C/ Jordi Girona 1 i 3. Campus Nord, Mod C3,
More informationVerifiable Symmetric Searchable Encryption for Multiple Groups of Users
Verifiable Symmetric Searchable Encryption for Multiple Groups of Users Zachary A. Kissel and Jie Wang Department of Computer Science, University of Massachusetts Lowell, Lowell, MA, USA Abstract We present
More informationProviding End-to-end Secure Communications in Wireless Sensor Networks
1 Providing End-to-end Secure Communications in Wireless Sensor Networks Wenjun Gu, Neelanjana Dutta, Sriram Chellappan and Xiaole Bai Abstract In many Wireless Sensor Networks (WSNs), providing end to
More informationDetecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks Donggang Liu Peng Ning North Carolina State University {dliu,pning}@ncsu.edu Wenliang Du Syracuse University wedu@ecs.syr.edu
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More information1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
More informationEfficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks
Efficient and Robust Secure Aggregation of Encrypted Data in Wireless Sensor Networks J. M. BAHI, C. GUYEUX, and A. MAKHOUL Computer Science Laboratory LIFC University of Franche-Comté Journée thématique
More informationMACs Message authentication and integrity. Table of contents
MACs Message authentication and integrity Foundations of Cryptography Computer Science Department Wellesley College Table of contents Introduction MACs Constructing Secure MACs Secure communication and
More informationElectronic Contract Signing without Using Trusted Third Party
Electronic Contract Signing without Using Trusted Third Party Zhiguo Wan 1, Robert H. Deng 2 and David Lee 1 Sim Kim Boon Institute for Financial Economics 1, School of Information Science 2, Singapore
More informationAuthenticated In-Network Programming for Wireless Sensor Networks
Authenticated In-Network Programming for Wireless Sensor Networks Ioannis Krontiris and Tassos Dimitriou Athens Information Technology, P.O.Box 68, 19.5 km Markopoulo Ave., GR- 19002, Peania, Athens, Greece
More informationAdvanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
More informationEnd-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich
End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless
More informationCHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES
CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather
More information6.231 Dynamic Programming and Stochastic Control Fall 2008
MIT OpenCourseWare http://ocw.mit.edu 6.231 Dynamic Programming and Stochastic Control Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 6.231
More informationAn Efficient Group Key Distribution Security Scheme in Wireless Sensor Networks
International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 An Efficient Group Key Distribution Security Scheme in Wireless Sensor Networks S.Prema *, S.Nagaraj ** *
More information15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs
15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration
More information