Segui questo link per vedere altri tipi di pubblicazioni sul tema: Security protocol.

Articoli di riviste sul tema "Security protocol"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "Security protocol".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.

1

Younes, Osama, and Umar Albalawi. "Securing Session Initiation Protocol." Sensors 22, no. 23 (2022): 9103. http://dx.doi.org/10.3390/s22239103.

Testo completo
Abstract (sommario):
The session initiation protocol (SIP) is widely used for multimedia communication as a signaling protocol for managing, establishing, maintaining, and terminating multimedia sessions among participants. However, SIP is exposed to a variety of security threats. To overcome the security flaws of SIP, it needs to support a number of security services: authentication, confidentiality, and integrity. Few solutions have been introduced in the literature to secure SIP, which can support these security services. Most of them are based on internet security standards and have many drawbacks. This work i
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Sharma, Garima, and Harish Mittal. "SS7 Signaling Protocol ? Security." International Journal of Scientific Engineering and Research 4, no. 5 (2016): 31–34. https://doi.org/10.70729/ijser15811.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Rekha, H., and M. Siddappa. "Model Checking M2M and Centralised IOT authentication Protocols." Journal of Physics: Conference Series 2161, no. 1 (2022): 012042. http://dx.doi.org/10.1088/1742-6596/2161/1/012042.

Testo completo
Abstract (sommario):
Abstract It is very difficult to develop a perfect security protocol for communication over the IoT network and developing a reliable authentication protocol requires a detailed understanding of cryptography. To ensure the reliability of security protocols of IoT, the validation method is not a good choice because of its several disadvantages and limitations. To prove the high reliability of Cryptographic Security Protocols(CSP) for IoT networks, the functional correctness of security protocols must be proved secure mathematically. Using the Formal Verification technique we can prove the funct
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Günther, Felix. "Modeling advanced security aspects of key exchange and secure channel protocols." it - Information Technology 62, no. 5-6 (2020): 287–93. http://dx.doi.org/10.1515/itit-2020-0029.

Testo completo
Abstract (sommario):
AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these co
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Nam, Junghyun, Kim-Kwang Raymond Choo, Minkyu Park, Juryon Paik, and Dongho Won. "On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/479534.

Testo completo
Abstract (sommario):
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3) the indistingu
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Amin, Ruhul, SK Hafizul Islam, Muhammad Khurram Khan, Arijit Karati, Debasis Giri, and Saru Kumari. "A Two-Factor RSA-Based Robust Authentication System for Multiserver Environments." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/5989151.

Testo completo
Abstract (sommario):
The concept of two-factor multiserver authentication protocol was developed to avoid multiple number of registrations using multiple smart-cards and passwords. Recently, a variety of two-factor multiserver authentication protocols have been developed. It is observed that the existing RSA-based multiserver authentication protocols are not suitable in terms of computation complexities and security attacks. To provide lower complexities and security resilience against known attacks, this article proposes a two-factor (password and smart-card) user authentication protocol with the RSA cryptosystem
Gli stili APA, Harvard, Vancouver, ISO e altri
7

He, Xudong, Jiabing Liu, Chin-Tser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology." IEEE Access 7 (2019): 131050–67. http://dx.doi.org/10.1109/access.2019.2940512.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Ko, Yongho, Jiyoon Kim, Daniel Gerbi Duguma, Philip Virgil Astillo, Ilsun You, and Giovanni Pau. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6 (2021): 2057. http://dx.doi.org/10.3390/s21062057.

Testo completo
Abstract (sommario):
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although seve
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Wang, Ying Lian, and Jun Yao Ye. "Research on Applied-Information Technology in Hierarchical Network Security Protocols Designing Based on Public Key." Advanced Materials Research 951 (May 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amr.951.169.

Testo completo
Abstract (sommario):
This paper proposed an applied-information technology in hierarchical network security protocols designing model based on public key, the designing of the protocols is to be completed in several layers. Each sub-protocol achieved a sub-goal that it should complete, and provided data interface to a higher sub-protocol. And then merged the sub-protocol of each layer, to complete the protocols designing. In the previous research, the security of the protocol in applied-information technology was always regarded as a whole, which caused the protocols designing to be tremendous complexity. The hier
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Du, Jinze, Chengtai Gao, and Tao Feng. "Formal Safety Assessment and Improvement of DDS Protocol for Industrial Data Distribution Service." Future Internet 15, no. 1 (2022): 24. http://dx.doi.org/10.3390/fi15010024.

Testo completo
Abstract (sommario):
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, medical care, transportation, and national defense. With the wide application of various protocols, protocol security has become a top priority. There are many studies on protocol security, but these studies lack a formal security assessment of protocols. Based on the above status, this paper evaluates and improves the security of the DDS protoc
Gli stili APA, Harvard, Vancouver, ISO e altri
11

Ding, Xia Jun, Xiao Dan Jiang, and Yue Zhai Zheng. "The Research and Implementation of E-Commerce Secure Payment Protocol." Advanced Materials Research 267 (June 2011): 74–79. http://dx.doi.org/10.4028/www.scientific.net/amr.267.74.

Testo completo
Abstract (sommario):
To implement e-commerce, the key issue is to ensure that the security of system on entire business process, primarily through encryption, security, security agreement to guarantee the e-commerce network security. The security protocol mainly used Secure Sockets Layer Protocol and Secure Electronic Transaction. In this paper, after analysis two kinds of protocol and the security technology used in the protocol, put forward a small scale enterprise e-commerce transaction system design of network security protocols, which play a reference role to small and medium enterprises engaged in electronic
Gli stili APA, Harvard, Vancouver, ISO e altri
12

Lee, Sangjun, Seunghwan Son, and Youngho Park. "Lightweight and Security-Enhanced Key Agreement Protocol Using PUF for IoD Environments." Mathematics 13, no. 13 (2025): 2062. https://doi.org/10.3390/math13132062.

Testo completo
Abstract (sommario):
With the increasing demand for drones in diverse tasks, the Internet of Drones (IoD) has recently emerged as a significant technology in academia and industry. The IoD environment enables various services, such as traffic and environmental monitoring, disaster situation management, and military operations. However, IoD communication is vulnerable to security threats due to the exchange of sensitive information over insecure public channels. Moreover, public key-based cryptographic schemes are impractical for communication with resource-constrained drones due to their limited computational capa
Gli stili APA, Harvard, Vancouver, ISO e altri
13

Galchynsky, Leonid, and Valeriia Korolova. "ASSESSMENT OF THE SECURITY OF WIRELESS NETWORKS IN AN URBAN ENVIRONMENT, TAKING INTO ACCOUNT THE USE OF SECURITY PROTOCOLS." Інфокомунікаційні та комп’ютерні технології, no. 2(6) (2023): 9–21. http://dx.doi.org/10.36994/2788-5518-2023-02-06-01.

Testo completo
Abstract (sommario):
This paper presents the results of a study of assessing the level of security of wireless networks in an urban environment on the example of Kyiv. An analysis of factors affecting the level of security, in particular encryption, authentication and integrity, which affect the level of the mechanism for protecting wireless network traffic, in particular the types of protocols WER, WPA, WPA2 and WPA3, depending on the attack models, is carried out. Protocol vulnerabilities are shown in the context of different protocol configurations. The security advantage of one type of protocol over another is
Gli stili APA, Harvard, Vancouver, ISO e altri
14

Zhang, Ke, Kai Xu, and Fushan Wei. "A Provably Secure Anonymous Authenticated Key Exchange Protocol Based on ECC for Wireless Sensor Networks." Wireless Communications and Mobile Computing 2018 (July 16, 2018): 1–9. http://dx.doi.org/10.1155/2018/2484268.

Testo completo
Abstract (sommario):
In wireless sensor networks, users sometimes need to retrieve real-time data directly from the sensor nodes. Many authentication protocols are proposed to address the security and privacy aspects of this scenario. However, these protocols still have security loopholes and fail to provide strong user anonymity. In order to overcome these shortcomings, we propose an anonymous authenticated key exchange protocol based on Elliptic Curves Cryptography (ECC). The novel protocol provides strong user anonymity such that even the gateway node and the sensor nodes do not know the real identity of the us
Gli stili APA, Harvard, Vancouver, ISO e altri
15

Wu, Fusheng, Huanguo Zhang, Wengqing Wang, Jianwei Jia, and Shi Yuan. "A New Method to Analyze the Security of Protocol Implementations Based on Ideal Trace." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/7042835.

Testo completo
Abstract (sommario):
The security analysis of protocols on theory level cannot guarantee the security of protocol implementations. To solve this problem, researchers have done a lot, and many achievements have been reached in this field, such as model extraction and code generation. However, the existing methods do not take the security of protocol implementations into account. In this paper, we have proposed to exploit the traces of function return values to analyze the security of protocol implementations at the source code level. Taking classic protocols into consideration, for example (like the Needham-Schroed
Gli stili APA, Harvard, Vancouver, ISO e altri
16

Liu, Shanpeng, Xiong Li, Fan Wu, Junguo Liao, Jin Wang, and Dingbao Lin. "A Novel Authentication Protocol with Strong Security for Roaming Service in Global Mobile Networks." Electronics 8, no. 9 (2019): 939. http://dx.doi.org/10.3390/electronics8090939.

Testo completo
Abstract (sommario):
In today’s society, Global Mobile Networks (GLOMONETs) have become an important network infrastructure that provides seamless roaming service for mobile users when they leave their home network. Authentication is an essential mechanism for secure communication among the mobile user, home network, and foreign network in GLOMONET. Recently, Madhusudhan and Shashidhara presented a lightweight authentication protocol for roaming application in GLOMONET. However, we found their protocol not only has design flaws, but is also vulnerable to many attacks. To address these weaknesses, this paper propos
Gli stili APA, Harvard, Vancouver, ISO e altri
17

Feng, Tao, Taining Chen, and Xiang Gong. "Formal Security Analysis of ISA100.11a Standard Protocol Based on Colored Petri Net Tool." Information 15, no. 2 (2024): 118. http://dx.doi.org/10.3390/info15020118.

Testo completo
Abstract (sommario):
This paper presents a formal security analysis of the ISA100.11a standard protocol using the Colored Petri Net (CPN) modeling approach. Firstly, we establish a security threat model for the ISA100.11a protocol and provide a detailed description and analysis of the identified security threats. Secondly, we use the CPN tool to model the protocol formally and conduct model checking and security analysis. Finally, we analyze and discuss the results of the model checking, which demonstrate that the ISA100.11a standard protocol may have vulnerabilities when certain security threats exist, and provid
Gli stili APA, Harvard, Vancouver, ISO e altri
18

Bala, Suman, Gaurav Sharma, Hmani Bansal, and Tarunpreet Bhatia. "On the Security of Authenticated Group Key Agreement Protocols." Scalable Computing: Practice and Experience 20, no. 1 (2019): 93–99. http://dx.doi.org/10.12694/scpe.v20i1.1440.

Testo completo
Abstract (sommario):
The group key agreement protocol enables to derive a shared session key for the remote members to communicate securely. Recently, several attempts are made to utilize group key agreement protocols for secure multicasting in Internet of Things. This paper contributes to identify the security vulnerabilities in the existing protocols, to avoid them in future constructions. The protocols presented by Gupta and Biswas have been found insecure to ephemeral secret key leakage (ESL) attack and also, malicious insiders can impersonate an honest participant. Additionally, the protocol presented by Tan
Gli stili APA, Harvard, Vancouver, ISO e altri
19

Lu, Jintian, Lili Yao, Xudong He, Chintser Huang, Dejun Wang, and Bo Meng. "A Security Analysis Method for Security Protocol Implementations Based on Message Construction." Applied Sciences 8, no. 12 (2018): 2543. http://dx.doi.org/10.3390/app8122543.

Testo completo
Abstract (sommario):
Security protocols are integral to the protection of cyberspace against malicious attacks. Therefore, it is important to be confident in the security of a security protocol. In previous years, people have worked on security of security protocol abstract specification. However, in recent years, people have found that this is not enough and have begun focusing on security protocol implementation. In order to evaluate the security of security protocol implementations, in this paper, firstly, we proposed the Message Construction to Security Protocol Implementation (MCSPI), a message construction m
Gli stili APA, Harvard, Vancouver, ISO e altri
20

Lu, Yaohua, and Gangyi Ding. "Quantum Secure Multi-Party Summation with Graph State." Entropy 26, no. 1 (2024): 80. http://dx.doi.org/10.3390/e26010080.

Testo completo
Abstract (sommario):
Quantum secure multi-party summation (QSMS) is a fundamental problem in quantum secure multi-party computation (QSMC), wherein multiple parties compute the sum of their data without revealing them. This paper proposes a novel QSMS protocol based on graph state, which offers enhanced security, usability, and flexibility compared to existing methods. The protocol leverages the structural advantages of graph state and employs random graph state structures and random encryption gate operations to provide stronger security. Additionally, the stabilizer of the graph state is utilized to detect eaves
Gli stili APA, Harvard, Vancouver, ISO e altri
21

Chen, Xiaojuan, and Huiwen Deng. "Efficient Verification of Cryptographic Protocols with Dynamic Epistemic Logic." Applied Sciences 10, no. 18 (2020): 6577. http://dx.doi.org/10.3390/app10186577.

Testo completo
Abstract (sommario):
The security of cryptographic protocols has always been an important issue. Although there are various verification schemes of protocols in the literature, efficiently and accurately verifying cryptographic protocols is still a challenging research task. In this work, we develop a formal method based on dynamic epistemic logic to analyze and describe cryptographic protocols. In particular, we adopt the action model to depict the execution process of the protocol. To verify the security, the intruder’s actions are analyzed. We model exactly the protocol applying our formal language and give the
Gli stili APA, Harvard, Vancouver, ISO e altri
22

Kang, Burong, Xinyu Meng, Lei Zhang, and Yinxia Sun. "Nonce-Based Key Agreement Protocol Against Bad Randomness." International Journal of Foundations of Computer Science 30, no. 04 (2019): 619–33. http://dx.doi.org/10.1142/s0129054119400161.

Testo completo
Abstract (sommario):
Most of the existing cryptographic schemes, e.g., key agreement protocol, call for good randomness. Otherwise, the security of these cryptographic schemes cannot be fully guaranteed. Nonce-based cryptosystem is recently introduced to improve the security of public key encryption and digital signature schemes by ensuring security when randomness fails. In this paper, we first investigate the security of key agreement protocols when randomness fails. Then we define the security model for nonce-based key agreement protocols and propose a nonce-based key agreement protocol that protects against ba
Gli stili APA, Harvard, Vancouver, ISO e altri
23

He, Lei, Yong Gan, Na Na Li, and Tao Zhang. "A Revised Serverless Authentication Protocol with Forward Security for RFID." Applied Mechanics and Materials 29-32 (August 2010): 2267–72. http://dx.doi.org/10.4028/www.scientific.net/amm.29-32.2267.

Testo completo
Abstract (sommario):
Information security problem has become one of the hottest issues in RFID system. More and more researchers begin to study how to provide security protection in the RFID system. In the paper, we mainly research lightweight authentication protocols in RFID system. Firstly, we analyze some protocols. Secondly, we introduce a serverless authentication protocol for RFID system and analyze its security. We find it does not provide forward security. Thirdly, we propose a revised serverless authentication protocol with forward security. It provides two-way authentication and privacy protection, resis
Gli stili APA, Harvard, Vancouver, ISO e altri
24

Kim, Taehun, Deokkyu Kwon, Yohan Park, and Youngho Park. "Blockchain-Based Secure Authentication Protocol for Fog-Enabled IoT Environments." Mathematics 13, no. 13 (2025): 2142. https://doi.org/10.3390/math13132142.

Testo completo
Abstract (sommario):
Fog computing technology grants computing and storage resources to nearby IoT devices, enabling a fast response and ensuring data locality. Thus, fog-enabled IoT environments provide real-time and convenient services to users in healthcare, agriculture, and road traffic monitoring. However, messages are exchanged on public channels, which can be targeted to various security attacks. Hence, secure authentication protocols are critical for reliable fog-enabled IoT services. In 2024, Harbi et al. proposed a remote user authentication protocol for fog-enabled IoT environments. They claimed that th
Gli stili APA, Harvard, Vancouver, ISO e altri
25

Bella, Giampaolo. "What is Correctness of Security Protocols?" JUCS - Journal of Universal Computer Science 14, no. (12) (2008): 2083–106. https://doi.org/10.3217/jucs-014-12-2083.

Testo completo
Abstract (sommario):
As soon as major protocol flaws were discovered empirically - a good luck that is not older than the early 1990s -- this title question came up to the world. It was soon realised that some notion of formal correctness was necessary to substantiate the confidence derived from informal analyses. But protocol correctness was born in a decade when security in general was only beginning to ferment. Security protocols aim at a large variety of goals. This is partly due to the increasing domains where the protocols are finding an application, such as secure access to localarea network services, secur
Gli stili APA, Harvard, Vancouver, ISO e altri
26

Xiao, Meihua, Weiwei Song, Ke Yang, Ri OuYang, and Hanyu Zhao. "Formal Analysis of the Security Protocol with Timestamp Using SPIN." Computational Intelligence and Neuroscience 2022 (August 23, 2022): 1–11. http://dx.doi.org/10.1155/2022/2420590.

Testo completo
Abstract (sommario):
The verification of security protocols is an important basis for network security. Now, some security protocols add timestamps to messages to defend against replay attacks by network intruders. Therefore, verifying the security properties of protocols with timestamps is of great significance to ensure network security. However, previous formal analysis method of such protocols often extracted timestamps into random numbers in order to simplify the model before modeling and verification, which probably cause time-dependent security properties that are ignored. To solve this problem, a method fo
Gli stili APA, Harvard, Vancouver, ISO e altri
27

Lu, Siqi, Qingdi Han, Xuyang Miao, and Yubo Liu. "Research on Security Protocol Analysis Tool SmartVerif." Journal of Physics: Conference Series 2132, no. 1 (2021): 012022. http://dx.doi.org/10.1088/1742-6596/2132/1/012022.

Testo completo
Abstract (sommario):
Abstract Security protocols have been designed to protect the security of the network. However, many security protocols cannot guarantee absolute security in real applications. Therefore, security tests of the network protocol become particularly important. In this paper, firstly, we introduce SmartVerif, which is the first formal analysis tool to automatically verify the security of protocols through dynamic strategies. And then, we use SmartVerif to verify the pseudo-randomness of the encapsulated key of the Two-Pass AKE protocol, which was proposed by Liu’s in ASIACRYPT in 2020. Finally, we
Gli stili APA, Harvard, Vancouver, ISO e altri
28

Oh, JiHyeon, SungJin Yu, JoonYoung Lee, SeungHwan Son, MyeongHyun Kim, and YoungHo Park. "A Secure and Lightweight Authentication Protocol for IoT-Based Smart Homes." Sensors 21, no. 4 (2021): 1488. http://dx.doi.org/10.3390/s21041488.

Testo completo
Abstract (sommario):
With the information and communication technologies (ICT) and Internet of Things (IoT) gradually advancing, smart homes have been able to provide home services to users. The user can enjoy a high level of comfort and improve his quality of life by using home services provided by smart devices. However, the smart home has security and privacy problems, since the user and smart devices communicate through an insecure channel. Therefore, a secure authentication protocol should be established between the user and smart devices. In 2020, Xiang and Zheng presented a situation-aware protocol for devi
Gli stili APA, Harvard, Vancouver, ISO e altri
29

Lv, Jiaxian, Yi Wang, Jinshu Su, Rongmao Chen, and Wenjun Wu. "Security of Auditing Protocols Against Subversion Attacks." International Journal of Foundations of Computer Science 31, no. 02 (2020): 193–206. http://dx.doi.org/10.1142/s0129054120500033.

Testo completo
Abstract (sommario):
In 2013, the revelation of Edward Snowden rekindled cryptographic researchers’ interest in subversion attacks. Since then, many works have been carried out to explore the power of subversion attacks and feasible effective countermeasures as well. In this work, we investigate the study of subversion attacks against cloud auditing protocol, which has been well-known as useful primitive for secure cloud storage. We demonstrate that subverted auditing protocol enables the cloud server to recover secret information stored on the data owner side. Particularly, we first define an asymmetric subversio
Gli stili APA, Harvard, Vancouver, ISO e altri
30

Kolev, Kaloyan, and Yordan Shterev. "WIRELESS SECURITY ISSUES." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 4 (June 22, 2024): 150–54. http://dx.doi.org/10.17770/etr2024vol4.8186.

Testo completo
Abstract (sommario):
Wireless home networks, for small organizations, as well as multi-user institutions and public networks need to be secured. This is a topical issue, especially since wireless protocols do not always provide good protection. The article aims to discuss the vulnerabilities and privacy security issues associated with wireless networks. The tools airmon-ng for monitoring, WireShark for snooping, aircrack-ng for dictionary pre-generation and also airodump-ng and aireplay-ng present in Kali Lunix were used. The results of attacks and penetration tests performed on an experimental wireless connection
Gli stili APA, Harvard, Vancouver, ISO e altri
31

U., Pavan Kumar. "IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 67–83. https://doi.org/10.5281/zenodo.4289544.

Testo completo
Abstract (sommario):
This paper is mainly based on providing security to the wireless networks through which devices like Bluetooth gets connected. The Wi-Fi connections are also prone to various attacks these days. The protocols that are required to provide security to wireless networks can be implemented by creating a wireless scenario using the software Network Simulator. This paper illustrates a scenario to check the security protocol. As NS2 mainly has the implementation of routing protocols, a new protocol should be designed especially for security purpose. This is done by following many tutorials to get a m
Gli stili APA, Harvard, Vancouver, ISO e altri
32

Peng, She Qiang, and Long Wang. "Research on RFID Multi-Authentication Protocol Based on Hash Function." Applied Mechanics and Materials 427-429 (September 2013): 2403–7. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2403.

Testo completo
Abstract (sommario):
To address the security problems caused by the fake readers, and the weakness of low authentication protocol efficiency, a new RFID security authentication protocol based on Hash function is proposed. The security ability of the protocol is compared with other protocols' and is proved by doing the formal analysis. The theoretical analysis and formal proof is presented to prove the security ability of the protocol. Consequently, the result showed that the new protocol could protect the data privacy, achieve the data synchronization, prevent the tag from location tracking, avoid information repr
Gli stili APA, Harvard, Vancouver, ISO e altri
33

Xiao, Meihua, Yuqiong Chen, Zehuan Li, Quangang Chen, and Ruihan Xu. "Proving Mutual Authentication Property of Industrial Internet of Things Multi-Factor Authentication Protocol Based on Logic of Events." Electronics 13, no. 1 (2023): 177. http://dx.doi.org/10.3390/electronics13010177.

Testo completo
Abstract (sommario):
Security protocols are the basis of modern network communication, proving that the security problem of protocols is one of the hot research topics today. The data in industrial IoT are usually transmitted through insecure channels, which brings certain security risks. The Logic of Events is a formal method for proving the security properties of protocols based on event systems. The new theoretical extension is based on the Logic of Events theory, which proposes new event classes Compurte, TimeGap, Construct, and Reconstruct and an axiom AxiomRe and related inference rules for malicious attacks
Gli stili APA, Harvard, Vancouver, ISO e altri
34

Abu Dhailah, Hala, Eyad Taqieddin, and Abdallah Alma'aitah. "An Enhanced and Resource-Aware RFID Multitag Grouping Protocol." Security and Communication Networks 2019 (May 23, 2019): 1–15. http://dx.doi.org/10.1155/2019/6862052.

Testo completo
Abstract (sommario):
Several grouping proof protocols were presented to meet the security requirements of Radio Frequency Identification Systems. Nevertheless, these protocols were shown to be vulnerable to various attacks. In this work, we cryptanalyze one of the newest grouping proof protocols. Through this analysis, we show the weaknesses of the protocol and launch a full-disclosure attack to disclose all secrets in the protocol. We show that the probability of success of the protocol is one and that increasing the length of the strings adds little complexity to the attack. We follow this by proposing an enhanc
Gli stili APA, Harvard, Vancouver, ISO e altri
35

Sabeeruddin, Shaik. "Comparative Analysis of Network Security Controls in the Modern Era." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 6 (2022): 1–7. https://doi.org/10.5281/zenodo.14866540.

Testo completo
Abstract (sommario):
In the current Digital world, to protect Data and provide secure communication internally and externally, Network security Protocols like Transport Layer Security (TLS), Internet Security Protocol (IPsec), and Hypertext Transfer Protocol Secure (HTTPS) play a crucial role in maintaining Security. This Research paper analyses the comparison of these protocols and explains their Functions, Use cases, and Limitations. This case study provides insights and explains the importance of these protocols in maintaining Security and protecting confidentiality, Integrity, and Availability. By Evaluating e
Gli stili APA, Harvard, Vancouver, ISO e altri
36

Ang Soh, Zhen, and Swee Huay Heng. "Security and Privacy of Contact Tracing Protocols for COVID-19." Journal of Engineering Technology and Applied Physics 4, no. 1 (2022): 30–34. http://dx.doi.org/10.33093/jetap.2022.4.1.5.

Testo completo
Abstract (sommario):
Contact tracing is a way to track people who have been in contact with infected patients of COVID-19 and thereby effective control is achieved. Various countries have developed their own contact tracing applications which deploy the same or different protocol. It is of utmost importance to improve public awareness on the potential hidden risks of the respective protocols and applications and instill user confidence. The purpose of this research is to study the security and privacy of the existing contact tracing protocols to ensure that the security and privacy of users can be guaranteed. The
Gli stili APA, Harvard, Vancouver, ISO e altri
37

Liu, Defu, Guowu Yang, Yong Huang, and Jinzhao Wu. "Inductive Method for Evaluating RFID Security Protocols." Wireless Communications and Mobile Computing 2019 (April 11, 2019): 1–8. http://dx.doi.org/10.1155/2019/2138468.

Testo completo
Abstract (sommario):
Authentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosion” in verifying the OSK protocol and VOSK protocol of RFID system. In this paper, the security and privacy of protocols in RFID systems are studied and analysed to verify the effectiveness of the combination of mathematical induction and model detection. We design a (r,s,t)-security experiment on th
Gli stili APA, Harvard, Vancouver, ISO e altri
38

Song, Jiawen, Meihua Xiao, Tong Zhang, and Haoyang Zhou. "Proving authentication property of PUF-based mutual authentication protocol based on logic of events." Soft Computing 26, no. 2 (2021): 841–52. http://dx.doi.org/10.1007/s00500-021-06163-9.

Testo completo
Abstract (sommario):
AbstractPUF (Physical unclonable function) is a new hardware security primitive, and the research on PUFs is one of the emerging research focuses. For PUF-based mutual authentication protocols, a method to abstract the security properties of hardware by using logic of events is proposed, and the application aspects of logic of events are extended to protocols based on hardware security. With the interaction of PUF-based mutual authentication protocol formally described by logic of events, the basic sequences are constructed and the strong authentication property in protocol interaction process
Gli stili APA, Harvard, Vancouver, ISO e altri
39

Che, Xin, Yangyang Geng, Ge Zhang, and Mufeng Wang. "Fuzzing Technology Based on Information Theory for Industrial Proprietary Protocol." Electronics 12, no. 14 (2023): 3041. http://dx.doi.org/10.3390/electronics12143041.

Testo completo
Abstract (sommario):
With the rapid development of the Industrial Internet of Things (IIoT), programmable logic controllers (PLCs) are becoming increasingly intelligent, leading to improved productivity. However, this also brings about a growing number of security vulnerabilities. As a result, efficiently identifying potential security vulnerabilities in PLCs has become a crucial research topic for security researchers. This article proposes a method for fuzzing industrial proprietary protocols to effectively identify security vulnerabilities in PLCs’ proprietary protocols. The aim of this study is to develop a pr
Gli stili APA, Harvard, Vancouver, ISO e altri
40

Thammarat, Chalee. "Efficient and Secure NFC Authentication for Mobile Payment Ensuring Fair Exchange Protocol." Symmetry 12, no. 10 (2020): 1649. http://dx.doi.org/10.3390/sym12101649.

Testo completo
Abstract (sommario):
The standard protocol of near field communication (NFC) has concentrated primarily on the speed of communication while ignoring security properties. Message between an NFC-enabled smartphone and a point of sale are exchanged over the air (OTA), which is a message considered an authentication request for payment, billing, ticketing, loyalty services, identification or access control. An attacker who has an antenna can intercept or manipulate the exchanged messages to take advantage of these. In order to solve this problem, many researchers have suggested authentication methods for NFC communica
Gli stili APA, Harvard, Vancouver, ISO e altri
41

Huo, Lin, Yi Lin Jiang, and Liang Qing Hu. "Research on Hash-Based Low-Cost RFID Security Authentication Protocol." Advanced Materials Research 846-847 (November 2013): 1524–30. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1524.

Testo completo
Abstract (sommario):
Because RFID does not require line of sight communication, low-cost and efficient operation with these outstanding advantages RFID are being widely used, followed by privacy and security vulnerabilities and other issues. Afterdescribe and analysis the facing security issues and the existing security protocols on the stage, proposed a low-cost RFID security authentication protocol based on hash function, this protocol use hash function and random numbers to ensure the safe and efficient control access between the tags and readers,and from the perspective of quantitative estimates the cost of ta
Gli stili APA, Harvard, Vancouver, ISO e altri
42

Tambunan, Alexander Theo Philus, Adi Prijuna Lubis, and Syartika Anggraini. "Perancangan Sistem Keamanan File Transfer Protocol Dengan Secure Socket Layer Pada Server Centos 7." J-Com (Journal of Computer) 1, no. 2 (2021): 95–102. http://dx.doi.org/10.33330/j-com.v2i1.1206.

Testo completo
Abstract (sommario):
Abstract: An advancement in communication technology currently has an influence on developments in data management in the joints of life, making the need for a media center something a must in digital archive storage. Data will not always be stored in personal computers, but it would be better if there was a centralized data container to be a solution in storage media, in order to prevent data loss or data backup. The term network (network) is used when there are at least two or more devices that are connected to one another. To carry out data exchange in this network, a protocol is used that
Gli stili APA, Harvard, Vancouver, ISO e altri
43

Tian, Yuan, Nanyijia Zhang, and Jian Li. "Two Novel Semi-Quantum Secure Direct Communication Protocols in IoT." Sensors 24, no. 24 (2024): 7990. https://doi.org/10.3390/s24247990.

Testo completo
Abstract (sommario):
As Internet of Things (IoT) technology continues to advance, there is a growing awareness of IoT security within the industry. Quantum communication technology can potentially significantly improve the communication security of IoT devices. Based on semi-quantum cryptography and utilizing single photons, this paper introduces two semi-quantum secure direct communication (SQSDC) protocols for use in smart door locks. Protocol 1 is more efficient, and the efficiency analysis shows that the communication efficiency is as high as 28.57%. Security analysis demonstrates the asymptotic security of th
Gli stili APA, Harvard, Vancouver, ISO e altri
44

M. M., Yusuf, Fumlack K. G., Caleb M., and Okpalaifeako L. C. "An Efficient Security Routing Protocol for Cloud-Based Networks Using Cisco Packet Tracer." British Journal of Computer, Networking and Information Technology 7, no. 2 (2024): 49–67. http://dx.doi.org/10.52589/bjcnit-oyirlauk.

Testo completo
Abstract (sommario):
In light of growing cloud computing usage, this study is designed and implemented on an efficient security routing protocol for cloud-based networks using Cisco Packet Tracer. Cloud computing's shared resources and dynamic scalability make cloud-based networks vulnerable to unwanted access, data breaches, and insider assaults, prompting the research. The research objectives are to identify and categorize security threats, evaluate existing security solutions, propose an enhanced security measures, and validate these solutions through simulations in Cisco Packet Tracer. A mixed-methods approach
Gli stili APA, Harvard, Vancouver, ISO e altri
45

Safkhani, Masoumeh, Nasour Bagheri, and Mahyar Shariat. "On the Security of Rotation Operation Based Ultra-Lightweight Authentication Protocols for RFID Systems." Future Internet 10, no. 9 (2018): 82. http://dx.doi.org/10.3390/fi10090082.

Testo completo
Abstract (sommario):
Passive Radio Frequency IDentification (RFID) tags are generally highly constrained and cannot support conventional encryption systems to meet the required security. Hence, designers of security protocols may try to achieve the desired security only using limited ultra-lightweight operations. In this paper, we show that the security of such protocols is not provided by using rotation functions. In the following, for an example, we investigate the security of an RFID authentication protocol that has been recently developed using rotation function named ULRAS, which stands for an Ultra-Lightweig
Gli stili APA, Harvard, Vancouver, ISO e altri
46

Li, Fu Lin, Jie Yang, Hong Wei Zhou, and Ying Liu. "A New Dynamic Protocol Analysis Model." Advanced Materials Research 765-767 (September 2013): 1761–65. http://dx.doi.org/10.4028/www.scientific.net/amr.765-767.1761.

Testo completo
Abstract (sommario):
Traditional static analysis methods such as formal validation and theorem proving were used to analyze protocols security previously. These methods can not measure and evaluate actual security of protocols accurately for the setting and suppose are far from the actual conditions. This paper proposes a new dynamic protocol analysis model. The system based on the model can be used to active test in actual running conditions, analyze known protocols security, integrity, robustness, and analyze unknown protocols online, provide support for protocol designer. The systems structure, working flow and
Gli stili APA, Harvard, Vancouver, ISO e altri
47

Sun, Xin, Piotr Kulicki, and Mirek Sopek. "Lottery and Auction on Quantum Blockchain." Entropy 22, no. 12 (2020): 1377. http://dx.doi.org/10.3390/e22121377.

Testo completo
Abstract (sommario):
This paper proposes a protocol for lottery and a protocol for auction on quantum Blockchain. Our protocol of lottery satisfies randomness, unpredictability, unforgeability, verifiability, decentralization and unconditional security. Our protocol of auction satisfies bid privacy, posterior privacy, bids’ binding, decentralization and unconditional security. Except quantum Blockchain, the main technique involved in both protocols is quantum bit commitment.
Gli stili APA, Harvard, Vancouver, ISO e altri
48

Huang, Chao, Bin Wang, Zhaoyang Bao, and Wenhao Qi. "2FAKA-C/S: A Robust Two-Factor Authentication and Key Agreement Protocol for C/S Data Transmission in Federated Learning." Applied Sciences 14, no. 15 (2024): 6664. http://dx.doi.org/10.3390/app14156664.

Testo completo
Abstract (sommario):
As a hot technology trend, the federated learning (FL) cleverly combines data utilization and privacy protection by processing data locally on the client and only sharing model parameters with the server, embodying an efficient and secure collaborative learning model between clients and aggregated Servers. During the process of uploading parameters in FL models, there is susceptibility to unauthorized access threats, which can result in training data leakage. To ensure data security during transmission, the Authentication and Key Agreement (AKA) protocols are proposed to authenticate legitimat
Gli stili APA, Harvard, Vancouver, ISO e altri
49

Lee, JoonYoung, Jihyeon Oh, and Youngho Park. "A Secure and Anonymous Authentication Protocol Based on Three-Factor Wireless Medical Sensor Networks." Electronics 12, no. 6 (2023): 1368. http://dx.doi.org/10.3390/electronics12061368.

Testo completo
Abstract (sommario):
Wireless medical sensor networks (WMSNs), a type of wireless sensor network (WSN), have enabled medical professionals to identify patients’ health information in real time to identify and diagnose their conditions. However, since wireless communication is performed through an open channel, an attacker can steal or manipulate the transmitted and received information. Because these attacks are directly related to the patients’ lives, it is necessary to prevent these attacks upfront by providing the security of WMSN communication. Although authentication protocols are continuously developed to es
Gli stili APA, Harvard, Vancouver, ISO e altri
50

Lee, Sangjun, Seunghwan Son, DeokKyu Kwon, Yohan Park, and Youngho Park. "A Secure and Efficient Authentication Scheme for Fog-Based Vehicular Ad Hoc Networks." Applied Sciences 15, no. 3 (2025): 1229. https://doi.org/10.3390/app15031229.

Testo completo
Abstract (sommario):
Recently, the application of fog-computing technology to vehicular ad hoc networks (VANETs) has rapidly advanced. Despite these advancements, challenges remain in ensuring efficient communication and security. Specifically, there are issues such as the high communication and computation load of authentications and insecure communication over public channels between fog nodes and vehicles. To address these problems, a lightweight and secure authenticated key agreement protocol for confidential communication is proposed. However, we found that the protocol does not offer perfect forward secrecy
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!