Embedded control applications such as drive-by-wire in cars require dependable interaction between various sensors, processors, and actuators. This paper addresses the design of low-cost communication networks guarant...
详细信息
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting th...
详细信息
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the network with the goal of depleting the resources Of the nodes relaying the packets. To thwart or prevent such attacks, it is necessary to employ authentication mechanisms that ensure that only authorized nodes can inject traffic into the network. In this paper we present LHAP a scalable and light-weight authentication protocol for ad hoc networks. LHAP is based on two techniques: (i) hop-by-hop authentication for verifying the authenticity of all the packets transmitted in the network and (ii) one-way key chain and TESLA for packet authentication and for reducing the overhead for establishing trust among nodes. We analyze the security of LHAP and show LHAP is a lightweight security protocol through detailed performance analysis.
The proceedings contain 24 papers. The special focus in this conference is on Trust management. The topics include: Architecture and algorithms for a distributed reputation system;regularity-based trust in cyberspace;...
ISBN:
(纸本)3540402241
The proceedings contain 24 papers. The special focus in this conference is on Trust management. The topics include: Architecture and algorithms for a distributed reputation system;regularity-based trust in cyberspace;a trust matrix model for electronic commerce;hardware security appliances for trust;managing trust and reputation in the xeno Server open platform;trust-based protection of software component users and designers;trust management tools for internet applications;trust-based filtering for augmented reality;towards the intimate trust advisor;trusting collaboration in global computing systems;trust, reliance, good faith, and the law;social capital, community trust, and E-government services;simulating the effect of reputation systems on e-markets;integrating trustfulness and decision using fuzzy cognitive maps;methodology to bridge different domains of trust in mobile communications;a subjective approach to routing in P2P and ad hoc networks;trust propagation in small worlds;enforcing collaboration in peer-to-peer routing services;statistical trustability;an introduction to trust negotiation;experience with the keynote trust management system;a policy-driven trust management framework;implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model and authenticated dictionaries for fresh attribute credentials.
The following topics are dealt with: multimedia streaming; video coding; media processing; video transmission; multimedia database; ad-hoc networks; virtual reality; human-computer interfaces; curriculum development; ...
详细信息
The following topics are dealt with: multimedia streaming; video coding; media processing; video transmission; multimedia database; ad-hoc networks; virtual reality; human-computer interfaces; curriculum development; distance education; Internet; multimedia systems; video analysis; network measurement; network security; distributed computing; sensor networks; wireless networks; and information management.
Although there has been a lot of discussion of "transactions" in mobile e-commerce (m-commerce), very little attention has been paid for distributed transactional properties of the computations facilitating ...
详细信息
This paper describes the design and implementation of an architecture for access controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a ...
详细信息
This paper describes the design and implementation of an architecture for access controlled resource discovery. This system achieves this goal by integrating access control with the Intentional Naming System (INS), a resource discovery and service location system. The integration is scalable, efficient, and fits well within a proxy-based security framework designed for dynamic networks. We provide performance experiments that show how our solution outperforms existing schemes. The result is a system that provides secure, Access controlled resource discovery that can scale to large numbers of resources and users.
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have very limited memory. In ad hoc networks...
详细信息
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have very limited memory. In ad hoc networks authentication can be a significant challenge, even without considering size and power constraints. Assuming idealized hashing, this paper examines lower bounds for ad hoc broadcast authentication for /spl mu/-TESLA-like protocols. In particular this paper focuses on idealized hashing for generating preimages of hash chains. Using variations on these idealized hash functions, this paper gives an idealized time-space product /spl Omega/(t/sup 2/ log/sup 4/ n) bit operation/sup 1/ lower-bound for optimal preimage hash chain generation. Where n is the total length of the hash chain and the hash elements are t-wise independent. Given our foundations, these results follow as corollaries to a lower bound of Coppersmith and Jakobsson.
To address the need for highly configurable and customizable distributedsystems, researchers and practitioners are investigating various innovative approaches. One of the promising techniques emerging from this area ...
详细信息
To address the need for highly configurable and customizable distributedsystems, researchers and practitioners are investigating various innovative approaches. One of the promising techniques emerging from this area of study is mobile computing. In this paper we present an architecture-based approach to supporting distributed deployment and mobility of software systems. We exploit a connector-aware architectural middleware in providing these capabilities. The approach has been successfully tested on several applications for networks of small, mobile, resource constrained devices (e.g., hand-held computers).
暂无评论