Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi...
详细信息
ISBN:
(纸本)9781424432127
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limited resources and security, no key distribution technique is ideal to all the scenarios where sensor networks are used. In this paper, we primarily focus on storage requirements of several key distribution schemes in sensor networks, and obtain their lower bounds on the amount of information each user has to keep secret by modeling the key distribution schemes with an information theoretic framework.
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo...
详细信息
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present a keying Material Based key Pre-distribution Scheme, i.e., a group of users, using secret information preloaded in their memory and some public information retrieved from a keying material server, can compute a common key. We first formally define the keying material based key pre-distribution scheme in terms of the entropy, and give lower bounds on the amount of information each user has to keep secret. Then, we describe its applications for sensor networks.
Trust relationship between participants is indispensable to set up in a large-scale distributed P2P file-sharing system. A novel trust model for P2P system based on advanced D-S theory of evidence is proposed in this ...
详细信息
Trust relationship between participants is indispensable to set up in a large-scale distributed P2P file-sharing system. A novel trust model for P2P system based on advanced D-S theory of evidence is proposed in this paper to solve this problem, in which mathematic analysis and some measures are presented to defense against several malicious attacks. The experimental results show that, compared to the current some trust models, the proposed model is more robust on trust security problems and more advanced in successful transaction rate.
This paper presents the design and implementation of an integrity measurement system based on Windows trusted computing platform. The trust chain is established from the BIOS up to the application layer, where the exe...
详细信息
This paper presents the design and implementation of an integrity measurement system based on Windows trusted computing platform. The trust chain is established from the BIOS up to the application layer, where the executable codes are taken the load-time measurements before execution. And the measurement system can generate an integrity proof for TPM-based remote attestation. In order to accurately reflect runtime integrity of critical applications, a light weight Clark-Wilson model is introduced for verify information flow integrity guarantee. Our experimental system strengthens the security posture of the platform. With the analysis of the tradeoff between performance and security, our system gives great consideration to the impact which the measurements cause to system performance.
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights p...
详细信息
ISBN:
(纸本)9781424441969
Existing digital rights management (abbr. DRM) approaches lack a flexible fine-grained digital rights transfer policy, also could not guarantee the trustworthy distribution and enforcement of the transferable rights policy by using DRM agent. First, descriptions of extensible ODRL-based rights transfer policy were presented to complete OMA REL. Then, we introduced a remote attestation mechanism among entities, such as RI and DRM agent, based on trusted computing platform in order to implement trusted distribution and enforcement of the policy, also mainly proposed trustworthy distribution protocols of the rights object and transfer, as well as a trusted policy enforcement protocol. Final, the approach is made comparison with existing DRM schemes as to several functionality aspects on transferable rights granularity, restricted sharing, temporal limitation, trust of DRM agent. A conclusion is drawn that the proposed scheme is not restricted within local domain environment, and accomplishes fine-grained rights transfer and contents sharing between users without direct participations of rights issuer or local domain manager.
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS genera...
详细信息
The security of certain classes of the generalized self-shrinking sequence (GSS) generators is analyzed. Firstly, it is shown that the security of these GSS generators is equivalent to the security of the GSS generators of the class-1, after which two effective key recovery attacks on the GSS generators of the class-1 are developed to evaluate their security.
This paper describes a kernel methods based Web Services matching mechanism for Web Services discovery and *** matching mechanism tries to exploit the latent semantics by the structure of Web *** this paper,Web Servic...
详细信息
This paper describes a kernel methods based Web Services matching mechanism for Web Services discovery and *** matching mechanism tries to exploit the latent semantics by the structure of Web *** this paper,Web Services are schemed by WSDL(Web Services Description Language)as tree-structured XML documents,and their matching degree is calculated by our novel algorithm designed for loosely tree matching against the traditional *** order to achieve the task,we bring forward the concept of path subsequence to model WSDL documents in the vector ***,an advanced n-spectrum kernel function is defined,so that the similarity of two WSDL documents can be drawn by implementing the kernel function in the *** textual similarity and n-spectrum kernel values as features of low-level and mid-level,we build up a model to estimate the functional similarity between Web Services,whose parameters are learned by a ***,a set of experiments were designed to verify the model,and the results showed that several metrics for the retrieval of Web Services have been improved by our approach.
Digital signature plays an important role in modern cryptography, but many signature schemes require high maintenance cost for certificate management and cannot provide immediate revocation either. In this paper, a ne...
详细信息
Digital signature plays an important role in modern cryptography, but many signature schemes require high maintenance cost for certificate management and cannot provide immediate revocation either. In this paper, a new efficient mediated certificateless signature scheme with fast evocation is proposed. A special on-line partially trusted SEM (security Mediator) which is responsible for distributing partial signature token is introduced into proposed construction of the mediated signature scheme. The proposed scheme can perform the immediate revocation and is existential un-forgeable against the adversary under the ECFP assumption and Inverse Weil-pairing assumption.
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentica...
详细信息
Ideal function is the fundamental component in the universally composable security model. However, the certification ideal function defined in the universally composable security model realizes the identity authentication by binding identity to messages and the signature, which fails to characterize the special security requirements of anonymous authentication with other kind of certificate. Therefore, inspired by the work of Marten, an anonymous hash certification ideal function and a more universal certificate CA model are proposed in this paper. We define the security requirements and security notions for this model in the framework of universal composable security and prove in the plain model (not in the random-oracle model) that these security notions can be achieved using combinations of a secure digital signature scheme, a symmetrical encryption mechanism, a family of pseudorandom functions, and a family of one-way collision-free hash functions. Considering the limitation of wireless environment and computation ability of wireless devices, this anonymous Hash certification ideal function is realized by using symmetry primitives.
暂无评论