Catálogo de publicaciones - libros

Compartir en
redes sociales


Security in Pervasive Computing: Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings

John A. Clark ; Richard F. Paige ; Fiona A. C. Polack ; Phillip J. Brooke (eds.)

En conferencia: 3º International Conference on Security in Pervasive Computing (SPC) . York, UK . April 18, 2006 - April 21, 2006

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Data Encryption; Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; User Interfaces and Human Computer Interaction

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2006 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-33376-0

ISBN electrónico

978-3-540-33377-7

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2006

Tabla de contenidos

Trust Without Identification

Howard Chivers

This extended abstract describes an alternative to trusting individual nodes in pervasive systems, which is to exploit the diversity of nodes in such systems to build application ensembles that are collectively trustworthy. These configurations are resilient to high levels of attack, and are not dependent on large pre-distribution key-spaces.

Palabras clave: Sensor Network; Malicious Node; Individual Node; Reputation System; Sybil Attack.

- Invited Talk | Pp. 1-2

Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks

Jin Wook Byun; Su-Mi Lee; Dong Hoon Lee; Dowon Hong

In this paper, we consider a multi-layer mobile ad-hoc network (MANET) composed of several kinds of networking units (such as ground soldiers, tanks, and unmanned aerial vehicles) with heterogeneous resources to communicate and compute. In this multi-layer MANET, we first propose a password-based authenticated group key exchange scheme with members’ different passwords. The proposed scheme only requires constant-round to generate a group session key under the dynamic scenario, hence it is scalable, i.e., the overhead of key generation is independent of the size of a total group. We support the proposed scheme with formal security proof. Namely, our proposed scheme is the first constant-round password-based group key exchange with different passwords for the dynamic setting of MANET.

Palabras clave: Password authentication; key agreement; authenticated key exchange; heterogeneous; pervasive computing; multi-layer ad-hoc network.

- Protocols | Pp. 3-17

Enabling Secure Discovery in a Pervasive Environment

Slim Trabelsi; Jean-Christophe Pazzaglia; Yves Roudier

The pervasive computing paradigm assumes an essentially dynamic model of interaction between devices that also motivates the need to discover the services offered by previously unknown parties at an early phase of these interactions. Whereas this assumption is at the heart of many pervasive computing protocols and systems, the necessity of securing service discovery and the complexity of this task have been largely underestimated, if considered at all. This paper discusses the implications of insecure service discovery in available systems and which security objectives should be pursued. The design space for introducing security features into a specific architecture, namely registry-based discovery systems, is then explored and assessed.

- Protocols | Pp. 18-31

Forward Secure Communication in Wireless Sensor Networks

Sjouke Mauw; Ivo van Vessem; Bert Bos

We propose a set of security provisions for node to base station communication in wireless sensor networks. It supports standard security requirements, viz. authentication of the origin of data and confidentiality of data. Additionally we use key evolution to achieve forward security which is of particular importance in the face of node capture attacks. As a bonus we obtain implicit weak freshness without message expansion. We take the typical resource constraints of wireless sensor networks into account. The security provisions can be superimposed on several communication models, such as the epidemic communication model.

Palabras clave: Sensor Network; Sensor Node; Wireless Sensor Network; Hash Function; Block Cipher.

- Protocols | Pp. 32-42

Low Rate DoS Attack to Monoprocess Servers

Gabriel Maciá-Fernández; Jesús E. Díaz-Verdejo; Pedro García-Teodoro

In this work, we present a vulnerability in monoprocess or monothreaded servers that allows the execution of DoS attacks with the peculiarity that they are generated by low rate traffic. This feature makes the attack less vulnerable to detection by current IDS systems, which usually expect high rate traffic. The intruder can take advantage of some knowledge about the inter-output times in the server to build the attack. We have simulated and tested it in a real environment, obtaining worrying conclusions due to the efficiency achieved by the attack, with low effort from the attacker.

Palabras clave: Service Time; Real Environment; Intrusion Detection System; Round Trip Time; Service Queue.

- Mechanisms | Pp. 43-57

Delegating Secure Logging in Pervasive Computing Systems

Rafael Accorsi; Adolf Hohl

Logging is a central service in computing systems. It lays the foundation for accountability and audit services in computing systems, as well as for other accessory services. While providing logging services in traditional computing systems is a relatively smooth process, it turns to an intricate task in pervasive computing systems. In this context, we present two contributions addressing this problem. First, we develop an approach to securely log information in marginally trusted collectors. Second, we investigate the question of how to securely delegate our logging protocol to a relay equipped with trusted-computing modules.

Palabras clave: Pervasive Computing; Message Authentication Code; Trusted Platform Module; Cryptographic Operation; Security Guarantee.

- Mechanisms | Pp. 58-72

Implementing Minimized Multivariate PKC on Low-Resource Embedded Systems

Bo-Yin Yang; Chen-Mou Cheng; Bor-Rong Chen; Jiun-Ming Chen

Multivariate (or $\mathcal{MQ}$ ) public-key cryptosystems (PKC) are alternatives to traditional PKCs based on large algebraic structures (e.g., RSA and ECC); they usually execute much faster than traditional PKCs on the same hardware. However, one major challenge in implementing multivariates in embedded systems is that the key size can be prohibitively large for applications with stringent resource constraints such as low-cost smart cards, sensor networks (e.g., Berkeley motes), and radio-frequency identification (RFID). In this paper, we investigate strategies for shortening the key of a multivariate PKC. We apply these strategies to the Tame Transformation Signatures (TTS) as an example and quantify the improvement in key size and running speed, both theoretically and via implementation. We also investigate ways to save die space and energy consumption in hardware, reporting on our ASIC implementation of TTS on a TSMC 0.25 μ m process. Even without any key shortening, the current consumption of TTS is only 21  μ A for computing a signature, using 22,000 gate equivalents and 16,000 100-kHz cycles (160 ms). With circulant-matrix key shortening, the numbers go down to 17,000 gates and 4,400 cycles (44 ms). We therefore conclude: besides representing a future-proofing investment against the emerging quantum computers, multivariates can be immediately useful in niches.

Palabras clave: Multivariate public-key cryptosystem; efficient implementation; digital signature schemes; embedded system; sensor networks; motes.

- Mechanisms | Pp. 73-88

Higher Dependability and Security for Mobile Applications

Hongxia Jin

In this paper, we are concerned with the detection software faults and tampering of the mobile application as well as the mobile device theft. We want to disable mobile device cryptographically once either of these problems are detected. Basically the device needs to receive a new cryptographic key after each pre-set period of time in order to continue function. The mobile application execution integrity is checked by the authority when deciding whether or not to give out a new key. The detection can be done via a run-time result checking when the device connects to the authority. The authority can also proactively examine whether or not software tampering is happening. This paper will show approaches that each standalone can improve the dependability and security of a mobile application. We will show how these approaches can work together seamlessly to form a stronger scheme.

Palabras clave: Mobile Device; Search Tree; Mobile Agent; Mobile Application; Software Fault.

- Integrity | Pp. 89-103

Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks

Alexander Becher; Zinaida Benenson; Maximillian Dornseif

Most security protocols for wireless sensor networks (WSN) assume that the adversary can gain full control over a sensor node through direct physical access (node capture attack). But so far the amount of effort an attacker has to undertake in a node capture attack is unknown. In our project we evaluate different physical attacks against sensor node hardware. Detailed knowledge about the effort needed for physical attacks allows to fine tune security protocols in WSNs so they provide optimal protection at minimal cost.

Palabras clave: Sensor Node; Wireless Sensor Network; Physical Attack; Deployment Area; Node Capture.

- Integrity | Pp. 104-118

The Brave New World of Ambient Intelligence: An Analysis of Scenarios Regarding Privacy, Identity and Security Issues

Michael Friedewald; Elena Vildjiounaite; Yves Punie; David Wright

The success of Ambient Intelligence (AmI) will depend on how secure it can be made, how privacy and other rights of individuals can be protected and how individuals can come to trust the intelligent world that surrounds them and through which they move. This contribution presents an analysis of ambient intelligence scenarios, particularly in regard to AmI’s impacts on and implications for individual privacy. The analysis draws on our review of more than 70 AmI projects, principally in Europe. It notes the visions as well as the specifics of typical AmI scenarios. Several conclusions can be drawn from the analysis, not least of which is that most AmI scenarios depict a rather too sunny view of our technological future. Finally, reference is made to the SWAMI project (Safeguards in a World of Ambient Intelligence) which, inter alia, has constructed ”dark” scenarios, as we term them, to show how things can go wrong in AmI and where safeguards are needed.

Palabras clave: Ubiquitous Computing; Ambient Intelligence; Identity Theft; Smart Space; Personal Device.

- Privacy and Security | Pp. 119-133