Issue Information
No abstract is available for this article.
A novel self-checking ad hoc routing scheme against active black hole attacks
It is challenging to design a routing scheme that can successfully operate in the presence of adversarial environment in mobile ad hoc network MANET, where several types of severe routing security threats can be easily employed against normal routing. ...
The value of flow size distribution in entropy-based detection of DoS attacks
This paper investigates the use of flow size distribution as a source in entropy-based detection. The performance of detection based on this distribution is compared with the performance of detection based on simple packet distribution, namely ...
User-friendly random-grid-based visual secret sharing for general access structures
Compared with the visual-cryptography-based visual secret sharing, the random-grid-based visual secret sharing RGVSS has some technical advantages, such as no pixel expansion and no need of codebooks. Designed based on RGVSS, the user-friendly random-...
Home area network accountability with varying consumption devices in smart grid
Among the principals for securing smart grid infrastructure, accountability is one with lesser addressed concepts in smart grid literature. Even further, studies in the home area network are lacking in enforcement of accountable mechanisms as assigning ...
A secure white-box SM4 implementation
White-box cryptography aims at implementing a cipher to protect its key from being extracted in a white-box attack context, where an attacker has full control over dynamic execution of the cryptographic software. So far, most white-box implementations ...
Many-to-one homomorphic encryption scheme
The existing homomorphic encryption schemes are mostly in the form of "one-to-one" deployment models, where one party usually encrypts the plaintext and another party decrypts the ciphertext in public key cryptosystem. This form of cryptography loses ...
Provably secure identity-based encryption resilient to post-challenge continuous auxiliary input leakage
The situation for post-challenge continuous auxiliary input leakage has not been considered in the cryptography schemes for previous literature. We present a semantic-security model with post-challenge continuous auxiliary inputs for identity-based ...
Investigation of security issues for service-oriented network architecture
The current Internet is facing unprecedented demands, and the challenges and protocols were designed and incorporated into the system as a patchwork for solving many issues. The patchwork approach of non-integrated security mechanisms does not ...
Intrusion detection algorithm based on OCSVM in industrial control system
In order to detect abnormal communication behaviors efficiently in today's industrial control system, a new intrusion detection algorithm based on One-Class Support Vector Machine OCSVM is proposed in this paper. In this algorithm, a normal ...
Flashing displays: user-friendly solution for bootstrapping secure associations between multiple constrained wireless devices
Future healthcare systems, smart homes, and similar will involve a large number of smart inter-connected wireless devices such as wireless sensor nodes. One of the major challenges to securing these systems presents loading initial cryptographic ...
Security analysis of network protocols through model checking: a case study on mobile IPv6
The advent of computer networks makes network protocols - running on this unprotected environment - vulnerable against various attacks and malefactions. Hence, methods for automatic security verification of protocols in the early stages of protocol ...
Provably secure group key agreement protocol based on ECDH with integrated signature
This paper proposes a new two round authenticated contributory group key agreement ACGKA protocol based on elliptic curve Diffie-Hellman ECDH with integrated signature. In this technique, one node is picked up as the group controller, and this node runs ...
A stochastic model for the size of worm origin
Computer worms have infected millions of computers since the 1980s. For an incident handler or a forensic investigator, it is important to know whether the worm attack to the network has been initiated from multiple different sources or just from one ...
Tweakable parallel OFB mode of operation with delayed thread synchronization
Introduction of various cryptographic modes of operation is induced with noted imperfections of symmetric block algorithms. Design of some cryptographic modes of operation has already been exploited as an idea for parallelization of certain algorithms ...
Mitigating insider threat in cloud relational databases
Cloud security has become one of the emergent issues because of the immense growth of cloud services. A major concern in cloud security is the insider threat because of the harm that it poses. Therefore, defending cloud systems against insider attacks ...
An authentication scheme with identity-based cryptography for M2M security in cyber-physical systems
The Internet has made the world smaller while there is still a gap between the cyber world and our physical world. In the future cyber-physical system CPS, all objects in cyber world and physical world would be connected, and the concepts of cyber world ...
Quantum-resistance authentication in centralized cognitive radio networks
This paper presents a new method for mutual authentication in centralized cognitive radio networks. In doing so, we analyzed the proposed scheme in terms of security and performance. As for security, we analyzed the proposed scheme from a mathematical ...
Security analysis of Khudra: a lightweight block cipher for FPGAs
Khudra is a lightweight block cipher for field-programmable gate arrays, which appeared in SPACE 2014. In this paper, we consider the security of Khudra against the related-key attack. Firstly, we give some observations of F-function. Then we design a ...
PFX: an essence of authencryption for block-cipher security
Privacy and authentication are two primary aspects of many security systems. In this article, we propose a new mode of operation for block encryption called plain-text feedback XORing PFX, which can assure both confidentiality and message integrity ...
Novel secure VPN architectures for LTE backhaul networks
In this paper, we propose two secure virtual private network architectures for the long-term evolution backhaul network. They are layer 3 Internet protocol IP security virtual private network architectures based on Internet key exchange version 2 ...
A novel approach for spam email detection based on shifted binary patterns
Advances in communication allow people flexibility to communicate in various ways. Electronic mail email is one of the most used communication methods for personal or business purposes. However, it brings one of the most tackling issues, called spam ...
A survey of lightweight stream ciphers for embedded systems
Pervasive computing constitutes a growing trend, aiming to embed smart devices into everyday objects. The limited resources of these devices and the ever-present need for lower production costs, lead to the research and development of lightweight ...
Survey of return-oriented programming defense mechanisms
A prominent software security violation-buffer overflow attack has taken various forms and poses serious threats until today. One such vulnerability is return-oriented programming attack. An return-oriented programming attack circumvents the dynamic ...