Economic Perspectives, Vol. 33, No. 1, 2009. Low-Cost Untraceable Authentication Protocols for RFID A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation Attacks and Improvements to an RFID Mutual Authentication Protocol and its

eggplantcinnabarΚινητά – Ασύρματες Τεχνολογίες

21 Νοε 2013 (πριν από 3 χρόνια και 6 μήνες)

92 εμφανίσεις

(1)

RFID Security

and Privacy


(a)

Heydt
-
Benjamin, Thomas S., Bailey, Daniel V., Fu, Kevin, Juels, Ari and
O'Hare, Tom,

Vulnerabilities in First
-
Generation RFID
-
Enabled Credit Cards
.

Economic Perspectives, Vol. 33, No. 1, 2009.

(b)

Low
-
Cost Untraceable Authentication
Protocols for RFID
, Yong Ki Lee,
Lejla Batina, Dave Singeléand Ingrid Verbauwhede. ACM WiSec 2010.

(c)

A Secure and Scalable Identification for Hash
-
based RFID Systems Using
Updatable Pre
-
computation
, Yasunobu Nohara and Sozo Inoue. ACM WiSec
2010.

(d)

Attacks and

Improvements to an RFID Mutual Authentication Protocol and its
Extensions
, Cai Shaoying (Singapore Management University), Yingjiu Li
(Singapore Management University), Tieyan Li (Institute for Infocomm
Research, Singapore), Robert Deng (Singapore Managem
ent University).
ACm WiSec 2009.

(e)

Radu
-
Ioan

Paise and Serge Vaudenay.

Mutual authentication in RFID:
security and privacy. In Proceedings of the 2008 ACM symposium on
Information, computer and communications security (ASIACCS '08).

(f)

Marc Langheinrich. 2009.
A survey of RFID privacy approaches. Personal
Ubiquitous Comput. 13, 6 (August 2009), 413
-
421.


(2)

Jamming and DoS attacks



(a)

On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart
Jamming
, Bishal Thapa, Guevara Noubir, Rajmohan Rajaramanand

and Bo
Sheng. ACM WiSec 2011.

(b)

Thwarting Inside Jamming Attacks on Wireless Broadcast Communications
,
Sisi Liu, Loukas Lazos and Marwan Krunz. ACM WiSec 2011.

(c)

Reactive Jamming in Wireless Networks: How Realistic is the Threat?
,
Matthias Wilhelm, Ivan Marti
novic, Jens Schmitt and Vincent Lenders. ACM
WiSec 2011.

(d)

Jamming for Good: A Fresh Approach to Authentic Communication in WSNs
,
Ivan Martinovic, Paul Pichota, Jens B. Schmitt (University of Kaiserslautern,
Germany). ACM WiSec 2009.

(e)

Mitigating Control
-
Chann
el Jamming Attacks in Multi
-
channel Ad Hoc
Networks
, Loukas Lazos, Sisi Liu, Marwan Krunz (University of Arizona,
Tucson, US) ACM WiSec 2009.

(f)

Jerry T. Chiang and Yih
-
Chun Hu. 2011. Cross
-
layer jamming detection and
mitigation in wireless broadcast networks
. IEEE/ACM Trans. Netw. 19, 1
(February 2011), 286
-
298.


(3)

Traffic
and Behavior Analysis

(a)

Inferring Users' Online Activities through Traffic Analysis
, Fan Zhang,
Wenbo He, Xue Liu and Patrick Bridges. ACM WiSec 2011.

(b)

pBMDS: A Behavior
-
based Malware Detection
System for Cellphone Devices
,
Liang Xie, Xinwen Zhang, Jean
-
Pierre Seifert and Sencun Zhu. ACM WiSec
2010.

(c)

REAct: Resource
-
Efficient Accountability for Node Misbehavior in Ad Hoc
Networks based on Random Audits
, William Kozma, Loukas Lazos. ACM
WiSec 2009.

(d)

Raymond, D.R.; Marchany, R.C.; Brownfield, M.I.; Midkiff, S.F.; , "Effects
of Denial
-
of
-
Sleep Attacks on Wireless Sensor Network MAC Protocols,"
Vehicular Technology, IEEE Transactions on

, vol.58, no.1, pp.367
-
380, Jan.
2009.

(e)

Yanfei Fan; Yixin Jiang; Hao
jin Zhu; Jiming Chen; Shen, X.S.; , "Network
Coding Based Privacy Preservation against Traffic Analysis in Multi
-
Hop
Wireless Networks,"
Wireless Communications, IEEE Transactions on

,
vol.10, no.3, pp.834
-
843, March 2011.

(f)

Yong Sheng; Guanling Chen; Hongda

Yin; Keren Tan; Deshpande, U.; Vance,
B.; Kotz, D.; Campbell, A.; Mcdonald, C.; Henderson, T.; Wright, J.; , "Map:
a scalable monitoring system for dependable 802.11 wireless networks,"
Wireless Communications, IEEE

, vol.15, no.5, pp.10
-
18, October 2008


(4)

Security in Vehicle Ad Hoc Networks

(a)

ES
-
TeV: Efficient and Secure Threshold
-
based Event Validation for VANETs
,
Hsu
-
Chun Hsiao, Ahren Studer, Rituik Dubey, Elaine Shi and Adrian Perrig.
ACM WiSec 2011.

(b)

A secure and efficient communication scheme with authen
ticated key
establishment and privacy preserving for vehicular ad hoc networks,
Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2803
-
2814, Chun
-
Ta Li, Min
-
Shiang Hwang, Yen
-
Ping Chu.

(c)

A novel secure communication scheme in vehicular ad hoc

networks,
Computer Communications, Volume 31, Issue 12, 30 July 2008, Pages 2827
-
2837, Neng
-
Wen Wang, Yueh
-
Min Huang, Wei
-
Ming Chen.

(d)

Kamat, P., Baliga, A. and Trappe, W. (2008), Secure, pseudonymous, and
auditable communication in vehicular ad hoc network
s. Security and
Communication Networks, 1: 233

244.

(e)

SPECS: Secure and privacy enhancing communications schemes for VANETs,
Ad Hoc Networks, Volume 9, Issue 2, March 2011, Pages 189
-
203, T.W.
Chim, S.M. Yiu, Lucas C.K. Hui, Victor O.K. Li.

(f)

Security on VANET
s: Privacy, misbehaving nodes, false information and
secure data aggregation, Journal of Network and Computer Applications,
Volume 34, Issue 6, November 2011, Pages 1942
-
1955, David Antolino Rivas,
José M. Barceló
-
Ordinas, Manel Guerrero Zapata, Julián D.
Morillo
-
Pozo.


(5)

Remote Attestation of Wireless Devices

(a)

Lightweight Remote Attestation based on Physical Functions
, Ahmad
-
Reza
Sadeghi, Steffen Schulz and Christian Wachsmann. ACM WiSec 2011.

(b)

Self
-
healing Control Flow Protection in Sensor Applications
, Chris
topher
Ferguson, Qijun Gu, Hongchi Shi. ACM WiSec 2009.

(c)

Kyungsub Song; Dongwon Seo; Haemin Park; Heejo Lee; Perrig, A.; ,
"OMAP: One
-
Way Memory Attestation Protocol for Smart Meters," Parallel
and Distributed Processing with Applications Workshops (ISPAW),

2011
Ninth IEEE International Symposium on , vol., no., pp.111
-
118, 26
-
28 May
2011
.

(d)

Emanuele Cesena, Gianluca Ramunno, Roberto Sassu, Davide Vernizzi, and
Antonio Lioy. 2011. On scalability of remote attestation. In
Proceedings of
the sixth ACM workshop o
n Scalable trusted computing

(STC '11).

(e)

Alam, M., Ali, T., Khan, S., Khan, S., Ali, M., Nauman, M., Hayat, A.,
Khurram Khan, M. and Alghathbar, K. (2011), Analysis of existing remote
attestation techniques. Security and Communication Networks.

(f)

Lucas Davi,
Ahmad
-
Reza Sadeghi, and Marcel Winandy. 2009. Dynamic
integrity measurement and attestation: towards defense against return
-
oriented
programming attacks. In
Proceedings of the 2009 ACM workshop on Scalable
trusted computing

(STC '09).


(6)

Localization and Loc
ation Privacy

(a)

Preventing Multi
-
query Attack in Location
-
based Services
, Nilothpal Talukder
and Sheikh Iqbal Ahamed. ACM WiSec 2010.

(b)

Effectiveness of Distance
-
decreasing Attacks Against Impulse Radio Ranging
,
Manuel Flury, Marcin Poturalski, Panagiotis (Pan
os) Papadimitratos, Jean
-
Pierre Hubaux and Jean
-
Yves Le Boudec. ACM WiSec 2010.

(c)

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for
Wireless Sensor Networks
, Qi Mi, John Stankovic and Radu Stoleru. ACM
WiSec 2010.

(d)

Secure and Precise L
ocation Verification Using Distance Bounding and
Simultaneous Multilateration
, Jerry T. Chiang, Jason J. Haas, Yih
-
Chun Hu.
ACM WiSec 2009.

(e)

Li, Y.; Ren, J.; Wu, J.; , "Quantitative Measurement and Design of Source
-
Location Privacy Schemes for Wireless Sens
or Networks,"
Parallel and
Distributed Systems, IEEE Transactions on

, vol.PP, no.99, pp.1

10.

(f)

Location privacy and resilience in wireless sensor networks querying,
Computer Communications, Volume 34, Issue 3, 15 March 2011, Pages 515
-
523, Roberto Di Piet
ro, Alexandre Viejo


(7)

Physical Layer Security

(a)

Attacks on Physical
-
layer Identification
, Boris Danev, Heinrich Luecken,
Srdjan Capkun and Karim El Defrawy. ACM WiSec 2010.

(b)

On the Reliability of Wireless Fingerprinting using Clock Skews
, Chrisil
Arackaparambi
l, Sergey Bratus, Anna Shubina and David Kotz. ACM WiSec
2010.

(c)

Mathur, S.; Reznik, A.; Chunxuan Ye; Mukherjee, R.; Rahman, A.; Shah, Y.;
Trappe, W.; Mandayam, N.; , "Exploiting the physical layer for enhanced
security [Security and Privacy in Emerging Wire
less Networks],"
Wireless
Communications, IEEE

, vol.17, no.5, pp.63
-
70, October 2010.

(d)

Wen, H.; Ho, P.
-
H.; Qi, C.; Gong, G.; , "Physical layer assisted authentication
for distributed ad hoc wireless sensor networks,"
Information Security, IET

,
vol.4, no.4
, pp.390
-
396, December 2010.

(e)

Weichao Wang; Di Pu; Wyglinski, A.; , "Detecting Sybil nodes in wireless
networks with physical layer network coding,"
Dependable Systems and
Networks (DSN), 2010 IEEE/IFIP International Conference on

, vol., no.,
pp.21
-
30, Jun
e 28 2010
-
July 1 2010.