Emerging Security Technologies and Applications

نویسنده

  • Fang-Yie Leu
چکیده

Due to the quick increase in number of mobile, ubiquitous, cloud, network and communication applications and studies, many computer and communication systems, wired or wireless, have been released to service their customers (human users or other systems). However, hackers everywhere around the world may attack these systems for some reasons, e.g., stealing one company’s business secrets for another one, penetrating a system to show the achievement of their professional skills, preventing a system from providing its regular/normal services just for fun, etc. To safely guard a system from being attacked or intruded, we need security mechanisms to protect our systems and the information delivered between/among the systems. That is why information security has been an important issue in recent computer and communication research. It is also why this special issue is created. This special issue collects a series of papers that discuss different aspects of emerging security technologies and applications. The focus of the selected articles mainly on technical approaches to prevent a system from being attacked, and on techniques for encrypting messages/information delivered between two communication entities. The first article [1], “Efficient and Low-Cost RFID Authentication Schemes” by Atsuko Miyaji, Mohammad Shahriar Rahman and Masakazu Soshi, presents two mutual RFID authentication protocols aiming to improve YA-TRAP* by preventing the system being considered from a timing attack, and by providing RFID with a RFID reader authentication. The two protocols also achieve other security properties like forward security, resistance against cloning, replay, and tracking attacks. Moreover, the computation and communication costs are kept as low as possible for the tags. In fact, it is important to keep the communication cost as low as possible when many tags are authenticated in batch-mode. By introducing an aggregate function for the reader-to-server communication, the communication cost is reduced. The second article [2], “Enhancing SVO Logic for Mobile IPv6 Security Protocols” by Ilsun You, Yoshiaki Hori and Kouichi Sakura, studies the formal analysis on the security protocols for MIPv6, particularly focusing on modal logic. Especially, the authors extend the SVO logic, which is one of the most mature and successful modal logic techniques, to precisely analyze MIPv6 security protocols. The proposed logic is applied to analyze the four security protocols, including CAM, ERO, KKP, and YHSP, to show its effectiveness in precisely reasoning about their security. The next article [3], “A Lightweight Security Framework for Wireless Sensor Networks” by Tanveer A. Zia and Albert Y. Zomaya, proposes a computationally lightweight security framework to provide WSNs with a comprehensive security solution against the known attacks. The framework consists of four interacting components: a secure triple-key scheme, secure routing algorithms, a secure localization technique and a malicious node detection mechanism, each of which can achieve a certain level of security. The framework takes into consideration the communication and computation limitations of sensor networks. Generally, there is always a tradeoff between security and performance. The authors claim that the experimental results prove that the framework can achieve a high degree of security with negligible overheads.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Reinforcement Learning in Neural Networks: A Survey

In recent years, researches on reinforcement learning (RL) have focused on bridging the gap between adaptive optimal control and bio-inspired learning techniques. Neural network reinforcement learning (NNRL) is among the most popular algorithms in the RL framework. The advantage of using neural networks enables the RL to search for optimal policies more efficiently in several real-life applicat...

متن کامل

Reinforcement Learning in Neural Networks: A Survey

In recent years, researches on reinforcement learning (RL) have focused on bridging the gap between adaptive optimal control and bio-inspired learning techniques. Neural network reinforcement learning (NNRL) is among the most popular algorithms in the RL framework. The advantage of using neural networks enables the RL to search for optimal policies more efficiently in several real-life applicat...

متن کامل

Security of Sponge structures

Sponge structure is a structure widely used in the design of cryptographic algorithms that reduces the design of the algorithms to the design of a permutation or pseudo-random function. The development of sponge-based algorithms and the selection of designs based on this structure in SHA3 and CAESAR competitions increase the need to examine its security against various types of attacks. In the ...

متن کامل

Optimal Strategies of Increasing Business Alignment, in Social Security Organization, with Quality Function Deployment (QFD) Approach

Considering the importance of the concept of strategic alignment of information technology (IT) in today economic organizations, this study attempted to extract the organization's IT strategies in order to increase the degree of strategic alignment and consequently the optimal strategies in the field of marketing and service delivery for social security organization. Using QFD technique and hie...

متن کامل

Emerging Optical CDMA Techniques and Applications

In this paper we present an in-depth review on the trends and the directions taken by the researchers worldwide in Optical Code Division Multiple Access (OCDMA) systems. We highlight those trends and features that are believed to be essential to the successful introduction of various OCDMA techniques in communication systems and data networks in near future. In particular we begin by giving a c...

متن کامل

Secure mobile business applications - framework, architecture and implementation

Emerging mobile technologies such as PDAs, laptops and smart phones together with wireless networking technologies such as WLAN and UMTS promise to empower mobile employees to become better integrated into their companies' business processes. However, the actual uptake of these technologies is still to come; one hindrance is security of mobile devices and applications. In this contribution we p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JoWUA

دوره 2  شماره 

صفحات  -

تاریخ انتشار 2011