Issue 2: Security Systems Includes Six Papers Presented during Short and Work-in-progress Papers Session of the Third International Conference on Cryptography and Security Systems Rity Analysis of Wireless Sensor Network for Gas Lift in Oilwells by Bartªomiej
نویسندگان
چکیده
Cryptography and security systems are two elds of security research that strongly interact and complement each other. The series of International Conferences on Cryptography and Security Systems (CSS) is a forum for presentation of theoretical and applied research papers, case studies, implementation experiences, as well as work-in-progress results in these two disciplines. The conference especially invites young researchers and PhD students who have an opportunity to share their results with colleagues, invited keynote lecturers, and the Program Committee members actively participating in conference sessions. The research papers pre-published in three special volumes. One of them is vol. 448 of the Springer Communications in Computer and Information Science series. It includes seventeen regular papers, seven of which concern dierent areas of cryptography, while the remaining ten deal with recent problems of cryptographic protocols. Two other volumes are special issues of the journal Annales UMCS, ser. Informatica (vol. 14, no. 1 and 2). Thirteen papers in these issues are mainly short and work-in-progress papers; seven papers of Issue 1 concern cryptography and related problems while six remaining included in issue 2 deal with security systems. (CSS 2014). First four papers of this issue concern a very recent and extensively studied problem of contextual security. In the paper Adaptable context management framework for secure network services by Zbigniew Kotulski, Mariusz Sepczuk, Albert Sitek, Marcin Alan Tunia a new context management framework suitable for secure network services is proposed. The framework allows tracking contextual information from its origin, through all stages of its processing up to application in security services protecting the secure network application. Next three papers present dierent security services utilizing contextual information to increase their eectiveness. The paper of Mariusz Sepczuk entitled Authenti-cation mechanism based on adaptable context management framework for secure network services outlines what the context information is and shows a secure and user-friendly authentication mechanism for a mail box in cloud computing, based on using contextual data. The paper of Albert Sitek, Context-based Card-holder Verication Method in Electronic Funds Transfer transactions presents an alternative Cardholder Verication Method (CVM) that can be used instead of traditional PIN-based authentication. The last paper in this series, Vector approach to context data reliability by Marcin Alan Tunia presents a vector approach to context data reliability assessment and introduces a mechanism which allows to assess reliability parameters for further usage in the context-aware security systems. The next paper of this issue deals with …
منابع مشابه
Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملA novel key management scheme for heterogeneous sensor networks based on the position of nodes
Wireless sensor networks (WSNs) have many applications in the areas of commercial, military and environmental requirements. Regarding the deployment of low cost sensor nodes with restricted energy resources, these networks face a lot of security challenges. A basic approach for preparing a secure wireless communication in WSNs, is to propose an efficient cryptographic key management protocol be...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملThe Effect of Radio Waves on the Quality and Safety of Wearable Sensors in Healthcare
The industrial Internet of Things (IoT) is aiming to interconnect humans, machines, materials, processes and services in a network. Wireless Sensor Network (WSN) comprises the less power consuming, light weight and effective Sensor Nodes (SNs) for higher network performance. Radio Frequency Identification (RFID) and sensor networks are both wireless technologies that provide limitless future po...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014