Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks: Third IFIP WG 11.2 International Workshop, WISTP 2009 ... Computer Science Security and Cryptology)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This volume constitutes the refereed proceedings of the Third IFIP WG 11.2 International Workshop on Information Security Theory and Practice: Smart Devices, Pervasive Systems, and Ubiquitous Networks, WISTP 2009 held in Brussels, Belgium in September 2009. The 12 revised full papers presented were carefully reviewed and selected from 27 submissions for inclusion in the book; they are organized in topical sections on mobility, attacks and secure implementations, performance and security, and cryptography.

Author(s): Olivier Markowitch, Angelos Bilas, Jaap-Henk Hoepman, Chris J. Mitchell, Jean-Jacques Quisquater
Edition: 1
Year: 2009

Language: English
Pages: 167

Introduction......Page 12
Malicious Hosts......Page 13
Multi-Code Agent......Page 14
Codification Part......Page 15
Distribution Part......Page 21
Timestamps Verification......Page 22
An Example of a Collusion Attack Based on Code Passing......Page 23
Conclusions......Page 26
Introduction......Page 28
Definitions......Page 29
Our Solution......Page 30
Basic Security Properties......Page 32
Unobservability against Passive Attackers......Page 33
Active Attack against Unobservability......Page 34
Conclusion......Page 36
Introduction......Page 39
Related Work......Page 40
System Architecture......Page 41
Location Privacy Requirement......Page 42
Functions of Location Database......Page 43
Registration of Location Information......Page 44
Randomization Function......Page 45
Scheme Properties......Page 46
Conclusion......Page 47
Introduction......Page 49
Terminology, Notation, and Conventions......Page 50
Security Properties and Adversary Models......Page 51
Algebraic Replay Attacks on Authentication......Page 52
Examples......Page 53
Attribute Acquisition Attacks on Untraceability......Page 54
Examples......Page 55
Examples......Page 58
Conclusion and Future Work......Page 60
Introduction......Page 63
Overview of Memory Spot Functionality......Page 65
Design Principles......Page 67
Creation of an Authentic Package......Page 68
Verification of the Authentic Package......Page 70
Remarks......Page 71
Cloning Memory Spot Tag Attacks......Page 73
Memory Spot Reuse Threat......Page 74
Stolen Memory Spots......Page 75
Comparison with the Existing Solutions......Page 76
Conclusions and Future Works......Page 77
Introduction......Page 79
Kim and Quisquater's Second-Order Fault Model......Page 81
Analysis of the First WISTP Countermeasure......Page 82
Analysis of the Second WISTP Countermeasure......Page 83
Analysis of the Original FDTC Countermeasure......Page 85
Analysis of the Improved FDTC Countermeasure......Page 86
Countermeasure......Page 87
Description......Page 88
Application......Page 89
Conclusion......Page 91
An Implementation of the Lock Procedure without Conditional Branches......Page 93
Introduction......Page 95
General Benchmarking Framework......Page 96
Statistical Correctness of the Measurements......Page 98
Validation through a Precision CAD......Page 103
Conclusion......Page 104
Introduction......Page 106
Performance Limitation in the Java-Card API......Page 108
Bignat: A Big-Integer Library for Java Card......Page 110
Implemented Protocols and Their Performance......Page 114
Conclusion......Page 116
Montgomery Multiplication......Page 118
Initialization and Personalization......Page 119
Resign Protocol......Page 120
Gate Protocol......Page 121
Introduction......Page 123
Key Establishment in WSNs......Page 124
Our Contributions......Page 126
Elliptic Curve Cryptography......Page 127
Elliptic Curve Diffie-Hellman (ECDH) Key Exchange......Page 128
Scalar Multiplication......Page 129
Prime-Field Arithmetic on the ATmega128......Page 130
Multiplication and Squaring......Page 131
Experimental Results and Discussion......Page 133
Conclusions......Page 135
Introduction......Page 139
A Dynamic Key Hierarchy......Page 141
One-Level Flavor......Page 142
Three-Level Flavor......Page 143
Security and Efficiency Considerations for the Complete Key Approach......Page 144
One-Level Flavor......Page 146
Two-Level Flavor......Page 147
Security and Efficiency Considerations for the Share-Based Approach......Page 148
Comparison of Complete Key Distribution Scheme and Share-Based Key Distribution Scheme......Page 149
Conclusions and Future Work......Page 151
Introduction......Page 154
Applications Requiring the Use of One-Dimensional WSNs......Page 155
Characteristics of One-Dimensional Sensor Networks......Page 156
Security Considerations for Key Distribution in One-Dimensional Sensor Networks......Page 157
Bounding the $s$-Fallibility of KPSs for Linear One-Dimensional WSNs......Page 159
An Ultra-Lightweight KPS Providing Optimal $s$-Fallibility......Page 160
Lightweight Key Predistribution for Ring Topologies......Page 161
Conclusion......Page 162
Introduction......Page 164
Certificate Management Schemes for MANET......Page 166
Adapting PKIX to MANET......Page 167
Evaluation of Cached Status Data Based on Risk......Page 170
Conclusions......Page 175