Authentication Data

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 3192 Experts worldwide ranked by ideXlab platform

Shigang Chen - One of the best experts on this subject based on the ideXlab platform.

  • Privacy-preserving RFID Authentication based on cryptographical encoding
    2012 Proceedings IEEE INFOCOM, 2012
    Co-Authors: Tao Li, Zhen Mo, Shigang Chen
    Abstract:

    Radio Frequency IDentification (RFID) technology has been adopted in many applications, such as inventory control, object tracking, theft prevention, and supply chain management. Privacy-preserving Authentication in RFID systems is a very important problem. Existing protocols employ tree structures to achieve fast Authentication. We observe that these protocols require a tag to transmit a large amount of Data in each Authentication, which costs significant bandwidth and energy overhead. Current protocols also impose heavy computational demand on the RFID reader. To address these issues, we design two privacy-preserving protocols based on a new technique called cryptographical encoding, which significantly reduces both Authentication Data transmitted by each tag and computation overhead incurred at the reader. Our analysis shows that the new protocols are able to reduce Authentication Data by more than an order of magnitude and reduce computational demand by about an order of magnitude, when comparing with the best existing protocol.

Xiaoyong Du - One of the best experts on this subject based on the ideXlab platform.

  • GCC - Skip List Based Authenticated Data Structure in DAS Paradigm
    2009 Eighth International Conference on Grid and Cooperative Computing, 2009
    Co-Authors: Jieping Wang, Xiaoyong Du
    Abstract:

    In Database-as-a-Service (DAS) computing paradigm, Data owners delegate Database management tasks to service provider. Since the service provider is untrusted, query Authentication becomes an essential issue before Database outsourcing. In previous research, various Authentication Data Structures (ADS) have been proposed. However, most of them are either disk-based or static. Considering service provider usually owns large memory and powerful processors, in this paper we propose a dynamic main memory ADS based on skip list, which could provide efficient Authentication for range query both in static and in dynamic scenarios. Experimental results confirm our claim through a systematic analysis of verification metrics.

  • Skip List Based Authenticated Data Structure in DAS Paradigm
    2009 Eighth International Conference on Grid and Cooperative Computing, 2009
    Co-Authors: Jieping Wang, Xiaoyong Du
    Abstract:

    In Database-as-a-service (DAS) computing paradigm, Data owners delegate Database management tasks to service provider. Since the service provider is untrusted, query Authentication becomes an essential issue before Database outsourcing. In previous research, various Authentication Data structures (ADS) have been proposed. However, most of them are either disk-based or static. Considering service provider usually owns large memory and powerful processors, in this paper we propose a dynamic main memory ADS based on skip list, which could provide efficient Authentication for range query both in static and in dynamic scenarios. Experimental results confirm our claim through a systematic analysis of verification metrics.

Chang N. Zhang - One of the best experts on this subject based on the ideXlab platform.

  • RC4 state and its applications
    2011 Ninth Annual International Conference on Privacy Security and Trust, 2011
    Co-Authors: Qian Yu, Chang N. Zhang
    Abstract:

    In this paper, we define the RC4 state and introduce its forward and backward property. Based on the RC4 state and its forward and backward property, a simple, lightweight, but robust security protocol which achieves Data confidentiality, Data Authentication, Data integrity, and Data freshness with low overhead and simple operations is presented. Furthermore, an RC4 state based hash function for the generation of message Authentication code (MAC) is presented. The proposed protocol and hash function are ideal solution for resource-constrained applications where the communication nodes have limited power resources and computational capabilities, and can be widely used in the applications of one-to-one communications as well as broadcasting and multicasting.

  • Secure Broadcast in Wireless Sensor Networks
    2009 Third International Conference on Sensor Technologies and Applications, 2009
    Co-Authors: Qian Yu, Chang N. Zhang
    Abstract:

    In this paper we present a secure broadcast scheme for wireless sensor networks. The proposed scheme provides Data confidentiality, Data Authentication, Data integrity, and Data freshness with low overhead and simple operation. Since it allows delayed and lost packets, the secure broadcast is supported. Furthermore, it eliminates the requirement of frequent key renewal to overcome a special limitation of the stream ciphers. Due to the simplicity, efficiency, and security, the proposed scheme is a competitive solution to provide secure broadcast in wireless sensor networks.

  • An RC4-Based Lightweight Security Protocol for Resource-constrained Communications
    2008 11th IEEE International Conference on Computational Science and Engineering - Workshops, 2008
    Co-Authors: Chang N. Zhang, Qian Yu, Xun Huang, Cungang Yang
    Abstract:

    In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves Data confidentiality, Data Authentication, Data integrity, and Data freshness with low overhead and simple operations. Furthermore, an RC4-based hash function for the generation of message Authentication code (MAC) is presented. The proposed protocol is an ideal solution for resource-constrained environments where the communication nodes have limited power resources and computational capabilities, and can be widely used in the applications of one-to-one communications as well as broadcasting and multicasting.

Rytis Maskeliunas - One of the best experts on this subject based on the ideXlab platform.

  • A lightweight protocol for secure video streaming
    Sensors (Switzerland), 2018
    Co-Authors: Algimantas Venčkauskas, Kazimieras Bagdonas, Nerijus Morkevičius, Robertas Damaševičius, Rytis Maskeliunas
    Abstract:

    © 2018 by the authors. Licensee MDPI, Basel, Switzerland. The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide Data source Authentication, Data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed Authentication Data into streaming Data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.

Wu-lin Chen - One of the best experts on this subject based on the ideXlab platform.

  • Tamper detection and image recovery for BTC-compressed images
    Multimedia Tools and Applications, 2016
    Co-Authors: Yu-chen Hu, Kim-kwang Raymond Choo, Wu-lin Chen
    Abstract:

    To ensure the integrity of images compressed using block truncation coding (BTC), a tamper detection and image recovery scheme is proposed in this paper. In this scheme, the size of the Authentication Data can be adaptively selected according to the user’s requirement. The Authentication Data is embedded in the value differences of the quantization levels in each BTC-compressed image block. Multiple copies of the recovery Data are embedded into the bit maps of the smooth blocks. Experimental results show that the proposed scheme performs well in terms of detection precision and the embedded image quality. Meanwhile, the tampered areas can be roughly recovered by using the proposed scheme.

  • Grayscale Image Tamper Detection and Recovery Based on Vector Quantization
    International journal of security and its applications, 2013
    Co-Authors: Jun-chou Chuang, Chun Chi Lo, Chen Hu, Wu-lin Chen
    Abstract:

    This paper proposes a tamper detection and image recovery method for digital images. The proposed method not only locates the alterations but also recovers the tamper regions. In this method, the vector quantization scheme is employed to generate the Authentication Data. The image to be protected is first compressed by the vector quantization scheme to generate the indices for image blocks. Multi-copies of the indices are embedded into the selected blocks by the pseudo random number generator. To detect the tamper regions, the authenticaiton procedure employes the forward detection strategy and the backward detection mechanism to find out the image modifications. The tamper regions can then be recovered by using the Authentication Data that was embeded previously if needed. From the experimental results, it is shown that the tamper regions can be clearly detected and well recovered.

  • Probability-based tamper detection scheme for BTC-compressed images based on quantization levels modification
    International Journal of Security and its Applications, 2013
    Co-Authors: Yu-chen Hu, CHANG-MING WU, Chun Chi Lo, Wu-lin Chen, Chia-hsien Wen
    Abstract:

    To protect the image integrity of the compressed images for block truncation coding (BTC), an image Authentication scheme is proposed in this paper. In this scheme, the Authentication Data of each compressed image block is generated from the random value induced by the predefined random seed. The size of the Authentication Data can be selected according to the user's requirement. Then, the authenticaiton Data is embedded into the difference value between the quantization levels of each BTC-compressed image block. The experimental results reveal that the proposed scheme performs well in terms of detection precision and the embedded image quality.