Modification Attack

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 8676 Experts worldwide ranked by ideXlab platform

Keunsung Bae - One of the best experts on this subject based on the ideXlab platform.

Naveen Chilamkurti - One of the best experts on this subject based on the ideXlab platform.

  • a secure temporal credential based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    Information Sciences, 2015
    Co-Authors: Debiao He, Neeraj Kumar, Naveen Chilamkurti
    Abstract:

    With an advancement of wireless communication technology, wireless sensor network (WSN) has emerged as one of the most powerful technologies which can be used in various applications, such as military surveillance, environment monitoring, industrial control, and medical monitoring. WSNs are vulnerable to large collection of Attacks than traditional networks because they transmit data using a wireless channel and are deployed in unattended environments. So, in this environment, how to ensure secure communications between different communication parties becomes a challenging issue with respect to the constraints of energy consumption, and large overhead generated during various operations performed. In this direction, the mutual authentication and key agreement (MAAKA) scheme attracts much attention in recent years. In literature, MAAKA schemes were presented in last several years. However, most of these schemes cannot satisfy security requirements in WSNs. Recently, Xue et al. proposed a temporal-credential-based MAAKA scheme for WSNs and proved that it could withstand various types of Attacks. However, this paper points out that Xue et al.'s MAAKA scheme is vulnerable to the off-line password guessing Attack, the user impersonation Attack, the sensor node impersonation Attack and the Modification Attack. Moreover, this paper also points out that Xue et al.'s MAAKA scheme cannot provide user anonymity. To overcome weaknesses in Xue et al.'s MAAKA scheme, this paper proposes a new temporal-credential-based MAAKA scheme for WSNs. Security analysis shows the proposed MAAKA scheme could overcome the weaknesses in Xue et al.'s MAAKA scheme. Performance analysis shows the proposed MAAKA scheme has better performance than the existing benchmarked schemes in literature. Therefore, the proposed MAAKA scheme is more suitable for providing security for various applications in WSNs.

  • a secure temporal credential based mutual authentication and key agreement scheme for wireless sensor networks
    International Symposium on Wireless Pervasive Computing, 2013
    Co-Authors: Debiao He, Neeraj Kumar, Naveen Chilamkurti
    Abstract:

    With the development of wireless communication technology and sensor technology, the wireless sensor network (WSN) has been widely used in various applications, such as military surveillance, environment monitoring industry control, medical monitoring, and so on. In most of the cases, WSNs are deployed in unattended environment. So, these are more vulnerable to various Attacks than traditional networks. To protect communications in WSNs, mutual authentication and key agreement schemes for WSNs have been studied widely. Recently, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs and claimed their scheme could withstand various Attacks. However, in this paper, we will point out that their scheme is vulnerable to the off-line password guessing Attack, the user impersonation Attack, the sensor node impersonation Attack and the Modification Attack. To overcome weaknesses in Xue et al.'s scheme, we also propose a new temporal-credential-based mutual authentication and key agreement scheme for WSNs. Security analysis shows our scheme could overcome weaknesses in Xue et al.'s scheme. Performance analysis shows our scheme also has better performance. Therefore, our scheme is more suitable for providing secure communication in WSNs.

Siho Kim - One of the best experts on this subject based on the ideXlab platform.

Wenjing Lou - One of the best experts on this subject based on the ideXlab platform.

  • 1Towards Secure and Dependable Storage Services in Cloud Computing
    2016
    Co-Authors: Cong Wang, Wenjing Lou, Ning Cao, Stude Membe, Qia Wang
    Abstract:

    Abstract—Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users’ physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block Modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data Modification Attack, and even server colluding Attacks. Index Terms—Data integrity, dependable distributed storage, error localization, data dynamics, Cloud Computing F

  • toward secure and dependable storage services in cloud computing
    IEEE Transactions on Services Computing, 2012
    Co-Authors: Cong Wang, Q Wang, Kui Ren, Ning Cao, Wenjing Lou
    Abstract:

    Cloud storage enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing users' physical possession of their outsourced data, which inevitably poses new security risks toward the correctness of the data in cloud. In order to address this new problem and further achieve a secure and dependable cloud storage service, we propose in this paper a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasure-coded data. The proposed design allows users to audit the cloud storage with very lightweight communication and computation cost. The auditing result not only ensures strong cloud storage correctness guarantee, but also simultaneously achieves fast data error localization, i.e., the identification of misbehaving server. Considering the cloud data are dynamic in nature, the proposed design further supports secure and efficient dynamic operations on outsourced data, including block Modification, deletion, and append. Analysis shows the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data Modification Attack, and even server colluding Attacks.

  • Ensuring Data Storage Security in Cloud Computing
    Iwqos: 2009 Ieee 17th International Workshop on Quality of Service, 2009
    Co-Authors: Cong Wang, W.-j. Lou, Kui Ren, Q Wang, Wenjing Lou
    Abstract:

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with distributed verification of erasure-coded data, our scheme achieves the integration of storage correctness insurance and data error localization, i.e., the identification of misbehaving server(s). Unlike most prior works, the new scheme further supports secure and efficient dynamic operations on data blocks, including: data update, delete and append. Extensive security and performance analysis shows that the proposed scheme is highly efficient and resilient against Byzantine failure, malicious data Modification Attack, and even server colluding Attacks.

Debiao He - One of the best experts on this subject based on the ideXlab platform.

  • a secure temporal credential based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks
    Information Sciences, 2015
    Co-Authors: Debiao He, Neeraj Kumar, Naveen Chilamkurti
    Abstract:

    With an advancement of wireless communication technology, wireless sensor network (WSN) has emerged as one of the most powerful technologies which can be used in various applications, such as military surveillance, environment monitoring, industrial control, and medical monitoring. WSNs are vulnerable to large collection of Attacks than traditional networks because they transmit data using a wireless channel and are deployed in unattended environments. So, in this environment, how to ensure secure communications between different communication parties becomes a challenging issue with respect to the constraints of energy consumption, and large overhead generated during various operations performed. In this direction, the mutual authentication and key agreement (MAAKA) scheme attracts much attention in recent years. In literature, MAAKA schemes were presented in last several years. However, most of these schemes cannot satisfy security requirements in WSNs. Recently, Xue et al. proposed a temporal-credential-based MAAKA scheme for WSNs and proved that it could withstand various types of Attacks. However, this paper points out that Xue et al.'s MAAKA scheme is vulnerable to the off-line password guessing Attack, the user impersonation Attack, the sensor node impersonation Attack and the Modification Attack. Moreover, this paper also points out that Xue et al.'s MAAKA scheme cannot provide user anonymity. To overcome weaknesses in Xue et al.'s MAAKA scheme, this paper proposes a new temporal-credential-based MAAKA scheme for WSNs. Security analysis shows the proposed MAAKA scheme could overcome the weaknesses in Xue et al.'s MAAKA scheme. Performance analysis shows the proposed MAAKA scheme has better performance than the existing benchmarked schemes in literature. Therefore, the proposed MAAKA scheme is more suitable for providing security for various applications in WSNs.

  • a secure temporal credential based mutual authentication and key agreement scheme for wireless sensor networks
    International Symposium on Wireless Pervasive Computing, 2013
    Co-Authors: Debiao He, Neeraj Kumar, Naveen Chilamkurti
    Abstract:

    With the development of wireless communication technology and sensor technology, the wireless sensor network (WSN) has been widely used in various applications, such as military surveillance, environment monitoring industry control, medical monitoring, and so on. In most of the cases, WSNs are deployed in unattended environment. So, these are more vulnerable to various Attacks than traditional networks. To protect communications in WSNs, mutual authentication and key agreement schemes for WSNs have been studied widely. Recently, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs and claimed their scheme could withstand various Attacks. However, in this paper, we will point out that their scheme is vulnerable to the off-line password guessing Attack, the user impersonation Attack, the sensor node impersonation Attack and the Modification Attack. To overcome weaknesses in Xue et al.'s scheme, we also propose a new temporal-credential-based mutual authentication and key agreement scheme for WSNs. Security analysis shows our scheme could overcome weaknesses in Xue et al.'s scheme. Performance analysis shows our scheme also has better performance. Therefore, our scheme is more suitable for providing secure communication in WSNs.