scholarly journals Message Confidentiality Testing of Security Protocols – Passive Monitoring and Active Checking

Author(s):  
Guoqiang Shu ◽  
David Lee
Author(s):  
Mahalingam Ramkumar

Approaches for securing digital assets of information systems can be classified as active approaches based on attack models, and passive approaches based on system-models. Passive approaches are inherently superior to active ones. However, taking full advantage of passive approaches calls for a rigorous standard for a low-complexity-high-integrity execution environment for security protocols. We sketch broad outlines of mirror network (MN) modules, as a candidate for such a standard. Their utility in assuring real-world information systems is illustrated with examples.


Author(s):  
Segundo Moises Toapanta Toapanta ◽  
Luis Enrique Mafla Gallegos ◽  
Alex Enrique Aranda Alvarado ◽  
Maximo Prado Solis

2021 ◽  
Vol 11 (9) ◽  
pp. 3942
Author(s):  
Federica Bettarello ◽  
Marco Caniato ◽  
Giuseppina Scavuzzo ◽  
Andrea Gasparella

The architecture of spaces for people on the autistic spectrum is evolving toward inclusive design, which should fit the requirements for independent, autonomous living, and proper support for relatives and caregivers. The use of smart sensor systems represents a valuable support to internal design in order to achieve independent living for impaired people. Accordingly, these devices can monitor or prevent hazardous situations, ensuring security and privacy. Acoustic sensor systems, for instance, could be used in order to realize a passive monitoring system. The correct functioning of such devices needs optimal indoor acoustic criteria. Nevertheless, these criteria should also comply with dedicated acoustic requests that autistic individuals with hearing impairment or hypersensitivity to sound could need. Thus, this research represents the first attempt to balance, integrate, and develop these issues, presenting (i) a wide literature overview related to both topics, (ii) a focused analysis on real facility, and (iii) a final optimization, which takes into account, merges, and elucidates all the presented unsolved issues.


2015 ◽  
Vol 17 (1) ◽  
pp. 1-45 ◽  
Author(s):  
Rémy Chrétien ◽  
Véronique Cortier ◽  
Stéphanie Delaune

Sensors ◽  
2020 ◽  
Vol 20 (22) ◽  
pp. 6546
Author(s):  
Kazi Masum Sadique ◽  
Rahim Rahmani ◽  
Paul Johannesson

The Internet of things (IoT) will accommodate several billions of devices to the Internet to enhance human society as well as to improve the quality of living. A huge number of sensors, actuators, gateways, servers, and related end-user applications will be connected to the Internet. All these entities require identities to communicate with each other. The communicating devices may have mobility and currently, the only main identity solution is IP based identity management which is not suitable for the authentication and authorization of the heterogeneous IoT devices. Sometimes devices and applications need to communicate in real-time to make decisions within very short times. Most of the recently proposed solutions for identity management are cloud-based. Those cloud-based identity management solutions are not feasible for heterogeneous IoT devices. In this paper, we have proposed an edge-fog based decentralized identity management and authentication solution for IoT devices (IoTD) and edge IoT gateways (EIoTG). We have also presented a secure communication protocol for communication between edge IoT devices and edge IoT gateways. The proposed security protocols are verified using Scyther formal verification tool, which is a popular tool for automated verification of security protocols. The proposed model is specified using the PROMELA language. SPIN model checker is used to confirm the specification of the proposed model. The results show different message flows without any error.


Author(s):  
H.W. Tyrer ◽  
R. Neelgund ◽  
A. Mohammed ◽  
U. Shriniwar
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document