Loading...
Search for: security-and-performance
0.005 seconds

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; 2018 , Pages 1-13 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    Multi-join query optimization in bucket-based encrypted databases using an enhanced ant colony optimization algorithm

    , Article Distributed and Parallel Databases ; Volume 36, Issue 2 , 2018 , Pages 399-441 ; 09268782 (ISSN) Jafarinejad, M ; Amini, M ; Sharif University of Technology
    Springer New York LLC  2018
    Abstract
    One of the organizations’ main concerns is to protect sensitive data in database systems, especially the ones outsourced to untrusted service providers. An effective solution for this issue is to employ database encryption methods. Among different encryption approaches, Bucket-based method has the advantage of balancing security and performance of database operations. However, generating false-positive results in executing queries is the main drawback of this method. On the other hand, multi-join queries are one of the most critical operations executed on these stored sensitive data. Hence, acceptable processing and response time in executing multi-join queries is required. In this paper, we... 

    A lightweight hierarchical authentication scheme for internet of things

    , Article Journal of Ambient Intelligence and Humanized Computing ; Volume 10, Issue 7 , 2019 , Pages 2607-2619 ; 18685137 (ISSN) Akbarzadeh, A ; Bayat, M ; Zahednejad, B ; Payandeh, A ; Aref, M. R ; Sharif University of Technology
    Springer Verlag  2019
    Abstract
    The Internet of Things (IoT) technology enables numerous things with different processing power and storage capacity to communicate and share data with each other. Considering the constrained devices of the IoT network in terms of processing and storage, designing a lightweight authentication scheme is quite important. So in this paper, we propose a lightweight authentication scheme based on Chebyshev Chaotic Maps. In the proposed scheme we apply a hierarchical structure to define different access controls for various entities. We then provide a formal analysis via the BAN logic to show the security of our scheme. Moreover, we compare our proposed scheme with previous ones in terms of... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 1st South Central Asian Himalayas Regional IEEE/IFIP International Conference on Internet, AH-ICI 2009, 3 November 2009 through 5 November 2009, Kathmundu ; 2009 ; 9781424445707 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    A novel approach for avoiding wormhole attacks in VANET

    , Article 2nd International Workshop on Computer Science and Engineering, WCSE 2009, 28 October 2009 through 30 October 2009 ; Volume 2 , 2009 , Pages 160-165 ; 9780769538815 (ISBN) Safi, S. M ; Movaghar, A ; Mohammadizadeh, M ; Sharif University of Technology
    Abstract
    Different attacks on routing protocols in ad hoc networks occur that one of the most dangerous types is called wormhole attack. This attack happens with the assistance of at least two or more malicious nodes. In this attack nodes create a private tunnel which if a packet comes to one of them, it will be guided to other pair of these malicious nodes by this tunnel and that node broadcasts it into network. This action provides a short connection in the network that is controlled by these malicious nodes. Hence they control all Packets that come to them and threaten the security of data within packets or delete them. Totally, what a wormhole does is an incorrect understanding of network... 

    SEAODV: Secure efficient AODV routing protocol for MANETs networks

    , Article ACM International Conference Proceeding Series, 24 November 2009 through 26 November 2009, Seoul ; Volume 403 , 2009 , Pages 940-944 ; 9781605587103 (ISBN) Mohammadizadeh, M ; Movaghar, A ; Safi, S. M ; Sharif University of Technology
    Abstract
    Secure routing is one of the most important topics in the wireless MANETs networks. MANETs networks don't have a central infrastructure for the management of routing in the networks. Each node independently routes and sends packets, so many attacks such as forging, modifying, and denial of service (DoS), Occur in these networks. In this paper, we present the new protocol, SEAODV; Secure Efficient Ad-hoc on Demand Routing Protocol for MANETs networks. SEAODV is based on the AODV algorithm and in comparison with existing secure AODV protocols such as SAODV, ARAN and SEAR have improved security and performances. SEAODV uses HEAP authentication Scheme with symmetric cryptography and one-way hash...