Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

PDF

University of Central Florida

Faculty Bibliography 2010s

2013

Information Systems; Telecommunications

Articles 1 - 4 of 4

Full-Text Articles in Entire DC Network

Deploying Real-Life Wsn Applications: Challenges, Solutions, And Future Directions, Regina B. Araujo, Carlos H. Ribeiro, Damla Turgut, Jo Ueyama, Torsten Braun Jan 2013

Deploying Real-Life Wsn Applications: Challenges, Solutions, And Future Directions, Regina B. Araujo, Carlos H. Ribeiro, Damla Turgut, Jo Ueyama, Torsten Braun

Faculty Bibliography 2010s

No abstract provided.


Smm Rootkit: A New Breed Of Os Independent Malware, Shawn Embleton, Sherri Sparks, Cliff C. Zou Jan 2013

Smm Rootkit: A New Breed Of Os Independent Malware, Shawn Embleton, Sherri Sparks, Cliff C. Zou

Faculty Bibliography 2010s

The emergence of hardware virtualization technology has led to the development of OS independent malware such as the virtual machine-based rootkits (VMBRs). In this paper, we draw attention to a different but related threat that exists on many commodity systems in operation today: The system management Mode based rootkit (SMBR). System Management mode (SMM) is a relatively obscure mode on Intel processors used for low-level hardware control. It has its own private memory space and execution environment which is generally invisible to code running outside (e.g., the Operating System). Furthermore, SMM code is completely non-preemptible, lacks any concept of privilege …


An Identity-Based Key-Insulated Encryption With Message Linkages For Peer-To-Peer Communication Network, Chien-Lung Hsu, Han-Yu Lin Jan 2013

An Identity-Based Key-Insulated Encryption With Message Linkages For Peer-To-Peer Communication Network, Chien-Lung Hsu, Han-Yu Lin

Faculty Bibliography 2010s

Key exposure is a major threat to secure cryptosystems. To mitigate the impact caused by key-compromise attacks, a key-insulated cryptographic mechanism is a better alternative. For securing the large message communication in peer-to-peer networks, in this paper, we propose the first novel identity-based key-insulated encryption (IB-KIE) scheme with message linkages. Our scheme has the properties of unbounded time periods and random-access key-updates. In the proposed scheme, each client can periodically update his private key while the corresponding public one remains unchanged. The essential security assumption of our proposed scheme is based on the well-known bilinear Diffie-Hellman problem (BDHP). To ensure …


Defense Against Sybil Attack In The Initial Deployment Stage Of Vehicular Ad Hoc Network Based On Roadside Unit Support, Soyoung Park, Baber Aslam, Damla Turgut, Cliff C. Zou Jan 2013

Defense Against Sybil Attack In The Initial Deployment Stage Of Vehicular Ad Hoc Network Based On Roadside Unit Support, Soyoung Park, Baber Aslam, Damla Turgut, Cliff C. Zou

Faculty Bibliography 2010s

In this paper, we propose two certificate mechanisms for preventing the Sybil attack in a vehicular ad hoc network (VANET): the timestamp series approach and the temporary certificate approach. We focus on an early-stage VANET when the number of smart vehicles is only a small fraction of the vehicles on the road and the only infrastructure components available are the roadside units (RSUs). Our approach does not require a dedicated vehicular public key infrastructure to certify individual vehicles but RSUs are the only components issuing certificates. The vehicles can obtain certificates by simply driving by RSUs, without the need to …