Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Security

Discipline
Institution
Publication
Publication Type
File Type

Articles 1 - 29 of 29

Full-Text Articles in Engineering

Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes Jun 2015

Reflections From The Wearable Computing Conference In Toronto, Canada, Nick Rheinberger, Katina Michael, Alexander Hayes

Alexander Hayes Mr.

Could sports men and women who are monitored using wearable computers actually be playing to a global theatre to ensure the upkeep of their performance benchmarks instead of consciously watching and reacting to what is happening in the game they are playing? What are the social implications of heart rate monitors and GPS units now embedded into player clothing? What were some of the reflections from the IEEE ISTAS13 meeting on Wearable Computers in Every Day Life? What were some of the main messages that you walked away with from that conference? What made the greatest impression on us was …


Optimal Allocation Of Reactive Power Resources To Minimise Losses And Maintain System Security, Eknath Vittal, Lasantha Meegahapola, Damian Flynn, Andrew Keane Dec 2013

Optimal Allocation Of Reactive Power Resources To Minimise Losses And Maintain System Security, Eknath Vittal, Lasantha Meegahapola, Damian Flynn, Andrew Keane

Dr Lasantha G Meegahapola

Modern doubly-fed induction generator (DFIG) wind turbines have significant reactive power control capability, even during low wind speed conditions. This can improve system security by providing terminal voltage control at buses in the system. Generally, such control employs the full range of reactive power production from the turbine which can lead to increased system losses. By utilizing optimal power flow analysis, and limiting the range of reactive power production at certain wind farms, system losses can be minimized. If the reactive power of the wind farms are optimized to achieve the minimum system losses this may adversely affect the voltage …


Voltage Security Constrained Reactive Power Optimization Incorporating Wind Generation, L G. Meegahapola, E Vittal, A Keane, D Flynn Dec 2013

Voltage Security Constrained Reactive Power Optimization Incorporating Wind Generation, L G. Meegahapola, E Vittal, A Keane, D Flynn

Dr Lasantha G Meegahapola

This paper presents a comparative analysis between conventional optimal power flow (OPF) and voltage constrained OPF strategies with wind generation. The study has been performed using the New England 39 bus system with 12 doublyfed induction generator (DFIG) based wind farms installed across the network. A voltage security assessment is carried out to determine the critical wind farms for voltage stability enhancement. The power losses and individual wind farm reactive power generation have been compared with and without voltage stability constraints imposed on the OPF simulation. It is shown that voltage constrained OPF leads to much greater active power losses …


A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi Dec 2013

A Study On Countermeasures Against Steganography: An Active Warden Approach, Qilin Qi

Computer and Electronics Engineering: Dissertations, Theses, and Student Research

Digital steganography is a method used for hiding information in digital images. It can be used for secure communication. There have been many robust digital steganography methods invented in recent decades. The steganographic message can be inserted in multimedia cover signal such as audio, image and video. However, this technique also may be used by malicious users to transmit dangerous information through the Internet beyond the control of security agencies. How to detect and/or block potentially dangerous information transmission on the Internet through billions of multimedia files while not affecting innocent multimedia communications becomes a challenging problem. Existing steganalysis methods …


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

M. G. Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


No Limits To Watching?, Katina Michael, M.G. Michael Nov 2013

No Limits To Watching?, Katina Michael, M.G. Michael

Professor Katina Michael

Little by little, the introduction of new body-worn technologies is transforming the way people interact with their environment and one another, and perhaps even with themselves. Social and environmental psychology studies of human-technology interaction pose as many questions as answers. We are learning as we go: 'learning by doing' through interaction and 'learning by being'. Steve Mann calls this practice existential learning; wearers become photoborgs, a type of cyborg (cybernetic organism) whose primary intent is image capture from the domains of the natural and artificial. This approach elides the distinction between the technology and the human; they coalesce into one.


Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin Oct 2013

Trajectory Privacy Preservation In Mobile Wireless Sensor Networks, Xinyu Jin

FIU Electronic Theses and Dissertations

In recent years, there has been an enormous growth of location-aware devices, such as GPS embedded cell phones, mobile sensors and radio-frequency identification tags. The age of combining sensing, processing and communication in one device, gives rise to a vast number of applications leading to endless possibilities and a realization of mobile Wireless Sensor Network (mWSN) applications. As computing, sensing and communication become more ubiquitous, trajectory privacy becomes a critical piece of information and an important factor for commercial success. While on the move, sensor nodes continuously transmit data streams of sensed values and spatiotemporal information, known as ``trajectory information". …


Securearray: Improving Wifi Security With Fine-Grained Physical-Layer, Jie Xiong, Kyle Jamieson Sep 2013

Securearray: Improving Wifi Security With Fine-Grained Physical-Layer, Jie Xiong, Kyle Jamieson

Research Collection School Of Computing and Information Systems

Despite the important role that WiFi networks play in home and enterprise networks they are relatively weak from a security standpoint. With easily available directional antennas, attackers can be physically located off-site, yet compromise WiFi security protocols such as WEP, WPA, and even to some extent WPA2 through a range of exploits specific to those protocols, or simply by running dictionary and human-factors attacks on users' poorly-chosen passwords. This presents a security risk to the entire home or enterprise network. To mitigate this ongoing problem, we propose SecureArray, a system designed to operate alongside existing wireless security protocols, adding defense …


Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur Aug 2013

Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur

University of New Orleans Theses and Dissertations

Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …


Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael Jun 2013

Social Implications Of Wearable Computing And Augmediated Reality In Every Day Life (Ieee Symposium On Technology And Society, Istas13), Katina Michael

Associate Professor Katina Michael

It was in July 2012 that Steve Mann and I corresponded on the possibility of hosting a conference on wearable computing in Toronto, Canada. Steve had just returned home from a family holiday to France and publicly blogged about an unfortunate incident that had happened to him while away. On 17th July 2012 he posted: “Physical assault by McDonald’s for wearing Digital Eye Glass”. We both knew the timing was right for such an event that was not just a technical engineering or applied orientation on the theme of smart worlds, but an event that would grapple with the dichotomies …


A Meaningful Housing Policy Would Deal With Defautling Landlords And At-Risk Tenants, Lorcan Sirr, Tom Dunne Jun 2013

A Meaningful Housing Policy Would Deal With Defautling Landlords And At-Risk Tenants, Lorcan Sirr, Tom Dunne

Media

No abstract provided.


Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White Jun 2013

Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White

Master's Theses

Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.

Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …


Categorization Of Security Design Patterns, Jeremiah Y. Dangler May 2013

Categorization Of Security Design Patterns, Jeremiah Y. Dangler

Electronic Theses and Dissertations

Strategies for software development often slight security-related considerations, due to the difficulty of developing realizable requirements, identifying and applying appropriate techniques, and teaching secure design. This work describes a three-part strategy for addressing these concerns. Part 1 provides detailed questions, derived from a two-level characterization of system security based on work by Chung et. al., to elicit precise requirements. Part 2 uses a novel framework for relating this characterization to previously published strategies, or patterns, for secure software development. Included case studies suggest the framework's effectiveness, involving the application of three patterns for secure design (Limited View, Role-Based Access Control, …


Improved Channel Probing For Secret Key Generation With Multiple Antenna Systems, Britton T. Quist Apr 2013

Improved Channel Probing For Secret Key Generation With Multiple Antenna Systems, Britton T. Quist

Theses and Dissertations

Establishing secret keys from the commonly-observed randomness of reciprocal wireless propagation channels has recently received considerable attention. In this work we propose improved strategies for channel estimation between MIMO or beamforming systems for secret key generation. The amount of mutual information that can be extracted from the channel matrix estimates is determined by the quality of channel matrix estimates. By allocating increased energy to channel estimation for higher gain beamforming combinations at the expense of low-gain combinations, key establishment performance can be increased. Formalizing the notion of preferential energy allocation to the most efficient excitations is the central theme of …


Enhancing Secrecy Via Exploring Randomness In The Wireless Physical Layer, Rehan Talat Jan 2013

Enhancing Secrecy Via Exploring Randomness In The Wireless Physical Layer, Rehan Talat

Masters Theses 1911 - February 2014

In order to establish a secure connections in the wireless environment, cryptographic methods may require an exchange of a key or secret. Fortunately, the environment provides randomness due to multi-path fading that can be exploited by physical-layer security algorithms to help establish this shared secret. However, in some cases, multi-path fading might be absent or negligible; therefore, we look for artificial ways to increase randomness. In this thesis, we explore antenna radiation variation by altering the phase between two antennas as a means of creating artificial fading. We construct a model of the antenna gain variation by analyzing the radiation …


Fault Tree Analysis For Safety/Security Verification In Aviation Software, Andrew J. Kornecki, Mingye Liu Jan 2013

Fault Tree Analysis For Safety/Security Verification In Aviation Software, Andrew J. Kornecki, Mingye Liu

Department of Electrical Engineering and Computer Science - Daytona Beach

The Next Generation Air Traffic Management system (NextGen) is a blueprint of the future National Airspace System. Supporting NextGen is a nation-wide Aviation Simulation Network (ASN), which allows integration of a variety of real-time simulations to facilitate development and validation of the NextGen software by simulating a wide range of operational scenarios. The ASN system is an environment, including both simulated and human-in-the-loop real-life components (pilots and air traffic controllers).Real Time Distributed Simulation (RTDS) developed at Embry-Riddle Aeronautical University, a suite of applications providing low and medium fidelity en-route simulation capabilities, is one of the simulations contributing to the ASN. …


Development Of A Master Of Software Assurance Reference Curriculum, Andrew J. Kornecki, James Mcdonald, Julia H. Allen, Mark Ardis, Nancy Mead, Richard Linger, Thomas B. Hilburn Jan 2013

Development Of A Master Of Software Assurance Reference Curriculum, Andrew J. Kornecki, James Mcdonald, Julia H. Allen, Mark Ardis, Nancy Mead, Richard Linger, Thomas B. Hilburn

Department of Electrical Engineering and Computer Science - Daytona Beach

The Next Generation Air Traffic Management system (NextGen) is a blueprint of the future National Airspace System. Supporting NextGen is a nation-wide Aviation Simulation Network (ASN), which allows integration of a variety of real-time simulations to facilitate development and validation of the NextGen software by simulating a wide range of operational scenarios. The ASN system is an environment, including both simulated and human-in-the-loop real-life components (pilots and air traffic controllers).Real Time Distributed Simulation (RTDS) developed at Embry-Riddle Aeronautical University, a suite of applications providing low and medium fidelity en-route simulation capabilities, is one of the simulations contributing to the ASN. …


Security Evaluation Of Substation Network Architectures, Pingal Raj Sapkota Jan 2013

Security Evaluation Of Substation Network Architectures, Pingal Raj Sapkota

Dissertations, Master's Theses and Master's Reports - Open

In recent years, security of industrial control systems has been the main research focus due to the potential cyber-attacks that can impact the physical operations. As a result of these risks, there has been an urgent need to establish a stronger security protection against these threats. Conventional firewalls with stateful rules can be implemented in the critical cyberinfrastructure environment which might require constant updates. Despite the ongoing effort to maintain the rules, the protection mechanism does not restrict malicious data flows and it poses the greater risk of potential intrusion occurrence.

The contributions of this thesis are motivated by the …


Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun Jan 2013

Security Analysis Of A Distributed Reprogramming Protocol For Wireless Sensor Networks, Yong Yu, Jianbing Ni, Ying Sun

Faculty of Engineering and Information Sciences - Papers: Part A

Reprogramming for wireless sensor networks is essential to upload new code or to alter the functionality of existing code. To overcome the weakness of the centralized approach of the traditional solutions, He et al. proposed the notion of distributed reprogramming where multiple authorized network users are able to reprogram sensor nodes without involving the base station. They also gave a novel distributed reprogramming protocol called SDRP by using identity-based signature, and provided a comprehensive security analysis for their protocol. In this letter, unfortunately, we demonstrate that SDRP is insecure as the protocol fails to satisfy the property of authenticity and …


Opacity Of Discrete Event Systems: Analysis And Control, Majed Mohamed Ben Kalefa Jan 2013

Opacity Of Discrete Event Systems: Analysis And Control, Majed Mohamed Ben Kalefa

Wayne State University Dissertations

The exchange of sensitive information in many systems over a network can be manipulated

by unauthorized access. Opacity is a property to investigate security and

privacy problems in such systems. Opacity characterizes whether a secret information

of a system can be inferred by an unauthorized user. One approach to verify security

and privacy properties using opacity problem is to model the system that may leak confidential

information as a discrete event system. The problem that has not investigated

intensively is the enforcement of opacity properties by supervisory control. In other

words, constructing a minimally restrictive supervisor to limit the system's …


Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks, Guilin Wang, Jiangshan Yu, Qi Xie Jan 2013

Security Analysis Of A Single Sign-On Mechanism For Distributed Computer Networks, Guilin Wang, Jiangshan Yu, Qi Xie

Faculty of Engineering and Information Sciences - Papers: Part A

Single sign-on (SSO) is a new authentication mechanism that enables a legal user with a single credential to be authenticated by multiple service providers in a distributed computer network. Recently, Chang and Lee proposed a new SSO scheme and claimed its security by providing well-organized security arguments. In this paper, however, we demonstrative that their scheme is actually insecure as it fails to meet credential privacy and soundness of authentication. Specifically, we present two impersonation attacks. The first attack allows a malicious service provider, who has successfully communicated with a legal user twice, to recover the user's credential and then …


On Security Of A Certificateless Signcryption Scheme, Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu Jan 2013

On Security Of A Certificateless Signcryption Scheme, Songqin Miao, Futai Zhang, Sujuan Li, Yi Mu

Faculty of Engineering and Information Sciences - Papers: Part A

It would be interesting if a signcryption scheme in the standard model could be made certificateless. One of the interesting attempts is due to Liu et al. [Z. Liu, Y. Hu, X. Zhang, H. Ma, Certificateless signcryption scheme in the standard model, Information Sciences 180 (3) (2010) 452-464]. In this paper, we provide a cryptanalysis on this scheme by depicting two kinds of subtle public key replacement attacks against it. Our analysis reveals that it does not meet the basic requirements of confidentiality and non-repudiation.


Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh Jan 2013

Adaptive Encryption Techniques In Wireless Communication Channels With Tradeoffs Between Communication Reliability And Security, Walid Al Zibideh

Electronic Theses and Dissertations

Encryption is a vital process to ensure the confidentiality of the information transmitted over an insecure wireless channel. However, the nature of the wireless channel tends to deteriorate because of noise, interference and fading. Therefore, a symmetrically encrypted transmitted signal will be received with some amount of error. Consequently, due to the strict avalanche criterion (sac), this error propagates during the decryption process, resulting in half the bits (on average) after decryption to be in error. In order to alleviate this amount of error, smart coding techniques and/or new encryption algorithms that take into account the nature of wireless channels …


A Multi-Parameter Functional Side Channel Analysis Method For Hardware Trojan Detection In Untrusted Fpga Bitstreams, Christopher William Bell Jan 2013

A Multi-Parameter Functional Side Channel Analysis Method For Hardware Trojan Detection In Untrusted Fpga Bitstreams, Christopher William Bell

USF Tampa Graduate Theses and Dissertations

Hardware Trojan Horses (HTHs or Trojans) are malicious design modifications intended to cause the design to function incorrectly. Globalization of the IC development industry has created new opportunities for rogue agents to compromise a design in such a way. Offshore foundries cannot always be trusted, and the use of trusted foundries is not always practical or economical. There is a pressing need for a method to reliably detect these Trojans, to prevent compromised designs from being put into production.

This thesis proposes a multi-parameter analysis method that is capable of reliably detecting function-altering and performance-degrading Trojans in FPGA bitstreams. It …


Cil Security Proof For A Password-Based Key Exchange, Cristian Ene, Clementine Gritti, Yassine Lakhnech Jan 2013

Cil Security Proof For A Password-Based Key Exchange, Cristian Ene, Clementine Gritti, Yassine Lakhnech

Faculty of Engineering and Information Sciences - Papers: Part A

Computational Indistinguishability Logic (CIL) is a logic for reasoning about cryptographic primitives in computational model. It is sound for standard model, but also supports reasoning in the random oracle and other idealized models. We illustrate the benefits of CIL by formally proving the security of a Password-Based Key Exchange (PBKE) scheme, which is designed to provide entities communicating over a public network and sharing a short password, under a session key.


A Ciphertext-Policy Attribute-Based Proxy Re-Encryption With Chosen-Ciphertext Security, Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong Jan 2013

A Ciphertext-Policy Attribute-Based Proxy Re-Encryption With Chosen-Ciphertext Security, Kaitai Liang, Liming Fang, Willy Susilo, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

Cipher text-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) extends the traditional Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a cipher text under an access policy to the one with the same plaintext under another access policy (i.e. attribute-based re-encryption). The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real world applications, such as fine-grained access control in cloud storage systems and medical records sharing among different hospitals. Previous CP-ABPRE schemes leave how to be secure against Chosen-Cipher text Attacks (CCA) as an open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle …


Mip-Based Stochastic Security-Constrained Daily Hydrothermal Generation Scheduling, J Aghaei, M Karami, K M. Muttaqi, A Ahmadi, H A. Shayanfar Jan 2013

Mip-Based Stochastic Security-Constrained Daily Hydrothermal Generation Scheduling, J Aghaei, M Karami, K M. Muttaqi, A Ahmadi, H A. Shayanfar

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents the application of a mixedinteger programming (MIP) approach for solving stochastic security-constrained daily hydrothermal generation scheduling (SCDHGS). Power system uncertainties including generating units and branch contingencies and load uncertainty are explicitly considered in the stochastic programming of SCDHGS. The roulette wheel mechanism and lattice Monte Carlo simulation (LMCS) are first employed for random scenario generation wherein the stochastic SCDHGS procedure is converted into its respective deterministic equivalents (scenarios). Then, the generating units are scheduled through MIP over the set of deterministic scenarios for the purpose of minimizing the cost of supplying energy and ancillary services over the …


Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao Dec 2012

Eavesdropping Security In Wireless Ad Hoc Networks With Directional Antennas, Qiu Wang, Hong-Ning Dai, Qinglin Zhao

Hong-Ning Dai

The eavesdropping security of wireless ad hoc networks has attracted considerable attention recently. However, most of current studies only consider OMN networks, where each node is mounted with a single omni-directional antenna, which radiates radio signals in all directions and consequently leads to the high eavesdropping possibility. Compared with an omnidirectional antenna, a directional antenna can concentrate the radio signals on some desired directions so that it can potentially reduce the eavesdropping possibility. This paper investigates the eavesdropping security of wireless ad hoc networks equipped with directional antennas. In particular, we study the eavesdropping possibility of OMN networks, SDA networks …


On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong Dec 2012

On Eavesdropping Attacks In Wireless Sensor Networks With Directional Antennas, Hong-Ning Dai, Qiu Wang, Dong Li, Raymond Chi-Wing Wong

Hong-Ning Dai

The eavesdropping attack is a serious security threat to a wireless sensor network (WSN) since the eavesdropping attack is a prerequisite for other attacks. Conventional WSNs consist of wireless nodes equipped with omnidirectional antennas, which broadcast radio signals in all directions and are consequently prone to the eavesdropping attacks. Different from omnidirectional antennas, directional antennas radiate radio signals on desired directions and potentially reduce the possibility of the eavesdropping attacks. In this paper, we propose a model to analyze the eavesdropping probability in both single-hop WSNs and multihop WSNs with omnidirectional antennas and directional antennas. We verify the correctness of …