Learn More
Non-repudiation allows an exchange of data between two principals in such a manner that the principals cannot subsequently deny their participation in the exchange. Current non-repudiation schemes, while providing a mandatory <i>proof of origin</i> service, generally provide only discretionary <i>proof of receipt</i> since it is difficult to enforce the(More)
– Many of the diverse Wireless Sensor Network (WSN) applications, such as home automation, traffic control and medical patient monitoring, have a strong requirement for the confidentiality of sensing data. At the same time, the restricted resources of WSN nodes demand that applications are implemented as efficiently as possible. Recently, the Advanced(More)
Nowadays mobile and fixed networks are trusted with highly sensitive information, which must be protected by security protocols. However, security protocols are vulnerable to a host of subtle attacks, such as replay, parallel session and type-flaw attacks. Designing protocols to be impervious to these attacks has been proven to be extremely challenging and(More)
Many peer-to-peer security protocols proposed for wireless communications use one-time shared secrets for authentication purposes. This paper analyses online update mechanisms for one-time shared secrets. A new type of attack against update mechanisms, called desynchronisation attack, is introduced. This type of attack may lead to a permanent denial of(More)
This paper presents an analysis of a cryptographic security protocol that is designed for use in a mobile communication environment. The goal of the analysed protocol is to ensure secure end-to-end communication between two mobile users that are connected to different base stations. The analysis reveals a serious flaw in the used signature scheme of the(More)
Formal verification provides a rigid and thorough means of evaluating the correctness of cryptographic protocols so that even subtle defects can be identified. As the application of formal techniques is highly involved, software has been developed in order to facilitate protocol verification. Protocol weaknesses or flaws can thus be identified and corrected(More)
Security is a primary problem in wireless electronic communications. However, the limitations of Wireless Sensor Networks (small size, low battery capacity and exposed communication media) often turn the focus to power consumption rather than security. However, insufficient security protection can leave a WSN application open to attack, rendering the(More)