- Advanced Authentication Protocols Security
- Cryptography and Data Security
- User Authentication and Security Systems
- Chaos-based Image/Signal Encryption
- Digital Rights Management and Security
- Network Security and Intrusion Detection
- Distributed systems and fault tolerance
- Cryptographic Implementations and Security
- Security in Wireless Sensor Networks
- Biometric Identification and Security
- Administrative Law and Governance
- Multimedia Communication and Technology
- Mobile Ad Hoc Networks
- IPv6, Mobility, Handover, Networks, Security
- Advanced Steganography and Watermarking Techniques
- Context-Aware Activity Recognition Systems
- Mobile Crowdsensing and Crowdsourcing
- Advanced Data Storage Technologies
- Media and Digital Communication
- Technology's Impact on Media
- Knowledge Societies in the 21st Century
- Wireless Networks and Protocols
- Green IT and Sustainability
- Engineering and Information Technology
- Bluetooth and Wireless Communication Technologies
Universitat Politècnica de Catalunya
2003-2023
Polytechnic University of Puerto Rico
2013
Universidad Autónoma de Occidente
2010
Universitat de Barcelona
2008
The application areas of multi-hop wireless networks are expected to experience sustained growth in the next years. This will be further supported by current possibility providing low-cost communication capabilities any device. One main issues consider with this type is congestion control, that is, avoiding an excessive volume data traffic could lead a loss performance. In work, distributed control mechanism proposed for generic networks. Different categories taken into account, each them...
Perfect secrecy can only be achieved in multicast groups by ciphering data sent to the group with a different key every time member joins or leaves group. A server must send new all remaining members so bandwidth efficiency concerns appear. Logical tree algorithms reduce number of messages sent, but many scenarios, rekeying after each membership change has no sense. Batch are proposed as solution these problems. However such methods need maintain logical balanced on order achieve maximum...
Smart Grid (SG) networks include an associated data network for the transmission and reception of control related to electric power supply service. A subset this is SG Neighborhood Area Network (SG NAN), whose objective interconnect subscribers' homes with supplier center. The flows transmitted through these NANs belong different applications, giving rise need quality service requirements. Additionally, other subscriber appliances could use communicate over Internet. To avoid congestion, as...
Major advances in information and communication technologies (ICTs) make citizens to be considered as sensors motion. Carrying their mobile devices, moving connected vehicles or actively participating social networks, provide a wealth of that, after properly processing, can support numerous applications for the benefit community. In context smart communities, INRISCO [1] proposal intends (i) early detection abnormal situations cities (i.e., incidents), (ii) analysis whether, according...
A problem with transaction system which requires an open network to carry out operations using a smart card is that the user does not know information signs his card. In addition, users do have any proof about reader authenticity. Architecture of trustworthy guarantee correct proposed. secure coprocessor integrated inside provide safe place in order store sensitive data and support different level security services. The design includes barrier substrate, X-ray sensor, temperature sensor...
Certification path validation is a complex task that implies high computational cost. In this process necessary to verify the binding between owner ofthe certificate and his public key. SET protocol, customer merchant require certification of their certificates trust each other. The carry out several cryptographic operations complete protocol including authentication process. Because mobile devices are limited in terms processing storage capacities, it relevant reduce cost required by...
Mobile payment protocols must provide security services (e.g., authentication, authorisation, integrity, privacy and non-repudiation), but the features of mobile devices make it a difficult task, especially when service requires to perform public key operations. It is very well known, that operations require high execution time CPU battery consumption. In this paper, we computed computational cost required by each entity in five protocols. addition, transmission message among different...
Storage, delivery and update of cryptographic keys are the most important items to study in multicast security. Traditionally a centralized trusted third party called key server (KS) performs these actions. Different works have been presented that address issue minimizing storage for KS required bandwidth updating keys. Our research group has working method rekeying using broadcast encryption technique pseudo-random functions order reduce number sent messages minimize store by KS. We apply...
In 2007, Liao-Wang proposed a dynamic ID-based remote user authentication scheme for multi-server environment using smart cards.However, Hsiang-Shih demonstrated that Liao-Wang's has security flaws.Moreover, an improvement which resolves the flaws of scheme.In this paper, we propose enhanced maintains merits Hsiang-Shih's scheme.Performance evaluation efficiency over related works.Security analysis proved is secure against known attacks.
This paper presents an efficient and practical protocol to carry out micropayments, based on the use of anonymous mobile cash, that provides anonymity unlinkability customers. The cash used in can be different value denomination. It is official after a bank signs it with specific private key. stores relation between cash's its corresponding public scheme prevents double spending forgery attacks. A device supports Java applications Bluetooth technology required. Through pseudonym certificates...
Recently, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme claimed that their is secure. In this paper, we show Gulati's vulnerable to insider, masquerade, server spoofing attacks. Moreover, it fails provide mutual authentication. order remedy these drawbacks, paper proposes secure using smart cards. The performance evaluation security analysis our proposal feasible in terms of computational cost, storage capacity, the can resist several
In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first schemeis a security improvement of Liao et al.’s scheme and the second is Wang etal.’s scheme. both cases, authors claimed that their schemes can resist many attacks. However, we find thatboth have flaws. addition, require verification table time-synchronization,making unfeasible unsecured for electronic services. order to remedy flaws ofSood schemes, propose robust which resists well-known...
Online mobile payment systems based on cash provide privacy to customers and are feasible for real point of sale, virtual person-to-person commerce scenarios.The merchant does not perform complex operations the bank verifies validity before delivers product.The must store spent in a database prevent double spending attack.In this paper, we propose an efficient scheme which customer attaches expiration date deposit date.This property reduces size bank's spend expiry.Moreover, merchant's...
Recently, Wang, Liu, Xiao and Dan proposed an efficient secure dynamic ID-based remote user authentication scheme claimed that their provides strong security. We demonstrate Wang et al.'s is vulnerable to insider, masquerade server spoofing attacks.
The increasing density of the electronic devices in everyday activities is turning system interoperability into an emerging research scenario with a clear impact on life quality. Interoperability architectures try to overcome complexity related heterogeneous procedures, interfaces and access protocols required operate by providing users single control point their environment. INREDIS project has addressed this challenge designing cloud based service-oriented architecture be deployed both...
Recently, Chen-Hsiang-Shih proposed a new dynamic ID-based remote user authentication scheme. The authors claimed that their scheme was more secure than previous works. However, this paper demonstrates theirscheme is still unsecured against different kinds of attacks. In order to enhance the security by Chen-Hsiang-Shih, proposed. achieves following goals: without verification table, each chooses and changes password freely, keeps secret, mutual authentication, establishes session key after...