A Novel Latin Square-based Secret Sharing for M2M Communications

Slides:



Advertisements
Similar presentations
KEY MANAGEMENT TECHNIQUES IN WIRELESS SENSOR NETWORKS JOHNSON C.LEE, VICTOR C.M.LUENG, KIRK H.WONG, JIANNANO CAO, HENRY C.B. CHAN Presented By Viplavi.
Advertisements

1 Efficient Self-Healing Group Key Distribution with Revocation Capability by Donggang Liu, Peng Ning, Kun Sun Presented by Haihui Huang
Using Auxiliary Sensors for Pair-Wise Key Establishment in WSN Source: Lecture Notes in Computer Science (2010) Authors: Qi Dong and Donggang Liu Presenter:
Presented By : Ankita Jaiswal Guided By : Dr. Agrawal sir.
1 On Constructing k- Connected k-Dominating Set in Wireless Networks Department of Computer Science and Information Engineering National Cheng Kung University,
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
User authentication schemes with pseudonymity for ubiquitous sensor network in NGN Authors: Binod Vaidya, Joel J. Rodrigues and Jong Hyuk Park Source:
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
A secure and scalable rekeying mechanism for hierarchical wireless sensor networks Authors: Song Guo, A-Ni Shen, and Minyi Guo Source: IEICE Transactions.
Efficient Pairwise Key Establishment Scheme Based on Random Pre-Distribution Keys in Wireless Sensor Networks Source: Lecture Notes in Computer Science,
An Efficient and Practical Authenticated Communication Scheme for Vehicular Ad Hoc Networks Source: IEEE Transactions on Vehicular Technology, Reviewing.
IEEE COMMUNICATIONS LETTERS, VOL. 9, NO. 9, SEPTEMBER 2005 Zhen Guo,
Presented by Edith Ngai MPhil Term 3 Presentation
Lightweight Mutual Authentication for IoT and Its Applications
Enabling QoS Multipath Routing Protocol for Wireless Sensor Networks
A Dynamic ID-Based Generic Framework for Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications,
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy Source: Computer & Security,
Author:YongBin Zhou, ZhenFeng Zhang, and DengGuo Feng Presenter:戴士桀
A lightweight authentication scheme based on self-updating strategy for space information network Source: International Journal Of Satellite Communications.
網路環境中通訊安全技術之研究 Secure Communication Schemes in Network Environments
A secure and traceable E-DRM system based on mobile device
Der-Chyuan Lou and Jiang-Lung Liu,
Source : Future Generation Computer Systems, Vol. 68, pp , 2017
A Novel Data Embedding Scheme Using Optimal Pixel Pair Substitution
2018/6/26 An Energy-efficient TCAM-based Packet Classification with Decision-tree Mapping Author: Zhao Ruan, Xianfeng Li , Wenjun Li Publisher: 2013.
Intrusion Tolerance for NEST
A robust and anonymous patient monitoring system using wireless medical sensor networks Source: Future Generation Computer Systems, Available online 8.
A Secure Anonymity Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Source: Wireless Personal Communications, ahead of.
Security of a Remote Users Authentication Scheme Using Smart Cards
Paul Pop, Petru Eles, Zebo Peng
Sindhusha Doddapaneni
Efficient Time-Bound Hierarchical Key Assignment Scheme
Chair Professor Chin-Chen Chang Feng Chia University
Authors: Wei-Chi KU, Hao-Chuan TSAI, Maw-Jinn TSAUR
Image camouflage by reversible image transformation
Privacy Preserving Ranked Multi-Keyword
Picode: A New Picture-Embedding 2D Barcode
A new data transfer method via signal-rich-art code images captured by mobile devices Source: IEEE Transactions on Circuits and Systems for Video Technology,
Attack-Resistant Location Estimation in Sensor Networks
SPINS: Security Protocols for Sensor Networks
A new two-level QR code with visual cryptography scheme
Source: Mobile Information Systems, vol. 2017, 2017.
Centrality Bias Measure for High Density QR Code Module Recognition
QR Code Authentication with Embedded Message Authentication Code
Source: arXiv preprint arXiv:  (2018)
Source:Multimedia Tools and Applications, Vol. 77, No. 20, pp , Oct
Improved Visual Secret Sharing Scheme for QR Code Applications
Hefei Electronic Engineering Institute, Hefei , China
Source: Ad Hoc Networks, Vol. 71, pp , 2018
SPINS: Security Protocols for Sensor Networks
Enabling Localized Peer-to-Peer Electricity Trading Among Plug-in Hybrid Electric Vehicles Using Consortium Blockchains Source: IEEE Transactions on Industrial.
Source: Pattern Recognition, Vol. 38, Issue 11, December 2005, pp
Authors:Debiao He, Sherali Zeadally, Neeraj Kumar and Wei Wu
Controllable and Trustworthy Blockchain-based Cloud Data Management
Source: Energies, Vol. 10, No. 12, November 2017
TrustChain: A Sybil-resistant scalable blockchain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Digital Watermarking for Image Authentication with Localization
Published in 2016 International Computer Symposium (ICS) Authors
Source: Computer Networks Volume 149, 11 February 2019, Pages 29-42
New Framework for Reversible Data Hiding in Encrypted Domain
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Source: Sensors, Volume 19, Issue 9 (May )
Biometrics-based RSA Cryptosystem for Securing Real-Time Communication
Privacy Protection for E-Health Systems by
A Quadratic-Residue-based Fragile Watermarking Scheme
Rich QR Codes With Three-Layer Information Using Hamming Code
A lightweight authentication scheme with privacy protection for smart grid communications Source: Future Generation Computer Systems Volume 100, November.
Presentation transcript:

A Novel Latin Square-based Secret Sharing for M2M Communications Source: IEEE Transactions on Industrial Informatics. 2018 Feb 28. Authors: Shen, Jian, Tianqi Zhou, Xingang Liu, and Yao- Chung Chang. Speaker: Huang Peng-Cheng Date: 1/18/2019 A new M2M communications scheme is proposed for secure and efficient information transmission in M2M communications

Outline Introduction Proposed scheme Security analysis Performance analysis Conclusions Comments

Introduction(1/1) --M2M Architecture Requirement and critical problem problems for M2M communications Real time Security Fault tolerance

Proposed scheme (1/4) -- Constructing the Communication Model To establish 6 node-disjoint paths from Node 1 to Node 8 in graph Latin Square

Proposed scheme (2/4) --Secret-Sharing Scheme (1/3) (1) Initialization: (2) Secret generation: (ei, n) & (di, n) are used to mark

Proposed scheme (3/4) --Secret-Sharing Scheme (2/3) (4) Authentication: (3) Secret sharing: EncS(M)

Proposed scheme (4/4) --Secret-Sharing Scheme (3/3) (6) Secret recovery: (5) Fault detection: ?

Security Analysis (1/1) Replay attacks Impersonation attacks Key compromise impersonation attacks

Performance Analysis (1/4) --System Delay

Performance Analysis (2/4) --Storage and Computational Overhead

Performance Analysis (3/4) -- Simulation

Performance Analysis (4/4) -- Simulation

Conclusions Designing a new M2M communications scheme Providing high real-time performance for M2M communications Ensuring security in information transmission Supporting fault tolerance