APPLIED CRYPTOGRAPHY AND NETWORK SECURITY potx

390 253 0
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY potx

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

APPLIED CRYPTOGRAPHY AND NETWORK SECURITY Edited by Jaydip Sen Applied Cryptography and Network Security Edited by Jaydip Sen Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2012 InTech All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which allows users to download, copy and build upon published articles even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. As for readers, this license allows users to download, copy and build upon published chapters even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. Notice Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published chapters. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Mirna Cvijic Technical Editor Teodora Smiljanic Cover Designer InTech Design Team First published March, 2012 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Applied Cryptography and Network Security, Edited by Jaydip Sen p. cm. 978-953-51-0218-2 Contents Preface IX Part 1 Security and Privacy in Computing and Communication Networks 1 Chapter 1 Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks 3 Jaydip Sen Chapter 2 Security from Location 35 Di Qiu, Dan Boneh, Sherman Lo and Per Enge Chapter 3 Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview 53 Hu Xiong, Zhi Guan, Jianbin Hu and Zhong Chen Chapter 4 Security Approaches for Information-Centric Networking 73 Walter Wong and Maurício Ferreira Magalhães Chapter 5 Secure Platform Over Wireless Sensor Networks 99 Marco Pugliese, Luigi Pomante and Fortunato Santucci Chapter 6 Privacy-Secure Digital Watermarking for Fair Content Trading 125 Mitsuo Okada Chapter 7 NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks 153 Pardeep Kumar and Hoon-Jae Lee Chapter 8 Key Establishment Protocol for Wireless Sensor Networks 169 Ali Fanian and Mehdi Berenjkoub VI Contents Part 2 Quantum Cryptography 197 Chapter 9 Quantum Cryptography 199 W. Chen, H W. Li, S. Wang, Z Q. Yin, Z. Zhou, Y H. Li, Z F. Han and G.C. Guo Chapter 10 Quantum Key Management 227 Peter Schartner, Stefan Rass and Martin Schaffer Chapter 11 Securing a Telecom Services Using Quantum Cryptographic Mechanisms 245 Abdallah Handoura Part 3 Evolutionary Concepts and Techniques in Security 265 Chapter 12 Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem 267 Pellicer-Lostao Carmen and López-Ruiz Ricardo Chapter 13 Chaotic Electronic Circuits in Cryptography 295 Matej Šalamon Chapter 14 An En/Decryption Machine Based on Statistical Physics 321 Annie Perez, Céline Huynh Van Thieng, Samuel Charbouillot and Hassen Aziza Chapter 15 Modern Technologies Used for Security of Software Applications 337 Tatiana Hodorogea and Ionas Szilard Otto Chapter 16 Research on DNA Cryptography 357 Yunpeng Zhang and Liu He Bochen Fu Preface We live in an era of unimaginably rapidly advancing and amazing technologies that enable instantaneous flow of information – anytime, anywhere. The convergence of computers and networks has been the key force behind the development of these awesome technologies. Increasing use of systems which are built using advanced information technologies is having a profound impact on our everyday lives. These technologies are becoming all pervasive and ubiquitous. With the exponential growth of wireless telecommunication and information technologies and the increasingly dominant roles played by electronic commerce in every major industry, safeguarding of information travelling over the communication networks is increasingly becoming one of the most important and contentious challenges for the technology innovators. The key prerequisite for the continued development and successful exploitation of information technology and other related industries is the notion of information assurance that includes operations for protecting and defending information and information systems by ensuring their availability, integrity, authentication, non-repudiation and information confidentiality and privacy. In this age of electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, network security has assumed increasing importance. Two trends are emerging very clearly in this regard. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security. Cryptography will continue to play lead roles in developing new security solutions which will be in great demand with the advent of high-speed next-generation communication systems and networks. New cryptographic algorithms, protocols and tools must follow up in order to adapt to the new communication and computing technologies. Computing systems and communication protocols like IEEE 802.11 and X Preface IEEE 802.15 are increasingly becoming targets of attacks since the underlying radio communication medium for wireless networks provides serious security loopholes. New security mechanisms should be designed to defend against the increasingly complex and sophisticated attacks launched on networks and web-based applications. In addition to classical cryptographic algorithms, new approaches like chaos-based cryptography, DNA-based cryptography and quantum cryptography will be play important roles. The purpose of this book is to present some of the critical security challenges in today’s communication networks and computing and to provide insights to possible mechanisms to defend against attacks. With this objective, the book provides a collection of research work in the field of cryptography and network security by some experts in these areas. The book contains 16 chapters which are divided into three parts. The chapters in Part 1 of the book largely deal with security and privacy issues in computing and communication networks. The Part 2 includes chapters which are related to the field of quantum cryptography. The chapters dealing with the evolutionary concepts of cryptography and their applications like chaos-based cryptography and DNA cryptography are included in the Part 3 of the book. The Part 1 of the book contains 8 chapters. In Chapter 1: Secure and Privacy Preserving Authentication Protocols for Wireless Mesh Networks, Sen has identified various vulnerabilities in wireless mesh networks and proposed a secure authentication and user privacy protection scheme for such networks. In Chapter 2: Security from Location ( ), Qiu et al. have presented a scheme for location-based security service which limits access of location information of a device to provide location privacy to the user of the device. In Chapter 3: Privacy Issue in Vehicular Networks, Xiong has identified various privacy issues in vehicular ad hoc networks and has presented a taxonomy for classification of various defense mechanisms for the privacy attacks. In Chapter 4: Security Approaches for Information-Centric Networking, Wong and Magalhães have presented two hash tree techniques to provide content authentication based on contents instead on the communication channel to provide content authentication in information-centric networks. In Chapter 5: Secure platform over wireless sensor networks, Pugliese et al. present a middleware service suite for the wireless sensor network platform that provides various security services in an application execution environment. In Chapter 6: Privacy-Secure Digital Watermarking for Fair Content Trading, Okada discusses a privacy-preserving digital watermarking scheme to defend against cyber attacks and content piracy. In Chapter 7: NLM-MAC: Lightweight Secure Data Communication Framework using Authenticated Encryption in Wireless Sensor Networks, Kumar and Lee propose a lightweight steam cipher for encrypting traffic in a wireless sensor network. For authentication and integrity of the messages a message authentication code named “NLM-MAC” has been proposed that is suitable for resource constrained sensor nodes. In Chapter 8: Key Establishment Protocol for Wireless Sensor Networks, Fanian and Berenjkoub propose and evaluate a key management protocol for wireless sensor networks. . APPLIED CRYPTOGRAPHY AND NETWORK SECURITY Edited by Jaydip Sen Applied Cryptography and Network Security Edited by Jaydip Sen . orders@intechweb.org Applied Cryptography and Network Security, Edited by Jaydip Sen p. cm. 978-953-51-0218-2 Contents Preface IX Part 1 Security and Privacy in Computing and Communication. data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network- based attacks. Second, the disciplines of cryptography and network security

Ngày đăng: 28/06/2014, 16:20

Mục lục

  • 00_preface_Applied Cryptography and Network Security

  • 00x_part1

  • 01_Secure and Privacy-Preserving Authentication Protocols for Wireless Mesh Networks

  • 02_Security from Location

  • 03_Anonymous Authentication Protocols for Vehicular Ad Hoc Networks: An Overview

  • 04_Security Approaches for Information-Centric Networking

  • 05_Secure Platform Over Wireless Sensor Networks

  • 06_Privacy-Secure Digital Watermarking for Fair Content Trading

  • 07_NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks

  • 08_Key Establishment Protocol for Wireless Sensor Networks

  • 08x_part2

  • 09_Quantum Cryptography

  • 10_Quantum Key Management

  • 11_Securing a Telecom Services Using Quantum Cryptographic Mechanisms

  • 11x_part3

  • 12_Notions of Chaotic Cryptography: Sketch of a Chaos Based Cryptosystem

  • 13_Chaotic Electronic Circuits in Cryptography

  • 14_An En/Decryption Machine Based on Statistical Physics

  • 15_Modern Technologies Used for Security of Software Applications

  • 16_Research on DNA Cryptography

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan