Security Aspects of Smart Cards vs. Embedded Security in Machine-to-Machine (M2M) Advanced Mobile Network Applications

Author(s):  
Mike Meyerstein ◽  
Inhyok Cha ◽  
Yogendra Shah
2010 ◽  
Vol 21 (8) ◽  
pp. 1783-1794 ◽  
Author(s):  
Xiao-Wei ZHANG ◽  
Dong-Gang CAO ◽  
Gang TIAN ◽  
Xiang-Qun CHEN

Author(s):  
B. A. F. Esmail ◽  
H. A. Majid ◽  
S. H. Dahlan ◽  
Z. Z. Abidin ◽  
M. K. A. Rahim ◽  
...  

Two novel millimeter-wave (MMW) metamaterials (MTMs) unit cells operate at 28 GHz for a future fifth generation (5G) mobile network applications had been designed, presented and numerically investigated. Two MTM structures are proposed; namely the double E-shaped resonator (DER) and T-U shaped resonator (TUSR). The DER and TUSR are consists of a double E and combined T-U shaped, each printed on front side of the substrate layer respectively. DER achieves a bandwidth of 0.5 GHz and a return loss of -34 dB, whereas TUSR features a bandwidth of  0.3 GHz and a return loss of -18 dB. The conventional split range resonator (SRR) was optimized to operate at similar frequency for comparison purpose. The simulation results revealed that the proposed DER and TUSR unit cells achieves the lowest loss as opposed to literature with -0.09 dB (0.99 in linear scale) and -0.23 dB (0.97 in linear scale) respectively. Moreover, a well-known algorithm was used to extract the constitutive parameters and the double negative nature of the two novel MTM structures is proven.


2016 ◽  
Vol 10 (5) ◽  
pp. 272-282 ◽  
Author(s):  
Alavalapati Goutham Reddy ◽  
Eun-Jun Yoon ◽  
Ashok Kumar Das ◽  
Kee-Young Yoo

Author(s):  
Gildas Avoine ◽  
Loïc Ferreira

We describe in this paper how to perform a padding oracle attack against the GlobalPlatform SCP02 protocol. SCP02 is implemented in smart cards and used by transport companies, in the banking world and by mobile network operators (UICC/SIM cards). The attack allows an adversary to efficiently retrieve plaintext bytes from an encrypted data field. We provide results of our experiments done with 10 smart cards from six different card manufacturers, and show that, in our experimental setting, the attack is fully practical. Given that billions SIM cards are produced every year, the number of affected cards, although difficult to estimate, is potentially high. To the best of our knowledge, this is the first successful attack against SCP02.


2011 ◽  
Vol 22 (12) ◽  
pp. 2866-2878 ◽  
Author(s):  
Xiao-Wei ZHANG ◽  
Dong-Gang CAO ◽  
Xiang-Qun CHEN ◽  
Hong MEI

2017 ◽  
Vol 22 (S4) ◽  
pp. 9661-9676 ◽  
Author(s):  
Zhenze Jia ◽  
Xiaoguang Fan ◽  
Haoxiang Wang

2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Li Kuang ◽  
Yin Wang ◽  
Pengju Ma ◽  
Long Yu ◽  
Chuanbin Li ◽  
...  

With the rapid development of location-based services in the field of mobile network applications, users enjoy the convenience of location-based services on one side, while being exposed to the risk of disclosure of privacy on the other side. Attacker will make a fierce attack based on the probability of inquiry, map data, point of interest (POI), and other supplementary information. The existing location privacy protection techniques seldom consider the supplementary information held by attackers and usually only generate single cloaking region according to the protected location point, and the query efficiency is relatively low. In this paper, we improve the existing LBSs system framework, in which we generate double cloaking regions by constraining the supplementary information, and then k-anonymous task is achieved by the cooperation of the double cloaking regions; specifically speaking, k dummy points of fixed dummy positions in the double cloaking regions are generated and the LBSs query is then performed. Finally, the effectiveness of the proposed method is verified by the experiments on real datasets.


Sign in / Sign up

Export Citation Format

Share Document