A Containment-Based Security Model for Cycle-Stealing P2P Applications

2010 ◽  
Vol 19 (4) ◽  
pp. 191-203 ◽  
Author(s):  
Ankur Gupta ◽  
Lalit K. Awasthi
Author(s):  
Curtis G. Northcutt

The recent proliferation of embedded cyber components in modern physical systems [1] has generated a variety of new security risks which threaten not only cyberspace, but our physical environment as well. Whereas earlier security threats resided primarily in cyberspace, the increasing marriage of digital technology with mechanical systems in cyber-physical systems (CPS), suggests the need for more advanced generalized CPS security measures. To address this problem, in this paper we consider the first step toward an improved security model: detecting the security attack. Using logical truth tables, we have developed a generalized algorithm for intrusion detection in CPS for systems which can be defined over discrete set of valued states. Additionally, a robustness algorithm is given which determines the level of security of a discrete-valued CPS against varying combinations of multiple signal alterations. These algorithms, when coupled with encryption keys which disallow multiple signal alteration, provide for a generalized security methodology for both cyber-security and cyber-physical systems.


2017 ◽  
Vol 5 (2) ◽  
pp. 110-115
Author(s):  
Prem Nath ◽  

P2P (peer-to-peer) overlays have attracted many researchers due to increase in Internet based P2P applications. A P2P overlay is a distributed system in which the independent nodes participate at their will to share resources in distributed manner. P2P overlays are designed for wired based communication systems but today P2P applications are becoming popular in wireless networks even in multi-hop wireless networks. Routing mechanism in P2P overlays is based on IP infrastructure and many protocols are deployed successfully for efficient and fair P2P applications. However, there are many challenges in designing and deployment of efficient and fair protocols for the P2P overlays. These overlays suffer from many challenges such as dynamic overlay management, lack of robust trust model, counterfeit content distribution, free riding, poor resource search scalability, security, etc. The churn rate of nodes (join and leave of nodes) in the P2P overlay makes overlay management and resource searching more challenging. The free riding nature of the nodes in a P2P overlay is undesirable and it creates unfairness in the P2P overlay. There are several mechanisms proposed such as Eigen Trust model, tit-for-tat policy, point-based incentive policy, Page Rank policy, layered taxation, advertisement of incentive, etc. for encouraging fairness in the P2P overlays. I have presented in-depth survey over free riding behaviour, its effect, and existing mechanisms to reduce free riding in structured P2P overlays.


2020 ◽  
Vol 46 (7) ◽  
pp. 443-453
Author(s):  
P. N. Devyanin ◽  
A. V. Khoroshilov ◽  
V. V. Kuliamin ◽  
A. K. Petrenko ◽  
I. V. Shchepetkov

2021 ◽  
Author(s):  
Thilo Krachenfels ◽  
Fatemeh Ganji ◽  
Amir Moradi ◽  
Shahin Tajik ◽  
Jean-Pierre Seifert
Keyword(s):  

2020 ◽  
Vol 62 (5-6) ◽  
pp. 287-293
Author(s):  
Felix Günther

AbstractSecure connections are at the heart of today’s Internet infrastructure, protecting the confidentiality, authenticity, and integrity of communication. Achieving these security goals is the responsibility of cryptographic schemes, more specifically two main building blocks of secure connections. First, a key exchange protocol is run to establish a shared secret key between two parties over a, potentially, insecure connection. Then, a secure channel protocol uses that shared key to securely transport the actual data to be exchanged. While security notions for classical designs of these components are well-established, recently developed and standardized major Internet security protocols like Google’s QUIC protocol and the Transport Layer Security (TLS) protocol version 1.3 introduce novel features for which supporting security theory is lacking.In my dissertation [20], which this article summarizes, I studied these novel and advanced design aspects, introducing enhanced security models and analyzing the security of deployed protocols. For key exchange protocols, my thesis introduces a new model for multi-stage key exchange to capture that recent designs for secure connections establish several cryptographic keys for various purposes and with differing levels of security. It further introduces a formalism for key confirmation, reflecting a long-established practical design criteria which however was lacking a comprehensive formal treatment so far. For secure channels, my thesis captures the cryptographic subtleties of streaming data transmission through a revised security model and approaches novel concepts to frequently update key material for enhanced security through a multi-key channel notion. These models are then applied to study (and confirm) the security of the QUIC and TLS 1.3 protocol designs.


Sign in / Sign up

Export Citation Format

Share Document