Sealed-Bid Auction Protocols

Author(s):  
Kun Peng

In the Internet era electronic commerce is an important and popular industry. Electronic auctions provide a key function in e-commerce, enabling effective and fair distribution of electronic as well as non-electronic goods. Like other fields of e-commerce, e-auctions face serious security threats. Fraud can be committed by bidders or auctioneers. Most popular Internet auctions sites use an open-cry bidding process. This can add excitement to an auction in progress and possibly encourage new bidders to join an auction. However, there are serious difficulties in maintaining the security requirements often required in commercial auctions, particularly in terms of protecting bid confidentiality and bidder privacy. Additionally, some of the current auction techniques are interactive and require many rounds of communication before completion so that more time is required to determine the final winning price. Intensive communication over the insecure Internet is also a problem from the perspective of availability of service and network security. For these reasons most recent research in this area has concentrated on sealed-bid auctions. Sealed-bid auctions are the focus of this chapter. In this chapter, security requirements in e-auction including correctness, fairness, non-repudiation, robustness, public verifiability, bid privacy, and other desired properties like price flexibility and rule flexibility are introduced. The existing approaches to realize them are investigated. The authors show that the key requirement is bid privacy and the main challenge to the design of an e-auction is how to protect bid privacy without compromising other requirements and properties. Techniques to achieve bid privacy are presented in this chapter according to different application environments.

Author(s):  
Ahmed Maarof ◽  
Mohamed Senhadji ◽  
Zouheir Labbi ◽  
Mostafa Belkasmi

In this chapter, the authors present a review of security requirements for IoT and provide an analysis of the possible attacks, security issues, and major security threats from the perspective of layers that comprise IoT. To overcome these limitations, the authors describe a security implementation challenges in IoT security. This chapter serves as a manual of security threats and issues of the IoT and proposes possible solutions and recommendations for improving security in the IoT environment.


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


Author(s):  
Keith M. Martin

This chapter considers eight applications of cryptography. These essentially act as case studies relating to all the previous material. For each application, we identify the security requirements, the application constraints, the choice of cryptography used, and the ways that the keys are managed. We begin with the SSL/TLS protocols used to secure Internet communications. We then examine the cryptography used in W-Fi networks, showing that early cryptographic design mistakes have subsequently been corrected. We then examine the evolving cryptography used to secure mobile telecommunications. This is followed by a discussion of the cryptography that underpins the security of payment card transactions. We look at the cryptography of video broadcasting and identity cards. We then examine the cryptography behind the Tor project, which use cryptography to support anonymous communication on the Internet. Finally, we examine the clever cryptographic design of Bitcoin, showing how use of cryptography can facilitate digital currency.


1987 ◽  
Vol 23 (3) ◽  
pp. 239-244 ◽  
Author(s):  
James M. Walker ◽  
Vernon L. Smith ◽  
James C. Cox

2021 ◽  
pp. 5-16
Author(s):  
Parth Rustagi ◽  
◽  
◽  
◽  
◽  
...  

As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.


2021 ◽  
Author(s):  
Muhammad Ejaz ◽  
Stephen Joe ◽  
Chaitanya Joshi

In this paper, we use the adversarial risk analysis (ARA) methodology to model first-price sealed-bid auctions under quite realistic assumptions. We extend prior work to find ARA solutions for mirror equilibrium and Bayes Nash equilibrium solution concepts, not only for risk-neutral but also for risk-averse and risk-seeking bidders. We also consider bidders having different wealth and assume that the auctioned item has a reserve price.


Sensors ◽  
2018 ◽  
Vol 18 (10) ◽  
pp. 3584 ◽  
Author(s):  
Rania Baashirah ◽  
Abdelshakour Abuzneid

Radio Frequency Identification (RFID) is one of the leading technologies in the Internet of Things (IoT) to create an efficient and reliable system to securely identify objects in many environments such as business, health, and manufacturing areas. Recent RFID authentication protocols have been proposed to satisfy the security features of RFID communication. In this article, we identify and review some of the most recent and enhanced authentication protocols that mainly focus on the authentication between a reader and a tag. However, the scope of this survey includes only passive tags protocols, due to the large scale of the RFID framework. We examined some of the recent RFID protocols in term of security requirements, computation, and attack resistance. We conclude that only five protocols resist all of the major attacks, while only one protocol satisfies all of the security requirements of the RFID system.


2007 ◽  
Vol 48 (8) ◽  
pp. 851-853 ◽  
Author(s):  
H. Eklöf ◽  
E. Radecka ◽  
P. Liss

Background: The development of digital imaging systems for radiology in combination with the possibility to transfer large quantities of data over the Internet has increased the interest in teleradiology. Transferring nighttime examinations to an evaluation center in a daytime zone may provide improved patient security, better working hours for radiologists, and reduced costs for emergency radiological services. Purpose: To evaluate the time required for transferring radiological information from Uppsala (Sweden) to Sydney (Australia). Material and Methods: A radiologist in Sydney reported on radiological examinations performed in Uppsala. The time required for downloading 75 examinations and returning 24 reports was registered. Results: Downloading was completed in <60 min for all conventional radiological examinations, but only 44% of computed tomography (CT) examinations with >65 images. Reports were completed in <10 min. Turnaround time was directly related to the time required for downloading the images. The Sydney report was available in Uppsala within 30 min of the in-house report in 79% of examinations. Conclusion: The main challenge for emergency teleradiology is the time required for downloading large volumes of data over the Internet.


Sign in / Sign up

Export Citation Format

Share Document