European E-Signatures Solutions on the Basis of PKI Authentication Technology

Author(s):  
Ioannis P. Chochliouros ◽  
Anastasia S. Spiliopoulou ◽  
Stergios P. Chochliouros ◽  
Konstantinos N. Voudouris

This chapter presents systems of certification authorities and registration authorities and other supporting servers and agents that perform certificate management, archive management, key management, and token management functions. These activities that support security policy by monitoring and controlling security services, elements and mechanisms, distributing security information, and reporting security events are examined with the main focus on PKI authentication technology.

2016 ◽  
Vol 2016 ◽  
pp. 1-16 ◽  
Author(s):  
S. Raja Rajeswari ◽  
V. Seenivasagam

Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.


Author(s):  
Yassine Maleh ◽  
Abdelkbir Sahid ◽  
Abdellah Ezzati ◽  
Mustapha Belaissaoui

To deliver security services (integrity, confidentiality, authentication, availability), it is necessary that the communicating nodes share cryptographic keys for encryption and authentication. However, it is well known that the encryption systems represent the first line of defense against all types of attacks. Furthermore, cryptographic techniques must be designed to detect the execution of the most dangerous attacks. In addition, these techniques must be small to fit the limited resources of the WSN. The aims of this chapter are to discuss the mechanisms used to secure communications; to show their main adaptations required for adoption in smart sensors, which are described in the literature, particularly in terms of key management and distribution; and finally, to detail the different solutions proposed in the literature to secure the communication of smart and constrained sensor networks in the internet of things based on cryptography and intrusion detection systems.


Author(s):  
Keith Martin

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.


The availability and use of cheaper and smaller sensors has brought an evolution in the field of Wireless Sensor Networks. The changes occurring in the environment can be observed, recorded through the large-scale deployment of sensor nodes that can build-up the much-required information system. Also, they are able to monitor and congregate data about the living organisms therein. In near future, millions more devices are expected to be connected. We focus upon the security services required by WSNs that are most challenging as compared to other networks. First, we introduce the commercially used motes with the comparison of technical and implementation related issues. Second, we analysed the variants of existing one-pass key management protocols for the resource constrained devices. Our aim is to provide a new direction to WSN Security through a restricted key distribution mechanism.


Author(s):  
Christopher G. Reddick

This chapter focuses on Homeland Security Information Systems (HSIS) in the federal government. One definition of HSIS, in the federal government, is the application of information technology to homeland security with the aim of detecting fragmented clues, assembling them as a puzzle, then using the information to stop a terrorist attack (Nunn, 2005). Nunn’s definition focuses on the use of information for data mining for deducing possible terrorist attacks and responses to these incidents. This chapter recognizes the importance of data analysis, but uses a broader definition of federal HSIS being the use of information systems to prepare for and respond to a terrorist attack or significant national emergency. This definition of HSIS covers the importance of data mining to discover how information fits together as pieces of the puzzle, but it also incorporates other elements of information technology (IT) that are used to respond and prepare for a national incident. This chapter will first examine the Department of Homeland Security which has a tremendous influence over homeland security policy and information systems in the United States. There is an examination in this chapter of the environmental context of HSIS in the federal government, demonstrating some of the important pieces of legislation that have an influence in this area. This chapter discusses the roles and responsibilities of federal government Chief Information Officers (CIOs) to discern the scope of their responsibilities. A section of this chapter examines some principles of effective IT management in federal agencies. The final part of this chapter provides the results of a survey of CIOs in federal government departments/agencies to determine the influence of HSIS on their organizations.


Sign in / Sign up

Export Citation Format

Share Document