2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ)

24-25 Feb. 2018

Filter Results

Displaying Results 1 - 25 of 30
  • [Front cover]

    Publication Year: 2018, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (76 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2018, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • [Title page]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Front matter table of contents 2]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (31 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Front matter table of contents 4]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (48 KB)
    Freely Available from IEEE
  • [Front matter table of contents 5]

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (49 KB)
    Freely Available from IEEE
  • Tutorial

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (47 KB)

    Provides an abstract of each tutorial presentation and may include a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Keynote speech

    Publication Year: 2018, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB)

    Provides an abstract of the keynote presentation and may include a brief professional biography of the presenter. The complete presentation was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards improving the security of mobile systems using virtualization and isolation

    Publication Year: 2018, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    Mobile devices are used for various activities ranging from entertainment to banking. Bring Your Own Devices (BYODs) and telecommuting allow employees to use their mobile devices in the environment of an organization and at home. The convergence of work and personal life introduces several security and privacy problems. This paper presents a technical approach to balance security and privacy needs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure authentication key sharing between mobile devices based on owner identity

    Publication Year: 2018, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (306 KB) | HTML iconHTML

    The public key based Web authentication can be securely implemented using modern mobile devices with a hardware-assisted trusted environment such as the Trusted Execution Environment (TEE) as a secure storage of private keys. As a private key is strictly kept secret within the TEE and never leaves the device, there is a usability issue: the user must register the key separately on each device and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile road pothole classification and reporting with data quality estimates

    Publication Year: 2018, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Harnessing the power of mobile computing platforms has opened up newer possibilities of gathering and classifying data by leveraging the use of crowd-sourcing. In the current generation that is being dominated by the mobile computing platform namely smart-phones, crowd-sourcing can be achieved in a relatively hassle-free yet effective means of collecting data from a large set of ordinary users. Ta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast secure computation based on a secret sharing scheme for n < 2k − 1

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB) | HTML iconHTML

    Secure computation is a major issue that affects the utilization of Big Data. Two main approaches are employed to achieve secure computation: homomorphic encryption (HE). and secret sharing schemes (SSSs), where the computational cost of the latter is generally much less than that of HE. Aminuddin et al. proposed a secure product-sum computation that allows secure multiplication for n <; 2k - 1... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Graph-based wormhole attack detection in mobile ad hoc networks (MANETs)

    Publication Year: 2018, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    A Mobile ad hoc network (MANET) is a set of nodes that communicate together in a cooperative way using the wireless medium, and without any central administration. Due to its inherent open nature and the lack of infrastructure, security is a complicated issue compared to other networks. That is, these networks are vulnerable to a a wide range of attacks at different network layers. At the network ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation of a virtual network function for real-time threat detection using stream processing

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB) | HTML iconHTML

    Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. Real-time traffic monitoring and fast security threat detection is a challenge to reduce the risk of great damages. In this paper, we propose a virtualized network function in an Open Source Platform for providing a real-time threat detection service. Our function combines cloud computin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Password-protected secret sharing scheme with the same threshold in distribution and restoration

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB) | HTML iconHTML

    Conventional password-protected secret sharing (PPSS) based on Shamir's (k, n) secret sharing scheme requires 2k - 1 shares for reconstructing a search result. However, it can reconstruct the secret by leveraging k shares, because it performs secure multiplication. In this case, it is easier to restore the secret than the search result. In this paper, we propose a novel PPSS with the same distribu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of MAC-layer trust zones over virtual network interfaces

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    In smart building scenarios there are a lot of vulnerable devices that could be exploited to run attacks against other devices within the same LAN. Even though existing solutions mostly tackle the problem by cluster-based authentication and key management schemes, none of them leverages the potential of isolating traffic by network interface virtualization. Thus, we proposed in a previous work a c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attacks and vulnerability analysis of e-mail as a password reset point

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB) | HTML iconHTML

    In this work, we perform security analysis of using an e-mail as a self-service password reset point, and exploit some of the vulnerabilities of e-mail servers' forgotten password reset paths. We perform and illustrate three different attacks on a personal Email account, using a variety of tools such as: public knowledge attainable through social media or public records to answer security question... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Overview of the EMV Protocol and Its Security Vulnerabilities

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (667 KB) | HTML iconHTML

    EMV (Europay Mastercard Visa) is the international standard implemented to secure purchase and deposit/withdrawal transactions. It represents a set of security rules and messages exchanged between the transaction actors in order to guarantee important security properties (such as authentication, authorization, integrity, etc.). However, several recent research studies have analyzed the EMV securit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards secure elements for trusted transactions in blockchain and blochchain IoT (BIoT) Platforms. Invited paper

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (406 KB) | HTML iconHTML

    This paper introduces some trust issues for blockchain transactions. Such transactions rely on ECDSA signature based on 32 bytes secret keys. Because these keys can be stolen or hacked, we suggest to prevent these risks by using javacard secure elements. We detailed the interface of a Crypto Currency Smart Card (CCSC) designed over a JC3.04 standard platform. We details two use cases. First deals ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improvement of privacy protection surveillance camera system and its applications

    Publication Year: 2018, Page(s):1 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Kobayashi et al. proposed a privacy protection surveillance camera system (PPSCS) [4]. PPSCS can maintain the secrecy of the facial image of subject persons (SPs) captured by a surveillance camera, according to their intentions, by using techniques such as mosaicking. In PPSCS, the system cannot remove the mosaicking unless the SP commits a crime. In this study, we propose new applications for the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The impact of sand propagation environment on the performance of wireless sensor networks

    Publication Year: 2018, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1473 KB) | HTML iconHTML

    A comparative methodology for performance evaluation of the wireless sensor network (WSN) protocols deployed in sand environment is proposed. This methodology is created based on the usage of empirical radio frequency (RF) propagation model that is able to include environmental factors influencing signal propagation of wireless sensor nodes deployed in sandy environment. Furthermore, radio energy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Concept network design for a young Mars science station and Trans-planetary communication

    Publication Year: 2018, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB) | HTML iconHTML

    NASA is planning to send a satellite with some people on it to Mars in 2019. They are calling it manned mission to Mars. This paper presents a high-level networking design to provide high bandwidth for a young and growing Mars settlement and science station. A physical network topology is described consisting of a high power ground station to communicate with orbiters. Different parts and devices ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.