Wireless sensor networks will be widely deployed in the near future. While much research has focused on making these networks feasible and useful, security has received little attention. We present a suite of security protocols optimized... more
In recent years, a large amount of work on chaos-based cryptosystems have been published. However many of the proposed schemes fail to explain or do not possess a number of features that are fundamentally important to all kind of... more
Abstruct-A circuit implementation of the chaotic Lorenz system is described. The chaotic behavior of the circuit closely matches the results predicted by numerical experiments. Using the concept of synchronized chaotic systems (SCS's),... more
Under the sole assumption that Alice and Bob are connected by a classical authentic communication channel, secret communication-and thus also the generation of a secret key-is impossible . This changes dramatically when quantum mechanics... more
Role-based access control (RBAC) models have generated a great interest in the security community as a powerful and generalized approach to security management. In many practical scenarios, users may be restricted to assume roles only at... more
A novel biometrics method to secure wireless body area sensor networks for telemedicine and m-health
The development of the wireless body area sensor network (BASN) is imperative for modern telemedicine and m-health, but security remains a formidable challenge yet to be resolved. As nodes of BASN are expected to be interconnected on or... more
E S O F T W A R E J a n u a r y / F e b r u a r y 2 0 0 2 0 7 4 0 -7 4 5 9 / 0 2 / $ 1 7 . 0 0 © 2 0 0 2 I E E E J a n u a r y I E E E S O F T W A R E 4 3 Malformed input 16% Resource leaks 6% Format bugs 6% Buffer overflows 19% Access... more
This paper deals with the problem of synchronization of a class of continuous-time chaotic systems using the driveresponse concept. An adaptive observer-based response system is designed to synchronize with a given chaotic drive system... more
This paper deals with relay selection in cooperative networks with secrecy constraints. The proposed scheme enables an opportunistic selection of two relay nodes to increase security against eavesdroppers. The first relay operates as a... more
A working free-space quantum key distribution (QKD) system has been developed and tested over an outdoor optical path of ∼ 1 km at Los Alamos National Laboratory under nighttime conditions. Results show that QKD can provide secure... more
Devices that harness the laws of quantum physics hold the promise for information processing that outperforms their classical counterparts, and for unconditionally secure communication 1 . However, in particular, implementations based on... more
The goal of the Advanced Encryption Standard (AES) is to achieve secure communication. The use of AES does not, however, guarantee reliable communication. Prior work has shown that even a single transient error occurring during the AES... more
The generation of random bit sequences based on non-deterministic physical mechanisms is of paramount importance for cryptography and secure communications. High data rates also require extremely fast generation rates and robustness to... more
Modern industrial communication networks are increasingly based on open protocols and platforms that are also used in the office IT and Internet environment. This reuse facilitates development and deployment of highly connected systems,... more
In this paper, control theory is used to formalize finite-time chaos synchronization as a nonlinear finite-time observer design issue. This paper introduces a finite-time observer for nonlinear systems that can be put into a linear... more
Advances in microelectronics, material science and wireless technology have led to the development of sensors that can be used for accurate monitoring of inaccessible environments. Health monitoring, telemedicine, military and... more
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may c hoose the corrupted parties during the course of the computation, in a setting where the channels are... more
A Body Area Network (BAN) is a wireless network of health monitoring sensors designed to deliver personalized health-care. Securing inter-sensor communications within BANs is essential for preserving not only the privacy of health data... more
The fluctuating intensity of a chaotic semiconductor laser is used for generating random sequences at rates up to 12:5 Gbits=s. The conversion of the fluctuating intensity to a random bit sequence can be implemented in either software or... more
We propose a novel algorithm for detecting wormhole attacks in wireless multi-hop networks. The algorithm uses only connectivity information to look for forbidden substructures in the connectivity graph. The proposed approach is... more
Secure communication is very important in computer networks and authentication is one of the most eminent preconditions. However, common authentication schemes are not applicable in ad hoc networks because public key infrastructures with... more
Research on the secure communication applications of chaotic synchronization is reviewed. A number of secure communication methods and devices using different types of synchronous behavior are examined. For the purpose of comparing... more
Real-world deployments of wireless sensor networks (WSNs) require secure communication. It is important that a receiver is able to verify that sensor data was generated by trusted nodes. It may also be necessary to encrypt sensor data in... more
In this paper, the issues of lag synchronization of coupled time-delayed systems with chaos are investigated in detail. Two different systems are considered, namely, neural and Mackey-Glass systems. Some sufficient conditions for... more
Continuous variable quantum key distribution via a simultaneous optical-wireless up-down-link system
A continuous-variable quantum key distribution protocol based on squeezed states and heterodyne detection is introduced and shown to attain higher secret key rates over a noisy line than any other oneway Gaussian protocol. This increased... more
Synchronization of fractional order chaotic dynamical systems is receiving increasing attention owing to its interesting applications in secure communications of analog and digital signals and cryptographic systems. In this article we... more
Wireless networks are being driven by the need for providing network access to mobile or nomadic computing devices. Although the need for wireless access to a network is evident, new problems are inherent in the wireless medium itself.... more
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the high variation in legitimate network traffic, detecting... more
We present an entangled-state quantum cryptography system that operated for the first time in a real world application scenario. The full key generation protocol was performed in real time between two distributed embedded hardware... more
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also advantages in terms of security, the dynamic nature of... more
Clustered sensor networks have recently been shown to increase system throughput, decrease system delay, and save energy while performing data aggregation. Whereas those with rotating cluster heads, such as LEACH (low-energy adaptive... more
We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key... more
It is important to design cryptographically strong S-Boxes in order to design secure systems. In this study, a strong, chaos-based S-Box design is proposed. Continuous-time Lorenz system is chosen as the chaotic system. Proposed... more
In this paper, we propose a method of robust nonlinear H 1 master-slave synchronization for chaotic Lur'e systems with applications to secure communication. The scheme makes use of vector field modulation and either full static state or... more
A delay tolerant network (DTN) is a store and forward network where end-to-end connectivity is not assumed and where opportunistic links between nodes are used to transfer data. An emerging application of DTNs are rural area DTNs, which... more
Gaining access to sensitive resources on the Web usually involves an explicit registration step, where the client has to provide a predetermined set of information to the server. The registration process yields a login/password... more
This paper presents synthesis approaches for synchronization and secure communications of chaotic systems by using fuzzy model-based design methods. Many well-known continuous and discrete chaotic systems can be exactly represented by T-S... more
Recommender systems are widely used to help deal with the problem of information overload. However, recommenders raise serious privacy and security issues. The personal information collected by recommenders raises the risk of unwanted... more
Preserving a person's privacy in an efficient manner is very important for critical, life-saving infrastructures like Body Sensor Networks (BSN). This paper presents a novel key agreement scheme which allows two sensors in a BSN to agree... more
In this paper, the synchronization problem of coupled Chua's circuits generator of n-scroll chaotic attractors in master-slave configuration is numerically studied. In particular, we consider a modified Chua's circuit generator of... more
In this paper the key storage problem associated with the provision of secure communications between every pair of users in a large network is described, and a possible method of alleviating the problem is discussed. This method, based on... more
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure communication in the presence of eavesdroppers is possible. The... more
The emergence of the Internet as a trusted medium for commerce and communication has made cryptography an essential component of modern information systems. Cryptography provides the mechanisms necessary to implement accountability,... more