Efficient protocols for secure broadcast in controller area networks

B Groza, S Murvay - IEEE Transactions on Industrial Informatics, 2013 - ieeexplore.ieee.org
Controller Area Network is a bus commonly used by controllers inside vehicles and in
various industrial control applications. In the past controllers were assumed to operate in …

[PDF][PDF] Case study: system model of crane and embedded control

E Moser, W Nebel - Proceedings of the conference on Design …, 1999 - dl.acm.org
Case study Page 1 Case Study: System Model of Crane and Embedded Control Eduard Moser
Robert Bosch GmbH, FV/FLI Stuttgart, Germany moser@fli.sh.bosch.de Wolfgang Nebel Carl …

Efficient multicast authentication in internet of things

O Bamasag, KY Toumi - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
In this paper, we propose a novel continuous multicast authentication protocol for the
Internet of Things applications based on secret sharing scheme. This protocol provides …

Video streaming security: window-based hash chain signature combines with redundancy code-youtube scenario as an internet case study

E Abd-Elrahman, M Abid, H Afifi - 2010 IEEE International …, 2010 - ieeexplore.ieee.org
This paper provides a performance study for securing media streaming based on hash chain
methodology. We introduce a new technique that combines the signature of window-based …

[PDF][PDF] Securing group communication in critical Infrastructures

R Annessi - 2019 - scholar.archive.org
Communication networks have become an essential part of increasingly interconnected
modern societies. Group communication is a ubiquitous concept in today's communication …

Hash chain links resynchronization methods in video streaming security: performance comparison

E Abd-Elrahman, M Boutabia… - Journal of mobile …, 2011 - journals.riverpublishers.com
Hash chains provide a secure and light way of security to data authentication including two
aspects: Data Integrity and Data Origin Authentication. The real challenge of using the hash …

Video streaming security: reliable hash chain mechanism using redundancy codes

E Abd-Elrahman, M Boutabia, H Afifi - Proceedings of the 8th …, 2010 - dl.acm.org
The prospection of video streaming security has been changed considerably during the last
years. With the new generation of hand healed devices and the delivery rate up to 2 Mb/s …

A lightweight dynamic multicast authentication scheme

X Yao, X Zhou, X Du - 9th International Conference on …, 2014 - ieeexplore.ieee.org
Multicast is a very common communication mode in wireless networks. A security
mechanism for multicast is not only the measure to ensure secure communications but also …

Survey on multicast data origin authentication

J He, G Xu, X Fu, Z Zhou, J Jiang - 2008 11th IEEE …, 2008 - ieeexplore.ieee.org
Multicast is an efficient and natural way of communicating information via Internet, but its
security is identified as one of the most important problems to solve for the successful …

Data authentication and trust within distributed intrusion detection system inter-component communications

J Haggerty, Q Shi, P Fergus, M Merabti - EC2ND 2005: Proceedings of the …, 2006 - Springer
Networks are a fundamental technology for users and businesses alike. In order to achieve
security in ever-increasing distributed environments, recent advances in intrusion detection …