Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critic...Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critical requirement.To address this crucial requirement,various types of validation and key agreement protocols have been employed.The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws.This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol.The secureness of the proposed protocol undergoes an informal analysis,whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS attacks.Furthermore,it is simulated and formally analyzed using Scyther tool.Simulation results indicate the protocol’s robustness,both in perfect forward security and against various attacks.In addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost.The time complexity of the proposed protocol only involves time of performing a hash function Th,i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other protocols.The results of the comparison point to a superior performance by the proposed protocol.展开更多
Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stab...Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority.展开更多
In software-defined networking(SDN)networks,unlike traditional networks,the control plane is located separately in a device or program.One of the most critical problems in these networks is a controller placement prob...In software-defined networking(SDN)networks,unlike traditional networks,the control plane is located separately in a device or program.One of the most critical problems in these networks is a controller placement problem,which has a significant impact on the network’s overall performance.This paper attempts to provide a solution to this problem aiming to reduce the operational cost of the network and improve their survivability and load balancing.The researchers have proposed a suitable framework called kernel search introducing integer programming formulations to address the controller placement problem.It demonstrates through careful computational studies that the formulations can design networks with much less installation cost while accepting a general connected topology among controllers and user-defined survivability parameters.The researchers used the proposed framework on six different topologies then analyzed and compared with Iterated Local Search(ILS)and Expansion model for the controller placement problem(EMCPP)along with considering several evaluation criteria.The results show that the proposed framework outperforms the ILS and EMCPP.Thus,the proposed framework has a 38.53%and 38.02%improvement in reducing network implementation costs than EMCPP and ILS,respectively.展开更多
Fog computing became a traditional OffLad Destination(OLD)to compute the offloaded tasks of the Internet of Vehicles(IoV).Nevertheless,the limited computing resources of the fog node leads to re-offload these tasks to...Fog computing became a traditional OffLad Destination(OLD)to compute the offloaded tasks of the Internet of Vehicles(IoV).Nevertheless,the limited computing resources of the fog node leads to re-offload these tasks to the neighboring fog nodes or the cloud.Thus,the IoV will incur additional offloading costs.In this paper,we propose a new offloading scheme by utilizing RoadSide Parked Vehicles(RSPV)as an alternative OLD for IoV.The idle computing resources of the RSPVs can compute large tasks with low offloading costs compared with fog nodes and the cloud.Finally,a performance evaluation of the proposed scheme has been presented and discussed with other benchmark offloading schemes.展开更多
文摘Tele-medical information system provides an efficient and convenient way to connect patients at home with medical personnel in clinical centers.In this system,service providers consider user authentication as a critical requirement.To address this crucial requirement,various types of validation and key agreement protocols have been employed.The main problem with the two-way authentication of patients and medical servers is not built with thorough and comprehensive analysis that makes the protocol design yet has flaws.This paper analyzes carefully all aspects of security requirements including the perfect forward secrecy in order to develop an efficient and robust lightweight authentication and key agreement protocol.The secureness of the proposed protocol undergoes an informal analysis,whose findings show that different security features are provided,including perfect forward secrecy and a resistance to DoS attacks.Furthermore,it is simulated and formally analyzed using Scyther tool.Simulation results indicate the protocol’s robustness,both in perfect forward security and against various attacks.In addition,the proposed protocol was compared with those of other related protocols in term of time complexity and communication cost.The time complexity of the proposed protocol only involves time of performing a hash function Th,i.e.,:O(12Th).Average time required for executing the authentication is 0.006 seconds;with number of bit exchange is 704,both values are the lowest among the other protocols.The results of the comparison point to a superior performance by the proposed protocol.
文摘Satellite networks are recognized as the most essential communication infrastructures in the world today,which complement land networks and provide valuable services for their users.Extensive coverage and service stability of these networks have increased their popularity.Since eavesdropping and active intrusion in satellite communications are much easier than in terrestrial networks,securing satellite communications is vital.So far,several protocols have been proposed for authentication and key exchange of satellite communications,but none of them fullymeet the security requirements.In this paper,we examine one of these protocols and identify its security vulnerabilities.Moreover,we propose a robust and secure authentication and session key agreement protocol using the elliptic curve cryptography(ECC).We show that the proposed protocol meets common security requirements and is resistant to known security attacks.Moreover,we prove that the proposed scheme satisfies the security features using the Automated Validation of Internet Security Protocols and Applications(AVISPA)formal verification tool and On-the fly Model-Checker(OFMC)and ATtack SEarcher(ATSE)model checkers.We have also proved the security of the session key exchange of our protocol using theReal orRandom(RoR)model.Finally,the comparison of our scheme with similar methods shows its superiority.
文摘In software-defined networking(SDN)networks,unlike traditional networks,the control plane is located separately in a device or program.One of the most critical problems in these networks is a controller placement problem,which has a significant impact on the network’s overall performance.This paper attempts to provide a solution to this problem aiming to reduce the operational cost of the network and improve their survivability and load balancing.The researchers have proposed a suitable framework called kernel search introducing integer programming formulations to address the controller placement problem.It demonstrates through careful computational studies that the formulations can design networks with much less installation cost while accepting a general connected topology among controllers and user-defined survivability parameters.The researchers used the proposed framework on six different topologies then analyzed and compared with Iterated Local Search(ILS)and Expansion model for the controller placement problem(EMCPP)along with considering several evaluation criteria.The results show that the proposed framework outperforms the ILS and EMCPP.Thus,the proposed framework has a 38.53%and 38.02%improvement in reducing network implementation costs than EMCPP and ILS,respectively.
文摘Fog computing became a traditional OffLad Destination(OLD)to compute the offloaded tasks of the Internet of Vehicles(IoV).Nevertheless,the limited computing resources of the fog node leads to re-offload these tasks to the neighboring fog nodes or the cloud.Thus,the IoV will incur additional offloading costs.In this paper,we propose a new offloading scheme by utilizing RoadSide Parked Vehicles(RSPV)as an alternative OLD for IoV.The idle computing resources of the RSPVs can compute large tasks with low offloading costs compared with fog nodes and the cloud.Finally,a performance evaluation of the proposed scheme has been presented and discussed with other benchmark offloading schemes.