The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Secure Spread: An Integrated Architecture for Secure Group Communication

Yair Amir, Cristina Nita-Rotaru, Jonathan Stanton, Gene Tsudik

Group communication systems are high-availability distributed systems providing reliable and ordered message delivery, as well as a membership service, to group-oriented applications. Many such systems are built using a distributed client-server architecture where a relatively small set of servers provide service to numerous clients. In this work, we show how group communication systems can be enhanced with security services without sacrificing robustness and performance. More specifically, we propose several integrated security architectures for distributed client-server group communication systems. In an integrated architecture, security services are implemented in servers, in contrast to a layered architecture, where the same services are implemented in clients. We discuss performance and accompanying trust issues of each proposed architecture and present experimental results that demonstrate the superior scalability of an integrated architecture.

Added 2008-05-30

Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks

Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, J. Olsen

This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The architecture con- fines the effects of any malicious replica to its local site, reduces message complexity of wide area communication, and allows read-only queries to be performed locally within a site for the price of additional hardware. A prototype implementation is evaluated over several network topologies and is compared with a flat Byzantine fault-tolerant approach.

Added 2008-05-30

Automated analysis

Ninghui Li
Added 2008-05-30

Mitigating Byzantine Attacks in Ad Hoc Wireless Networks

B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru
Added 2008-05-30

High Performance, Robust, Secure and Transparent Overlay Network Service

Y. Amir, C. Danilov, C. Nita-Rotaru
Added 2008-05-30

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones

CERIAS TR 2008-10
Jungha Woo*, Abhilasha Bhagav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino*
Download: PDF

Abstract—A main challenge in mobile commerce is to make it possible for users to manage their transaction histories from both online e-commerce transactions and in-person transactions. Such histories are typically useful to build credit or to establish trust based on past transactions. In this paper we propose an approach to manage electronic receipts on cellular devices by assuring their secure and privacy-preserving usage. We provide a comprehensive notion of transactions history including both on-line transaction and in-person transactions. We apply cryptographic protocols, such as secret sharing and zero knowledge proofs, in a potentially vulnerable and constrained setting. Specifically, our approach supports flexible strategies based on Shamir’s secret sharing to cater to different user requirements and architectural constraints. In addition, aggregate zero knowledge proofs are used to efficiently support proofs of various receipt attributes. We have implemented the system on Nokia NFC cellular phones and report in the paper performance evaluation results.

Added 2008-05-30

An on-demand secure routing protocol resilient to byzantine failures

Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, Herbert Rubens

An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes connected by wireless links where nodes not in directrange can communicate via intermediate nodes. A common technique usedin routing protocols for ad hoc wireless networks is to establish therouting paths on-demand, as opposed to continually maintaining acomplete routing table. A significant concern in routing is theability to function in the presence of byzantine failures whichinclude nodes that drop, modify, or mis-route packets in an attempt todisrupt the routing service.We propose an on-demand routing protocol for ad hoc wireless networks that provides resilience to byzantine failures caused by individual or colluding nodes. Our adaptive probing technique detects a malicious link after log n faults have occurred, where n is the length of the path. These links are then avoided by multiplicatively increasing their weights and by using an on-demand route discovery protocol that finds a least weight path to the destination.

Added 2008-05-30

Synchronization Attacks Against 802.11

G. Khanna, A. Masood, C. Nita-Rotaru
Added 2008-05-30


Viwid: Visible watermarking based defense against phishing

Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru

In this paper, we present a watermarking based approach, and its implementation, for mitigating phishing attacks - a form of web based identity theft. ViWiD is an integrity check mechanism based on visible watermarking of logo images. ViWiD performs all of the computation on the company’s web server and it does not require installation of any tool or storage of any data, such as keys or history logs, on the user’s machine. The watermark message is designed to be unique for every user and carries a shared secret between the company and the user in order to thwart the “one size fits all” attacks. The main challenge in visible watermarking of logo images is to maintain the aesthetics of the watermarked logo to avoid damage to its marketing purpose yet be able to insert a robust and readable watermark into it. Logo images have large uniform areas and very few objects in them, which is a challenge for robust visible watermarking. We tested our scheme with two different visible watermarking techniques on various randomly selected logo images.

Added 2008-05-30

Analysis of malicious abstract sensor faults in adaptive measurement-based overlay networks

Aarom Walters, Cristina Nita-Rotaru

Adaptivity is an important mechanism used to handle the dynamic characteristics of the Internet infrastructure. It is commonly employed to allow distributed applications to monitor and subsequently respond to the ephemeral faults and variable performance that have characterized the Internet since its conception [1]. More recently, adaptation mechanisms were integrated into overlay networks, a technology proposed to improve on the perceived limitations of end-to-end communication using the existing Internet routing infrastructure.

Added 2008-05-30

Scalability, Accountability and Instant Information Access for Network Centric Warfare

J. Lane, J. Shapiro, C. Tutu, C.B. Chan, C. Nita-Rotaru
Added 2008-05-30

Secure multicast routing in wireless networks

Reza Curtmola, Cristina Nita-Rotaru

We consider the problem of secure content distribution in multihop mobile ad hoc networks (MANETs), where a source disseminates data to a group of receivers. To ensure an efficient utilization of the network resources, multicast routing is the natural choice to be used at the network level. Although several multicast routing protocols have been proposed [1, 2], their security has only been explored under outsider attacks [3, 4] or under limited insider attacks [5]. Due to the lack of physical security and the susceptibility of devices to theft, it is necessary to design protocols resilient to both outsider and insider attacks.

Added 2008-05-30

Understanding SPKI/SDSI using first-order logic

Ninghui Li, John C. Mitchell

SPKI/SDSI is a language for expressing distributed access control policy, derived from SPKI and SDSI. We provide a first-order logic (FOL) semantics for SDSI, and show that it has several advantages over previous semantics. For example, the FOL semantics is easily extended to additional policy concepts and gives meaning to a larger class of access control and other policy analysis queries. We prove that the FOL semantics is equivalent to the string rewriting semantics used by SDSI designers, for all queries associated with the rewriting semantics. We also provide a FOL semantics for SPKI/SDSI and use it to analyze the design of SPKI/SDSI. This reveals some problems. For example, the standard proof procedure in RFC 2693 is semantically incomplete. In addition, as noted before by other authors, authorization tags in SPKI/SDSI are algorithmically problematic, making a complete proof procedure unlikely. We compare SPKI/SDSI with RT 1   C , which is a language in the RTRole-based Trust-management framework that can be viewed as an extension of SDSI. The constraint feature of RT 1   C , based on Constraint Datalog, provides an alternative mechanism that is expressively similar to SPKI/SDSI tags, semantically natural, and algorithmically tractable.

Added 2008-05-28

A semantics based approach to privacy languages

N. Li, T. Yut, A. Anton
Added 2008-05-28