prof. dr hab. inż. Zbigniew Kotulski


Doktorat
1984Funkcjonały charakterystyczne stochastycznych procesów falowych 
promotor -- prof. dr hab. Kazimierz Sobczyk, IPPT PAN
400 
Habilitacja
1993Analiza fal stochastycznych w ośrodkach warstwowych metodą macierzy przejścia 
Profesura
2008-06-30Nadanie tytułu naukowego profesora
Promotor prac doktorskich
1.2015-10-29Oryńczak Grzegorz  
(UJ)
System agentowy dla wspomagania bezpiecznych usług czasu rzeczywistego678
 
2.2008-10-30Kotlarz Piotr  
(PW)
Sieci neuronowe we wspomaganiu rozwiązywania problemów kryptologii614
 
3.2005Kulesza Kamil  Secret sharing schemes for graphs (Schematy podziału sekretu dla grafów) 

Ostatnie publikacje
1.Szałachowski P., Kotulski Z., One-Time Broadcast Encryption Schemes in Distributed Sensor Networks, International Journal of Distributed Sensor Networks, ISSN: 1550-1329, DOI: 10.1155/2012/536718, pp.1-9, 2012

Streszczenie:

Broadcasting is a message-transferring method characteristic for majority of sensor networks. Broadcast encryption (BE) is broadcasting encrypted messages in such a way that only legitimate nodes of a network can decrypt them. It has many potential applications in distributed wireless sensor networks (WSNs) but perfect deploying of that method is very difficult. This is because of a WSN is a very dynamic network which includes nodes with limited computational, storage, and communication capabilities. Furthermore, an attacker in this environment is powerful. He can eavesdrop, modify, and inject messages or even capture a large number of nodes, so the solutions must be both secure and efficient. This paper describes several BE schemes from the point of view of WSNs. We present in details the schemes called onetime, and we show how these methods can be applied in distributed sensor networks. We mainly focus on data origin authentication and rekeying processes, crucial for security in such a hostile environment. An analysis and evaluations of proposed schemes are also provided.

Afiliacje autorów:

Szałachowski P.-other affiliation
Kotulski Z.-IPPT PAN
20p.
2.Ciszkowski T., Mazurczyk W., Kotulski Z., Hoßfeld T., Fiedler M., Collange D., Towards Quality of Experience-based reputation models for future web service provisioning, TELECOMMUNICATION SYSTEMS, ISSN: 1018-4864, DOI: 10.1007/s11235-011-9435-2, Vol.51, pp.283-295, 2012

Streszczenie:

This paper concerns the applicability of reputations systems for assessing Quality of Experience (QoE) for web services in the Future Internet. Reputation systems provide mechanisms to manage subjective opinions in societies and yield a general scoring of a particular behavior. Thus, they are likely to become an important ingredient of the Future Internet. Parameters under evaluation by a reputation system may vary greatly and, particularly, may be chosen to assess the users’ satisfaction with (composite) web services. Currently, this satisfaction is usually expressed by QoE, which represents subjective users’ opinions. The goal of this paper is to present a novel framework of web services where a reputation system is incorporated for tracking and predicting of users’ satisfaction. This approach is a beneficial tool which enables providers to facilitate service adaptation according to users’ expectations and maintain QoE at a satisfactory level. Presented reputation systems operate in an environment of composite services that integrate client and server-side. This approach is highly suitable for effective QoE differentiating and maximizing user experience for specific customer profiles as even the service and network resources are shared.

Słowa kluczowe:

Reputation systems, Quality of Experience (QoE), Web services, Service composition, Future Internet

Afiliacje autorów:

Ciszkowski T.-other affiliation
Mazurczyk W.-other affiliation
Kotulski Z.-IPPT PAN
Hoßfeld T.-other affiliation
Fiedler M.-other affiliation
Collange D.-other affiliation
20p.
3.Iwankiewicz R., Kotulski Z., Preface to Probabilistic Engineering Mechanics, PROBABILISTIC ENGINEERING MECHANICS, ISSN: 0266-8920, DOI: 10.1016/j.probengmech.2010.07.004, Vol.26, No.1, pp.1-4, 201130p.
4.Ciszkowski T., Dunajewski I., Kotulski Z., Reputation as optimality measure in Wireless Sensor Network-based monitoring systems, PROBABILISTIC ENGINEERING MECHANICS, ISSN: 0266-8920, DOI: 10.1016/j.probengmech.2010.06.009, Vol.26, No.1, pp.67-75, 2011

Streszczenie:

In this paper we propose a new optimality measure for Wireless Sensor Network-based structural monitoring systems. First, we present the results of experiments showing the reasons for random effects in Wireless Sensor Network (WSN) functioning. Then, the formulas for calculating a network’s reputation measure are given. Finally, we conclude with arguments for the application of the reputation-based optimality measure in WSNs. We propose significantly new recommendations for the design and usage of WSNs.

Słowa kluczowe:

Optimal sensors’ location, Wireless Sensor Network, Reputation system, Structural monitoring

Afiliacje autorów:

Ciszkowski T.-other affiliation
Dunajewski I.-IPPT PAN
Kotulski Z.-IPPT PAN
30p.
5.Kucharzewski Ł., Kotulski Z., Mobile identity management system in heterogeneous wireless networks, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI 11, No.3, pp.141-153, 20115p.
6.Szałachowski P., Kotulski Z., Secure time information in the Internet Key Exchange Protocol, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI 11, No.3, pp.41-56, 20115p.
7.Oryńczak G., Kotulski Z., Non cryptographic methods for improving real time transmission security and integrity, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI 11, No.3, pp.71-86, 20115p.
8.Oryńczak G., Kotulski Z., Agent based infrastructure for real-time applications, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI XI, No.4, pp.33-47, 20115p.
9.Kukiełka P., Kotulski Z., Systemy wykrywania intruzów wykorzystujące metody sztucznej inteligencji, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIV, No.4, pp.114-121, 20114p.
10.Cabaj K., Kołaczek G., Konorski J., Pacyna P., Kotulski Z., Kucharzewski Ł., Szałachowski P., Architektura bezpieczeństwa Systemu IIP na poziomie wirtualizacji zasobów, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIV LXXX, pp.846-851, 20114p.
11.Rusinek D., Księżopolski B., Kotulski Z., Wpływ czynników komunikacyjnych na usługę dostępności w bezprzewodowych sieciach sensorycznych czasu rzeczywistego, STUDIA INFORMATICA, ISSN: 0208-7286, Vol.32, No.3A(98), pp.187-198, 20114p.
12.Oryńczak G., Kotulski Z., Agent-based VoIP application with reputation mechanisms, Advances in Electronics and Telecommunications, ISSN: 2081-8580, Vol.2, No.3, pp.88-92, 2011
13.Szałachowski P., Księżopolski B., Kotulski Z., CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks, INFORMATION PROCESSING LETTERS, ISSN: 0020-0190, DOI: 10.1016/j.ipl.2010.01.004, Vol.110, No.7, pp.247-251, 2010

Streszczenie:

Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of these approaches in the terms of efficiency of nodes in WSN are presented.

Słowa kluczowe:

Wireless sensor network, Cryptographic protocols, Block cipher modes, Sensor's security, Utilization efficiency

Afiliacje autorów:

Szałachowski P.-other affiliation
Księżopolski B.-other affiliation
Kotulski Z.-IPPT PAN
20p.
14.Polak L., Kotulski Z., Sending Hidden Data Through www Pages: Detection and Prevention, ENGINEERING TRANSACTIONS (ROZPRAWY INŻYNIERSKIE), ISSN: 0867-888X, Vol.58, No.1–2, pp.75-89, 20106p.
15.Kotulski Z., Kucharzewski Ł., Margasiński I., Bezpieczeństwo w sieciach telekomunikacyjnych, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIII LXXIX, No.4, pp.137-138, 20106p.
16.Kucharzewski Ł., Kotulski Z., Mobilne sieci przyszłości-architektura i bezpieczeństwo WiMAX i LTE, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIII LXXIX, pp.919-928, 20106p.
17.Kotlarz P., Kotulski Z., Neuronowy układ dec2bin perspektywy implementacji w języku Erlang, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIII LXXIX, pp.1115-1123, 20106p.
18.Kucharzewski Ł., Kotulski Z., WiMAX Networks - architecture and data security, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, DOI: 10.2478/v10065-011-0022-7, Vol.X, No.2, pp.177-185, 20106p.
19.Księżopolski B., Kotulski Z., Middleware non-repudiation service for the data warehouse, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, DOI: 10.2478/v10065-010-0043-7, Vol.AI X, No.1, pp.131-144, 20106p.
20.Kukiełka P., Kotulski Z., Analysis of neural networks usage for detection of a new attack in IDS, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI X, No.1, pp.51-59, 20106p.
21.Jastrzębski K., Kotulski Z., On improved image encryption scheme based on chaotic map lattices, ENGINEERING TRANSACTIONS (ROZPRAWY INŻYNIERSKIE), ISSN: 0867-888X, Vol.57, No.2, pp.89-104, 20096p.
22.Dunajewski I., Kotulski Z., Optimal wireless sensors` location for monitoring of structures in randomly disturbed environment, Proceedings in Applied Mathematics and Mechanics, ISSN: 1617-7061, DOI: 10.1002/pamm.200910251, Vol.9, pp.557-558, 2009

Streszczenie:

In the paper we present the specific conditions that appear in structures' monitoring by means of Wireless Sensor Networks (WSN). First, we introduce the problem of optimal sensors' location for structures monitoring and its specific constraints if one uses WSN. We formulate the conditions that must be taken into account during optimization. Then, we give an example of temperature measurements and formulate the procedure that leads to finding optimal wireless sensors locations. Finally, we present the experimental observations of wireless sensors in the network that strongly affect on the temperature estimation on a basis of the collected measurements. We conclude with remarks concerning WSN practical design for permanent structures' monitoring to obtain exact and reliable results.

Afiliacje autorów:

Dunajewski I.-IPPT PAN
Kotulski Z.-IPPT PAN
23.Majkowski P., Wojciechowski T., Wojtyński M., Kotulski Z., Rawski M., Analiza możliwości sprzętowej kryptoanalizy szyfrów opartych na krzywych eliptycznych, POMIARY AUTOMATYKA KONTROLA, ISSN: 0032-4140, Vol.54, No.8, pp.536-539, 2008
24.Kotlarz P., Kotulski Z., Neuronowa realizacja nieliniowych przekształceń szyfrujących, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXI, pp.1293-1303, 2008
25.Księżopolski B., Kotulski Z., Adaptable security mechanism for dynamic environments, COMPUTERS AND SECURITY, ISSN: 0167-4048, DOI: 10.1016/j.cose.2006.11.002, Vol.26, No.3, pp.246-255, 2007

Streszczenie:

Electronic services in dynamic environment (e.g. e-government, e-banking, e-commerce, etc.), meet many different barriers reducing their efficient applicability. One of them is the requirement of information security when it is transmitted, transformed, and stored in an electronic service. It is possible to provide the appropriate level of security by applying the present-day information technology. However, the level of protection of information is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of the whole system, the excessive protection decreases its reliability and availability and, as a result, its global security. In this paper we present a mechanism of adaptable security for, digital information transmission systems (being usually the crucial part of e-service). It makes it possible to guarantee the adequate level of protection for actual level of threats dynamically changing in the environment. In our model the basic element of the security is the Public Key Infrastructure (PKI) is enriched with specific cryptographic modules.

Słowa kluczowe:

Network security, Information security, Cryptographic protocol, Cryptography, Risk management, Scalable security

Afiliacje autorów:

Księżopolski B.-other affiliation
Kotulski Z.-IPPT PAN
26.Kulesza K., Kotulski Z., On ASGS framework: general requirements and an example of implementation, Journal of Zhejiang University-SCIENCE A, ISSN: 1673-565X, DOI: 10.1631/jzus.2007.A0511, Vol.8, No.4, pp.511-521, 2007

Streszczenie:

In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from knowing the secret. The Basic Property Conjecture (BPC) forms the base of the framework. Due to the level of abstraction, results are portable into the realm of quantum computing.

Two situations are discussed. First concerns simultaneous generation and sharing of the random, prior nonexistent secret. Such a secret remains unknown until it is reconstructed. Next, we propose the framework for automatic sharing of a known secret. In this case the Dealer does not know the secret and the secret Owner does not know the shares. We present opportunities for joining ASGS with other extended capabilities, with special emphasis on PVSS and pre-positioned secret sharing. Finally, we illustrate framework with practical implementation.

Słowa kluczowe:

Secret sharing, Security protocols, Dependable systems, Authentication management

Afiliacje autorów:

Kulesza K.-IPPT PAN
Kotulski Z.-IPPT PAN
27.Mazurczyk W., Kotulski Z., Lightweight security mechanism for PSTN-IP telephony convergence, IJCSNS International Journal of Computer Science and Network Security, ISSN: 1738-7906, Vol.7, No.5, pp.35-41, 2007
28.Zwierko A., Kotulski Z., Integrity of mobile agents: a new approach, International Journal of Network Security, ISSN: 1816-3548, Vol.4, No.2, pp.201-211, 2007

Streszczenie:

The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and the simplest mechanisms concentrate more on integrity of the code itself and on the detection of unauthorized manipulation. The newer solutions not only secure the compiled program, but also the data, that can be gathered during its journey and even the execution state. Some other approaches base on prevention rather than detection. This paper describes a new idea of securing mobile agents. The presented method protects all: the code, the data and the execution state. The proposal is based on a zero-knowledge proof system and a secure secret sharing scheme, two powerful cryptographic primitives. The paper also includes security analysis of the new method and comparison to currently most widespread solutions.

Słowa kluczowe:

Agent systems, cryptographic protocols, integrity, mobile code

Afiliacje autorów:

Zwierko A.-other affiliation
Kotulski Z.-IPPT PAN
29.Kotulski Z., Szczepiński W., On a model for prediction of the movements of a crowd in narrow exits, ENGINEERING TRANSACTIONS (ROZPRAWY INŻYNIERSKIE), ISSN: 0867-888X, Vol.53, No.4, pp.347-361, 2005
30.Szczepański J., Kotulski Z., Pseudorandom Number Generators Based on Chaotic Dynamical Systems, Open Systems & Information Dynamics, ISSN: 1230-1612, DOI: 10.1023/A:1011950531970, Vol.8, No.2, pp.137-146, 2001

Streszczenie:

Pseudorandom number generators are used in many areas of contemporary technology such as modern communication systems and engineering applications. In recent years a new approach to secure transmission of information based on the application of the theory of chaotic dynamical systems has been developed. In this paper we present a method of generating pseudorandom numbers applying discrete chaotic dynamical systems. The idea of construction of chaotic pseudorandom number generators (CPRNG) intrinsically exploits the property of extreme sensitivity of trajectories to small changes of initial conditions, since the generated bits are associated with trajectories in an appropriate way. To ensure good statistical properties of the CPRBG (which determine its quality) we assume that the dynamical systems used are also ergodic or preferably mixing. Finally, since chaotic systems often appear in realistic physical situations, we suggest a physical model of CPRNG.

Afiliacje autorów:

Szczepański J.-IPPT PAN
Kotulski Z.-IPPT PAN
31.Kotulski Z., Szczepański J., Górski K., Paszkiewicz A., Zugaj A., Application of discrete chaotic dynamical systems in cryptography - DCC method, International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, ISSN: 0218-1274, DOI: 10.1142/S0218127499000778, Vol.9, No.6, pp.1121-1135, 1999

Streszczenie:

In the paper we propose a method of constructing cryptosystems, utilizing a nonpredictability property of discrete chaotic systems. We point out the requirements for such systems to ensure their security. The presented algorithms of encryption and decryption are based on multiple iteration of a certain dynamical chaotic system coming from gas dynamics models. A plaintext message specifies a part of the initial condition of the system (a particle's initial position). A secret key specifies the remaining part of initial condition (the particle's initial angle) as well as a sequence of discrete choices of the pre-images in the encryption procedure. We also discuss problems connected with the practical realization of such chaotic cryptosystems. Finally we demonstrate numerical experiments illustrating the basic properties of the proposed cryptosystem.

Afiliacje autorów:

Kotulski Z.-IPPT PAN
Szczepański J.-IPPT PAN
Górski K.-Politechnika Warszawska (PL)
Paszkiewicz A.-Politechnika Warszawska (PL)
Zugaj A.-Politechnika Warszawska (PL)
32.Kotulski Z., Analiza fal w stochastycznych ośrodkach warstwowych metodą macierzy przejścia (Praca habilitacyjna), Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.10, pp.1-198, 1993
33.Kotulski Z., Szczepiński W., On Two Methods of Determining the Ellipses and Ellipsoids of Positioning Accuracy of Robot Manipulators, Prace IPPT - IFTR Reports, ISSN: 2299-3657, DOI: 10.1007/BF00787907, No.15, pp.1-32, 1992

Streszczenie:

When analysing the problem of the positioning accuracy of robot manipulators it is important to know how far random deviations of the hand may be from the desired position if the joint positioning errors possess a normal distribution. Two methods of determining the ellipses and ellipsoids of probability concentration are compared. The first of them is based on the standard procedure of the probability calculus. The second approximate method consists in finding at first the polygon or polyhedron of the positioning accuracy, and then in finding the ellipse or ellipsoid with principal axes and second order moments coinciding with those of the polygon or polyhedron, respectively. Examples of application demonstrate that these two methods give very close results.

Afiliacje autorów:

Kotulski Z.-IPPT PAN
Szczepiński W.-IPPT PAN
34.Kotulski Z., On the Effective Reflection Properties of the Randomly Segmented Elastic Bar, Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.31, pp.1-43, 1992
35.Kotulski Z., Sobczyk K., Non-local Description of Pollution Transport in Random Medium, Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.34, pp.1-22, 1992
36.Kotulski Z., Equations for the characteristic Functional and Moments of the Complex Stochastic Evolutions, Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.38, pp.1-20, 1988
37.Kotulski Z., Funkcjonały charakterystyczne stochastycznych procesów falowych (Praca doktorska), Prace IPPT - IFTR Reports, ISSN: 2299-3657, No.14, pp.1-166, 1984

Lista ostatnich monografii
1.
26
Kotulski Z., Szczepiński W., Error Analysis with Applications in Engineering, Series: Solid Mechanics and Its Applications, Springer, 169, pp.1-284, 2010
2.
77
Kotulski Z., Kowalczyk P., Sosnowski W., Selected topics of contemporary solid mechanics. Proceedings of the 36th Solid Mechanics Conference, Gdańsk, Poland, September 9–12, 2008, IPPT PAN (Warszawa), Kotulski Z.A., Kowalczyk P., Sosnowski W. (Red.), pp.1-442, 2008
3.
120
Kotulski Z., Nowicki A., Szczepiński W., Wprowadzenie do teorii fal naprężeń i deformacji w zastosowaniach technicznych i do diagnostyki ultradźwiękowej, BEL Studio (Warszawa), pp.1-271, 2008
Lista rozdziałów w ostatnich monografiach
1.
50
Szałachowski P., Kotulski Z., Księżopolski B., CN 2011, Communications in Computer and Information Science, rozdział: Secure position-based addressing scheme for WSN communication, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 160, pp.386-397, 2011
2.
39
Szałachowski P., Księżopolski B., Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: On authentication method impact upon data sampling delay in Wireless Sensor Networks, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.280-289, 2010
3.
37
Księżopolski B., Szałachowski P., Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: SPOT: Optimization tool for network adaptable security, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.269-279, 2010
4.
138
Księżopolski B., Kotulski Z., Szałachowski P., Computer networks, communications in computer and information science, rozdział: Approach to network security, Springer, Kwiecień A., Gaj P., Stera P. (Eds.), 39, pp.233-241, 2009
5.
230
Kotlarz P., Kotulski Z., Multimedia w biznesie i zarządzaniu, rozdział: Sieć S-P w implementacji neuronowej, Difin (Warszawa), Kiełtyk L. (Ed.), pp.490-497, 2009
6.
151
Ciszkowski T., Kotulski Z., Handbook of research on wireless security, rozdział: Secure routing with reputation in MANET, Idea Group Inc. (United States), Yan ZHANG, Jun ZHENG, Miao MA (Eds.), pp.449-460, 2008
7.
152
Kotulski Z., Zwierko A., Handbook of research on wireless security, rozdział: Security of mobile code, Idea Group Inc. (United States), Yan ZHANG, Jun ZHENG, Miao MA (Eds.), pp.28-43, 2008
8.
173
Kotulski Z., Zwierko A., Mobile computing: Concepts, methodologies, tools, and applications, rozdział: Security of mobile code, Idea Group Inc. (United States), Taniar D. (Ed.), pp.2583-2599, 2008
9.
177
Zwierko A., Kotulski Z., Next generation internet networks, 1st EuroNGI Conference on Next Generation Internet Networks - Traffic Engineering /NGI 2005 / Rome, April 18-20, rozdział: A new protocol for group authentication providing partial anonymity, IEEE Press, pp.356-363, 2005

Prace konferencyjne
1.Księżopolski B., Kotulski Z., Szałachowski P., On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems, 1st European Teletraffic Seminar, 2011-02-14/02-16, Poznań (PL), pp.195-202, 2011

Streszczenie:

Cryptographic protocols are secure due to application of security services. The security services applied for their protection can be classified into the three groups: hard, soft and extended. Among the extended ones, we can point out to the availability of the goal of the security protocol, which guarantees that protocols aims are achieved. In the real-time protocols as the video conference, the goal is both secure data transmission and good signal quality. When one of the goals is not ensured, the availability of the goal of the protocol is not guaranteed and the cryptographic protocol can not be realized. In this article we present the methodology of obtaining the balance between the quality of the signal in real-time systems and accomplishment of the required security services. Finally, the case study of video conference secured by VPN connections, is presented.

Afiliacje autorów:

Księżopolski B.-other affiliation
Kotulski Z.-IPPT PAN
Szałachowski P.-other affiliation
2.Oryńczak G., Kotulski Z., Agent-based VoIP application with reputation mechanisms, 1st European Teletraffic Seminar, 2011-02-14/02-16, Poznań (PL), pp.203-207, 2011
3.Piekarski A., Kotulski Z., Społeczne uwarunkowania dostępu do usług i sieci następnych generacji we wschodniej Polsce, Konferencja Usługi i sieci teleinformatyczne następnej generacji - aspekty techniczne, aplikacyjne i rynkowe, 2010-11-23/11-24, Warszawa (PL), pp.1-7, 2010
4.Zwierko A., Kotulski Z., A light-weight e-voting system with distributed trust, Electronic Notes in Theoretical Computer Science, ISSN: 1571-0661, DOI: 10.1016/j.entcs.2006.12.004, Vol.168, pp.109-126, 2007

Streszczenie:

A new agent-based scheme for secure electronic voting is proposed in the paper. The scheme is universal and can be realized in a network of stationary and mobile electronic devices. The proposed mechanism supports the implementation of a user interface simulating traditional election cards, semi-mechanical voting devices or utilization purely electronic voting booths. The security mechanisms applied in the system are based on verified cryptographic primitives: the secure secret sharing scheme and Merkle's puzzles. Due to pre-computations during the generation of agent, the voter need not to do computations. The proposed distributed trust architecture makes the crucial stage of sending votes elastic, reliable, and effective.

Słowa kluczowe:

electronic elections, secret sharing scheme, Merkle's puzzles, mixnets, mobile agent security, distributed trust

Afiliacje autorów:

Zwierko A.-other affiliation
Kotulski Z.-IPPT PAN
5.Mazurczyk W., Kotulski Z., New VoIP traffic security scheme with digital watermarking, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11875567_13, Vol.4166, pp.170-181, 2006

Streszczenie:

In this paper we propose a new, lightweight, no bandwidth consuming authentication and integrity scheme for VoIP service based on SIP as a signalling protocol. It is shared password mechanism and this solution exploits digital watermarking. Nowadays, there are many applications of this technique, such as solving copyright protection problems, but we propose to use it to secure the transmitted audio and signalling protocol that IP Telephony is based on simultaneously. This solution can be the potential answer to the problem VoIP faces today: finding a scalable and universal mechanism for securing VoIP traffic (voice and the signalling protocol messages) at the same time. It can greatly improve, if we combine it with existing security mechanisms, overall IP Telephony system’s security.

Afiliacje autorów:

Mazurczyk W.-other affiliation
Kotulski Z.-IPPT PAN
6.Kulesza K., Kotulski Z., On mobile agents resistant to traffic analysis, Electronic Notes in Theoretical Computer Science, ISSN: 1571-0661, DOI: 10.1016/j.entcs.2004.12.044, Vol.142, pp.181-193, 2006

Streszczenie:

This paper will concern itself with a formulation of a traffic analysis problem for mobile agents. It is an interesting theoretical problem as well as a critical feature when using agents on a massive scale in decision making systems. The decision making systems are applied to demanding and complex environments such as stock markets. The mobile agents used are natural targets for attacks because they provide information for decision making. The resulting information can have a value measured in millions of dollars and information of such a high value attracts potential attacks. An efficient way to attack the user of decision making systems is to learn her strategy and respond in kind. In this respect even passive observation of agents can provide useful data, namely what information they are gathering. A common first defense is to provide anonymity for mobile agents. However, what happens when anonymity is gone? What information then becomes available and what steps will the user take? Yet, the problem has not been previously formulated for such a framework. We formulate it in terms of various factors used for traffic analysis. These factors originate from different side channels that provide information on the operating agents. At the end we state a paradox, which links an excessive use of countermeasures against traffic analysis with weakening system security.

Słowa kluczowe:

Mobile agents security, security protocols, traffic analysis, side channel attacks

Afiliacje autorów:

Kulesza K.-IPPT PAN
Kotulski Z.-IPPT PAN
7.Kotlarz P., Kotulski Z., On application of neural networks for S-boxes design, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11495772_38, Vol.3528, pp.243-248, 2005
8.Zwierko A., Kotulski Z., Mobile agents: preserving privacy and anonymity, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11558637_25, Vol.3490, pp.246-258, 2005
9.Kulesza K., Kotulski Z., Addressing new challenges by building security protocols around graphs, LECTURE NOTES IN COMPUTER SCIENCE, ISSN: 0302-9743, DOI: 10.1007/11542322_36, Vol.3364, pp.301-306, 2005
10.Wierzbicki A., Zwierko A., Kotulski Z., Authentication with controlled anonymity in P2P systems, WCU-UI-2005, World Congress on Ultrasonics - Ultrasonics International 2005, 2005-08-29/09-01, Pekin (CN), DOI: 10.1109/PDCAT.2005.95, pp.871-875, 2005