Partner: B. Księżopolski


Recent publications
1.Rusinek D., Księżopolski B., Kotulski Z., Wpływ czynników komunikacyjnych na usługę dostępności w bezprzewodowych sieciach sensorycznych czasu rzeczywistego, STUDIA INFORMATICA, ISSN: 0208-7286, Vol.32, No.3A(98), pp.187-198, 2011
2.Szałachowski P., Księżopolski B., Kotulski Z., CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks, INFORMATION PROCESSING LETTERS, ISSN: 0020-0190, DOI: 10.1016/j.ipl.2010.01.004, Vol.110, No.7, pp.247-251, 2010
Abstract:

Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of these approaches in the terms of efficiency of nodes in WSN are presented.

Keywords:

Wireless sensor network, Cryptographic protocols, Block cipher modes, Sensor's security, Utilization efficiency

Affiliations:
Szałachowski P.-other affiliation
Księżopolski B.-other affiliation
Kotulski Z.-IPPT PAN
3.Księżopolski B., Kotulski Z., Middleware non-repudiation service for the data warehouse, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, DOI: 10.2478/v10065-010-0043-7, Vol.AI X, No.1, pp.131-144, 2010
4.Księżopolski B., Kotulski Z., Adaptable security mechanism for dynamic environments, COMPUTERS AND SECURITY, ISSN: 0167-4048, DOI: 10.1016/j.cose.2006.11.002, Vol.26, No.3, pp.246-255, 2007
Abstract:

Electronic services in dynamic environment (e.g. e-government, e-banking, e-commerce, etc.), meet many different barriers reducing their efficient applicability. One of them is the requirement of information security when it is transmitted, transformed, and stored in an electronic service. It is possible to provide the appropriate level of security by applying the present-day information technology. However, the level of protection of information is often much higher than it is necessary to meet potential threats. Since the level of security strongly affects the performance of the whole system, the excessive protection decreases its reliability and availability and, as a result, its global security. In this paper we present a mechanism of adaptable security for, digital information transmission systems (being usually the crucial part of e-service). It makes it possible to guarantee the adequate level of protection for actual level of threats dynamically changing in the environment. In our model the basic element of the security is the Public Key Infrastructure (PKI) is enriched with specific cryptographic modules.

Keywords:

Network security, Information security, Cryptographic protocol, Cryptography, Risk management, Scalable security

Affiliations:
Księżopolski B.-other affiliation
Kotulski Z.-IPPT PAN

List of chapters in recent monographs
1.
50
Szałachowski P., Kotulski Z., Księżopolski B., CN 2011, Communications in Computer and Information Science, rozdział: Secure position-based addressing scheme for WSN communication, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 160, pp.386-397, 2011
2.
39
Szałachowski P., Księżopolski B., Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: On authentication method impact upon data sampling delay in Wireless Sensor Networks, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.280-289, 2010
3.
37
Księżopolski B., Szałachowski P., Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: SPOT: Optimization tool for network adaptable security, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.269-279, 2010
4.
138
Księżopolski B., Kotulski Z., Szałachowski P., Computer networks, communications in computer and information science, rozdział: Approach to network security, Springer, Kwiecień A., Gaj P., Stera P. (Eds.), 39, pp.233-241, 2009

Conference papers
1.Księżopolski B., Kotulski Z., Szałachowski P., On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems, 1st European Teletraffic Seminar, 2011-02-14/02-16, Poznań (PL), pp.195-202, 2011
Abstract:

Cryptographic protocols are secure due to application of security services. The security services applied for their protection can be classified into the three groups: hard, soft and extended. Among the extended ones, we can point out to the availability of the goal of the security protocol, which guarantees that protocols aims are achieved. In the real-time protocols as the video conference, the goal is both secure data transmission and good signal quality. When one of the goals is not ensured, the availability of the goal of the protocol is not guaranteed and the cryptographic protocol can not be realized. In this article we present the methodology of obtaining the balance between the quality of the signal in real-time systems and accomplishment of the required security services. Finally, the case study of video conference secured by VPN connections, is presented.

Affiliations:
Księżopolski B.-other affiliation
Kotulski Z.-IPPT PAN
Szałachowski P.-other affiliation