Partner: P. Szałachowski |
Recent publications
1. | Szałachowski P.♦, Kotulski Z., One-Time Broadcast Encryption Schemes in Distributed Sensor Networks, International Journal of Distributed Sensor Networks, ISSN: 1550-1329, DOI: 10.1155/2012/536718, pp.1-9, 2012 Abstract: Broadcasting is a message-transferring method characteristic for majority of sensor networks. Broadcast encryption (BE) is broadcasting encrypted messages in such a way that only legitimate nodes of a network can decrypt them. It has many potential applications in distributed wireless sensor networks (WSNs) but perfect deploying of that method is very difficult. This is because of a WSN is a very dynamic network which includes nodes with limited computational, storage, and communication capabilities. Furthermore, an attacker in this environment is powerful. He can eavesdrop, modify, and inject messages or even capture a large number of nodes, so the solutions must be both secure and efficient. This paper describes several BE schemes from the point of view of WSNs. We present in details the schemes called onetime, and we show how these methods can be applied in distributed sensor networks. We mainly focus on data origin authentication and rekeying processes, crucial for security in such a hostile environment. An analysis and evaluations of proposed schemes are also provided. Affiliations:
| ||||||||||
2. | Szałachowski P.♦, Kotulski Z., Secure time information in the Internet Key Exchange Protocol, ANNALES UNIVERSITATIS MARIAE CURIE-SKŁODOWSKA, SECTIO AI: INFORMATICA, ISSN: 1732-1360, Vol.AI 11, No.3, pp.41-56, 2011 | ||||||||||
3. | Cabaj K.♦, Kołaczek G.♦, Konorski J.♦, Pacyna P.♦, Kotulski Z.♦, Kucharzewski Ł.♦, Szałachowski P.♦, Architektura bezpieczeństwa Systemu IIP na poziomie wirtualizacji zasobów, PRZEGLĄD TELEKOMUNIKACYJNY - WIADOMOŚCI TELEKOMUNIKACYJNE, ISSN: 1230-3496, Vol.LXXXIV LXXX, pp.846-851, 2011 | ||||||||||
4. | Szałachowski P.♦, Księżopolski B.♦, Kotulski Z., CMAC, CCM and GCM/GMAC: Advanced modes of operation of symmetric block ciphers in wireless sensor networks, INFORMATION PROCESSING LETTERS, ISSN: 0020-0190, DOI: 10.1016/j.ipl.2010.01.004, Vol.110, No.7, pp.247-251, 2010 Abstract: Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of these approaches in the terms of efficiency of nodes in WSN are presented. Keywords:Wireless sensor network, Cryptographic protocols, Block cipher modes, Sensor's security, Utilization efficiency Affiliations:
|
List of chapters in recent monographs
1. 50 | Szałachowski P.♦, Kotulski Z., Księżopolski B.♦, CN 2011, Communications in Computer and Information Science, rozdział: Secure position-based addressing scheme for WSN communication, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 160, pp.386-397, 2011 | |
2. 39 | Szałachowski P.♦, Księżopolski B.♦, Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: On authentication method impact upon data sampling delay in Wireless Sensor Networks, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.280-289, 2010 | |
3. 37 | Księżopolski B.♦, Szałachowski P.♦, Kotulski Z., CN 2010, Communications in Computer and Information Science, rozdział: SPOT: Optimization tool for network adaptable security, Springer-Verlag, Berlin Heidelberg, Kwiecień A., Gaj P., Stera P. (Eds.), 79, pp.269-279, 2010 | |
4. 138 | Księżopolski B.♦, Kotulski Z., Szałachowski P.♦, Computer networks, communications in computer and information science, rozdział: Approach to network security, Springer, Kwiecień A., Gaj P., Stera P. (Eds.), 39, pp.233-241, 2009 |
Conference papers
1. | Księżopolski B.♦, Kotulski Z., Szałachowski P.♦, On QoP method for ensuring availability of the goal of cryptographic protocols in the real-time systems, 1st European Teletraffic Seminar, 2011-02-14/02-16, Poznań (PL), pp.195-202, 2011 Abstract: Cryptographic protocols are secure due to application of security services. The security services applied for their protection can be classified into the three groups: hard, soft and extended. Among the extended ones, we can point out to the availability of the goal of the security protocol, which guarantees that protocols aims are achieved. In the real-time protocols as the video conference, the goal is both secure data transmission and good signal quality. When one of the goals is not ensured, the availability of the goal of the protocol is not guaranteed and the cryptographic protocol can not be realized. In this article we present the methodology of obtaining the balance between the quality of the signal in real-time systems and accomplishment of the required security services. Finally, the case study of video conference secured by VPN connections, is presented. Affiliations:
|