The emergence of smart environments where computing devices are embedded pervasively in the physical
world has made possible many interesting applications and triggered several new research areas. Mobile ad
hoc networks (MANETs), sensor networks, and RFID systems are all examples of such pervasive systems,
operating with constrained resources, that intelligently configure and connect themselves. Operating on an
open medium and lacking fixed infrastructure, such networks suffer from critical security vulnerabilities,
for which few satisfactory solutions currently exist, particularly with respect to availability and denial-ofservice
attacks. In addition, much of the extant knowledge in network security and cryptography cannot be
readily transfered to the newer settings, which involve weaker devices, and less structured and less redundant
networks. For these reasons, traditional security approaches, in particular regarding provision of availability,
are often inappropriate for the context of ubiquitous computing.
In this project we investigate the security of pervasive systems with focus on availability
issues in the presence of Byzantine faults. Our goal is to formulate rigorous simulation frameworks for
analyzing security objectives; and more importantly to design novel mechanisms and algorithms that achieve
proven availability, uninterrupted services, high efficiency, and low overhead in such systems. Whenever
possible, we favor approaches that integrate security into existing protocols that are well established in the
literature. Our focus will be on securing MANET and RFID applications.
Publications
- Mike Burmester. `Localization privacy'. Lecture Notes in Computer Science #6805, Festschrift Jean-Jacques Quisquater,
Springer, 2011.
- Mike Burmester. 'His Late Master's Voice: barking for location privacy'. Proceedings, 19th International
Workshop on Security Protocols, Cambridge, England, March 28-30, 2011 (WSP 2011).
Lecture Notes in Computer Science #7114, Springer, 2011.
- Mike Burmester and Jorge Munilla. `Flyweight authentication with forward and backward security'.
ACM Transactions on Information and System Security, 14(1): 11 (2011).
- Mike Burmester and Jorge Munilla. `Flyweight authentication with forward and backward security'.
WISP Summit 2009, First workshop on Wirelessly Powered Sensor Networks and
Computational RFID, November 3, 2009, Berkeley, California.
- Mike Burmester, Breno de Medeiros, Jorge Munilla, and Alberto Peinado.
`Secure EPC Gen2 compliant Radio Frequency Identification'. 8th International Conference on AD-HOC
Networks
& Wireless, ADHOC-NOW 2009, Murcia, Spain, 22-25 September, 2009.
- Mike Burmester and Jorge Munilla. `A Flyweight RFID Authentication Protocol'.
Workshop on RFID Security 2009, RFIDSec2009, Leuven, Belgium, June 30 - July 2, 2009.
- Mike Burmester, Tri van Le, Breno de Medeiros and Gene Tsudik.
`Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols'.
ACM Transactions on Information and System Security (TISSEC) (2009).
- Mike Burmester, Breno de Medeiros and Rossana Motta.
`Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries'.
IJACT 1(2): 79-90 (2008).
- Mike Burmester, Breno de Medeiros Rossana Motta. `Provably Secure Grouping-proofs for
RFID tags'. International Conference, 8th Smart Card Research and Advanced Applications
(CARDIS 2008), IFIP WG 8.8/11.2, September 8-11, 2008. Also, Cryptology ePrint Archive,
2007/407.
- Mike Burmester, Breno de Medeiros. `The Security of EPCGen2 Anonymous compliant RFID
Protocols'. International Conference on Applied Cryptography and Network Security, ACNS
2008, Columbia University, New York, June 2008.
- Mike Burmester, Breno de Medeiros Rossana Motta. `Robust Anonymous RFID Authentication
with Constant Key Lookup'. ACM Symposium on Information, Computer and Communications
Security, ASIACCS 2008, Tokyo, March 2008. Also, Cryptology ePrint Archive, 2007/402.
- Mike Burmester and Breno de Medeiros. `Persistent Security for RFID'. Conference on RFID
Security, RFIDSec07, Malaga, July, 2007.
- Mike Burmester and Breno de Medeiros. `RFID Security, Countermeasures and Challenges'.
5th RFID Academic Convocation, The RFID Journal Conference, Orlando, April 30 - May 2,
2007.
- Tri van Le, Mike Burmester Breno de Medeiros. `Universally Composable and Forward Secure
RFID Authentication and Key exchange'. ACM Symposium on Information, Computer and
Communications Security, ASIACCS 2007, Singapore, March 2007.
- Mike Burmester, Tri van Le and Breno de Medeiros. `Provably Secure Ubiquitous Systems:
Universally Composable RFID Authentication Protocols'. 2nd Int. Conference on Security
and Privacy in Communication Networks (SecureComm), Baltimore, Aug 2006.
- Mike Burmester, Tri van Le, and Breno de Medeiros. `Towards provable security for
ubiquitous applications'. Proc. 11th Australasian Conf. on Information Security and
Privacy (ACISP 2006), Melbourne, Australia, July 2006, Lecture Notes in Computer Science
#4058, Springer, 2006, pp. 295-312.
- Christy Chatmon, Tri van Le and Mike Burmester. `Secure Anonymous RFID Protocols'. FSU
Technical Report TR-060112.
|
|
|