2009
Díaz-Sánchez, D., A. Marín, F. Almenárez, and A. Cortés. "Sharing conditional access
modules through the home network for Pay TV Access." Journal/Magazine:
Transactions
on Consummer Electronics (Accepted, Pending to be published)
(2009).
Abstract
:
In this article we present a system for sharing a Conditional
Access Module among different visualization devices. Current pay-TV systems require
having conditional access modules and smart cards replicated at every visualization
device willing to access Pay-TV contents. In this article, we show how a home gateway,
capable of securely distribute decryption keys to home visualization device, an
inexpensive descrambler, and a home network, enable a flexible solution to access
Pay-TV.
2008
Cortés-Martín, A., C. García-Rubio, C. Campo, A. Marín López, F. Almenárez Mendoza,
and D. Díaz Sánchez. "Decoupling path failure detection from congestion control
to improve SCTP failovers." Journal/Magazine: IEEE COMMUN LETT. Vol:12. Issue:
11 (2008): Pages:858–860.
Abstract
:
SCTP handover is too slow to be useful as a mobility
solution for most applications. With quicker handovers, SCTP will be an interesting
solution to mobility. SCTP uses retransmissions as probes for path failure detection.
Congestion control forces slow paced retransmissions but quick failovers need fast
paced probes. Our solution is to stop using retransmissions as probes. Instead,
we propose active path monitoring using unreliable heartbeats. Applications can
tune this algorithm to meet their own requirements. We show data from a simple experiment
in a real environment.
Keywords: Computer network reliability; congestion control; transport
protocols
Díaz-Sánchez, D., A. Marín, F. Almenarez, C. Campo, A. Cortés, and C. García-Rubio.
"Trust Negotiation Protocol Support for Secure Mobile Network Service Deployment."
Wireless and Mobile Networking. Ed. Springer Boston. Vol. 284/2008., 2008.
271–282.
Abstract
:
User-centric services might enforce requirements difficult
to be endorsed by visited networks unless tight coupled trust relations are previously
established among providers. Maintaining those fixed trust relations is costly and
unmanageable if the number of providers increases. Moreover, it requires providers
to use a common security model, credentials, policies…Trust Negotiation can be the
solution to this problem since allows to negotiate gradually a security state enabling
multiple factor authentication and authorization even for “strangers” by exchanging
various credentials. However, there are still two problems to solve, the first one
is the delay introduced by the trust negotiation messages if used as bootstrapping
in every interaction; the second one is the lack of protocol support. In this article
we address those problems by presenting an extension to TLS that enables trust negotiation
and credential issuing (to speed-up following interactions) over a secure channel.
Diaz-Sanchez, D., A. Marin, F. Almenarez, and A. Cortes. "DVB-H Key Management System
for UMTS Capable Devices.", 2008. 1–2.
Abstract
:
In this paper we present a system to enable pay-per-
view services in mobile handhelds which takes benefits of both DVB-H and UMTS networks.
DVB-H infrastructure provides a more appropriate content delivery framework that
UMTS. Despite this fact, UMTS can play an important role for charging and key distribution
for pay-per-view applications by means of the provider SIM smart card.
Keywords: 3G mobile communication, cryptography, digital video
broadcasting, telecommunication network managementDVB-H key management system, SIM
smart card, UMTS capable devices, content delivery framework, mobile handhelds,
pay-per-view services
2007
Díaz Sánchez, D., A. Marín López, F. Almenárez Mendoza, C. Campo Vázquez, and C.
García-Rubio. "Context awareness in network selection for dynamic environments."
Journal/Magazine: Telecommunication Systems. Vol:36. Issue: 1 (2007): Pages:49–60.
Abstract
:
Abstract Mobile devices of new generation are able to
connect to multiple networks and to constitute new infrastructureless networks.
These dynamic environments require new security paradigms and automatic mechanisms
to minimize user intervention. Our goal is the definition of a new concept of distance
that considers the current domain constraints and the user preferences. This paper
addresses some of the problems of these complex environments by using Multidimensional
Scaling (MDS) techniques. We also propose collaborative mechanisms for automatic
environment marking. Based on these ideas we have developed Pervasive Interaction
Manager (PervsIM), a decision mechanism that selects the most appropriate network
or peer to interact with. Besides we have defined an embedded access control module
which ensures that PervsIM decisions are followed by all applications. Furthermore,
several simulation results and implementation details outline how these results
can be incorporated in today’s mobile devices.
Keywords: Context-awareness;Network selection;Mobile devices;Pervasive
computing
Díaz-Sánchez, D., A. Marín, and F. Almenárez. "Enhancing access control for mobile
devices with an agnostic trust negotiation decision engine." Personal Wireless Communications.
Ed. Springer Boston., 2007. 304–315.
Abstract
:
Dynamic open environments demand trust negotiation systems
for unknown entities willing to communicate. A security context has to be negotiated
gradually in a fair peer to peer basis depending on the security level demanded
by the application. Trust negotiation engines are driven by decision engines that
lack of flexibility: depend on the implementation, policies languages or credentials
types to be used. In this paper we present an agnostic engine able to combine all
that information despite its origin or language allowing to select policies or requirements,
credentials and resources to disclose, according to user preferences and context
using iterative weighted Multidimensional Scaling to assist a mobile device during
a trust negotiation.
Keywords: trust negotiation;access control;flexible
Marín López, A., D. Díaz-Sánchez, F. Almenárez, C. García-Rubio, and C. Campo. "Smart
card-based agents for fair non-repudiation." Journal/Magazine: Computer Networks.
Vol:51. Issue: 9 (2007): Pages:2288–2298.
Abstract
:
Non-repudiation protocols are of great importance for
electronic interactions. Different protocols have been proposed in this field, progressively
relaxing the requirements on the computing power of both parties, and on the load
and involvement of a trusted third party (TTP). Besides, there is a need to provide
mobile users with a protocol adequate for ad hoc scenarios, where only unreliable
channels can be guaranteed, and where the CA may not be reachable. In this paper
we propose a new version of the fair non-repudiation protocol proposed by Gürgens
et al. in [Sigrid Gürgens, Carsten Rudolph, Holger Vogt, On the security of fair
non-repudiation protocols, in: Colin Boyd, Wenbo Mao (Eds.), ISC, Lecture Notes
in Computer Science, vol. 2851, Springer, 2003, pp. 193-207]. We show unfair scenarios
that can appear if one party controls the communication among the TTP and the other
party. We introduce notary agents, which play the TTP role, and run our fair non-repudiation
protocol. Notary agents execute inside the smart card, and sign the protocol messages
with the user’s private key on his behalf. Our approach enables the protocol to
run on unreliable channels, disconnected from the CA.
Keywords: Fairness; Non-repudiation protocol; Smart card; Unreliable
channels; Electronic transactions; Ad hoc mode
Schaefer R., W. Mueller, A. Marín López, and D. Díaz Sánchez.
Using Smart Cards for
Secure and Device Independent User Interfaces
. Singapore, 10-12 September
2007, 2007.
Abstract
:
Smart Cards are becoming a ubiquitous means for securing
a wide range of interactive applications. However in many cases its use is limited
for authentication purposes only. In this paper we extend the use of smart cards
for carrying abstract user interface descriptions which can be rendered on different
and potentially remote clients that in addition can support varying interaction
modalities. This adds on the one hand to the security since a backend application
cannot be used without the UI description, and on the other hand to the versatility
of applications, since all devices with a respective renderer for certain modalities
can be utilized.
Keywords: Smart Card; Abstract User Interface; Device Independence
Schaefer R., W. Mueller, A. Marín López, and D. Díaz Sánchez. "Device Independent
User Interfaces for Smart Cards."
9th International Conference on Human Computer
Interaction with Mobile Devices and Services (MobileHCI 2007)
. Singapore,
9-12 September 2007, 2007.
Abstract
:
Smart Cards are becoming a ubiquitous means for securing
a wide range of interactive applications. However in many cases its use is limited
for authentication purposes only. In this paper we extend the use of smart cards
for carrying abstract user interface descriptions which can be rendered on different
and potentially remote clients that in addition can support different interaction
modalities. This adds on the one hand to the security since a backend application
cannot be used without the UI description, and on the other hand to the versatility
of applications, since all devices with a respective renderer for certain modalities
can be utilized.
|