Network Security and Metrology: A Survey

Without the science of metrology, we lost the way of any research field. The science of metrology affects the science of network security in many sides. You have to measure in network security as you have to do in the other fields. You have to test and analyze and detect as in the other research areas. You must work hard to reach the standards level in network security as you make your best efforts to reach them in other science branches. From the other side, network security has a great effect on developing the science of metrology. In the present paper, many trends are introduced including the two viewpoints. The necessary requirements to research and development in network security and metrology are proposed. Finally, we declared how different metrology labs around the world are interested in this field.

[1]  Thomas Newe,et al.  Formal verification logic for hybrid security protocols , 2003, Comput. Syst. Sci. Eng..

[2]  Deepinder P. Sidhu Authentication Protocols for Computer Networks: I , 1986, Comput. Networks.

[3]  José G. Delgado-Frias,et al.  FPGA schemes for minimizing the power-throughput trade-off in executing the Advanced Encryption Standard algorithm , 2010, J. Syst. Archit..

[4]  Reham Abdellatif Abouhogail New multicast authentication protocol for entrusted members using advanced encryption standard , 2011 .

[5]  Simon S. Lamt A Semantic Model for Authentication , 1993 .

[6]  M. T. Mohammed,et al.  Confidentiality enhancement of Secure Real Time Transport Protocol , 2012, 2012 8th International Computer Engineering Conference (ICENCO).

[7]  William Stallings,et al.  Cryptography and network security , 1998 .

[8]  Bruno Blanchet,et al.  Automatic verification of correspondences for security protocols , 2008, J. Comput. Secur..

[9]  Jonathan K. Millen,et al.  The Interrogator: Protocol Secuity Analysis , 1987, IEEE Transactions on Software Engineering.

[10]  Tian-Fu Lee,et al.  Enhancing the security of password authenticated key agreement protocols based on chaotic maps , 2015, Inf. Sci..

[11]  Peter H. Sydenham,et al.  Handbook of Measuring System Design , 2005 .

[12]  Christoph Ruland,et al.  Secure transfer of measurement data in open systems , 2006, Comput. Stand. Interfaces.

[13]  Véronique Cortier Verification of Security Protocols , 2009, VMCAI.

[14]  Reham Abdellatif Abouhogail,et al.  Security Assessment for Key Management in Mobile Ad Hoc Networks , 2014 .

[15]  Reijo Savola,et al.  Quality of security metrics and measurements , 2013, Comput. Secur..

[16]  Vijay Varadharajan Use of a formal description technique in the specification of authentication protocols , 1990 .

[17]  Harmandeep Singh,et al.  Effect of Black Hole Attack on AODV, OLSR and ZRP Protocol in MANETs , 2013 .

[18]  Peter Honeyman,et al.  Formal Methods for the Analysis of Authentication Protocols , 1993 .

[19]  M. M. Menon,et al.  Remote metrology, mapping, and motion sensing of plasma facing components using FM coherent laser radar , 2001 .

[20]  Reham Abdellatif Abouhogail Fast Handover with Privacy Preserving Authentication Protocol for Mobile WiMAX Networks , 2014 .

[21]  Anmin Fu,et al.  An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network , 2012, Comput. Secur..

[22]  Marc F. Desrosiers,et al.  e-Calibrations: Using the Internet to Deliver Calibration Services in Real Time at Lower Cost , 2002 .

[23]  Danny Dolev,et al.  On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).

[24]  Diomidis Spinellis,et al.  Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification , 1999, Comput. Commun..

[25]  Mohammed S. Gadelrab,et al.  Construction and remote calibration of an automated resistance measuring system , 2011 .

[26]  S. A. M. Makki,et al.  Accusation Resolution Using Security Metrology , 2006, WASA.

[27]  José Meseguer,et al.  A rewriting-based inference system for the NRL Protocol Analyzer and its meta-logical properties , 2006, Theor. Comput. Sci..

[28]  Reham Abdellatif Abouhogail,et al.  Performance Evaluation of Blackhole Attack on VANET's Routing Protocols , 2014 .

[29]  Siddarama R. Patil,et al.  A NOVEL APPROACH OF SIMULATION TOOLS FOR MOBILE AD -HOC NETWORKS , 2012 .

[30]  Jonathan K. Millen,et al.  CAPSL: Common Authentication Protocol Specification Language , 1996, NSPW '96.

[31]  Luu Anh Tuan,et al.  Modeling and Verifying Security Protocols Using PAT Approach , 2010, SSIRI 2010.

[32]  Li Gong,et al.  Reasoning about belief in cryptographic protocols , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[33]  Åsmund Sand,et al.  A Secure Approach to Distributed Internet-Enabled Metrology , 2007, IEEE Transactions on Instrumentation and Measurement.

[34]  Bernard Martinet,et al.  NetSEC: metrology-based application for network security , 2003, Future Gener. Comput. Syst..

[35]  Catherine A. Meadows,et al.  A system for the specification and analysis of key management protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[36]  C. Fraser,et al.  Monitoring the thermal deformation of steel beams via vision metrology , 2000 .

[37]  Gavin Lowe,et al.  Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR , 1996, Softw. Concepts Tools.

[38]  Nick Ridler,et al.  Internet calibration direct to national measurement standards for automatic network analysers , 2001, IMTC 2001. Proceedings of the 18th IEEE Instrumentation and Measurement Technology Conference. Rediscovering Measurement in the Age of Informatics (Cat. No.01CH 37188).

[39]  Robert K. Cunningham,et al.  Why Measuring Security Is Hard , 2010, IEEE Security & Privacy.

[40]  Vijay Varadharajan Verification of network security protocols , 1989, Comput. Secur..

[41]  Roger M. Needham,et al.  Using encryption for authentication in large networks of computers , 1978, CACM.

[42]  Paul F. Syverson A Logic for the Analysis of Cryptographic Protocols , 1990 .

[43]  Stephen H. Brackin,et al.  A HOL extension of GNY for automatically analyzing cryptographic protocols , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[44]  Catherine A. Meadows,et al.  Formal Verification of Cryptographic Protocols: A Survey , 1994, ASIACRYPT.

[45]  Simon S. Lam,et al.  A semantic model for authentication protocols , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.

[46]  Ibrahim F. Tarrad,et al.  Assessment and Comparison of Commonly used Wireless Technologies from Mobile payment Systems Perspective , 2014 .

[47]  Richard A. Kemmerer,et al.  Analyzing encryption protocols using formal verification techniques , 1989, IEEE J. Sel. Areas Commun..