Place and Time Authentication of Cultural Assets
نویسندگان
چکیده
This paper proposes a place and time authentication system for cultural assets. We develop a protocol that combines traditional cryptographic techniques with place and time information to generate a secure tag for each cultural asset. We model the attacker capabilities and show that our secure tag helps ensure the authenticity of works of art. Our system has been deployed and validated in Italian and Greek museums in the context of CUSPIS project.
منابع مشابه
A Geo Time Authentication System
In this paper we present Geo Time Authentication (GTA), a prototype system that provides authenticity and integrity of cultural assets information. It has been conceived in the context of the CUSPIS project and afterwards it has been generalized to the context of assets and goods where problems of counterfeiting and thefts are prevalent. To prevent these crimes GTA adds to the usual asset infor...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملAn ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure
Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication. This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...
متن کاململزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کامل