Paulo Pagliusi | Royal Holloway, University of London (original) (raw)
Phone: +55 21 8768 8686
Address: Ipanema - Rio de Janeiro - RJ
less
Related Authors
Graduate Center of the City University of New York
Uploads
Papers by Paulo Pagliusi
Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–... more Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–2008–15 20 March 2008 Royal Holloway University of London Department of Mathematics Royal Holloway, University of ...
the Proceedings of 3rd International …, Jan 1, 2004
Information Security Applications, Jan 1, 2004
Currently there are no Internet access authentication protocols available that support both symme... more Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PANA/IKEv2 protocol is also provided. This article aims primarily at contributing to the design of authentication protocols suitable for use in future heterogeneous Internet access environments supporting ubiquitous mobility.
Security Protocols, Jan 1, 2004
… Future and Symposium on Trends in …, Jan 1, 2003
Infrastructure Security, Jan 1, 2002
This article contains a current outline of the GSM system security, with focus on the air interfa... more This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Internet) remote access are also contemplated. This article aims primarily at contributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.
Books by Paulo Pagliusi
Nowadays, IP mobile devices need to employ a variety of different network access technologies to ... more Nowadays, IP mobile devices need to employ a variety of different network access technologies to gain ubiquitous connectivity. This book reviews the authentication infrastructure challenges for Internet remote access supporting ubiquitous client mobility, and proposes a series of solutions obtained by adapting and reinforcing security techniques arising from different sources. The focus is on entity authentication protocols that can be carried both by the IETF PANA authentication carrier and by the EAP mechanisms, and possibly making use of an AAA infrastructure. The core idea is to adapt authentication protocols arising from the mobile telecommunications sphere to Internet remote access. A proposal is also given for Internet access using a public key based authentication protocol. The subsequent security analysis of the proposed protocols covers a variety of aspects, including: key freshness, DoS-resistance, and false-entity-in-the-middle attacks, in addition to identity privacy of users accessing the Internet via mobile devices. This book is destined to researchers or anyone else who is interested on authentication mechanisms for Internet remote access aiming ubiquitous mobility.
Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–... more Page 1. Internet Authentication for Remote Access Paulo Sergio Pagliusi Technical Report RHUL–MA–2008–15 20 March 2008 Royal Holloway University of London Department of Mathematics Royal Holloway, University of ...
the Proceedings of 3rd International …, Jan 1, 2004
Information Security Applications, Jan 1, 2004
Currently there are no Internet access authentication protocols available that support both symme... more Currently there are no Internet access authentication protocols available that support both symmetric and asymmetric cryptographic techniques, can be carried over arbitrary access networks, and are flexible enough to be re-used in all the likely future ubiquitous mobility access contexts. This article proposes the PANA/IKEv2 authentication protocol for heterogeneous network access as a step towards filling this gap. A security analysis of the PANA/IKEv2 protocol is also provided. This article aims primarily at contributing to the design of authentication protocols suitable for use in future heterogeneous Internet access environments supporting ubiquitous mobility.
Security Protocols, Jan 1, 2004
… Future and Symposium on Trends in …, Jan 1, 2003
Infrastructure Security, Jan 1, 2002
This article contains a current outline of the GSM system security, with focus on the air interfa... more This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Internet) remote access are also contemplated. This article aims primarily at contributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.
Nowadays, IP mobile devices need to employ a variety of different network access technologies to ... more Nowadays, IP mobile devices need to employ a variety of different network access technologies to gain ubiquitous connectivity. This book reviews the authentication infrastructure challenges for Internet remote access supporting ubiquitous client mobility, and proposes a series of solutions obtained by adapting and reinforcing security techniques arising from different sources. The focus is on entity authentication protocols that can be carried both by the IETF PANA authentication carrier and by the EAP mechanisms, and possibly making use of an AAA infrastructure. The core idea is to adapt authentication protocols arising from the mobile telecommunications sphere to Internet remote access. A proposal is also given for Internet access using a public key based authentication protocol. The subsequent security analysis of the proposed protocols covers a variety of aspects, including: key freshness, DoS-resistance, and false-entity-in-the-middle attacks, in addition to identity privacy of users accessing the Internet via mobile devices. This book is destined to researchers or anyone else who is interested on authentication mechanisms for Internet remote access aiming ubiquitous mobility.