Zbigniew Adam Kotulski

Zbigniew Adam Kotulski
  • Professor
  • Warsaw University of Technology

About

206
Publications
49,625
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,893
Citations
Current institution
Warsaw University of Technology
Additional affiliations
September 1979 - December 2011

Publications

Publications (206)
Article
Full-text available
Competing service providers in the cloud environment ensure services are delivered under the promised security requirements. It is crucial for mobile services where user’s movement results in the service’s migration between edge servers or clouds in the Continuum. Maintaining service sovereignty before, during, and after the migration is a real cha...
Article
Full-text available
As mobile communications transform, 5G technology can potentially change many industries and businesses. The change will have a great influence across many fields, such as the automotive, healthcare, and manufacturing sectors. This paper aims to review the existing applications of blockchain technology in providing 5G network security and identify...
Article
The use of services provided in modern mobile networks using edge servers (5G MEC) requires extended security solutions. One of them is an access control system adapted to the different needs and requirements of end users and service providers. Another, equally important, is the protection against the takeover of the service during its lifetime, wh...
Article
Full-text available
Modern and future services require ultra-reliable mobile connections with high bandwidth parameters and proper security protection. It is possible to ensure such conditions by provisioning services in the Multi-Access Edge Computing system integrated with fifth-generation mobile networks. However, the main challenge in the mentioned architecture is...
Article
Full-text available
MEC technology provides a distributed computing environment in 5G mobile networks for application and service hosting. It allows customers with different requirements and professional competencies to use the services offered by external suppliers. We consider a service access control framework on 5G MEC networks that is efficient, flexible, and use...
Article
Full-text available
5G is the fifth-generation cellular network satisfying the requirements IMT-2020 (International Mobile Telecommunications-2020) of the International Telecommunication Union. Mobile network operators started using it worldwide in 2019. Generally, 5G achieves exceptionally high values of performance parameters of access and transmission. The applicat...
Chapter
The currently developed 5G networks using MEC technology (5G MEC) allow for the harmonious cooperation of many areas of the economy (called the vertical industries) within an integrated information network. Providing the necessary security in such a complex configuration of business partners requires the design of consistent and effective security...
Article
Full-text available
Electronic card payments are getting more and more popular, mainly because of their simplicity, convenience, processing time and high level of security. The fact that a single payment card is issued for a particular cardholder makes it possible to link a card to various services. In this paper, we investigated a usage of a payment card in the loyal...
Article
Full-text available
Software-Defined-Networking (SDN) has been recently arising as a new technology in the IT industry. It is a network architecture that hopes to provide better solutions to most of the constraints in contemporary networks. SDN is a centralized control architecture for networking in which the control plane is separated from the data plane, the network...
Article
In this paper, we present a systematic overview of existing isolation techniques in nodes and networks, especially in the Radio Access Network and the Core Network (RAN and CN) to give a background to standardized methods of calculating an isolation level leading to secure End-to-End (E2E) slices’ isolation. We present specific isolation technologi...
Chapter
Card-Linked Loyalty is an emerging trend observed in the market to use payment card as a unique identifier for Loyalty Programs. This approach allows to redeem goods and collect bonus points directly during a payment transaction. In this paper, we proposed additional, intangible reward, that can be used in such solutions: shorter transaction proces...
Article
Full-text available
Software-Defined Network (SDN) is a network technology aimed to open new possibilities in network management and orchestration. This is important in future (especially mobile) networks, where virtualization of resources and network functions is the basic paradigm. SDN has been proposed to programmatically control networks, facilitating deployment o...
Article
As the amount of information, critical services, and interconnected computers and “things” in the cyberspace is steadily increasing, the number, sophistication, and impact of cyberattacks are becoming more and more significant. In the last decades, governmental and non-governmental organisations have become aware of this problem. However, the exist...
Article
Full-text available
In this article we describe the SHA-3 algorithm and its internal permutation in which potential weaknesses are hidden. The hash algorithm can be used for different purposes, such as pseudo-random bit sequences generator, key wrapping or one pass authentication, especially in weak devices (WSN, IoT, etc.). Analysis of the function showed that succes...
Article
Full-text available
Transaction traces analysis is a key utility for marketing, trend monitoring, and fraud detection purposes. However, they can also be used for designing and verification of contextual risk management systems for card-present transactions. In this paper, we presented a novel approach to collect detailed transaction traces directly from payment termi...
Article
Full-text available
Although 5G (fifth generation) networks are still in the realm of ideas, their architecture can be considered as reaching a forming phase. There are several reports and white papers which attempt to precise 5G architectural requirements presenting them from different points of view, including techno-socio-economic impacts and technological constrai...
Article
With the increasing role of numerous Internet services, more and more private data must be protected. One of the mechanisms which is used to ensure data security is user authentication. A reliable authentication mechanism is a foundation of security of a remote service but, on the other hand, it is also a source of user frustration because of fear...
Conference Paper
Electronic card payments gained huge popularity mainly because of their simplicity, convenience and processing time. Unfortunately transaction processing rules are constant for every transaction, for example each transaction above some hard limit (50 PLN in Poland) must be authorized with PIN verification. One can notice that such an approach is si...
Conference Paper
Traditional networks are often quite static, slow to modify, dedicated for a single service and very difficult to scale, what is typical for a large number of different network devices (such as switches, routers, firewalls, and so on), with many complex protocols implemented or embedded on them. Software Defined Network (SDN) is a new technology in...
Article
Full-text available
Pseudo-random number sequences which using the form of elliptic curves can be generated efficiently in software or hardware by the same methods that are used for the implementation of elliptic curve (EC) public-key cryptosystems. In this paper, we proposed a secure image encryption scheme using key sequences generated from Chaos-Driven Elliptic Cur...
Conference Paper
Full-text available
Elliptic Curve Cryptography (ECC) has attractive advantages compared to other public-key cryptosystems that motivated cryptographers for using it. ECC offers equal security for a smaller key sizes, thereby reducing processing overhead, making it ideal for small devices, key agreement protocols and digital signature applications. Images are data typ...
Article
Full-text available
In the today's world in many organizations, the information security management is one of the most important tasks to be done. Among the tasks which must be considered during security management is that the processes need to be monitored and verified. In the article, we introduce a new security measurement model which extends the approach presented...
Conference Paper
Full-text available
In this paper, Elliptic Curve Pseudo-random Number Generator (ECPRNG) is considered in the design of various symmetric keys for image encryption. This key sequences derived from random sequences based on addition of elliptic curve points. We propose a method for image encryption using such sequences of points with algorithms driven by a chaotic map...
Article
Full-text available
Elliptic Curve Cryptography (ECC) is a relatively recent branch of cryptography which is based on the arithmetic on elliptic curves and security of the hardness of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Elliptic curve cryptographic schemes are public-key mechanisms that provide encryption, digital signature and key exchange capabili...
Article
Full-text available
A new agent-based scheme for secure electronic voting is proposed in the paper. It is universal and can be realized in a network of stationary and mobile electronic devices. The proposed mechanism makes possible to implement a user interface simulating traditional election cards, semi-mechanical voting devices or utilize purely electronic voting bo...
Article
Full-text available
Last decades the contextual approach became an important methodology of analysing information processes in the dynamic environment. In this paper we propose a context management framework suitable for secure network services. The framework allows tracking the contextual information from its origin, through all stages of its processing up to applica...
Conference Paper
Full-text available
In this paper, after a short survey describing several known constructions recommended for generating sequences of pseudo-random numbers based on elliptic curves over finite fields of prime order, we propose a method of generating such sequences of points with algorithms driven by a chaotic map. Our construction improves randomness of the sequence...
Conference Paper
The purpose of this paper is to propose a context-aware secure routing protocol suitable for real-time services. Since such a protocol undergoes a number of independent constraints connected with: dynamic changes of the environment, security assumptions, network limitations and end-users personal requirements, the context factors need specific trea...
Conference Paper
Full-text available
Pseudo-random number generators (PRNG) play main important role in many security and cryptographic applications which require the output to be unpredictable and this is directly related to the quality of the generated random sequences. The design of such random sequences generators is not an easy task. Elliptic Curve Cryptography (ECC) is a relativ...
Conference Paper
One of the most common types of attacks on reputation systems is made by reporting unfair ratings. They can be performed by the individual malicious members or by a group of agents forming a coalition and cooperating together in order to achieve particular purpose (e.g, to gain higher position in the community or to discredit the competition). Due...
Article
An EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project's Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address...
Conference Paper
An EU Future Internet Engineering project currently underway in Poland defines three Parallel Internets (PIs). The emerging IIP System (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with Level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address...
Article
Full-text available
Broadcasting is a message-transferring method characteristic for majority of sensor networks. Broadcast encryption (BE) is broadcasting encrypted messages in such a way that only legitimate nodes of a network can decrypt them. It has many potential applications in distributed wireless sensor networks (WSNs) but perfect deploying of that method is v...
Conference Paper
Full-text available
Modern sensors are portable, embeddable, they offer multiple connectivity options and enough processing power that allows the performance of advanced operations. Multiple sensors can be used together forming a wireless sensor network (WSN). Ubiquitous WSNs are expected to play a significant role in the future, assisting users in their everyday life...
Conference Paper
Full-text available
Message freshness and time synchronization are nowadays essential services in secure communication. Many network protocols can work correctly only when freshness of messages sent between participants is assured and when internal clocks protocol's parties are adjusted. In this paper we present a novel, secure and fast procedure which can be used to...
Article
Full-text available
Wireless sensor networks have received wide attention recently across indoor and outdoor applications. One the other hand, more and more application scenarios require sensor nodes to be mobile, which introduces new technological challenges for security. Key management is the core for secure data communications among resource-constrained sensor node...
Article
Full-text available
Centralized architecture, due to its simplicity, fast and reliable user management mechanism (authorization, authentication and lookup) and O(1) searching capability, is still a preferable choice for many P2P-based services. However, it suffers from a “single point of failure” vulnerability, so networks based on this topology are highly vulnerable...
Article
Full-text available
In this paper we propose a new infrastructure for real-time applications. As a preliminary, we describe basic characteristics of the most popular real-time services like VoIP, videoconferencing, live media streaming, and network multiplayer games. We focus on the end-to-end latency, bandwidth and efficient transmission methods. Next, we present our...
Conference Paper
Wireless Sensor Networks (WSNs) found applications in different hostile environments. Addressing messages to a given node or a group of nodes in these situations is a very important and difficult task. Often one should address all nodes from a given area. In this paper we propose a new approach to the addressing problem. Our proposal is primarily...
Article
In this paper we propose a new optimality measure for Wireless Sensor Network-based structural monitoring systems. First, we present the results of experiments showing the reasons for random effects in Wireless Sensor Network (WSN) functioning. Then, the formulas for calculating a network’s reputation measure are given. Finally, we conclude with ar...
Article
Full-text available
Heterogeneous wireless networks increasingly encroach on our lives. Various technologies and mobile applications more often than usual are now used by mobile users. Intensive development of mobile networks not only sets new standards for radio, but increasingly focuses on providing security for traffic transmitted in wireless networks. Security in...
Article
Full-text available
Many network services and protocols can work correctly only when freshness of messages sent between participants is assured and when the protocol parties' internal clocks are adjusted. In this paper we present a novel, secure and fast procedure which can be used to ensure data freshness and clock synchronization between two communicating parties. N...
Article
Full-text available
In this paper we present a few non cryptographic methods for improving the security, integrity and reliability of real time services. The methods presented in this paper apply to real time transmitting systems, which are based on the Peer-to-Peer (P2P) model. A basic idea of the first technique is to use agents for detecting steganographic content...
Article
Full-text available
Cryptographic protocols are secure due to applica-tion of security services. The security services applied for their protection can be classified into the three groups: hard, soft and extended. Among the extended ones, we can point out to the availability of the goal of the security protocol, which guarantees that protocols aims are achieved. In th...
Article
In Chap. 1 is given introductory basic information concerning the practical aspects of the error analysis. Various examples of histograms show how much information may be deduced from them. Such important parameters deduced from a sample of measurements as a sample average, the sample variance and a sample standard deviation are defined, along with...
Article
In Chap. 10 are presented supplementary facts of probability theory which can be useful in studying error analysis problems. Sections of this chapter contain information on statistical linearization, multidimensional regression, limit theorems of probability theory, and elements of mathematical statistics such as: estimators, testing statistical hy...
Chapter
Chapter 7 presents basic information concerning three-dimensional distributions of random variables. Attention is given to continuous distributions, mainly to a three-dimensional normal distribution of independent random variables. Described is a procedure of determining ellipsoids of probability concentration and their dimensions being determined...
Chapter
In Chap. 5 is given basic information concerning two-dimensional distributions of random variables. Starting from a classical problem of the accuracy of artillery fire it is shown that, besides a traditional analytical procedure, components of a covariance tensor may be transformed by means of their representation by Mohr circles. It is shown that...
Article
Full-text available
In this paper we report our experiment concerning new attacks detection by a neural network-based Intrusion Detection System. What is crucial for this topic is the adaptation of the neural network that is already in use to correct classification of a new "normal traffic" and of an attack representation not presented during the network training proc...
Conference Paper
Traffic in Wireless Sensor Network (WSN) consists of short packets sent by nodes that are usually identical in respect of software applied and their hardware architecture. In such a communication environment it is important to guarantee authentication of the nodes. The most popular way to achieve this basic security service is using Message Authent...
Conference Paper
Recently we have observed the growth of the intelligent application especially with its mobile character, called e-anything. The implementation of these applications provides guarantee of security requirements of the cryptographic protocols which are used in the application. Traditionally the protocols have been configured with the strongest possib...
Article
Symmetric block ciphers are usually used in WSN for security services. This paper puts forward the idea of using advanced modes of operation of symmetric block ciphers to achieve confidentiality and authentication in one cryptographic operation. The modes of operation approved by NIST that is CMAC, CCM, GCM/GMAC are applied here. The benchmarks of...
Article
Chapter 9 is devoted to more advanced problems of error analysis: problems described by implicit equations and inequalities. After formulation of the problem, some methods of approximate calculation of the probability that inequalities for random variables and functions of random variables are presented. The powerful method helping to solve such pr...
Article
Chapter 6 is devoted to procedures in which two-dimensional functions of independent random variables are used for analysis of positioning accuracy of robot manipulators and various mechanisms. It is shown how the tolerance polygons in complex two-dimensional nets of dimensions can be constructed analytically or with the use of the method of static...
Article
At first, in Chap. 4 is given basic information concerning various practical problems in which functions of independent random variables are used in the analysis of the manufacturing or measuring errors. Simple examples illustrate how such functions are used in solving practical problems, among them in non-direct measurements or calculations of tol...
Article
Chapter 8 is devoted to three-dimensional functions of independent random variables along with applications to an analysis of a positioning accuracy of robot manipulators. Procedure of determining polyhedrons of the positioning accuracy in such cases when tolerance limits of the positioning accuracy of particular joints of the manipulator are given...
Article
In Chap. 2 basic information concerning probability and random variables as an introduction to error analysis is given. Such important notions as a probability density function and a cumulative distribution function are defined, along with fundamental parameters of a distribution: an average value, an average deviation, a variance, and a standard d...
Article
Full-text available
This document presents thorough information on the WiMAX technology, its detailed architecture and illustrates security mechanisms employed. The first part discusses basic properties and components of WiMAX network. Individual sub-layers of the network operation have been presented. The second part describes all security-related aspects and solutio...
Article
Full-text available
Nowadays, storing the information is fundamental for the correct functioning of any organization. The critical factor is to guarantee the security of the stored data. In the traditional database systems the security requirements are limited to confidentiality, integrity, availability of the data and user authorization. The criticality of the databa...
Article
Full-text available
Generally, Intrusion Detection Systems (IDS) work using two methods of identification of attacks: by signatures, that are specific defined elements of the network traffic possible to identify and by anomalies being some deviation form of the network behaviour assumed as normal. Recently, some attempts have been made to implement artificial intellig...
Article
Full-text available
In the paper we propose a method of detecting and removing a hidden content which could be sent through the HTML code of WWW pages. We start from the overview of known methods of inserting hidden data to the markup languages (HTML or XML)-written texts. Next we propose a method of detecting suspicious web pages, based on statistical analysis. We al...
Article
This book presents, in the simplest possible manner, those branches of error analysis which find direct applications in solving various problems in engineering. Chapters I, II, III, and IV contain a presentation of the fundamentals of error calculus: basic characteristics of error distributions, histograms and their various applications, basic con...
Article
In the paper we present the specific conditions that appear in structures' monitoring by means of Wireless Sensor Networks (WSN). First, we introduce the problem of optimal sensors' location for structures monitoring and its specific constraints if one uses WSN. We formulate the conditions that must be taken into account during optimization. Then,...
Conference Paper
The security of information exchange between the parts in the teleinformatic infrastructure is one of the crucial topics. During the protecting the infrastructure of the organization, one can use a lot of mechanisms which are often based on the cryptographic primitives. Traditionally, the security officers model the protection system to be as stron...
Conference Paper
Full-text available
This paper concerns the applicability of reputations systems for assessing Quality of Experience (QoE) for web services in the Future Internet. Reputation systems provide mechanisms to manage subjective opinions in societies and yield a general scoring of a particular behavior. Thus, they are likely to become an important ingredient of the Future I...
Article
Full-text available
Security protocols used in today's communication are complex and it is very difficult to analyze and optimize them. Literature reports some results which optimize security protocols. In the case of devices with limited resources (mobile phones, PDA, sensors) the speed and efficiency of the process is crucial for their stable work. Security methods...
Article
Full-text available
In this paper we examine one of the recently proposed chaotic image encryption algorithms, based on chaotic map lattices (CML). We show certain problems with the chaotic map, as well as errors in the designed algorithm. Then we propose a way to improve it and present a new version of algorithm and its implementation. At the end, we show the results...
Chapter
The recent development in the mobile technology (mobile phones, middleware, wireless networks, etc.) created a need for new methods of protecting the code transmitted through the network. The oldest and the simplest mechanisms concentrate more on integrity of the code itself and on the detection of unauthorized manipulation. The newer solutions not...
Conference Paper
Full-text available
Usually, intrusion detection systems (IDS) work using two methods of identification of attacks: by signatures that are specific defined elements of the network traffic possible to identification and by anomalies being some deviations form of the network behavior assumed as normal. In the both cases one must pre-defined the form of the signature (in...
Conference Paper
Public-key cryptosystems allow secure connections and data exchange through unsafe communication channel without the need of a previous secure key exchange. The most popular cryptosystem used nowadays is RSA. However recently a serious rival appeared – Elliptic Curve Cryptosystems (ECC).Cryptanalytic attack on ECC system involves solving the Ellipt...
Article
Full-text available
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however,...
Preprint
Full-text available
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however,...
Chapter
Full-text available
A model of Boolean neural network is proposed as a substitute of a bock cipher. Such a network has functionality of the block cipher and one additional advantage: it can change its cryptographic properties without reprogramming, by training the network with a new training set. The constriction of the network is presented with an analysis of the app...
Chapter
Full-text available
In this paper a new way of exchanging data for Voice over Internet Protocol (VoIP) service is presented. With use of audio watermarking and network steganography techniques we achieve a covert channel which can be used for different purposes e.g. to improve IP Telephony signaling protocol’s security or to alternate existing protocols like RTCP (Rea...
Chapter
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) significant researchers’ attention, due to its innate capabilities of instant communication in many time and mission critical applications. However, its natural advantages of networking in civilian and military environments make it vulnerable to security threat...
Chapter
The recent development in the mobile technology (mobile phones, middleware, wireless networks, etc.) created a need for new methods of protecting the code transmitted through the network. The oldest and the simplest mechanisms concentrate more on integrity of the code itself and on the detection of unauthorized manipulation. The newer solutions not...
Article
Full-text available
In the paper we propose a general, abstract framework for Automatic Secret Generation and Sharing (ASGS) that should be independent of underlying Secret Sharing Scheme (SSS). ASGS allows to prevent the Dealer from knowing the secret. The Basic Property Conjecture (BPC) forms the base of the framework. Due to the level of abstraction, results are po...
Article
Full-text available
In this paper we describe a novel adaptive method of speech quality control which may be used to adjust three call parameters: speech codec configuration, playout buffer size, and amount of FEC (Forward Error Correction) mechanism information during VoIP (Voice over Internet Protocol) call under changing network conditions. This solution differs fr...
Conference Paper
We propose a check-digit scheme that makes use of graph vertex coloring. It complements known schemes, which rather make use of the graph structure. Our scheme can be used simultaneously with them to compensate for mutual weaknesses. We show that feasibility of the proposed scheme increases with the size of the number whose digits are checked, and...
Conference Paper
Mobile ad hoc networks (MANET) due to its innate capabilities of instant communication in many time and mission critical applications recently received a significant researchers' attention. For already identified security vulnerabilities in a wireless environment, such as MANET, a set of countermeasures were proposed. However, only a few of them pr...
Article
Electronic services in dynamic environment (e.g. e-government, e-banking, e-commerce, etc.), meet many different barriers reducing their efficient applicability. One of them is the requirement of information security when it is transmitted, transformed, and stored in an electronic service. It is possible to provide the appropriate level of security...

Network

Cited By