The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
PUFs or Physically Unclonable Functions are emerging hardware security primitives that offer a lightweight alternative to standard security for highly restricted devices like RFIDs. PUFs, however, have been found to be vulnerable to modeling attacks and as such PUF-based authentication protocols had to employ cryptographic primitives to establish reliable security. We introduce a novel lightweight,...
In this work the wireless networks security algorithms were analyzed. The fundamentals of the WPA and WPA2 safety algorithms, their weaknesses and ways of attacking WPA and WPA2 Enterprise Wireless Networks are described. Successful attack on the WPA2-PSK and WPA2-Enterprise was carried out during the performance of work. The progress of this attack and its results were described.
Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology. Biometric technology is a concept that allows people to doing an digitally authentication using their bodies, for example by using their fingerprint. Now, fingerprint biometric technology system was available in some smartphone product, so that...
We propose the first user authentication and key exchange protocols that can tolerate strong corruptions on the client-side. If a user happens to log in to a server from a terminal that has been fully compromised, then the other past and future user's sessions initiated from honest terminals stay secure. We define the security model for Human Authenticated Key Exchange HAKE) protocols and first propose...
In spite of the availability of digital password lockers and advanced door locks, hacking the lock code by an unauthorized person has become a plain-sailing task. Various electronic locks are currently available in the market based on Password, RFID, Biometrics, OTP, Cryptography, Wireless and IoT. Every system has its own advantages and disadvantages where one system overcomes the limitations of...
Sharing encrypted data with different users via public cloud storage is an important research issue. This paper proposes a key-aggregate authentication cryptosystem. The cryptosystem generates a constant-size key that supports flexible delegation of decryption rights for any set of ciphertexts. The key-size is independent of the number of maximum ciphertexts such that the expense of our scheme is...
Cloud computing provides several benefits to developers, service providers and consumers with respect to scalability, flexibility and availability at inexpensive cost. On the other hand, security is the main concern for cloud computing, particularlyoutsourced data. We focus on a stand-out segment to protectoutsourced of cloud data, which poses various new securitychallenges that need to be addressed...
The keys generated by (symmetric or asymmetric) have been still compromised by attackers. Cryptography algorithms need extra efforts to enhance the security of keys that are transferring between parities. Also, using cryptography algorithms increase time consumption and overhead cost through communication. Encryption is very important issue for protecting information from stealing. Unfortunately encryption...
With the pervasiveness of mobile devices and the development of biometric technology, biometric identification, which can achieve individual authentication relies on personal biological or behavioral characteristics, has attracted widely considerable interest. However, privacy issues of biometric data bring out increasing concerns due to the highly sensitivity of biometric data. Aiming at this challenge,...
An enciphered method to sufficiently increase the security and privacy of data transmission applied in radio frequency identification system (RFID) was proposed. In this provided approach, a structure utilized suitably in electronic product code (EPC) compliant class-1 generation-2 system was studied to enable resistance to intruder aggression and attack by means of creating two-stage codes and virtual...
Authentication and encryption within an embedded system environment using cameras, sensors, thermostats, autonomous vehicles, medical implants, RFID, etc. is becoming increasing important with ubiquitious wireless connectivity. Hardware-based authentication and encryption offer several advantages in these types of resource-constrained applications, including smaller footprints and lower energy consumption...
One of the most predominant technology is the cloud storage that deploys the storage server in public cloud. The security policies that protects and preserves the data integrity may fail due to load and the software stack that runs in various servers in datacenter. The main objective of this paper to controlthe sensitive data managed under IT infrastructure that manage, protect, integrate and extend...
The rapid growth of virtualization in cloud computing has attracted organizations to adopt this technology for its cost-effectiveness, ease of deployment and high availability of resources. Ensuring the security of virtual machine images is a big concern to cloud providers as well as the corporations which own applications and servers in cloud. Industry and academia has conducted extensive research...
The identity authentication system is based on multi-attribute and identity in broadcasting monitoring system. The scheme mainly uses the multi-attribute encryption Attribute-Based Encryption (ABE) as the core, draws Identity-Based Encryption (IBE) to generate the global unified Global Identifier (GID), and proposes the GID-Attribute-Based Encryption (GABE) encoded technology. The method is mainly...
Vehicular Ad-hoc Networks (VANETs) are formed by a huge number of vehicles which act as the network nodes and communicate with one another. This emerging paradigm has opened up new business opportunities and enables numerous applications ranging from road safety enhancement to mobile entertainment. A fundamental issue that impacts the successful deployment of VANET applications is the security and...
Anonymous password-based authentication protocols are designed to provide not only password-based authentication but also client anonymity. In [10], Qian et al., proposed a simple anonymous password-based authentication (SAPAKE) protocol. In this paper, we revisit the SAPAKE protocol [10] by first showing that an outside attacker can specify which client has actually communicated with the server in...
Cloud computing is a powerful service that allows the cloud users to utilize the resources located in the cloud servers by pay-per-use or charge-per-use mode through the internet. The cloud users are enjoying the on-demand services provided by the cloud computing environment without maintaining the data in a local system. Even though the service is offered to cloud users in an efficient way, there...
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.