The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the pretext of digital lifestyle in a Smart City, home security has become a prudent yet technically challenging area for players of this field. Home access system is a part of home security. In this paper, we present a smart locking and unlocking system for home door security. The proposed system controls the door lock through an Android App using Wi-Fi as the communication protocol, that communicates...
Due to massive advantages of short range communication technologies such as NFC and RFID, they are ubiquitously utilized in many fancy and sensitive applications. During last decade, there have been impressive endeavors to design efficient authentication protocols which can provide secure and anonymous communication for end-users. In this research, we formally analyze a recently improved authentication...
For a long time, the sensitivity and criticality of data storage, processing, and transmission have hindered the wide utilization of IT and networks in the health care systems. Recently, the high availability, reachability, reliability, efficiency, usability and automation provided by the different cloud computing models paved the way to integrate the e-health systems with these cloud services to...
In recent times, the electronic health record (eHealth) system is regarded as one of the biggest developments in healthcare domains. An eHealth system needs to be agile, reliable, and sustainable. Although the existing Personally Controlled Electronic Health Record (PCEHR) systems are claimed to be fully controlled by the patients, there are ways where the healthcare professionals and the database/system...
Traditional deception-based cyber defenses often undertake reactive strategies that utilize decoy systems or services for attack detection and information gathering. Unfortunately, the effectiveness of these defense mechanisms has been largely constrained by the low decoy fidelity, the poor scalability of decoy platform, and the static decoy configurations, which allow the attackers to identify and...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
Mobile e-health is one of the Internet of Things application that assists the healthcare organization in providing better healthcare services. Development of wireless sensor networking area has greatly increased the feasibility of a mobile e-health system since it provides wireless communication technology with promising sensor network applications. However, mobile e-health is subjected to a lot of...
Smart home user usually controls smart devices through smart application, which is managed by user's account. Thus, compromised account is possible and countermeasure to such attack can help protect both devices and data pertaining to them. In this paper, we propose a security countermeasure in case of compromised account in smart home system by introducing another layer of access control beyond the...
With the development of cloud computing, storage of whole world started shifting to the cloud. Management and security of such a large data was very difficult, to lower the security issues, Tokenization was developed, but for maintaining the security and safety of the Tokenization servers, there was need of a strong encryption algorithm. This paper presents Next Generation Encryption Algorithm, a...
In this paper, we propose a novel secure and privacy-preserving scheme for enhancing security in vehicular cloud based tasks announcement. The proposed scheme uses an efficient multiple receiver signcryption technique with proxy re-encryption in order to prevent the private information of the vehicles from being disclosed during task announcement. By integrating the proxy re-encryption algorithm with...
Cloud computing is rather new, and there're, of course, concerns like data-protection. This technology is developing as a standard for data-sharing on remote storages. Cloud has been able to convince users and companies' owners to transfer their data to Cloud so they can use Cloud resources and reduce their costs. Due to importance of data for its owners, there's always concern about security. When...
Text password is a very common user authentication technique. Users face a major problem, namely that of managing many site-unique and strong (i.e. non-guessable) passwords. One way of addressing this is by using a password generator, i.e. a client-side scheme which generates (and regenerates) site-specific strong passwords on demand, with minimal user input. This paper gives a detailed specification...
By analyzing AAA service log data of one main ISP in China, we found that the variations of authentication success ratio (ASR) exhibit counter-intuitive behavior. The ASR is actually higher during peak hours than off-peak hours. To account for this paradox and explain ASR variations in general, an analysis mechanism is proposed. It has the ability to separate ASR variations into systemic changes over...
This contribution discusses algorithms for strong authentication of applications in mobile devices. The current LTE and IMS networks provide strong authentication using USIM smart cards based on AKA algorithm. The problem of this authentication is that this authentication is under the sole control of Telco operators. We can expect that more applications will be placed into the IMS environment in the...
In conditions of information technology growth, systems which are being developed to be used on multiple platforms, gain in importance and popularity. As a rule, such systems have client-server architecture and have strong security requirements for user authentication. In this paper the information technology of user authentication for cross-platform systems has been developed, which is characterized...
PUFs or Physically Unclonable Functions are emerging hardware security primitives that offer a lightweight alternative to standard security for highly restricted devices like RFIDs. PUFs, however, have been found to be vulnerable to modeling attacks and as such PUF-based authentication protocols had to employ cryptographic primitives to establish reliable security. We introduce a novel lightweight,...
In this work the wireless networks security algorithms were analyzed. The fundamentals of the WPA and WPA2 safety algorithms, their weaknesses and ways of attacking WPA and WPA2 Enterprise Wireless Networks are described. Successful attack on the WPA2-PSK and WPA2-Enterprise was carried out during the performance of work. The progress of this attack and its results were described.
Service infrastructures operated by different operators with own policies are being federated to agglomerate various services. To join a federation, an operator must comply with a federation agreement. As a result, it takes time for the operator to check the consistency between own policies and the agreement, and to establish a network connection to federation's infrastructure. To ease these concerns,...
Digital signature is a term that use a key pair of user for sign and verify a document. People can create their digital signature using biometric technology. Biometric technology is a concept that allows people to doing an digitally authentication using their bodies, for example by using their fingerprint. Now, fingerprint biometric technology system was available in some smartphone product, so that...
With the continuous development of information construction, the application of digital campus system is increasing, the network scale expanding gradually, access control, and information security problem increasingly prominent. The original decentralized independent certification, the independent authorization, the independent account management model has been unable to meet the current and future...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.