The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) ownership transfer protocol aims at securely updating RFID tag's internal state and key such that only the current owner of a tag is allowed to access the tag when it is transferred from one owner to the next. Doss et al. [32] proposed two very promising RFID ownership transfer protocols which represented state of the art and were claimed to own excellent security...
Since the eavesdropping resistant remote password authentication schemes based on cryptography require that certain cryptosystems and/or cryptographic hash functions have to be implemented in the user's login device. Thus, many eavesdropping resistant remote password authentication schemes without using cryptography have been proposed. However, most existing eavesdropping resistant remote password...
Biodiversity is commonly used to measure the degree of variation of life forms and health conditions within an area or ecosystem. However, reckless human behaviors and dramatic climate changes inevitably cause species extinction. It is therefore important and urgent to establish genetic databases worldwide for preserving precious genome sequences of diversified organisms and perhaps restoration for...
RFID has been regarded as a time and money-saving solution for a wide variety of applications, such as manufacturing, supply chain management, and inventory control, etc. However, there are some security problems on RFID in the product managements. The most concerned issues are the tracking and the location privacy. Numerous scholars tried to solve these problems, but their proposals do not include...
E-passport is a biometric passport that combines both paper and electronic chip. It includes biometrics information and ID using RFID chip or tag. The goal of e-passport is to provide strong authentication through documents that unambiguously identify the passport holder. An e-passport can protect forging of ID and can make rapid progress in immigration. The use of RFID tag may cause privacy violation...
Sensor networks are vulnerable to false data injection attack and path-based denial of service (PDoS) attack. While conventional authentication schemes are insufficient for solving these security conflicts, an en-route filtering scheme, enabling each forwarding node to check the authenticity of the received message, acts as a defense against these two attacks. To construct an efficient en-route filtering...
Portable Document Format (PDF) is used for representing two-dimensional documents independent of the application software and hardware. PDF is now a published ISO standard. This article presents the idea of implementing a plug-in for PDF based on Digital Rights Management (DRM) technology. In this system, the issuer can encrypt the PDF files with its issue license awarded by authentication server...
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in Web services. On the basis of studying service-oriented architecture and Web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
Through the analysis of the characteristics of Bluetooth piconet and Bluetooth's security architecture, this paper gives out a scheme of group key agreement based on Diffie-Hellman key agreement protocol. It affords a method that nodes can authenticate each other in the Bluetooth piconet and defeat threats derived from Bluetooth link-level. In the last place, the feasibility of the scheme is verified.
With Mobile Agent is becoming common in a variety of applications on Electronic Commerce. How to protect the transaction security is the key technology of based Agent Electronic Commerce System. In this paper, a Mobile Agent security transaction Authentication Scheme is proposed, the Scheme effectively protects the Mobile Agent transaction security by using bilinear pairings, hash function and Exclusive...
SOA provides an effective way for electronic commerce. On the basis of studying generic business and SOA security mechanisms, this paper points out the inadequacies of current electronic commerce system and gives out a electronic commerce security model based on SOA. It can provide a secure, compatible and extensible application for business process.
Through the analysis and research of Bluetooth's security architecture, in this paper it gives out the security architecture based on user authentication and block cipher that is not provided natively by Bluetooth. It can defeat threats of only adopted Bluetooth link-level authentication and E0 stream cipher.
As the networking technology greatly advanced in past decades, wireless sensor networks (WSN) have been widely deployed and utilized in various areas. Security issues on WSN devices thus draw much attention. In order to ensure the security of IEEE802.15.4 WSN and to fulfill the strict limitations of area and energy, we propose an efficient scheme for AES-CCM architecture. We implement AES-CCM by taking...
RFID is a widely adopted technology in the enterprises for inventory checking and management. Due to the ubiquitous nature of RFID, attackers can easily launch attacks over wireless channel whenever there is a flaw on the RFID authentication protocol being used. A successful attack can imply a substantial loss in the enterprise and may trigger a series of problems. In this paper, we investigate a...
Many password authentication schemes have been proposed for electronic commerce environment; however, none of them is secure enough. Hwang and Yeh proposed an improvement on the Peyravian-Zunic password authentication scheme including protected password transmission and password change. We demonstrate that the Hwang-Yeh scheme is also vulnerable to several kinds of attacks though the scheme has repaired...
Online user authentication using secure protocol is required by most web-based services. User authentication is mostly carried out by sending a pair of username and password to the server, since most users have not a certificate. Some attacks just rely on this fact, such as phishing attacks. In the paper, we discuss the issue of online user authentication and propose a method for online user authentication...
With the rapid development of Internet, e-mail authentication becomes more and more important. However, many existing e-mail authentication protocols are not secure enough. In 2005, Sun et al. proposed two e-mail protocols and claimed that can provide perfect forward secrecy. In 2007, Raphael showed the weaknesses of the two e-mail protocols.The first protocol can??t securely against unknown key-share...
Handoff latency is a severe bottleneck impacting the service continuity for voice and multimedia applications in WLAN. IEEE 802.11k neighbor report defines the neighbor APs which are potential transition candidates for the roaming target. But the selection method for the roaming target AP is left undefined. Several schemes have been proposed for fast handoff with neighbor APpsilas information. However,...
Since there is eavesdropping and MITM attack during establishing encryption key between two Bluetooth devices, a secure key agreement scheme is designed based on elliptic curves cryptography and interlock protocol. This scheme can defend two kinds of attacks mentioned above. It provides bidirectional authentication for two devices and key integrity verification by exchanging the keyspsila Hash-value...
In wireless mesh networks (WMNs), preserving users' privacy is an important but contradictory to security issue. To provide a new solution to the challenge, we propose an anonymous authentication scheme based on CPK and blind signature in the elliptic curve domain. The proposed scheme can not only provide fast and explicit mutual authentication between nodes, but also effectively preserve mesh users'...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.