The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security for accessing an area need to be noticed. Access restriction can be applied using authentication such as password. Thereby, the strong password is required, but it is hard to remember. Strong password can be generated by using hash function and stored on smart card can be solution. Smart card can be used as access card. Nevertheless, vulnerabilities of the card need to be noticed. Lamport's...
In many protocols, registration center (RC) is just responsible for users' and servers' registration, so a malicious server may cheat users to serve as another legal server. It's necessary to verify the legality of both users and servers with the help of a third trusted party such as RC. In 2012, Li et al. proposed a dynamic identity based authentication protocol for multiserver environment. But their...
A Wireless Sensor Network (WSN) is a group of specialized sensors with a communications infrastructure for monitoring and recording conditions at diverse locations. In WSN's to access the real time data from the sensor nodes a proper user authentication technique is required before allowing the users to access the data. In 2015 A.K. Das has proposed a user authentication technique with three factors...
Due to advancements in WSN technology, WSN can be deployed in any holistic environments like environmental monitoring, military, etc., where the BS collects data from sensors, maintains it. To access real-time/updated data, external user may connect directly to the sensor node by bypassing the BS. This results in a critical need to authorize the user by the BS and sensor node. In the literature, various...
In recent years, in order to provide secure communication between Radio Frequency Identification (RFID) users different RFID authentication protocols have been proposed. In this paper, we investigate weaknesses of two newfound RFID authentication protocols that proposed by Shi et al. and Liu et al. in 2014. The Ouafi-Phan privacy model is used for privacy analysis. We show that these two protocols...
Wireless sensor networks (WSNs) are used in many applications to gather sensitive information which is then forwarded to an analysis center. Resource limitations have to be taken into account when designing a WSN infrastructure. Authentication in WSNs is critical, as they are often deployed unattended in hostile environments and must transmit information over unsecured mediums. However, the cost of...
The paper introduces a novel offline payment system in mobile commerce using the case study of micro-payments. The present paper is an extension version of our prior study addressing on implication of secure micropayment system deploying process oriented structural design in mobile network. The previous system has broad utilization of SPKI and hash chaining to furnish reliable and secure offline transaction...
A quantum digital authentication scheme based on hash function is proposed in this paper. The security of the quantum protocol lies on the existence of quantum one way function by fundamental quantum principle. The practical difficulties in quantum control and quantum computation made quantum protocol hard to implement. Lack of authentication made the quantum protocol vulnerable to hackers. By introducing...
RFID is considered as a significant technology which supplies amounts of change in chain management. The most important problem with the RFID system is that the attacker can access the tag's information, which leads to the security and privacy problems. Aimed at these problems, a secure hash-based mutual authentication protocol is proposed by utilizing the hash function, the PRNG (pseudo-random number...
In this paper, we define the RC4 state and introduce its forward and backward property. Based on the RC4 state and its forward and backward property, a simple, lightweight, but robust security protocol which achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations is presented. Furthermore, an RC4 state based hash function for the...
Password based remote user authentication over unreliable network is the traditional method in the Internet. A variety of password authentication schemes have been published in literature for electronic commerce environment; however, none of them is secure against various types of attack. In 2008, Zhu et al. proposed an improved remote login scheme over the Hwang and Yah's scheme. In this paper we...
The primary requirements of a successful Wireless Sensor Network (WSN) security architecture are confidentiality, integrity and authentication. User authentication is essential for customized services and privileged access control in wireless sensor network. These sensors will have limited processing power, storage, bandwidth and limited communication capabilities. Two-factor user authentication concept...
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
Security features are getting a growing interest in microelectronics. Not only entities have to authenticate in the context of a high secure communication but also the hardware employed has to be trusted. Silicon Physical Unclonable Functions (PUFs) or Physical Random Functions, which exploits manufacturing process variations in integrated circuits, have been used to authenticate the hardware in which...
The emerging of ubiquitous technology has transformed mobile device such as PDA and smart phone from a device once considered as a luxury to a daily requirements device. This trend has lead the increasing of mobile data storage demand. In year 2008, Internet Advanced Technology Attachment (iATA) has been introduce by Yu-Shu They et al as one of the alternate solution to resolve the mobile devices'...
In 2005, Yoon-Ryu-Yoo proposed a simple remote user authentication scheme which is an improvement on Hwang-Lee-Tang's scheme. However, we found that Yoon-Ryu-Yoo's scheme easily reveals a user's password and is vulnerable to impersonation attack using stolen smart card. This scheme is also found to be vulnerable to parallel session attack and man-in-the-middle attack. This paper proposes a new remote...
Usually, any communication begins by establishing the identity of partners (one over the other, or to a system that grants access to certain resources), the general settings for an identification protocol assuming the existence of a prover or claimant (referred to as USER) and a verifier in whose terms the outcome of an entity authentication protocol being either acceptance of the claimant's identity...
To use the network services provided by multiple servers in mobile wireless network, a hash function and smart card based multi-server authentication scheme without verification tables and servers' public keys is proposed. The new protocol has many advantages, such as no encryption, signature, verification tables, timestamp, and public keys directory.
As e-commerce new business, new products, new services areas and new management models are constantly emerging, the Internet payment services grow rapidly, and the Internet payment protocols have become increasingly prominent security issues. Payments of the current Internet protocol mostly use the MD5 or SHA algorithm for message signing. The traditional hash algorithms MD5 and SHA have increasingly...
Security approaches in wireless sensor networks due to limitation of energy and resource are different from traditional protocols in current networks. So, many security problems exist such as authentication, integrity, digital signature and etc., and there has been relatively little research suited for wireless sensor networks. We proposed an enhanced version of scheme on dynamically clustering in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.