The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Goutham et al. proposed an ID-based user authentication with key agreement on elliptic curve cryptography(ECC), which is suitable to be applied in client-serverenvironment. The scheme mainly negotiates a temporary session key between two parties. However, we find that the scheme contains some security flaws, such as incomplete anonymity, no provision for updating private key and so on. In...
In this paper, a mutual authentication protocol based on ECC is designed for RFID systems. This protocol is described in detail and the performance of this protocol is analyzed. The results show that the protocol has many advantages, such as mutual authentication, confidentiality, anonymity, availability, forward security, scalability and so on, which can resist camouflage attacks, tracking attacks,...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
With the rapid development of network systems, many of our daily life activities can be performed via the Internet. Online shopping is one of the most common of these activities, which include group buying behavior. Group buying is a trading way, which is a mutually agreeable process. Buyers hope that they can buy their favorite goods or services through trading, and merchants hope that they can obtain...
Nowadays, the banking industries need to enhance their services by utilizing ICT. Since the internet became a most influential technology for all aspects of life, bank transforms their manual process business into electronic, real time process and services. Hence, the user can perform a more simple and convenient internet banking transaction. Unfortunately, the ease of internet banking followed by...
MySQL database identity authentication uses a CHAP protocol, that is, the challenge/response protocol, which exists the password expressly transmission, one-way authentication, random time can not grasp and other security issues. In this paper, we analyze the security problems of the existing MySQL database authentication protocol, and propose a new type MySQL integrated mutual authentication security...
Radio frequency identification (RFID) is now becoming a core technology in the Internet of Things (IoT). Automated toll collection system is a system used for collecting toll tax automatically. At present a small RFID tag is attached with the vehicle which contained the vehicle ID. Due to the openness in nature, RFID tags suffer with potential security threats. One of the major threats is privacy...
Mobile radio frequency identification (RFID) systems are being employed in many applications such as supply chain management. Since the communications between RFID-reader and server, RFID-tag and RFID-reader are all wireless, security and privacy attracts more attentions, reflected in the research on authentication protocols. But most of the existing authentications only care about the front end (reader...
Kerberos is a distributed authentication protocol which guarantees the mutual authentication between client and server over an insecure network. After the identification, all the subsequent communications are encrypted by session keys to ensure privacy and data integrity. In this paper, we have proposed a biometric authentication protocol based on Kerberos scheme. This protocol is not only resistant...
For secure usage of public Wi-Fi services, mutual authentication between service providers and users is required. However, because the cost of the user account provisioning to achieve mutual authentication is high, the level of authentication is suppressed low in many services. In this research, we aim to reduce this cost. One of the problems in user account provisioning is that theft or swap of authentication...
Small and inexpensive computing devices are becoming potential players in the Internet arena as they are used for collecting or generating information and later relay them to the designated servers. The information gathered must be adequately protected against all kinds of attacks during storage and communication. However, smart constrained devices have limited resources and unable to run most of...
Cloud computing is recently developed internet based computing paradigm where ranges of services such as data storage, applications deployment, servers, etc. are delivered over the internet. On the basis of response, cloud allocates the services through internet. The important feature of quality of service in cloud computing is secured way of protecting information over internet. The cloud service...
Nowadays, mobile phones are equipped with enhanced short-range communication functionality called Near Field Communication (or NFC for short). NFC requires no pairing between devices and suitable for transferring small amount of data in very limited area. A number of researchers proposed authentication techniques for NFC communications but they still lack some necessary security properties, especially...
Mobile authentication systems for mobile payment often use either the web or mobile channel individually to confirm the identity request of a remote user. Most common activity in mobile commerce is done through mobile phones. The mobile phones are vulnerable to numerous security threats due to involvement of valuable financial and personal information.
Radio Frequency Identification (RFID) technology is rapidly making its way to next generation automatic identification systems. Despite encouraging prospects of RFID technology, security threats and privacy concerns limit its widespread deployment. Security in passive RFID tag based systems is a challenge owing to the severe resource restrictions. In this paper, we present a lightweight anonymity...
The evolution of digital communication includes both applications and devices running them. In this context, specific applications are needed to enhance a safeguard communication ensuring protection and trust services to the users. The growing need to address privacy concerns when social network data is released for mining purposes has recently led to considerable interest in various network security-based...
In traditional symmetric authentication schemes for smart card, the smart card sends its card number in plaintext to verify the genuineness of the authentication server (AS), resulting in the leakage of some sensitive information and being attacked. Therefore, in this paper, to prevent the leakage of card number we propose a novel symmetric authentication scheme in which the card number is powered...
Since information communication via radio transmission can be easily eavesdropped, therefore, many radio frequency identification (RFID) security mechanisms for location privacy protection have been proposed recently. However, most of previously proposed schemes do not conform to the EPC Class-1 GEN-2 standard for passive RFID tags as they require the implementation of hash functions on the tags....
SIP (Session Initial Protocol) has been a very popular protocol for VoIP. However, the authentication of this protocol just derives from HTTP digest authentication, which has been demonstrated insecure in the open network. Recently, Arshad et al. proposed an improved mutual authentication scheme based on ECC and claimed that it's secure enough. In this paper, however, we point out that their protocol...
Recently, Yang et al. Proposed a remote user authentication scheme using smart card. Through careful cryptanalysis, we find that Yang et al.'s scheme is not repairable, and cannot achieve mutual authentication and session key agreement. To overcome these security flaws, we propose a new remote user authentication scheme with smart card. In the proposed scheme, the user can choose his/her password...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.