The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio frequency identification (RFID) is one of the key technologies of Internet of Things, which have many security issues in an open environment. In order to solve the communication problem between RFID tags and readers, security protocols has been improved constantly as the first choice. But the form of attack is also changing constantly with the development of technology. In this paper we classify...
As evolving security concerns have prevailed, the network time synchronization protocol community has been actively engaged in the development of improved security mechanisms for both the IEEE 1588 Precision Time Protocol (PTP) and the IETF Network Time Protocol (NTP). These activities have matured to the point where this year should see the finalization of the first new security mechanisms for time...
Due to the increasing dependency of critical infrastructure on synchronized clocks, network time synchronization protocols have become an attractive target for attackers. We identify data origin authentication as the key security objective and therefore conduct a comprehensive, theoretical evaluation of data origin authentication schemes from different application fields with regard to their applicability...
The Internet of Things (IoT) is the current technological revolution which can upgrade the current Internet environment into a more pervasive and ubiquitous world. Due to the distributed nature and the limited hardware capabilities of IoT, a lightweight authentication scheme is necessary. A certain number of lightweight user authentication schemes suit to the IoT environment had been proposed in recent...
Radio Frequency Identification (RFID) makes it a supporting technology for the Internet of things (IoT). While RFID has been widely used and developed rapidly, its security and privacy issues cannot be ignored. With the development of cloud computing, cloud based RFID system has become a new solution. Protecting the security of RFID system in cloud environment is particularly important. Not verifying...
A major limitation in authenticating passive and remotely powered sensors, tags and cards (for e.g. radio-frequency identification tags or credit cards) is that these devices do not have access to a continuously running system clock. This obviates the use of SecureID type authentication techniques involving random keys and tokens that need to be periodically generated and synchronized. In this paper...
User experience and security are two of the most prominent quality attributes that are relevant to every system. In efforts to improve, companies attempt deploying a Single Sign-On (SSO) system that will ease user experience and improve security management. This research aims to cover the variety of the available approaches, provide a taxonomy of it and demonstrate it using a case study.
Authentication is a fundamental trust to any trust oriented computational frameworks and furthermore a basic part in numerous security protocols. This paper gives other option to conventional security inquires and OTP. They are attractive since people usually remember pictures. In this paper, we propose a sample sequence of pictorial authentication system and detriments in using OTP. Authentication...
Today, UAVs are used in various fields such as monitor, search and rescue missions as well as military. UAVs are useful in various fields, but security has always been a major concern. Additionally, UAV carries sensitive information related to people's privacy and it causes critical problems if the data is exploited by malicious attackers. There were many attempts to solve security problems of UAVs...
Self-powered timers provide a mechanism to achieve temporal synchronization between two passive devices (for e.g., RF tags, credit/access cards, and thumb drives) without the need for any external powering or clocks. As a result, the timers could be used to implement dynamic SecureID type authentication involving random keys and tokens that need to be periodically generated and synchronized. We report...
We formalize in this work a model for node capture attack in a secure wireless sensor networks (WSNs). The adversary starts by overhearing exchanged messages to learn about the network because of all data transmissions nature (all in the air). Then, it has the physical access to the node, and with appropriate tools, it can read the secret information (like keys, programs, etc.) stored in the victim...
In today's world, an enterprise user uses quite a number of applications or IT resources which have their own set of credentials. These credentials differ from system to system or applications to applications and needs to be remembered by the particular user. Also, user has to enter the different credentials too again and again whenever re-login to any application is needed. This consumes time and...
Nowadays, videos are mostly multiplexed with audios and wrapped in a multimedia container format. With speedy consumption of videos being a norm these days, authenticating video files (video + audio) becomes a challenging task. Conventional authentication schemes only focus on individual track such as audio or video. Therefore, in this work, we propose an authentication system where authentication...
Ensuring secure command and control in a tactical military environment is vital as the combat forces face many potentially sophisticated adversaries who seek out the vulnerabilities in the communications infrastructure. Although authentication schemes has been substantially explored, the ability of new techniques to coexist with existing system (i.e., legacy systems) is often overlooked. The objective...
Natural disasters take its toll on traditional communication infrastructure severely causing intermittent network connectivity due to partially or fully damaged communication infrastructure. Therefore, data dissemination is hampered and the volunteers and different disaster management agencies find it difficult to communicate among them. Fortunately, a sizeable population (around 35%–45%) these days...
Information and communication security are one of the most global security issues. As a solution of this problem emerge quantum key distribution, technology that guarantees security by the laws of physics. But without authentication this technology is also subjected to cyberattacks. In this paper physical model for authentication of B92 protocol is proposed and explained. Based on analogy with optical...
A two-factor authentication scheme that is based on a static password known only by the user and a one-time password generated by a smart card is proposed. Our design goal is to increase security level against insider attacks keeping computational costs as low as possible. Avoiding asymmetric cryptography, we achieve good efficiency results.
Multi sender attribute-based broadcast authentication scheme for the network containing resource constrained nodes is the main focus of this research. In this paper, we proposed a framework in which each element of a set of authorized users whose attributes satisfy a special sign control policy can generate a valid signature. In this framework, there exists a trusted server who receives and verifies...
In today's world, an enterprise user uses quite a number of applications or IT resources which have their own set of credentials. These credentials differ from system to system or applications to applications and needs to be remembered by the particular user. Also, user has to enter the different credentials too again and again whenever re-login to any application is needed. This consumes time and...
With the development of Internet technology, dynamic password token have won more and more favor in the field of identity authentication with the good security and ease of operation. Nowadays, foreign's SHA series of algorithms of dynamic password productsare widely using in our country, which have caused a potential threaten for the localization of information security. To realize the research and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.