دانلود و نمایش مقالات مرتبط با Authentication::صفحه 10
بلافاصله پس از پرداخت دانلود کنید

با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد). 

نتیجه جستجو - Authentication

تعداد مقالات یافته شده: 209
ردیف عنوان نوع
91 Secure key agreement based on ordered biometric features
توافق نامه كليد امن براساس ويژگي هاي بيومتريك سفارش داده شده-2019
In this work, we propose a novel secure key agreement protocol, Secure Key Agreement using Pure Or- dered Biometrics (SKA-POB), in which the cryptographic keys are generated using an ordered set of bio- metrics, without any extra shared secret data or keys. The proposed approach is instantiated using iris biometrics. Our protocol makes use of hash functions and HMAC (Hash-based Message Authentication Code) as the only cryptographic primitives; thus, it is not cryptographically resource-hungry. We also propose and integrate a window-based comparison strategy and a window reset method in SKA-POB. This way, performance is maximized without sacrificing security. Furthermore, we propose an intelligent fake block generation and distribution strategy to hide the genuine blocks in transit, which increases the resistence of our proposed protocol against correlation attacks. SKA-POB protocol works in round manner, allowing to successfully terminate with key establishment as early as possible so that the complexity is reduced for both client and server sides. Additionally, we employ multi-criteria analyses for our proposed SKA-POB protocol and we provide verification results in terms of performance analysis together with randomness, distinctiveness and attack complexity through security analysis. Results show that highly random and computationally secure keys can be generated with almost no error and with very low com- plexity.
Keywords: Biometrics | Bio-cryptography | Iris | Key agreement | Security analysis
مقاله انگلیسی
92 Design and realization of efficient & secure multi-homed systems based on random linear network coding
طراحی و تحقق سیستم های چند خانه ای کارآمد و ایمن بر اساس کدگذاری شبکه خطی تصادفی-2019
Multi-homing is a new mechanism that enables hosts with multiple network interfaces (IP addresses), to connect to more than one data link. This technology enhances Internet connectivity and reliability with- out compromising efficient performance. Like any communication system, the security of multi-homed systems is of great importance. However, this issue remains largely un-attempted, where only few pa- pers in the literature discuss, address and present security solutions for multi-homed systems. On the other hand, Random Linear Network Coding (RLNC) has recently emerged as a new coding technique that aims at improving system performance by efficiently transmitting and compressing data in general multi- source multicast networks. In this paper, a data confidentiality and availability scheme based on RNLC, is proposed for multi-homed systems. The proposed solution exploits the random physical characteristics of wireless channels, along with a pre-shared secret key, to derive dynamic keys which are used to generate random and dynamic cryptographic primitives. These primitives mainly include two permutation tables and a set of secret invertible RLNC matrices, all of which change for every input message. It has been shown that by securing the cryptographic primitives needed in the ciphering/deciphering process, one can jointly enhance the security and performance of transmitted data in multi-homed systems. Finally, security and performance analysis are presented to validate the efficiency and security of the proposed encryption/encoding scheme.
Keywords: Secure multi-homed networks | Lightweight encryption-authentication | scheme | Random linear network coding
مقاله انگلیسی
93 ANEL: A novel efficient and lightweight authentication scheme for vehicular ad hoc networks
ANEL: یک طرح احراز هویت کارآمد و سبک وزن جدید برای شبکه های ad hoc وسایل نقلیه-2019
Due to the large traffic congestion in modern-day, Vehicular Ad Hoc Network (VANET) becomes an im- portant approach to improve human safety and driving comfort. The large traffic congestion increases the number of transmitted messages, which in turn increases the computations and communications over- heads in VANET. Hence, VANET requires not only efficient communications, but also lightweight security mechanisms to overcome security challenges. There are many schemes provide security to VANET by us- ing cryptography techniques such as elliptic curve technique, session key technique, public key technique, and message authentication code technique. The schemes that use the message authentication code are called MAC-based authentication schemes. They considered as the best schemes in terms of computation and communication overheads when compared with other schemes that use other cryptography tech- niques, but they have some limitations. This paper proposes a novel efficient and lightweight authentica- tion scheme (ANEL). The ANEL is a MAC-based authentication scheme that offers all the advantages of the MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the proposed scheme can achieve security objectives of VANET such as authentication, privacy-preservation, non-repudiation, etc. Moreover, our scheme provides an efficient biological password login, system key update, biological password update, and other security services. Furthermore, in this proposed scheme, the Trust Authority (TA) can disclose the source driver and vehicle of each malicious message. The se- curity analysis shows that ANEL is the first scheme that provides countermeasures on the disclosure of system key, and it can protect VANET from various well-known attacks. The comparison results of our scheme with existing MAC-based authentication schemes in terms of computation overhead, communi- cation overhead, and security services show that the proposed scheme is more efficient and provides a high level of security. The simulation results with ONE simulator demonstrate that our scheme reduces the message authentication time and end-to-end delay when compared with previous security schemes discussed in the literature.
Keywords: Vehicular ad hoc network | Authentication | Security | ONE simulation
مقاله انگلیسی
94 An efficient privacy-preserving protocol for database-driven cognitive radio networks
یک پروتکل موثر برای حفظ حریم خصوصی برای شبکه های رادیویی شناختی محور از پایگاه داده-2019
Cognitive radio is regarded as a promising technology for remedying spectrum shortage and improving spectrum utilization. However, database-driven cognitive radio networks (CRNs) are vulnerable to a series of security attacks and privacy threats, especially the privacy breach of secondary users (SUs). In this paper, we propose an efficient privacy-preserving protocol to protect the identity and trajectory privacy of each SU and to prevent the database (DB) from tracing any SU. Besides, this paper also aims at improving the efficiency of authentication and channel allocation to offer the best connectivity to SUs wherever they are and at any time. Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which enhances the security of CRNs communication. Based on channel pre-allocation to BSs, our protocol reduces the latency of obtaining available channels for SUs. Moreover, our protocol exploits reputation to motivate SUs to be honest and thus increases the utilization of the limited spectrum resources. The results of security analysis show that our protocol provides strong privacy preservation for SUs that the DB cannot get the entire trajectory of any SU, even the DB colludes with all BSs. Furthermore, the results also show that the proposed protocol can resist various types of attacks. The results of performance evaluation indicate the efficiency of the proposed privacy-preserving protocol.
Keywords: Cognitive radio networks | Privacy-preserving | Authentication | Elliptic curve cryptography | Reputation
مقاله انگلیسی
95 Enhanced authentication and key management scheme for securing data transmission in the internet of things
تصدیق پیشرفته و برنامه مدیریت کلیدی برای اطمینان از انتقال داده ها در اینترنت اشیا-2019
The Internet of Things (IoT), with its smartness and intelligence, is gradually changing human life by al- lowing everyday objects to be connected to the Internet. With the prevalence of the IoT, wireless sensor networks (WSNs) are attracting worldwide attention, because they cover a wide range of IoT applica- tions. The sensors collect data from the physical world and communicate with each other through wire- less links. Ensuring the security and privacy of WSNs’ communication is challenging. Recently, a secure authentication and key management scheme was proposed to secure data transmission in WSNs. In this paper, we show that this scheme has various security flaws, such as replay attack, denial of service attack, impersonation attack, and lack of mutual authentication and session key agreement. Then, we propose an enhanced scheme to overcome the identified security weaknesses. The security of the enhanced scheme is formally verified using the Burrows–Abadi–Needham logic and the Automated Validation of Internet Security Protocols and Applications tool. Our proposed scheme is more secure, efficient, and suitable for WSN-based IoT applications than recent related methods.
Keywords: Privacy | Mutual authentication | Key agreement | Elliptic curve cryptography | BAN logic | AVISPA
مقاله انگلیسی
96 Preserving data security in distributed fog computing
حفظ امنیت داده ها در محاسبات مه آلود-2019
In this paper, a novel cryptographic solution is proposed to secure data in fog computing. The so- lution combines the AES-GMAC operation mode with information dispersal over GF(2 w ) to provide data confidentiality, integrity, and availability along with source authentication. The value of w is flexible (8, 16, 32 or 64) and it could be configured according to the fog device features. More- over, the proposed cryptographic solution is based on the dynamic key-dependent approach, which allows for a good compromise between the security level and computational complexity. In the pro- posed solution, the collected data at one fog node is encrypted, authenticated and dispersed in a pseudo-random manner to its n neighbor fog nodes. For data recovery, any k of the n frag- ments along with the corresponding dynamic key are required to retrieve the original data. This complicates the attackers task who needs to compromise at least k fog nodes to disclose the encrypted data. Additionally, attackers should seek the dynamic key, which is different for each input data. On the other hand, redundant fragments protect the stored data against up to ( n −k ) fog nodes’ failure or un- availability. The security and performance analysis tests show that the proposed security scheme exhibits a high level of efficiency and robustness
مقاله انگلیسی
97 An efficient CPPA scheme for intelligent transportation networks
یک طرح کارآمد CPPA برای شبکه های حمل و نقل هوشمند-2019
To defend intelligent transportation networks’ security and privacy, existing standards employ the Public Key Infrastructure (PKI) authentication framework. However, the high associated PKI computation and communication overheads break ground for utilizing an alternative candidate, the Identity-based Cryptographic (IBC) authentication. Most of the underlined calculations of the IBC approaches rely on the elliptic curves’ pairing operation. Since the pairing function is a complex and computation intensive operation, several studies have developed pairingless IBC authentications and applied the hardware security of tamper-proof devices to secure the cryptographic parameters at user-end. Motivated by this trend, we compose a Pairingless Modified Efficient Conditional Privacy- Preserving Authentication Scheme (PME-CPPAS). Our scheme omits the utilization of the complex pairing operation as well as the demand for expensive tamper-proof devices. When analyzing the performance of the presented design, its effectiveness, in comparison to the available pairing-based and pairingless approaches, is proved in terms of computation complexity, communication overhead, and storage overhead. PME-CPPAS achieves less signing computational cost and comparable verification computational performance.
Keywords: Intelligent transportation/vehicular | networks | Authentication | Conditional privacy | Elliptic curve cryptography | Identity-based signature | Bilinear pairings | Tamper-proof device
مقاله انگلیسی
98 Quantum Cryptography for Internet of Things Security
رمزنگاری کوانتومی برای امنیت اینترنت اشیاء-2019
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security.
Index Terms : Internet of things | quantum computing | quantum cryptography | security
مقاله انگلیسی
99 Alternative data mining/machine learning methods for the analytical evaluation of food quality and authenticity : A review
روشهای یادگیری و استخراج داده های جایگزین برای ارزیابی تحلیلی کیفیت و اصالت مواد غذایی : بررسی-2019
In recent years, the variety and volume of data acquired by modern analytical instruments in order to conduct a better authentication of food has dramatically increased. Several pattern recognition tools have been developed to deal with the large volume and complexity of available trial data. The most widely used methods are principal component analysis (PCA), partial least squares-discriminant analysis (PLS-DA), soft independent modelling by class analogy (SIMCA), k-nearest neighbours (kNN), parallel factor analysis (PARAFAC), and multivariate curve resolution-alternating least squares (MCR-ALS). Nevertheless, there are alternative data treatment methods, such as support vector machine (SVM), classification and regression tree (CART) and random forest (RF), that show a great potential and more advantages compared to conventional ones. In this paper, we explain the background of these methods and review and discuss the reported studies in which these three methods have been applied in the area of food quality and authenticity. In addition, we clarify the technical terminology used in this particular area of research
Keywords: Data mining | Random forest | CART | Decision tree | Food analysis
مقاله انگلیسی
100 A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities
مروری بر امنیت سایبری ، حریم خصوصی داده ها و مسائل مربوط به سیاست در استقرار سیستم سایبر فیزیکی در شهرهای هوشمند-2019
Deployments of Cyber Physical Systems (CPSs) in smart cities are poised to significantly improve healthcare, transportation services, utilities, safety, and environmental health. However, these efficiencies and service improvements will come at a price: increased vulnerability and risk. Smart city deployments have already begun to proliferate, as have the upsides, efficiencies, and cost-savings they can facilitate. There are, however, proliferating challenges and costs as well. These challenges include important technical questions, but equally important policy and organizational questions. It is important to understand that these policy and technical implementation hurdles are perhaps equally likely to slow or disable smart city implementation efforts. In this paper, a survey of the theoretical and practical challenges and opportunities are enumerated not only in terms of their technical aspects, but also in terms of policy and governance issues of concern..
Keywords: Smart cities | Cyber security | Government policy making | Cryptography | Security and privacy | Authentication
مقاله انگلیسی
rss مقالات ترجمه شده rss مقالات انگلیسی rss کتاب های انگلیسی rss مقالات آموزشی
logo-samandehi
بازدید امروز: 10 :::::::: بازدید دیروز: 0 :::::::: بازدید کل: 10 :::::::: افراد آنلاین: 52