با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
A secure elliptic curve cryptography based mutual authentication protocol for cloud-assisted TMIS
پروتکل احراز هویت متقابل منحنی بیضوی امن برای TMIS با کمک ابر-2019 With the fast progress of network communication, its technologies and the developing popularity
of telecare medical information system (TMIS), doctors provide treatment to patients via Internet
without visiting hospitals. By using mobile device, wireless body area network and cloud based
architecture, the patients can gather their physiological information and upload to cloud via their
mobile devices. The authenticated doctor provides online treatment to patient at anytime and
anywhere. Moreover, TMIS maintains security and privacy of the patients in information communication
and authenticated to all the participants before assessing this system. Recently Li
et al. (2018) presented a cloud-assisted authentication and privacy preservation scheme for TMIS.
They believed that their scheme secure against all well-known privacy and security attributes. In
the proposed work, we reviewed Li et al. authentication protocol and found that it has various
security flaws like as message authentication fails in healthcare center upload phase, session key
is not possible in healthcare center upload phase, impersonation attack in patient data upload
phase, patient anonymity and patient unlinkability. Further, we introduced enhance protocol in
similar environment. The proposed protocol secure against man-in-the-middle attack, patient
anonymity, replay attack, known-key security property, data confidentiality, data non-repudiation,
message authentication, impersonation attack, session key security and patient unlinkability.
We compared the proposed protocol with existing related protocols in same cloud based
TMIS. The proposed protocol ensures of all desirable security prerequisites and managed the
efficiency in terms of computation and communication costs for cloud-assisted TMIS. Keywords: Cloud computing | Elliptic curve cryptography | TMIS | Medical data | Mutual authentication |
مقاله انگلیسی |
2 |
Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography
پروتکل احراز هویت کاربر از راه دور سبک وزن برای شبکه های 5G چند سرور با استفاده از رمزنگاری کلید عمومی عمومی خود گواهی شده-2019 Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication
protocol needs to be developed for complex 5G networks. In this paper, we propose a lightweight and untraceable
authentication protocol for multi-server-based 5G networks. To reduce computational complexity, we employ selfcertified
public key cryptography based on elliptic curve cryptography to authenticate the validation of users and
servers. Without pairing operations, our scheme could improve performance efficiency. Also, a formal security
model is designed to prove that our protocol is secure against forgery attack due to the discrete logarithm and the
computational Diffie-Hellman problem. Performance analysis further shows that our protocol has a lower
communication and computational overhead. Also, our protocol could support anonymous mutual authentication. Keywords: Multi-server | Mutual authentication | Lightweight |
مقاله انگلیسی |
3 |
An elliptic curve cryptography based mutual authentication scheme for smart grid communications using biometric approach
رمزنگاری منحنی بیضوی مبتنی بر طرح احراز هویت متقابل برای ارتباطات شبکه هوشمند با استفاده از روش بیومتریک-2019 Smart grid (SG) provides a suitable adjustment in the amount of power generation by providing the ability
to supervise consumer behavior. SG uses in the smart system to encourage cultural heritage because it
is accountable for providing power without any interruption. SG is one of the vital components to authorize
smart systems with a lot of smart features to attract visitors to come and visit heritage. In SG, environment
security and privacy are the major concern for communications. An authentication protocol
provides secure communication between users and service provider for security and privacy purpose.
Several authentication protocols are available in the literature. However, they are enabled to known security
attacks easily or they are not computationally efficient for SG communication. In the present paper,
we design an ECC-based mutual authentication protocol for smart grid communication using biometric
approach. The present framework satisfy various security features such as replay attack, user anonymity,
man in the middle attack, key freshness, message authentication, session key agreement, impersonation
attack, non-traceability and non-transferability. Further, the proposed protocol takes much less communication
and computation costs compared with other existing protocols in SG environment. Therefore,
our scheme is convenient for practical application in SG communication Keywords: Biometric | Elliptic curve cryptography | Fuzzy extractor | Mutual authentication | Smart grid security and privacy |
مقاله انگلیسی |
4 |
Enhanced authentication and key management scheme for securing data transmission in the internet of things
تصدیق پیشرفته و برنامه مدیریت کلیدی برای اطمینان از انتقال داده ها در اینترنت اشیا-2019 The Internet of Things (IoT), with its smartness and intelligence, is gradually changing human life by al- lowing everyday objects to be connected to the Internet. With the prevalence of the IoT, wireless sensor networks (WSNs) are attracting worldwide attention, because they cover a wide range of IoT applica- tions. The sensors collect data from the physical world and communicate with each other through wire- less links. Ensuring the security and privacy of WSNs’ communication is challenging. Recently, a secure authentication and key management scheme was proposed to secure data transmission in WSNs. In this paper, we show that this scheme has various security flaws, such as replay attack, denial of service attack, impersonation attack, and lack of mutual authentication and session key agreement. Then, we propose an enhanced scheme to overcome the identified security weaknesses. The security of the enhanced scheme is formally verified using the Burrows–Abadi–Needham logic and the Automated Validation of Internet Security Protocols and Applications tool. Our proposed scheme is more secure, efficient, and suitable for WSN-based IoT applications than recent related methods. Keywords: Privacy | Mutual authentication | Key agreement | Elliptic curve cryptography | BAN logic | AVISPA |
مقاله انگلیسی |
5 |
Provably secure authenticated key agreement scheme for distributed mobile cloud computing services
طرح توافقنامه کلیدی تأیید امن برای خدمات محاسبات ابری سیار توزیع شده-2017 With the rapid development of mobile cloud computing, the security becomes a crucial part of
communication systems in a distributed mobile cloud computing environment. Recently, in 2015, Tsai
and Lo proposed a privacy-aware authentication scheme for distributed mobile cloud computing services.
In this paper, we first analyze the Tsai–Lo’s scheme and show that their scheme is vulnerable to server
impersonation attack, and thus, their scheme fails to achieve the secure mutual authentication. In
addition, we also show that Tsai–Lo’s scheme does not provide the session-key security (SK-security)
and strong user credentials’ privacy when ephemeral secret is unexpectedly revealed to the adversary.
In order to withstand these security pitfalls found in Tsai–Lo’s scheme, we propose a provably secure
authentication scheme for distributed mobile cloud computing services. Through the rigorous security
analysis, we show that our scheme achieves SK-security and strong credentials’ privacy and prevents
all well-known attacks including the impersonation attack and ephemeral secrets leakage attack.
Furthermore, we simulate our scheme for the formal security analysis using the widely-accepted AVISPA
(Automated Validation of Internet Security Protocols and Applications) tool, and show that our scheme
is secure against passive and active attacks including the replay and man-in-the-middle attacks. More
security functionalities along with reduced computational costs for the mobile users make our scheme
more appropriate for the practical applications as compared to Tsai–Lo’s scheme and other related
schemes. Finally, to demonstrate the practicality of the scheme, we evaluate the proposed scheme using
the broadly-accepted NS-2 network simulator.
Keywords: Cloud computing | SK-security | Mutual authentication | User untraceability | AVISPA | NS2 simulation |
مقاله انگلیسی |
6 |
احراز هویت متقابل در امنیت سیستم پرداخت سیار با استفاده از کد QR رمزنگاری شده براساس زیرساخت کلید عمومی
سال انتشار: 2016 - تعداد صفحات فایل pdf انگلیسی: 5 - تعداد صفحات فایل doc فارسی: 16 تراکنش پرداختی با استفاده تلفن همراه دارای ریسک های احتمالی نیز می باشد. دستگاه های موبایل هنوز امن نیستند و نیاز به توجه بیشتری در منطقه امنیتی دارند. در این مقاله، روش کدهای احراز هویتِ متقابل بین مشتری و بازرگان با استفاده از رمزنگاری کد QR را ارائه می دهیم. کد QR به طور گسترده در تکنولوژی های اخیر مورد استفاده قرار گرفته است. کد QR می تواند اطلاعات بیشتری را از یک بارکد سنتی ذخیره کند. این سیستم امنیتی با استفاده از زیرساخت کلید عمومی (PKI) یک لایه امنیتی اضافی را تضمین می¬کند.
کلمات کلیدی: کد QR | زیرساخت کلید عمومی (PKI) | پرداخت همراه | امنیت |
مقاله ترجمه شده |
7 |
A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion
یک رویکر برای تأیید هویت کاربر و طرح توافق کلیدی برای شبکه های حسگر بی سیم ناهمگن، بر اساس اوضاع اینترنت-2014 The idea of the Internet of Things (IOT) notion is that everything within the global network is accessible and interconnected. As such Wireless Sensor Networks (WSN) play a vital role in such an environment, since they cover a wide application field. Such interconnection can be seen from the aspect of a remote user who can access a single desired sensor node from the WSN without the necessity of firstly connecting with a gateway node (GWN). This paper focuses on such an environment and proposes a novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks. The proposed scheme enables a remote user to securely negotiate a session key with a general sensor node, using a lightweight key agreement protocol. The proposed scheme ensures mutual authentication between the user, sensor node, and the gateway node (GWN), although the GWN is never contacted by the user. The proposed scheme has been adapted to the resource-constrained architecture of the WSN, thus it uses only simple hash and XOR computations. Our proposed scheme tackles these risks and the challenges posed by the IOT, by ensuring high security and performance features.
Keywords
Wireless sensor network;
Ad hoc;
Mutual authentication;
Key agreement;
Smart card;
Internet of Things |
مقاله انگلیسی |