Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
23 result(s) for "Emerging Authentication"
Sort by:
Innovative passwordless authentication approaches in IoT identity management
A global ecosystem of networked sensors, actuators, and other devices intended for data exchange and interaction is known as the Internet of Things (IoT). Password-based authentication has been a major component of [oT solutions historically, despite its numerous flaws. This survey article provides a thorough analysis of the literature with an emphasis on the implementation of authentication without the use of passwords on the Internet of Things. Ensuring that authorized persons have the correct access to related IT incomes under the correct situations is the core necessity behind enterprise IoT security. Identity managing, the first line of protection in initiative security, is a key component of this project. Traditional passwordbased authentication systems are frequently regarded as \"high friction,\" causing users' problems and lengthy procedures in addition to being vulnerable to different security threats. IoT businesses are investigating password less authentication techniques more frequently in an effort to improve user productivity while preserving strong security assurance in response to these difficulties. A comprehensive analysis of password less authentication mechanisms designed for the Internet of Things is presented in this article.
Strengthening Cybersecurity Resilience: An Investigation of Customers’ Adoption of Emerging Security Tools in Mobile Banking Apps
The rise in internet-based services has raised risks of data exposure. The manipulation and exploitation of sensitive data significantly impact individuals’ resilience—the ability to protect and prepare against cyber incidents. Emerging technologies seek to enhance cybersecurity resilience by developing various security tools. This study aims to explore the adoption of security tools using a qualitative research approach. Twenty-two semi-structured interviews were conducted with users of mobile banking apps from Pakistan. Data were analyzed using thematic analysis, which revealed that biometric authentication and SMS alerts are commonly used. Limited use of multifactor authentication has been observed, mainly due to a lack of awareness or implementation knowledge. Passwords are still regarded as a trusted and secure mechanism. The findings indicate that the adoption of security tools is based on perceptions of usefulness, perceived trust, and perceived ease of use, while knowledge and awareness play a moderating role. This study also proposes a framework by extending TAM to include multiple security tools and introducing knowledge and awareness as a moderator influencing users’ perceptions. The findings inform practical implications for financial institutions, application developers, and policymakers to ensure standardized policy to include security tools in online financial platforms, thereby enhancing overall cybersecurity resilience.
A Secure Cloud-Assisted Wireless Body Area Network in Mobile Emergency Medical Care System
Recent advances in medical treatment and emergency applications, the need of integrating wireless body area network (WBAN) with cloud computing can be motivated by providing useful and real time information about patients’ health state to the doctors and emergency staffs. WBAN is a set of body sensors carried by the patient to collect and transmit numerous health items to medical clouds via wireless and public communication channels. Therefore, a cloud-assisted WBAN facilitates response in case of emergency which can save patients’ lives. Since the patient’s data is sensitive and private, it is important to provide strong security and protection on the patient’s medical data over public and insecure communication channels. In this paper, we address the challenge of participant authentication in mobile emergency medical care systems for patients supervision and propose a secure cloud-assisted architecture for accessing and monitoring health items collected by WBAN. For ensuring a high level of security and providing a mutual authentication property, chaotic maps based authentication and key agreement mechanisms are designed according to the concept of Diffie-Hellman key exchange, which depends on the CMBDLP and CMBDHP problems. Security and performance analyses show how the proposed system guaranteed the patient privacy and the system confidentiality of sensitive medical data while preserving the low computation property in medical treatment and remote medical monitoring.
Towards a blockchain-based certificate authentication system in Vietnam
Anti-forgery information, transaction verification, and smart contract are functionalities of blockchain technology that can change the traditional business processes of IT applications. These functionalities increase the data transparency, and trust of users in the new application models, thus resolving many different social problems today. In this work, we take all the advantages of this technology to build a blockchain-based authentication system (called the Vietnamese Educational Certification blockchain, which stands for VECefblock) to deal with the delimitation of fake certificate issues in Vietnam. In this direction, firstly, we categorize and analyze blockchain research and application trends to make out our contributions in this domain. Our motivating factor is to curb fake certificates in Vietnam by applying the suitability of blockchain technology to the problem domain. This study proposed some blockchain-based application development principles in order to build a step by step VECefblock with the following procedures: designing overall architecture along with business processes, data mapping structure and implementing the decentralized application that can meet the specific Vietnamese requirements. To test system functionalities, we used Hyperledger Fabric as a blockchain platform that is deployed on the Amazon EC2 cloud. Through performance evaluations, we proved the operability of VECefblock in the practical deployment environment. This experiment also shows the feasibility of our proposal, thus promoting the application of blockchain technology to deal with social problems in general as well as certificate management in Vietnam.
Microservice security: a systematic literature review
Microservices is an emerging paradigm for developing distributed systems. With their widespread adoption, more and more work investigated the relation between microservices and security. Alas, the literature on this subject does not form a well-defined corpus : it is spread over many venues and composed of contributions mainly addressing specific scenarios or needs. In this work, we conduct a systematic review of the field, gathering 290 relevant publications—at the time of writing, the largest curated dataset on the topic. We analyse our dataset along two lines: (a) quantitatively, through publication metadata, which allows us to chart publication outlets, communities, approaches, and tackled issues; (b) qualitatively, through 20 research questions used to provide an aggregated overview of the literature and to spot gaps left open. We summarise our analyses in the conclusion in the form of a call for action to address the main open challenges.
A Selective Group Authentication Scheme for IoT-Based Medical Information System
The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir’s threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.
IBE-BCIOT: an IBE based cross-chain communication mechanism of blockchain in IoT
Cross-platform difficulties, data privacy, and authentication security are common problems in the Internet of Things (IoT) environment. Despite the fact that blockchain technology has brought new opportunities to the development of the IoT by enhancing interoperability, improving privacy and security, there are still problems such as diversity, lack of communication and sharing. To solve the security authentication problem in the IoT environment and the cross-chain communication problem in the blockchain platform, an Identity-Based Encryption (IBE) based cross-chain communication mechanism of Blockchain in IoT (IBE-BCIOT). This mechanism elects the proxy nodes of each blockchain in multiple blockchains, and passes theIDof the proxy node, as the public key, to the cross-chain notary. Then, the cross-chain notary calculates the corresponding private key through the IBE mechanism, and returns it to the proxy node in a secure way, to achieve safe and efficient communication between blockchains. Next, the IBE-BCIOT mechanism provides two cross-chain communication schemes: the direct cross-chain communication scheme among the proxy nodes, and the indirect cross-chain communication scheme through the notary. We also build a blockchain-based on the FICSO BCOS platform to implement the IBE-BCIOT mechanism and analyze its security. The performance of the proposed two cross-chain communication schemes was verified in experiments of the IoT environment. The experimental results show that IBE-BCIOT is an effective IoT cross-chain communication mechanism.
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps
The developments in telecommunication and online facility resolutions help to connect the digital divide among urban and rural healthcare services administrations, empowering arrangement of appropriate medicinal finding and treatment discussions. Mobile-healthcare ( m -Healthcare) systems can be used for quality improvement of healthcare and monitoring individuals with chronic diseases like heart disease and diabetes under medical affair. Wireless body area networks are installed in the human body, which transmit the information via Bluetooth or other means to the smartphone. In this study, we introduce a new efficient mobile-healthcare emerging emergency medical system using conformable chaotic maps under cloud computing environment.
Simultaneous encryption and authentication of messages over GPUs
There has recently been a rising interest in inventing new efficient cryptographic algorithms, thanks to advances in the field of Graphics Processing Unit (GPU) technology. Current cryptographic algorithms have been implemented with GPUs, including the Advanced Encryption Standard algorithm (AES) and the Secure-Hash Algorithm 3 (SHA3). However, the currently available cryptographic approaches cannot fully benefit from the GPU’s capabilities, as they are not designated in accordance with the GPU characteristics. Therefore, they are not carried out in an efficient manner. Thus, the need to design new cryptographic algorithms that can achieve the best performances without degrading the security level. In this work, a new message Encryption and Authentication Algorithm (MEAA) is specifically proposed for graphics processing units (GPUs). It consists of one-round encryption and authentication functions that are based on the dynamic key-dependent scheme. Experimental results indicate that the proposed approach reaches a throughput of over 580 GB/s over the GPU Tesla A100. Additionally, it demonstrates that the performance improvement ratio is better than that of existing methods. On the other hand, the proposed MEAA is impervious to well-known cryptanalysis attacks since it is based on the dynamic key strategy, and different primitives of cryptography, which are employed for each new input message.
Bat optimized 3D anaglyph image watermarking based on maximum noise fraction in the digital Shearlet domain
The unparalleled growth of multimedia data sharing through the internet has made copyright protection and authentication a topical affair. In this paper, we propose a robust watermarking scheme for 3D red-cyan anaglyph stereo image authentication and copyright protection with Maximum Noise Fraction in the digital Shearlet domain. A precise Human Visual System-based approach has been integrated via Digital Shearlet Transform, to make full utilization of perceptual watermarking. The highest energy Maximum Noise Fraction Eigen image has been selected via entropy calculation followed by impregnation of the watermark inside the highest energy first Eigen image returned by Maximum Noise Fraction, using a total insertion based approach. An efficient watermarking approach is always a trade-off between imperceptibility and robustness. A reliable metaheuristic optimization approach, namely the Bat algorithm has been incorporated to find the optimum embedding factor, which provides high robustness while maintaining sublime imperceptibility. Moreover, the watermark’s security has further been improved by encrypting it with a novel Hénon chaotic system-based cryptic algorithm. Qualitative and quantitative comparison with other state-of-the-art methods is a proof of the primacy of the proposed framework under most intentional and unintentional malicious impairments.