Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Item TypeItem Type
-
SubjectSubject
-
YearFrom:-To:
-
More FiltersMore FiltersSourceLanguage
Done
Filters
Reset
22
result(s) for
"untraceability"
Sort by:
A lightweight and anonymous RFID tag authentication protocol with cloud assistance for e-healthcare applications
by
Wu, Fan
,
Kumari, Saru
,
Shen, Jian
in
Artificial Intelligence
,
Authentication
,
Cloud computing
2018
As an important part of Internet of Things, Radio Frequency Identification (RFID) system employs low-cost RFID tag to communicate with everything containing animate and inanimate objects. This technology is widely used in the e-healthcare applications. However, the malicious communication environment makes people more and more worried. In order to overcome the hazards in the network, RFID authentication schemes for e-healthcare have been proposed by researchers. But since the computation ability of the tag is relatively weak, it is necessary to put forward a lightweight and secure scheme for medical systems. Moreover, cloud is widely accepted by people and used in many kinds of systems. So we propose a novel and lightweight RFID authentication scheme with cloud for e-healthcare applications. We use an enhanced formal security model to prove the security of our scheme. In this model the channel between the server and the reader is considered to be insecure and informal analysis is used to prove the security of the proposed scheme. Through the formal and informal analysis, our scheme not only resists the common attacks, but also keeps mutual authentication, information integrity, forward untraceability and backward untraceability. Moreover, both the tag and the reader can reach the anonymity. Our scheme is only hash-based and suitable to realize various security requirements. Compared to recent schemes of the same sort, it is more applicable in e-healthcare.
Journal Article
The Effect of the General Data Protection Regulation on Medical Research
by
Pierscionek, Barbara
,
Rumbold, John Mark Michael
in
Analysis
,
Biomedical research
,
Biomedical Research - ethics
2017
The enactment of the General Data Protection Regulation (GDPR) will impact on European data science. Particular concerns relating to consent requirements that would severely restrict medical data research have been raised.
Our objective is to explain the changes in data protection laws that apply to medical research and to discuss their potential impact.
Analysis of ethicolegal requirements imposed by the GDPR.
The GDPR makes the classification of pseudonymised data as personal data clearer, although it has not been entirely resolved. Biomedical research on personal data where consent has not been obtained must be of substantial public interest.
The GDPR introduces protections for data subjects that aim for consistency across the EU. The proposed changes will make little impact on biomedical data research.
Journal Article
A Lightweight Three-Factor Authentication and Key Agreement Scheme in Wireless Sensor Networks for Smart Homes
2019
A wireless sensor network (WSN) is used for a smart home system’s backbone that monitors home environment and controls smart home devices to manage lighting, heating, security and surveillance. However, despite its convenience and potential benefits, there are concerns about various security threats that may infringe on privacy and threaten our home life. For protecting WSNs for smart homes from those threats, authentication and key agreement are basic security requirements. There have been a large number of proposed authentication and key agreement scheme for WSNs. In 2017, Jung et al. proposed an efficient and security enhanced anonymous authentication with key agreement scheme by employing biometrics information as the third authentication factor. They claimed that their scheme resists on various security attacks and satisfies basic security requirements. However, we have discovered that Jung et al.’s scheme possesses some security weaknesses. Their scheme cannot guarantee security of the secret key of gateway node and security of session key and protection against user tracking attack, information leakage attack, and user impersonation attack. In this paper, we describe how those security weaknesses occur and propose a lightweight three-factor authentication and key agreement scheme in WSNs for smart homes, as an improved version of Jung et al.’s scheme. We then present a detailed analysis of the security and performance of the proposed scheme and compare the analysis results with other related schemes.
Journal Article
Internet of Things (IoT) Based Design of a Secure and Lightweight Body Area Network (BAN) Healthcare System
by
Chen, Chin-Ling
,
Tsaur, Woei-Jiunn
,
Tang, Yung-Wen
in
body area network
,
cloud computation
,
healthcare
2017
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
Journal Article
A design of provably secure multi-factor ECC-based authentication protocol in multi-server cloud architecture
2024
The emerging cloud infrastructure has escalated number of servers offering flexible and diverse remote services through public channels. However, user authentication in conventional single-server architecture necessitates multiple smart cards maintenance and passwords memorization to access different cloud servers. To address this limitation, researchers devised authentication protocols for multi-server architecture that offers scalable platform wherein users can access multiple servers with single registration. The multi-factor authentication protocols leverage biometric keys to bind users’ physical characteristics with their identity, offering higher security than two-factor authentication protocols. However, the existing protocols for multi-server architecture are prone to replay, user impersonation, denial of service, server spoofing attacks and lack security functionalities such as user anonymity and untraceability, backward and forward secrecy, and session key security. Moreover, the incorporation of registration center (
RC
) to authenticate each pair of user-server in multi-server architecture can lead to computational bottleneck and single-point failure issues on
RC
. To overcome these security loopholes, we design a novel provably secure multi-factor elliptic curve cryptography (ECC) based authentication protocol for multi-server architecture with offline
RC
for cloud environment. The formal security analysis under widely accepted real-or-random (ROR) model and informal security analysis of proposed protocol demonstrate provision of security functionalities and resilience against potential security attacks. Furthermore, we adopt Scyther security verification tool to verify our protocol’s correctness and security properties. The performance evaluation demonstrates that our protocol offers robust security functionalities with reasonable communication and computation overheads than state-of-the-art protocols.
Journal Article
The political implication of the ‘untraceability’ of structural injustice
2024
Structural Injustice has become a hugely important concept in the field of political theory with the work of Iris Marion Young central to debates on what it is, what motivates it and how it should be addressed. In this article, I focus on a particular thread in Young’s account of structural injustice which I argue is all too often overlooked - the untraceability of structural injustice. This is not only a constant theme in Young’s account of structural injustice, it is, in fact, a defining feature. By ‘untraceable’, Young means that structural injustice is distinct from other sorts of injustices for which there is a traceable agent at fault – these sorts of faut-based injustices fall under what Young calls the ‘liability model of injustice’. For the purposes of exploring the concept of structural injustice, I follow the logic of the claim that structural injustice is untraceable to see where it takes us in conversation with Young’s critics. I conclude that Young’s account is not only defensible with some clarification and development but vital politically. That said, I also find Young’s account of political responsibility for structural injustice wanting and accordingly I propose a way of understanding what I see as a dynamic transition from structural to fault-based injustices which I argue Young’s more ‘static’ account fails to accommodate. This is important, I suggest, for thinking about the ways in which responsibility for different forms of injustice operate and change.Contemporary Political Theory (2023). https://doi.org/10.1057/s41296-023-00634-4
Journal Article
Secure and efficient authentication protocol with user untraceability for global roaming services
by
Bhattacharya Ansuman
,
Roy, Prasanta Kumar
in
Authentication
,
Authentication protocols
,
Cryptography
2021
In case of global roaming services, user authentication plays an important role in order to prevent any unauthorized user from accessing services. Preserving anonymity and unlinkability are also crucial to ensure user untraceability over public channel. However, achieving user authenticity and untraceability are not sufficient to guarantee a secure communication. Several active and passive attacks may breach the system security as the mode of communication is considered to be wireless. Hence, requiring a well-designed protocol to resist these vulnerabilities. In this article, we put forward a secure and efficient authentication protocol with user untraceability for global roaming services. The proposed protocol utilizes low-cost cryptographic primitives such as symmetric key encryption/decryption and one-way hash function. We use dynamic keys (rather than long-term keys) to ensure forward/backward secrecy of the session key. The use of dynamic pseudonym ensures user anonymity and unlinkability over public channel. In addition, there is no need to re-synchronize the peers in case of desynchronization attack. The security validation of the proposed protocol is done both formally and informally to ensure robustness of the protocol under various active and passive attacks. Finally, we compare our protocol with some recently proposed approaches in terms of various security and design parameters to ensure its efficiency for low-power applications of global roaming services.
Journal Article
AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS
by
Salem, Fatty M
,
Hassan Hosny, Hadeer A
,
Saad, Elsayed M
in
anonymity
,
authentication
,
Electronic health records
2024
Owing to the fast advancements of wireless communication, the telehealthcare platform makes it possible for patients to access healthcare services online. However, creating a secure and efficient authentication scheme for healthcare systems still presents a challenge. Several solutions have been introduced, but the majority of them are shortly found to be unable to meet some essential security standards. In this paper, we first revisit Dharminder et al.'s scheme and prove its failure to provide mutual authentication and pacient’s untraceability and its vulnerability to impersonation attacks. Furthermore, we suggest an improved RSA-based authentication scheme to mitigate the deficiencies observed in Dharminder et al.'s schema. The proposed scheme can provide mutual authentication, patients’ anonymity and untraceability and resist various types of attacks. Extensive evaluation on AVISPA proves the safeness of the proposed scheme against both passive and active attacks. Additionally, the proposed scheme is computationally and communicationally more efficient in comparison to other existing schemes.
Journal Article
On Secure Simple Pairing in Bluetooth Standard v5.0-Part II: Privacy Analysis and Enhancement for Low Energy
by
Sun, Da-Zhi
,
Yang, Ying
,
Sun, Li
in
Bluetooth standard
,
cryptographic protocol
,
International conferences
2019
Bluetooth low energy devices are very popular in wireless personal area networks. According to the Bluetooth standard specifications, the low energy secure simple pairing (LESSP) protocol is the process by which the pairing devices negotiate the authenticated secret key. To violate the user privacy, the adversary can perhaps link the runs of the LESSP protocol to the targeted device, which usually relates to the specially appointed user. Hence, we investigate deep into the privacy of the LESSP protocol. Our main contributions are threefold: (1) We demonstrate that the LESSP protocol suffers from privacy vulnerability. That is, an adversary without any secret key is able to identify the targeted device by the LESSP protocol. (2) An improvement is therefore proposed to repair the privacy vulnerability in the LESSP protocol. (3) We develop a formal privacy model to evaluate the privacy vulnerabilities in the LESSP protocol and its improved versions. We further prove that our improvement on the LESSP protocol is private under the privacy model. In addition, the performance evaluation shows that our improvement is as efficient as the LESSP protocol. Our research results are beneficial to the privacy enhancement of Bluetooth systems in wireless personal area networks.
Journal Article
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
by
Das, Sangjukta
,
Namasudra, Suyel
,
Singh, Maheshwari Prasad
in
Artificial Intelligence
,
Authentication
,
Authentication protocols
2024
Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may be connected to the gateway through another device in the network. In such a scenario, new device should be authenticated with the gateway through the intermediate device. To address this issue, an authentication process is proposed in this paper for IoT-enabled healthcare systems. This approach performs a privacy-preserving mutual authentication between the gateway and an IoT device through intermediate devices, which are already authenticated by the gateway. The proposed approach relies on the session key established during gateway-intermediate device authentication. To emphasizes lightweight and efficient system, the proposed approach employs lightweight cryptographic operations, such as XOR, concatenation, and hash functions within IoT networks. This approach goes beyond the traditional device-to-device authentication, allowing authentication to propagate across multiple devices or nodes in the network. The proposed work establishes a secure session between an authorized device and a gateway, preventing unauthorized devices from accessing healthcare systems. The security of the protocol is validated through a thorough analysis using the AVISPA tool, and its performance is evaluated against existing schemes, demonstrating significantly lower communication and computation costs.
Journal Article