Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 5 de 5
Filter
1.
11th International Conference on System Modeling and Advancement in Research Trends, SMART 2022 ; : 1589-1595, 2022.
Article in English | Scopus | ID: covidwho-2281680

ABSTRACT

In Today's World, Blockchain is a promising Technology in all areas;things have also been drastically changed after COVID-19;challenges surfaced for implementing blockchain technology in the context of its computational complexity and security. After invention of it in 2008, cryptocurrency applications, i.e., Bitcoin it also getting introduced in Different applications. One of the Major Building blocks of Blockchain is Cryptography techniques. This paper discusses Cryptographic primitives used in different phases of Blockchain implementation and the challenges of implementing these cryptographic primitives. Bitcoin uses Cryptographic primitives to generate public-private key pairs and mining, while Ethereum uses Elliptic curve cryptography to create public-private keys and digital signatures. This paper divided uses of cryptographic primitives into three categories used in Blockchains, i.e., key generation Hashes, signature generation hashes, and proof hashes. © 2022 IEEE.

2.
2022 IEEE Global Communications Conference, GLOBECOM 2022 ; : 3563-3568, 2022.
Article in English | Scopus | ID: covidwho-2227446

ABSTRACT

Mobile Cloud Computing (MCC) also known as on-demand computing uses cloud computing to deliver applications to mobile devices. This new computational paradigm model which plays a big part in the Internet of Things (IoT), has increased its popularity even more during Covid-19 pandemic and became a necessity when schools, businesses and hospitals must work remotely. We can access and process remote data which are stored over the cloud server in real-time by connecting to a wireless network. For accessing any cloud server, a mutual authentication and key agreement between a mobile user and a cloud server provider is required. However, existing authentication schemes for MCC fail to provide user anonymity, server anonymity and user untraceability. Therefore, we propose a Lightweight Authentication Scheme with User Anonymity (LASUA) which artfully employs Elliptic Curve Cryptography (ECC), random number, time stamps, one-way hash functions, concatenation, XOR operations and fuzzy extractor for biometric to enable various security features including anonymity and resistance against various attacks. LASUA utilises the hardness of ECC to provide top-notch security with low computation and communication cost, a perfect solution for resource constrained devices. © 2022 IEEE.

3.
23rd International Arab Conference on Information Technology, ACIT 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2236153

ABSTRACT

Since December 2019, the world still fighting to beat coronavirus (COVID-19). However, coronavirus is continuing its spread in many countries and claimed the lives people. It is not easy to differentiate between COVID-19 symptoms and simple flu symptoms, especially at the first stage of the infection. This is the main challenge where we have to run many tests as possible and isolate any suspicious people 14 days at least to make sure that they are not carrying the virus. This will increase the cost and people may lose their jobs. Therefore, the economy has to continue. Companies and organization start running their business using online tools, this will draw different future and employee need to gain special task to continue their work. In order go back to the normal life, we have track the virus and stay away from infected area or people. In this paper, we propose a secure cloud-based health framework to record patients' readings, give initial diagnose to identify infected areas and control the spread of the virus. The proposed framework will be running in a secure environment to protect patient's records. © 2022 IEEE.

4.
IEEE Transactions on Dependable and Secure Computing ; : 1-17, 2022.
Article in English | Scopus | ID: covidwho-1948848

ABSTRACT

A plethora of contact tracing apps have been developed and deployed in several countries around the world in the battle against Covid-19. However, people are rightfully concerned about the security and privacy risks of such applications. To address these issues, in this paper we provide two main contributions. First, we present an in-depth analysis of the security and privacy characteristics of the most prominent contact tracing protocols, under both passive and active adversaries. The results of our study indicate that all protocols are vulnerable to a variety of attacks, mainly due to the deterministic nature of the underlying cryptographic protocols. Our second contribution is the design and implementation of SpreadMeNot, a novel contact tracing protocol that can defend against most passive and active attacks, thus providing strong (provable) security and privacy guarantees that are necessary for such a sensitive application. Our detailed analysis, both formal and experimental, shows that SpreadMeNot satisfies security, privacy, and performance requirements, hence being an ideal candidate for building a contact tracing solution that can be adopted by the majority of the general public, as well as to serve as an open-source reference for further developments in the field. IEEE

5.
Lecture Notes on Data Engineering and Communications Technologies ; 127:512-523, 2022.
Article in English | Scopus | ID: covidwho-1797706

ABSTRACT

Being in a period of covid-19 urges us to develop platforms that help in minimizing the spread of the virus. Thus, this paper proposes a Medical IoT platform that is created to control citizens’ access to public areas. Our platform focuses on three scenarios on which a citizen is admitted to: being vaccinated which means that the person holds a vaccine pass that contains a unique QR code, possessing a PCR test which means that the person holds a unique barcode, and having an RFID tag which contains a unique identifier. All scenarios start with the same test which allows us to detect the presence of a citizen using a PIR IoT Client node, and end with one last test which is the face recognition to verify the present citizen is indeed who he/she claims to be. Only if one of the scenarios is valid can the citizen be allowed to access the public space. To ensure communication between the IoT nodes we developed our platform based on the Constrained Application Protocol CoAP. As for the security of the payloads, we have implemented RSA, AES, and ECC encryption algorithms to protect the integrity of the data and prevent any attacks. We also based our platform on 4 types of network topologies namely star, tree, mesh, and cluster. The use of different topologies and different encryption methods will allow us to eventually choose which one best matches the platform’s requirements, and that is in terms of execution time and memory occupation. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.

SELECTION OF CITATIONS
SEARCH DETAIL