Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 5 de 5
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 21(4)2021 Feb 18.
Artigo em Inglês | MEDLINE | ID: mdl-33670675

RESUMO

The development of the industrial Internet of Things (IIoT) promotes the integration of the cross-platform systems in fog computing, which enable users to obtain access to multiple application located in different geographical locations. Fog users at the network's edge communicate with many fog servers in different fogs and newly joined servers that they had never contacted before. This communication complexity brings enormous security challenges and potential vulnerability to malicious threats. The attacker may replace the edge device with a fake one and authenticate it as a legitimate device. Therefore, to prevent unauthorized users from accessing fog servers, we propose a new secure and lightweight multi-factor authentication scheme for cross-platform IoT systems (SELAMAT). The proposed scheme extends the Kerberos workflow and utilizes the AES-ECC algorithm for efficient encryption keys management and secure communication between the edge nodes and fog node servers to establish secure mutual authentication. The scheme was tested for its security analysis using the formal security verification under the widely accepted AVISPA tool. We proved our scheme using Burrows Abdi Needham's logic (BAN logic) to prove secure mutual authentication. The results show that the SELAMAT scheme provides better security, functionality, communication, and computation cost than the existing schemes.

2.
PeerJ Comput Sci ; 7: e714, 2021.
Artigo em Inglês | MEDLINE | ID: mdl-34977343

RESUMO

In heterogeneous wireless networks, the industrial Internet of Things (IIoT) is an essential contributor to increasing productivity and effectiveness. However, in various domains, such as industrial wireless scenarios, small cell domains, and vehicular ad hoc networks, an efficient and stable authentication algorithm is required (VANET). Specifically, IoT vehicles deal with vast amounts of data transmitted between VANET entities in different domains in such a large-scale environment. Also, crossing from one territory to another may have the connectivity services down for a while, leading to service interruption because it is pervasive in remote areas and places with multipath obstructions. Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. Thus, to solve the above issues, we propose an online/offline lightweight authentication scheme for the VANET cross-domain system in IIoT to improve the security and efficiency of the VANET. The proposed scheme utilizes an efficient AES-RSA algorithm to achieve integrity and confidentiality of the message. The offline joining is added to avoid remote network intrusions and the risk of network service interruptions. The proposed work includes two different significant goals to achieve first, then secure message on which the data is transmitted and efficiency in a cryptographic manner. The Burrows Abdi Needham (BAN logic) logic is used to prove that this scheme is mutually authenticated. The system's security has been tested using the well-known AVISPA tool to evaluate and verify its security formally. The results show that the proposed scheme outperforms the ID-CPPA, AAAS, and HCDA schemes by 53%, 55%, and 47% respectively in terms of computation cost, and 65%, 83%, and 40% respectively in terms of communication cost.

3.
ScientificWorldJournal ; 2014: 460973, 2014.
Artigo em Inglês | MEDLINE | ID: mdl-25121120

RESUMO

Soft biometrics can be used as a prescreening filter, either by using single trait or by combining several traits to aid the performance of recognition systems in an unobtrusive way. In many practical visual surveillance scenarios, facial information becomes difficult to be effectively constructed due to several varying challenges. However, from distance the visual appearance of an object can be efficiently inferred, thereby providing the possibility of estimating body related information. This paper presents an approach for estimating body related soft biometrics; specifically we propose a new approach based on body measurement and artificial neural network for predicting body weight of subjects and incorporate the existing technique on single view metrology for height estimation in videos with low frame rate. Our evaluation on 1120 frame sets of 80 subjects from a newly compiled dataset shows that the mentioned soft biometric information of human subjects can be adequately predicted from set of frames.


Assuntos
Identificação Biométrica/métodos , Pesos e Medidas Corporais/métodos , Gravação em Vídeo , Humanos , Processamento de Imagem Assistida por Computador/métodos , Medidas de Segurança
4.
ScientificWorldJournal ; 2014: 381469, 2014.
Artigo em Inglês | MEDLINE | ID: mdl-25133227

RESUMO

One of the main difficulties in designing online signature verification (OSV) system is to find the most distinctive features with high discriminating capabilities for the verification, particularly, with regard to the high variability which is inherent in genuine handwritten signatures, coupled with the possibility of skilled forgeries having close resemblance to the original counterparts. In this paper, we proposed a systematic approach to online signature verification through the use of multilayer perceptron (MLP) on a subset of principal component analysis (PCA) features. The proposed approach illustrates a feature selection technique on the usually discarded information from PCA computation, which can be significant in attaining reduced error rates. The experiment is performed using 4000 signature samples from SIGMA database, which yielded a false acceptance rate (FAR) of 7.4% and a false rejection rate (FRR) of 6.4%.


Assuntos
Algoritmos , Segurança Computacional , Escrita Manual , Internet , Redes Neurais de Computação , Roubo de Identidade/prevenção & controle
5.
J Forensic Sci ; 58(3): 724-31, 2013 May.
Artigo em Inglês | MEDLINE | ID: mdl-23527753

RESUMO

This article presents an analysis of handwritten signature dynamics belonging to two authentication groups, namely genuine and forged signature samples. Genuine signatures are initially classified based on their relative size, graphical complexity, and legibility as perceived by human examiners. A pool of dynamic features is then extracted for each signature sample in the two groups. A two-way analysis of variance (ANOVA) is carried out to investigate the effects and the relationship between the perceived classifications and the authentication groups. Homogeneity of variance was ensured through Bartlett's test prior to ANOVA testing. The results demonstrated that among all the investigated dynamic features, pen pressure is the most distinctive which is significantly different for the two authentication groups as well as for the different perceived classifications. In addition, all the relationships investigated, namely authenticity group versus size, graphical complexity, and legibility, were found to be positive for pen pressure.

SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...