Authentication Information

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 39960 Experts worldwide ranked by ideXlab platform

Chuan-gang Liu - One of the best experts on this subject based on the ideXlab platform.

  • An Authentication Information Exchange Scheme in WSN for IoT Applications
    IEEE Access, 2020
    Co-Authors: Sheng-kai Yang, Ya-ming Shiue, I-hsien Liu, Chuan-gang Liu
    Abstract:

    Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel Authentication Information exchange scheme in WSN, which is very different from the previous Authentication researches. Our idea is to add an Authentication Information exchange scheme in previous Authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an Authentication Information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our Authentication Information exchange scheme can achieve security features and goals.

  • Performance analysis of Authentication Information exchange Scheme in WSN
    2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA), 2019
    Co-Authors: Sheng-kai Yang, Ya-ming Shiue, I-hsien Liu, Chuan-gang Liu
    Abstract:

    In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel Authentication Information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new Authentication but just add our previous scheme in a previous Authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for Authentication Information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

  • A Novel Authentication Scheme Against Node Captured Attack in WSN for Healthcare Scene
    2019 IEEE Eurasia Conference on Biomedical Engineering Healthcare and Sustainability (ECBIOS), 2019
    Co-Authors: Sheng-kai Yang, Ya-ming Shiue, Chuan-gang Liu
    Abstract:

    Over the past decades, Wireless Sensor Networks play a significant role in IoT. Several applications in wide range of industries have attempted to apply this hot technology, including healthcare. However, in current WSN for daily applications, wireless sensors are deployed in easily-touched places in which the malicious user can capture those nodes much easier than before. Especially in medical or healthcare environment, an urgent need of a secure WSN access scheme is requested, especially for the resistant of node capturing attack. This paper proposes a novel Authentication Information exchanging scheme against node capturing attack in WSN. This paper describes the idea behind this novel scheme, which comes from the association scheme of local sensor nodes. This scheme asks all sensor nodes should periodically contact with GWN and meanwhile execute Authentication Information exchanging scheme for resist security risk from one node captured by a sophisticated hanker. This paper gives an early study and provides detail discussion of this scheme and validates it in the future.

Sheng-kai Yang - One of the best experts on this subject based on the ideXlab platform.

  • An Authentication Information Exchange Scheme in WSN for IoT Applications
    IEEE Access, 2020
    Co-Authors: Sheng-kai Yang, Ya-ming Shiue, I-hsien Liu, Chuan-gang Liu
    Abstract:

    Recently, in IoT, wireless sensor network has become a critical technology with which many applications in industries and human life can achieve smart IoT control. However, for those daily applications using WSN technology, malicious users can capture the sensor nodes much easily since these wireless sensor nodes are usually deployed in easily touched places. Once this node captured attack occurs, wireless sensor network soon faces various security risks. In this paper, in order to resist node captured attack, we propose a novel Authentication Information exchange scheme in WSN, which is very different from the previous Authentication researches. Our idea is to add an Authentication Information exchange scheme in previous Authentication scheme but not propose new one. We develop this scheme based on the idea of the association scheme of Home GWN and local sensor nodes. In this study, HGWN should contact all local sensor nodes and meanwhile is responsible for performing an Authentication Information exchange scheme for resisting security risk. In order to prevent the attacker from guessing communication period between HGWN and the sensor, we also design a dynamic contacting mechanism. We give a detail discussion of this scheme and validate it by three ways, security evaluation, BAN logic and performance evaluation, which proves that our Authentication Information exchange scheme can achieve security features and goals.

  • Performance analysis of Authentication Information exchange Scheme in WSN
    2019 International Conference on Intelligent Computing and its Emerging Applications (ICEA), 2019
    Co-Authors: Sheng-kai Yang, Ya-ming Shiue, I-hsien Liu, Chuan-gang Liu
    Abstract:

    In a IoT network, wireless sensor networks always play a significant role. This popular technology makes people live more conveniently and industry more efficiently. However, due to the ease of the use of WSN, wireless sensor for daily applications are usually deployed in an intuitive plan without a complete consideration. Hence, sensor node captured attack easily intrudes WSN and a novel Authentication Information exchange scheme in WSN was proposed. Our previous research can solve node captured attack without replacing a completely new Authentication but just add our previous scheme in a previous Authentication schemes. However, we find some details of this novel scheme are not well designed. We want to discuss possible performance problem in that scheme and provide a complete analysis and discussion on it. The performance issues are including of the design of communication period, the evaluation of security risk and the methodology of control agency scheme. After our analysis, we provide a good design of solving these performance for Authentication Information exchange scheme in WSN. It can make our previous scheme become more practical and feasible in the future world.

  • A Novel Authentication Scheme Against Node Captured Attack in WSN for Healthcare Scene
    2019 IEEE Eurasia Conference on Biomedical Engineering Healthcare and Sustainability (ECBIOS), 2019
    Co-Authors: Sheng-kai Yang, Ya-ming Shiue, Chuan-gang Liu
    Abstract:

    Over the past decades, Wireless Sensor Networks play a significant role in IoT. Several applications in wide range of industries have attempted to apply this hot technology, including healthcare. However, in current WSN for daily applications, wireless sensors are deployed in easily-touched places in which the malicious user can capture those nodes much easier than before. Especially in medical or healthcare environment, an urgent need of a secure WSN access scheme is requested, especially for the resistant of node capturing attack. This paper proposes a novel Authentication Information exchanging scheme against node capturing attack in WSN. This paper describes the idea behind this novel scheme, which comes from the association scheme of local sensor nodes. This scheme asks all sensor nodes should periodically contact with GWN and meanwhile execute Authentication Information exchanging scheme for resist security risk from one node captured by a sophisticated hanker. This paper gives an early study and provides detail discussion of this scheme and validates it in the future.

Peter Trommler - One of the best experts on this subject based on the ideXlab platform.

  • Secure World Wide Web access to server groups
    IFIP Advances in Information and Communication Technology, 1996
    Co-Authors: Andrew Hutchison, Matthias Kaiserswerth, Peter Trommler
    Abstract:

    Existing World Wide Web (WWW) security is organized around server specific realms. When several servers are interacted with in a secure manner, Authentication Information has to be provided for each server. Where separate servers co-operate to provide a set of distributed Information as a server group, it is desirable to make Authentication as transparent as possible. By extending the HyperText Transfer Protocol (HTTP) to include server group Information it is possible for a user to only provide Authentication Information once for an entire group of servers. Although we have also implemented these extensions for the Basic and Digest Authentication schemes, we argue that Mediated Digest Authentication is most suitable for secure server group scalability.

  • Communications and Multimedia Security - Secure World Wide Web Access to Server Groups.
    1996
    Co-Authors: Andrew Hutchison, Matthias Kaiserswerth, Peter Trommler
    Abstract:

    Existing World Wide Web (WWW) security is organized around server specific realms. When several servers are interacted with in a secure manner, Authentication Information has to be provided for each server. Where separate servers co-operate to provide a set of distributed Information as a server group, it is desirable to make Authentication as transparent as possible. By extending the HyperText Transfer Protocol (HTTP) to include server group Information it is possible for a user to only provide Authentication Information once for an entire group of servers. Although we have also implemented these extensions for the Basic and Digest Authentication schemes, we argue that Mediated Digest Authentication is most suitable for secure server group scalability.

Shigeichi Hirasawa - One of the best experts on this subject based on the ideXlab platform.

  • SMC - An Authentication system using smart phones as secure storage
    2011 IEEE International Conference on Systems Man and Cybernetics, 2011
    Co-Authors: Katsuyuki Umezawa, Satoru Tezuka, Shigeichi Hirasawa
    Abstract:

    The smart phone penetration rate has increased recently. There are also many commercial terminals for receiving network services. When a service is received by a smart phone or PC, user Authentication is very important for ensuring secure and safe use. Currently, Authentication is required each time a user changes the terminal on which a service is received. We propose a system that uses a smart phone as a storage device for Authentication Information, such as ID, password, and cookie Information. With this system, the smart phone and various terminals cooperate through short distance wireless telecommunications technologies such as Bluetooth. We evaluate performance of our proposed system. As a result, the user can input Authentication Information to and receive a service on a terminal by simply swiping the smart phone over the terminal.

Guangyong Gao - One of the best experts on this subject based on the ideXlab platform.

  • Reversible Multiple Items Authentication Scheme for WSNs
    IEEE Access, 2020
    Co-Authors: Guangyong Gao, Yuxiang Wang, Zhiqiang Zhao, Chao Yin
    Abstract:

    In this article, a reversible Authentication scheme for wireless sensor networks (WSNs) is proposed aimed at multiple items Authentication and good imperception of transmitted data. Firstly, the WSNs data stream is divided into some Authentication groups, and each Authentication group is composed of a generator group and a carrier group. Then, the cyclical redundancy check (CRC) code of the generator group is generated as the Authentication Information, which is composed of the CRC codes of all collected items in the generator group. In the carrier group, first, to decrease the visual perception introduced by Information embedding, the beginning parameter $T_{m}$ and the end parameter $T_{p}$ are used to select the fluctuation region of the prediction-error histogram (PEH) where large prediction errors occur. Then, using the prediction-error-based histogram shifting method, the Authentication Information is reversibly embedded into the fluctuation region. Experimental results and analysis demonstrate that, compared with up-to-date homogeneous schemes, the proposed scheme achieved better performance on invisibility, false positive rate, type of authenticated items, and attraction to attackers.

  • Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC
    Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering, 2017
    Co-Authors: Guangyong Gao, Caixue Zhou, Zongmin Cui, Shimao Yao, Zhijun Chong
    Abstract:

    In this paper, a reversible Authentication scheme for wireless sensor network (WSN) is proposed. Firstly, the WSN data stream is divided into some Authentication groups, and each Authentication group is composed of a generator group and a carrier group. Then the cyclical redundancy check (CRC) code of generator group is produced as the Authentication Information. In the carrier group, using the prediction-error-based histogram shifting algorithm, the Authentication Information is reversibly embedded into the fluctuation region of prediction-error histogram (PEH), not the smooth region. Experimental results and analysis demonstrate that compared with previous schemes, the proposed scheme achieves better performances on computation complex, false tampering alarm and attraction to attackers.

  • ICNCC - Identity Authentication Protection for "Spatial Watermarking + QR Code" Paper-cutting Digital Image
    Proceedings of the 2017 VI International Conference on Network Communication and Computing - ICNCC 2017, 2017
    Co-Authors: Jun Zhao, Guangyong Gao, Jianhua Cheng
    Abstract:

    Ruichang Paper-cutting Art is national intangible cultural heritage and Ruichang Paper-cut digital images spread widely on the Internet with the development of the Internet, so that more and more people can understand, know and appreciate Ruichang Paper Cutting, but violations against copyright and human rights are exposed at the same time. This Paper by taking Ruichang paper-cut images as an example and by binarization image edge spatial watermarking algorithm and combining with QR code Authentication technology, transforms text Authentication Information into QR code image and hides QR code image in edge of Paper-cutting image as watermark and finally places QR code Authentication Information in blank area of the paper-cut imagespatial watermark. In this way, invisible edge spatial watermark and visible QR code form double Authentication protection for paper-cut images and provides a kind of effective method for copyright protection of paper-cut digital images.