Authentication Request

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 2673 Experts worldwide ranked by ideXlab platform

Yacong Liang - One of the best experts on this subject based on the ideXlab platform.

  • wearable proxy device assisted Authentication Request filtering for implantable medical devices
    Wireless Communications and Networking Conference, 2020
    Co-Authors: Ziting Zhang, Xiaodong Xu, Yacong Liang
    Abstract:

    As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.

  • WCNC - Wearable Proxy Device-Assisted Authentication Request Filtering for Implantable Medical Devices
    2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020
    Co-Authors: Ziting Zhang, Yacong Liang, Shujun Han, Cong Liu
    Abstract:

    As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.

Hiroto Yasuura - One of the best experts on this subject based on the ideXlab platform.

  • Password based anonymous Authentication with private information retrieval
    Journal of Digital Information Management, 2011
    Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura
    Abstract:

    This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, a service provider who receives and verifies the Request, and a database who supplies the service provider with information for verifying the Request. This paper presents novel Authentication protocols that satisfy the following important properties: (1) se- cure against replay attacks and (2) the database cannot identify which user is authenticating. First, we show a protocol which satisfies Properties (2). Second, we show a protocol which satisfies Properties (1) and (2). A key idea of our Authentication protocols is to use private information retrieval (PIR) (Chor et al. J. ACM, 1998). Categories and Subject Descriptors K.6.5 (Management of Computing and Information System)

  • Anonymous Authentication Based on PIR and Its Applications
    2009
    Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura
    Abstract:

    This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, an service provider who receives and verifies the Request, and a database who supplies the Authentication-server with information for verifying the Request. This paper presents an Authentication protocol which satisfies the following important properties: (1) Anonymity against Database, (2) Password Protection, and (3) Security against Replay Attacks, with a Private Information Retrieval (PIR) scheme.

  • Anonymous Authentication systems based on private information retrieval
    2009 First International Conference on Networked Digital Technologies, 2009
    Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura
    Abstract:

    This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, an Authentication-server who receives and verifies the Request, and a database who supplies the Authentication-server with information for verifying the Request. This paper presents novel Authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the Authentication-server cannot identify to which user a given Authentication-Request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our Authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].

Ziting Zhang - One of the best experts on this subject based on the ideXlab platform.

  • wearable proxy device assisted Authentication Request filtering for implantable medical devices
    Wireless Communications and Networking Conference, 2020
    Co-Authors: Ziting Zhang, Xiaodong Xu, Yacong Liang
    Abstract:

    As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.

  • WCNC - Wearable Proxy Device-Assisted Authentication Request Filtering for Implantable Medical Devices
    2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020
    Co-Authors: Ziting Zhang, Yacong Liang, Shujun Han, Cong Liu
    Abstract:

    As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.

Arun Ross - One of the best experts on this subject based on the ideXlab platform.

  • ICCE - Biometrics-as-a-service: A framework to promote innovative biometric recognition in the cloud
    2018 IEEE International Conference on Consumer Electronics (ICCE), 2018
    Co-Authors: Veeru Talreja, Terry Ferrett, Matthew C. Valenti, Arun Ross
    Abstract:

    Biometrie recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is Authentication; i.e., using said biological attributes to provide access by verifying the claimed identity of an individual. This paper presents a framework for Biometrics-as-a-Service (BaaS) that performs biometric matching operations in the cloud, while relying on simple and ubiquitous consumer devices such as smartphones. Further, the framework promotes innovation by providing interfaces for a plurality of software developers to upload their matching algorithms to the cloud. When a biometric Authentication Request is submitted, the system uses a criteria to automatically select an appropriate matching algorithm. Every time a particular algorithm is selected, the corresponding developer is rendered a micropayment. This creates an innovative and competitive ecosystem that benefits both software developers and the consumers. As a case study, we have implemented the following: (a) an ocular recognition system using a mobile web interface providing user access to a biometric Authentication service, and (b) a Linux-based virtual machine environment used by software developers for algorithm development and submission.

  • Biometrics-as-a-Service: A Framework to Promote Innovative Biometric Recognition in the Cloud
    arXiv: Distributed Parallel and Cluster Computing, 2017
    Co-Authors: Veeru Talreja, Terry Ferrett, Matthew C. Valenti, Arun Ross
    Abstract:

    Biometric recognition, or simply biometrics, is the use of biological attributes such as face, fingerprints or iris in order to recognize an individual in an automated manner. A key application of biometrics is Authentication; i.e., using said biological attributes to provide access by verifying the claimed identity of an individual. This paper presents a framework for Biometrics-as-a-Service (BaaS) that performs biometric matching operations in the cloud, while relying on simple and ubiquitous consumer devices such as smartphones. Further, the framework promotes innovation by providing interfaces for a plurality of software developers to upload their matching algorithms to the cloud. When a biometric Authentication Request is submitted, the system uses a criteria to automatically select an appropriate matching algorithm. Every time a particular algorithm is selected, the corresponding developer is rendered a micropayment. This creates an innovative and competitive ecosystem that benefits both software developers and the consumers. As a case study, we have implemented the following: (a) an ocular recognition system using a mobile web interface providing user access to a biometric Authentication service, and (b) a Linux-based virtual machine environment used by software developers for algorithm development and submission.

Toru Nakamura - One of the best experts on this subject based on the ideXlab platform.

  • Password based anonymous Authentication with private information retrieval
    Journal of Digital Information Management, 2011
    Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura
    Abstract:

    This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, a service provider who receives and verifies the Request, and a database who supplies the service provider with information for verifying the Request. This paper presents novel Authentication protocols that satisfy the following important properties: (1) se- cure against replay attacks and (2) the database cannot identify which user is authenticating. First, we show a protocol which satisfies Properties (2). Second, we show a protocol which satisfies Properties (1) and (2). A key idea of our Authentication protocols is to use private information retrieval (PIR) (Chor et al. J. ACM, 1998). Categories and Subject Descriptors K.6.5 (Management of Computing and Information System)

  • Anonymous Authentication Based on PIR and Its Applications
    2009
    Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura
    Abstract:

    This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, an service provider who receives and verifies the Request, and a database who supplies the Authentication-server with information for verifying the Request. This paper presents an Authentication protocol which satisfies the following important properties: (1) Anonymity against Database, (2) Password Protection, and (3) Security against Replay Attacks, with a Private Information Retrieval (PIR) scheme.

  • Anonymous Authentication systems based on private information retrieval
    2009 First International Conference on Networked Digital Technologies, 2009
    Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto Yasuura
    Abstract:

    This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, an Authentication-server who receives and verifies the Request, and a database who supplies the Authentication-server with information for verifying the Request. This paper presents novel Authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the Authentication-server cannot identify to which user a given Authentication-Request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our Authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].