Scan Science and Technology
Contact Leading Edge Experts & Companies
Authentication Request
The Experts below are selected from a list of 2673 Experts worldwide ranked by ideXlab platform
Yacong Liang – One of the best experts on this subject based on the ideXlab platform.
-
wearable proxy device assisted Authentication Request filtering for implantable medical devices
Wireless Communications and Networking Conference, 2020Co-Authors: Ziting Zhang, Xiaodong Xu, Yacong LiangAbstract:As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.
-
WCNC – Wearable Proxy Device-Assisted Authentication Request Filtering for Implantable Medical Devices
2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020Co-Authors: Ziting Zhang, Yacong Liang, Shujun Han, Cong LiuAbstract:As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.
Hiroto Yasuura – One of the best experts on this subject based on the ideXlab platform.
-
Password based anonymous Authentication with private information retrieval
Journal of Digital Information Management, 2011Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto YasuuraAbstract:This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, a service provider who receives and verifies the Request, and a database who supplies the service provider with information for verifying the Request. This paper presents novel Authentication protocols that satisfy the following important properties: (1) se- cure against replay attacks and (2) the database cannot identify which user is authenticating. First, we show a protocol which satisfies Properties (2). Second, we show a protocol which satisfies Properties (1) and (2). A key idea of our Authentication protocols is to use private information retrieval (PIR) (Chor et al. J. ACM, 1998). Categories and Subject Descriptors K.6.5 (Management of Computing and Information System)
-
Anonymous Authentication Based on PIR and Its Applications
, 2009Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto YasuuraAbstract:This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, an service provider who receives and verifies the Request, and a database who supplies the Authentication-server with information for verifying the Request. This paper presents an Authentication protocol which satisfies the following important properties: (1) Anonymity against Database, (2) Password Protection, and (3) Security against Replay Attacks, with a Private Information Retrieval (PIR) scheme.
-
Anonymous Authentication systems based on private information retrieval
2009 First International Conference on Networked Digital Technologies, 2009Co-Authors: Toru Nakamura, Shunsuke Inenaga, Daisuke Ikeda, Kensuke Baba, Hiroto YasuuraAbstract:This paper focuses on Authentication with three types of entities: a user who sends an Authentication Request, an Authentication-server who receives and verifies the Request, and a database who supplies the Authentication-server with information for verifying the Request. This paper presents novel Authentication protocols that satisfy the following important properties: (1) secure against replay attacks, (2) the database(s) cannot identify which user is authenticating and (3) the Authentication-server cannot identify to which user a given Authentication–Request corresponds. Firstly, we show a protocol with a single database which satisfies Properties (1) and (2). Secondly, we show a protocol with multiple databases which satisfies Properties (1), (2) and (3). A key idea of our Authentication protocols is to use private information retrieval (PIR) [Chor et al. J. ACM, 1998].
Ziting Zhang – One of the best experts on this subject based on the ideXlab platform.
-
wearable proxy device assisted Authentication Request filtering for implantable medical devices
Wireless Communications and Networking Conference, 2020Co-Authors: Ziting Zhang, Xiaodong Xu, Yacong LiangAbstract:As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.
-
WCNC – Wearable Proxy Device-Assisted Authentication Request Filtering for Implantable Medical Devices
2020 IEEE Wireless Communications and Networking Conference (WCNC), 2020Co-Authors: Ziting Zhang, Yacong Liang, Shujun Han, Cong LiuAbstract:As the deepening of 5G’s support for the e-health industry, more and more wireless medical devices will suffer from various attacks and threats. Especially, the security of implantable medical devices (IMDs) which have limited computational capabilities and stringent power constraints becomes a critical issue. According to the channel state information, we exploit the special characteristics of the received signal strength (RSS) ratio between wearable proxy devices (WPDs) and IMDs in wireless body area networks (WBANs) to distinguish legitimate users and attackers. Moreover, based on the idea of proposed Authentication Request filtering (ARF), we design two corresponding light-weight security protocols to defend the forced Authentication (FA) attacks and enhance the accessibility of IMD in emergency mode respectively. Simulation results show that the proposed ARF scheme to defend FA attacks achieves a high Authentication response rate (ARR) with 99.2% for legitimate users and a low ARR with 2.4% for attackers at the maximum gap threshold point. Furthermore, when applied in emergency mode, the ARF scheme allows up to 96.3% emergency rescue devices to access the IMDs with only one attempt.