Combining a chaos system with an Arnold cat map for a secure authentication scheme in wireless communication networks

2014 ◽  
Vol 31 (2) ◽  
pp. 317-330 ◽  
Author(s):  
Young-Long Chen ◽  
Chung-Ming Cheng

Purpose – Wu et al.'s scheme has a security problem that is related to anonymity: attackers can determine by interception the identity of a legal user. This paper aims to propose a new secure authentication which combines a chaos system with an Arnold cat map. The scheme improves upon that of the Wu et al.'s scheme. The scheme proposed herein provides for full anonymity and improves the security of authentication messages for wireless communications. Design/methodology/approach – A novel scheme that integrates a chaos sequence is used with an Arnold cat map for authentication messages. Authentication messages are shuffled using an Arnold cat map to improve the security of authentication in wireless communications. An analytic approach based on a chaos sequence with an Arnold cat map is developed to secure authentication. The proposed scheme is presented in this study to overcome the inherent drawbacks of existing designs. Findings – The integrated scheme involves two steps. First, a chaos map is used to generate a set of chaos sequences that is added to the authentication messages. Second, the authentication messages are shuffled using an Arnold cat map. The main feature of the proposed design is such that the chaos systems are sensitive to the initial values of conditions. Sensitivity will lead to long-term behavior unpredictability to reflect the non-linear dynamic systems. Furthermore, to increase the complexity of the authentication message, the authors also use an Arnold cat map. Originality/value – The proposed scheme provides functions that include full anonymity properties, protection of the real identity of the user, one-time password properties, timestamp benefits and sufficient complexity of the password. The analysis shows that the proposed scheme exhibits the advantages of the chaos system and is more secure than previous schemes. Notably, the proposed scheme is effective for wireless communications.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Sajaad Ahmed Lone ◽  
Ajaz Hussain Mir

Purpose Because of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization strategy is a must for many of today’s applications. Authentication schemes based on knowledge and tokens, although widely used, lead to most security breaches. While providing various advantages, biometrics are also subject to security threats. Using multiple factors together for authentication provides more certainty about a user’s identity; thus, leading to a more reliable, effective and more difficult for an adversary to intrude. This study aims to propose a novel, secure and highly stable multi-factor one-time password (OTP) authentication solution for mobile environments, which uses all three authentication factors for user authentication. Design/methodology/approach The proposed authentication scheme is implemented as a challenge-response authentication where three factors (username, device number and fingerprint) are used as a secret key between the client and the server. The current scheme adopts application-based authentication and guarantees data confidentiality and improved security because of the integration of biometrics with other factors and each time new challenge value by the server to client for OTP generation. Findings The proposed authentication scheme is implemented on real android-based mobile devices, tested on real users; experimental results show that the proposed authentication scheme attains improved performance. Furthermore, usability evaluation proves that proposed authentication is effective, efficient and convenient for users in mobile environments. Originality/value The proposed authentication scheme can be adapted as an effective authentication scheme to accessing critical information using android smartphones.


Headline ETHIOPIA: Tigray fighting underscores security problem


2018 ◽  
Vol 56 (10) ◽  
pp. 2239-2251 ◽  
Author(s):  
Francesca Grippa ◽  
John Bucuvalas ◽  
Andrea Booth ◽  
Evaline Alessandrini ◽  
Andrea Fronzetti Colladon ◽  
...  

Purpose The purpose of this paper is to explore possible factors impacting team performance in healthcare, by focusing on information exchange within and across hospital’s boundaries. Design/methodology/approach Through a web-survey and group interviews, the authors collected data on the communication networks of 31 members of four interdisciplinary healthcare teams involved in a system redesign initiative within a large US children’s hospital. The authors mapped their internal and external social networks based on management advice, technical support and knowledge dissemination within and across departments, studying interaction patterns that involved more than 700 actors. The authors then compared team performance and social network metrics such as degree, closeness and betweenness centrality, and computed cross ties and constraint levels for each team. Findings The results indicate that highly effective teams were more inwardly focused and less connected to outside members. Moreover, highly recognized teams communicated frequently but, overall, less intensely than the others. Originality/value Mapping knowledge flows and balancing internal focus and outward connectivity of interdisciplinary teams may help healthcare decision makers in their attempt to achieve high value for patients, families and employees.


Author(s):  
Joko Mariyono ◽  
Sumarno Sumarno

Purpose – Chilli plays an important role in the Indonesian economy through its multiplier effect. The recent rapid growth of chilli production in Indonesia can be explained by the development of agricultural and communication technologies and improved market infrastructure. The purpose of this paper is to analyse factors that affect farmers’ decisions to adopt chilli-based agribusinesses. Intensive chilli farming, as a part of agricultural commercialisation, is considered a technological package that is more profitable but also more input- and labour-intensive than the production of rice or other cereal crops. Design/methodology/approach – This study used a logit model to estimate the farmers’ decision function. Personal characteristics, technical factors and business environment were hypothesised to influence farmers’ decisions to adopt intensive chilli farming. Data for this study were compiled from surveys conducted during 2009-2011. The surveys interviewed 300 farmer households in three main chilli producing regions of Java, Indonesia. Findings – The results indicate that younger farmers, and also farmers with more experience, were more likely to adopt chilli farming. Availability of chilli production technology and the use of mobile phones prompted farmers to adopt chilli farming. Access to vegetable markets, credit, and market information were other factors driving farmers’ decisions to take up chilli production. Most farmers were motivated to grow chilli to increase their incomes. Ecological factors were also the reasons. Research limitations/implications – The sample for this research is quite low. However, the sample was drawn from representative potential chilli production areas in Indonesia. Originality/value – There is room to increase the number of chilli-based agribusinesses in Indonesia. Intensive chilli farming should be introduced to young farmers and those with experience in vegetable production. Farm credit, market information, and agronomic technologies should be made more available and accessible to farmers. Strengthening communication networks among farmers through the use of mobile phones is the best way to encourage farmers to adopt intensive chilli farming. Vegetable markets should be established in potential chilli producing regions.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Amir Zakery ◽  
Mohammad Sadegh Saremi

PurposeInternational businesses play a significant role in the growth, innovation and survival of technology-based firms (TBFs). Creating new opportunities in international markets, using communication networks and confronting constraints on available resources have distinguished the internationalization of small and medium-sized enterprises (SMEs) and intensified the importance of knowledge acquisition and continuous learning. This study aimed to (1) configure (the types and sources of) and (2) measure the internationalization knowledge of TBFs, by focusing on a knowledge-intensive part of the health industry in an emerging country: Iranian advanced medical equipment companies.Design/methodology/approachFor this purpose, a qualitative approach was adopted to interview the leaders of eight TBFs exporting medical equipment. Obtained data were investigated using content analysis.FindingsAccording to the content analysis results for configuration, technological knowledge and market knowledge were mainly obtained through direct experience and vicarious learning; however, internationalization knowledge is not so established as the third major knowledge area to integrate technological with market knowledge in line with corporate strategies of an internationalizing firm. For measurement of knowledge assets of internationalizing firms as a prerequisite for continuous improvement, several intellectual capital indices were extracted, including human, structural and relational capital.Originality/valueThis research complements existing literature in internationalization knowledge configuration via deploying an "Intellectual capital" perspective. It could enhance efforts for improving the learning of internationalizing SMEs, especially in the developing countries.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Jorge Colazo

PurposeThis study aims to look at the performance, communication structure and media choice for swift teams (STs) formed with the purpose of recovering from operational emergencies in manufacturing. The problem-solving process associated with these ad hoc teams include an early stage, where the main goal is to restore the process to working conditions, and a later stage, longer in duration, where the root cause of the problem is found and eliminated.Design/methodology/approachBased on field data from an industrial manufacturing operation, the authors test hypotheses by means of regression models.FindingsIt was found that in the evolution from early to later stage, media usage shifts from highly synchronous to asynchronous and the structural characteristics of the teams' collaboration networks mutate as well. These effects are different when comparing high- vs low-performing teams.Research limitations/implicationsThe study contains data for only one company, limiting the external validity of the conclusions. The sample was predominantly male. Participant attrition and other potential covariates not included in the study can be additional limitations.Practical implicationsMore successful teams adapt their communication patterns more rapidly, going from an initially decentralized organization to a more centralized one. These changes in network patterns open a new view of ST’s success, based on network characteristics rather than on aggregate measures. The conclusions yield insights for interventions that may increase the success rates of these teams and reduce production line downtime.Originality/valueThe two stages in the operational emergency problem-solving process have to the authors’ knowledge not been addressed simultaneously in previous research, which is attempted in this paper as its main theoretical contribution. Moreover, previous studies dealing with ST’s success have only looked at aggregated measures impacting effectiveness and never to how their communication networks evolve along the path to problem resolution. The network view of the evolution of the ST from a relatively disorganized impromptu agglomeration of individuals to an effective problem-solving organization is to the authors’ knowledge first presented.


2018 ◽  
Vol 38 (5) ◽  
pp. 625-634
Author(s):  
Chao Ma ◽  
Rui Li ◽  
Hong Qiao

Purpose The purpose of this paper is to solve the non-fragile consensus problem of networked robotic manipulators over communication networks by using information from topology-dependent memory. Design/methodology/approach This paper proposes a topology-dependent memory protocol with distributed consensus controllers for multiple networked robotic manipulators. Findings The distributed controller gain fluctuations are taken into account with sampled data information exchanges. By the derived results of model transformation, the topology-dependent memory protocol is investigated using sufficient consensus criteria in the form of linear matrix inequalities. Originality/value A novel consensus protocol with topology-dependent memory is designed, which can potentially improve consensus performance and deal with the controller gain fluctuations of the robotic manipulators in practical applications.


Sign in / Sign up

Export Citation Format

Share Document