Enhanced authentication and key exchange for end to end security in mobile commerce using wireless public key infrastructure

2019 ◽  
Vol 48 (1) ◽  
pp. 14-22
Author(s):  
Krishna Prakasha ◽  
Balachandra Muniyal ◽  
Vasundhara Acharya

Purpose The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism to achieve reliable and authenticated connection. In online transactions, users and resources are located at different places, and the sensitive information is to be protected and transferred using the suitable, reliable mechanism. Design/methodology/approach One of the latest approach to handle the requirement is by a Public Key Infrastructure (PKI) or its variant Wireless Public Key Infrastructure (WPKI). Fundamental management techniques are required to be very secure and vital since they are one of the points of attack in public key cryptosystem. Entity authentication and key agreement (AKA) is a critical cryptographic problem in wireless communication, where a mutual entity authentication plays a vital role in the establishment of the secure and authentic connection. This paper proposes an efficient and enhanced AKA scheme (EAKA) with the end-to-end security and verifies the proposed system for protection using automated validation of internet security protocols and applications. An efficient way for the implementation of an enhanced version of the protocol is proposed using a lattice-based cryptographic algorithm. Findings The time consumed for the proposed research work shows that it is practical and acceptable. Originality/value The proposed research work is an efficient and enhanced user authentication mechanism.

Energies ◽  
2019 ◽  
Vol 12 (15) ◽  
pp. 2987 ◽  
Author(s):  
Jose P. Martins ◽  
Joao C. Ferreira ◽  
Vitor Monteiro ◽  
Jose A. Afonso ◽  
Joao L. Afonso

In this research work, we apply the Internet of Things (IoT) paradigm with a decentralized blockchain approach to handle the electric vehicle (EV) charging process in shared spaces, such as condominiums. A mobile app handles the user authentication mechanism to initiate the EV charging process, where a set of sensors are used for measuring energy consumption, and based on a microcontroller, establish data communication with the mobile app. A blockchain handles financial transitions, and this approach can be replicated to other EV charging scenarios, such as public charging systems in a city, where the mobile device provides an authentication mechanism. A user interface was developed to visualize transactions, gather users’ preferences, and handle power charging limitations due to the usage of a shared infrastructure. The developed approach was tested in a shared space with three EVs using a charging infrastructure for a period of 3.5 months.


Author(s):  
Claudio Agostino Ardagna ◽  
Marco Cremonini ◽  
Ernesto Damiani ◽  
Sabrina De Capitani di Vimercati ◽  
Fulvio Frati ◽  
...  

This chapter introduces the concept of privacy-enhanced identity management for e-services supporting the users needs to protect their privacy and sensitive information. Business activities are increasingly based on the use of remote resources and e-services as well as on the interaction between different, remotely-located, parties. In this context, the electronic execution of private and/or sensitive transactions must fully preserve information privacy by managing in a trustworthy and responsible way all identity and profile information that is released to remote parties. In this chapter, we investigate the main problems concerning identity management for e-services and outline the features that the next-generation of identity management systems should provide for. State-of-the-art technology in the field of privacy-enhanced identity management systems is also compared with traditional Public Key Infrastructure (PKI) solutions. The analysis of the benefits of these modern identity management systems is presented and discussed with references also to the results of some experiences in the area of e-government, whose objective is the development of public administration privacy-aware e-services.


2015 ◽  
Vol 2015 ◽  
pp. 1-9
Author(s):  
Jung-oh Park ◽  
Sanggeun Kim

Recently, as the utilization of CCTV (closed circuit television) is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure), SN (serial number), andR value(random number) attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.


2020 ◽  
Author(s):  
M Khan

The large-scale utilization of biometric authentication systems creates a demand for effective and reliable security and privacy of its data. Biometric data is not secret and if compromised, it can have catastrophic effects on the integrity of the whole verification system. To address these issues, this paper presents a novel encryption and watermarking method by using public key infrastructure for the secure transmission of biometric data over network. Encryption is applied on the biometric template before embedding as a watermark to make it more secure and robust and then, it is hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented method is encouraging comparable with the other methods found in the current literature.


2020 ◽  
Author(s):  
M Khan

The large-scale utilization of biometric authentication systems creates a demand for effective and reliable security and privacy of its data. Biometric data is not secret and if compromised, it can have catastrophic effects on the integrity of the whole verification system. To address these issues, this paper presents a novel encryption and watermarking method by using public key infrastructure for the secure transmission of biometric data over network. Encryption is applied on the biometric template before embedding as a watermark to make it more secure and robust and then, it is hid into the cover image. Experimental results show that the security, performance, and accuracy of the presented method is encouraging comparable with the other methods found in the current literature.


Sign in / Sign up

Export Citation Format

Share Document