Improved two factor fuzzy commitment scheme for securing IoT device

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Yuvarani T. ◽  
Arunachalam A.R.

Purpose Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of authentication protocols designed to IoT devices are robust despite which it is prone to attack by hackers. In order to resolve this issue, there are various researches that have introduced the best method for obscuring the cryptographic key. However, the studies have majorly aimed to generate the key dynamically from noise data by Fuzzy Extractor (FE) or Fuzzy Commitment (FC). Hence, these methods have utilized this kind of data with noisy source namely Physical Unclonable Function (PUF) or biometric data. There are several IoT devices that get operated over undermined environment in which biometric data is not available but the technique utilized with biometric data can't be used to undermined IoT devices. Even though, the PUF technique is implemented for the undermined IoT devices this is quite vulnerable over physical attacks inclusive of accidental move and theft. Design/methodology/approach This paper has proposed an advanced scheme in fuzzy commitment over IoT devices which is said to be Improved Two Factor Fuzzy Commitment Scheme (ITFFCS) and this proposed ITFFCS has used two kind of noisy factors present inside and outside the IoT devices. Though, an intruder has accomplished the IoT devices with an access to the internal noisy source, the intruder can't select an exact key from the available data which have been compared using comparable module as an interest. Findings Moreover, the proposed ITFFC method results are compared with existing Static Random Accessible Memory (SRAM) PUF in enterprises application which illustrated the proposed ITFFC method with PUF has accomplished better results in parameters such as energy consumption, area utilization, False Acceptance Ratio (FAR) and Failure Rejection Ratio (FRR). Originality/value Thus, the proposed ITFFCS-PUF is comparatively better than existing method in both FAR and FRR with an average of 0.18% and 0.28%.

2018 ◽  
Vol 7 (3.27) ◽  
pp. 129 ◽  
Author(s):  
Huda Saleem ◽  
Huda Albermany ◽  
Husein Hadi

The typical scheme used to generated cryptographic key is a fuzzy extractor. The fuzzy extractor is the extraction of a stable data from biometric data or noisy data based on the error correction code (ECC) method. Forward error correction includes two ways are blocked and convolutional coding used for error control coding. “Bose_Chaudhuri_Hocquenghem” (BCH) is one of the error correcting codes employ to correct errors in noise data. In this paper use fuzzy extractor scheme to find strong key based on BCH coding, face recognition data used SVD method and hash function. Hash_512 converted a string with variable length into a string of fixed length, it aims to protect information against the threat of repudiation.  


2017 ◽  
Author(s):  
JOSEPH YIU

The increasing need for security in microcontrollers Security has long been a significant challenge in microcontroller applications(MCUs). Traditionally, many microcontroller systems did not have strong security measures against remote attacks as most of them are not connected to the Internet, and many microcontrollers are deemed to be cheap and simple. With the growth of IoT (Internet of Things), security in low cost microcontrollers moved toward the spotlight and the security requirements of these IoT devices are now just as critical as high-end systems due to:


2020 ◽  
Vol 10 (20) ◽  
pp. 7141
Author(s):  
Ilhwan Lim ◽  
Minhye Seo ◽  
Dong Hoon Lee ◽  
Jong Hwan Park

Fuzzy vector signature (FVS) is a new primitive where a fuzzy (biometric) data w is used to generate a verification key (VKw), and, later, a distinct fuzzy (biometric) data w′ (as well as a message) is used to generate a signature (σw′). The primary feature of FVS is that the signature (σw′) can be verified under the verification key (VKw) only if w is close to w′ in a certain predefined distance. Recently, Seo et al. proposed an FVS scheme that was constructed (loosely) using a subset-based sampling method to reduce the size of helper data. However, their construction fails to provide the reusability property that requires that no adversary gains the information on fuzzy (biometric) data even if multiple verification keys and relevant signatures of a single user, which are all generated with correlated fuzzy (biometric) data, are exposed to the adversary. In this paper, we propose an improved FVS scheme which is proven to be reusable with respect to arbitrary correlated fuzzy (biometric) inputs. Our efficiency improvement is achieved by strictly applying the subset-based sampling method used before to build a fuzzy extractor by Canetti et al. and by slightly modifying the structure of the verification key. Our FVS scheme can still tolerate sub-linear error rates of input sources and also reduce the signing cost of a user by about half of the original FVS scheme. Finally, we present authentication protocols based on fuzzy extractor and FVS scheme and give performance comparison between them in terms of computation and transmission costs.


2021 ◽  
Vol 10 (1) ◽  
pp. 13
Author(s):  
Claudia Campolo ◽  
Giacomo Genovese ◽  
Antonio Iera ◽  
Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts, such as smart homes, smart cities, smart factories. Although the traditional approach is to deploy such compute-intensive algorithms into the centralized cloud, the recent proliferation of low-cost, AI-powered microcontrollers and consumer devices paves the way for having the intelligence pervasively spread along the cloud-to-things continuum. The take off of such a promising vision may be hurdled by the resource constraints of IoT devices and by the heterogeneity of (mostly proprietary) AI-embedded software and hardware platforms. In this paper, we propose a solution for the AI distributed deployment at the deep edge, which lays its foundation in the IoT virtualization concept. We design a virtualization layer hosted at the network edge that is in charge of the semantic description of AI-embedded IoT devices, and, hence, it can expose as well as augment their cognitive capabilities in order to feed intelligent IoT applications. The proposal has been mainly devised with the twofold aim of (i) relieving the pressure on constrained devices that are solicited by multiple parties interested in accessing their generated data and inference, and (ii) and targeting interoperability among AI-powered platforms. A Proof-of-Concept (PoC) is provided to showcase the viability and advantages of the proposed solution.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2013 ◽  
Vol 3 (3) ◽  
pp. 1-9
Author(s):  
Neeraj Pandey ◽  
Gaganpreet Singh

Subject area Pricing, digital marketing, marketing management and strategic marketing. Study level/applicability The case can be used for pricing or digital marketing courses as well as marketing management courses to MBA students and/or for management development programmes. Case overview Goldfinch Mobile Solutions, a Hong-Kong based value added services (VAS) and gaming platform provider, had an exclusive tie up with Bharti Airtel in India for providing value added voice applications on an interactive voice response system (IVRS) platform. The Goldfinch flagship service is “Guru Ki Bani” which may be subscribed to by dialing the short code 58282. This “58282” service has a repository of all Sikh religion daily prayers, religious songs, teachings, stories from Guru's life and similar information that is derived from the Sikh Holy book Guru Granth Sahib Ji. As per mutual agreement between Goldfinch Mobile Solutions and Bharti Airtel, the telecom operator had the responsibility to promote Goldfinch's Guru Ki Bani service amongst its subscriber base through its below the line (BTL) promotional channels such as short messaging service (SMS), outbound calls, cell information, notification SMS after call and above the line (ATL) activities such as posters, leaflets, print, promoters, regional TV, outdoors, etc. The revenue sharing arrangement between Airtel and Golfinch was in the ratio of 75 percent and 25 percent. However, with recent changes in the policies of Telephone Regulatory Authority of India (TRAI), promotional marketing used by telecom operators has been constrained. Declining customer share, decreasing profits (after Bharti Airtel halted promotions) and increasing organization cost per customer have made MD and CEO Mr Newton Bubber think of various options including low-cost marketing initiatives besides digital marketing to promote Guru Ki Bani services. Value communication to its huge potential customer base, i.e. 184.19 million Bharti Airtel subscribers was another challenge facing Mr Newton and his marketing team at Goldfinch. Expected learning outcomes The case enables students to learn the concepts and application of value creation, effective value communication, price waterfall analysis, importance of costing parameters in pricing decisions, low-cost marketing strategies and digital marketing. Supplementary materials Teaching notes are available for educators only. Please contact your library to gain login details or email [email protected] to request teaching notes.


Sensor Review ◽  
2017 ◽  
Vol 37 (3) ◽  
pp. 338-345 ◽  
Author(s):  
Yawei Xu ◽  
Lihong Dong ◽  
Haidou Wang ◽  
Jiannong Jing ◽  
Yongxiang Lu

Purpose Radio frequency identification tags for passive sensing have attracted wide attention in the area of Internet of Things (IoT). Among them, some tags can sense the property change of objects without an integrated sensor, which is a new trend of passive sensing based on tag. The purpose of this paper is to review recent research on passive self-sensing tags (PSSTs). Design/methodology/approach The PSSTs reported in the past decade are classified in terms of sensing mode, composition and the ways of power supply. This paper presents operation principles of PSSTs and analyzes the characteristics of them. Moreover, the paper focuses on summarizing the latest sensing parameters of PSSTs and their matching equipment. Finally, some potential applications and challenges faced by this emerging technique are discussed. Findings PSST is suitable for long-term and large-scale monitoring compared to conventional sensors because it gets rid of the limitation of battery and has relatively low cost. Also, the static information of objects stored in different PSSTs can be identified by a single reader without touch. Originality/value This paper provides a detailed and timely review of the rapidly growing research in PSST.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Kulvinder Kaur ◽  
Pawan Kumar

PurposeThe rise in the use of Internet technologies and social media has shifted the marketing practices from offline to online. This study aims to determine the pros and cons of social media marketing in the beauty and wellness industry.Design/methodology/approachIn-depth interviews were conducted with the owners and marketing executives of beauty and wellness centers to understand the use of popular social media platforms in this industry and their pros and cons.FindingsThe researchers identified eight merits and seven demerits of social media in the beauty and wellness industry. Every respondent is happy and satisfied with social media use, particularly Instagram and Facebook. Irrespective of the demerits, they have shown the intention to increase its usage in the future. The merits override demerits; thus, social media is a blessing for this industry from the owners' perspective.Research limitations/implicationsThe research is exploratory and is confined to just one industry. Research implication is that the visual nature of social media makes it a powerful tool for the promotion of the beauty and wellness industry.Practical implicationsThe study's findings will be beneficial for small-scale businesses as it will push them to take advantage of this low-cost marketing tool.Social implicationsSocial media marketing is helpful for communication and marketing purposes for society.Originality/valueThe beauty and wellness industry remained unfocused by researchers because it is highly unorganized, fragmented and not regulated, yet has huge growth potential. This research will provide a closer look at this industry as well as social media marketing.


Kybernetes ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mi Tang ◽  
Hongmei Zhou ◽  
Qingyan Yan ◽  
Ruoyu Li ◽  
Hui Lu

PurposeHealthcare employs informatics to offer its services through information technology where the social network can aid virtual medical learning. Since the usage of the internet and other electronic tools for medical services delivery is at the initial stage, it is essential to examine the factors that condition patients and medical elements in a virtual environment can develop relationship models on the health services. So, the authors have systematically reviewed virtual medical learning and offered some suggestions for the upcoming works. The authors have also discovered gaps in the state-of-the-art papers and provided solutions for them.Design/methodology/approachNumerous novel advancements have changed the old exercise of therapeutic and analytic learning. Virtual spaces have quickly turned into a section of the learning technology vision. Given the importance of its achievements and endless low-cost expansion of the educational system, virtual education has been considered as one of the issues raised by the information communities. Medicine and health are some of the most important fields in virtual technologies. Hence, in this paper, we have used a systematic literature review to deeply examine virtual medical learning. After establishing exclusion and inclusion criteria, an independent systematic search in Google Scholar, ACM, Scopus, Eric, Science Direct, Springer link, Emerald, Global ProQuest and IEEE for relevant studies have been performed, and 21 papers have been analyzed. Detailed data have been mined out of the papers.FindingsThe authors have found that virtual medical learning improves and expands the knowledge core and meaningfully affects the exercise. Virtual learning (VL) has been used in many therapeutic zones, like therapeutic learning, surgery, diagnosing, combining and regularizing processes. It has presented a fundamental access point and a referral mechanism for all of a course's component communities. It can also simplify communicative education, allowing learners to get abilities before applying them in a real-world situation. Also, the communicative characteristics of different VL programs can somehow be like direct teaching.Research limitations/implicationsSome excellent work may be removed owing to applying the filters to select the primary papers. Surveying all the documents on the topic of virtual medical learning is impossible, too. Nevertheless, the authors have tried to present a perfect survey of virtual medical learning. The results will be helpful for scholars to propose better virtual medical learning techniques.Practical implicationsE-learning has become an indispensable additional learning tool in medical education. The introduction of new learning technologies, the exponential growth of Internet usage and the advent of the World Wide Web can change the face of higher education. The results will be helpful for scholars for the upcoming works. The application of a literature review of partial least squares theory was useful for offering comprehensive literary coverage and completing the knowledge development analysis. The authors have backed scholars and experts for better understanding the development of virtual medical learning systems via presenting comparative data and scrutinizing the present advances.Originality/valueThe paper enhances intellectual knowledge by improving the conception of virtual medical learning. It informs the development, use of virtual medical learning and the upcoming works. The lack of comprehensive papers in this field has increased the importance of this paper. The present paper can handle the pace of publications.


Sensor Review ◽  
2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mulayam Singh Gaur ◽  
Rajni Yadav ◽  
Mamta Kushwah ◽  
Anna Nikolaevna Berlina

Purpose This information will be useful in the selection of materials and technology for the detection and removal of mercury ions at a low cost and with high sensitivity and selectivity. The purpose of this study is to provide the useful information for selection of materials and technology to detect and remove the mercury ions from water with high sensitivity and selectivity. The purpose of this study is to provide the useful information for selection of materials and technology to detect and remove the mercury ions from water with high sensitivity and selectivity. Design/methodology/approach Different nano- and bio-materials allowed for the development of a variety of biosensors – colorimetric, chemiluminescent, electrochemical, whole-cell and aptasensors – are described. The materials used for their development also make it possible to use them in removing heavy metals, which are toxic contaminants, from environmental water samples. Findings This review focuses on different technologies, tools and materials for mercury (heavy metals) detection and remediation to environmental samples. Originality/value This review gives up-to-date and systemic information on modern nanotechnology methods for heavy metal detection. Different recognition molecules and nanomaterials have been discussed for remediation to water samples. The present review may provide valuable information to researchers regarding novel mercury ions detection sensors and encourage them for further research/development.


Sign in / Sign up

Export Citation Format

Share Document