Enhancing the security in signature verification for WSN with cryptographic algorithm

Author(s):  
U. Jasmin ◽  
R. Velayutham
2014 ◽  
Vol 134 (12) ◽  
pp. 1809-1816
Author(s):  
Yuta Kamihira ◽  
Wataru Ohyama ◽  
Tetsushi Wakabayashi ◽  
Fumitaka Kimura

2020 ◽  
Vol 4 (3) ◽  
pp. 591-600
Author(s):  
Mochammad Rizky Royani ◽  
Arief Wibowo

The development of e-commerce in Indonesia in the last five years has significantly increased the growth for logistics service companies. The Indonesian Logistics and Forwarders Association (ALFI) has predicted the growth potential of the logistics business in Indonesia to reach more than 30% by 2020. One of the efforts of logistics business companies to improve services in the logistics services business competition is to implement web service technology on mobile platforms, to easy access to services for customers. This research aims to build a web service with a RESTful approach. The REST architecture has limitations in the form of no authentication mechanism, so users can access and modify data. To improve its services, JSON Web Token (JWT) technology is needed in the authentication process and security of access rights. In terms of data storage and transmission security, a cryptographic algorithm is also needed to encrypt and maintain confidentiality in the database. RC4 algorithm is a cryptographic algorithm that is famous for its speed in the encoding process. RC4 encryption results are processed with the Base64 Algorithm so that encrypted messages can be stored in a database. The combination of the RC4 method with the Base64 method has strengthened aspects of database security. This research resulted in a prototype application that was built with a combination of web service methods, JWT and cryptographic techniques. The test results show that the web service application at the logistics service company that was created can run well with relatively fast access time, which is an average of 176 ms. With this access time, the process of managing data and information becomes more efficient because before making this application the process of handling a transaction takes up to 20 minutes.


2014 ◽  
Vol 24 ◽  
pp. 47-52
Author(s):  
Joanna Putz-Leszczynska

This paper addresses template ageing in automatic signature verification systems. Handwritten signatures are a behavioral biometric sensitive to the passage of time. The experiments in this paper utilized a database that contains signature realizations captured in three sessions. The last session was captured seven years after the first one. The results presented in this paper show a potential risk of using an automatic handwriting verification system without including template ageing Purchase Article for $10 


2018 ◽  
Vol 28 (4) ◽  
pp. 1361-1365
Author(s):  
Ilhan Istikbal Ibryam ◽  
Byulent Mustafa Mustafa ◽  
Atti Rashtid Mustafa

With the introduction of Information Technology in educational process we need more often to use electronic evaluation. The examples of test variants in the secondary school are often prepared with the help of word processing editors as WordPad that has good opportunities for elementary text formatting. Another part of the teachers often use Microsoft Word when preparing their tests. It is true that Microsoft Word has much more editing and formatting instruments than WordPad. For access to electronic educational resources suggested by the school teachers two or more computer networks are built (teachers' and learners'). Using these networks and their access rights, each user, learner or teacher, has the opportunity to add files and directories into the school database (DB). Learners can add files with the exercises they have done during their classes. Teachers suggest through the database the electronic lessons they have developed. At the end of each unit each teacher prepares an electronic test. In it there are described the evaluation criteria depending on the number of points the student has gathered through correct responses. In most cases we notice that in the teachers' network files with the responses of the tests are added later on. Not always the means for defence offered by the system administrators at the school can guarantee the safety of our files and more exactly the manipulation of the answers of the electronic forms of check up. Aiming at more effective defence of the text files, this article views an algorithm created by us for cryptographic defence of text files and it's application in secondary school. The effective use of cryptographic information defence minimises the opportunity to decipher the coded information aiming at its misuse by the learners. Providing safe defence against unsanctioned access in computer communication is a complex and extensive task which is solved by means of a set of measures of organisation and programme-technical character. The defence of the process of submitting data requires utmost attention because it concerns the most vulnerable and accessible for violation points in the communication systems.


Sign in / Sign up

Export Citation Format

Share Document