scholarly journals An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices

2020 ◽  
Vol 2020 ◽  
pp. 1-9
Author(s):  
Qinglong Huang ◽  
Haiping Huang ◽  
Wenming Wang ◽  
Qi Li ◽  
Yuhan Wu

With the increasing number of smart mobile devices, applications based on mobile network take an indispensable role in the Internet of Things. Due to the limited computing power and restricted storage capacity of mobile devices, it is very necessary to design a secure and lightweight authentication scheme for mobile devices. As a lightweight cryptographic primitive, the hash chain is widely used in various cryptographic protocols and one-time password systems. However, most of the existing research work focuses on solving its inherent limitations and deficiencies, while ignoring its security issues. We propose a novel construction of hash chain that consists of multiple different hash functions of different output lengths and employ it in a time-based one-time password (TOTP) system for mobile device authentication. The security foundation of our construction is that the order of the hash functions is confidential and the security analysis demonstrates that it is more secure than other constructions. Moreover, we discuss the degeneration of our construction and implement the scheme in a mobile device. The simulation experiments show that the attacker cannot increase the probability of guessing the order by eavesdropping on the invalid passwords.

2018 ◽  
Vol 2018 ◽  
pp. 1-7 ◽  
Author(s):  
Chen Wang ◽  
Wenying Zheng ◽  
Sai Ji ◽  
Qi Liu ◽  
Anxi Wang

Smart mobile devices are one of the core components of the wireless body area networks (WBANs). These devices shoulder the important task of collecting, integrating, and transmitting medical data. When a personal computer collects information from these devices, it needs to authenticate the identity of them. Some effective schemes have been put forward to the device authentication in WBANs. However, few researchers have studied the WBANs device authentication in emergency situations. In this paper, we present a novel system named emergency medical system without the assistance of doctors. Based on the system, we propose an identity-based fast authentication scheme for smart mobile devices in WBANs. The scheme can shorten the time of device authentication in an emergency to achieve fast authentication. The analysis of this paper proves the security and efficiency of the proposed scheme.


Author(s):  
Kalliopi Kanaki ◽  
Nikolaos D. Katsali

In this paper, we present augmented reality applications implemented by students and teachers of the 5th Vocational High School of Heraklion in Crete, within the context of informatics courses. The applications aim to enhance the traveling experience of the visitors of Heraklion city, exploiting the global spread of smart mobile devices in contemporary societies and the facilities they provide. The whole project was accomplished in a collaborative manner and focused on the provision of information about museums and monuments of Heraklion city. The applications have to be installed on the smart mobile device of the user.


Author(s):  
Heru Susanto

In recent years, the number of mobile device users has increased at a significant rate due to the rapid technological advancement in mobile technology. While mobile devices are providing more useful features to its users, it has also made it possible for cyber threats to migrate from desktops to mobile devices. Thus, it is important for mobile device users to be aware that their mobile device could be exposed to cyber threats and that users could protect their devices by employing cyber security measures. This study discusses how users in responded to the smart mobile devices (SMD) breaches. A number of behavioural model theories are used to understand the user behaviour towards security features of smart mobile devices. To assess the impact of smart mobile devices (SMD) security and privacy, surveys had been conducted with users, stressing on product preferences, user behaviour of SMD, as well as perceptions on the security aspect of SMD. The results was very interesting, where the findings revealed that there were a lack of positive relationships between SMD users and their level of SMD security awareness. A new framework approach to securing SMD is proposed to ensure that users have strong protection over their data within SMD.


Sign in / Sign up

Export Citation Format

Share Document