scholarly journals Using BLOCKCHAIN in automotive security

Radiotekhnika ◽  
2020 ◽  
pp. 97-108
Author(s):  
I.D. Gorbenko ◽  
D. Fesenko

The analysis of problems of using authentication systems for automobile systems is carried out. It is shown that criminals are increasingly interested in modern car protection systems, cars are becoming more technological, which in turn opens up new opportunities for compromising the operation of vehicle components and systems, so security systems are increasingly required to ensure efficiency and safety. Modern systems of protection against illegal seizure of vehicles, better known as "alarms" try to deter attacks by intruders, but in turn can bring additional backdoors for intruders completely unintentionally, for example by adding an interesting feature to the car system, and then this feature can be dual due to problems with the authentication system. Therefore, based on this, car security systems must have the highest level of authentication security, which requires the use of a decentralized blockchain network with nodes for each car, authenticating the user in groups, this will move away from the standard client-server architecture, which is not sufficiently secure. . The main ways to solve this problem are to build a comprehensive security system, which in turn includes an improved and reliable authentication measure based on a decentralized blockchain network and two comprehensive schemes to update the critical data transmission system of the car – CAN network. The use of these systems will improve the security of the identification system and information flowing between critical units, which will improve the safety of the car from theft, as well as from the ability of attackers to create emergencies remotely.

2019 ◽  
pp. 923-945
Author(s):  
Basma Mohammed Hassan ◽  
Khaled Mohammed Fouad ◽  
Mahmoud Fathy Hassan

Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard based on everyone has a unique style for writing. The other biometric methods are addressed with each advantage and disadvantage along with keystroke method. In this paper, all known studies about keystroke technique are explained and compared between them according to the classification technique, number of the participated users and each study results then introduces a survey on software and hardware of other biometric authentication techniques and after the literature review is addressed then keystroke as a biometric authentication system is suggested to access cloud computing environment because it has many advantages to being a part of the known security systems which spread in our world.


2015 ◽  
Vol 11 (4) ◽  
pp. 99-120 ◽  
Author(s):  
Basma Mohammed Hassan ◽  
Khaled Mohammed Fouad ◽  
Mahmoud Fathy Hassan

Cloud computing needs a strong and efficient authentication system because the user will access his rented part through a faraway connection and it will make the authentication sensor device besides the user place for identification and verification so how to know the user who claimed himself to be the legal user. Keystroke identification system as a biometric authentication technique is strongly Candidate for the security issues in cloud computing technology. Keystroke dynamics as a security system did not need extra hardware because the authentication device will be the existing keyboard based on everyone has a unique style for writing. The other biometric methods are addressed with each advantage and disadvantage along with keystroke method. In this paper, all known studies about keystroke technique are explained and compared between them according to the classification technique, number of the participated users and each study results then introduces a survey on software and hardware of other biometric authentication techniques and after the literature review is addressed then keystroke as a biometric authentication system is suggested to access cloud computing environment because it has many advantages to being a part of the known security systems which spread in our world.


2021 ◽  
Vol 17 (1) ◽  
pp. 287-292
Author(s):  
Adriana-Meda UDROIU ◽  
Ștefan-Antonio DAN-ȘUTEU

Abstract: We introduce the term usable security to refer to security systems, models, mechanisms and applications that have as the main goal usability. Secure systems cannot exist without secure authentication methods. Thus we outline biometric authentication methods and we focus on iris recognition because is the most reliable and accurate method for human identification]. The most important advantage of iris biometric over other biometrics is that irises have enormous pattern variability meaning that the variation between individual is almost maximum and variation for any person across time or conditions is minimum. Taking into consideration this observations, this survey covers researches in this field, methods of technical implementation and the usability of this method as an authentication system on iOS environment.


Author(s):  
Tripti Rani Borah ◽  
Kandarpa Kumar Sarma ◽  
Pranhari Talukdar

In all authentication systems, biometric samples are regarded to be the most reliable one. Biometric samples like fingerprint, retina etc. is unique. Most commonly available biometric system prefers these samples as reliable inputs. In a biometric authentication system, the design of decision support system is critical and it determines success or failure. Here, we propose such a system based on neuro and fuzzy system. Neuro systems formulated using Artificial Neural Network learn from numeric data while fuzzy based approaches can track finite variations in the environment. Thus NFS systems formed using ANN and fuzzy system demonstrate adaptive, numeric and qualitative processing based learning. These attributes have motivated the formulation of an adaptive neuro fuzzy inference system which is used as a DSS of a biometric authenticable system. The experimental results show that the system is reliable and can be considered to be a part of an actual design.


2020 ◽  
pp. 12-21
Author(s):  
Marina Ozhiganova ◽  
Anastasia Kalita ◽  
Yevgeny Tishchenko

Over the past few decades, there has been a tendency to minimize the participation of the human factor in various production and other processes. This process is implemented through the mass introduction of automated systems (as). Human-machine complexes are currently the most common and productive model of activity. At the current stage of technology development, the process of automating human activity is only an intermediate link on the way to eliminating human intervention. This area is most relevant for systems that pose a potential and real threat to human health and life (for example, manufacturing plants) or systems that are threatened by humans (for example, transport systems). The second group includes the sphere of information security. The paper considers the basics of the organization of adaptive information protection systems, their application areas for information protection and methods of building models of adaptive information protection systems in the context of their application for protection against leakage through technical channels. The authors propose a generalized model of the adaptive information protection system against leakage through technical channels.


Author(s):  
A. M. Kadnova

Objectives At present, in accordance with the requirements of the guiding documents of the Federal Service for Technical and Export Control (FSTEC) of Russia, as well as international standards in the development and operation of protected automated systems, it is necessary to evaluate the effectiveness (general utility) of information protection systems. The article is devoted to the development of a method for assessing the ergotechnical characteristics of software information security systems for use the assessment of the general utility of such systems. The aim of the work is to develop a methodology for assessing the probabilistic indicator of the timeliness of typical operations for the administration of information security systems.Method To achieve this goal, user groups were created in order to perform typical administrative operations within the information protection system. The operation time for each group, recorded using the IOGraphV1.0.1 tool, was utilised to calculate the probabilities of timely execution of typical operations by the administrator according to a truncated normal distribution formula.Results An assessment of a probabilistic indicator was carried out in order to evaluate the timeliness of operations performed by the administrator of the information protection system.Conclusion The results can be used in a comprehensive assessment of the effectiveness (reliability) of the automated functioning of information security software systems when modelling and analysing the security of special-purpose informatisation facilities.


Author(s):  
Jian Bai ◽  
Zhuo Zhang ◽  
Bingshen Shen

With the rise of technologies such as mobile Internet, 5G networks and artificial intelligence, the development of Internet of Vehicle Information Security (ICVS) has become the mainstream and direction for the future development of the automotive industry. ICVS, people, roads, clouds, and APP constitute a complex network of vehicles. As part of the Internet, vehicle networking will inevitably face various complex information security threats and risks. This paper aims to design a kind of security situation awareness of Internet of vehicles based on intrusion detection protection systems (IDPS). By collecting the security data of car, app and private cloud for big data analysis, the whole smart car security situation awareness system is constructed. The system can be used to analyze potential threats, send out warnings, and carry out emergency responses.


2012 ◽  
Vol 479-481 ◽  
pp. 2082-2085 ◽  
Author(s):  
Yuan Wang ◽  
Li Liu ◽  
Qian Song ◽  
Ya Ping Bao

Aiming at low portability and undue dependence on the SSD database of most of authentication system, a fingerprint identification system based on a two-dimensional bar code and DSP was proposed. The central processor TMS320VC5416 was used, and the fingerprint information obtained from PDF417 barcode by the barcode reading device was fuzzy matched with that by online real-time collection. The quick verification of the card holder’s identity was realized.


2015 ◽  
Vol 15 (3) ◽  
pp. 591
Author(s):  
R. Parimala Mala ◽  
C. Jayakumar Kumar

Secret knowledge, like remembering password or token based authentication systems are deemed inconvenience and difficult to use for users such as password may be forgotten or token may be lost. So burdens like remembering password and stolen or forged token based authentication have raised a current trend of biometric authentication system. Now in this current tech world, everyone needs security everywhere to protect our personal gadgets.  So to keep it secured, biometric based approach can be applied for better convenience and ease of use for the user. In this paper, a novel hybrid multimodal approach for ear recognition and finger print recognition has been presented for better robustness and efficiency which can be applied in various fields of applications like authentication in banking transactions. Biometric based human recognition is rapidly gaining popularity due to breached of traditional security systems and the lowering cost of sensors. This paper comprehensively reviews multimodal recognition using ear pattern and finger print data, it is concluded that further research should investigate fast and fully automatic ear-finger print multimodal systems robust to occlusions and deformations.


2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Yu Jiang ◽  
Hua Fu ◽  
Aiqun Hu ◽  
Wen Sun

The access control mechanism in LoRa has been proven to have high security risks. In order to improve the secure access ability of LoRa terminals, this paper presents a physical layer-based authentication system for security enhancement. Different from the security access technology of cryptography, a lightweight gateway architecture called LW-LoRaWAN is proposed to realize a data frame-based authentication with radio frequency fingerprint (RFF). A novel RFF feature of Cross Power Spectral Density (CPSD) is used to achieve a fast authentication with one single frame. Theoretical analysis and experimental results show that the proposed system not only reinforces the authentication security of LoRa network but also protects the LoRa terminals against the Sybil attacks. The LW-LoRaWAN provides new security approach from physical layer for LoRa network.


Sign in / Sign up

Export Citation Format

Share Document