Design of Military Information System User Authentication System Using FIDO 2.0-based Web Browser Secure Storage

2019 ◽  
Vol 19 (4) ◽  
pp. 43-53
Author(s):  
Jaeyeon Park ◽  
◽  
Jaeyoung Lee ◽  
Hyoungseok Lee ◽  
Jiwon Kang ◽  
...  
IoT ◽  
2021 ◽  
Vol 2 (2) ◽  
pp. 326-340
Author(s):  
Lorenzo Bracciale ◽  
Pierpaolo Loreti ◽  
Claudio Pisa ◽  
Alex Shahidi

The Internet of Things offers a wide range of possibilities that can be exploited more or less explicitly for user authentication, ranging from specifically designed systems including biometric devices to environmental sensors that can be opportunistically used to feed behavioural authentication systems. How to integrate all this information in a reliable way to get a continuous authentication service presents several open challenges. Among these: how to combine semi-trusted information coming from non-tamper-proof sensors, where to store such data avoiding a single point of failure, how to analyse data in a distributed way, which interface to use to provide an authentication service to a multitude of different services and applications. In this paper, we present a Blockchain-based architectural solution of a distributed system able to transform IoT interactions into useful data for an authentication system. The design includes: (i) a security procedure to certify users’ positions and identities, (ii) a secure storage to hold this information, and (iii) a service to dynamically assign a trust level to a user’s position. We call this system “Secure Path”.


Author(s):  
Akshay Valsaraj ◽  
Ithihas Madala ◽  
Nikhil Garg ◽  
Mohit Patil ◽  
Veeky Baths

Author(s):  
Harkeerat Bedi ◽  
Li Yang ◽  
Joseph M. Kizza

Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have an unfair advantage over the other once the transaction completes. Fair exchange protocols are a group of protocols that provide means for accomplishing such fair exchanges. In this chapter we analyze one such protocol which offers means for fair contract signing, where two parties exchange their commitments over a pre-negotiated contract. We show that this protocol is not entirely fair and illustrate the possibilities of one party cheating by obtaining the other’s commitment and not providing theirs. We also analyze a revised version of this protocol which offers better fairness by handling many of the weaknesses. Both these protocols however fail to handle the possibilities of replay attacks where an intruder replays messages sent earlier from one party to the other. Our proposed protocol improves upon these protocols by addressing to the weaknesses which leads to such replay attacks. We implement a complete working system which provides fair contract signing along with properties like user authentication and efficient password management achieved by using a fingerprint based authentication system and features like confidentiality, data-integrity and non-repudiation accomplished through implementation of cryptographic algorithms based on elliptic curves.


Sign in / Sign up

Export Citation Format

Share Document