scholarly journals Implementation of User Authentication System in Smart Hospitals Useful in the Age of the Covid-19 Pandemic

Author(s):  
Nenad Badovinac

The security system for authentication and user records in a smart hospital is part of an integrated security system consisting of various authentication devices. The security system should be adapted to different characteristics of users, their user processes, but also to periods when the possibility of infection is increased due to a virus pandemic and contamination during multiple touches of different persons on authentication devices. The use of gloves and a medical face mask during a pandemic limits biometric scanning of fingerprints and facial images. During a virus pandemic, some authentication devices have limitations that need to be considered when creating an integrated security system that will have the purpose of securing doctors, staff, patients, information, and things in a smart hospital. In this paper, the parameters on the basis of which it is possible to design an optimally integrated security system are recommended.

2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Hyunsoek Choi ◽  
Hyeyoung Park

As a novel approach to perform user authentication, we propose a multimodal biometric system that uses faces and gestures obtained from a single vision sensor. Unlike typical multimodal biometric systems using physical information, the proposed system utilizes gesture video signals combined with facial images. Whereas physical information such as face, fingerprints, and iris is fixed and not changeable, behavioral information such as gestures and signatures can be freely changed by the user, similar to a password. Therefore, it can be a countermeasure when the physical information is exposed. We aim to investigate the potential possibility of using gestures as a signal for biometric system and the robustness of the proposed multimodal user authentication system. Through computational experiments on a public database, we confirm that gesture information can help to improve the authentication performance.


Author(s):  
Akshay Valsaraj ◽  
Ithihas Madala ◽  
Nikhil Garg ◽  
Mohit Patil ◽  
Veeky Baths

Author(s):  
Harkeerat Bedi ◽  
Li Yang ◽  
Joseph M. Kizza

Fair exchange between a pair of parties can be defined as the fundamental concept of trade where none of the parties involved in the exchange have an unfair advantage over the other once the transaction completes. Fair exchange protocols are a group of protocols that provide means for accomplishing such fair exchanges. In this chapter we analyze one such protocol which offers means for fair contract signing, where two parties exchange their commitments over a pre-negotiated contract. We show that this protocol is not entirely fair and illustrate the possibilities of one party cheating by obtaining the other’s commitment and not providing theirs. We also analyze a revised version of this protocol which offers better fairness by handling many of the weaknesses. Both these protocols however fail to handle the possibilities of replay attacks where an intruder replays messages sent earlier from one party to the other. Our proposed protocol improves upon these protocols by addressing to the weaknesses which leads to such replay attacks. We implement a complete working system which provides fair contract signing along with properties like user authentication and efficient password management achieved by using a fingerprint based authentication system and features like confidentiality, data-integrity and non-repudiation accomplished through implementation of cryptographic algorithms based on elliptic curves.


Author(s):  
Faizal Khan ◽  
Sultan Refa Alotaibi

The system based on formalized teaching with the help of electronic resources is called as E-learning. Using E-Learning in the university education systems has been growing rapidly based on the application of Information Technology (IT) designed for the substitute of traditional based learning approach. In terms of the E-learning based examinations, security constraints such as, identification of the user, misuse the passwords, unauthorized user instead of the authenticated one are available. Because of these disadvantages, the need of an authentication system is very important. The main challenge facing the security of E-learning environment is how to identify the unauthorized users from accessing and managing any platform. Therefore solving the problem of authenticating the valid user is very important. So, an intelligent examination system along with user authentication based on facial expression recognition is proposed in this paper. The proposed system can be classified in to three phases. The first phase is the design of facial database from the captured images. The second phase is the design of Artificial Intelligence (AI) based system for facial feature extraction and its classification using intelligent Agents. The final phase is the authentication of respective users by automatic identification of facial images. The results obtained shows that the proposed methodology has managed to validate the authenticated users and to provide an effective security in the E-learning platform.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Fernando Nakayama ◽  
Paulo Lenz ◽  
Stella Banou ◽  
Michele Nogueira ◽  
Aldri Santos ◽  
...  

Smart health (s-health) is a vital topic and an essential research field today, supporting the real-time monitoring of user’s data by using sensors, either in direct or indirect contact with the human body. Real-time monitoring promotes changes in healthcare from a reactive to a proactive paradigm, contributing to early detection, prevention, and long-term management of health conditions. Under these new conditions, continuous user authentication plays a key role in protecting data and access control, once it focuses on keeping track of a user’s identity throughout the system operation. Traditional user authentication systems cannot fulfill the security requirements of s-health, because they are limited, prone to security breaches, and require the user to frequently authenticate by, e.g., a password or fingerprint. This interrupts the normal use of the system, being highly inconvenient and not user friendly. Also, data transmission in current authentication systems relies on wireless technologies, which are susceptible to eavesdropping during the pairing stage. Biological signals, e.g., electrocardiogram (ECG) and electroencephalogram (EEG), can offer continuous and seamless authentication bolstered by exclusive characteristics from each individual. However, it is necessary to redesign current authentication systems to encompass biometric traits and new communication technologies that can jointly protect data and provide continuous authentication. Hence, this article presents a novel biosignal authentication system, in which the photoplethysmogram (PPG) biosignal and a galvanic coupling (GC) channel lead to continuous, seamless, and secure user authentication. Furthermore, this article contributes to a clear organization of the state of the art on biosignal-based continuous user authentication systems, assisting research studies in this field. The evaluation of the system feasibility presents accuracy in keeping data integrity and up to 98.66% accuracy in the authentication process.


Sign in / Sign up

Export Citation Format

Share Document