data authentication
Recently Published Documents


TOTAL DOCUMENTS

166
(FIVE YEARS 68)

H-INDEX

8
(FIVE YEARS 4)

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Xiaolong Zhang ◽  
Wei Wu ◽  
Bin Zhou

Large-scale antenna technology has become one of the most promising technologies in 5G because of its ability to effectively improve the spectral efficiency and energy efficiency of the system, as well as its better robustness. In this paper, a large amount of CSI (channel state information) data is characterized by feature mining and law analysis, and a large number of channel characteristics of the physical layer have the advantages of randomness and uniqueness, etc. From the perspective of improving the security of the authentication mechanism and reducing the computational complexity of the authentication mechanism, the physical layer security authentication model is analyzed, and the signal security transmission path, signal authenticity, and channel estimation are used to propose an effective physical layer secure transmission and authentication mechanism, which can be used as a security enhancement and lightweight authentication mechanism for existing authentication mechanisms. In this paper, we analyze the security advantage mechanism of physical layer authentication and prove the security performance boundary; propose an authentication security enhancement method based on the channel feature generation key, a message authentication method based on superimposed tag signals; and propose a method based on private guide frequency for high-speed service data authentication.


2021 ◽  
Vol 33 (6) ◽  
pp. 0-0

Pallet pooling is regarded as a sustainable and cost-effective measure for the industry, but challenging to advocate due to weak data and pallet authentication.In order to establish trust between end-users and pallet pooling services, we propose an end-to-end, bidirectional authentication system for transmitted data and pallets based on blockchain and Internet-of-things (IoT) technologies. In addition, secure data authentication fosters the pallet authenticity in the whole supply chain network, which is achieved by considering the tag, location, and object-specific features. To evaluate the object-specific features, the scale invariant feature transform (SIFT) approach is adopted to match key-points and descriptors between two pallet images. According to the case study, it is found that the proposed system provides a low bandwidth blocking rate and a high probability of restoring complete data payloads. Consequently, positive influences on end-user satisfaction, quality of service, operational errors, and pallet traceability are achieved through the deployment of the proposed system.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.


2021 ◽  
Author(s):  
Joanna Hinks ◽  
James T. Gillis ◽  
Perry Loveridge ◽  
Shawn Shawn ◽  
Greg Myer ◽  
...  
Keyword(s):  

2021 ◽  
pp. 2250007
Author(s):  
Nirmala Krishnamoorthi ◽  
Vinoth Kumar Chinnababu

In reversible watermarking (RW), the original cover image and the watermarked information are restored without any distortion. A secure RW technique using hybrid prediction and difference pair mapping along with the hashing algorithm is proposed in this paper. The four-stage imperceptible watermarking employed in this technique enlarges the payload capacity with low distortion in stego-image. The data authentication is used for protection of message integrity and validation of originator identification. Mean square error and peak signal-to-noise ratio are used for analyzing the robustness of the watermarked image. The simulation result shows that this method performs better than the other existing state-of-the-art methods.


2021 ◽  
Vol 1 (3) ◽  
pp. 13-22
Author(s):  
Donald L. Buresh

This paper argues that the use of backdoors in software is inherently counterproductive and leads to invasion of privacy, either by federal or state governments or by intrusive hackers. The essay outlines encryption’s nature, pointing out that a software backdoor is a secret means of ignoring data authentication. Several examples of known backdoors known to terrorists, criminals, and governments alike are highlighted. Arguments in favor and opposing backdoors are provided, where the Apple Computer, Inc. v. FBI controversy is discussed. Finally, the balancing of harms test as proposed by John Stuart Mill is introduced, where the article concludes that when balancing the opposing positions, the scale tips toward data encryption because an innocent party would suffer the most harm from the existence of a software backdoor.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Guangyong Gao ◽  
Zhao Feng ◽  
Tingting Han

Data authentication is an important part of wireless sensor networks (WSNs). Aiming at the problems of high false positive rate and poor robustness in group verification of existing reversible watermarking schemes in WSNs, this paper proposes a scheme using reversible watermarking technology to achieve data integrity authentication with high detection efficiency (DAHDE). The core of DAHDE is dynamic grouping and double verification algorithm. Under the condition of satisfying the requirement of the group length, the synchronization point is used for dynamic grouping, and the double verification ensures that the grouping will not be confused. According to the closely related characteristics of adjacent data in WSNs, a new data item prediction method is designed based on the prediction-error expansion formula, and a flag check bit is added to the data with embedded watermarking during data transmission to ensure the stability of grouping, by which the fake synchronization point can be accurately identified. Moreover, the embedded data can be recovered accurately through the reversible algorithm of digital watermarking. Analysis and experimental results show that compared with the previously known schemes, the proposed scheme can avoid false positive rate, reduce computation cost, and own stronger grouping robustness.


2021 ◽  
Author(s):  
Ting Xiong ◽  
Shaojin Fu ◽  
Xiaochun Luo ◽  
Tao Xie

While the Domain Name System (DNS) is an infrastructure of the current network, it still faces the problem of centralization and data authentication according to its concept and practice. Decentralized storage of domain names and user local verification using blockchain may be effective solutions. However, since the blockchain is an add-only type database, domain name changes will cause out of date records to still be correct when using the Simplified Payment Verification (SPV) mechanism locally. This paper mainly introduces Local Enhanced Authentication DNS (LEA-DNS), which allows domain names to be stored in public blockchain database to provide decentralization feature and is compatible with the existing DNS. It achieves the validity and timeliness of local domain name resolution results to ensure correct and up to date with the Merkle Mountain Range and RSA accumulator technologies. Experiments show that less than 3.052Kb is needed for each DNS request to be validated, while the validation time is negligible, and only 9.44Kb of data need to be stored locally by the web client. Its compatibility with the existing DNS system and the lightness of the validation protocols indicate that this is a system suitable for deployment widely.


Sign in / Sign up

Export Citation Format

Share Document