unified authentication
Recently Published Documents


TOTAL DOCUMENTS

39
(FIVE YEARS 10)

H-INDEX

3
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Shubham Joshi ◽  
Shalini Stalin ◽  
Prashant Kumar Shukla ◽  
Piyush Kumar Shukla ◽  
Ruby Bhatt ◽  
...  

The Internet of Things (IoT) is a new revolution defined by heterogeneous devices made up of intelligent, omnipresent items that are all hooked up to The internet. These devices are frequently implemented in different areas to offer innovative programs in various industrial applications, including intelligent urban, medicine, and societies. Such Internet of Things (IoT) equipment generates a large volume of private and safety information. Because IoT systems are resource-constrained in terms of operation, memory, and communication capability, safeguarding accessibility to them is a difficult task. In the blockchain concept, the majority, or even all network nodes, check the validity and accuracy of exchanged data before accepting and recording it, whether this data is related to financial transactions, measurements of a sensor, or an authentication message. In evaluating the validity of exchanged data, nodes must reach a consensus in order to perform a special action, in which case the opportunity to enter and record transactions and unreliable interactions with the system is significantly reduced. Recently, in order to share and access management of IoT devices’ information with a distributed attitude, a new authentication protocol based on blockchain has been proposed, and it is claimed that this protocol satisfies user privacy while preserving security. Today’s identification and authentication techniques have substantial shortcomings due to rapidly growing prevalence and implementation. As a result, the protection of such gadgets is critical to guarantee the program’s efficacy and safety. A decentralized authentication and access control method for lightweight IoT systems are proposed in this work and a blockchain-based system that enables identification and secures messaging with IoT nodes. The technique is built on fog information systems and the idea of a blockchain system; when contrasted to something like a blockchain-based verification system, the testing findings show that the suggested mechanism outperforms it. The authentication and verification system undergoes using the blockchain technique. Our method takes advantage of blockchain’s inherent advantages while also associated with development authentication systems. Our suggested blockchain-based approach, structure, and layout, in particular, provide for transparency, consistency, and provenance while also providing tamper-proof records. The article describes the general systems architectural style and the analysis and execution of a real scenario as just a prototype system. The authentication included give as protected prototype that can transmit data with secured protocol and achieves minimum error rate.


Author(s):  
Dawei Li ◽  
Yingxian Song ◽  
Lixin Zhang ◽  
Di Liu ◽  
Baoquan Ma ◽  
...  

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Darpan Anand ◽  
Vineeta Khemchandani ◽  
Munish Sabharawal ◽  
Omar Cheikhrouhou ◽  
Ouissem Ben Fredj

Authentication is the primary and mandatory process for any Information and Communication Technology (ICT) application to prove the legitimacy of the genuine user. It becomes more important and crucial for public platforms like e-governance platforms. The Government of India is transforming the country into Digital India through various e-governance initiatives based on ICT. For authentication, National e-Authentication Framework (NeAF) was proposed by the Indian government which is a policy framework for authentication. This framework does not provide any technical and unified solution for authentication systems while it is based on centralized verification data. In this paper, we proposed a solution for the authentication which provides the unified authentication solution for the Indian e-governance system with existing infrastructure. This solution also provides the features such as scalability, security, and transparency based on distributed computing and working on multiserver architecture. This solution also fulfills the need of the current Indian government to provide multiple e-governance services through a single smart card.


2021 ◽  
Vol 188 ◽  
pp. 107811
Author(s):  
Fatma Hendaoui ◽  
Hamdi Eltaief ◽  
Habib Youssef

2021 ◽  
Vol 28 (2) ◽  
pp. 78-85
Author(s):  
Qimei Cui ◽  
Zengbao Zhu ◽  
Wei Ni ◽  
Xiaofeng Tao ◽  
Ping Zhang

2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2019 ◽  
Author(s):  
Rajavelsamy R ◽  
Debabrata Das

5G promises to support new level of use cases that will deliver a better user experience. The 3rd Generation Partnership Project (3GPP) [1] defined 5G system introduced fundamental changes on top of its former cellular systems in several design areas, including security. Unlike in the legacy systems, the 5G architecture design considers Home control enhancements for roaming customer, tight collaboration with the 3rd Party Application servers, Unified Authentication framework to accommodate various category of devices and services, enhanced user privacy, and secured the new service based core network architecture. Further, 3GPP is investigating the enhancements to the 5G security aspects to support longer security key lengths, False Base station detection and wireless backhaul in the Phase-2 of 5G standardization [2]. This paper provides the key enhancements specified by the 3GPP for 5G system, particularly the differences to the 4G system and the rationale behind the decisions.


2019 ◽  
Vol 2019 ◽  
pp. 1-16 ◽  
Author(s):  
Jhon Francined Herrera-Cubides ◽  
Paulo Alonso Gaona-García ◽  
Geiner Alexis Salcedo-Salgado

In LOD, authentication is a key factor in the security dimension of linked data quality models. This is the case of (a) LMS that manages open educational resources (OERs), in training process, and (b) LMS integrated platforms, which also require authenticating users. Authentication tackles a range of problems such as users forgetting passwords and time consumption in repetitive logins in different applications. In the context of linked OERs that are developed in LMS, it is necessary to design guidelines in order to carry out the authentication process. This process authorizes access to different linked resources platforms. Therefore, to provide abstraction methods for this authentication process, it is proposed to work with model-driven architecture (MDA) approach. This paper proposes a security abstraction model on LMS, based on MDA. The proposed metamodel seeks to provide a set of guidelines on how to carry out unified authentication, establishing a common dialogue among stakeholders. Conclusion and future work are proposed in order to generate authentication instances that allow access to resources managed in different platforms.


Sign in / Sign up

Export Citation Format

Share Document