remote authentication
Recently Published Documents


TOTAL DOCUMENTS

168
(FIVE YEARS 41)

H-INDEX

19
(FIVE YEARS 2)

2022 ◽  
Vol 54 (9) ◽  
pp. 1-35
Author(s):  
René Mayrhofer ◽  
Stephan Sigg

Mobile device authentication has been a highly active research topic for over 10 years, with a vast range of methods proposed and analyzed. In related areas, such as secure channel protocols, remote authentication, or desktop user authentication, strong, systematic, and increasingly formal threat models have been established and are used to qualitatively compare different methods. However, the analysis of mobile device authentication is often based on weak adversary models, suggesting overly optimistic results on their respective security. In this article, we introduce a new classification of adversaries to better analyze and compare mobile device authentication methods. We apply this classification to a systematic literature survey. The survey shows that security is still an afterthought and that most proposed protocols lack a comprehensive security analysis. The proposed classification of adversaries provides a strong and practical adversary model that offers a comparable and transparent classification of security properties in mobile device authentication.


2021 ◽  
Vol 9 ◽  
Author(s):  
Sudha Senthilkumar ◽  
K. Brindha ◽  
Natalia Kryvinska ◽  
Sweta Bhattacharya ◽  
Giridhar Reddy Bojja

The advent of the internet has brought an era of unprecedented connectivity between networked devices, making one distributed computing, called cloud computing, and popular. This has also resulted in a dire need for remote authentication schemes for transferring files of a sensitive nature, especially health-related information between patients, smart health cards, and cloud servers via smart health card solution providers. In this article, we elaborate on our proposed approach for such a system and accomplish an informal analysis to demonstrate the claim that this scheme provides sufficient security while maintaining usability.


Author(s):  
Atef Bentahar ◽  
Abdallah Meraoumia ◽  
Hakim Bendjenna ◽  
Salim Chitroub ◽  
Abdelhakim Zeroual

2021 ◽  
Vol 11 (1) ◽  
pp. 62-75
Author(s):  
Walidatush Sholihah ◽  
Armand Fadilla

ABSTRACTPT Rimba Makmur Utama is located on Jalan Kantin No.8 Kota Bogor. This private business company is engaged in the field of forest restoration on the island of Kalimantan, precisely in the Sampit region. This company's restoration is to save the forest from illegal logging and protect animals from extinction in the forests around the Sampit area. PT Rimba Makmur Utama is already using a hotspot so users can connect to the internet. However, problems arise when users move between rooms or places in the office but the wireless signal coverage cannot be reached. To overcome this, the solution is to build a Wireless Distribution System (WDS) network. WDS is a method that can be used to expand wireless networks by connecting multiple access points without using cables. Hotspot networks do not always provide fast and stable internet access. To overcome this, a user management system and bandwidth are needed using the Remote Authentication Dial In User Service protocol or RADIUS Server. User Manager is a RADIUS Server developed by MikroTik. All the area in the building have been covered with the internet. Users need username and password to connected to the network in the building.


Author(s):  
Ismail Puji Saputra ◽  
Ridwan Yusuf ◽  
Usep Saprudin

Banyaknya pengguna internet pada suatu tempat atau instansi menimbulkan sebuah antrian yang menyebabkan sulitnya pengguna dalam mengakses internet. Berdasarkan masalah tersebut penulis mengimplementasikan cloud computing sebagai radius server pada jaringan internet dengan menggunakan Router MikroTik sebagai alat manajemen bandwith, RADIUS (Remote Authentication Dial-In User Service) server akan dibangun didalam server Ubuntu dengan memanfaatkan service cloud computing dari AWS (Amazon WEB Service), selain sebagai RADIUS server, Dengan adanya RADIUS server yang dibangun dengan cloud computing dan Router MikroTik stabilitas jaringan internet pada suatu tempat atau instansi menjadi lebih baik dan proses manajemen pengguna menjadi mudah.


2021 ◽  
Author(s):  
Sheng-Kai Chen ◽  
Jenq-Shiou Leu ◽  
Hsieh Wen-Bin ◽  
Jui-Tang Wang ◽  
Tian Song

Abstract Remote user authentication schemes provide a system to verify the legitimacy of remote users’ authentication request over insecure communication channel. In last years, many authentication schemes using password and smart card have been proposed. However, password might be revealed or forgotten and smart card might be shared, lost or stolen. In contrast, the biometrics, such as face, fingerprint or iris, have no such weakness. With the trend of mobile payment, more and more applications of mobile payment use biometrics to replace password and smart card. In this paper, we propose a biometric-based remote authentication scheme substituting biometric and mobile device bounded by user for password and smart card. This scheme is more convenient, suitable and securer than the schemes using smart cards on mobile payment environment.


2021 ◽  
Author(s):  
Mahesh Kumar Morampudi ◽  
Munaga V. N. K. Prasad ◽  
Surya Narayana Raju Undi

2021 ◽  
Vol 7 ◽  
pp. e516
Author(s):  
Ahmad Ali ◽  
Mansoor Ahmed ◽  
Abid Khan ◽  
Adeel Anjum ◽  
Muhammad Ilyas ◽  
...  

The information security domain focuses on security needs at all levels in a computing environment in either the Internet of Things, Cloud Computing, Cloud of Things, or any other implementation. Data, devices, services, or applications and communication are required to be protected and provided by information security shields at all levels and in all working states. Remote authentication is required to perform different administrative operations in an information system, and Administrators have full access to the system and may pose insider threats. Superusers and administrators are the most trusted persons in an organisation. “Trust but verify” is an approach to have an eye on the superusers and administrators. Distributed ledger technology (Blockchain-based data storage) is an immutable data storage scheme and provides a built-in facility to share statistics among peers. Distributed ledgers are proposed to provide visible security and non-repudiation, which securely records administrators’ authentications requests. The presence of security, privacy, and accountability measures establish trust among its stakeholders. Securing information in an electronic data processing system is challenging, i.e., providing services and access control for the resources to only legitimate users. Authentication plays a vital role in systems’ security; therefore, authentication and identity management are the key subjects to provide information security services. The leading cause of information security breaches is the failure of identity management/authentication systems and insider threats. In this regard, visible security measures have more deterrence than other schemes. In this paper, an authentication scheme, “VisTAS,” has been introduced, which provides visible security and trusted authentication services to the tenants and keeps the records in the blockchain.


Symmetry ◽  
2021 ◽  
Vol 13 (5) ◽  
pp. 855
Author(s):  
Tzung-Her Chen ◽  
Wei-Bin Lee ◽  
Hsing-Bai Chen ◽  
Chien-Lung Wang

Although digital signature has been a fundamental technology for cryptosystems, it still draws considerable attention from both academia and industry due to the recent raising interest in blockchains. This article revisits the subliminal channel existing digital signature and reviews its abuse risk of the constructor’s private key. From a different perspective on the subliminal channel, we find the new concept named the chamber of secrets in blockchains. The found concept, whereby the secret is hidden and later recovered by the constructor from the common transactions in a blockchain, highlights a new way to encourage implementing various applications to benefit efficiency and security. Thus, the proposed scheme benefits from the following advantages: (1) avoiding the high maintenance cost of certificate chain of certificate authority, or public key infrastructure, and (2) seamlessly integrating with blockchains using the property of chamber of secrets. In order to easily understand the superiority of this new concept, a remote authentication scenario is taken as a paradigm of IoT to demonstrate that the further advantages are achieved: (1) avoiding high demand for storage space in IoT devices, and (2) avoiding maintaining a sensitive table in IoT server.


Sign in / Sign up

Export Citation Format

Share Document