authentication system
Recently Published Documents


TOTAL DOCUMENTS

1549
(FIVE YEARS 469)

H-INDEX

26
(FIVE YEARS 8)

Author(s):  
Waly Fall ◽  
Djamal Abdoul Nasser Seck ◽  
Fabé Idrissa Barro

This article focuses on the realization of an access control system based on RFID (Radio Frequency by Identification) technology. It is an authentication system for controlling access to a sensitive place. This system is composed of RFID cards which are badges that act as electronic keys, an RFID reader, an electronic lock, a microcontroller, a wifi module and a database installed on a computer. The identification number of an RFID card detected by the RFID reader is transferred, via the serial interface, to the microcontroller that communicates with the computer through the wifi module for verification in the database. If the information is valid, the microcontroller triggers the opening of the electronic lock.


Author(s):  
Sathiya Lakshmanan ◽  
Palanisamy Velliyan ◽  
Abdelouahab Attia ◽  
Nour Elhouda Chalabi

2022 ◽  
pp. 61-77
Author(s):  
Jie Lien ◽  
Md Abdullah Al Momin ◽  
Xu Yuan

Voice assistant systems (e.g., Siri, Alexa) have attracted wide research attention. However, such systems could receive voice information from malicious sources. Recent work has demonstrated that the voice authentication system is vulnerable to different types of attacks. The attacks are categorized into two main types: spoofing attacks and hidden voice commands. In this chapter, how to launch and defend such attacks is explored. For the spoofing attack, there are four main types, such as replay attacks, impersonation attacks, speech synthesis attacks, and voice conversion attacks. Although such attacks could be accurate on the speech recognition system, they could be easily identified by humans. Thus, the hidden voice commands have attracted a lot of research interest in recent years.


2022 ◽  
Vol 15 (1) ◽  
pp. 1-21
Author(s):  
Varun Prajapati ◽  
Brij B. Gupta

User Authentication plays a crucial role in smart card based systems. Multi-application smart cards are easy to use as a single smart card supports more than one application. These cards are broadly divided into single identity cards and Multi-identity cards. In this paper we have tried to provide a secure Multi-identity Multi-application Smart Card Authentication Scheme. Security is provided to user’s data by using dynamic tokens as verifiers and nested cryptography. A new token is generated after every successful authentication for next iteration. Anonymity is also provided to data servers which provides security against availability attacks. An alternate approach to store data on servers is explored which further enhances the security of the underlying system.


Author(s):  
Ilyenko Anna ◽  
◽  
Ilyenko Sergii ◽  
Herasymenko Marharyta

During the research, the analysis of the existing biometric cryptographic systems was carried out. Some methods that help to generate biometric features were considered and compared with a cryptographic key. For comparing compact vectors of biometric images and cryptographic keys, the following methods are analyzed: designing and training of bidirectional associative memory; designing and training of single-layer and multilayer neural networks. As a result of comparative analysis of algorithms for extracting primary biometric features and comparing the generated image to a private key within the proposed authentication system, it was found that deep convolutional networks and neural network bidirectional associative memory are the most effective approach to process the data. In the research, an approach based on the integration of a biometric system and a cryptographic module was proposed, which allows using of a generated secret cryptographic key based on a biometric sample as the output of a neural network. The RSA algorithm is chosen to generate a private cryptographic key by use of convolutional neural networks and Python libraries. The software authentication module is implemented based on the client-server architecture using various internal Python libraries. Such authentication system should be used in systems where the user data and his valuable information resources are stored or where the user can perform certain valuable operations for which a cryptographic key is required. Proposed software module based on convolutional neural networks will be a perfect tool for ensuring the confidentiality of information and for all information-communication systems, because protecting information system from unauthorized access is one of the most pressing problems. This approach as software module solves the problem of secure generating and storing the secret key and author propose combination of the convolutional neural network with bidirectional associative memory, which is used to recognize the biometric sample, generate the image, and match it with a cryptographic key. The use of this software approach allows today to reduce the probability of errors of the first and second kind in authentication system and absolute number of errors was minimized by an average of 1,5 times. The proportion of correctly recognized images by the comparating together convolutional networks and neural network bidirectional associative memory in the authentication software module increased to 96,97%, which is on average from 1,08 times up to 1,01 times The authors further plan a number of scientific and technical solutions to develop and implement effective methods, tools to meet the requirements, principles and approaches to cybersecurity and cryptosystems for provide integrity and onfidentiality of information in experimental computer systems and networks.


2021 ◽  
pp. 102583
Author(s):  
Wencheng Yang ◽  
Song Wang ◽  
James Jin Kang ◽  
Michael N. Johnstone ◽  
Aseel Bedari

Sign in / Sign up

Export Citation Format

Share Document