authentication security
Recently Published Documents


TOTAL DOCUMENTS

101
(FIVE YEARS 44)

H-INDEX

7
(FIVE YEARS 1)

Author(s):  
Abbas Behrainwala

Abstract: In this paper a new authentication technique is discussed i-e; facial recognition verification for online voting system. It aims to develop a computerized voting system to make the election process more secure and user friendly. The electorate want to visit distinct locations like polling cubicles and stand in an extended queue to cast their vote, because of such reasons most of the people skip their chance of voting. The voter who isn't eligible also can forged its vote via way of means of faux way which can also additionally cause many problems. That's why in this project we have proposed a system or way for voting which is very effective or useful in voting. This system can also save money of the government which is spent in the election process. Overall this project is being developed to help staff of election commission of India and also reduce the human efforts. Keywords: Online Voting, Biometric Authentication, Security System.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Xiaolong Zhang ◽  
Wei Wu ◽  
Bin Zhou

Large-scale antenna technology has become one of the most promising technologies in 5G because of its ability to effectively improve the spectral efficiency and energy efficiency of the system, as well as its better robustness. In this paper, a large amount of CSI (channel state information) data is characterized by feature mining and law analysis, and a large number of channel characteristics of the physical layer have the advantages of randomness and uniqueness, etc. From the perspective of improving the security of the authentication mechanism and reducing the computational complexity of the authentication mechanism, the physical layer security authentication model is analyzed, and the signal security transmission path, signal authenticity, and channel estimation are used to propose an effective physical layer secure transmission and authentication mechanism, which can be used as a security enhancement and lightweight authentication mechanism for existing authentication mechanisms. In this paper, we analyze the security advantage mechanism of physical layer authentication and prove the security performance boundary; propose an authentication security enhancement method based on the channel feature generation key, a message authentication method based on superimposed tag signals; and propose a method based on private guide frequency for high-speed service data authentication.


Author(s):  
Polsani Jahnavi ◽  
Balla Manoj Kumar

Due to the growth of e-commerce, most of the banking transactions are made on the online platform and all these transactions are made on the websites provided by the merchant or the payable apps and because of this the vulnerability of attacks has increased and there are also chances of using fraudulent websites and apps by the attackers though there are many high-security algorithms are been used for safeguarding against vulnerabilities. The way of judging the relation of trust on the online platform has become a major issue, so a proper trust model also needs to be maintained. In this paper, we reviewed various security algorithms which involve cryptographic algorithms, machine learning, anonymization, and masking techniques, blockchain, distributed networks, and many more to provide integrity, privacy, reliability, authentication, security, and risk-less e-commerce platform.


2021 ◽  
Vol 15 (4) ◽  
pp. 31-53
Author(s):  
Andrew Mangle ◽  
Sandip Patel ◽  
Sanjay Bapna ◽  
XingXing Zu ◽  
David Gurzick

Security questions are considered a viable alternative for secondary and supplementary authentication. Security questions are susceptible to three types of attacks: blind (brute force), focused guess (statistical), and observation (research/personal). This research outlines how informing users of potential security threats through a security meter may improve security with minimal impact on usability and trust. A security-question authentication model is proposed that builds on the strengths of security question responses, chiefly their ease of recall and higher entropy, while mitigating the core weaknesses of the model, which are the lack of uniform answers and public accessibility to answers. Users that were made aware of the entropy of their responses were more likely to provide stronger responses to the security questions without affecting the repeatability of the responses to the questions but negatively impacting the memorability.


2021 ◽  
pp. 180-203
Author(s):  
Serkan Sarıtaş ◽  
Ezzeldin Shereen ◽  
Henrik Sandberg ◽  
György Dán

2021 ◽  
Vol 23 (5) ◽  
pp. 38-43
Author(s):  
Chalee Vorakulpipat ◽  
Ekkachan Rattanalerdnusorn

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Yu Jiang ◽  
Hua Fu ◽  
Aiqun Hu ◽  
Wen Sun

The access control mechanism in LoRa has been proven to have high security risks. In order to improve the secure access ability of LoRa terminals, this paper presents a physical layer-based authentication system for security enhancement. Different from the security access technology of cryptography, a lightweight gateway architecture called LW-LoRaWAN is proposed to realize a data frame-based authentication with radio frequency fingerprint (RFF). A novel RFF feature of Cross Power Spectral Density (CPSD) is used to achieve a fast authentication with one single frame. Theoretical analysis and experimental results show that the proposed system not only reinforces the authentication security of LoRa network but also protects the LoRa terminals against the Sybil attacks. The LW-LoRaWAN provides new security approach from physical layer for LoRa network.


2021 ◽  
Vol 2 (1) ◽  
Author(s):  
Ying Chen ◽  
Weiguang Gao ◽  
Xiao Chen ◽  
Ting Liu ◽  
Cheng Liu ◽  
...  

AbstractSatellite Based Augmentation System (SBAS) provides the corrections and integrity information to users, but as its signal format is opened to the public and Global Navigation Satellite System (GNSS) spoofing technology becomes more realistic, more feasible and cheaper. It's foreseeable that there will be risks of spoofing threats against SBAS in the future. SBAS signal authentication technology provides a system-level solution to spoofing threats by adding special markers to SBAS signals so that receivers can verify whether the SBAS signals are from the on-orbit Geostationary Earth Orbit (GEO) satellites or whether the signal information has been forged and tampered with. First, this article introduces the existing anti-spoofing methods that can be applied to SBAS, especially the Elliptic Curve Digital Signature Algorithm (ECDSA) and Timed Efficient Stream Loss-Tolerant Authentication (TESLA) protocols. Then it discusses four possible solutions in a combination with the existing SBAS Interface Control Document (ICD). Two main Key Performance Indicators (KPIs), Time Between Authentication (TBA) and Authentication Latency (AL), obtained in the four main scenarios are compared. By analyzing the EGNOS Authentication Security Testbed (EAST) test simulation results of European Geostationary Navigation Overlay Service (EGNOS) in Europe, the impact of SBAS after joining the authentication service is obtained.


Author(s):  
Olga Dziegielewska

A couple of years ago, along with raising popularity of smart devices that promote voice authentication mechanisms, voice recognition became a buzz topic again. Not only voice patterns recognition algorithms significantly improved their quality, but also with a rapid growth in the development of sound editing tools and an outburst of the deep-fake concepts, the attack surface of voice authenticators significantly expanded.


Sign in / Sign up

Export Citation Format

Share Document