ban logic
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 12)

H-INDEX

5
(FIVE YEARS 2)

2021 ◽  
Author(s):  
E Haodudin Nurkifli

This article proposed a new protocol "untraceable and unclonable sensor movement in the distributed IoT environment". The proposal has the following several advantages: (1) the new protocol using PUF achieved the main contributions of both untraceable and unclonable sensors. (2) the new protocol also achieved standard security features such as mutual authentication, perfect forward and backward secrecy. (3) The proposed authentication protocol can withstand from various kinds of attacks, such as to reply, DoS, impersonation, and cloning attack. (4) Analysis formally using BAN Logic has been conducted and denoted that the protocol achieved a secure mutual authentication. In addition, analysis formally using the RoR model and Scyther tool denoted that the proposed protocol withstands from various attacks. (5) A comparison of security features and computational complexity ensures that the proposal is secure and has low computational complexity


2021 ◽  
Author(s):  
E Haodudin Nurkifli

This article proposed a new protocol "untraceable and unclonable sensor movement in the distributed IoT environment". The proposal has the following several advantages: (1) the new protocol using PUF achieved the main contributions of both untraceable and unclonable sensors. (2) the new protocol also achieved standard security features such as mutual authentication, perfect forward and backward secrecy. (3) The proposed authentication protocol can withstand from various kinds of attacks, such as to reply, DoS, impersonation, and cloning attack. (4) Analysis formally using BAN Logic has been conducted and denoted that the protocol achieved a secure mutual authentication. In addition, analysis formally using the RoR model and Scyther tool denoted that the proposed protocol withstands from various attacks. (5) A comparison of security features and computational complexity ensures that the proposal is secure and has low computational complexity


Author(s):  
Narander Kumar ◽  
Jitendra Kumar Samriya

Background: Cloud computing is a service that is being accelerating its growth in the field of information technology in recent years. Privacy and security are challenging issues for cloud users and providers. Obective: This work aims at ensuring secured validation of user and protects data during transmission for users in a public IoT-cloud environment. Existing security measures however fails by their single level of security, adaptability for large amount of data and reliability. Therefore, to overcome these issues and to achieve a better solution for vulnerable data. Method: The suggested method utilizes a secure transmission in cloud using key policy attribute based encryption (KPABE). Initially, user authentication is verified. Then the user data is encrypted with the help of KP-ABE algorithm. Finally, data validation and privacy preservation are done by Burrows-Abadi-Needham (BAN) logic. This verified, and shows that the proposed encryption is correct, secure and efficient to prevent unauthorized access and prevention of data leakage so that less chances of data/identity, theft of a user is the analysis and performed by KP-ABE, that is access control approach. Results: Here the method attains the maximum of 88.35% of validation accuracy with a minimum 8.78ms encryption time, which is better when, compared to the existing methods. The proposed mechanism is done by MATLAB. The performance of the implemented method is calculated based on the time of encryption and decryption, execution time and validation accuracy. Conclusion: Thus the proposed approach attains the high IoT-cloud data security and increases the speed for validation and transmission with high accuracy and used for cyber data science processing.


2021 ◽  
Vol 2021 ◽  
pp. 1-14 ◽  
Author(s):  
Tsu-Yang Wu ◽  
Lei Yang ◽  
Zhiyuan Lee ◽  
Chien-Ming Chen ◽  
Jeng-Shyang Pan ◽  
...  

A multiserver environment can improve the efficiency of mobile network services more effectively than a single server in managing the increase in users. Because of the large number of users, the security of users’ personal information and communication information is more important in a multiserver environment. Recently, Wang et al. proposed a multiserver authentication scheme based on biometrics and proved the security of their scheme. However, we first demonstrate that their scheme is insecure against a known session-specific temporary information attacks, user impersonation attacks, and server impersonation attacks. To solve the security weakness, we propose an improved scheme based on Wang et al.’s scheme. The security of our improved scheme is also validated based on the formal security analysis, Burrows–Abadi–Needham (BAN) logic, ProVerif, and informal security analysis. Security and performance comparisons prove the security and efficiency of our scheme.


2020 ◽  
Vol 25 (3) ◽  
pp. 1162-1173 ◽  
Author(s):  
Yuan Fei ◽  
Huibiao Zhu ◽  
Phan Cong Vinh

2019 ◽  
Vol 2 (2) ◽  
pp. 141-157
Author(s):  
Israa N. Alsalhi ◽  
◽  
Salah A. Albermany
Keyword(s):  

2019 ◽  
Vol 8 (3) ◽  
pp. 2432-2436

In today’s world the computer network communication increases the efficiency most of the organizations. Hence threats have been increased due to these online transactions/communications. These threats necessitate the researchers to improve the existing security protocols and /or develop the new ones. Authentication Protocols are one of the same which can provide the authentication, confidentiality & integrity. For checking the authenticity of messages exchange process in authentication protocols BAN logic is used. The Kerberos encrypt the information for authentications. Many organizations use it and it has five versions and versions 4 and 5 are latest. In one of over previous paper we have generalized the ticket exchange process of version 5. In this paper to make it more authenticated some modifications are proposed to both BAN and Kerberos and we defined them as R- Kerberos & RBAN. To achieve this, we have added participant’s physical address (MAC Address) as it is unique to every network adapter and can be used as our secret key.


Sign in / Sign up

Export Citation Format

Share Document