CINXE.COM
Search results for: authentication
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: authentication</title> <meta name="description" content="Search results for: authentication"> <meta name="keywords" content="authentication"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="authentication" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="authentication"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 206</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: authentication</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">206</span> Cryptography Based Authentication Methods</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohammad%20A.%20Alia">Mohammad A. Alia</a>, <a href="https://publications.waset.org/abstracts/search?q=Abdelfatah%20Aref%20Tamimi"> Abdelfatah Aref Tamimi</a>, <a href="https://publications.waset.org/abstracts/search?q=Omaima%20N.%20A.%20Al-Allaf"> Omaima N. A. Al-Allaf</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=information%20security" title="information security">information security</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=system%20access%20control" title=" system access control"> system access control</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a> </p> <a href="https://publications.waset.org/abstracts/12779/cryptography-based-authentication-methods" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12779.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">470</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">205</span> Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Senthuran%20Manoharan">Senthuran Manoharan</a>, <a href="https://publications.waset.org/abstracts/search?q=Rathesan%20Sivagananalingam"> Rathesan Sivagananalingam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=adaptive%20authentication" title=" adaptive authentication"> adaptive authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning" title=" machine learning"> machine learning</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a> </p> <a href="https://publications.waset.org/abstracts/140519/adaptive-auth-adaptive-authentication-based-on-user-attributes-for-web-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/140519.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">248</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">204</span> A Study on User Authentication Method Using Haptic Actuator and Security Evaluation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yo%20Han%20Choi">Yo Han Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hee%20Suk%20Seo"> Hee Suk Seo</a>, <a href="https://publications.waset.org/abstracts/search?q=Seung%20Hwan%20Ju"> Seung Hwan Ju</a>, <a href="https://publications.waset.org/abstracts/search?q=Sung%20Hyu%20Han"> Sung Hyu Han</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=actuator" title="actuator">actuator</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20authentication" title=" user authentication"> user authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20evaluation" title=" security evaluation"> security evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=haptic%20actuator" title=" haptic actuator"> haptic actuator</a> </p> <a href="https://publications.waset.org/abstracts/15894/a-study-on-user-authentication-method-using-haptic-actuator-and-security-evaluation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15894.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">346</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">203</span> Post-Quantum Resistant Edge Authentication in Large Scale Industrial Internet of Things Environments Using Aggregated Local Knowledge and Consistent Triangulation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20P.%20Autry">C. P. Autry</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20W.%20Roscoe"> A. W. Roscoe</a>, <a href="https://publications.waset.org/abstracts/search?q=Mykhailo%20Magal"> Mykhailo Magal</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We discuss the theoretical model underlying 2BPA (two-band peer authentication), a practical alternative to conventional authentication of entities and data in IoT. In essence, this involves assembling a virtual map of authentication assets in the network, typically leading to many paths of confirmation between any pair of entities. This map is continuously updated, confirmed, and evaluated. The value of authentication along multiple disjoint paths becomes very clear, and we require analogues of triangulation to extend authentication along extended paths and deliver it along all possible paths. We discover that if an attacker wants to make an honest node falsely believe she has authenticated another, then the length of the authentication paths is of little importance. This is because optimal attack strategies correspond to minimal cuts in the authentication graph and do not contain multiple edges on the same path. The authentication provided by disjoint paths normally is additive (in entropy). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=edge%20computing" title=" edge computing"> edge computing</a>, <a href="https://publications.waset.org/abstracts/search?q=industrial%20IoT" title=" industrial IoT"> industrial IoT</a>, <a href="https://publications.waset.org/abstracts/search?q=post-quantum%20resistance" title=" post-quantum resistance"> post-quantum resistance</a> </p> <a href="https://publications.waset.org/abstracts/129470/post-quantum-resistant-edge-authentication-in-large-scale-industrial-internet-of-things-environments-using-aggregated-local-knowledge-and-consistent-triangulation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/129470.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">197</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">202</span> NFC Communications with Mutual Authentication Based on Limited-Use Session Keys </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chalee%20Thammarat">Chalee Thammarat</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cryptographic%20protocols" title="cryptographic protocols">cryptographic protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=NFC" title=" NFC"> NFC</a>, <a href="https://publications.waset.org/abstracts/search?q=near%20field%20communications" title=" near field communications"> near field communications</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20protocols" title=" security protocols"> security protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=mutual%20authentication" title=" mutual authentication"> mutual authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20security" title=" network security"> network security</a> </p> <a href="https://publications.waset.org/abstracts/33236/nfc-communications-with-mutual-authentication-based-on-limited-use-session-keys" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33236.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">430</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">201</span> Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eun-Jun%20Yoon">Eun-Jun Yoon</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deniable%20authentication" title="deniable authentication">deniable authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve%20cryptography" title=" elliptic curve cryptography"> elliptic curve cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=Diffie-Hellman%20problem" title=" Diffie-Hellman problem"> Diffie-Hellman problem</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptanalysis" title=" cryptanalysis"> cryptanalysis</a> </p> <a href="https://publications.waset.org/abstracts/33884/cryptanalysis-of-id-based-deniable-authentication-protocol-based-on-diffie-hellman-problem-on-elliptic-curve" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33884.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">331</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">200</span> Decentralised Edge Authentication in the Industrial Enterprise IoT Space</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=C.%20P.%20Autry">C. P. Autry</a>, <a href="https://publications.waset.org/abstracts/search?q=A.W.%20Roscoe"> A.W. Roscoe </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Authentication protocols based on public key infrastructure (PKI) and trusted third party (TTP) are no longer adequate for industrial scale IoT networks thanks to issues such as low compute and power availability, the use of widely distributed and commercial off-the-shelf (COTS) systems, and the increasingly sophisticated attackers and attacks we now have to counter. For example, there is increasing concern about nation-state-based interference and future quantum computing capability. We have examined this space from first principles and have developed several approaches to group and point-to-point authentication for IoT that do not depend on the use of a centralised client-server model. We emphasise the use of quantum resistant primitives such as strong cryptographic hashing and the use multi-factor authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=enterprise%20IoT%20cybersecurity" title=" enterprise IoT cybersecurity"> enterprise IoT cybersecurity</a>, <a href="https://publications.waset.org/abstracts/search?q=PKI%2FTTP" title=" PKI/TTP"> PKI/TTP</a>, <a href="https://publications.waset.org/abstracts/search?q=IoT%20space" title=" IoT space"> IoT space</a> </p> <a href="https://publications.waset.org/abstracts/93630/decentralised-edge-authentication-in-the-industrial-enterprise-iot-space" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/93630.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">169</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">199</span> A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zhifu%20Li">Zhifu Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Lei%20Li"> Lei Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Wanting%20Zhou"> Wanting Zhou</a>, <a href="https://publications.waset.org/abstracts/search?q=Yuanhang%20He"> Yuanhang He</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20exchange" title=" key exchange"> key exchange</a>, <a href="https://publications.waset.org/abstracts/search?q=certificateless%20public%20key%20cryptography" title=" certificateless public key cryptography"> certificateless public key cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve%20cryptography" title=" elliptic curve cryptography"> elliptic curve cryptography</a> </p> <a href="https://publications.waset.org/abstracts/164480/a-lightweight-authentication-and-key-exchange-protocol-design-for-smart-homes" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/164480.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">98</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">198</span> ACBM: Attention-Based CNN and Bi-LSTM Model for Continuous Identity Authentication</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Rui%20Mao">Rui Mao</a>, <a href="https://publications.waset.org/abstracts/search?q=Heming%20Ji"> Heming Ji</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiaoyu%20Wang"> Xiaoyu Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Keystroke dynamics are widely used in identity recognition. It has the advantage that the individual typing rhythm is difficult to imitate. It also supports continuous authentication through the keyboard without extra devices. The existing keystroke dynamics authentication methods based on machine learning have a drawback in supporting relatively complex scenarios with massive data. There are drawbacks to both feature extraction and model optimization in these methods. To overcome the above weakness, an authentication model of keystroke dynamics based on deep learning is proposed. The model uses feature vectors formed by keystroke content and keystroke time. It ensures efficient continuous authentication by cooperating attention mechanisms with the combination of CNN and Bi-LSTM. The model has been tested with Open Data Buffalo dataset, and the result shows that the FRR is 3.09%, FAR is 3.03%, and EER is 4.23%. This proves that the model is efficient and accurate on continuous authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=keystroke%20dynamics" title="keystroke dynamics">keystroke dynamics</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20authentication" title=" identity authentication"> identity authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=CNN" title=" CNN"> CNN</a>, <a href="https://publications.waset.org/abstracts/search?q=LSTM" title=" LSTM"> LSTM</a> </p> <a href="https://publications.waset.org/abstracts/146753/acbm-attention-based-cnn-and-bi-lstm-model-for-continuous-identity-authentication" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/146753.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">197</span> Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shadi%20Janbabaei">Shadi Janbabaei</a>, <a href="https://publications.waset.org/abstracts/search?q=Hossein%20Gharaee%20Garakani"> Hossein Gharaee Garakani</a>, <a href="https://publications.waset.org/abstracts/search?q=Naser%20Mohammadzadeh"> Naser Mohammadzadeh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=anonymity" title="anonymity">anonymity</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=Internet%20of%20Things" title=" Internet of Things"> Internet of Things</a>, <a href="https://publications.waset.org/abstracts/search?q=lightweight" title=" lightweight"> lightweight</a>, <a href="https://publications.waset.org/abstracts/search?q=un-traceability" title=" un-traceability"> un-traceability</a> </p> <a href="https://publications.waset.org/abstracts/72724/mutual-authentication-for-sensor-to-sensor-communications-in-iot-infrastructure" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72724.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">292</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">196</span> Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nidal%20F.%20Shilbayeh">Nidal F. Shilbayeh</a>, <a href="https://publications.waset.org/abstracts/search?q=Reem%20A.%20Al-Saidi"> Reem A. Al-Saidi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20H.%20Alsswey"> Ahmed H. Alsswey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-voting%20preparation%20stage" title="e-voting preparation stage">e-voting preparation stage</a>, <a href="https://publications.waset.org/abstracts/search?q=blind%20signature%20protocol" title=" blind signature protocol"> blind signature protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=Nonce%20based%20authentication%20scheme" title=" Nonce based authentication scheme"> Nonce based authentication scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=Kerberos%20Authentication%20Protocol" title=" Kerberos Authentication Protocol"> Kerberos Authentication Protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=pseudo%20voter%20identity%20scheme%20PVID" title=" pseudo voter identity scheme PVID"> pseudo voter identity scheme PVID</a> </p> <a href="https://publications.waset.org/abstracts/48108/evaluation-and-analysis-of-the-secure-e-voting-authentication-preparation-scheme" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48108.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">298</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">195</span> Fast Authentication Using User Path Prediction in Wireless Broadband Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Gunasekaran%20Raja">Gunasekaran Raja</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajakumar%20Arul"> Rajakumar Arul</a>, <a href="https://publications.waset.org/abstracts/search?q=Kottilingam%20Kottursamy"> Kottilingam Kottursamy</a>, <a href="https://publications.waset.org/abstracts/search?q=Ramkumar%20Jayaraman"> Ramkumar Jayaraman</a>, <a href="https://publications.waset.org/abstracts/search?q=Sathya%20Pavithra"> Sathya Pavithra</a>, <a href="https://publications.waset.org/abstracts/search?q=Swaminathan%20Venkatraman"> Swaminathan Venkatraman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless Interoperability for Microwave Access (WiMAX) utilizes the IEEE 802.1X mechanism for authentication. However, this mechanism incurs considerable delay during handoffs. This delay during handoffs results in service disruption which becomes a severe bottleneck. To overcome this delay, our article proposes a key caching mechanism based on user path prediction. If the user mobility follows that path, the user bypasses the normal IEEE 802.1X mechanism and establishes the necessary authentication keys directly. Through analytical and simulation modeling, we have proved that our mechanism effectively decreases the handoff delay thereby achieving fast authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=authorization" title=" authorization"> authorization</a>, <a href="https://publications.waset.org/abstracts/search?q=and%20accounting%20%28AAA%29" title=" and accounting (AAA)"> and accounting (AAA)</a>, <a href="https://publications.waset.org/abstracts/search?q=handoff" title=" handoff"> handoff</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile" title=" mobile"> mobile</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20path%20prediction%20%28UPP%29%20and%20user%20pattern" title=" user path prediction (UPP) and user pattern"> user path prediction (UPP) and user pattern</a> </p> <a href="https://publications.waset.org/abstracts/48859/fast-authentication-using-user-path-prediction-in-wireless-broadband-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/48859.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">404</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">194</span> A User Identification Technique to Access Big Data Using Cloud Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20R.%20Manu">A. R. Manu</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20K.%20Agrawal"> V. K. Agrawal</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20N.%20Balasubramanya%20Murthy"> K. N. Balasubramanya Murthy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design" title="design">design</a>, <a href="https://publications.waset.org/abstracts/search?q=implementation%20algorithms" title=" implementation algorithms"> implementation algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=biometric%20approach" title=" biometric approach"> biometric approach</a> </p> <a href="https://publications.waset.org/abstracts/7131/a-user-identification-technique-to-access-big-data-using-cloud-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7131.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">475</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">193</span> Modulation of the Europay, MasterCard, and VisaCard Authentications by Using Avispa Tool</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ossama%20Al-Maliki">Ossama Al-Maliki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Europay, MasterCard, and Visa (EMV) is the transaction protocol for most of the world and especially in Europe and the UK. EMV protocol consists of three main stages which are: card authentication, cardholder verification methods, and transaction authorization. This paper details in full the EMV card authentications. We have used AVISPA and SPAN tools to do our modulization for the EMV card authentications. The code for each type of the card authentication was written by using CAS+ language. The results showed that our modulations were successfully addressed all the steps of the EMV card authentications and the entire process of the EMV card authentication are secured. Also, our modulations were successfully addressed all the main goals behind the EMV card authentications according to the EMV specifications. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=EMV" title="EMV">EMV</a>, <a href="https://publications.waset.org/abstracts/search?q=card%20authentication" title=" card authentication"> card authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=contactless%20card" title=" contactless card"> contactless card</a>, <a href="https://publications.waset.org/abstracts/search?q=SDA" title=" SDA"> SDA</a>, <a href="https://publications.waset.org/abstracts/search?q=DDA" title=" DDA"> DDA</a>, <a href="https://publications.waset.org/abstracts/search?q=CDA%20AVISPA" title=" CDA AVISPA"> CDA AVISPA</a> </p> <a href="https://publications.waset.org/abstracts/89595/modulation-of-the-europay-mastercard-and-visacard-authentications-by-using-avispa-tool" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/89595.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">178</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">192</span> Efficient Position Based Operation Code Authentication</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hashim%20Ali">Hashim Ali</a>, <a href="https://publications.waset.org/abstracts/search?q=Sheheryar%20Khan"> Sheheryar Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=shoulder%20surfing" title="shoulder surfing">shoulder surfing</a>, <a href="https://publications.waset.org/abstracts/search?q=malicious%20observer" title=" malicious observer"> malicious observer</a>, <a href="https://publications.waset.org/abstracts/search?q=sensitive%20inputs" title=" sensitive inputs"> sensitive inputs</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a> </p> <a href="https://publications.waset.org/abstracts/14935/efficient-position-based-operation-code-authentication" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/14935.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">272</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">191</span> Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maha%20Aladdin">Maha Aladdin</a>, <a href="https://publications.waset.org/abstracts/search?q=Khaled%20Nagaty"> Khaled Nagaty</a>, <a href="https://publications.waset.org/abstracts/search?q=Abeer%20Hamdy"> Abeer Hamdy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=internet%20of%20things" title="internet of things">internet of things</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptography" title=" cryptography"> cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20protocol" title=" security protocol"> security protocol</a> </p> <a href="https://publications.waset.org/abstracts/154760/secure-authentication-scheme-based-on-numerical-series-cryptography-for-internet-of-things" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/154760.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">120</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">190</span> A Multilevel Authentication Protocol: MAP in VANET for Human Safety</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Meddeb">N. Meddeb</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20M.%20Makhlouf"> A. M. Makhlouf</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Ben%20Ayed"> M. A. Ben Ayed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Vehicular%20Ad%20hoc%20NETworks%20%28VANET%29" title="Vehicular Ad hoc NETworks (VANET)">Vehicular Ad hoc NETworks (VANET)</a>, <a href="https://publications.waset.org/abstracts/search?q=vehicle%20categories" title=" vehicle categories"> vehicle categories</a>, <a href="https://publications.waset.org/abstracts/search?q=safety" title=" safety"> safety</a>, <a href="https://publications.waset.org/abstracts/search?q=databases" title=" databases"> databases</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=throughput" title=" throughput"> throughput</a>, <a href="https://publications.waset.org/abstracts/search?q=delay" title=" delay"> delay</a> </p> <a href="https://publications.waset.org/abstracts/87440/a-multilevel-authentication-protocol-map-in-vanet-for-human-safety" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/87440.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">296</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">189</span> An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohan%20Ramasundaram">Mohan Ramasundaram</a>, <a href="https://publications.waset.org/abstracts/search?q=Amutha%20Prabakar%20Muniyandi"> Amutha Prabakar Muniyandi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Telecare%20Medicine%20Information%20System" title="Telecare Medicine Information System">Telecare Medicine Information System</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve%20cryptography" title=" elliptic curve cryptography"> elliptic curve cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=three-factor" title=" three-factor"> three-factor</a>, <a href="https://publications.waset.org/abstracts/search?q=biometric" title=" biometric"> biometric</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20oracle" title=" random oracle"> random oracle</a> </p> <a href="https://publications.waset.org/abstracts/91453/an-efficient-and-provably-secure-three-factor-authentication-scheme-with-key-agreement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91453.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">219</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">188</span> To Study the New Invocation of Biometric Authentication Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aparna%20Gulhane">Aparna Gulhane</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Biometrics is the science and technology of measuring and analyzing biological data form the basis of research in biological measuring techniques for the purpose of people identification and recognition. In information technology, biometrics refers to technologies that measure and analyze human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements. Biometric systems are used to authenticate the person's identity. The idea is to use the special characteristics of a person to identify him. These papers present a biometric authentication techniques and actual deployment of potential by overall invocation of biometrics recognition, with an independent testing of various biometric authentication products and technology. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=types%20of%20biometrics" title="types of biometrics">types of biometrics</a>, <a href="https://publications.waset.org/abstracts/search?q=importance%20of%20biometric" title=" importance of biometric"> importance of biometric</a>, <a href="https://publications.waset.org/abstracts/search?q=review%20for%20biometrics%20and%20getting%20a%20new%20implementation" title=" review for biometrics and getting a new implementation"> review for biometrics and getting a new implementation</a>, <a href="https://publications.waset.org/abstracts/search?q=biometric%20authentication%20technique" title=" biometric authentication technique"> biometric authentication technique</a> </p> <a href="https://publications.waset.org/abstracts/23939/to-study-the-new-invocation-of-biometric-authentication-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23939.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">321</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">187</span> Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reham%20Al-Zahrani">Reham Al-Zahrani</a>, <a href="https://publications.waset.org/abstracts/search?q=Noura%20Aleisa"> Noura Aleisa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=RFID" title="RFID">RFID</a>, <a href="https://publications.waset.org/abstracts/search?q=impersonation%20attack" title=" impersonation attack"> impersonation attack</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=ultra-lightweight%20protocols" title=" ultra-lightweight protocols"> ultra-lightweight protocols</a> </p> <a href="https://publications.waset.org/abstracts/183098/tag-impersonation-attack-on-ultra-lightweight-radio-frequency-identification-authentication-scheme-esras" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/183098.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">186</span> Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saransh%20Sharma">Saransh Sharma</a>, <a href="https://publications.waset.org/abstracts/search?q=Atharv%20Dekhne"> Atharv Dekhne</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=passwordless" title="passwordless">passwordless</a>, <a href="https://publications.waset.org/abstracts/search?q=OAuth" title=" OAuth"> OAuth</a>, <a href="https://publications.waset.org/abstracts/search?q=bitcoin" title=" bitcoin"> bitcoin</a>, <a href="https://publications.waset.org/abstracts/search?q=ZKP" title=" ZKP"> ZKP</a>, <a href="https://publications.waset.org/abstracts/search?q=SIN" title=" SIN"> SIN</a>, <a href="https://publications.waset.org/abstracts/search?q=BIP" title=" BIP"> BIP</a> </p> <a href="https://publications.waset.org/abstracts/158948/meta-root-id-passwordless-authentication-using-zkp-bitcoin-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/158948.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">185</span> BAN Logic Proof of E-passport Authentication Protocol</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Safa%20Saoudi">Safa Saoudi</a>, <a href="https://publications.waset.org/abstracts/search?q=Souheib%20Yousfi"> Souheib Yousfi</a>, <a href="https://publications.waset.org/abstracts/search?q=Riadh%20Robbana"> Riadh Robbana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=e-passport" title="e-passport">e-passport</a>, <a href="https://publications.waset.org/abstracts/search?q=elliptic%20curve%20cryptography" title=" elliptic curve cryptography"> elliptic curve cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=identity%20based%20encryption" title=" identity based encryption"> identity based encryption</a>, <a href="https://publications.waset.org/abstracts/search?q=shared%20secret" title=" shared secret"> shared secret</a>, <a href="https://publications.waset.org/abstracts/search?q=BAN%20Logic" title=" BAN Logic"> BAN Logic</a> </p> <a href="https://publications.waset.org/abstracts/25381/ban-logic-proof-of-e-passport-authentication-protocol" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25381.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">435</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">184</span> The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nazli%20W.%20Hardy">Nazli W. Hardy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=identity%20relation%20management" title="identity relation management">identity relation management</a>, <a href="https://publications.waset.org/abstracts/search?q=multifactor%20authentication" title=" multifactor authentication"> multifactor authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=protocols" title=" protocols"> protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=survey%20of%20internet%20of%20things%20ecosystem" title=" survey of internet of things ecosystem"> survey of internet of things ecosystem</a> </p> <a href="https://publications.waset.org/abstracts/50501/the-internet-of-things-ecosystem-survey-of-the-current-landscape-identity-relationship-management-multifactor-authentication-mechanisms-and-underlying-protocols" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50501.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">354</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">183</span> A Proposal to Mobile Payment Implementing 2AF+</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Nael%20Hirzallah">Nael Hirzallah</a>, <a href="https://publications.waset.org/abstracts/search?q=Sana%20Nseir"> Sana Nseir</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Merchants are competing to offer the use of mobile payment to encourage shopping. many mobile payment systems were made available in various locations worldwide; however, they have various drawbacks. This paper proposes a new mobile payment system that discusses the main drawbacks of these systems, namely security and speed of transaction. The proposal is featured by being simple to use by customers and merchants. Furthermore, the proposed system depends on a new authentication factor that is introduced in this paper and called by Two-Factors Authentication Plus, (2FA+). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electronic%20commerce" title="electronic commerce">electronic commerce</a>, <a href="https://publications.waset.org/abstracts/search?q=payment%20schemes" title=" payment schemes"> payment schemes</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20payment" title=" mobile payment"> mobile payment</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20factors" title=" authentication factors"> authentication factors</a>, <a href="https://publications.waset.org/abstracts/search?q=mobile%20applications" title=" mobile applications"> mobile applications</a> </p> <a href="https://publications.waset.org/abstracts/1572/a-proposal-to-mobile-payment-implementing-2af" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/1572.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">182</span> Password Cracking on Graphics Processing Unit Based Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Gopalakrishna%20Kini">N. Gopalakrishna Kini</a>, <a href="https://publications.waset.org/abstracts/search?q=Ranjana%20Paleppady"> Ranjana Paleppady</a>, <a href="https://publications.waset.org/abstracts/search?q=Akshata%20K.%20Naik"> Akshata K. Naik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=GPGPU" title="GPGPU">GPGPU</a>, <a href="https://publications.waset.org/abstracts/search?q=password%20cracking" title=" password cracking"> password cracking</a>, <a href="https://publications.waset.org/abstracts/search?q=secret%20key" title=" secret key"> secret key</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20authentication" title=" user authentication"> user authentication</a> </p> <a href="https://publications.waset.org/abstracts/40190/password-cracking-on-graphics-processing-unit-based-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40190.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">290</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">181</span> Multi Criteria Authentication Method in Cognitive Radio Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shokoufeh%20Monjezi%20Kouchak">Shokoufeh Monjezi Kouchak</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=cognitive%20radio" title=" cognitive radio"> cognitive radio</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=radio%20networks" title=" radio networks "> radio networks </a> </p> <a href="https://publications.waset.org/abstracts/15445/multi-criteria-authentication-method-in-cognitive-radio-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15445.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">392</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">180</span> An Authentication Protocol for Quantum Enabled Mobile Devices</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Natarajan%20Venkatachalam">Natarajan Venkatachalam</a>, <a href="https://publications.waset.org/abstracts/search?q=Subrahmanya%20V.%20R.%20K.%20Rao"> Subrahmanya V. R. K. Rao</a>, <a href="https://publications.waset.org/abstracts/search?q=Vijay%20Karthikeyan%20Dhandapani"> Vijay Karthikeyan Dhandapani</a>, <a href="https://publications.waset.org/abstracts/search?q=Swaminathan%20Saravanavel"> Swaminathan Saravanavel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=quantum%20cryptography" title="quantum cryptography">quantum cryptography</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20key%20distribution" title=" quantum key distribution"> quantum key distribution</a>, <a href="https://publications.waset.org/abstracts/search?q=wireless%20quantum%20communication" title=" wireless quantum communication"> wireless quantum communication</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20protocol" title=" authentication protocol"> authentication protocol</a>, <a href="https://publications.waset.org/abstracts/search?q=quantum%20enabled%20device" title=" quantum enabled device"> quantum enabled device</a>, <a href="https://publications.waset.org/abstracts/search?q=trusted%20third%20party" title=" trusted third party"> trusted third party</a> </p> <a href="https://publications.waset.org/abstracts/99935/an-authentication-protocol-for-quantum-enabled-mobile-devices" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/99935.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">173</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">179</span> Authentication Based on Hand Movement by Low Dimensional Space Representation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Reut%20Lanyado">Reut Lanyado</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20Mendlovic"> David Mendlovic</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Most biological methods for authentication require special equipment and, some of them are easy to fake. We proposed a method for authentication based on hand movement while typing a sentence with a regular camera. This technique uses the full video of the hand, which is harder to fake. In the first phase, we tracked the hand joints in each frame. Next, we represented a single frame for each individual using our Pose Agnostic Rotation and Movement (PARM) dimensional space. Then, we indicated a full video of hand movement in a fixed low dimensional space using this method: Fixed Dimension Video by Interpolation Statistics (FDVIS). Finally, we identified each individual in the FDVIS representation using unsupervised clustering and supervised methods. Accuracy exceeds 96% for 80 individuals by using supervised KNN. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=feature%20extraction" title=" feature extraction"> feature extraction</a>, <a href="https://publications.waset.org/abstracts/search?q=hand%20recognition" title=" hand recognition"> hand recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=signal%20processing" title=" signal processing"> signal processing</a> </p> <a href="https://publications.waset.org/abstracts/112262/authentication-based-on-hand-movement-by-low-dimensional-space-representation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/112262.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">178</span> Feature Selection of Personal Authentication Based on EEG Signal for K-Means Cluster Analysis Using Silhouettes Score</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Jianfeng%20Hu">Jianfeng Hu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Personal authentication based on electroencephalography (EEG) signals is one of the important field for the biometric technology. More and more researchers have used EEG signals as data source for biometric. However, there are some disadvantages for biometrics based on EEG signals. The proposed method employs entropy measures for feature extraction from EEG signals. Four type of entropies measures, sample entropy (SE), fuzzy entropy (FE), approximate entropy (AE) and spectral entropy (PE), were deployed as feature set. In a silhouettes calculation, the distance from each data point in a cluster to all another point within the same cluster and to all other data points in the closest cluster are determined. Thus silhouettes provide a measure of how well a data point was classified when it was assigned to a cluster and the separation between them. This feature renders silhouettes potentially well suited for assessing cluster quality in personal authentication methods. In this study, “silhouettes scores” was used for assessing the cluster quality of k-means clustering algorithm is well suited for comparing the performance of each EEG dataset. The main goals of this study are: (1) to represent each target as a tuple of multiple feature sets, (2) to assign a suitable measure to each feature set, (3) to combine different feature sets, (4) to determine the optimal feature weighting. Using precision/recall evaluations, the effectiveness of feature weighting in clustering was analyzed. EEG data from 22 subjects were collected. Results showed that: (1) It is possible to use fewer electrodes (3-4) for personal authentication. (2) There was the difference between each electrode for personal authentication (p<0.01). (3) There is no significant difference for authentication performance among feature sets (except feature PE). Conclusion: The combination of k-means clustering algorithm and silhouette approach proved to be an accurate method for personal authentication based on EEG signals. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=personal%20authentication" title="personal authentication">personal authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=K-mean%20clustering" title=" K-mean clustering"> K-mean clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=electroencephalogram" title=" electroencephalogram"> electroencephalogram</a>, <a href="https://publications.waset.org/abstracts/search?q=EEG" title=" EEG"> EEG</a>, <a href="https://publications.waset.org/abstracts/search?q=silhouettes" title=" silhouettes"> silhouettes</a> </p> <a href="https://publications.waset.org/abstracts/67078/feature-selection-of-personal-authentication-based-on-eeg-signal-for-k-means-cluster-analysis-using-silhouettes-score" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/67078.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">285</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">177</span> Efficient and Timely Mutual Authentication Scheme for RFID Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hesham%20A.%20El%20Zouka">Hesham A. El Zouka</a>, <a href="https://publications.waset.org/abstracts/search?q=Mustafa%20M.%20Hosni%20ka"> Mustafa M. Hosni ka</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=RFID" title="RFID">RFID</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication%20protocols" title=" authentication protocols"> authentication protocols</a>, <a href="https://publications.waset.org/abstracts/search?q=privacy" title=" privacy"> privacy</a>, <a href="https://publications.waset.org/abstracts/search?q=agent-based%20architecture" title=" agent-based architecture"> agent-based architecture</a>, <a href="https://publications.waset.org/abstracts/search?q=time-stamp" title=" time-stamp"> time-stamp</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20signature" title=" digital signature"> digital signature</a> </p> <a href="https://publications.waset.org/abstracts/39871/efficient-and-timely-mutual-authentication-scheme-for-rfid-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39871.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authentication&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authentication&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authentication&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authentication&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authentication&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authentication&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=authentication&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>