663 research outputs found
INFORMATION SECURITY: A STUDY ON BIOMETRIC SECURITY SOLUTIONS FOR TELECARE MEDICAL INFORMATION SYSTEMS
This exploratory study provides a means for evaluating and rating Telecare medical information systems in order to provide a more effective security solution. This analysis of existing solutions was conducted via an in-depth study of Telecare security. This is a proposition for current biometric technologies as a new means for secure communication of private information over public channels. Specifically, this research was done in order to provide a means for businesses to evaluate prospective technologies from a 3 dimensional view in order to make am accurate decision on any given biometric security technology. Through identifying key aspects of what makes a security solution the most effective in minimizing risk of a patientâs confidential data being exposed we were then able to create a 3 dimensional rubric to see not only from a business view but also the users such as the patients and doctors that use Telecare medical information systems every day. Finally, we also need to understand the implications of biometric solutions from a technological standpoint
Selected Computing Research Papers Volume 1 June 2012
An Evaluation of Anti-phishing Solutions (Arinze Bona Umeaku) ..................................... 1
A Detailed Analysis of Current Biometric Research Aimed at Improving Online Authentication Systems (Daniel Brown) .............................................................................. 7
An Evaluation of Current Intrusion Detection Systems Research
(Gavin Alexander Burns) .................................................................................................... 13
An Analysis of Current Research on Quantum Key Distribution (Mark Lorraine) ............ 19
A Critical Review of Current Distributed Denial of Service Prevention Methodologies (Paul Mains) ............................................................................................... 29
An Evaluation of Current Computing Methodologies Aimed at Improving the Prevention of SQL Injection Attacks in Web Based Applications (Niall Marsh) .............. 39
An Evaluation of Proposals to Detect Cheating in Multiplayer Online Games (Bradley Peacock) ............................................................................................................... 45
An Empirical Study of Security Techniques Used In Online Banking
(Rajinder D G Singh) .......................................................................................................... 51
A Critical Study on Proposed Firewall Implementation Methods in Modern Networks (Loghin Tivig) .................................................................................................... 5
Design of hardware-based security solutions for interconnected systems
Among all the different research lines related to hardware security, there is a particular topic
that strikingly attracts attention. That topic is the research regarding the so-called Physical
Unclonable Functions (PUF). The PUFs, as can be seen throughout the Thesis, present the
novel idea of connecting digital values uniquely to a physical entity, just as human biometrics
does, but with electronic devices. This beautiful idea is not free of obstacles, and is the core
of this Thesis. It is studied from different angles in order to better understand, in particular,
SRAM PUFs, and to be able to integrate them into complex systems that expand their
potential.
During Chapter 1, the PUFs, their properties and their main characteristics are defined. In
addition, the different types of PUFs, and their main applications in the field of security are
also summarized.
Once we know what a PUF is, and the types of them we can find, throughout Chapter 2
an exhaustive analysis of the SRAM PUFs is carried out, given the wide availability of
SRAMs today in most electronic circuits (which dramatically reduces the cost of deploying
any solution). An algorithm is proposed to improve the characteristics of SRAM PUFs, both
to generate identifiers and to generate random numbers, simultaneously. The results of this
Chapter demonstrates the feasibility of implementing the algorithm, so in the following
Chapters it is explored its integration in both hardware and software systems.
In Chapter 3 the hardware design and integration of the algorithm introduced in Chapter 2
is described. The design is presented together with some examples of use that demonstrate
the possible practical realizations in VLSI designs.
In an analogous way, in Chapter 4 the software design and integration of the algorithm
introduced in Chapter 2 is described. The design is presented together with some examples
of use that demonstrate the possible practical realizations in low-power IoT devices. The
algorithm is also described as part of a secure firmware update protocol that has been
designed to be resistant to most current attacks, ensuring the integrity and trustworthiness of
the updated firmware.In Chapter 5, following the integration of PUF-based solutions into protocols, PUFs
are used as part of an authentication protocol that uses zero-knowledge proofs. The cryptographic
protocol is a Lattice-based post-quantum protocol that guarantees the integrity and
anonymity of the identity generated by the PUF. This type of architecture prevents any type of
impersonation or virtual copy of the PUF, since this is unknown and never leaves the device.
Specifically, this type of design has been carried out with the aim of having traceability of
identities without ever knowing the identity behind, which is very interesting for blockchain
technologies.
Finally, in Chapter 6 a new type of PUF, named as BPUF (Behavioral and Physical Unclonable
Function), is proposed and analyzed according to the definitions given in Chapter 1.
This new type of PUF significantly changes the metrics and concepts to which we were
used to in previous Chapters. A new multi-modal authentication protocol is presented in this
Chapter, taking advantage of the challenge-response tuples of BPUFs. An example of BPUFs
is illustrated with SRAMs.
A proposal to integrate the BPUFs described in Chapter 6 into the protocol of Chapter 5,
as well as the final remarks of the Thesis, can be found in Chapter 7
Dynamic Multi-Factor Security
This thesis identifies the current limitations of electronic remote authentication systems and presents a new remote authentication system that addresses these limitations. Examples of these limitations can be easily observed in everyday life. Some more common examples include: credit card theft, identity theft, insurance fraud and hacking of private computer networks. Our proposed solution includes a multi-factor protocol which has two key features. First, it dynamically updates private ID numbers such that no two iterations of the authentication protocol use the same set if private IDs for each involved party, using a True Random Number Generator (TRNG). This prevents any unauthorized access of private information, and even if this information is compromised, the authentication protocol is not compromised, since the subsequent iteration of authentication uses new IDs. Second, the protocol uses multiple authentication factors (two in our implementation), to further enhance security. These additional authentication factors are also dynamically updated after each iteration of the protocol. The protocol was implemented in a system which simulates a credit card transaction, highlighting the usefulness of our protocol in real world remote authentication. We expect this new electronic remote authentication system to solve many of the current failings of modern electronic authentication schemes
Securing Health Sensing Using Integrated Circuit Metric
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware âfingerprintsâ. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner
Authenticated Key Agreement with Rekeying for Secured Body Sensor Networks
Many medical systems are currently equipped with a large number of tiny, non-invasive sensors, located on, or close to, the patientâs body for health monitoring purposes. These groupings of sensors constitute a body sensor network (BSN). Key management is a fundamental service for medical BSN security. It provides and manages the cryptographic keys to enable essential security features such as confidentiality, integrity and authentication. Achieving key agreement in BSNs is a difficult task. Many key agreement schemes lack sensor addition, revocation, and rekeying properties, which are very important. Our proposed protocol circumvents these shortcomings by providing node rekeying properties, as well as node addition and revocation. It proposes a key distribution protocol based on public key cryptographyâthe RSA (Rivest, Shamir and Adleman) algorithm, and the DHECC (Diffie-Hellman Elliptic Curve Cryptography) algorithm. The proposed protocol does not trust individual sensors, and partially trusts the base station (hospital). Instead of loading full pair-wise keys into each node, after installation our protocol establishes pair-wise keys between nodes according to a specific routing algorithm. In this case, each node doesnât have to share a key with all of its neighbors, only those involved in the routing path; this plays a key role in increasing the resiliency against node capture attacks and the network storage efficiency. Finally we evaluate our algorithm from the BSN security viewpoint and evaluate its performance in comparison with other proposals
Image-based Authentication
Mobile and wearable devices are popular platforms for accessing online services. However, the small form factor of such devices, makes a secure and practical experience for user authentication, challenging. Further, online fraud that includes phishing attacks, has revealed the importance of conversely providing solutions for usable authentication of remote services to online users. In this thesis, we introduce image-based solutions for mutual authentication between a user and a remote service provider. First, we propose and develop Pixie, a two-factor, object-based authentication solution for camera-equipped mobile and wearable devices. We further design ai.lock, a system that reliably extracts from images, authentication credentials similar to biometrics.
Second, we introduce CEAL, a system to generate visual key fingerprint representations of arbitrary binary strings, to be used to visually authenticate online entities and their cryptographic keys. CEAL leverages deep learning to capture the target style and domain of training images, into a generator model from a large collection of sample images rather than hand curated as a collection of rules, hence provides a unique capacity for easy customizability. CEAL integrates a model of the visual discriminative ability of human perception, hence the resulting fingerprint image generator avoids mapping distinct keys to images which are not distinguishable by humans. Further, CEAL deterministically generates visually pleasing fingerprint images from an input vector where the vector components are designated to represent visual properties which are either readily perceptible to human eye, or imperceptible yet are necessary for accurately modeling the target image domain.
We show that image-based authentication using Pixie is usable and fast, while ai.lock extracts authentication credentials that exceed the entropy of biometrics. Further, we show that CEAL outperforms state-of-the-art solution in terms of efficiency, usability, and resilience to powerful adversarial attacks
- âŠ