3 research outputs found

    Efficient and secure business model for content centric network using elliptic curve cryptography

    Get PDF
    https://onlinelibrary.wiley.com/doi/full/10.1002/dac.3839Initially, Internet has evolved as a resource sharing model where resources are identified by IP addresses. However, with rapid technological advancement, resources/hardware has become cheap and thus, the need of sharing hardware over Internet is reduced. Moreover, people are using Internet mainly for information exchange and hence, Internet has gradually shifted from resource sharing to information sharing model. To meet the recent growing demand of information exchange, Content Centric Network (CCN) is envisaged as a clean‐slate future network architecture which is specially destined for smooth content distribution over Internet. In CCN, content is easily made available using network caching mechanism which is misaligned with the existing business policy of content providers/publishers in IP‐based Internet. Hence, the transition from contemporary IP‐based Internet to CCN demands attention for redesigning the business policy of the content publishers/providers. In this paper, we have proposed efficient and secure communication protocols for flexible CCN business model to protect the existing business policies of the content publisher while maintaining the salient CCN features like in‐network content caching and Interest packet aggregation. To enhance the efficiency and security, the Elliptic Curve Cryptography (ECC) is used. The proposed ECC‐based scheme is analyzed to show that it is resilient to relevant existing cryptographic attacks. The performance analysis in terms of less computation and communication overheads and increased efficiency is given. Moreover, a formal security verification of the proposed scheme is done using widely used AVISPA simulator and BAN logic that shows our scheme is well secured

    AN EVALUATION OF A BIOMETRIC ENABLED CREDIT CARD FOR PROVIDING HIGH AUTHENTICITY IDENTITY PROOFING DURING THE TRANSACTION AUTHENTICATION PROCESS

    Get PDF
    Credit card fraud has continued to grow despite efforts to protect financial data from data breaches of financial institutions. Data breaches of financial transactional records over the past decade have impacted millions of U.S. consumers, resulting in decreased consumer confidence in security. Banking institutions losing money due to fraud are forced to raise interest rates and increase fees to their cardholders. The costs of fraud are passed to the banking institution’s customers to offset the losses. The requisite to detect and eliminate fraud before it occurs is mutually beneficial to both the banking institution and cardholders. Credit card companies continue to focus on methods for identifying fraudulent transactions as they occur and on validating account owners. Financial institutions utilize various models to alert consumers of potential fraud on a real-time basis. Current authorization models that validate the identity of the account holders during the transaction are limited or nonexistent. Many consumers are not required to provide any form of identification or signature proving identity for minimal purchase amount. For purchases requiring validation, consumers are able to validate a transaction with a simple, unverified signature mark at a merchant terminal. The introduction of the chip card added the additional element of security but can be combined with additional user authentication methods. To provide a more secure financial transaction, identity verification as a user authentication method can be realized through biometrics, most commonly, a fingerprint and can be achieved through the use of merchant touch screen credit card terminals or mobile purchasing applications. Using a physical credit card embedded with a fingerprint positions the user authentication process at the point of sale, thus providing real-time validation of the user as the credit card account owner utilizing the biometric fingerprint as identity proof and signature. This research seeks to evaluate the biometric-enabled physical credit card in an effort to increase the level of credit card transaction security and reduce the occurrences of fraud
    corecore