792 research outputs found
Authentication of Students and Students’ Work in E-Learning : Report for the Development Bid of Academic Year 2010/11
Global e-learning market is projected to reach $107.3 billion by 2015 according to a new report by The Global Industry Analyst (Analyst 2010). The popularity and growth of the online programmes within the School of Computer Science obviously is in line with this projection. However, also on the rise are students’ dishonesty and cheating in the open and virtual environment of e-learning courses (Shepherd 2008). Institutions offering e-learning programmes are facing the challenges of deterring and detecting these misbehaviours by introducing security mechanisms to the current e-learning platforms. In particular, authenticating that a registered student indeed takes an online assessment, e.g., an exam or a coursework, is essential for the institutions to give the credit to the correct candidate. Authenticating a student is to ensure that a student is indeed who he says he is. Authenticating a student’s work goes one step further to ensure that an authenticated student indeed does the submitted work himself. This report is to investigate and compare current possible techniques and solutions for authenticating distance learning student and/or their work remotely for the elearning programmes. The report also aims to recommend some solutions that fit with UH StudyNet platform.Submitted Versio
A Blockchain-Based Multi-Factor Authentication Model for a Cloud-Enabled Internet of Vehicles.
Continuous and emerging advances in Information and Communication Technology (ICT) have enabled Internet-of-Things (IoT)-to-Cloud applications to be induced by data pipelines and Edge Intelligence-based architectures. Advanced vehicular networks greatly benefit from these architectures due to the implicit functionalities that are focused on realizing the Internet of Vehicle (IoV) vision. However, IoV is susceptible to attacks, where adversaries can easily exploit existing vulnerabilities. Several attacks may succeed due to inadequate or ineffective authentication techniques. Hence, there is a timely need for hardening the authentication process through cutting-edge access control mechanisms. This paper proposes a Blockchain-based Multi-Factor authentication model that uses an embedded Digital Signature (MFBC_eDS) for vehicular clouds and Cloud-enabled IoV. Our proposed MFBC_eDS model consists of a scheme that integrates the Security Assertion Mark-up Language (SAML) to the Single Sign-On (SSO) capabilities for a connected edge to cloud ecosystem. MFBC_eDS draws an essential comparison with the baseline authentication scheme suggested by Karla and Sood. Based on the foundations of Karla and Sood's scheme, an embedded Probabilistic Polynomial-Time Algorithm (ePPTA) and an additional Hash function for the Pi generated during Karla and Sood's authentication were proposed and discussed. The preliminary analysis of the proposition shows that the approach is more suitable to counter major adversarial attacks in an IoV-centered environment based on the Dolev-Yao adversarial model while satisfying aspects of the Confidentiality, Integrity, and Availability (CIA) triad
ELECTROMYOGRAPHY DEVICE FOR USER AUTHENTICATION
A method and system for user authentication. The method includes receiving input data from an electromyography (EMG) sensor included in a client device worn by a user. The method includes extracting an EMG signal from the input data received as the user performs a task. The method includes identifying features of the task based on the EMG signal. The method includes determining whether the features of the task match features of a reference task stored on the client device. The method includes determining whether the user embeddings extracted from the EMG signal match reference embeddings corresponding to the reference task. The method includes, if the features of the task match the features of the reference task and the user embeddings match the reference embeddings, determining that the user is an authorized user authorizing/allowing access to the client device
Authentication Protocol for Cloud Databases Using Blockchain Mechanism
Cloud computing has made the software development process fast and flexible but on the other hand it has contributed to increasing security attacks. Employees who manage the data in cloud companies may face insider attack, affecting their reputation. They have the advantage of accessing the user data by interacting with the authentication mechanism. The primary aim of this research paper is to provide a novel secure authentication mechanism by using Blockchain technology for cloud databases. Blockchain makes it difficult to change user login credentials details in the user authentication process by an insider. The insider is not able to access the user authentication data due to the distributed ledger-based authentication scheme. Activity of insider can be traced and cannot be changed. Both insider and outsider user’s are authenticated using individual IDs and signatures. Furthermore, the user access control on the cloud database is also authenticated. The algorithm and theorem of the proposed mechanism have been given to demonstrate the applicability and correctness.The proposed mechanism is tested on the Scyther formal system tool against denial of service, impersonation, offline guessing, and no replay attacks. Scyther results show that the proposed methodology is secure cum robust
Advanced user authentification for mobile devices
Access to the full-text thesis is no longer available at the author's request, due to 3rd party copyright restrictions. Access removed on 28.11.2016 by CS (TIS).Metadata merged with duplicate record ( http://hdl.handle.net/10026.1/1101 - now deleted) on 20.12.2016 by CS (TIS).Recent years have witnessed widespread adoption of mobile devices. Whereas initial
popularity was driven by voice telephony services, capabilities are now broadening to
allow an increasing range of data orientated services. Such services serve to extend the
range of sensitive data accessible through such devices and will in turn increase the
requirement for reliable authentication of users.
This thesis considers the authentication requirements of mobile devices and proposes novel
mechanisms to improve upon the current state of the art. The investigation begins with an
examination of existing authentication techniques, and illustrates a wide range of
drawbacks. A survey of end-users reveals that current methods are frequently misused and
considered inconvenient, and that enhanced methods of security are consequently required.
To this end, biometric approaches are identified as a potential means of overcoming the
perceived constraints, offering an opportunity for security to be maintained beyond pointof-
entry, in a continuous and transparent fashion.
The research considers the applicability of different biometric approaches for mobile
device implementation, and identifies keystroke analysis as a technique that can offer
significant potential within mobile telephony. Experimental evaluations reveal the potential
of the technique when applied to a Personal Identification Number (PIN), telephone
number and text message, with best case equal error rates (EER) of 9%, 8% and 18%
respectively. In spite of the success of keystroke analysis for many users, the results
demonstrate the technique is not uniformly successful across the whole of a given
population. Further investigation suggests that the same will be true for other biometrics,
and therefore that no single authentication technique could be relied upon to account for all
the users in all interaction scenarios. As such, a novel authentication architecture is
specified, which is capable of utilising the particular hardware configurations and
computational capabilities of devices to provide a robust, modular and composite
authentication mechanism. The approach, known as IAMS (Intelligent Authentication
Management System), is capable of utilising a broad range of biometric and secret
knowledge based approaches to provide a continuous confidence measure in the identity of
the user. With a high confidence, users are given immediate access to sensitive services
and information, whereas with lower levels of confidence, restrictions can be placed upon
access to sensitive services, until subsequent reassurance of a user's identity.
The novel architecture is validated through a proof-of-concept prototype. A series of test
scenarios are used to illustrate how IAMS would behave, given authorised and impostor
authentication attempts. The results support the use of a composite authentication approach
to enable the non-intrusive authentication of users on mobile devices.Orange Personal Communication Services Ltd
ROBUST DYNAMIC ID-BASED REMOTE MUTUAL AUTHENTICATION SCHEME
Dynamic ID based authentication scheme is more and more important in insecure wireless environment and system. Two of kinds of attack that authentication schemes must resist are stealing identity and reflection attack which is a potential way of attacking a challenge- response authentication system using the same protocol in both direcÂtions. It must be guaranteed to prevent attackers from reusing informaÂtion from authentication phase and the scheme of Yoon and Yoo satisfies those requirements. However, their scheme can not resist insider and impersonation attack by using lost or stolen smart card. In this paper, we demonstrate that Yoon and Yoo’s scheme is still vulnerable to those attacks. Then, we present an improvement to their scheme in order to isolate such problems
- …