22 research outputs found
Evaluation Model for IP Network Routing Decision based on PCA-ANN
As an act of moving information across an internetwork from one source to one destination, routing is vital for network activities. The IP (Internet protocol) network is the so-called �best-effort� communication network in which the best-effort delivery is provided for hosts. Accordingly, routing decision is closely related with a wide variety of network applications. This study presents one called PCA (�principal component analysis�)-ANN (�artificial neural networks�) evaluation model for routing decision. The PCA technology is used to reduce the dimension of the route measurement data to present the most effective structure of the route measurement data for the ANN to perform further evaluation. The proposed PCA-Based model is evaluated by experiments. Experimental results show its potentiality
Future Security Approaches and Biometrics
Threats to information security are proliferating rapidly, placing demanding requirements on protecting tangible and intangible business and individual assets. Biometrics can improve security by replacing or complementing traditional security technologies. This tutorial discusses the strengths and weaknesses of biometrics and traditional security approaches, current and future applications of biometrics, performance evaluation measures of biometric systems, and privacy issues surrounding the new technology
Bio : A Mulrimodal biometric authentication system for person identification and verification
Not availabl
A First Look Into Users’ Perceptions of Facial Recognition in the Physical World
Facial recognition (FR) technology is being adopted in both private and public spheres for a wide range of reasons, from ensuring physical safety to providing personalized shopping experiences. It is not clear yet, though, how users perceive this emerging technology in terms of usefulness, risks, and comfort. We begin to address these questions in this paper. In particular, we conducted a vignette-based study with 314 participants on Amazon Mechanical Turk to investigate their perceptions of facial recognition in the physical world, based on thirty-five scenarios across eight different contexts of FR use. We found that users do not have a binary answer towards FR adoption. Rather, their perceptions are grounded in the specific contexts in which FR will be applied. The participants considered a broad range of factors, including control over facial data, the utility of FR, the trustworthiness of organizations using FR, and the location and surroundings of FR use to place the corresponding privacy risks in context. They weighed the privacy risks with the usability, security, and economic gain of FR use as they reported their perceptions. Participants also noted the reasons and rationals behind their perceptions of facial recognition, which let us conduct an in-depth analysis of their perceived benefits, concerns, and comfort with using this technology in various scenarios. Through this first systematic look into users’ perceptions of facial recognition in the physical world, we shed light on the tension between FR adoption and users’ concerns. Taken together, our findings have broad implications that advance the Privacy and Security community’s understanding of FR through the lens of users, where we presented guidelines for future research in these directions
Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems
Merged with duplicate record 10026.1/753 on 14.03.2017 by CS (TIS)The last decade has witnessed massive growth in both the technological development, and
the consumer adoption of mobile devices such as mobile handsets and PDAs. The recent
introduction of wideband mobile networks has enabled the deployment of new services
with access to traditionally well protected personal data, such as banking details or
medical records. Secure user access to this data has however remained a function of the
mobile device's authentication system, which is only protected from masquerade abuse by
the traditional PIN, originally designed to protect against telephony abuse.
This thesis presents novel research in relation to advanced subscriber authentication for
mobile devices. The research began by assessing the threat of masquerade attacks on
such devices by way of a survey of end users. This revealed that the current methods of
mobile authentication remain extensively unused, leaving terminals highly vulnerable to
masquerade attack. Further investigation revealed that, in the context of the more
advanced wideband enabled services, users are receptive to many advanced
authentication techniques and principles, including the discipline of biometrics which
naturally lends itself to the area of advanced subscriber based authentication.
To address the requirement for a more personal authentication capable of being applied
in a continuous context, a novel non-intrusive biometric authentication technique was
conceived, drawn from the discrete disciplines of biometrics and Auditory Evoked
Responses. The technique forms a hybrid multi-modal biometric where variations in the
behavioural stimulus of the human voice (due to the propagation effects of acoustic
waves within the human head), are used to verify the identity o f a user. The resulting
approach is known as the Head Authentication Technique (HAT).
Evaluation of the HAT authentication process is realised in two stages. Firstly, the
generic authentication procedures of registration and verification are automated within a
prototype implementation. Secondly, a HAT demonstrator is used to evaluate the
authentication process through a series of experimental trials involving a representative
user community. The results from the trials confirm that multiple HAT samples from
the same user exhibit a high degree of correlation, yet samples between users exhibit a
high degree of discrepancy. Statistical analysis of the prototypes performance realised
early system error rates of; FNMR = 6% and FMR = 0.025%. The results clearly
demonstrate the authentication capabilities of this novel biometric approach and the
contribution this new work can make to the protection of subscriber data in next
generation mobile networks.Orange Personal Communication Services Lt
Non-Intrusive Continuous User Authentication for Mobile Devices
The modern mobile device has become an everyday tool for users and business. Technological advancements in the device itself and the networks that connect them have enabled a range of services and data access which have introduced a subsequent increased security risk. Given the latter, the security requirements need to be re-evaluated and authentication is a key countermeasure in this regard. However, it has traditionally been poorly served and would benefit from research to better understand how authentication can be provided to establish sufficient trust. This thesis investigates the security requirements of mobile devices through literature as well as acquiring the user’s perspectives. Given the findings it proposes biometric authentication as a means to establish a more trustworthy approach to user authentication and considers the applicability and topology considerations. Given the different risk and requirements, an authentication framework that offers transparent and continuous is developed. A thorough end-user evaluation of the model demonstrates many positive aspects of transparent authentication. The technical evaluation however, does raise a number of operational challenges that are difficult to achieve in a practical deployment.
The research continues to model and simulate the operation of the framework in an controlled environment seeking to identify and correlate the key attributes of the system. Based upon these results and a number of novel adaptations are proposed to overcome the operational challenges and improve upon the impostor detection rate. The new approach to the framework simplifies the approach significantly and improves upon the security of the system, whilst maintaining an acceptable level of usability
A Thematic and Reference Analysis of Touchless Technologies
The purpose of this research is to explore the utility and current state of touchless technologies. Five categories of technologies are identified as a result of collecting and reviewing literature: facial/biometric recognition, gesture recognition, touchless sensing, personal devices, and voice recognition. A thematic analysis was conducted to evaluate the advantages and disadvantages of the five categories. A reference analysis was also conducted to determine the similarities between articles in each category. Touchless sensing showed to have the most advantages and least similar references. Gesture recognition was the opposite. Comparing analyses shows more reliable technology types are more beneficial and diverse
Development of a secure multi-factor authentication algorithm for mobile money applications
A Thesis Submitted in Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Information and Communication Science and Engineering of the Nelson Mandela African Institution of Science and TechnologyWith the evolution of industry 4.0, financial technologies have become paramount and mobile
money as one of the financial technologies has immensely contributed to improving financial
inclusion among the unbanked population. Several mobile money schemes were developed but,
they suffered severe authentication security challenges since they implemented two-factor
authentication. This study focused on developing a secure multi-factor authentication (MFA)
algorithm for mobile money applications. It uses personal identification numbers, one-time
passwords, biometric fingerprints, and quick response codes to authenticate and authorize mobile
money subscribers. Secure hash algorithm-256, Rivest-Shamir-Adleman encryption, and Fernet
encryption were used to secure the authentication factors, confidential financial information and
data before transmission to the remote databases. A literature review, survey, evolutionary
prototyping model, and heuristic evaluation and usability testing methods were used to identify
authentication issues, develop prototypes of native genuine mobile money (G-MoMo)
applications, and identify usability issues with the interface designs and ascertain their usability,
respectively. The results of the review grouped the threat models into attacks against privacy,
authentication, confidentiality, integrity, and availability. The survey identified authentication
attacks, identity theft, phishing attacks, and PIN sharing as the key mobile money systems’
security issues. The researcher designed a secure MFA algorithm for mobile money applications
and developed three native G-MoMo applications to implement the designed algorithm to prove
the feasibility of the algorithm and that it provided robust security. The algorithm was resilient to
non-repudiation, ensured strong authentication security, data confidentiality, integrity, privacy,
and user anonymity, was highly effective against several attacks but had high communication
overhead and computational costs. Nevertheless, the heuristic evaluation results showed that the
G-MoMo applications’ interface designs lacked forward navigation buttons, uniformity in the
applications’ menu titles, search fields, actions needed for recovery, and help and documentation.
Similarly, the usability testing revealed that they were easy to learn, effective, efficient,
memorable, with few errors, subscriber satisfaction, easy to use, aesthetic, easy to integrate, and
understandable. Implementing a secure mobile money authentication and authorisation by
combining multiple factors which are securely stored helps mobile money subscribers and other
stakeholders to have trust in the developed native G-MoMo applications
Automated network optimisation using data mining as support for economic decision systems
The evolution from wired voice communications to wireless and cloud computing services has led to the rapid growth of wireless communication companies attempting to meet consumer needs. While these companies have generally been able to achieve quality of service (QoS) high enough to meet most consumer demands, the recent growth in data hungry services in addition to wireless voice communication, has placed significant stress on the infrastructure and begun to translate into increased QoS issues. As a result, wireless providers are finding difficulty to meet demand and dealing with an overwhelming volume of mobile data. Many telecommunication service providers have turned to data analytics techniques to discover hidden insights for fraud detection, customer churn detection and credit risk analysis. However, most are illequipped to prioritise expansion decisions and optimise network faults and costs to ensure customer satisfaction and optimal profitability. The contribution of this thesis in the decision-making process is significant as it initially proposes a network optimisation scheme using data mining algorithms to develop a monitoring framework capable of troubleshooting network faults while optimising costs based on financial evaluations. All the data mining experiments contribute to the development of a super–framework that has been tested using real-data to demonstrate that data mining techniques play a crucial role in the prediction of network optimisation actions. Finally, the insights extracted from the super-framework demonstrate that machine learning mechanisms can draw out promising solutions for network optimisation decisions, customer segmentation, customers churn prediction and also in revenue management. The outputs of the thesis seek to help wireless providers to determine the QoS factors that should be addressed for an efficient network optimisation plan and also presents the academic contribution of this research