6,037 research outputs found
Conceivable security risks and authentication techniques for smart devices
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques
Session Initiation Protocol Attacks and Challenges
In recent years, Session Initiation Protocol (SIP) has become widely used in
current internet protocols. It is a text-based protocol much like Hyper Text
Transport Protocol (HTTP) and Simple Mail Transport Protocol (SMTP). SIP is a
strong enough signaling protocol on the internet for establishing, maintaining,
and terminating session. In this paper the areas of security and attacks in SIP
are discussed. We consider attacks from diverse related perspectives. The
authentication schemes are compared, the representative existing solutions are
highlighted, and several remaining research challenges are identified. Finally,
the taxonomy of SIP threat will be presented
Efficient time synchronized one-time password scheme to provide secure wake-up authentication on wireless sensor networks
In this paper we propose Time Synchronized One-Time-Password scheme to
provide secure wake up authentication. The main constraint of wireless sensor
networks is their limited power resource that prevents us from using radio
transmission over the network to transfer the passwords. On the other hand
computation power consumption is insignificant when compared to the costs
associated with the power needed for transmitting the right set of keys. In
addition to prevent adversaries from reading and following the timeline of the
network, we propose to encrypt the tokens using symmetric encryption to prevent
replay attacks.Comment: International Journal Of Advanced Smart Sensor Network Systems
(IJASSN), Vol 3, No.1, January 2013
http://airccse.org/journal/ijassn/papers/3113ijassn01.pd
- …