1,404 research outputs found
The Prospects of M-Voting Implementation in Nigeria
Since independence, an average of 50% of registered voters participates in voting [1].
Similarly, an increasing rate of apathy was observed between the electorate and the elect,
which was not unconnected with lack of transparency, accountability, and probity on the
part of government [2]. Thus the electorate did not see the need to subject itself to any
stress. Consequently, government is very committed to implementing the forth coming
elections through e-voting. This paper proposes the prospects of m-voting implementation
in Nigeria through the use of mobile phones, PDAs, etc. with guaranteed security, secrecy,
and convenience in a democratization process. It also reviews the level of adoption of GSM
in Nigeria, the implication of voting through the GSM, and finally introducing m-voting
innovation in the voting process to increase voters’ access and participation rate in
election
Emergency Mode for ATM Security by using Biometric Recognition and GSM Technology
Now a day there is an urgent need to improve security in banking region. The foremost objective of this system is to develop an embedded system, which is used for ATM system security application. With the advent of ATM though banking became a lot easier it even became a lot vulnerable or susceptible. Today, ATM is nothing more than Access Card and Personal Identification Number (PIN) for identification and security clearness. This kind of situation is unfortunate is unfortunate since tremendous progress has been made in biometric identification techniques, such as finger printing, retina scanning, facial recognition, iris scanning etc. This paper proposes the development of a system that integrates fingerprint recognition technology and GSM technology into the identify verification process used in ATMs. The development of such a system helps to protect consumers and financial institutions alike from fraud security. In this, Bankers has to collect the customer�s finger prints and mobile number while opening the accounts then customer only access the ATM machine. The working of these ATM machine is when customer place finger on finger print module when it access automatically generates every time different 4-digit code as a message to the mobile of the authorized customer through GSM modem connected to the microcontroller. The code received by the customer should be entered by customer then only customer can access his account
Literature review of recent, practical - oriented computer networks papers
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Electrical and Electronic Engineering, 2009.Cataloged from PDF version of thesis report.Includes bibliographical references (page 61).This thesis will include a literature review of recent practical oriented computer networks papers in premier IEEE conferences. The objective of the thesis is to provide detailed plans for a number of computer network related projects that may be implemented by subsequent BRAC University students. We will do an in-depth study of the selected topics and provide a step by step implementation process.Hasibul IslamHassan SameerIrtiza Ahmad FarooqB. Electrical and Electronic Engineerin
Recommended from our members
User dependent cryptography for security in future mobile telecommunication systems
In this paper we propose a user dependent scheme for enhancing security of the transmitted content in the future telecommunication systems. In order to achieve a higher level of security we introduce a scheme where the user identity gets involved in the encryption/decryption processes using an additional component for the block cipher which represents the user’s behavioural model. Applying such a scheme, in addition to introducing more difficulties to an attacker due to the user dependency of the cipher algorithm, gives the mobile operator the opportunity to ensure that a licensed service has not been shared by the customer. To show the feasibility of our approach we use the concept of invertible Boolean functions as an example
Enhancing the security of electronic commerce transactions
This thesis looks at the security of electronic commerce transaction process-
ing. It begins with an introduction to security terminology used in the thesis.
Security requirements for card payments via the Internet are then described,
as are possible protocols for electronic transaction processing. It appears that
currently the Secure Socket Layer (SSL) protocol together with its standardised
version Transport Layer Security (TLS) are the most widely used means to se-
cure electronic transactions made over the Internet. Therefore, the analysis and
discussions presented in the remainder of the thesis are based on the assumption
that this protocol provides a `baseline' level of security, against which any novel
means of security should be measured.
The SSL and TLS protocols are analysed with respect to how well they
satisfy the outlined security requirements. As SSL and TLS provide transport
layer security, and some of the security requirements are at the application
level, it is not surprising that they do not address all the identi¯ed security
requirements.
As a result, in this thesis, we propose four protocols that can be used to build
upon the security features provided by SSL/TLS. The main goal is to design
schemes that enhance the security of electronic transaction processing whilst
imposing minimal overheads on the involved parties. In each case, a description
of the new scheme is given, together with its advantages and limitations. In the
¯rst protocol, we propose a way to use an EMV card to improve the security of
online transactions. The second protocol involves the use of the GSM subscriber
authentication service to provide user authentication over the Internet. Thirdly,
we propose the use of GSM data con¯dentiality service to protect sensitive
information as well as to ensure user authentication.
Regardless of the protection scheme employed for the transactions, there
exist threats to all PCs used to conduct electronic commerce transactions. These
residual threats are examined, and motivate the design of the fourth protocol,
proposed speci¯cally to address cookie threats
Implementation of the Enhanced Fingerprint Authentication in the ATM System Using ATmega128 with GSM Feedback Mechanism
ATM was introduced to boost the cashless policy in Nigeria. Current trend of Cybercrime facilitate the need for an enhanced fingerprint application on ATM machine with GSM Feedback mechanism. The mechanism enable unassigned fingerprint authentication of customers with quick code and secret code. The project enhances the security authentication of customers using ATM. A core controller using fingerprint recognition system of ATmega128 in-system programmable flash is explored. An SM630 fingerprint module is used to capture fingerprints with DSP processor and optical sensor for verification, using AT command of GSM module for feedback text messaging (i.e. sending of Quick and Secret-Codes respectively). Upon system testing of capable reduction of ATM fraud using C program, the new method of authentication is presented
Secure Algorithms for SAKA Protocol in the GSM Network
This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3, A8, and A5 algorithms. Our NewA5 algorithm is based on block ciphers, but we also propose NewA5 algorithm with Cipher Feedback, Counter, and Output Feedback modes to convert block cipher into stream cipher. However, stream cipher algorithms are slower than the block cipher algorithm. These new algorithms are proposed to use with a secure and efficient authentication and key agreement (AKA) protocol in the GSM network. The proposed architecture is secure against partition attack, narrow pipe attack, collision attack, interleaving attack, and man-in-the-middle attack. The security analysis of the proposed algorithms are discussed with respect to the cryptanalysis, brute force analysis, and operational analysis. We choose the NewA3 and NewA8 algorithms for challenge-response and key generation, respectively. Furthermore, the NewA5 is suitable for encryption as it is efficient than the existing A5/1 and A5/2 algorithms. In case when stream cipher algorithms are required to use, our new algorithms, NewA5-CTR, NewA5-CFB, and NewA5-OFB can be used for specific applications. These algorithms are completely secure and better than the existing A5/1 and A5/2 in terms of resistant to attacks
- …