5 research outputs found

    A Distance-Based Data-Mule Scheduling Technique for Lesser Nodal Delay in Wireless Sensor Network

    Get PDF
    Nodal delay in wireless sensor network is an indisputable factor in the medium of communication. Factor such as changeability of communication devices, network topologies, packet-sizes, and transmission rate demands to develop data-mule queue scheduling technique. Our proposed data-mule scheduling technique accomplish this through simulations using standard software written in C# by controlling data-mule schedules that collects data from all the nodes connected to the hop. The scheme identifies the hierarchical positions of static source nodes and the distance of mobile source nodes from the hop with rescheduling based on the newly acquired distances. Source nodes applied with data-mule scheduling technique resulted to lower nodal delay. Transmission of packet-data is efficiently and effectively improved

    Securing One Time Password (OTP) for Multi-Factor Out-of-Band Authentication through a 128-bit Blowfish Algorithm

    Get PDF
    Authentication and cryptography have been used to address security issues on various online services. However, researchers discovered that even the most commonly used multi-factor out-of-band authentication mechanism was vulnerable to attacks and traditional crypto-algorithms were characterized to have some drawbacks making it crucial to choose desirable algorithms for a particular purpose. This study introduces an innovative modification of the Blowfish algorithm designed to capitalize on its strengths but supports 128-bits block size text input using dynamic selection encryption method and reduction of cipher function execution through randomly determined rounds. Experimentation results on 128-bit input text revealed significant performance improvements with utmost 5.91 % in terms of avalanche effect, 38.97 % for integrity, and 41.02 % in terms of execution time. Results also showed that the modification introduced extra security layer, thus, displaying higher complexity and stronger diffusion at faster execution time making it more difficult and complex for an unauthorized individual to decipher the information and desirable to be used for applications with multiple users respectively. This is a good contribution to the continuous developments in the field of information security particularly in cryptography and towards providing a secure OTP for multifactor out-of-band authentication

    Enhanced Multi-factor Out-of-Band Authentication En Route to Securing SMS-based OTP Ariel

    Get PDF
    Validation of user’s authenticity through authentication played a crucial role to address risks and security issues in today's connected world. Among different authentication methods, OTP sent via SMS was identified as the most commonly used multi-factor authentication mechanism. However, studies have shown that it has not remained attack-proof. It has been branded to be vulnerable to SMiShing, a technique comparable to Internet phishing, and Eavesdropping accomplished through keylogging, screens capturing, shoulder surfing and other social engineering practices. This study introduced an innovative approach to secure SMS-based OTP against its threats through OTP encryption using modified Blowfish algorithm. A mobile application was also employed for capturing and processing encrypted SMS-based OTP to produce new OTP for verification, thus performing end-to-end OTP. Experimentation results and analysis revealed that the proposed architecture was free against the said vulnerabilities and promote tighter security, making it a good alternative for SMS-based OTP multi-factor authentication
    corecore