7 research outputs found

    A Novel Authentication Method That Combines Honeytokens and Google Authenticator

    Get PDF
    Despite the rapid development of technology, computer systems still rely heavily on passwords for security, which can be problematic. Although multi-factor authentication has been introduced, it is not completely effective against more advanced attacks. To address this, this study proposes a new two-factor authentication method that uses honeytokens. Honeytokens and Google Authenticator are combined to create a stronger authentication process. The proposed approach aims to provide additional layers of security and protection to computer systems, increasing their overall security beyond what is currently provided by single-password or standard two-factor authentication methods. The key difference is that the proposed system resembles a two-factor authentication but, in reality, works like a multi-factor authentication system. Multi-factor authentication (MFA) is a security technique that verifies a user’s identity by requiring multiple credentials from distinct categories. These typically include knowledge factors (something the user knows, such as a password or PIN), possession factors (something the user has, such as a mobile phone or security token), and inherence factors (something the user is, such as a biometric characteristic like a fingerprint). This multi-tiered approach significantly enhances protection against potential attacks. We examined and evaluated our system’s robustness against various types of attacks. From the user’s side, the system is as friendly as a two-factor authentication method with an authenticator and is more secure

    An Uncertainty-Driven Proactive Self-Healing Model for Pervasive Applications

    No full text
    The ever-increasing demand for services of end-users in the Internet of Things (IoT) often causes great congestion in the nodes dedicated to serving their requests. Such nodes are usually placed at the edge of the network, becoming the intermediates between the IoT infrastructure and Cloud. Edge nodes offer many advantages when adopted to perform processing activities that are realized close to end-users, limiting the latency in the provision of responses. In this article, we attempt to solve the problem of the potential overloading of edge nodes by proposing a mechanism that always keeps free space in their queue to host high-priority processing tasks. We introduce a proactive, self-healing mechanism that utilizes the principles of Fuzzy Logic, in combination with a non-parametric statistical method that reveals the trend of nodes’ loads as depicted by the incoming tasks and their capability to serve them in the minimum possible time. Through our approach, we manage to ensure the uninterrupted service of high-priority tasks, taking into consideration the demand for tasks as well. Based on this approach, we ensure the fastest possible delivery of results to the requestors while keeping the latency for serving high-priority tasks at the lowest possible levels. A set of experimental scenarios is adopted to evaluate the performance of the suggested model by presenting the corresponding numerical results

    Modern Authentication Methods: A comprehensive survey

    No full text
    The file attached to this record is the author's final peer reviewed version. Open access article.This paper presents a comprehensive investigation of modern authentication schemes. We start with the importance of authentication methods and the different authentication processes. Then we present the authentication criteria used and we perform a comparison of them in terms of universality, uniqueness, collectability, performance, acceptability, and spoofing. Finally, we present MFA challenges and security issues and present future directions

    Query Driven Data Subspace Mapping

    No full text
    The increased use of multiple types of smart devices in several application domains, opens the pathways for the collection of humongous volumes of data. At the same time, the need for processing of only a subset of these data by applications in order to quickly conclude tasks execution and knowledge extraction, has resulted in the adoption of a very high number of queries set into distributed datasets. As a result, a significant process is the efficient response to these queries both in terms of time and the appropriate data. In this paper, we present a hierarchical query-driven clustering approach, for performing efficient data mapping in remote datasets for the management of future queries. Our work differs from other current methods in the sense that it combines a Query-Based Learning (QBL) model with a hierarchical clustering in the same methodology. The performance of the proposed model is assessed by a set of experimental scenarios while we present the relevant numerical outcomes

    Quantum Cryptography in Maritime Telecommunications

    No full text
    This article is about quantum cryptography in Maritime Telecommunications. Cryptography is necessary for the security of online communications, transportations, medicine, and other significant fields. This new research area has been fruitful in recognizing mathematical operations that quantum algorithms lack in speed and build cryptographic systems around them. The challenge in post-quantum cryptography is to ensure cryptographic flexibility without sacrificing confidentiality

    Digital Twins and Cyber Security – solution or challenge?

    No full text
    Digital twin technology today is diverse and emerging and its full potential is not yet widely understood. The concept of a digital twin allows for the analysis, design, optimisation and evolution of systems to take place fully digital, or in conjunction with a cyber-physical system to improve speed, accuracy and efficiency when compared to traditional engineering approaches. Digital twins continue to be a technology that enables new paradigms, such as Industry 4.0 and Factories of the Future as well as generating improved efficiencies within existing systems. The development of digital twin technology in traditional industries such as manufacturing, construction, the automotive industry, agriculture and transportation has highlighted its potential, but often insufficiently explored the risks associated with their integration. In this paper we explore risks relating to the cyber-security of systems employing digital twin technology and also consider the opportunities for digital twins themselves to mitigate cyber-security risks and become an integral part of a security in-depth defence

    A Point Prevalence Survey of Healthcare-Associated Infections and Antimicrobial Use in Public Acute Care Hospitals in Crete, Greece

    No full text
    Background: Both healthcare-associated infections (HAIs) and antimicrobial resistance are associated with an increased length of stay and hospital costs, while they have also been linked to high morbidity and mortality rates. In 2016 and 2017, the latest point prevalence survey (PPS) of HAIs and antimicrobial use in European acute care hospitals highlighted an HAI prevalence of 6.5%, while Greece had a higher HAI prevalence of 10%. The aim of this PPS was to record the prevalence of HAIs and antimicrobial use in all eight public acute care hospitals in Crete, Greece during the COVID-19 pandemic in order to highlight the types of infections and antimicrobial practices that need to be prioritized for infection control initiatives. Methods: The PPS was conducted between 30 March and 15 April 2022, according to the ECDC standardized relevant protocol (version 5.3). Statistics were extracted using the ECDC Helics.Win.Net application (software version 4.1.0). Results: A total of 1188 patients were included. The overall point prevalence of patients with at least one HAI was 10.6%. The most frequent types of infections were pneumonia (34.3%), bloodstream infections (10.5%), systemic infections and urinary tract infections (10.5% and 9.1%, respectively). In 14 (12.4%) cases, the pathogen responsible for HAI was SARS-CoV-2 following onsite spread, accounting for almost 10% of all HAIs. Microorganisms were identified in 60.1% of HAIs. Antimicrobials were administered in 711 (59.8%) patients, with 1.59 antimicrobials used per patient. Conclusion: The prevalence of HAI and antimicrobial use among hospitalized patients in Crete, Greece was similar to the national HAI prevalence in 2016 despite the enormous pressure on public hospitals due to the COVID-19 pandemic. Nevertheless, both HAI prevalence and antimicrobial use remain high, underlining the need to implement adequate infection control and antimicrobial stewardship interventions
    corecore