13 research outputs found

    Investigation of Multimodal Template-Free Biometric Techniques and Associated Exception Handling

    Get PDF
    The Biometric systems are commonly used as a fundamental tool by both government and private sector organizations to allow restricted access to sensitive areas, to identify the criminals by the police and to authenticate the identification of individuals requesting to access to certain personal and confidential services. The applications of these identification tools have created issues of security and privacy relating to personal, commercial and government identities. Over the last decade, reports of increasing insecurity to the personal data of users in the public and commercial domain applications has prompted the development of more robust and sound measures to protect the personal data of users from being stolen and spoofing. The present study aimed to introduce the scheme for integrating direct and indirect biometric key generation schemes with the application of Shamir‘s secret sharing algorithm in order to address the two disadvantages: revocability of the biometric key and the exception handling of biometric modality. This study used two different approaches for key generation using Shamir‘s secret sharing scheme: template based approach for indirect key generation and template-free. The findings of this study demonstrated that the encryption key generated by the proposed system was not required to be stored in the database which prevented the attack on the privacy of the data of the individuals from the hackers. Interestingly, the proposed system was also able to generate multiple encryption keys with varying lengths. Furthermore, the results of this study also offered the flexibility of providing the multiple keys for different applications for each user. The results from this study, consequently, showed the considerable potential and prospect of the proposed scheme to generate encryption keys directly and indirectly from the biometric samples, which could enhance its success in biometric security field

    Physical layer authenticated image encryption for Iot network based on biometric chaotic signature for MPFrFT OFDM system

    Get PDF
    In this paper, a new physical layer authenticated encryption (PLAE) scheme based on the multi-parameter fractional Fourier transform–Orthogonal frequency division multiplexing (MP-FrFT-OFDM) is suggested for secure image transmission over the IoT network. In addition, a new robust multi-cascaded chaotic modular fractional sine map (MCC-MF sine map) is designed and analyzed. Also, a new dynamic chaotic biometric signature (DCBS) generator based on combining the biometric signature and the proposed MCC-MF sine map random chaotic sequence output is also designed. The final output of the proposed DCBS generator is used as a dynamic secret key for the MPFrFT OFDM system in which the encryption process is applied in the frequency domain. The proposed DCBS secret key generator generates a very large key space of (Formula presented.). The proposed DCBS secret keys generator can achieve the confidentiality and authentication properties. Statistical analysis, differential analysis and a key sensitivity test are performed to estimate the security strengths of the proposed DCBS-MP-FrFT-OFDM cryptosystem over the IoT network. The experimental results show that the proposed DCBS-MP-FrFT-OFDM cryptosystem is robust against common signal processing attacks and provides a high security level for image encryption application. © 2023 by the authors

    Authenticated public key elliptic curve based on deep convolutional neural network for cybersecurity image encryption application

    Get PDF
    The demand for cybersecurity is growing to safeguard information flow and enhance data privacy. This essay suggests a novel authenticated public key elliptic curve based on a deep convolutional neural network (APK-EC-DCNN) for cybersecurity image encryption application. The public key elliptic curve discrete logarithmic problem (EC-DLP) is used for elliptic curve Diffie–Hellman key exchange (EC-DHKE) in order to generate a shared session key, which is used as the chaotic system’s beginning conditions and control parameters. In addition, the authenticity and confidentiality can be archived based on ECC to share the (Formula presented.) parameters between two parties by using the EC-DHKE algorithm. Moreover, the 3D Quantum Chaotic Logistic Map (3D QCLM) has an extremely chaotic behavior of the bifurcation diagram and high Lyapunov exponent, which can be used in high-level security. In addition, in order to achieve the authentication property, the secure hash function uses the output sequence of the DCNN and the output sequence of the 3D QCLM in the proposed authenticated expansion diffusion matrix (AEDM). Finally, partial frequency domain encryption (PFDE) technique is achieved by using the discrete wavelet transform in order to satisfy the robustness and fast encryption process. Simulation results and security analysis demonstrate that the proposed encryption algorithm achieved the performance of the state-of-the-art techniques in terms of quality, security, and robustness against noise- and signal-processing attacks

    A Robust Multimodal Biometric Security System Using the Polynomial Curve Technique within Shamir's Secret Sharing Algorithm

    No full text
    This paper investigates the application of secret sharing technology to allow an encryption key to be derived from multimodal biometric samples. Within the proposed scheme, individual points on a parabolic curve are indirectly derived from individual biometric samples taken from an individual, and Shamir's Secret Sharing algorithm is applied in order to derive the required key. The proposal is robust, in that a pre-defined subset of modalities is required in order to derive the key, rendering the system able to accommodate exception handling for given modalities. The current paper reports preliminary work on how secret sharing techniques may be employed to integrate arbitrary points that may be derived from the actual biometric data

    Modeling of the Schemes for Organizing a Session of Person–System Interactions in the Information System for Critical Use Which Operates in a Wireless Communication Environment

    No full text
    In this article, for the first time, a new mathematical model of the schemes for organizing a session of person–system interactions between the registration center server of the information system for critical use (ISCU) and the terminal of the person-user in a wireless communication environment are presented. In contrast to the existing literature, this article uses the mathematical apparatus of queuing systems to describe the schemes of organizing the stochastic process of a session of person–system interaction in discrete or continuous time, namely, models of the type Geo/Geo/1 with group arrival and ordinary service for the case of discrete representation of time and models of the type M/G/1 for the case of continuous time representation. The use of the mathematical apparatus of queuing systems in the studies made it possible to obtain analytical expressions for comparing formalized schemes for organizing the person–system interaction according to such functional characteristics as the average time of downloading a finite number of data blocks into the terminal of the target person-user (average time that the request spent the server of the information system)

    AI-Empowered Attack Detection and Prevention Scheme for Smart Grid System

    No full text
    The existing grid infrastructure has already begun transforming into the next-generation cyber-physical smart grid (SG) system. This transformation has improved the grid’s reliability and efficiency but has exposed severe vulnerabilities due to growing cyberattacks and threats. For example, malicious actors may be able to tamper with system readings, parameters, and energy prices and penetrate to get direct access to the data. Several works exist to handle the aforementioned issues, but they have not been fully explored. Consequently, this paper proposes an AI-ADP scheme for the SG system, which is an artificial intelligence (AI)-based attack-detection and prevention (ADP) mechanism by using a cryptography-driven recommender system to ensure data security and integrity. The proposed AI-ADP scheme is divided into two phases: (i) attack detection and (ii) attack prevention. We employed the extreme gradient-boosting (XGBoost) mechanism for attack detection and classification. It is a new ensemble learning methodology that offers many advantages over similar methods, including built-in features, etc. Then, SHA-512 is used to secure the communication that employs faster performance, allowing the transmission of more data with the same security level. The performance of the proposed AI-ADP scheme is evaluated based on various parameters, such as attack-detection accuracy, cycles used per byte, and total cycles used. The proposed AI-ADP scheme outperformed the existing approaches and obtained 99.12% accuracy, which is relatively high compared to the pre-existing methods

    The Impact of Personality and Demographic Variables in Collaborative Filtering of User Interest on Social Media

    No full text
    The advent of social networks and micro-blogging sites online has led to an abundance of user-generated content. Hence, the enormous amount of content is viewed as inappropriate and unimportant information by many users on social media. Therefore, there is a need to use personalization to select information related to users’ interests or searchers on social media platforms. Therefore, in recent years, user interest mining has been a prominent research area. However, almost all of the emerging research suffers from significant gaps and drawbacks. Firstly, it suffers from focusing on the explicit content of the users to determine the interests of the users while neglecting the multiple facts as the personality of the users; demographic data may be a valuable source of influence on the interests of the users. Secondly, existing work represents users with their interesting topics without considering the semantic similarity between the topics based on clusters to extract the users’ implicit interests. This paper is aims to propose a novel user interest mining approach and model based on demographic data, big five personality traits and similarity between the topics based on clusters. To demonstrate the leverage of combining user personality traits and demographic data into interest investigation, various experiments were conducted on the collected data. The experimental results showed that looking at personality and demographic data gives more accurate results in mining systems, increases utility, and can help address cold start problems for new users. Moreover, the results also showed that interesting topics were the dominant factor. On the other hand, the results showed that the current users’ implicit interests can be predicted through the cluster based on similar topics. Moreover, the hybrid model based on graphs facilitates the study of the patterns of interaction between users and topics. This model can be beneficial for researchers, people on social media, and for certain research in related fields

    Impact of 3G and 4G Technology Performance on Customer Satisfaction in the Telecommunication Industry

    No full text
    This study investigates the impact of factors (network coverage, customer service, video calls, and downloading Speed) of 3G and 4G telecommunication services performance on customer satisfaction in the Punjab region of Pakistan. This research indicates how to make strong relations with customers and what factors of the 3G and 4G networks need to be improved to enhance the revenue of telecom operator companies. The study has recognized the four main hypotheses responsible for checking the level of customer satisfaction in the telecommunication industry of Pakistan in the Punjab region. The study depends on essential insights gathered on the arbitrary premise from 300 clients of significant telecom administrators in the Punjab area. The respondents have selected on irregular premises and were welcomed to express their sentiments through an organized survey. A complete questionnaire has been utilized for statistics collection and exists based on the analysis of descriptive measurement, correlation, and regression analysis and analyzed through SmartPLS software. They indicate that the independent variables network coverage, customer service, video calls, and downloading speed are key driving factors of customer satisfaction. Among all independent variables “Internet downloading speed” highly impacts the dependent variable “customer satisfaction” based on 3G and 4G network performance. There are a limited number of studies that focus on customer satisfaction in the telecommunication sector in Pakistan. The study will fill the gap in the literature and help service providers to increase the satisfaction level of their customers and captivate new customers

    Blockchain and Deep Learning-Based Fault Detection Framework for Electric Vehicles

    No full text
    The gradual transition from a traditional transportation system to an intelligent transportation system (ITS) has paved the way to preserve green environments in metro cities. Moreover, electric vehicles (EVs) seem to be beneficial choices for traveling purposes due to their low charging costs, low energy consumption, and reduced greenhouse gas emission. However, a single failure in an EV’s intrinsic components can worsen travel experiences due to poor charging infrastructure. As a result, we propose a deep learning and blockchain-based EV fault detection framework to identify various types of faults, such as air tire pressure, temperature, and battery faults in vehicles. Furthermore, we employed a 5G wireless network with an interplanetary file system (IPFS) protocol to execute the fault detection data transactions with high scalability and reliability for EVs. Initially, we utilized a convolutional neural network (CNN) and a long-short term memory (LSTM) model to deal with air tire pressure fault, anomaly detection for temperature fault, and battery fault detection for EVs to predict the presence of faulty data, which ensure safer journeys for users. Furthermore, the incorporated IPFS and blockchain network ensure highly secure, cost-efficient, and reliable EV fault detection. Finally, the performance evaluation for EV fault detection has been simulated, considering several performance metrics, such as accuracy, loss, and the state-of-health (SoH) prediction curve for various types of identified faults. The simulation results of EV fault detection have been estimated at an accuracy of 70% for air tire pressure fault, anomaly detection of the temperature fault, and battery fault detection, with R2 scores of 0.874 and 0.9375

    Blockchain and Deep Learning-Based Fault Detection Framework for Electric Vehicles

    No full text
    The gradual transition from a traditional transportation system to an intelligent transportation system (ITS) has paved the way to preserve green environments in metro cities. Moreover, electric vehicles (EVs) seem to be beneficial choices for traveling purposes due to their low charging costs, low energy consumption, and reduced greenhouse gas emission. However, a single failure in an EV’s intrinsic components can worsen travel experiences due to poor charging infrastructure. As a result, we propose a deep learning and blockchain-based EV fault detection framework to identify various types of faults, such as air tire pressure, temperature, and battery faults in vehicles. Furthermore, we employed a 5G wireless network with an interplanetary file system (IPFS) protocol to execute the fault detection data transactions with high scalability and reliability for EVs. Initially, we utilized a convolutional neural network (CNN) and a long-short term memory (LSTM) model to deal with air tire pressure fault, anomaly detection for temperature fault, and battery fault detection for EVs to predict the presence of faulty data, which ensure safer journeys for users. Furthermore, the incorporated IPFS and blockchain network ensure highly secure, cost-efficient, and reliable EV fault detection. Finally, the performance evaluation for EV fault detection has been simulated, considering several performance metrics, such as accuracy, loss, and the state-of-health (SoH) prediction curve for various types of identified faults. The simulation results of EV fault detection have been estimated at an accuracy of 70% for air tire pressure fault, anomaly detection of the temperature fault, and battery fault detection, with R2 scores of 0.874 and 0.9375
    corecore