10 research outputs found

    Performance Analysis of SAP-NFC Protocol

    Get PDF
    The operations cost of authentication session is considered as strict indicator to evaluate the authentication protocols side by side with the security requirements achievements in the Near Field Communication (NFC) technology. The secure authentication protocol for the NFC mobile payment systems (SAP-NFC) one of the recent authentication protocols that have proposed to achieve high level of security features such as the fully mutual authentication, anonymity and untraceability. Moreover, the SAP-NFC protocol can prevent the current security attacks. This paper, analyzes the performance of the SAP-NFC protocol comparing with the other recent NFC mobile payment protocols in the NFC devices that are included in the system. The performance analysis has illustrated that the SAP-NFC protocol not only supports strong security features, but also offers low cost in term of amount of computations

    Formal Analysis of MCAP Protocol Against Replay Attack

    Get PDF
    Replay attack is considered a common attacking technique that is used by adversaries to gain access to confidential information. Several approaches have been proposed to prevent replay attack in security-critical systems such as Automated Teller Machines (ATM) systems. Among those approaches is a recent one called the Mutual Chain Authentication Protocol for the Saudi Payments Network transactions (MCAP). This protocol aims to allow Saudi banking systems to overcome existing weaknesses in the currently used Two-Factor Authentication (2FA) protocols. In this paper, we analyze and verify the recent MCAP authentication protocol against replay attacks. Therefore, we examine the mutual authentication between the ATM Terminal, Sponsoring Banks (SBAT), Saudi Payments Network (SPAN) and the Issuing of Financial Bank (CIFI). The paper also provides a formal analysis of the MCAP to conduct formal proofs of the MCAP protocols against replay attacks

    Design a secure IoT Architecture using Smart Wireless Networks

    Get PDF
    The Internet of Things (IOT) is a revolution in the technology world, and this field is continuously evolving. It has made life easier for people by providing consumers with more efficient and effective resources in faster and more convenient ways. The Internet of Things is one of the most exciting fields for the future by 2030. 90% of the planet will be connected and all devices in homes and businesses around us will be connected to the Internet making it more vulnerable to violations of privacy and protection. Due to the complexity of its environment, security and privacy are the most critical issues relevant to IoT. Without the reliable security of the devices, they will lose their importance and efficiency. Moreover, the security violation will outweigh any of its benefits. In this paper, an overview of various layered IoT architectures, a review of common security attacks from the perspective of the layer, and the best techniques against these attacks are provided. Moreover, an enhanced layered IoT architecture is proposed, which will be protected against several security attacks

    Synthetic generation of multidimensional data to improve classification model validity

    Get PDF
    This article aims to compare Generative Adversarial Network (GAN) models and feature selection methods for generating synthetic data in order to improve the validity of a classification model. The synthetic data generation technique involves generating new data samples from existing data to increase the diversity of the data and help the model generalize better. The multidimensional aspect of the data refers to the fact that it can have multiple features or variables that describe it. The GAN models have proven to be effective in preserving the statistical properties of the original data. However, the order of data augmentation and feature selection is crucial to build robust and accurate predictive models. By comparing the different GAN models with feature selection methods on multidimensional datasets, this article aims to determine the best combination to support the validity of a classification model in multidimensional data.</p

    AAA-WSN: Anonymous access authentication scheme for wireless sensor networks in big data environment

    No full text
    The data capturing and access process is an important stage in the big data applications. Most of these applications are exploited the wireless sensor networks (WSNs) to accomplish this process through the sensor nodes that are deployed in unsecure and unattended environments. Therefore, these applications are suffered from numerous security weaknesses, an adversary may exploit such weaknesses to break user’s privacy, confidentiality of sensor nodes, and control the communication channel between the network components. Consequently, the security issues for this process have attracted much interest of the researchers with the increasing spread of use such applications. The majority of the proposed authentication schemes fail to solve all existing security weaknesses simultaneously. Thus, the authentication scheme is a critical issue in the WSNs. This paper proposes anonymous access authentication scheme for wireless sensor networks in big data environments (AAA-WSN) to achieve appealing security services. Comparing with the recent WSNs authentication schemes, the AAA-WSN scheme cannot only achieve strong security services such as user anonymity and mutual authentication, but also performs the perfect forward secrecy feature with high level of efficiency. The security analysis shows that the AAA-WSN scheme is resistant to the current known attacks. Moreover, the performance analysis in terms of the storage, computations and communications costs demonstrates that the AAA-WSN scheme achieves high level of security with desirable level of efficiency comparing the recent WSNs authentication schemes

    Secure Authentication Scheme Using Diffie&ndash;Hellman Key Agreement for Smart IoT Irrigation Systems

    No full text
    Smart irrigation is considered one of the most significant agriculture management systems worldwide, considering the current context of water scarcity. There is a clear consensus that such smart systems will play an essential role in achieving the economic growth of other vital sectors. In general, the consequences of global warming and the unavailability of clean water sources for the agricultural sector are clear indications that the demand for these systems will increase in the near future, especially considering the recent expansions in the use of the Internet of Things (IoT) and Wireless Sensor Network (WSN) technologies, which have been employed in the development of such systems. An obvious result is that security challenges will be one of the main obstacles to attaining the widespread adoption of such systems. Therefore, this paper proposes a secure authentication scheme using Diffie&ndash;Hellman key agreement for smart IoT irrigation systems using WSNs. This scheme is based on Diffie&ndash;Hellman and one-way hash cryptographic functions in order to support the basic security services with a high data rate and ability to resist well-known attacks. The Burrows&ndash;Abadi&ndash;Needham (BAN) logic model is used to verify the proposed scheme formally. Based on various possible attack scenarios, a resistance analysis of the proposed scheme is discussed. Further analyses are performed in terms of the storage size, intercommunication, and running time costs. Therefore, the proposed scheme not only can be considered a secure authentication scheme but is also practical for smart IoT irrigation systems due to its reasonable efficiency factors

    Performance analysis of a new dynamic authentication protocol DAKA of 3G mobile systems based on a novel Cryptography algorithm 'Anglia'

    No full text
    Numerous examinations of the weaknesses with Authentication of Key Agreement protocol (AKA) of Universal Mobile Telecommunications System (UMTS) have been presented by various researchers. It is plausible to suggest that the majority of the proposed solutions of authentication protocols in the reported investigative works are formulated based on asymmetric algorithms which consume more computational overhead than symmetric algorithms. There is no evidence that the symmetric algorithms could lead to the existing weaknesses.EThOS - Electronic Theses Online ServiceGBUnited Kingdo

    SE-H: A Secure and Efficient Hash Protocol for RFID System

    No full text
    The Radio Frequency Identification (RFID) systems are suffered from the growing of security vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to break the tag holder privacy and desynchronize the communication messages between system components. The majority of the proposed solutions fail to solve the existing vulnerabilities. Therefore, the authentication protocol is the main challenge in such systems. This paper proposes a secure and efficient hash authentication (SE-H) protocol for RFID system to support attractive security features. Compared with the recent RFID authentication protocols, the SE-H protocol cannot only perform strong security features including mutual authentication and the data secrecy features, but also perform the user anonymity and untraceability features with low cost performance. The security analysis proves that the SE-H protocol is resistant to the current vulnerabilities. Furthermore, the performance analysis in term of the authentication operations cost illustrates that SE-H protocol is more efficient than the recent RFID protocols

    Vitamin D, Cholesterol, and DXA Value Relationship with Bimaxillary Cone Beam CT Values

    No full text
    We evaluated the correlation that Vitamin D (Vit D), cholesterol levels, and T- and Z-scores of dual-energy X-ray absorptiometry (DXA) scans have with cone beam computed tomography values assessed in the anterior and posterior regions of maxillary and mandibular jaws. In total, 187 patients were recruited for this clinical study. Patients’ ages ranged between 45 and 65 years. Patients with valid DXA results, serum Vit D and cholesterol levels, and no evidence of bone disorders in the maxilla or mandibular region were included in the study and grouped in the control (non-osteoporosis) and case (osteoporosis) groups. Patients with a history of medical or dental disease that might complicate the dental implant therapy, chronic alcohol users, and patients who took calcium or Vit D supplements were excluded. The outcome variables assessed in the investigation were Vit D, cholesterol, Z-values, and cone beam computed tomography values. Regarding the case group, a significant (p p > 0.05), a positive relationship was found between Vit D and the cone beam computed tomography values in all regions of the jaws, except the mandibular posterior region (p p > 0.05) negative association with the cone beam computed tomography values in all regions of the jaws. However, the Z-values were highly correlated with the cone beam computed tomography values in all regions of the jaws (r > 7, p < 0.05). Vit D, cholesterol levels, and Z-values in women and men from young adulthood to middle age (45–65) were related with the cone beam computed tomography values of the jaws

    Prognosis of Spontaneous Pneumothorax/Pneumomediastinum in Coronavirus Disease 2019: The CoBiF Score

    No full text
    Objectives: Pneumothorax and pneumomediastinum are associated with high mortality in invasively ventilated coronavirus disease 2019 (COVID-19) patients; however, the mortality rates among non-intubated patients remain unknown. We aimed to analyze the clinical features of COVID-19-associated pneumothorax/pneumomediastinum in non-intubated patients and identify risk factors for mortality. Methods: We searched PubMed Scopus and Embase from January 2020 to December 2021. We performed a pooled analysis of 151 patients with no invasive mechanical ventilation history from 17 case series and 87 case reports. Subsequently, we developed a novel scoring system to predict in-hospital mortality; the system was further validated in multinational cohorts from ten countries (n = 133). Results: Clinical scenarios included pneumothorax/pneumomediastinum at presentation (n = 68), pneumothorax/pneumomediastinum onset during hospitalization (n = 65), and pneumothorax/pneumomediastinum development after recent COVID-19 treatment (n = 18). Significant differences were not observed in clinical outcomes between patients with pneumomediastinum and pneumothorax (±pneumomediastinum). The overall mortality rate of pneumothorax/pneumomediastinum was 23.2%. Risk factor analysis revealed that comorbidities bilateral pneumothorax and fever at pneumothorax/pneumomediastinum presentation were predictors for mortality. In the new scoring system, i.e., the CoBiF system, the area under the curve which was used to assess the predictability of mortality was 0.887. External validation results were also promising (area under the curve: 0.709). Conclusions: The presence of comorbidity bilateral pneumothorax and fever on presentation are significantly associated with poor prognosis in COVID-19 patients with spontaneous pneumothorax/pneumomediastinum. The CoBiF score can predict mortality in clinical settings as well as simplify the identification and appropriate management of patients at high risk
    corecore