17 research outputs found

    A secure email login system using virtual password

    Get PDF
    In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virtual password system they have used linear randomized function to be secure against identity theft attacks, phishing attacks, keylogging attack and shoulder surfing system. In ICC 2010 Li's given a security attack on the Lei's work. This paper gives modification on Lei's work to prevent the Li's attack with reducing the server overhead. This paper also discussed the problems with current password recovery system and gives the better approach

    A Ubiquitous Solution for Mitigation of Black Hole Attack in Cognitive Radio

    Get PDF
    In the current scenario Cognitive Radio (CR) has become one of the best available solution for spectrum shortage problem. Moreover, for secure data transmission over these networks it is mandatory to make these networks robust and less vulnerable against the various types of attacks. Through this paper we have presented a ubiquitous solution for one of the attack viz. black hole attack. Its implementation and simulation in detail with PDR and Throughput. The paper deals with different type of attacks and protocols explained well here. Further there is implemention of algorithm on different parameters to achieve the improved rates than earlier solutions. The paper also deals with question of selecting AODV as it protocol used in simulation. Many aspects of attacks, secure network environment are explained here in this paper. Finally in simulation we got improved results for the parameters taken with some modification in AODV protocol

    AN ENHANCED BIOMETRIC BASED REMOTE USER AUTHENTICATION SCHEME USING SMART CARD

    Get PDF
    In remote authentication scheme, a remote user can communicate with server over open networks even though the physical distance is much far. Before interaction, they require to establish common session key by authenticating each other. Recently in 2014, Kumari et al. proposed the efficient scheme for remote user authentication. However in this paper, we show that the Kumari et al.’s scheme is vulnerably susceptible to the Insider Attack, Stolen Verifier Attack, Session Key Disclosure Attack, Password Guessing Attack, Modification Attack, User Impersonation Attack, Replay Attack, Shoulder Surfing Attack and Denial of Service Attack. Afterwards, we have proposed an improved remote user authentication scheme to deal with these attacks and other attacks

    Updating attribute in CP-ABE: A New Approach

    Get PDF
    In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user‟s secret key and access policy is at-tached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the genuine user can decrypt the ciphertext. How-ever, such scenario also necessitates periodic updating of the secret key with the changing attributes. According to our observations, the existing attempts at doing so are not efficient. In this paper, we propose a newer approach to add, update or delete the value of particular attribute effi-ciently without the knowledge of the other attributes

    A Level Dependent Authentication for IoT Paradigm

    Get PDF
    The Internet of Things (IoT) based services are getting a widespread expansion in all the directions and dimensions of the 21st century. The IoT based deployment involves an internet-connected sensor, mobiles, laptops, and other networking and computing de- vices. In most IoT based applications, the sensor collects the data and communicates it to the end-user via gateway device or fog device over a precarious internet channel. The attacker can use this open channel to capture the sensing device or the gateway device to collect the IoT data or control the IoT system. For a long time, numerous researchers are working towards designing the authentication mechanism for the sen- sor network to achieve reliable and computationally feasible security. For the resource constraint environment of the IoT, it is essential to design reliable, ecient, and secure authentication protocol. In this paper, we propose a novel approach of authentication in the IoT paradigm called a Level-Dependent Authentication(LDA). In the LDA protocol, we propose a security reliable and resource ecient key sharing mechanism in which users at level li can communicate with the sensor at level lj if and only if the level of user in the organizational hierarchy is lower or equal to the level of sensor deployment. We pro- vide a security analysis for the proposed LDA protocol using random oracle based games & widely accepted AVISPA tools. We prove mutual authentication for the proposed protocol using BAN logic. In this paper, we also discuss a comparative analysis of the proposed protocol with other existing IoT authentication systems based on communica- tion cost, computation cost, and security index. We provide an implementation for the proposed protocol using a globally adopted IoT protocol called MQTT protocol. Finally, we present the collected data related to the networking parameters like throughput and round trip delay

    Cushing Syndrome Caused by Pituitary and Adrenal Hybrid Tumor: A Rare Case Report

    Get PDF
    Introduction: Cushing syndrome is a rare endocrine disorder caused by a variety of underlying etiologies. It can be due to exogenous or endogenous high cortisone levels (ACTH-dependent or ACTH-independent). We herein report a case of ACTHdependent Cushing syndrome caused by pituitary and adrenal hybrid adenoma. Case report: A 42-year-old female presented with a complaint of hematemesis. She had hirsutism, central obesity and violaceous striae on her abdomen and thigh. On detailed clinical examination and relevant investigation, we found that the cause of hematemesis was esophagitis with necrotic gastric ulcer due to Cushing syndrome caused by the pituitary and adrenal hybrid adenoma. Discussion: Cushing syndrome is a rare endocrine disorder characterized by increased exogenous or endogenous serum cortisol levels, which lead to various clinical presentations. Early identification of the disease and its cause is critical. The entire clinical presentation must be considered for correct diagnosis, which is generally delayed due to the overlapping symptoms of the disease with various specialities. Conclusion: Diagnosis and management of Cushing’s syndrome continues to present considerable challenges and necessitates referral to higher centers. Its diverse presentation warrants a complete clinical, physical, radiological and endocrine examination

    Discussion on “Actuator Placement for Enhanced Grid Dynamic Performance: A Machine Learning Approach”

    No full text

    Internet of Things security: challenges, advances, and analytics

    No full text
    corecore