12 research outputs found

    ROBUST DYNAMIC ID-BASED REMOTE MUTUAL AUTHENTICATION SCHEME

    Get PDF
    Dynamic ID based authentication scheme is more and more important in insecure wireless environment and system. Two of kinds of attack that authentication schemes must resist are stealing identity and reflection attack which is a potential way of attacking a challenge- response authentication system using the same protocol in both direc­tions. It must be guaranteed to prevent attackers from reusing informa­tion from authentication phase and the scheme of Yoon and Yoo satisfies those requirements. However, their scheme can not resist insider and impersonation attack by using lost or stolen smart card. In this paper, we demonstrate that Yoon and Yoo’s scheme is still vulnerable to those attacks. Then, we present an improvement to their scheme in order to isolate such problems

    Delving into Ipsilateral Mammogram Assessment under Multi-View Network

    Full text link
    In many recent years, multi-view mammogram analysis has been focused widely on AI-based cancer assessment. In this work, we aim to explore diverse fusion strategies (average and concatenate) and examine the model's learning behavior with varying individuals and fusion pathways, involving Coarse Layer and Fine Layer. The Ipsilateral Multi-View Network, comprising five fusion types (Pre, Early, Middle, Last, and Post Fusion) in ResNet-18, is employed. Notably, the Middle Fusion emerges as the most balanced and effective approach, enhancing deep-learning models' generalization performance by +2.06% (concatenate) and +5.29% (average) in VinDr-Mammo dataset and +2.03% (concatenate) and +3% (average) in CMMD dataset on macro F1-Score. The paper emphasizes the crucial role of layer assignment in multi-view network extraction with various strategies

    Chebyshev Polynomial-Based Authentication Scheme in Multiserver Environment

    No full text
    Nowadays, communication technologies are more and more strongly advanced, such as 4G or 5G. There are many useful online applications, and one of them is the telecare medical information system (TMIS). If the TMIS is widely deployed, patients and doctors will have more frequently connection. Clearly, this enhances our quality of life. One of the most important modules securely constructing this convenient TMIS is the user-authentication scheme. We should prevent user identity and related information from the adversary’s eavesdropping. Therefore, the authentication scheme could provide user anonymity and concern some kinds of attacks, such as impersonation or password-guessing attacks. Common solutions are a combination of hash function and public-key cryptosystem (RSA or elliptic curve cryptosystem, ECC), but current schemes do not consider identity protection as one main task necessary for medical information environment. In this paper, our results consist of some important analyses of previous works and a multiserver user-authentication scheme suitable for TMIS using Chebyshev polynomial with two models: random oracle and BAN-logic

    Modified Dynamic ID-based User Authentication Scheme Resisting Smart-Card-Theft Attack

    No full text
    Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communications in such networks need to be guarded. It is necessary to have a secure mutual authentication scheme to defend transactions between user and service provider against illegitimate adversaries. Especially, users are those vulnerable to attacks and there are many authentication schemes with smart-card proposed to protect them. Recently, Yung-Cheng Lee has suggested a dynamic identity based user authentication scheme to resist smart-card-theft attack. Nevertheless, he assumed that smart-card is tamperproof. In our opinion, this is not appropriate because Kocher and Messerges pointed that smart-card’s confidential information could be extracted by physically monitoring its power consumption. Therefore, design of Yung-Cheng Lee cannot withstand this kind of attack. In addition, anyone who is a legal member can masquerade server or other legal users in his scheme. Moreover, legitimacy verification only starting from server side truly makes Lee’s scheme be impractical. In this paper, we present an improvement to his scheme to isolate such problems

    Modified Dynamic ID-based User Authentication Scheme Resisting Smart-Card-Theft Attack

    No full text
    Abstract: Wireless environments such as GSM, 3G, and 4G are more and more popular. Consequently, communications in such networks need to be guarded. It is necessary to have a secure mutual authentication scheme to defend transactions between user and service provider against illegitimate adversaries. Especially, users are those vulnerable to attacks and there are many authentication schemes with smart-card proposed to protect them. Recently, Yung-Cheng Lee has suggested a dynamic identity based user authentication scheme to resist smart-card-theft attack. Nevertheless, he assumed that smart-card is tamperproof. In our opinion, this is not appropriate because Kocher and Messerges pointed that smart-card’s confidential information could be extracted by physically monitoring its power consumption. Therefore, design of Yung-Cheng Lee cannot withstand this kind of attack. In addition, anyone who is a legal member can masquerade server or other legal users in his scheme. Moreover, legitimacy verification only starting from server side truly makes Lee’s scheme be impractical. In this paper, we present an improvement to his scheme to isolate such problems

    Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment

    No full text
    With nonstop development of communication technologies, all aspects of social life continuously change and so do network systems. When establishing connection is easy, the convenience of online-service receives many users’ attentions, for example, the patients directly access medical system to be advised by doctors at any time. Therefore, user authentication scheme is necessary when we want to provide privacy and security for working sessions. Storing a password list for verification is an old method and not secure. This list can be easily leaked, and adversary can launch an offline password-guessing attack. In addition, information exchanged between user and server needs being prevented from attacker’s decryption. It can be said that current authentication schemes are unsuitable for new security standard. We need a strong user authentication scheme using new approach to overcome existing limitations and guarantee time efficiency. In this paper, we make a design with Chebyshev polynomial to achieve our goals and resist some kinds of attacks

    Chaotic Chebyshev Polynomials Based Remote User Authentication Scheme in Client-Server Environment

    No full text
    Part 7: Applied CryptographyInternational audiencePerfect forward secrecy is considered as the most important standard to evaluate a strong authentication scheme. There are many results researched to achieve this property without using hard problems. Recently, the result of Chang et al has some advances such as, the correctness of schemes mutual authentication and session key agreement demonstrated in BAN-logic or the overheads reduction of system implementation. However, in this paper, we prove that their scheme is still vulnerable to impersonation attacks and session key leakage. To overcome those limitations and be practical, we use different notion to propose time efficient scheme conducted in experiment. Our proposed method can be applied for remote user authentication in various scenarios, including systems with user authentication using mobile or wearable devices

    Nonlinear tracking control of a 3-D overhead crane with friction and payload compensations

    Get PDF
    In this paper, a nonlinear adaptive control of a 3D overhead crane is investigated. A dynamic model of the overhead crane was developed, where the crane system is assumed as a lumped mass model. Under the mutual effects of the sway motions of the payload and the hoisting motion, the nonlinear behavior of the crane system is considered. A nonlinear control model-based scheme was designed to achieve the three objectives: (i) drive the crane system to the desired positions, (ii) suppresses the vibrations of the payload, and (iii) velocity tracking of hoisting motion. The nonlinear control scheme employs adaptation laws that estimate unknown system parameters, friction forces and the mass of the payload. The estimated values were used to compute control forces applied to the trolley of the crane. The asymptotic stability of the crane system is investigated by using the Lyapunov method. The effectiveness of the proposed control scheme is verified by numerical simulation results
    corecore