Internet of Things (IoT) is a network of all devices that can be accessed through the Internet. These devices can be remotely accessed and controlled using existing network infrastructure, thus ...allowing a direct integration of computing systems with the physical world. This also reduces human involvement along with improving accuracy and efficiency, resulting in economic benefit. The devices in IoT facilitate the day-to-day life of people. However, the IoT has an enormous threat to security and privacy due to its heterogeneous and dynamic nature. Authentication is one of the most challenging security requirements in the IoT environment, where a user (external party) can directly access information from the devices, provided the mutual authentication between user and devices happens. In this paper, we present a new signature-based authenticated key establishment scheme for the IoT environment. The proposed scheme is tested for security with the help of the widely used Burrows-Abadi-Needham logic, informal security analysis, and also the formal security verification using the broadly accepted automated validation of Internet security protocols and applications tool. The proposed scheme is also implemented using the widely accepted NS2 simulator, and the simulation results demonstrate the practicability of the scheme. Finally, the proposed scheme provides more functionality features, and its computational and communication costs are also comparable with other existing approaches.
The Internet of Things (IoT) is an emerging paradigm in which billions of devices communicate, thus producing and exchanging information related to real world objects (things). Sensor nodes are ...specialized nodes for handling transmission of a large volume of data in situations where the source nodes communicate with base stations (BS) via a set of intermediate nodes. Applications based on WSN claim that integrity and trustworthiness are the key aspects as the data received from source nodes is the major source for BS to take critical decisions. To establish the trustworthiness between sensor node and BS, a novel zero watermarking scheme is proposed in this paper. In order to ensure integrity and trustworthiness, our proposed scheme embeds a watermark in original data before it is transmitted to BS which is responsible for verifying the watermark embedded with data. We have compared proposed scheme with existing Asymmetric Cryptography (ACT) and Reversible Watermarking (RW) schemes based on the performance parameters such as computational overhead and the energy utilization. Analysis results suggest that proposed scheme can handle multiple attacks on data and watermark such as data deletion, data modification, and data insertion attack. Moreover, our experimental results demonstrate that the presented scheme is lightweight, computationally efficient, and better in energy utilization. A formal verification for proof of correctness using high level Petri nets (HLPNs) is also provided to verify the claims of our work.
•To verify the trustworthiness of sensor data, a zero-watermarking scheme is proposed.•We compared the scheme with existing asymmetric cryptography and reversible schemes.•Zero watermarking scheme justify the computational overhead and energy utilization.•Analysis results suggest that proposed scheme can handle multiple types of attacks.•A formal verification proof of correctness using high level Petri nets is provided.
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health ...and itinerary planning. This paper proposes a new decentralized lightweight authentication and key agreement scheme for VANETs. In the proposed scheme, there are three types of mutual authentications: 1) between vehicles; 2) between vehicles and their respective cluster heads; and 3) between cluster heads and their respective roadside units. Apart from these authentications, the proposed scheme also maintains secret keys between roadside units for their secure communications. The rigorous formal and informal security analysis shows that the proposed scheme is capable to defend various malicious attacks. Moreover, the ns-2 simulation demonstrates the practicability of the proposed scheme in VANET environment.
Biometric based authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in wireless technologies and associated constraints. Lu et al. ...recently proposed a robust biometric based authentication with key agreement protocol for a multi-server environment using smart cards. They claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper proves that Lu et al.'s protocol does not provide user anonymity, perfect forward secrecy and is susceptible to server and user impersonation attacks, man-in-middle attacks and clock synchronization problems. In addition, this paper proposes an enhanced biometric based authentication with key-agreement protocol for multi-server architecture based on elliptic curve cryptography using smartcards. We proved that the proposed protocol achieves mutual authentication using Burrows-Abadi-Needham (BAN) logic. The formal security of the proposed protocol is verified using the AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to show that our protocol can withstand active and passive attacks. The formal and informal security analyses and performance analysis demonstrates that the proposed protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.
Celotno besedilo
Dostopno za:
DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK
A spray coagulation (effect 2, Watts 50) was then performed using a triangular tip knife (Olympus, Tokyo, Japan) (e) that successfully achieved hemostasis (f). Noncontact method of spray coagulation ...may be considered to control focal ooze from fragile cyst wall. An evidence-based systematic review of the levels of evidence and a comparison of endoscopic versus non-endoscopic techniques.
In global mobility networks, a mobile user can access roaming services using a mobile device at anytime and anywhere. However, mobile users can be vulnerable to various attacks by adversaries, ...because the roaming services are provided through public network. Therefore, an anonymous mobile user authentication for roaming services is an essential security issue in global mobility networks. Recently, Lee et al. pointed out the security weaknesses of a previous scheme and proposed an advanced secure anonymous authentication scheme for roaming services in global mobility networks. However, we found that the scheme proposed by Lee et al. is vulnerable to password guessing and user impersonation attacks, and that it cannot provide perfect forward secrecy and secure password altered phase. In this paper, to overcome the security weaknesses of the scheme proposed by Lee et al., we propose an improved secure anonymous authentication scheme using shared secret keys between home agent and foreign agent. In addition, we analyze the security of our proposed scheme against various attacks and prove that it provides secure mutual authentication using Burrows-Abadi-Needham logic. In addition, the formal security analysis using the broadly-accepted real-or-random (ROR) random oracle model and the formal security verification using the widely accepted automated validation of the Internet security protocols and applications tool show that the proposed scheme provides the session key security and protection against replay as well as man-in-the-middle attacks, respectively. Finally, we compare the performance of the proposed scheme with the related schemes, and the results show that the proposed scheme provides better security and comparable efficiency as compared with those for the existing schemes.
Three-factor mutually authenticated key agreement protocols for multi-server environments have gained momentum in recent times due to advancements in wireless technologies and associated constraints. ...Several authors have put forward various authentication protocols for multi-server environment during the past decade. Wang et al. recently proposed a biometric-based authentication with key agreement protocol for multi-server environment and claimed that their protocol is efficient and resistant to prominent security attacks. The careful investigation of this paper shows that Wang et al. protocol's users are sharing personal identifiable information with the application servers during the registration and authentication process. This nature of disclosing credentials leads to severe threats particularly insider attacks, user impersonation attacks, and server impersonation attacks. As a remedy of the aforementioned problems, this paper proposes a novel biometric-based mutually authenticated key agreement protocols for multi-server architecture based on elliptic curve cryptography. We prove that the proposed protocol achieves secure mutual authentication property using the broadly used Burrows-Abadi-Needham logic. The formal security of the proposed protocol is verified using the widely accepted automated validation of Internet security protocols and applications tool to show that our protocol can withstand active and passive attacks including the replay and man-in-the-middle attacks. The proposed protocol is robust and efficient compared with the existing related protocols.
Authentication and key agreement (AKA) play a major role in an open network environment to communicate between two or more participants securely. Authentication and key agreement protocols should ...protect sensitive data from a malevolent adversary by offering a several of services, such as user credential privacy and authentication when a user's or server's private key is revealed or a smart card is lost/stolen. Unfortunately, the majority of offered authentication and key agreement protocols suggested in the literature are vulnerable to many attacks. In this research, we present a pseudo-identity-based secure mutual authentication protocol that protects privacy. The suggested protocol resists replay attacks, de-synchronization attacks, eavesdropping attacks, denial of service attacks, insider attacks, known session-specific temporary information attacks, and man-in-the-middle attacks efficiently and also provides forward security. In order to offer privacy and prevent traceability, our protocol employs the pseudo-identity mechanism. We present a comprehensive security analysis, which includes formal verification with the Scyther tool; a BAN logic proof; and an informal discussion of various attacks, demonstrating that the proposed protocol is secure against all well-known attacks. Additionally, we give a performance study and a comparison to similar existing protocols.
This brief presents a novel frequency-reconfigurable self-diplexing antenna (SDA) utilizing a hybrid substrate-integrated waveguide (SIW). The antenna comprises a radiating slot, a feeding network, ...and a hybrid SIW cavity featuring half-mode circular and half-mode rectangular SIW structures. The unique feature of this antenna lies in its fine-tuning capability of each resonant frequency by inserting or injecting solid and liquid dielectrics into designated etched pockets. Experimental results demonstrate that the proposed structure can be effectively tuned within the frequency range of 2.7 to 3.47 GHz for the lower band and 4.05 to 4.96 GHz for the upper band. The mutual coupling between the ports is better than 20.4 dB, and the antenna maintains consistent radiation patterns across the entire operating range. The proposed tunable antenna, featuring precise frequency tuning capability, compact size, and stable radiation patterns, is well suited for various applications, including wireless communication systems, biomedical telemetry, microwave imaging, WiMAX, and Wi-Fi.
Mobile user authentication is an essential topic to consider in the current communications technology due to greater deployment of handheld devices and advanced technologies. Memon et al. recently ...proposed an efficient and secure two-factor authentication protocol for location-based services using asymmetric key cryptography. Unlike their claims, the vigilant analysis of this paper substantiates that Memon et al.'s protocol has quite a few limitations such as vulnerability to key compromised impersonation attack, insecure password changing phase, imperfect mutual authentication, and vulnerability to insider attack. Furthermore, this paper proposes an enhanced secure authentication protocol for roaming services on elliptic curve cryptography. The proposed protocol is also a two-factor authentication protocol and is suitable for practical applications due to the composition of light-weight operations. The proposed protocol's formal security is verified using Automated Validation of Internet Security Protocols and Applications tool to certify that the proposed protocol is free from security threats. The informal and formal security analyses along with the performance analysis sections determine that the proposed protocol performs better than Memon et al.'s protocol and other related protocols in terms of security and efficiency.