Search results for "Security."
showing 10 items of 1645 documents
Disadvantaged by Disability: Examining the Accessibility of Cyber Security
2021
Today, we are living in a digitally dependent world. Through the use of digital technologies, life is meant to be easier and streamlined. This includes giving access to services that previously were unavailable to many due to disability. Although technology has evolved immensely over the past few decades, reducing the digital divide, authentication methods have changed very little. Authentication is the forefront of securing users’ information, services and technology, yet for many it still poses issues in terms of usability and security, due to specific characteristics of different disabilities. In this paper, drawing upon a literature review, a review of recognized disabilities, and the r…
Optical security and encryption with totally incoherent light
2001
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.
Blockchain based Device identification and authentication in a Smart Grid
2020
The power grid is a critical infrastructure of a country that needs protection and security. According to the report of the International Energy Agency, the electricity demand is constantly increasing the world over. Countries are moving towards green energy and efforts are being made to integrate these green energy into the main grid. Smart Grid will improve the reliability and efficiency of the grid by managing the energy demand. Cyber-attacks and cyber terrorism is also increasingly targeting the electrical grid. Intruders may try to gain access to the grid by exploiting the vulnerability of the grid. IEDs/devices are the endpoints of the network and they are the weakest link in the enti…
Privacy enhanced mutual authentication in LTE
2013
In this paper we propose a way to enhance the identity privacy in LTE/LTE-Advanced systems. This is achieved while minimizing the impact on the existing E-UTRAN system. This is important since proposals to modify a widely deployed infrastructure must be cost effective, both in terms of design changes and in terms of deployment cost. In our proposal, the user equipment (UE) identifies itself with a dummy identity, consisting only of the mobile nation code and the mobile network code. We use the existing signalling mechanisms in a novel way to request a special encrypted identity information element. This element is protected using identity-based encryption (IBE), with the home network (HPLMN…
A Multi-Expert Based Approach to Continuous Authentication of Mobile-Device Users
2003
Currently used in mobile devices PIN-based user authentication cannot provide a sufficient security level. Methods based on multi-modal user authentication involving biometrics (i.e. physical and behavioral characteristics of a person) may be employed to cope with this problem. However, dealing with physical characteristics only, these methods are either unable to provide continuous and user-friendly identity verification, or are resource consuming.
Using continuous user authentication to detect masqueraders
2003
Nowadays computer and network intrusions have become more common and more complicated, challenging the intrusion detection systems. Also, network traffic has been constantly increasing. As a consequence, the amount of data to be processed by an intrusion detection system has been growing, making it difficult to efficiently detect intrusions online. Proposes an approach for continuous user authentication based on the user’s behaviour, aiming at development of an efficient and portable anomaly intrusion detection system. A prototype of a host‐based intrusion detection system was built. It detects masqueraders by comparing the current user behaviour with his/her stored behavioural model. The m…
A distributed detection and prevention scheme from malicious nodes in vehicular networks
2016
Summary Vehicular environments still remain vulnerable to various potential attacks because of continuous interactions and information exchange between vehicles despite the deployment of authentication techniques by communication standards. Therefore, an authenticated node with a certificate could initiate an attack while complying with implemented protocols. Some mechanisms were proposed to enhance communication technologies, but none of them was able to anticipate nodes' behavior. They also mismanage oscillating vehicles, because they evict them automatically after misbehaving. In this paper, we propose a preventive mechanism, namely, Intrusion Prevention and Detection System (IPDS), able…
Attacks Against the WAP WTLS Protocol
1999
The WAP WTLS protocol was designed to provide privacy, data integrity, and authentication for wireless terminals. The protocol is currently being fielded, and it is expected that the protocol will be contained in millions of devices in a few years.
Fuzzy Fusion in Multimodal Biometric Systems
2007
Multimodal authentication systems represent an emerging trend for information security. These systems could replace conventional mono-modal biometric methods using two or more features for robust biometric authentication tasks. They employ unique combinations of measurable physical characteristics: fingerprint, facial features, iris of the eye, voice print, hand geometry, vein patterns, and so on. Since these traits are hardly imitable by other persons, the aim of these multibiometric systems is to achieve a high reliability to determine or verify person's identity. In this paper a multimodal biometric system using two different fingerprints is proposed. The matching module integrates fuzzy…
Factorial structure of recklessness: To what extent are older drivers different?
2003
This study tests whether the original factorial structure of a recklessness questionnaire can be maintained for the current Spanish population of older drivers.Our recent interest in dedicating special attention to senior citizen mobility (Monterde, 2001), is due to the impending increase of the aging population in Western countries; this has led us to reinitiate the psychometric study of the construct validity, revising and including older drivers in the psychometric aspects of those evaluation instruments that will then be used in the Spanish psycho-medical check of drivers and in research.Factorial analysis was used to determine validity.There was an appearance of a different psychologic…