Loading [MathJax]/extensions/MathMenu.js
IEEE Xplore Search Results

Showing 1-25 of 1,560 resultsfor

Filter Results

Show

Results

Ensuring the security of systems is paramount in safeguarding confidential information from unauthorized access, particularly in today's interconnected digital landscape. Visual eavesdropping techniques, such as “Shoulder Surfing,” pose significant threats to security, including unauthorized access, data breaches, and identity theft, whereby sensitive information is illicitly obtained during user ...Show More
work proposes a two-factor authentication method by integrating the second factor into the authentication service in system with a centralized user's database. This approach made it possible to achieve the universality of the process and reduce the authentication time. In this case, the compromise of the first factor becomes inexpedient. Simulation showed that the rest of the authentication parame...Show More
Access to Internet services and home services demand proper authentication due to the increase of threats in the Internet. Passwords are not sufficiently strong while stronger authentication schemes are quite often expensive and complicated. This paper proposes a strong authentication scheme called Dual SIM authentication which makes use of two identical (u)SIMs in the authentication of the user u...Show More
An intelligent model is proposed to automate selection of login authentication method in a multi-model authentication system based on user behavior profile. The proposed protocol analyzes the user behavior data to minimize the process in real time and prevent untrusted attempt, meanwhile, it able to facilitate frictionless user experience in a multi-modal authentication system. The proposed system...Show More
In order to improve the data communication security of the channel between the tag and the reader of Radio Frequency Identification (RFID) technology, this article designs a mutual security authentication protocol aiming at illegal access, tracking, wiretap and other attack technologies. The Protocol adopts SM4 encryption algorithm to encrypt communication data, and the communication data contain ...Show More
The traditional two-factor authentication (2FA) methods primarily rely on the user manually entering a code or token during the authentication process. This can be burdensome and time-consuming, particularly for users who must be authenticated frequently. To tackle this challenge, we present a novel 2FA approach replacing the user’s input with decisions made by Machine Learning (ML) that continuou...Show More
UAS identification and authentication is the starting point for UAV and UTM security. In this paper, we propose a structure for UAS identification and mutual authentication in oneM2M IoT platform. On this platform, the UAS is an IoT device and uses a security module called DIM to provide security. The UTM server also provides security by using the authentication server, which is an application run...Show More
Edge computing proposes to solve the problems such as high bandwidth load and long delays when a great number of terminal devices connect to the IoT. However, the addition of the edge layer also poses new challenges to authentication security between devices at all levels of the IoT. The characteristics and communication requirements of cloud, edge, and terminal devices in the edge computing envir...Show More
In order to solve the problem that the power terminal cross-domain authentication system is not compatible with the existing authentication system, this paper designs a cross-domain authentication model for power terminals based on master-slave Blockchain, including ubiquitous sensing module, cross-domain authentication module and grid application system module, original authentication system modu...Show More

USIM in 5G Era

Journal of ICT Standardization
Year: 2020 | Volume: 8, Issue: 1 | Journal Article |
Cited by: Papers (2)
If you ask anybody what is the name of the card inside his mobile phone, he will for sure answer SIM card, without knowing it is an acronym for Subscriber Identity Module. But, what about the USIM (Universal Subscriber Identity Module)? The USIM plays a key role in the mobile telecommunication services since it brings a host of fundamental features that are now perfected for 5G. This paper gives a...Show More

USIM in 5G Era

Year: 2020 | Volume: 8, Issue: 1 | Journal Article |
In this paper, an initiative passive continuous authentication (CA) system based on both hard and soft biometrics is presented. Human facial features are used as hard biometric information for the authentication process, and the clothes' color of a user is employed as the soft biometric information. The passive CA system keeps verifying, without interrupting the user from concentrating on his work...Show More
Over the years, various mobile communication technologies have been developed and operated simultaneously, which made the mobile communication networks evolved from single-mode access to complex heterogeneous integration. The current 5 G has already accommodated diverse terminals through multiple access paths, but the upcoming 6 G ambitiously aims to achieve ubiquitous connectivity through space-a...Show More
Nowadays women safety is becoming major issue while they are on travel. Global Positioning System (GPS) is incorporated in vehicle for tracking to ensure safety travel but a perfect monitoring mechanism is lacking in the present day scenario, which leads to issues like abducting the girl child/women, kidnapping the children and demanding for money etc. The mechanism currently working uses manual m...Show More
The identity authentication scheme based on symmetrical algorithm in 3G communication, cannot satisfy a high level of security demand of Beyond 3G (B3G). We propose an identity authentication scheme based on the PIN code, fingerprint characteristics and universal subscriber identity module (USIM) card. This solution makes full use of RSA's cryptosystem and hash algorithm, realized mutual identity ...Show More
Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish between genuine and fake. Thus, it is important to mutually authenticate each other. The mutual authentication between two entities is essential to establish a secure link over public/...Show More
The RFID is one of the most important technique in ubiquitous for low power, lightweight features and needs fast and safe authentication scheme for security. The existing scheme has heavy load between tag and reader communication and it is hard to give efficient security to the authentication scheme with low cost. This paper proposes a new type of fast and lightweight authentication module that ha...Show More
Despite well-defined and commercially viable security standards for WiMAX networks, vulnerability in current system design and other inherent characteristics expose the network to various types of security attacks. These attacks are commonly related to network access security, authentication of users, validation of data transmission, and confidentiality issues. In order to provide better protectio...Show More
Verifying the user identity of wearable devices is crucial for system security, especially before sensitive operations like making financial payments. A PPG-based two-factor authentication can be a promising solution with widely deployed PPG (Photoplethysmography) sensors within wearable devices. Our observations find PPG readings reveal a significant relevance to the user’s hand motions, i.e., ge...Show More
Identity authentication is an important component of the security application system to access the available resources. To improve performance of Identification authentication, this paper presents a novel authentication scheme, which collects human body odour using gas sensor arrays, then detects and analyzes human body odour by Gas Chromatography & Mass Spectrometry, Principle Component Analysis,...Show More
Designed and implemented a dual-factor authentication file encryption system based on smart-phone, analyzed the security of file encryption system and combined dual-factor authentication technology. Via the mutual approval between Bluetooth as well as application-specific communication protocol and the computer, the system used the smart-phone as a hardware encryption key to set up a file cabinet ...Show More
Network security problems still exist when IPv4 transfers to IPv6. The current Email framework neither authenticates the sender nor traces the source of the mail, so even find a spam, the method is just to reject the mail or insert the mail source into “blacklist”, and both of these methods can't deracinate the generation of spam. For this reason, this paper designs secure email system based on tr...Show More
In this paper the feasibility of having an authentication system based on user's behaviour is studied. The approach used is based on psychological mechanisms of authentication which are a subset of a broader class of biometric mechanisms. This project implemented a 3D graphical maze that a user has to navigate through. The user is authenticated based on information collected from their behaviour i...Show More
Biometric authentication, which uses body parts as a password, does not require memorization and is widely used owing to its excellent level of security. However, when a vulnerability is found in each method, a complementary authentication method is required. Therefore, this study proposes a personal authentication method using an electromyogram (EMG). Electromyogram data were acquired using an EM...Show More
Cloud computing provides several benefits to developers, service providers and consumers with respect to scalability, flexibility and availability at inexpensive cost. On the other hand, security is the main concern for cloud computing, particularlyoutsourced data. We focus on a stand-out segment to protectoutsourced of cloud data, which poses various new securitychallenges that need to be address...Show More
In response to the increased deployment of IoT devices in homes and offices during and after the COVID-19 pandemic-a time when such devices are susceptible to physical and cyber threats-this study explores a mutual authentication protocol leveraging Elliptic Curve Cryptography and a hardware security module named Zymkey. This compact module integrates with Raspberry Pi and enhances security throug...Show More