• Title/Summary/Keyword: identity verification

Search Result 135, Processing Time 0.027 seconds

Trust Based Authentication and Key Establishment for Secure Routing in WMN

  • Akilarasu, G.;Shalinie, S. Mercy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4661-4676
    • /
    • 2014
  • In Wireless Mesh Networks (WMN), an authentication technique can be compromised due to the distributed network architecture, the broadcast nature of the wireless medium and dynamic network topology. Several vulnerabilities exist in different protocols for WMNs. Hence, in this paper, we propose trust based authentication and key establishment for secure routing in WMN. Initially, a trust model is designed based on Ant Colony Optimization (ACO) to exchange the trust information among the nodes. The routing table is utilized to select the destination nodes, for which the link information is updated and the route verification is performed. Based on the trust model, mutual authentication is applied. When a node moves from one operator to another for accessing the router, inter-authentication will be performed. When a node moves within the operator for accessing the router, then intra-authentication will be performed. During authentication, keys are established using identity based cryptography technique. By simulation results, we show that the proposed technique enhances the packet delivery ratio and resilience with reduced drop and overhead.

Publication Trends and Future Research Directions of Korean Journal of Health Service Management : A Focus on Hospital Management (보건의료산업학회지의 지난 10년간 게재경향 및 향후 연구방향 : 병원관리분야를 중심으로)

  • Choi, Ryoung;Ahn, Sang-Yoon
    • The Korean Journal of Health Service Management
    • /
    • v.13 no.4
    • /
    • pp.9-17
    • /
    • 2019
  • Objectives: The purpose of this study is to explore the developmental direction of the hospital management field that contributes to the academic and practical development of the health care industry and to establish its identity by using the Korean Journal of Health Service Management. Methods: A total of 156 papers were analyzed from April 2007 to December 2018. Frequency analysis and descriptive statistics were performed using SPSS 25.0. Results: The volume of articles published in the hospital management field was decreasing and the ratio was relatively low due to the nature of the journal. The disposition of the papers in the hospital management field excessively focused on the organizational behavior field, and research in the management field that was difficult to access was decreasing. In addition, about 83% of the participants were drawn from hospitals. Conclusions: It is necessary to present guidelines for publication of theses so that a managerial approach can be made rather than an approach to industrial psychological theory verification.

Development and Validation of the Strengths Assessment Indicators for Daycare Centers (어린이집 강점평가지표 개발 및 타당화)

  • Hong, Sung hee;Hwang, Hae-Ik
    • Korean Journal of Childcare and Education
    • /
    • v.14 no.6
    • /
    • pp.143-170
    • /
    • 2018
  • Objective: The purpose of this study was to develop assessment indicators and to verify the validity and reliability of the developed assessment indicators. Methods: A Delphi survey, focus group interviews, and content verification were conducted in order for experts to develop an evaluation index of the strengths of the day care center. A main survey was conducted on 438 daycare center principals and teachers to test their item quality, validity and reliability. Results: The final assessment indicators consisted of three areas, seven assessment criteria, 19 evaluation factors, 41 assessment items and a five-point rubric rating scale. As for the common strengths indicators, there were three assessment areas, five assessment criteria, 12 assessment elements and 22 assessment items. In regard to the selective strengths indicators, there were 3 assessment areas, 5 assessment criteria, 12 assessment elements and 16 assessment items. Conclusion/Implications: The efforts to confirm the strengths of daycare centers are expected to facilitate the identity building of the daycare center itself and for its organizational members to make a contribution to the qualitative improvement of childcare.

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

Implementation of monitoring system for availability of Hyperledger Indy (Hyperledger Indy의 가용성을 위한 모니터링 시스템 구현)

  • Gyu Hyun Choi;Geun Hyung Kim
    • Smart Media Journal
    • /
    • v.12 no.3
    • /
    • pp.60-67
    • /
    • 2023
  • Hyperledger Indy is an open-source implementation of DID, a decentralized identity verification technology. Hyperledger Indy uses the RBFT consensus algorithm, and if there is a lack of consensus with more than a certain number of problem nodes in the pool, data is not added. This problem can be prevented in advance by adding a node, and a node monitoring system was implemented to operate automatically. The node monitoring system continuously checks the status of the pool and automatically adds nodes when there are more than a certain number of problematic nodes to prevent consensus problems from occurring. This proposed method can increase the availability of Hyperledger Indy and is a study that can be referenced in various blockchain services that use consensus algorithms.

Biometric verified authentication of Automatic Teller Machine (ATM)

  • Jayasri Kotti
    • Advances in environmental research
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2023
  • Biometric authentication has become an essential part of modern-day security systems, especially in financial institutions like banks. A face recognition-based ATM is a biometric authentication system, that uses facial recognition technology to verify the identity of bank account holders during ATM transactions. This technology offers a secure and convenient alternative to traditional ATM transactions that rely on PIN numbers for verification. The proposed system captures users' pictures and compares it with the stored image in the bank's database to authenticate the transaction. The technology also offers additional benefits such as reducing the risk of fraud and theft, as well as speeding up the transaction process. However, privacy and data security concerns remain, and it is important for the banking sector to instrument solid security actions to protect customers' personal information. The proposed system consists of two stages: the first stage captures the user's facial image using a camera and performs pre-processing, including face detection and alignment. In the second stage, machine learning algorithms compare the pre-processed image with the stored image in the database. The results demonstrate the feasibility and effectiveness of using face recognition for ATM authentication, which can enhance the security of ATMs and reduce the risk of fraud.

Universal Description of Access Control Systems

  • Karel Burda
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.43-53
    • /
    • 2024
  • Access control systems are used to control the access of people to assets. In practice, assets are either tangible (e.g. goods, cash, etc.) or data. In order to handle tangible assets, a person must physically access the space in which the assets are located (e.g. a room or a building). Access control systems for this case have been known since antiquity and are based either on mechanical locks or on certificates. In the middle of the 20th century, systems based on electromagnetic phenomena appeared. In the second half of the same century, the need to control access to data also arose. And since data can also be accessed via a computer network, it was necessary to control not only the access of persons to areas with data storage, but also to control the electronic communication of persons with these storage facilities. The different types of the above systems have developed separately and more or less independently. This paper provides an overview of the current status of different types of systems, showing that these systems are converging technologically based on the use of electronics, computing and computer communication. Furthermore, the terminology and architecture of these systems is expanded in the article to allow a unified description of these systems. The article also describes the most common types of access control system configurations.

Mediated ID based signature scheme and key updating signature scheme (중재자를 이용한 ID기반 전자서명과 키 업데이팅 전자서명 기법)

  • Ju, Hak-Soo;Kim, Dae-Youb
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.463-470
    • /
    • 2007
  • Revocation is one of the main difficulties faced in implementing Public Key Infrastructures(PHs). Boneh, Ding and Tsudik first introduced a mediated cryptography for obtaining immediate revocation of RSA keys used in PKIs. Their method is based on the idea that each user's private key can be split into two random shares, one of which is given to the user and the other to an online security mediator(SEM). Thus any signature or decryption must be performed as a cooperation between a user and his/her associated SEM and revocation is achieved by instructing the mediator SEM to stop cooperating the user. Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identify based encryption and GDH signature schemes. In this paper we propose a mediated identity based signature(mIBS) with batch verification which apply the SEM architecture to an identity based signature. Libert's GDH siganture scheme is not forward secure even though forward security is an important and desirable feature for signature schemes. We propose an efficient key udating mediated signature scheme, mKUS based on mIBS and analyze its security and efficiency.

Design Program for the Regional Development (지역진흥을 위한 디자인개발 프로그램)

  • 하상오
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.379-388
    • /
    • 2002
  • Since policies of each local government toward regional development have been focusing on only development of the individual applied items such as a character merchandise, co-regional brand, and developing a speciality for the region, the adverse effects of design have been came out. So we carried out this research to minimize the adverse effect of design and also we would like to give the opportunity of thinking of a new way to activate local economy, to create regional identity and to develop local resources by applying the Cl program which have bean used as the way of business improvement coping with the conceptional change of competitiveness with a comprehensive view. Therefore, for design to play an important role in regional development, as standing on the basis of regional development it is necessary to attain the various goals such as activating administrative organization, improving the administrative image, and making the local in go unique. And also it is necessary to develop the communicational strategy as an innovative and expressive program which can consider human network development as an regional resource. To carry out this communicational strategy effectively, in particular, it is not only inevitable to operate the strategic and comprehensive programs promoting the regional development according to the of 6 stages design develop cent program which consists of region's self-verification and self-recognition, self-determination, development of self-innovation, visibility to unify the regional images, creating the design system, and carrying out and verifying the program, but also it is necessary to apply regional development system which can change the regional basic plan, aiming at regional development, into unique regional trait that has an future image by improving the program with constant management and feedback through verifying the design program.

  • PDF

Secure Certificates Duplication Method Among Multiple Devices Based on BLE and TCP (BLE 및 TCP 기반 다중 디바이스 간 안전한 인증서 복사 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.49-58
    • /
    • 2018
  • A certificate is a means to certify users by conducting the identification of the users, the prevention of forgery and alteration, and non-repudiation. Most people use an accredited certificate when they perform a task using online banking, and it is often used for the purpose of proving one's identity in issuing various certificates and making electronic payments in addition to online banking. At this time, the issued certificate exists in a file form on the disk, and it is possible to use the certificate issued in an existing device in a new device only if one copies it from the existing device. However, most certificate duplication methods are a method of duplication, entering an 8-16 digit verification code. This is inconvenient because one should enter the verification code and has a weakness that it is vulnerable to security issues. To solve this weakness, this study proposes a method for enhancing security certificate duplication in a multi-channel using TCP and BLE. The proposed method: 1) shares data can be mutually authenticated, using BLE Advertising data; and 2) encrypts the certificate with a symmetric key algorithm and delivers it after the certification of the device through an ECC-based electronic signature algorithm. As a result of the implementation of the proposed method in a mobile environment, it could defend against sniffing attacks, the area of security vulnerabilities in the existing methods and it was proven that it could increase security strength about $10^{41}$ times in an attempt of decoding through the method of substitution of brute force attack existing method.