Context in source publication

Context 1
... android group and sensors group are denoted as a group 1 and as group 2 respectively shown in Fig. ...

Similar publications

Article
Full-text available
Language teacher education (LTE) is a dynamic field which needs to keep abreast of the changes in other fields and the teacher-oriented developments. In the 21st century, teacher education is required to meet the expectations of the pre-/in-service teachers, the learners, the technology, and the changing qualifications. In this sense, it is fundame...

Citations

... As such, it is possible to apply these findings to the WACI protocol [17] for the selective disclosure of VCs. However, the studies [32][33][34] that have explored decentralized authentication in IoT environments have not taken anonymity into consideration. ...
Article
Full-text available
In digital identity authentication, credentials are typically stored in a digital wallet and authenticated through a single key-based signature and public key verification. However, ensuring compatibility between systems and credentials can be challenging and the existing architecture can create a single point of failure, which can hinder system stability and prevent data interchange. To address this problem, we propose a multiparty distributed signature structure using FROST, a Schnorr signature-based threshold signature algorithm, applied to the WACI protocol framework for credential interaction. This approach eliminates a single point of failure and secures the signer's anonymity. Additionally, by following standard interoperability protocol procedures, we can ensure interoperability during the exchange of digital wallets and credentials. This paper presents a method that combines a multiparty distributed signature algorithm and an interoperability protocol, and discusses the implementation results.
... The use of biometrics in group-based authentication and key agreement heightens the security level. Adhikari et al. [85] proposed a group-based authentication and key agreement protocol, which creates two groups among devices based on the device type and uses biometric authentication to enhance network security. Security analysis substantiates the security requirements (e.g., preservation, confidentiality, and mutual authentication) attained by the proposed protocol. ...
Article
Full-text available
The large number of Internet-of-Things (IoT) devices that need interaction between smart devices and consumers makes security critical to an IoT environment. Biometrics offers an interesting window of opportunity to improve the usability and security of IoT and can play a significant role in securing a wide range of emerging IoT devices to address security challenges. The purpose of this review is to provide a comprehensive survey on the current biometrics research in IoT security, especially focusing on two important aspects, authentication and encryption. Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the system. As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. Moreover, challenges arising from applying biometrics to IoT and potential solutions are identified and analyzed. With an insight into the state-of-the-art research in biometrics for IoT security, this review paper helps advance the study in the field and assists researchers in gaining a good understanding of forward-looking issues and future research directions.
Article
Full-text available
The article addresses the issue of current and critical protections for applications for 4G and 5G mobile phones. The objective of the article is to provide an overview of the threats to 4G and 5G mobile communication networks and to analyze the variables used in conjunction with core and security methods. The research work uses a review of the literature to provide an overview of the threats to 4G and 5G mobile communication networks. The research also analyzed the variables used in conjunction with core and security methods. The research presents an overview of the threats to 4G and 5G mobile communication networks, including privacy attacks, behavioral attacks, space attacks, and authentication attacks. The authors also provide an overview of three types of cases, including road signs, officers, and road signs. The analysis of variables used in conjunction with core and security methods is unclear, often summarizing security. The authors conclude that there is a need for improved protections for applications for 4G and 5G mobile phones. They also suggest that further research is needed to better understand the variables used in conjunction with core and security methods.
Article
Key agreement and authentication are the most significant phases in LTE systems since many malicious attacks may occur in these systems. For this reason, the LTE system employs standard EPS-AKA protocol to provide security of the communication system. However, the LTE system still suffers from different security threats such as Impersonation, DoS, MitM, and Replay attacks. In this paper, a Robust Authentication and Key Agreement protocol (REPS-AKA3) has been suggested to resolve the security issues in LTE systems. The proposed REPS-AKA3 combines the Public Key Infrastructure, symmetric key Infrastructure, and full mutual authentication between all network nodes. First, we propose an efficient AKA protocol to enable mutual authentication between the users (i.e., UE) and the LTE network (i.e., MME and HSS nodes). Then, we present a secure procedure to enable key agreement in NAS and AS layers properly. Finally, we suggest a secure and fast re-Authentication procedure to reduce the AKA latency in the next attach. Thus, the REPS-AKA3 method provides the security goals (i.e., strong mutual authentication, and adequate confidentiality) in AS and NAS layers appropriately. Formal verification of the proposed REPS-AKA3 protocol is checked and validated using the AVISPA tool. The evaluation results illustrate that the REPS-AKA3 can achieve all the security goals, and it is secure against different malicious attacks. In addition, the performance analysis of the REPS-AKA3 scheme is compared with other AKA schemes, including the standards EPS-AKA protocol. The performance results indicate that the REPS-AKA3 method improves the network performance in terms of bandwidth consumption, computational cost, and storage overhead parameters. Consequently, the suggested protocol can be a trustable and efficient candidate for AKA protocols in LTE networks.
Article
Authentication is especially significant in IoT since the identity of the connected object needs to be verified before carrying out interaction processes with the various IoT data. The involvement of data has raised the concern about the risk of secure data sharing, which becomes a huge challenge when deploying IoT applications into real applications. In this paper, we present a time-bounded secure attribute-based online/offline signature with constant message size (TS-ABOS-CMS). Our scheme achieves high efficiency by introducing online/offline signing method and maintaining the communication overheads at a constant level. In addition, we adopt the key refreshing mechanism to provide time-bounded security protections for IoT terminals. We design the concrete algorithms of TS-ABOS-CMS and present its security proof. By performance assessment in terms of theoretical analysis and experiments on hardware, our TS-ABOS-CMS is demonstrated to be equipped with beneficial efficacy and appropriate to be deployed for data authentication in IoT scenarios.