Authentication is essential for the prevention of various types of attacks in fog/edge computing. So, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there ...
Mayuresh Sunil Pardeshi +2 more
doaj +3 more sources
Identity Authentication of Multi-Modal Fusion Based on Behavioral Footprint [PDF]
Among identity verification methods, the single-mode verification methods rely on single features, and are vulnerable to forged authentication and attacks.To solve the problem, an implicit authentication method of multi-modal feature fusion based on user
LIN Mengqi, ZHANG Xiaomei
doaj +1 more source
BioShare: An Open Framework for Trusted Biometric Authentication under User Control
Generally, biometric authentication is conducted either by mobile terminals in local-processing mode or by public servers in centralized-processing mode.
Quan Sun, Jie Wu, Wenhai Yu
doaj +1 more source
A Secure Two-group Authentication Protocol [PDF]
In order to solve the problem that the authentication cipher security risk of the traditional 1-to-1 and m-to-1 authentication mode is easier to leak,the paper proposes a m-to-n authentication mode,which includes m clients and n authentication servers.m ...
LIU Zhuo,MA Minyao,QIU Ke’e,FENG Jun
doaj +1 more source
Evaluation and Comparison of the Performance of Biometric Recognition [PDF]
For several years, considerable efforts have been made in the field of biometric research. The major interest of this line of research is linked, among other things, to the recognition of the individual because the security needs are becoming ...
Fatima Zohra ALLAM +2 more
doaj
Research and Implementation of Multi-source Account Authentication for High-Performance Computing Environment [PDF]
High-performance computing (HPC) environment provides researchers with high level high-performance computing application services with unified access entrance, unified use method and user technical support through shielding the heterogeneity of job ...
HE Rong, XIAO Haili, WANG Xiaoning, CHI Xuebin
doaj +1 more source
Adaptive Thresholds of EEG Brain Signals for IoT Devices Authentication
In this paper, a new authentication method has been proposed for the Internet of Things (IoT) devices. This method is based on electroencephalography EEG signals, and hand gestures. The proposed EEG signals authentication method used a low price NeuroSky
Abdelghafar R. Elshenaway +1 more
doaj +1 more source
Mobile terminal identity authentication system based on behavioral characteristics
We propose a new type of authentication system based on behavioral characteristics for smartphone users. With the sensor and touch screen data in the smartphone, the combination of the motion state detection mode and the authentication mode can ...
Xiaoshi Liang +3 more
doaj +1 more source
Design of Embedded Low-power Intelligent Key with Function of Radio Frequency Identification [PDF]
For the matching of multiple locks and multiple keys,a low-power intelligent key which is applied to the active authentication with embedded radio frequency identification is designed.The management of multiple locks is realized by means of authorized ...
JIANG Cunbo,KONG Xiangli,JIN Hong,JIAO Yang
doaj +1 more source
Design and Implementation of Blockchain-based Trust Gateway for Power Internet of Things
In order to ensure the cyber security of bulk power system, a distributed dynamic gateway architecture based on blockchain and access authentication mechanism is proposed regarding the vulnerabilities of gateway to cyberattacks in the complex ...
Bingzhen ZHAO +3 more
doaj +1 more source

