This paper analyzes the various authentication systems implemented for enhanced security and private reposition
of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA) systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients with private resources over the OAuth protocol framework and a study of the delegation based authentication system in IP-based IoT.
One time password(OTP) is the
authentication method used in online banking system today.
Hackers are getting better each day at cracking sensitive
information. Once this happened, they can gain access to our
private network and steal our sensitive business information. A
common technology used for the delivery of OTPs is text
messaging.OTP over SMS might not be encrypted by any serviceprovider.
In addition, the cell phones which is used to receive the
SMS also play an important role, in which more than one phone
comes into account. The vulnerable parts of the cell phone
network can be mount to man-in-the-middle attack[13]. To
overcome the difficulties the virtual password concept is
introduced. The virtual password concept involves a small
amount of human computing to secure user’s passwords in online
environments. To provide high security, we enhance the
existing system with virtualization concept [1]. Hacker may guess
our password but he cannot access our account because he
cannot access virtual password. The major hacking threats like
phishing, key-logger, shoulder-surfing attacks, and multiple
attacks cannot affect our schema. In user-specified functions, we
adopted secret little functions in which security is enhanced.
Virtual password is a password that is valid for only one login
session or transaction and after that it becomes obsolete [12]. The
calculation of the virtual password is done at the client side which
reduces the delay of time in receiving OTP via SMS. To make the
client more convenient in calculating the virtual password an
application is used which reduces the work of the client. This
method is more instant than the traditional OTP system used
today.
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
Any secured system requires one or more logging policies to make that system safe. Static
passwords alone cannot be furthermore enough for securing systems, even with strong passwords illegal
intrusions occur or it suffers the risk of forgotten. Authentication using many levels (factors) might
complicate the steps when intruders try to reach system resources. Any person to be authorized for
logging-in a secured system must provide some predefined data or present some entities that identify
his/her authority. Predefined information between the client and the system help to get more secure level
of logging-in. In this paper, the user that aims to log-in to a secured system must provide a recognized
RFID card with a mobile number, which is available in the secured systems database, then the secured
system with a simple algorithm generates a One-time Password that is sent via GSM Arduino compatible
shield to the user announcing him/her as an authorized person.
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARINGijcsit
As ATM applications deploy for a banking system, th
e need to secure communications will become critica
l.
However, multicast protocols do not fit the point-t
o-point model of most network security protocols wh
ich
were designed with unicast communications in mind.
In recent years, we have seen the emergence and the
growing of ATMs (Automatic Teller Machines) in bank
ing systems. Many banks are extending their activit
y
and increasing transactions by using ATMs. ATM will
allow them to reach more customers in a cost
effective way and to make their transactions fast a
nd efficient. However, communicating in the network
must satisfy integrity, privacy, confidentiality, a
uthentication and non-repudiation. Many frameworks
have
been implemented to provide security in communicati
on and transactions. In this paper, we analyze ATM
communication protocol and propose a novel framewor
k for ATM systems that allows entities communicate
in a secure way without using a lot of storage. We
describe the architecture and operation of SFAMSS i
n
detail. Our framework is implemented with Java and
the software architecture, and its components are
studied in detailed.
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
It is understood by studies that wireless data services is crucial for users to access locationbased services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the Location Based Services includes the services to identify the location of a person or object like searching of the nearest Banking, Cash Machine Receiving Alerts, Location Based Advertising etc. With the rapid adoption of mobile devices as a primary interface to network of services, there is a considerable risk with respect to authentication and authorization. To guard against risk, trustworthy authentication and secure communication are essential especially in Location Based Services. The purpose of this study is to identify security risks in mobile transactions specially in location based services like mobile banking. Current mobile banking authentication is challenging and identified as a major security risk. Identify the factors why customer distrusts mobile banking. Furthermore, identifying security issues between mobile devices and mobile banking systems. Finding which approach is more suitable and secure for mobile banking transaction between customer and bank.
One time password(OTP) is the
authentication method used in online banking system today.
Hackers are getting better each day at cracking sensitive
information. Once this happened, they can gain access to our
private network and steal our sensitive business information. A
common technology used for the delivery of OTPs is text
messaging.OTP over SMS might not be encrypted by any serviceprovider.
In addition, the cell phones which is used to receive the
SMS also play an important role, in which more than one phone
comes into account. The vulnerable parts of the cell phone
network can be mount to man-in-the-middle attack[13]. To
overcome the difficulties the virtual password concept is
introduced. The virtual password concept involves a small
amount of human computing to secure user’s passwords in online
environments. To provide high security, we enhance the
existing system with virtualization concept [1]. Hacker may guess
our password but he cannot access our account because he
cannot access virtual password. The major hacking threats like
phishing, key-logger, shoulder-surfing attacks, and multiple
attacks cannot affect our schema. In user-specified functions, we
adopted secret little functions in which security is enhanced.
Virtual password is a password that is valid for only one login
session or transaction and after that it becomes obsolete [12]. The
calculation of the virtual password is done at the client side which
reduces the delay of time in receiving OTP via SMS. To make the
client more convenient in calculating the virtual password an
application is used which reduces the work of the client. This
method is more instant than the traditional OTP system used
today.
Secure Code Generation for Multi-level Mutual AuthenticationTELKOMNIKA JOURNAL
Any secured system requires one or more logging policies to make that system safe. Static
passwords alone cannot be furthermore enough for securing systems, even with strong passwords illegal
intrusions occur or it suffers the risk of forgotten. Authentication using many levels (factors) might
complicate the steps when intruders try to reach system resources. Any person to be authorized for
logging-in a secured system must provide some predefined data or present some entities that identify
his/her authority. Predefined information between the client and the system help to get more secure level
of logging-in. In this paper, the user that aims to log-in to a secured system must provide a recognized
RFID card with a mobile number, which is available in the secured systems database, then the secured
system with a simple algorithm generates a One-time Password that is sent via GSM Arduino compatible
shield to the user announcing him/her as an authorized person.
SFAMSS:A S ECURE F RAMEWORK F OR ATM M ACHINES V IA S ECRET S HARINGijcsit
As ATM applications deploy for a banking system, th
e need to secure communications will become critica
l.
However, multicast protocols do not fit the point-t
o-point model of most network security protocols wh
ich
were designed with unicast communications in mind.
In recent years, we have seen the emergence and the
growing of ATMs (Automatic Teller Machines) in bank
ing systems. Many banks are extending their activit
y
and increasing transactions by using ATMs. ATM will
allow them to reach more customers in a cost
effective way and to make their transactions fast a
nd efficient. However, communicating in the network
must satisfy integrity, privacy, confidentiality, a
uthentication and non-repudiation. Many frameworks
have
been implemented to provide security in communicati
on and transactions. In this paper, we analyze ATM
communication protocol and propose a novel framewor
k for ATM systems that allows entities communicate
in a secure way without using a lot of storage. We
describe the architecture and operation of SFAMSS i
n
detail. Our framework is implemented with Java and
the software architecture, and its components are
studied in detailed.
Location Based Services in M-Commerce: Customer Trust and Transaction Securit...CSCJournals
It is understood by studies that wireless data services is crucial for users to access locationbased services. As in location-dependent services, the data value for a data item depends on geographical locations. In general, the Location Based Services includes the services to identify the location of a person or object like searching of the nearest Banking, Cash Machine Receiving Alerts, Location Based Advertising etc. With the rapid adoption of mobile devices as a primary interface to network of services, there is a considerable risk with respect to authentication and authorization. To guard against risk, trustworthy authentication and secure communication are essential especially in Location Based Services. The purpose of this study is to identify security risks in mobile transactions specially in location based services like mobile banking. Current mobile banking authentication is challenging and identified as a major security risk. Identify the factors why customer distrusts mobile banking. Furthermore, identifying security issues between mobile devices and mobile banking systems. Finding which approach is more suitable and secure for mobile banking transaction between customer and bank.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A secure communication in smart phones using two factor authenticationseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use.
Token-based Single Sign-on with JWT as Information System Dashboard for Gover...TELKOMNIKA JOURNAL
Various web-based information systems are developed by Indonesian government to improve quality of services for their society. It encourages users, generally civil servants, to perform different authentications on used information systems and have to remember credentials. Account management of the users poses another challenge for administrators. Single Sign-On (SSO) can be the solution by providing a service of centralized authentication and user account management. This study applies a token-based SSO architecture and uses Json Web Token (JWT) to grant permission authorities, since JWT can provide a claim process between 2 parties. Additionally, the built-in dashboard lists associated information systems to facilitate accessing for the authenticated users. This study will discuss JWT implementation on the dashboard of government information systems that implements SSO, which will generate the permission authorities securely for connected information systems on SSO.
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
Abstract A distributed computer networks could be a special form of the network that facilitates the purchasers to use completely different network services that is provided by the service suppliers. Within the distributed computer networks, user verification is a crucial method for the protection. Within the verification, the choice is taken whether the user is legal or not and then enabled the users to access the service. In general users are using multiple usernames and passwords for to access different applications on a distributed computer network. This increase the burden of the user and organization administrator as each and every account of the organization is going to be handled with their explicit username and credential. A new certification plan that is named as single sign-on mechanism that facilitates the users with one identity token to be verified by multiple service suppliers. Single sign-on is one of user authentication method that allows a user to enter one name and identity token so as to access multiple applications. The method authenticates the user for all the applications they have been offered access to and eliminates additional prompts after they switch applications throughout a specific session. However, existing approaches which are utilizing single sign-on scheme have some drawbacks relating to security needs. Thus, through this paper, we will discuss regarding the event of security from earlier stage to present stage. And clearly discuss regarding the authentication steps between user and service supplier. Keywords — single sign-on, authentication token , mutual authentication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The E-commerce environment allows companies such as Amazon, EBay, PayPal, financial institutions, and other e-commerce companies alike to allocate services to the consumer over the Internet resulting in the luxury of consumers not visiting a physical store. However, with that luxury also welcomes the risk of threats such as hackers and their various attacks on e-commerce sites and its consumers. To mitigate such risks, adequate security tools are implemented by companies to protect consumers from being victims of identity theft. However, some of the security tools implemented can have limitations in regards to protecting the required assets. In addition, companies offering e-commerce services should invest in additional security controls to implement into their network infrastructure to ensure a safe online environment for their consumers.
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
This paper is demonstrating to create a system of multifactor authentication based on biometric verification. Our system use iris for the first factor and fingerprint for the second factor. nce an attacker attempts to attack the system, there must have two factors. If one of them is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Furthermore, this system will be implemented to enhance security for accessing control login government system.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
A secure communication in smart phones using two factor authenticationseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use.
Token-based Single Sign-on with JWT as Information System Dashboard for Gover...TELKOMNIKA JOURNAL
Various web-based information systems are developed by Indonesian government to improve quality of services for their society. It encourages users, generally civil servants, to perform different authentications on used information systems and have to remember credentials. Account management of the users poses another challenge for administrators. Single Sign-On (SSO) can be the solution by providing a service of centralized authentication and user account management. This study applies a token-based SSO architecture and uses Json Web Token (JWT) to grant permission authorities, since JWT can provide a claim process between 2 parties. Additionally, the built-in dashboard lists associated information systems to facilitate accessing for the authenticated users. This study will discuss JWT implementation on the dashboard of government information systems that implements SSO, which will generate the permission authorities securely for connected information systems on SSO.
Advanced mechanism for single sign on for distributed computer networkseSAT Journals
Abstract A distributed computer networks could be a special form of the network that facilitates the purchasers to use completely different network services that is provided by the service suppliers. Within the distributed computer networks, user verification is a crucial method for the protection. Within the verification, the choice is taken whether the user is legal or not and then enabled the users to access the service. In general users are using multiple usernames and passwords for to access different applications on a distributed computer network. This increase the burden of the user and organization administrator as each and every account of the organization is going to be handled with their explicit username and credential. A new certification plan that is named as single sign-on mechanism that facilitates the users with one identity token to be verified by multiple service suppliers. Single sign-on is one of user authentication method that allows a user to enter one name and identity token so as to access multiple applications. The method authenticates the user for all the applications they have been offered access to and eliminates additional prompts after they switch applications throughout a specific session. However, existing approaches which are utilizing single sign-on scheme have some drawbacks relating to security needs. Thus, through this paper, we will discuss regarding the event of security from earlier stage to present stage. And clearly discuss regarding the authentication steps between user and service supplier. Keywords — single sign-on, authentication token , mutual authentication
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
The E-commerce environment allows companies such as Amazon, EBay, PayPal, financial institutions, and other e-commerce companies alike to allocate services to the consumer over the Internet resulting in the luxury of consumers not visiting a physical store. However, with that luxury also welcomes the risk of threats such as hackers and their various attacks on e-commerce sites and its consumers. To mitigate such risks, adequate security tools are implemented by companies to protect consumers from being victims of identity theft. However, some of the security tools implemented can have limitations in regards to protecting the required assets. In addition, companies offering e-commerce services should invest in additional security controls to implement into their network infrastructure to ensure a safe online environment for their consumers.
AN ENHANCED SECURITY FOR GOVERNMENT BASE ON MULTIFACTOR BIOMETRIC AUTHENTICATIONIJCNCJournal
This paper is demonstrating to create a system of multifactor authentication based on biometric verification. Our system use iris for the first factor and fingerprint for the second factor. nce an attacker attempts to attack the system, there must have two factors. If one of them is compromised or broken, the attacker still has at least one more barrier to breach before successfully breaking into the target. Furthermore, this system will be implemented to enhance security for accessing control login government system.
Secured QR Code Authentication System
Two Way Encryption used to Enhance the security for QR Code. With Banking Application and Shopping Cart
Project by Pankaj Jeswani | Vishal Chhabria | Sagar Chawla
Under the guidance of Naveen Vaswani Sir
A secure communication in smart phones using two factor authenticationeSAT Journals
Abstract Most secure systems face security attacks mainly at the client side. Two Factor Authentication (TFA) provides improved protection to the system at the client side by prompting to provide something they know and something they have. This system uses a one time password(OTP) generation method which doesn’t require client-server communication, which frees the system from cost of sending a dynamic password each time the client wants to login. The OTP generation uses the factors that are unique to the user and is installed on a smart phone in Android platform owned by the user. An OTP is valid for a minutes time, after which, is useless. The system thus provides better client level security – a simple low cost method which protects system from hacking techniques like key logging, phishing, shoulder surfing, etc. Keywords—Authentication, OTP, key logging, phishing
Efficient and Secure Single Sign on Mechanism for Distributed NetworkIJERA Editor
Distributed network act as core part to access the various services which are available in the network. But the security related to distributed network is main concern. In this paper single sign-on SSO mechanism is introduced which gives access to all services by allowing to sign on only once by users. In this mechanism once user logs in to the Trusted Authority Center TAC then application or services which are register to trusted center will automatically verifies the user’s credentials details and these credentials like password or digital signature will be only one for all applications or services. Unlike all other previous mechanisms where in, if user wants to have access multiple services then for every service distinct user credentials (username, password) must be required. SSO act as single authentication window to user for admittance multiple service providers in networks. Previously introduced technique based SSO technology proved to be secure over well-designed SSO system, but fails to provide security during communication. So here emphasis is given on authentication as open problem and on to refining the already proposed SSO process. And to do this along with RSA algorithm which was used in previous SSO process, we will be using MAC algorithm, which is intended to provide secured pathway for communication over distributed network.TAC i.e. Trusted Authority Center is used for sending token integrated with private and shared public key to user.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that
most of business activities need payment system. As E-commerce requires an efficient payment system
which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET,
SSL protocols for encrypting e-payment information. It also presented several methods to take under
consideration to avoid fraud and keep our site safe.
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
E-commerce is trading ofproducts or services using computer and Internet. It mainly revolves around
the Internet for it‟s functioning. Virtual mall, buying selling websites or domains, providing secure business
transactions, collection and use of demographic data comes under e- commerce. E-commerce security is an
important part for the framework and it is applied to the components that affect the vendor and the end user
through their daily payment and interaction with business. Since it involves various transactions, E-commerce
offers the banking industry a great opportunity but it also creates various risks and security threats. We can say
in the near future people would like to carry their transactions though mobile devices instead of carrying
currency in their wallets. Due to this the security of sensitive customer information is necessary. Thereare many
security protocols and algorithms used in securing credit card transactions over the Internet and we will discuss
and analyze the major ones.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
The main incentive for the use of electronic commerce (E-commerce) and spread on a large scale is that most of business activities need payment system. As E-commerce requires an efficient payment system which is stable and secure for supporting electronically commerce. This paper proposed to enforce SET, SSL protocols for encrypting e-payment information. It also presented several methods to take under consideration to avoid fraud and keep our site safe.
Improving System Security and User Privacy in Secure Electronic Transaction (...IJERA Editor
With the advancement of internets, user’s transaction is at ease, timely manner and effective wise through online payment method, so also cybercriminals become increasingly more prompt in areas like e-commerce sites, financial institutions, payment processes and other online transactions. Therefore the need for the system security and privacy became the central issues for the acceptance of online payment methods in particular and growth of the Internet market in general. Using SET as an open encryption and security specification designed to protect credit card transaction on the internet. This paper proposes a new approach for increasing security by avoiding privacy violation using Public Key Infrastructure, X.509 certificate and Format Preservation encryption method, the credit card number is encrypted using public key algorithm and re-encrypted using Format preservation Encryption algorithm and finally stored in the X.509 version 3 certificate private extensions. This technique can be used to improve the security of the user credit card information against card fraud or the compromise of data associated with the account.
Security is one of the most important concerns of the IoT deployment. US20150106616 illustrates the system that can provide secure and efficient communications between the IoT devices and back-end systems (e.g., cloud servers) through the Internet Protocol networks exploiting the established PKI techniques and algorithms such as public keys and private keys.
FinTech (Financial Technology) refers to exploiting technologies (e.g. mobile devices, internet/web technologies) for providing innovative financial services. Some examples of FinTech are money transfer/digital currency, payments/billing system and P2P lending/cloud funding system. The technology/service developments of FinTech can be protected by either software patents or business method patents. Following patents illustrate some examples of the technology/service developments of FinTech. The internet connected IoT devices combined with FinTech can provide diverse value added financial services. Some examples are secured smart transactions, smart POS systems and personalized banking service. Following patents illustrate some examples of the technology/service developments of IoT/FinTech.
Similar to Authentication Systems in Internet of Things (20)
Content-Based Image Retrieval (CBIR) systems have been used for the searching of relevant images in various research areas. In CBIR systems features such as shape, texture and color are used. The extraction of features is the main step on which the retrieval results depend. Color features in CBIR are used as in the color histogram, color moments, conventional color correlogram and color histogram. Color space selection is used to represent the information of color of the pixels of the query image. The shape is the basic characteristic of segmented regions of an image. Different methods are introduced for better retrieval using different shape representation techniques; earlier the global shape representations were used but with time moved towards local shape representations. The local shape is more related to the expressing of result instead of the method. Local shape features may be derived from the texture properties and the color derivatives. Texture features have been used for images of documents, segmentation-based recognition,and satellite images. Texture features are used in different CBIR systems along with color, shape, geometrical structure and sift features.
The cyber attacks have become most prevalent in the past few years. During this time, attackers have discovered new vulnerabilities to carry out malicious activities on the internet. Both the clients and the servers have been victimized by the attackers. Clickjacking is one of the attacks that have been adopted by the attackers to deceive the innocuous internet users to initiate some action. Clickjacking attack exploits one of the vulnerabilities existing in the web applications. This attack uses a technique that allows cross domain attacks with the help of userinitiated clicks and performs unintended actions. This paper traces out the vulnerabilities that make a website vulnerable to clickjacking attack and proposes a solution for the same.
Performance Analysis of Audio and Video Synchronization using Spreaded Code D...Eswar Publications
The audio and video synchronization plays an important role in speech recognition and multimedia communication. The audio-video sync is a quite significant problem in live video conferencing. It is due to use of various hardware components which introduces variable delay and software environments. The objective of the synchronization is used to preserve the temporal alignment between the audio and video signals. This paper proposes the audio-video synchronization using spreading codes delay measurement technique. The performance of the proposed method made on home database and achieves 99% synchronization efficiency. The audio-visual
signature technique provides a significant reduction in audio-video sync problems and the performance analysis of audio and video synchronization in an effective way. This paper also implements an audio- video synchronizer and analyses its performance in an efficient manner by synchronization efficiency, audio-video time drift and audio-video delay parameters. The simulation result is carried out using mat lab simulation tools and simulink. It is automatically estimating and correcting the timing relationship between the audio and video signals and maintaining the Quality of Service.
Due to the availability of complicated devices in industry, models for consumers at lower cost of resources are developed. Home Automation systems have been developed by several researchers. The limitations of home automation includes complexity in architecture, higher costs of the equipment, interface inflexibility. In this paper as we have proposed, the working protocol of PIC 16F72 technology is which is secure, cost efficient, flexible that leads to the development of efficient home automation systems. The system is operational to control various home appliances like fans, Bulbs, Tube light. The following paper describes about components used and working of all components connected. The home automation system makes use of Android app entitled “Home App” which gives
flexibility and easy to use GUI.
Semantically Enchanced Personalised Adaptive E-Learning for General and Dysle...Eswar Publications
E-learning plays an important role in providing required and well formed knowledge to a learner. The medium of e- learning has achieved advancement in various fields such as adaptive e-learning systems. The need for enhancing e-learning semantically can enhance the retrieval and adaptability of the learning curriculum. This paper provides a semantically enhanced module based e-learning for computer science programme on a learnercentric perspective. The learners are categorized based on their proficiency for providing personalized learning environment for users. Learning disorders on the platform of e-learning still require lots of research. Therefore, this paper also provides a personalized assessment theoretical model for alphabet learning with learning objects for
children’s who face dyslexia.
Agriculture plays an important role in the economy of our country. Over 58 percent of the rural households depend on the agriculture sector as their means of livelihood. Agriculture is one of the major contributors to Gross Domestic Product(GDP). Seeds are the soul of agriculture. This application helps in reducing the time for the researchers as well as farmers to know the seedling parameters. The application helps the farmers to know about the percentage of seedlings that will grow and it is very essential in estimating the yield of that particular crop. Manual calculation may lead to some error, to minimize that error, the developed app is used. The scientist and farmers require the app to know about the physiological seed quality parameters and to take decisions regarding their farming activities. In this article a desktop app for seed germination percentage and vigour index calculation are developed in PHP scripting language.
What happens when adaptive video streaming players compete in time-varying ba...Eswar Publications
Competition among adaptive video streaming players severely diminishes user-QoE. When players compete at a bottleneck link many do not obtain adequate resources. This imbalance eventually causes ill effects such as screen flickering and video stalling. There have been many attempts in recent years to overcome some of these problems. However, added to the competition at the bottleneck link there is also the possibility of varying network bandwidth which can make the situation even worse. This work focuses on such a situation. It evaluates current heuristic adaptive video players at a bottleneck link with time-varying bandwidth conditions. Experimental setup includes the TAPAS player and emulated network conditions. The results show PANDA outperforms FESTIVE, ELASTIC and the Conventional players.
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection SystemEswar Publications
Security and Performance aspects of cloud computing are the major issues which have to be tended to in Cloud Computing. Intrusion is one such basic and imperative security problem for Cloud Computing. Consequently, it is essential to create an Intrusion Detection System (IDS) to detect both inside and outside assaults with high detection precision in cloud environment. In this paper, cloud intrusion detection system at hypervisor layer is developed and assesses to detect the depraved activities in cloud computing environment. The cloud intrusion detection system uses a hybrid algorithm which is a fusion of WLI- FCM clustering algorithm and Back propagation artificial Neural Network to improve the detection accuracy of the cloud intrusion detection system. The proposed system is implemented and compared with K-means and classic FCM. The DARPA’s KDD cup dataset 1999 is used for simulation. From the detailed performance analysis, it is clear that the proposed system is able to detect the anomalies with high detection accuracy and low false alarm rate.
Spreading Trade Union Activities through Cyberspace: A Case StudyEswar Publications
This report present the outcome of an investigative research conducted to examine the modu-operandi of academic staff union of polytechnics (ASUP) YabaTech. The investigation covered the logistics and cost implication for spreading union activities among members. It was discovered that cost of management and dissemination of information to members was at high side, also logistics problem constitutes to loss of information in transit hence cut away some members from union activities. To curtail the problem identified, we proposed the
design of secure and dynamic website for spreading union activities among members and public. The proposed system was implemented using HTML5 technology, interface frameworks like Bootstrap and j query which enables the responsive feature of the application interface. The backend was designed using PHPMYSQL. It was discovered from the evaluation of the new system that cost of managing information has reduced considerably, and logistic problems identified in the old system has become a forgotten issue.
Identifying an Appropriate Model for Information Systems Integration in the O...Eswar Publications
Nowadays organizations are using information systems for optimizing processes in order to increase coordination and interoperability across the organizations. Since Oil and Gas Industry is one of the large industries in whole of the world, there is a need to compatibility of its Information Systems (IS) which consists three categories of systems: Field IS, Plant IS and Enterprise IS to create interoperability and approach the
optimizing processes as its result. In this paper we introduce the different models of information systems integration, identify the types of information systems that are using in the upstream and downstream sectors of petroleum industry, and finally based on expert’s opinions will identify a suitable model for information systems integration in this industry.
Link-and Node-Disjoint Evaluation of the Ad Hoc on Demand Multi-path Distance...Eswar Publications
This work illustrates the AOMDV routing protocol. Its ancestor, the AODV routing protocol is also described. This tutorial demonstrates how forward and reverse paths are created by the AOMDV routing protocol. Loop free paths formulation is described, together with node and link disjoint paths. Finally, the performance of the AOMDV routing protocol is investigated along link and node disjoint paths. The WSN with the AOMDV routing protocol using link disjoint paths is better than the WSN with the AOMDV routing protocol using node disjoint paths for energy consumption.
Bridging Centrality: Identifying Bridging Nodes in Transportation NetworkEswar Publications
To identify the importance of node of a network, several centralities are used. Majority of these centrality measures are dominated by components' degree due to their nature of looking at networks’ topology. We propose a centrality to identification model, bridging centrality, based on information flow and topological aspects. We apply bridging centrality on real world networks including the transportation network and show that the nodes distinguished by bridging centrality are well located on the connecting positions between highly connected regions. Bridging centrality can discriminate bridging nodes, the nodes with more information flowed through them and locations between highly connected regions, while other centrality measures cannot.
Now a days we are living in an era of Information Technology where each and every person has to become IT incumbent either intentionally or unintentionally. Technology plays a vital role in our day to day life since last few decades and somehow we all are depending on it in order to obtain maximum benefit and comfort. This new era equipped with latest advents of technology, enlightening world in the form of Internet of Things (IoT). Internet of things is such a specified and dignified domain which leads us to the real world scenarios where each object can perform some task while communicating with some other objects. The world with full of devices, sensors and other objects which will communicate and make human life far better and easier than ever. This paper provides an overview of current research work on IoT in terms of architecture, a technology used and applications. It also highlights all the issues related to technologies used for IoT, after the literature review of research work. The main purpose of this survey is to provide all the latest technologies, their corresponding
trends and details in the field of IoT in systematic manner. It will be helpful for further research.
Automatic Monitoring of Soil Moisture and Controlling of Irrigation SystemEswar Publications
In past couple of decades, there is immediate growth in field of agricultural technology. Utilization of proper method of irrigation by drip is very reasonable and proficient. A various drip irrigation methods have been proposed, but they have been found to be very luxurious and dense to use. The farmer has to maintain watch on irrigation schedule in the conventional drip irrigation system, which is different for different types of crops. In remotely monitored embedded system for irrigation purposes have become a new essential for farmer to accumulate his energy, time and money and will take place only when there will be requirement of water. In this approach, the soil test for chemical constituents, water content, and salinity and fertilizer requirement data collected by wireless and processed for better drip irrigation plan. This paper reviews different monitoring systems and proposes an automatic monitoring system model using Wireless Sensor Network (WSN) which helps the farmer to improve the yield.
Multi- Level Data Security Model for Big Data on Public Cloud: A New ModelEswar Publications
With the advent of cloud computing the big data has emerged as a very crucial technology. The certain type of cloud provides the consumers with the free services like storage, computational power etc. This paper is intended to make use of infrastructure as a service where the storage service from the public cloud providers is going to leveraged by an individual or organization. The paper will emphasize the model which can be used by anyone without any cost. They can store the confidential data without any type of security issue, as the data will be altered
in such a way that it cannot be understood by the intruder if any. Not only that but the user can retrieve back the original data within no time. The proposed security model is going to effectively and efficiently provide a robust security while data is on cloud infrastructure as well as when data is getting migrated towards cloud infrastructure or vice versa.
Impact of Technology on E-Banking; Cameroon PerspectivesEswar Publications
The financial services industry is experiencing rapid changes in services delivery and channels usage, and financial companies and users of financial services are looking at new technologies as they emerge and deciding whether or not to embrace them and the new opportunities to save and manage enormous time, cost and stress.
There is no doubt about the favourable and manifold impact of technology on e-banking as pictured in this review paper, almost all banks are with the least and most access e-banking Technological equipments like ATMs and Cards. On the other Hand cheap and readily available technology has opened a favourable competition in ebanking services business with a lot of wide range competitors competing with Commercial Banks in Cameroon in providing digital financial services.
Classification Algorithms with Attribute Selection: an evaluation study using...Eswar Publications
Attribute or feature selection plays an important role in the process of data mining. In general the data set contains more number of attributes. But in the process of effective classification not all attributes are relevant.
Attribute selection is a technique used to extract the ranking of attributes. Therefore, this paper presents a comparative evaluation study of classification algorithms before and after attribute selection using Waikato Environment for Knowledge Analysis (WEKA). The evaluation study concludes that the performance metrics of the classification algorithm, improves after performing attribute selection. This will reduce the work of processing irrelevant attributes.
Mining Frequent Patterns and Associations from the Smart meters using Bayesia...Eswar Publications
In today’s world migration of people from rural areas to urban areas is quite common. Health care services are one of the most challenging aspect that is must require to the people with abnormal health. Advancements in the technologies lead to build the smart homes, which contains various sensor or smart meter devices to automate the process of other electronic device. Additionally these smart meters can be able to capture the daily activities of the patients and also monitor the health conditions of the patients by mining the frequent patterns and
association rules generated from the smart meters. In this work we proposed a model that is able to monitor the activities of the patients in home and can send the daily activities to the corresponding doctor. We can extract the frequent patterns and association rules from the log data and can predict the health conditions of the patients and can give the suggestions according to the prediction. Our work is divided in to three stages. Firstly, we used to record the daily activities of the patient using a specific time period at three regular intervals. Secondly we applied the frequent pattern growth for extracting the association rules from the log file. Finally, we applied k means clustering for the input and applied Bayesian network model to predict the health behavior of the patient and precautions will be given accordingly.
Network as a Service Model in Cloud Authentication by HMAC AlgorithmEswar Publications
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the
cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the
data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third
party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud.
Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%,
and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed
research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as
a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to
securing from attackers.
Microstrip patch antennas are recently used in wireless detection applications due to their low power consumption, low cost, versatility, field excitation, ease of fabrication etc. The microstrip patch antennas are also called as printed antennas which is suffer with an array elements of antenna and narrow bandwidth. To overcome the above drawbacks, Flame Retardant Material is used as the substrate. Rectangular shape of microstrip patch antenna with FR4 material as the substrate which is more suitable for the explosive detection applications. The proposed printed antenna was designed with the dimension of 60 x 60 mm2. FR-4 material has a dielectric constant value of 4.3 with thickness 1.56 mm, length and width 60 mm and 60 mm respectively. One side of the substrate contains the ground plane of dimensions 60 x60 mm2 made of copper and the other side of the substrate contains the patch which have dimensions 34 x 29 mm2 and thickness 0.03mm which is also made of copper. RMPA without slot, Vertical slot RMPA, Double horizontal slot RMPA and Centre slot RMPA structures were
designed and the performance of the antennas were analysed with various parameters such as gain, directivity, Efield, VSWR and return loss. From the performance analysis, double horizontal slot RMPA antenna provides a better result and it provides maximum gain (8.61dB) and minimum return loss (-33.918dB). Based on the E-field excitation value the SEMTEX explosive material is detected and it was simulated using CST software.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Authentication Systems in Internet of Things
1. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2422-2426 (2015) ISSN: 0975-0290
2422
Authentication Systems in Internet of Things
*Tuhin Borgohain
Department of Instrumentation Engineering, Assam Engineering College, Guwahati, India
Email: borgohain.tuhin@gmail.com
*Corresponding author
Amardeep Borgohain
Department of Electrical Engineering, Assam Engineering College, Guwahati, India
Email: amardeepborgohain@gmail.com
Uday Kumar
Tech Mahindra Limited, Chennai, India
Email : udaykumar@techmahindra.com
Sugata Sanyal
Corporate Technology Office, Tata Consultancy Services, Mumbai, India
Email: sugata.sanyal@tcs.com
-----------------------------------------------------------------------ABSTRACT----------------------------------------------------------
This paper analyzes the various authentication systems implemented for enhanced security and private reposition
of an individual’s login credentials. The first part of the paper describes the multi-factor authentication (MFA)
systems, which, though not applicable to the field of Internet of Things, provides great security to a user’s
credentials. MFA is followed by a brief description of the working mechanism of interaction of third party clients
with private resources over the OAuth protocol framework and a study of the delegation based authentication
system in IP-based IoT.
Keywords –Authentication, authorization, OAuth, SASL
--------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: January 03, 2015 Date of Acceptance: February 04, 2015
--------------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
Wide adoption of seamless integration of social network
with any electronic devices like a smart phone, fitness
tracker etc. has facilitated the interaction of personnel with
anyone over the world with just the click of a button. This
has paved the way for sharing of personal health-related
data [1], online social account and many more with
anyone in any continent and has opened the way for social
collaboration and competition over the Internet. Yet the
communication taking place between the smart objects and
the social media is susceptible to interception from various
third party intruders, which may lead to loss of privacy
and exposure of authentication details to unwanted
personnel. Thus an improved and more robust
authentication system from logging inside one’s online
account will ensure a much safer browsing experience and
online exchange of information.
II. OVERVIEW
In section III, we will briefly introduce the authentication
system in a social network. In section IV, we will discuss
the two-step authentication [4] system adopted by many
online tech services and non-IoT devices to decrease the
chance of logging inside someone’s account by another
person due to accidental compromise of password. In
section V, we discuss about the OAuth framework
applicable in transmission of data in IoT devices.In section
VI, we discuss the delegation-based authentication method
for IP-based IoT. In section VII, we conclude the paper.
III. AUTHENTICATION
In any social network connected to a smart object, a link
between the online portal and the Internet connected
device is initiated by the upload of the registered user ID
and its corresponding password to an online server.
Authentication is the process of confirming one’s identity.
Two-factor authentication or 2FA is a way of login where
a user is required to provide additional information to sign
in than just the password. Using only the password to
login enables malicious attackers to have easy access into
the system as it represents single piece of information only
[14]. In authentication systems, all the transmission of
data from a user’s smart object to the online server can be
exposed to unwanted personnel through interception. As
such, from a security standpoint, the most common
authentication systems fail to guarantee a fail-safe method
for keeping the login information away from the hands of
the public for maintaining privacy and security for the
user. With the increasing use of mobile devices by the
consumers for banking, shopping [17] etc. the need for
security concerns have emerged which in turn has created
an interest in multi-factor authentication. In case of multi-
factor authentication, which requires more than one form
of authentication for verification of legitimacy, provides
an additional layer of protection against security breach.
Here apart from providing username and password by the
2. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2422-2426 (2015) ISSN: 0975
user, an additional authentication code is sent to the user’s
mobile device [13]
for verification. These factors taken together provide
increased security of accounts. Yet such multi fa
authentication systems are not applicable in the Internet of
Things architecture.
IV. TWO-STEP AUTHENTICATION
DEVICES
In some of the leading tech companies offering online
services, the companies offer the choice of Multi
authentication system for enhanced security. In this type of
authentication system, verification of specific combination
of multiple components takes place before authenticating
an individual. If one of the components is
missing/incorrect, the identity of the individual is not
accepted as registered in the system. For enhancingthe
security against intruders, while transferring data, data
hiding technique [8] can be implemented by the
companies in order to prevent data theft.
One of the most prominent multi-factor authentication
systems is the mobile phone two-factor authentication [2].
In this system, a user accesses his account by inputting the
registered information along with a dynamic one
valid password [5] made up of combination of digits. The
latter password is sent to the user through email, SMS or
any other specific application designed to facilitate the
procurement of the OTP (One Time Password)
[11], [22], [30]) from the host server. To ensure the
security of the OTP, its validity is limited to a very short
duration of time [7] beyond which the OTP expires and
the user has to re-enter the personal information
corresponding to which a new OTP is requested, generated
and sent to the user from the server. A basic flow diagram
of how MPTFA works is shown in fig 1:
Fig 1: Flow diagram of MPTFA
Int. J. Advanced Networking and Applications
(2015) ISSN: 0975-0290
user, an additional authentication code is sent to the user’s
. These factors taken together provide
increased security of accounts. Yet such multi factor
authentication systems are not applicable in the Internet of
IN NON-IOT
In some of the leading tech companies offering online
services, the companies offer the choice of Multi-factor
authentication system for enhanced security. In this type of
authentication system, verification of specific combination
akes place before authenticating
an individual. If one of the components is
missing/incorrect, the identity of the individual is not
For enhancingthe
while transferring data, data
hnique [8] can be implemented by the
factor authentication
factor authentication [2].
In this system, a user accesses his account by inputting the
registered information along with a dynamic one-time
combination of digits. The
latter password is sent to the user through email, SMS or
any other specific application designed to facilitate the
procurement of the OTP (One Time Password) ([9], [10],
from the host server. To ensure the
urity of the OTP, its validity is limited to a very short
duration of time [7] beyond which the OTP expires and
enter the personal information
corresponding to which a new OTP is requested, generated
A basic flow diagram
ig 1: Flow diagram of MPTFA
Some of the major advantages of the mobile phone two
factor authentication (MPTFA) over other multi
authentication systems are:
i) As against the requirement of tokens like USB,
bank cards etc. by the user all the time for verifying their
identity, MPTFA replace the tokens by an individual’s
mobile phone which is carried out the entire time user.
ii) The ability to limit the maximum number of
permitted false entries in MPTFA reduces the chance of
the information being compromised through hit
methods.
iii) The OTP are dynamically generated which changes
with each entry of the static login details which proves to
be more secure than only the static login
iv) The short expiration duration of the passwords ensures
that an OTP left in the mobile phone cannot be used again
by anyone to gain entry into an account in the future.
Some drawbacks of the MPTFA are as follows:
i) The mobile phone’s capability of receiving
messages depends on its cellular reception [15] and battery
longevity.
ii) The loss of a mobile phone containing the SIM
card registered for receiving the OTP leads to additional
distress for the user as the absence of the mobile phone
not let the user complete his login steps which leads to
failure in accessing his/her own account.
iii) From an economic viewpoint, the replacement of a lost
mobile phone by another proves to be an expensive affair
for the common man.
iv) In terms of privacy, the user has to share his personal
telephone number with the provider, which means lack of
privacy [20] up to a certain extent as the provider may
choose to disclose the number to the public or some other
advertising firms.
V. AUTHENTICATION USING
FRAMEWORK OVER SIMPLE AUTHENTICATION
AND SECURITY LAYER (SASL) IN
OAuth is an open standard authorization and
authentication protocol framework granting the third
applications a limited, delegated access to private
resources by establishing an approval interaction between
the third-party application and the resource owner and
specifying a definite process by which the resource owner
grants authorization to the third-party applications access
to the server resources without giving away
information (User ID, passwords etc.) ([18], [21], [23],
[26], [27]).
On the other hand, simple layer authentication and security
layer (SASL) is an authentication framework for data
security in application layer framework ([19], [25], [28],
[29]).
During grant of access to client (say Facebook app,
Twitter app etc.) to protected resources (User’s Facebook
account, Twitter account etc.), initially the requests for
permission to resource access in done over Plain OAuth
2.0 but the last stage for authenticating a client to access
2423
Some of the major advantages of the mobile phone two-
factor authentication (MPTFA) over other multi-factor
of tokens like USB,
bank cards etc. by the user all the time for verifying their
identity, MPTFA replace the tokens by an individual’s
mobile phone which is carried out the entire time user.
The ability to limit the maximum number of
tries in MPTFA reduces the chance of
the information being compromised through hit-and-trial
iii) The OTP are dynamically generated which changes
with each entry of the static login details which proves to
be more secure than only the static login information.
iv) The short expiration duration of the passwords ensures
that an OTP left in the mobile phone cannot be used again
by anyone to gain entry into an account in the future.
Some drawbacks of the MPTFA are as follows:
ability of receiving
messages depends on its cellular reception [15] and battery
The loss of a mobile phone containing the SIM
card registered for receiving the OTP leads to additional
distress for the user as the absence of the mobile phone do
not let the user complete his login steps which leads to
failure in accessing his/her own account.
iii) From an economic viewpoint, the replacement of a lost
mobile phone by another proves to be an expensive affair
privacy, the user has to share his personal
telephone number with the provider, which means lack of
privacy [20] up to a certain extent as the provider may
choose to disclose the number to the public or some other
USING OAUTH
AUTHENTICATION
IN IOT DEVICES
OAuth is an open standard authorization and
authentication protocol framework granting the third-party
applications a limited, delegated access to private
ishing an approval interaction between
party application and the resource owner and
specifying a definite process by which the resource owner
party applications access
to the server resources without giving away their login
information (User ID, passwords etc.) ([18], [21], [23],
On the other hand, simple layer authentication and security
layer (SASL) is an authentication framework for data
security in application layer framework ([19], [25], [28],
During grant of access to client (say Facebook app,
Twitter app etc.) to protected resources (User’s Facebook
account, Twitter account etc.), initially the requests for
permission to resource access in done over Plain OAuth
or authenticating a client to access
3. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2422-2426 (2015) ISSN: 0975
the resources from a resource owner is done using the
OAuth protocol framework over the SASL authentication
framework [12]. The systematic transmissions of requests
from the client for grant of authorization are given b
Using Plain OAuth 2.0
Step I: The client request for a grant of authorization from
the resource owner in two ways:
i) Resource owner gets the request sent by client, directly.
ii) The request is sent through an intermediate
authorization server by the client.
Step II: An authorization is granted to the client in the
form of a credential. This authorization depends on the
whether the client requested for the grant directly or
indirectly.
Step III: The resource server can only be accessed with
specific access token. These are requested by the client by
first authenticating themselves with the authorization
server and then forwarding the grant of authorization
received directly from the resource owner or indirectly via
the authorization server.
Step IV: If the client is an authenticated in their servers,
the authorization server verifies the authorization grant
and then issues an access token.
Using OAuth over SASL:
Step I: After gaining the access token, the client requests
for access to the private resources form the resource server
by authenticating themselves with the access token.
Step II: The resource server verifies the access token. If
successful, the client is authenticated to access the
resources on behalf of the resource owner.
All the above steps are represented diagrammatically in
the following Fig 2.
Fig 2: Communication between client and resource server
over OAuth framework
VI. DELEGATION BASED DTLS CONNECTION
ESTABLISHMENT FOR AUTHENTICATION
IOT
This is an authentication method for Internet of Things
proposed by Hummen et al. [31].
DTLS stands for Datagram Transport Layer Security. In a
delegated DTLS connection establishment, a delegation
server is used for separating the initial establishment o
Int. J. Advanced Networking and Applications
(2015) ISSN: 0975-0290
the resources from a resource owner is done using the
OAuth protocol framework over the SASL authentication
framework [12]. The systematic transmissions of requests
from the client for grant of authorization are given below:
Step I: The client request for a grant of authorization from
i) Resource owner gets the request sent by client, directly.
ii) The request is sent through an intermediate
Step II: An authorization is granted to the client in the
form of a credential. This authorization depends on the
whether the client requested for the grant directly or
Step III: The resource server can only be accessed with
c access token. These are requested by the client by
first authenticating themselves with the authorization
server and then forwarding the grant of authorization
received directly from the resource owner or indirectly via
If the client is an authenticated in their servers,
the authorization server verifies the authorization grant
Step I: After gaining the access token, the client requests
sources form the resource server
by authenticating themselves with the access token.
Step II: The resource server verifies the access token. If
successful, the client is authenticated to access the
steps are represented diagrammatically in
Fig 2: Communication between client and resource server
CONNECTION
AUTHENTICATION IN
This is an authentication method for Internet of Things
DTLS stands for Datagram Transport Layer Security. In a
delegated DTLS connection establishment, a delegation
server is used for separating the initial establishment of
connection from the subsequent application data
protection. Here the delegation server makes the provision
for a constrained device with all the necessary contexts of
security for secured communication. These delegation
servers do not contain any pre-shared secret keys for the
communicators but establishes security contexts on
demand.
First a master key in imprinted in the constrained device
by the delegation server for transmission of security
contexts to and fro between the devices. This imprinting is
done when the delegation server is bootstrapped to the
local network domain. Under the assumption of
administration by a common operator, the inter
between the constrained device and a remote end
established by the instruction of the ope
delegation server to establish a DTLS connection with the
aforementioned end-point. During this connection
between the delegation server and the remote end
the former authenticate the latter during the DTLS
handshake. This authentication is done via trusted
certificates.
To achieve the goal of handing over the security context to
the constrained device form the above established
connection, the session resumption extension of DTLS
protocol is employed during the establishment of the
above connection. This session resumption extension of
DTLS protocol facilitates two things:
(i) Sufficient information for re
connection between the delegation server and the remote
end-point even after the terminal of the connection
between the two is maintained.
(ii) It allows a secured transfer of security contexts
between the two end-points through an encrypted session
ticket.
The delegation server uses the above mechanism to for
transfer of security contexts to the remote end
Through this transfer, the delegation server encrypts the
transferable security contexts with the master key pre
imprinted in the constrained device. Moreover, during this
handshake between the delegation server and the remote
end-point, the server makes an
constrained device’s IP address to the session ticket.
After the handshake is completed, the remote endpoint
initiates a session resumption handshake
constrained device through the previously attached IP
address. Similarly, session resumption handshake
constrained deviceis triggered
delegationserverthrough the IP address of the remote end
point. During these session resumption handshake
of the session ticket along with the security context takes
place from the remote end-point to the constrained device
where decryption of the security context takes place.
These security contexts are then used for authentication
and re-establishment of connection shared previously with
the remote end-points.
VII. CONCLUSION
The above authentication methods in Internet of Things
has resulted in more secure login experience for the users
without the dangers of exposing their credentials to third
2424
connection from the subsequent application data
protection. Here the delegation server makes the provision
for a constrained device with all the necessary contexts of
security for secured communication. These delegation
red secret keys for the
communicators but establishes security contexts on-
First a master key in imprinted in the constrained device
by the delegation server for transmission of security
contexts to and fro between the devices. This imprinting is
one when the delegation server is bootstrapped to the
local network domain. Under the assumption of
administration by a common operator, the inter-connection
between the constrained device and a remote end-point is
established by the instruction of the operator to the
delegation server to establish a DTLS connection with the
point. During this connection
between the delegation server and the remote end-point,
the former authenticate the latter during the DTLS
on is done via trusted
To achieve the goal of handing over the security context to
the constrained device form the above established
connection, the session resumption extension of DTLS
protocol is employed during the establishment of the
ve connection. This session resumption extension of
(i) Sufficient information for re-establishment of
connection between the delegation server and the remote
point even after the terminal of the connection
(ii) It allows a secured transfer of security contexts
points through an encrypted session
The delegation server uses the above mechanism to for
transfer of security contexts to the remote end-point.
rough this transfer, the delegation server encrypts the
transferable security contexts with the master key pre-
imprinted in the constrained device. Moreover, during this
handshake between the delegation server and the remote
point, the server makes an attachment of the
constrained device’s IP address to the session ticket.
After the handshake is completed, the remote endpoint
session resumption handshake with the
constrained device through the previously attached IP-
session resumption handshake with the
triggered by the
through the IP address of the remote end-
session resumption handshake transfer
of the session ticket along with the security context takes
point to the constrained device
where decryption of the security context takes place.
These security contexts are then used for authentication
establishment of connection shared previously with
The above authentication methods in Internet of Things
has resulted in more secure login experience for the users
without the dangers of exposing their credentials to third
4. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2422-2426 (2015) ISSN: 0975-0290
2425
party users. Further research for improvement of
authentication systems in IoT will result in a much wider
adoption of IoT in daily life along with ensuring greater
privacy and security on part of the user during the login
processes and financial transactions over the net.
Moreover efficient transmission of data after securing the
transmission process ([3], [6]) is of utmost importance,
which can be obtained by Ant Colony Optimization
(ACO) algorithm ([16], [24]).
References
[1] Moshaddique Al Ameen, Jingwei Liu, Kyungsup
Kwak; 2010. “Security and privacy issues in wireless
sensor networks for healthcare applications”. Journal
of Medical Systems. J Med Syst. Feb 2012; 36(1):
93–101. Published online Mar 12, 2010. doi:
10.1007 s10916-010-9449-4.
[2] Ayu Tiwari, Sudip Sanyal, Ajith Abraham, Svein
Johan Knapskog, Sugata Sanyal, “A Multi-Factor
Security Protocol for Wireless Payment – Secure
Web Authentication Using Mobile Devices”, IADIS,
International Conference Applied Computing, pp.
160- 167, 2007.
[3] Rangarajan A. Vasudevan, Sugata Sanyal, Ajith
Abraham and Dharma P. Agrawal, “Jigsaw-based
Secure Data Transfer over Computer Networks”,
IEEE International Conference on Information
Technology: Coding and Computing, 2004. (ITCC
’04), Proceedings of ITCC 2004, Vol. 1, pp. 2-6,
April, 2004, Las Vegas, Nevada
[4] Halevi Shai, Krawczyk Hugo: (1999), “Public-key
cryptography and password protocols”, Proceedings
of the 5th ACM conference onComputer and
communications security, San Francisco, Vol. 2,
Issue 3, pp. 230 - 268, November 1998.
[5] Jayesh Kataria, P.S. Dhekne, Sugata Sanyal, “A
Scheme to Control Flooding of Fake Route Requests
in Ad-hoc Networks”, International Conference
onComputers and Devices for Communications,
CODEC-06, December 18-20, 2006, pp. 198-201,
Kolkata, India.
[6] R. Vasudevan and Sugata Sanyal, “A Novel
Multipath Approach to Security in Mobile and Ad
Hoc Networks (MANETs)”, Proceedings of
International Conference on Computers and Devices
for Communication (CODEC'04), Kolkata, India,
2004., pp. CAN_0412_CO_F_1 to
CAN_0412_CO_F_4.
[7] F. Aloul and S. Zahidi, “Two factor authentication
using mobile phones”. In Proceedings of the IEEE
International Conference on Computer Systems and
Applications, pp. 641–644, 2009.
[8] Sandipan Dey, Ajith Abraham and Sugata Sanyal,
“An LSB Data Hiding Technique Using Natural
Numbers”, IEEE Third International Conference
onIntelligent Information Hiding and Multimedia
Signal Processing, IIHMSP 2007, Nov 26-28, 2007,
Kaohsiung City, Taiwan, IEEE Computer Society
press, USA, ISBN 0-7695-2994-1, pp. 473-476,
2007
[9] Tzu-Chang Yeh, Hsiao-Yun Shen, and Jing-Jang
Hwang, “A secure onetime password authentication
scheme using smart cards”, IEICE Trans. on
Communications, vol. E85-B, pp. 2515-2518, Nov.
2002.
[10] S. Hallsteinsen, I. Jorstad, D.V. Thanh, “Using the
mobile phone as a security token for unified
authentication”, International Conference on
Systems and Networks Communications, 2007, pp.
68-74.
[11] M. H. Eldefrawy, M. K. Khan, K. Alghathbar, T. H.
Kim, H. Elkamchouchi, “Mobile-one-time password:
Two-factor authentication using mobile phones”,
Security and Communication Networks, John Wiley
& Sons, vol.5, no.5, pp.508-516, 2012
[12] Tim Showalter, William Mills, Hannes Tschofenig,
“A set of SASL Mechanisms for OAuth”.(2014),
https://tools.ietf.org/html/draft-ietf-kitten-sasl-oauth-
19.
[13] A.P. Sabzevar, A. Stavrou, “Universal Multi-Factor
Authentication Using Graphical Passwords”, IEEE
International Conference on Signal Image
Technology and Internet Based Systems (SITIS),
2008, pp. 625-632.
[14] Sugata Sanyal, Ayu Tiwari, Sudip Sanyal, “A
Multifactor Secure Authentication System for
Wireless Payment”, Emergent Web Intelligence:
Advanced Information Retrieval, Ed: Chbeir Richard
et al, First Edition, 2010, Chapter 13, pp. 341-369,
XVI, Springer Verlag London Limited, 2010, DOI:
10.1007/978-1-84996-074-8_13.
[15] Mohamed Hamdy Eldefrawy, Khaled Alghathbar,
Muhammad Khurram Khan, “OTP-Based Two-
Factor Authentication Using Mobile Phones”, in
2011 Eighth International Conference on
Information Technology: New Generations, 2011,
pp. 327-331.
[16] Bibhash Roy, Suman Banik, Parthi Dey, Sugata
Sanyal, Nabendu Chaki, “Ant Colony based Routing
for Mobile Ad-Hoc Networks towards Improved
Quality of Services”, Journal of Emerging Trends in
Computing & Information SciencesVol.3, No. 1,
January 2012, pp. 10-14.
[17] S. Acharya, A. Polawar, P. Pawar, “Two factor
authentication using smartphone generated one time
password”, IOSR Journal of Computer Engineering
(IOSR-JCE), Vol. 11(2), (May-Jun. 2013), pp. 85-
90.
[18] http://en.wikipedia.org/wiki/OAuth
[19] https://tools.ietf.org/html/rfc4422
[20] N. Clarke, S. Furnell, “Authentication of users on
mobile telephones - a survey of attitudes and
practices,” Computers & Security, vol. 24, no. 7,
2005, pp. 519 – 527.
[21] E. Hammer-Lahav, Ed. “The OAuth 1.0 Protocol”.
Internet engineering task force rfc 5849, 2010;
http://tools.ietf.org/html/rfc5849
[22] V. Goyal, A. Abraham, S. Sanyal, S. Han“The N/R
one time password system”. In: Proceedings of
International Conference on Information
5. Int. J. Advanced Networking and Applications
Volume: 6 Issue: 4 Pages: 2422-2426 (2015) ISSN: 0975
Technology: Coding and Computing (ITCC 2005),
Vol. 1, pp. 733–738 (2005)
[23] E. Hammer-Lahav, D. Recordon, D. Hardt, “The
OAuth 2.0 Authorization Protocol”,
Draft, 2011; https://tools.ietf.org/id/draft
v2-12.txt
[24] Gurpreet Singh, Neeraj Kumar, Anil Kumar Verma,
“Ant colony algorithms in MANETs: A review”
Journal of Network and Computer Applications
11/2012; 35(6): pp. 1964–
10.1016/j.jnca.2012.07.018
[25] A. Melnikov, Ed., K. Zeilenga, Ed
Authentication and Security Layer (SASL)”,
4422, June 2006; http://www.ietf.org/rfc/rfc4422.t
[26] http://tools.ietf.org/html/rfc6749.html
[27] M. Jones, D. Hardt,“The OAuth 2.0 Authorization
Framework: Bearer TokenUsage
(Proposed Standard), October 2012
https://tools.ietf.org/html/rfc6750.
[28] Myers, J. “Simple Authentication and Security Layer
(SASL)”, RFC 2222, IETF, 1997
https://www.ietf.org/rfc/rfc2222.txt.
[29] A. Melnikov, Ed. “Simple Authentication and
Security Layer (SASL)”, RFC 4422, June 2006
http://www.ietf.org/rfc/rfc4422.txt
[30] N.M. Haller, “The S/KEY one-time password
system”, in: Symposium on Network and Dist
Systems Security. pp. 151-157, San Diego, CA,
February 1994.
[31] Hummen, René, Hossein Shafagh, Shahid Raza,
Thiemo Voig, and Klaus Wehrle. "Delegation
authentication and authorization for the
internet of things." In Sensing, Communication, and
Networking (SECON), 2014 Eleventh Annual IEEE
International Conference on, pp. 284
2014.
Authors Biography
Tuhin Borgohain is a 3rd
Year student of
Assam Engineering College, Guwahati. He
is presently pursuing his Bachelor of
Engineering degree in the department of
Instrumentation Engineering.
Amardeep Borgohain is a 3rd
of Assam Engineering College, Guwahati.
He is presently pursuing his Bachelor of
Engineering degree in the department of
Electrical Engineering.
Uday Kumar is working as Delivery
Manager at Tech Mahindra Ltd, India. He
has 17 years of experience in engineering
large complex software system for
customers like Citibank, FIFA, Apple
Smart objects and AT&T. He has
developed products in BI, performance
testing, compilers. And have successfully led projects in
finance, content management and ecommerce domain. He
Int. J. Advanced Networking and Applications
(2015) ISSN: 0975-0290
ing and Computing (ITCC 2005),
Lahav, D. Recordon, D. Hardt, “The
OAuth 2.0 Authorization Protocol”, IETF Internet
https://tools.ietf.org/id/draft-ietf-oauth-
Gurpreet Singh, Neeraj Kumar, Anil Kumar Verma,
“Ant colony algorithms in MANETs: A review”
Journal of Network and Computer Applications
–1972. DOI:
K. Zeilenga, Ed., “Simple
Authentication and Security Layer (SASL)”, RFC
http://www.ietf.org/rfc/rfc4422.txt.
http://tools.ietf.org/html/rfc6749.html
The OAuth 2.0 Authorization
Framework: Bearer TokenUsage”,RFC 6750
(Proposed Standard), October 2012;
Simple Authentication and Security Layer
IETF, 1997,
Simple Authentication and
RFC 4422, June 2006;
time password
and Distributed
157, San Diego, CA,
Hummen, René, Hossein Shafagh, Shahid Raza,
Thiemo Voig, and Klaus Wehrle. "Delegation-based
authentication and authorization for the IP-based
munication, and
Networking (SECON), 2014 Eleventh Annual IEEE
, pp. 284-292. IEEE,
Year student of
Assam Engineering College, Guwahati. He
is presently pursuing his Bachelor of
Engineering degree in the department of
.
rd
Year student
of Assam Engineering College, Guwahati.
resently pursuing his Bachelor of
ring degree in the department of
Uday Kumar is working as Delivery
Manager at Tech Mahindra Ltd, India. He
has 17 years of experience in engineering
large complex software system for
ers like Citibank, FIFA, Apple
Smart objects and AT&T. He has
developed products in BI, performance
testing, compilers. And have successfully led projects in
finance, content management and ecommerce domain. He
has participated in many campus connect progr
conducted workshop on software security, skills
improvement for industrial strength programming,
evangelizing tools and methodology for secure and high
end programming.
Sugata Sanyal is presently acting as a
Research Advisor to the Corporate
Technology Office, Tata Consultancy
Services, India. He was with the Tata
Institute of Fundamental Research till
July, 2012. Prof. Sanyal is a:
Distinguished Scientific Consultant to the International
Research Group: Study of Intelligence of Biological and
Artificial Complex System, Bucharest, Romania; Member,
"Brain Trust," an advisory group to faculty members at the
School of Computing and Informatics, University of
Louisiana at Lafayette's Ray P. Authement College of
Sciences, USA; an honorary professor in IIT
and Member, Senate, Indian Institute of Guwahati, India.
Prof. Sanyal has published many research papers in
international journals and in International Conferences
worldwide: topics ranging from network security to
intrusion detection system and more.
2426
has participated in many campus connect program and
conducted workshop on software security, skills
improvement for industrial strength programming,
evangelizing tools and methodology for secure and high
Sugata Sanyal is presently acting as a
Research Advisor to the Corporate
logy Office, Tata Consultancy
Services, India. He was with the Tata
Institute of Fundamental Research till
July, 2012. Prof. Sanyal is a:
Distinguished Scientific Consultant to the International
Research Group: Study of Intelligence of Biological and
icial Complex System, Bucharest, Romania; Member,
"Brain Trust," an advisory group to faculty members at the
School of Computing and Informatics, University of
Louisiana at Lafayette's Ray P. Authement College of
Sciences, USA; an honorary professor in IIT Guwahati
Member, Senate, Indian Institute of Guwahati, India.
Prof. Sanyal has published many research papers in
international journals and in International Conferences
worldwide: topics ranging from network security to