Explore chapters and articles related to this topic
A Review on Blockchain-Based Device Authentication Schemes for IoT
Published in Debarka Mukhopadhyay, Siddhartha Bhattacharyya, Balachandran Krishnan, Sudipta Roy, Blockchain for IoT, 2023
G. Megala, Prabu Sevugan, P. Swarnalatha
There are primarily three types of user authentication approaches: (1) knowledge-centered authentication describes what the client knows and wants (examples: password, security questions, OTP); (2) possession-based authentication specifies what the client possesses or holds (examples: One time pad through mail or text, software tokens, access certificates); and (3) inherence- or biometric-based authentication defines who the user is (examples: fingerprints, iris or retinal images, biometric, facial, voice recognitions). Other factors include time factor authentication (attempted login, permitted and rejected access), location factor authentication (which identifies the accessing device using a global positioning system [GPS] to confirm identity), and artifacts-based authentication (which involves smart cards, digital signatures, and certificates).
A modified authentication approach for cloud computing in e-healthcare systems
Published in Sabyasachi Pramanik, Anand Sharma, Surbhi Bhatia, Dac-Nhuong Le, An Interdisciplinary Approach to Modern Network Security, 2022
While these new technologies promise to transform patient care, they also complicate securing patient data. However, patient data will continue to be a profitable target for cyber attackers. Healthcare providers need to recognize the evolving security challenges in this complex environment [16]. Authentication is one of the solutions to keep safe and secure the patient’s and health organization’s data. Only authorized users can access the cloud for data storage and data sharing for patient care through authentication. Different techniques are used for authentication: password or PIN, single sign-on, token, two-factor authentication, three-factor authentication, biometrics, etc. Before storing a patient’s data into cloud equipment, we propose a model that is required to authenticate first, so only authorized users will store the equipment’s data in the cloud. Second, when doctors, caretakers, and other related persons try to access the data, they also require authentication; through valid authentication, they can access data anywhere and anytime.
Challenges, Opportunities, and Applications of 5G Network
Published in Mangesh M. Ghonge, Ramchandra Sharad Mangrulkar, Pradip M. Jawandhiya, Nitin Goje, Future Trends in 5G and 6G, 2021
Kalyani N Pampattiwar, Pallavi Chavan
Authentication plays a very important role in security of any communication system. It is one of the primary requirements to verify the user’s identity. There are several ways that have been used in the earlier technologies to provide this security aspect. In 5G, as the network has numerous devices, IoT, smart control systems, etc., and the technology to connect all of them is vast and complex, it is imperative that authentication is performed so that vulnerabilities are reduced. In 5G, authentication will be two stage—primary and secondary authentication. Primary authentication will provide device and network authentication. Secondary authentication will be outside the domain of the network operator’s domain. Authentication at primary level can be done using Authentication and Key Agreement (AKA) and Extensible Authentication Protocol (EAP). Credentials and authentication methods related to EAP are applicable in this two-stage authentication method. The facilitation of mutual authentication will be achieved by key management and primary authentication procedures. These are the opportunity areas with respect to 5G authentication.
Blockchain-enabled digital twin collaboration platform for heterogeneous socialized manufacturing resource management
Published in International Journal of Production Research, 2023
Ming Li, Yelin Fu, Qiqi Chen, Ting Qu
The network knowledge context outputs the knowledge that is required to construct the decentralised network of digital twins. A network topology is given in Figure 4 to illustrate this context. An SMN is logically composed of channels, MSPs and SMCs. A channel is a logical subnet for communications among specific network members to conduct private and confidential business. In principle, a channel maintains one shared ledger that records the transactions that are executed with both authentication and authorisation on this channel. Since the organisation of digital twins in our study is for collaborative execution, only one execution channel is designed for this aim. Additional channels are also allowed to add in the same network for other business purposes. The MSP is the abstraction of identity operations for members to enrol in the SMN. It enables a series of cryptographic mechanisms and protocols behind issuing, validating and authenticating certificates based on certificate authorities. An SMN can be governed by one or more MSPs. Two levels of MSPs are designed considering the hierarchical structure in this network: channel MSPs and local MSPs. Each level of MSP lists roles and permissions at a particular level of administration in its corresponding hierarchy, and each SMC participating in a channel must have an MSP defined for it. In general, it is better to establish a one-to-one mapping between the SMCs and MSPs to facilitate privacy by segregating ledger data only to channel members.
Secure and Memorable Authentication Using Dynamic Combinations of 3D Objects in Virtual Reality
Published in International Journal of Human–Computer Interaction, 2023
Jiawei Wang, BoYu Gao, Huawei Tu, Hai-Ning Liang, Zitao Liu, Weiqi Luo, Jian Weng
There are commonly two categories of authentication methods: knowledge-based and biometric-based authentication. First, some studies investigated the biometric authentication methods for VR environments (Chen et al., 2014; Li et al., 2019; Shen et al., 2019; Watanabe et al., 2005), such methods could provide a good balance between usability (ie, quite easy to perform if you have the biometric feature) and security (ie, probably hard to steal your own properties). However, the performance of such methods mainly depends on special recognition hardware and advanced algorithms (Shen et al., 2019). In other words, the computational cost of biometric-based authentication could be commonly higher than that of knowledge-based authentication. Second, the other category focuses on designing the knowledge-based VR authentication (Funk et al., 2019; George et al., 2017; Khamis et al., 2018; Mathis et al., 2021; Olade, Liang et al., 2020; Yu et al., 2016). More attention has been given on the aspects of usability of VR authentication (eg, easy to use (George et al., 2017; Mathis et al., 2021)). Based on its ease of implementation and use while providing acceptable security, it is a common authentication way for VR applications.
A Blockchain Based Decentralized Identifiers for Entity Authentication in Electronic Health Records
Published in Cogent Engineering, 2022
Manoj T, Krishnamoorthi Makkithaya, Narendra V G
In centralized identity management systems, a centralized IDPs will be responsible for issuing an identity (email id, phone number, government id, patient id) and are liable to maintain the trust factor associated with those identities. A well-established first line of defence in any identity mechanism is credential based. In the case of EHRs, as the privacy and security of the data records are vital, credential-based protection is a very trivial and flexible first-hand solution that is vulnerable to identity theft, spoofing attacks, and loss of privacy. In the case of multifactor authentication, it adds the additional layer of security to the existing credentials based authentication by the inclusion of secondary factors such as One Time Password (OTP), captchas, patterns or biometrics (Indu et al., 2018). Several studies on the two-factor authentication (Chaturvedi et al., 2017) and three-factor authentication (Renuka et al., 2019) have been conducted for authenticating the medical records. Despite providing an additional layer of security, the multifactor authentication is prone to attacks such as identity theft, replay attack, phishing attack and DoS (Denial of Service) attack (Fernandes et al., 2014).