95 Hits in 6.3 sec

Lightweight Failover Authentication Mechanism for IoT-Based Fog Computing Environment

Soumya Banerjee, Ashok Kumar Das, Samiran Chattopadhyay, Sajjad Shaukat Jamal, Joel J. P. C. Rodrigues, Youngho Park
2021 Electronics  
However, as fog nodes are considered transient and they offer authenticated services, when an IoT end device loses connectivity with a fog node, it must authenticate freshly with a secondary fog node.  ...  In this work, we present a new security mechanism to leverage the initial authentication to perform fast lightweight secondary authentication to ensure smooth failover among fog nodes.  ...  Acknowledgments: We thank the anonymous reviewers and the Editor for their valuable comments, which helped us to improve the quality and presentation of the paper.  ... 
doi:10.3390/electronics10121417 fatcat:6ycaq52tunewvivbipbokjfvc4

Fog-Driven Secure Authentication and Key Exchange Scheme for Wearable Health Monitoring System

Tsu-Yang Wu, Lei Yang, Qian Meng, Xinglan Guo, Chien-Ming Chen, Azees M
2021 Security and Communication Networks  
In this paper, we propose a fog-driven secure authentication and key exchange scheme for wearable health monitoring systems.  ...  Finally, a performance comparison with other related schemes shows that the proposed scheme has the best advantages in terms of security, computing overhead, and communication cost.  ...  [24] proposed a fog-driven AKA scheme for IoT medical systems. In the same year, Wazid et al. [25] designed a secure AKA scheme based on fog computing. In 2020, Chen et al.  ... 
doi:10.1155/2021/8368646 fatcat:qhkggevuzzev7fpbgdfxwfvzxe

Design and Analysis of Lightweight Authentication Protocol for Securing IoD

Saeed Ullah Jan, Fawad Qayum, Habib Ullah Khan
2021 IEEE Access  
Fog computing is suffering from privacy issues; without secure authentication and key management, it will never perform well for the end-user.  ...  Therefore, to ensure privacy, security and authentication issues and challenges of fog commuting for the end-user, Ali et al.  ...  Therefore, the proposed authentication protocol is secure from all possible attempts of an adversary.  ... 
doi:10.1109/access.2021.3076692 fatcat:gzwqmliwmnevxkqptwlogd4h7a

A Survey and Classification of Security and Privacy Research in Smart Healthcare Systems

Abdullah Algarni
2019 IEEE Access  
First, we present a novel classification scheme for SHS that ranks their methodologies within their applicable domains. Second, we create a classification scheme for the literature concerning SHS.  ...  These parameters are transmitted to the designated emergency services or the trusted healthcare professionals for evaluation.  ...  Table 1 presents the classification scheme for different security defenses.  ... 
doi:10.1109/access.2019.2930962 fatcat:4lax7tjd4fgftif5fbawadsjc4

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks

Georgios Kambourakis, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, Ioannis Kounelis
2020 Symmetry  
Considering the still heterogeneous nature of the majority of IoT protocols, a major concern is to find common references for investigating and analyzing their security and privacy threats.  ...  To this end, and on top of the current literature, this work provides a comprehensive, vis-à-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN  ...  They also proposed possible security improvements considering IoT integration with other state-of-the-art technologies such as blockchain and fog computing.  ... 
doi:10.3390/sym12040579 fatcat:3ajcbbciondlrjnv73fwzph5pu

Autonomic Response to Distributed Denial of Service Attacks [chapter]

Dan Sterne, Kelly Djahandari, Brett Wilson, Bill Babson, Dan Schnackenberg, Harley Holliday, Travis Reid
2001 Lecture Notes in Computer Science  
Acknowledgements The authors would like to thank Jack Oden for distilling and Mary Ellen Leishear for editing the original report into this article.  ...  Thus, a firewall policy management infrastructure has to be part of a more comprehensive scheme that addresses various other facets of security management including key management and authentication policies  ...  Authentication Challenges Some of the most challenging aspects of securing active networks concern the authentication support for authorization.  ... 
doi:10.1007/3-540-45474-8_9 fatcat:gzimnj7tqvd5zg2zl7pjxkhtzm

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
Compromising Security and Identity Many authentication protocols rely upon bringing out shared secrets.  ...  Malware authors didn't pick up on this scheme for about 10 years. Maybe they didn't trust the anonymity or security of the keys, or maybe they were making too much money from other schemes.  ...  The incumbent will augment the department's emphases in at least one of the following areas: cloud computing, particularly secure cloud computing; mobile computing, particularly secure mobile computing  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry

Toward a Culture of Cybersecurity Research

Aaron J. Burstein
2008 Social Science Research Network  
Progress in cybersecurity research, however, is beset by a lack of access data from communications networks.  ...  A modest research exception to federal communications privacy law would remove many of the legal barriers to sharing data with cybersecurity researchers.  ...  A somewhat formal definition includes: a computer or network system's resistance to becoming unavailable or unusable; resistance to attacks that corrupt data stored on the system; and resistance to attacks  ... 
doi:10.2139/ssrn.1113014 fatcat:mmza4omw65c7lgcbqsigtzu3km

Author Index to Ceramic Abstracts for April1

1929 Journal of The American Ceramic Society  
(2) In a system of insula- tion comprising a plurality of dome type insulators, a conductor secured to the insulators and a grounded ring-shaped electrode secured to each insulator body, an electrode secured  ...  , besides fire-resisting glass for glazing factories.  ... 
doi:10.1111/j.1151-2916.1929.tb18043.x fatcat:qd7ivxdjb5gqdabz74kgn3ir6a

Corruption and Financial Crime

Sam Vaknin
2018 Figshare  
security services and other penumbral figures.  ...  and specifications for the BUTLER, plus a number of computer disks with access codes."  ...  Online Banking Safeguards All of Europe's major banks offer to their customers financial services and products through the Internet. But there's a problem: computer security.  ... 
doi:10.6084/m9.figshare.7176539 fatcat:pjcdb2c32vh4fp2rlzx3p6qoke

News of the Field

1941 Journal - American Water Works Association  
—Does the Selective Service System require a registrant to secure a permit before leaving the United States? “Answer.—No.  ...  For the next two years he served as an instructor at Columbia University, and then was a computer for the City’s old Public Works Department.  ... 
doi:10.1002/j.1551-8833.1941.tb14910.x fatcat:kikosdk6cnbm3e24x4d6vxvhf4


1928 Journal of The American Ceramic Society  
The work accountant controls the clerks for computing wages, etc., pricing, posting, costs, etc.  ...  any sort of service.  ... 
doi:10.1111/j.1151-2916.1928.tb16522.x fatcat:qlrsuxk6d5dljb6ovyj2fewtae

APHA conference report, 1968. Public health in the future

1969 Public Health Reports (1896-1970)  
The Computer-A Vital Link The Medicaid computer is controlled by the staff in social services.  ...  For persons to have to go to the emergency ward of a hospital to secure services which should be available outside of hospitals is tragically wasteful.  ...  Public Health Service. In a repre-sentative republic, they frequently rely on the political process as the mechanism of choice for institutionalized solutions and safeguards.  ... 
pmid:4974943 pmcid:PMC2031393 fatcat:g6fsmf4qvza7bo6w3hvkj52zea

Unbounding the future: the nanotechnology revolution

1992 ChoiceReviews  
Personal computers empowered individuals and took away centralized control of communication technology.  ...  A technofix was deemed always bad because it was a shortcut-an overly focused directing of high tech at a problem with no concern for new and possibly worse problems that the solution might create.  ...  Thanks also go to technical audiences at laboratories in the United States, Japan, and Switzerland for their critiques of these concepts.  ... 
doi:10.5860/choice.29-3855 fatcat:rau5y74cnnhcngoryh5la2v27e

The Age of Plastic: Ingenuity and Responsibility, Proceeding of the 2012 MCI Symposium

Odile Madden, A. Elena Charola, Kim Cullen Cobb, Paula T. DePriest, Robert J. Koestler
2017 Smithsonian Contributions to Museum Conservation  
The event was conceived as a cross-disciplinary exploration of plastic as technological material, cultural phenomenon, preservation challenge, and force on the environment.  ...  Intended primarily for the cultural heritage community but also relevant to other fields, this volume demonstrates the importance and challenges of documenting the remarkable ongoing evolution of plastic  ...  In The authors thank the following individuals for contributing to this paper: David Graziosi, Jinny Ferl, Ken Yocum, and James Clougherty, senior design engineers; Bobby Jones and David Slack, design  ... 
doi:10.5479/si.19492367.7 fatcat:2kslcrlnzrec3hm2eewzp3toa4
« Previous Showing results 1 — 15 out of 95 results