Print ISSN: 1681-6900

Online ISSN: 2412-0758

Keywords : authentication


A Cooperation of Fog Computing and Smart Gateways in a Secure and Efficient Architecture for IoT-Based Smart Homes

Amin H. Seno; Sahar A. Alshammari

Engineering and Technology Journal, 2019, Volume 37, Issue 7A, Pages 290-301
DOI: 10.30684/etj.37.7A.10

Nowadays Internet of Things (IoT) is growing to be a serious factor in numerous areas of our daily life style. Internet of Things brings different opportunities of intelligence to important aspects such as health, payments, energy management, industrial sectors, transportation and also many other specialties. It is important to notice that the interaction between these two part the embedded equipment and Cloud based web services is such a common or prevalent scenario of Internet of Things deployment. When it comes to the security point of view, jointly users (consumer) and smart devices need to reassure and establish a secure and confident communication channel and should have a perfect form of digital identity. In many situations, IoT devices needs an already or earlier established infrastructure for their usage and that cannot be managed by the device owner, such as the case in smart homes. Furthermore, the scenario presupposes a security stack that it is appropriate for heterogeneous devices which can be integrated in Internet of Things frameworks or in already presented operating systems. We proposed a Foggy Smart Home Architecture (FSHA). We identify end users by writing an authentication and authorization protocol, and we will reduce the time required for this security operation, so that the proposed method can prevent Non-manipulation, online/offline password guessing attack and user impersonation attack and man-in-the-middle attack. Our method improves performance of smart home and using fog layer can minimize traffic between cloud and gateways.

A Group Authentication Protocol on Multilayer Structure for Privacy-Preserving IoT Environment

Maytham Azhar; Amin H. Seno

Engineering and Technology Journal, 2019, Volume 37, Issue 5A, Pages 172-180
DOI: 10.30684/etj.37.5A.4

In the Internet of Things (IoT) systems, large amounts of data are accumulated from anywhere at any time, which may attack individuals' privacy, especially when systems are utilized in medical and everyday environments. With the promise of IoT's proactive systems, the integration of smart things into standard Internet creates several security challenges, because most Internet technologies, communication protocols and sensors are not designed to support IoT. Recent research studies have shown that launching security / privacy attacks against IoT active systems, in particular, Wearable Medical Sensor (WMS) systems, may lead to catastrophic situations and life-threatening conditions. Therefore, security threats and privacy concerns in the IoT area should be actively studied. This causes us in this paper to create a privacy authentication protocol for IoT end-devices on a four-layer structure that does not have the ability to accurately identify the device of request's sender so that some attacks can be minimized. We used the Blakley Sharing scheme to design a key generation and distribution system for secure communications between edge devices and end devices and examined the security properties of the protocol for the five common attacks in the IoT. The results of the experiments show that the proposed authentication protocol by the Blakley method is more efficient with increasing number of instructions in both fog structures and in a without fog structure, which shows a higher flexibility of the Blakley method than the Schemer because of the increasing number of instructions indicating increasing the number of nodes in the network.

Artificial Neural Networks Based Fingerprint Authentication

Abbas H. Issa

Engineering and Technology Journal, 2015, Volume 33, Issue 5, Pages 1255-1271

Fingerprint authentication and recognition is an important subject that has been widely used in various applications because of its reliability and accuracy in the process of authenticating and recognizing the person's identity. In this paper, an Intelligent Fingerprint Authentication Model (IFAM) based upon the neural network has been proposed. The proposed work consists of two main phases which are the features extraction and the authentication. The features extraction phase has been regarded via proposing a statistical and geometrical approach for determining and isolating the features of the fingerprint images. The proposed approach is called the Features Ring Approach which is abbreviated by FRA. The approach creates a circular ring centered at the core point of the fingerprint to bind the valuable features that are invariant under rotation and translation. The radius of the outer circle of the ring is suggested to be variable to give a variable area for the established circular ring.
The authentication phase of IFAM suggests the neural network to hold the job of verification of the extracted feature patterns resulted by FRA for a fingerprint image of certain person. This is done using a neural network trained with a collection of features patterns extracted from fingerprint images. Backpropagation (BP) is suggested as a training algorithm for the structured neural network.

Two Factor Authentication Based Generated One Time Password

Hilal Hadi; Rana Faeez

Engineering and Technology Journal, 2015, Volume 33, Issue 3, Pages 373-383

This paper explains a method of how the two factors authentication implemented using software token to generateOne Time Password (OTP)to secure users accounts. The proposed method guarantees authenticating e-learning features. The proposedsystem involves generating of OTP by using authentication web service. The generatedcode is valid for only one login and it is verifiedusingSecuredCryptographic Algorithm. The proposed system has been implemented and tested successfully.

Secret Sharing Scheme Based Technique for Authentication of Documents Images

Muna Ghazi; Hanaa M. A. Salman

Engineering and Technology Journal, 2014, Volume 32, Issue 6, Pages 1092-1105
DOI: 10.30684/etj.32.6B.8

Digital document image is a form of persevering important information, and, because of rapid technological development, it is easy to copy, counterfeit this digital document image and claim ownership. Therefore this paper presents a document image authentication scheme based on using secret sharing that can:

1.Authenticate document image.
2.Verify the owner of the document image.
3.Localize the alteration in the document image.
4.Detect the error in the document image, and
5.Correct the error in the document image.

According to comparison of different document image authentication methods, there is no distortion in stego image, the method has capability to locate the tampering, repair capability, reported authentication precision for each (2X3) block, distribution of authenticated image parts in the entire image and manipulating data embedding in LSB(least Signification Bit).

A Proposed System for Sound Retrieval Using MAS and ANN

Abeer Tariq; Ikhlas khalaf; shatha habeeb

Engineering and Technology Journal, 2012, Volume 30, Issue 14, Pages 2480-2492
DOI: 10.30684/etj.30.14.11

As the use of sounds for computer interfaces, electronic equipment and
multimedia contents, has increased, the role of sound design tools has become
more important. In sound retrieval, picking one sound out from huge data is
troublesome for users because of the difficulty of simultaneously listening to plural
sounds and sometimes there are difficulties with speech and sound recognition.
Consequently, an efficient retrieval method is required for sound databases.
This research proposes a system aim to deal with sound retrieval in both two
cases: authenticity and normal. In the first case, authenticity, two algorithms has
been develop one for building the authentication database and the second deal with
user sound sample to retrieve the matched authenticated samples. In the second
case normal we develop algorithm to deal with user sound sample to retrieve all the
matched samples. Many techniques used in this proposed system such as Artificial
Neural Network (ANN), Data Encryption Standard (DES), Multi Agent System
(MAS) and Fourier transformation (FT). Using these combinations of advanced
and adaptive techniques supports the system to be reliable, secure and parallel.

A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function

Muna Mohammed Al-Nayar

Engineering and Technology Journal, 2011, Volume 29, Issue 16, Pages 3291-3301
DOI: 10.30684/etj.29.16.3

Internet has opened new channel of communication enabling an e-mail to be sent to a relative thousands of kilometers away. This medium of communication opens doors for virtually free mass e-mailing, reaching out to hundreds of thousands users around the globe within seconds, so e-mail becomes the most popular form of communication today. E-mail systems have suffered from increasing attacking problem that threatens the validity and integrity of communication. Many different
approaches for fighting this attack have been proposed, ranging from various sender authentication protocols to encrypt the message itself. This paper demonstrates a promising protocol. The proposed protocol ensures the authentication and integrity of the data and avoids the problem of key distribution or breaking by using multiple
random keys generated automatically during communication session.

A Secure Mobile Banking Using Kerberos Protocol

Mohammad N. Abdullah; May T. Abdul-Hadi

Engineering and Technology Journal, 2009, Volume 27, Issue 6, Pages 1127-1133
DOI: 10.30684/etj.27.6.10

Because the network is an open environment, a lot of care must be taken when
transferring sensitive information especially when related with financial data. This depends
on the principals to be trusted which is a problematic and since the first step in network
security is the authentication, this paper presents a proposed modal for secure mobile
banking (m-banking) applications using Kerberos (the network authentication protocol).
The aim of this paper is to establish a secure communication between the clients and
mobile-bank application server in which they can use their mobile phone to securely access
their bank accounts, make and receive payments, and check their balances.
The integration of smart card into classic Kerberos enhances the security for client
authentication by storing the cryptographic keys and perform dual factor authentication.
Other enhancement to Kerberos is the PKINIT in which the shared key is mapped with
public- private key. To build a robust client authentication the client uses his/her mobile
phone to author Kerberos's messages, process the replay and establish secure
communication with the application server.