884 resultados para Biometric authentication
Resumo:
In this paper, we have proposed a centralized multicast authentication protocol (MAP) for dynamic multicast groups in wireless networks. In our protocol, a multicast group is defined only at the time of the multicasting. The authentication server (AS) in the network generates a session key and authenticates it to each of the members of a multicast group using the computationally inexpensive least common multiple (LCM) method. In addition, a pseudo random function (PRF) is used to bind the secret keys of the network members with their identities. By doing this, the AS is relieved from storing per member secrets in its memory, making the scheme completely storage scalable. The protocol minimizes the load on the network members by shifting the computational tasks towards the AS node as far as possible. The protocol possesses a membership revocation mechanism and is protected against replay attack and brute force attack. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.
Resumo:
The basic requirements for secure communication in a vehicular ad hoc network (VANET) are anonymous authentication with source non-repudiation and integrity. The existing security protocols in VANETs do not differentiate between the anonymity requirements of different vehicles and the level of anonymity provided by these protocols is the same for all the vehicles in a network. To provide high level of anonymity, the resource requirements of security protocol would also be high. Hence, in a resource constrained VANET, it is necessary to differentiate between the anonymity requirements of different vehicles and to provide the level of anonymity to a vehicle as per its requirement. In this paper, we have proposed a novel protocol for authentication which can provide multiple levels of anonymity in VANETs. The protocol makes use of identity based signature mechanism and pseudonyms to implement anonymous authentication with source non-repudiation and integrity. By controlling the number of pseudonyms issued to a vehicle and the lifetime of each pseudonym for a vehicle, the protocol is able to control the level of anonymity provided to a vehicle. In addition, the protocol includes a novel pseudonym issuance policy using which the protocol can ensure the uniqueness of a newly generated pseudonym by checking only a very small subset of the set of pseudonyms previously issued to all the vehicles. The protocol cryptographically binds an expiry date to each pseudonym, and in this way, enforces an implicit revocation for the pseudonyms. Analytical and simulation results confirm the effectiveness of the proposed protocol.
Resumo:
Anonymity and authenticity are both important yet often conflicting security goals in a wide range of applications. On the one hand for many applications (say for access control) it is crucial to be able to verify the identity of a given legitimate party (a.k.a. entity authentication). Alternatively an application might require that no one but a party can communicate on its behalf (a.k.a. message authentication). Yet, on the other hand privacy concerns also dictate that anonymity of a legitimate party should be preserved; that is no information concerning the identity of parties should be leaked to an outside entity eavesdropping on the communication. This conflict becomes even more acute when considering anonymity with respect to an active entity that may attempt to impersonate other parties in the system. In this work we resolve this conflict in two steps. First we formalize what it means for a system to provide both authenticity and anonymity even in the presence of an active man-in-the-middle adversary for various specific applications such as message and entity authentication using the constructive cryptography framework of Mau11, MR11]. Our approach inherits the composability statement of constructive cryptography and can therefore be directly used in any higher-level context. Next we demonstrate several simple protocols for realizing these systems, at times relying on a new type of (probabilistic) Message Authentication Code (MAC) called key indistinguishable (KI) MACs. Similar to the key hiding encryption schemes of BBDP01] they guarantee that tags leak no discernible information about the keys used to generate them.
Resumo:
ENGLISH: It is important to the Inter-American Tropical Tuna Commission to know whether the anchoveta (Cetengraulis mysticetus), the principal tuna bait species in the Eastern Tropical Pacific Ocean, is composed of one or several populations. Earlier research indicated that, on the basis of significant differences in certain meristic counts, populations of this species in six of the major baiting localities between Mexico and Peru, should provisionally be considered as separate stocks. Since that time, additional collections of anchovetas have been obtained from these and other intervening localities. Purpose of the present study was to confirm the results of the earlier work, and to determine whether the differences in the meristic counts persisted from year to year, as well as to examine certain morphometric characters of the fish from these areas, and to learn whether the populations from the other localities are also separate entities. SPANISH: La Comisión Interamericana del Atún Tropical está interesada en saber si la anchoveta (Ceteugrautís mvsticetus}, la principal especie usada como cebo para la pesca del atún en el Océano Pacífico Oriental Tropical, está compuesta de una o de varias poblaciones. Investigaciones previas indicaron que, a base de diferencias significativas encontradas en ciertos caracteres numéricos, las poblaciones de esta especie en seis de las principales localidades entre México y Perú, podían ser consideradas provisionalmente como pertenecientes a "stocks'' separados. Desde entonces se han venido haciendo recolecciones adicionales de anchovetas en éstas y otras localidades intermedias. El propósito del presente trabajo ha sido confirmar los resultados obtenidos previamente, y determinar si las diferencias en los caracteres numéricos han persistido de un año a otro, así como examinar ciertos caracteres morfométricos en los peces de estas áreas, y resolver si las poblaciones de las nuevas localidades muestreadas son también entidades diferentes. (PDF contains 76 pages.)
Resumo:
The length-weight relationship and biometric study of three species of sciaenids viz. Othlithes cuvieri, Johnieops vogleri and Johnius macrorhynus are reported. For all the three species the regression coefficient between the sexes was found to be not significant at 5% level. Biometric study indicates that correlation among the various characters compared was fairly good while the meristic data agree well with published data.
Resumo:
This study describes the molecular identification of sixteen fish species present in processed products imported into Iran for human consumption. DNA barcoding using direct sequencing of about 650 bp of the mitochondrial Cytochrome Oxidase subunit I gene revealed incorrect labeling (31.25%). Substitution of fish species constitutes serious economic fraud, and our results increase concern regarding the trading of processed fish products in Iran from both health and conservation points of view.