Do you want to publish a course? Click here

Secure Mobile Authentication in single sign-on systems

التوثيق الآمن للأجهزة المحمولة في نظام الولوج الموحد

951   1   1   0.0 ( 0 )
 Publication date 2013
and research's language is English
 Created by Shamra Editor




Ask ChatGPT about the research

User authentication means the verification of a user identity in a computer system. In a typical scenario, users in an organization have access to several independent services, each of them requires separate credentials (e.g. , user name and password) for user authentication.


Artificial intelligence review:
Research summary
تتناول هذه الرسالة موضوع التوثيق الآمن للمستخدمين في الأنظمة الحاسوبية، مع التركيز على تقنية تسجيل الدخول الموحد (SSO) واستخدام الهواتف المحمولة كرمز أمان. يوضح البحث أن تسجيل الدخول الموحد يمكن أن يزيد من إنتاجية المستخدمين ورضاهم، ويقلل من المكالمات إلى مكاتب الدعم، ويحسن قابلية استخدام النظام. كما يقدم البحث دراسة تفصيلية لتقنيات التوثيق القوي على الويب، بما في ذلك استخدام الهواتف المحمولة كرمز أمان. يتمثل الإسهام الرئيسي للبحث في تقديم طريقة توثيق قوية باستخدام الهاتف المحمول كرمز أمان ومنتج لكلمة مرور لمرة واحدة. تم اختبار المفهوم المقترح على موقع ويب لمشغل اتصالات وتم تنفيذ نموذج أولي للحل مع ميزات الوصول الوظيفية فقط.
Critical review
تقدم هذه الرسالة إسهامًا مهمًا في مجال التوثيق الآمن باستخدام الهواتف المحمولة، ولكن هناك بعض النقاط التي يمكن تحسينها. أولاً، قد يكون من الأفضل تقديم تحليل أكثر تفصيلاً للتحديات الأمنية المحتملة التي قد تواجه النظام المقترح، مثل هجمات الرجل في المنتصف. ثانيًا، يمكن تحسين تجربة المستخدم من خلال تقديم واجهة مستخدم أكثر بساطة وسهولة في الاستخدام. أخيرًا، يمكن أن يكون هناك مزيد من التركيز على كيفية تكامل النظام مع الأنظمة الحالية في المؤسسات المختلفة.
Questions related to the research
  1. ما هي الفوائد الرئيسية لتقنية تسجيل الدخول الموحد (SSO)؟

    تزيد تقنية تسجيل الدخول الموحد من إنتاجية المستخدمين ورضاهم، وتقلل من المكالمات إلى مكاتب الدعم، وتحسن قابلية استخدام النظام.

  2. ما هو الإسهام الرئيسي للبحث؟

    الإسهام الرئيسي للبحث هو تقديم طريقة توثيق قوية باستخدام الهاتف المحمول كرمز أمان ومنتج لكلمة مرور لمرة واحدة.

  3. ما هي التحديات الأمنية المحتملة التي قد تواجه النظام المقترح؟

    من التحديات الأمنية المحتملة هجمات الرجل في المنتصف، والتي قد تتطلب تحليلًا أكثر تفصيلاً في البحث.

  4. كيف يمكن تحسين تجربة المستخدم للنظام المقترح؟

    يمكن تحسين تجربة المستخدم من خلال تقديم واجهة مستخدم أكثر بساطة وسهولة في الاستخدام، وتوفير إرشادات واضحة للمستخدمين.


References used
RSA.Fraud Report: the year in phishing, january 2013
rate research

Read More

Mobile Wireless Sensor Network (MWSN) is an emerging technology for attraction of researchers with its research advantage and various application domains. Due to limited resources of sensor nodes such as transmission power, communication capability and size of memory, data aggregation algorithms are the most practical technique that reduces large amount of transmission in this network. Security is an important criterion to be considered because, wireless sensor nodes are deployed in a remote or hostile environment area that is prone to attacks easily. Therefore, security are essential issue for MWSN to protect information against attacks. In this research, we offered an algorithm of secure data aggregation in MWSN based on pair-wise keys technology and hash function. We studied important parameters such as execution time, end-to-end delay and number of storied keys. Results showed that
Mobile ad-hoc Networking MANETS is a promising concept to provide flexible, adaptive, and reconfigurable architecture, cost effective solution.In the mobile ad hoc network security is the basic concern for network functions work properly.Routing is t he corner stone in Mobile ad-hoc Networks, A lot of known vulnerabilities and security threats can be exploited to attack routing messages, so it is important to provide secure routing protocol for MANETs.In this paper, we present a secure extension for ad-hoc On Demand Distance Vector Protocol (AODV). The default routing protocol for MANETs. The proposed protocol ensures that discovery of the route between the nodes is functioning properly and securely, achieving mutual authentication between nodes, routing message integrity, generating a security key of data sent and exchanges it securely to ensure confidentiality and all of these are in one stage. By this we save in wireless band, resource consumption, preventing duplicate of authentication algorithms.
Wireless Sensor Networks (WSNs) are deployed in adversarial environments and used for critical applications such as battle field surveillance and medical monitoring, then security weaknesses become a big concern. The severe resource constraints of WSNs give rise to the need for resource bound security solutions. The Implicit Geographic Forwarding Protocol (IGF) is considered stateless, which means that it does not contain any routing tables and does not depend on the knowledge of the network topology, or on the presence or absence of the node in WSN. This protocol is developed to provide a range of mechanisms that increase security in IGF. Thus it keeps the dynamic connectivity features and provides effective defenses against potential attacks. These mechanisms supported the security against several attacks as Black hole, Sybil and Retransmission attacks, but the problem was the inability of mechanisms to deal with physical attack. This research deals with a detailed study of the SIGF-2 protocol and proposes an improvement for it, in which we use the concept of deployment knowledge from random key pool algorithm of keys management to defend against physical attack . The evaluation of simulation results, with different parameters, proved that our proposal had improved the studied protocol.
A new system was designed in portable plants-eater to improve the performance and productivity and for using it in the harsh environment containing like-cane dense brushes with high efficiency, quality and lowest power requirement and to harvest so me crops are grown in small areas. The new system includes three types: link chain, straight blades chain and oblique blades chain, each chain is fixed on central aluminum disk. the three chains were tested on tensile, the results were satisfactory. The cutters was tested in the field on four types of stalk Wheat, Yellow Maize, Sorghum Helpenese and imperata cylindrical. Cutting force, productivity, fuel consumption, power requirement was calculated with deferent rotation speeds. The straight blades chain has the best cutting quality and lowest energy requirement on maize and sorghum halepense, the oblique blades chain was better on wheat and imperata cylindrical. The greatest values of energy requirement and cutting forces appeared with link chain cutter-head. In general, these cutter-heads are useable in weed-eater with higher efficiency than the old designs.
With the huge development in the field of data storing and processing as well as the impending development of the internet, accessing information and resources is becoming faster, cheaper and more available. This has paved the way for a new develo pment in the world of computing, networks and operating systems, which is “Cloud Computing”. In this project, we present a solution for the problem of secure data sharing in a safe and dynamic way on Public Cloud. The process is done without re-encrypting the shared data or re-distributing keys as the case in most solutions so far. Also, include a step towards the completion of access control UCON, where we studied the ability for a user to delegate another user OWNER role and sharing data authorization.
comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا