NASA Astrophysics Data System (ADS)
Polyakov, M.; Odinokov, S.
2017-05-01
The report focuses on special printing industry, which is called secure printing, which uses printing techniques to prevent forgery or falsification of security documents. The report considered the possibility of establishing a spectral device for determining the authenticity of certain documents that are protected by machine-readable luminophor labels. The device works in two spectral ranges - visible and near infrared that allows to register Stokes and anti-Stokes spectral components of protective tags. The proposed device allows verification of the authenticity of security documents based on multiple criteria in different spectral ranges. It may be used at enterprises related to the production of security printing products, expert units of law enforcement bodies at check of authenticity of banknotes and other structures.
Australian DefenceScience. Volume 16, Number 2, Winter
2008-01-01
Making Virtual Advisers speedily interactive To provide an authentically interactive experience for humans working with Virtual Advisers, the Virtual...peer trusted and strong authentication for checking of security credentials without recourse to third parties or infrastructure, thus eliminating...multiple passwords, or carry around multiple security tokens.” Each CodeStick device is readied for use with a biometric authentication process. Since
A Lightweight Continuous Authentication Protocol for the Internet of Things.
Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-04-05
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.
Elemental Scanning Devices Authenticate Works of Art
NASA Technical Reports Server (NTRS)
2013-01-01
To better detect aluminum compounds, Marshall Space Flight Center partnered with KeyMaster Inc. (later acquired by Madison, Wisconsin-based Bruker AXS Inc.) to develop a vacuum pump system that could be attached to X-ray fluorescence (XRF) scanners. The resulting technology greatly expanded XRF scanner capabilities, and hundreds of museums now use them to authenticate artifacts and works of art.
A Lightweight Continuous Authentication Protocol for the Internet of Things
Chuang, Yo-Hsuan; Yang, Cheng-Ying; Tang, Ssu-Wei
2018-01-01
Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments. PMID:29621168
PANATIKI: A Network Access Control Implementation Based on PANA for IoT Devices
Sanchez, Pedro Moreno; Lopez, Rafa Marin; Gomez Skarmeta, Antonio F.
2013-01-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices. PMID:24189332
PANATIKI: a network access control implementation based on PANA for IoT devices.
Moreno Sanchez, Pedro; Marin Lopez, Rafa; Gomez Skarmeta, Antonio F
2013-11-01
Internet of Things (IoT) networks are the pillar of recent novel scenarios, such as smart cities or e-healthcare applications. Among other challenges, these networks cover the deployment and interaction of small devices with constrained capabilities and Internet protocol (IP)-based networking connectivity. These constrained devices usually require connection to the Internet to exchange information (e.g., management or sensing data) or access network services. However, only authenticated and authorized devices can, in general, establish this connection. The so-called authentication, authorization and accounting (AAA) services are in charge of performing these tasks on the Internet. Thus, it is necessary to deploy protocols that allow constrained devices to verify their credentials against AAA infrastructures. The Protocol for Carrying Authentication for Network Access (PANA) has been standardized by the Internet engineering task force (IETF) to carry the Extensible Authentication Protocol (EAP), which provides flexible authentication upon the presence of AAA. To the best of our knowledge, this paper is the first deep study of the feasibility of EAP/PANA for network access control in constrained devices. We provide light-weight versions and implementations of these protocols to fit them into constrained devices. These versions have been designed to reduce the impact in standard specifications. The goal of this work is two-fold: (1) to demonstrate the feasibility of EAP/PANA in IoT devices; (2) to provide the scientific community with the first light-weight interoperable implementation of EAP/PANA for constrained devices in the Contiki operating system (Contiki OS), called PANATIKI. The paper also shows a testbed, simulations and experimental results obtained from real and simulated constrained devices.
Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing.
Ehatisham-Ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar
2017-09-06
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework.
Authentication of Smartphone Users Based on Activity Recognition and Mobile Sensing
Ehatisham-ul-Haq, Muhammad; Azam, Muhammad Awais; Loo, Jonathan; Shuang, Kai; Islam, Syed; Naeem, Usman; Amin, Yasar
2017-01-01
Smartphones are context-aware devices that provide a compelling platform for ubiquitous computing and assist users in accomplishing many of their routine tasks anytime and anywhere, such as sending and receiving emails. The nature of tasks conducted with these devices has evolved with the exponential increase in the sensing and computing capabilities of a smartphone. Due to the ease of use and convenience, many users tend to store their private data, such as personal identifiers and bank account details, on their smartphone. However, this sensitive data can be vulnerable if the device gets stolen or lost. A traditional approach for protecting this type of data on mobile devices is to authenticate users with mechanisms such as PINs, passwords, and fingerprint recognition. However, these techniques are vulnerable to user compliance and a plethora of attacks, such as smudge attacks. The work in this paper addresses these challenges by proposing a novel authentication framework, which is based on recognizing the behavioral traits of smartphone users using the embedded sensors of smartphone, such as Accelerometer, Gyroscope and Magnetometer. The proposed framework also provides a platform for carrying out multi-class smart user authentication, which provides different levels of access to a wide range of smartphone users. This work has been validated with a series of experiments, which demonstrate the effectiveness of the proposed framework. PMID:28878177
Hardware device binding and mutual authentication
Hamlet, Jason R; Pierson, Lyndon G
2014-03-04
Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.
Hamlet, Jason R; Pierson, Lyndon G
2014-10-21
Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.
Analog Video Authentication and Seal Verification Equipment Development
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gregory Lancaster
Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital imagesmore » and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.« less
Multi-factor authentication using quantum communication
Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.
2018-02-06
Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.
Obfuscated authentication systems, devices, and methods
Armstrong, Robert C; Hutchinson, Robert L
2013-10-22
Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.
A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network
Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi
2016-01-01
Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.’s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.’s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client’s privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay. PMID:27171160
Secured Hash Based Burst Header Authentication Design for Optical Burst Switched Networks
NASA Astrophysics Data System (ADS)
Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.
2017-12-01
The optical burst switching (OBS) is a promising technology that could meet the fast growing network demand. They are featured with the ability to meet the bandwidth requirement of applications that demand intensive bandwidth. OBS proves to be a satisfactory technology to tackle the huge bandwidth constraints, but suffers from security vulnerabilities. The objective of this proposed work is to design a faster and efficient burst header authentication algorithm for core nodes. There are two important key features in this work, viz., header encryption and authentication. Since the burst header is an important in optical burst switched network, it has to be encrypted; otherwise it is be prone to attack. The proposed MD5&RC4-4S based burst header authentication algorithm runs 20.75 ns faster than the conventional algorithms. The modification suggested in the proposed RC4-4S algorithm gives a better security and solves the correlation problems between the publicly known outputs during key generation phase. The modified MD5 recommended in this work provides 7.81 % better avalanche effect than the conventional algorithm. The device utilization result also shows the suitability of the proposed algorithm for header authentication in real time applications.
Park, Chang-Seop
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance.
2014-01-01
After two recent security attacks against implantable medical devices (IMDs) have been reported, the privacy and security risks of IMDs have been widely recognized in the medical device market and research community, since the malfunctioning of IMDs might endanger the patient's life. During the last few years, a lot of researches have been carried out to address the security-related issues of IMDs, including privacy, safety, and accessibility issues. A physician accesses IMD through an external device called a programmer, for diagnosis and treatment. Hence, cryptographic key management between IMD and programmer is important to enforce a strict access control. In this paper, a new security architecture for the security of IMDs is proposed, based on a 3-Tier security model, where the programmer interacts with a Hospital Authentication Server, to get permissions to access IMDs. The proposed security architecture greatly simplifies the key management between IMDs and programmers. Also proposed is a security mechanism to guarantee the authenticity of the patient data collected from IMD and the nonrepudiation of the physician's treatment based on it. The proposed architecture and mechanism are analyzed and compared with several previous works, in terms of security and performance. PMID:25276797
Secure voice-based authentication for mobile devices: vaulted voice verification
NASA Astrophysics Data System (ADS)
Johnson, R. C.; Scheirer, Walter J.; Boult, Terrance E.
2013-05-01
As the use of biometrics becomes more wide-spread, the privacy concerns that stem from the use of biometrics are becoming more apparent. As the usage of mobile devices grows, so does the desire to implement biometric identification into such devices. A large majority of mobile devices being used are mobile phones. While work is being done to implement different types of biometrics into mobile phones, such as photo based biometrics, voice is a more natural choice. The idea of voice as a biometric identifier has been around a long time. One of the major concerns with using voice as an identifier is the instability of voice. We have developed a protocol that addresses those instabilities and preserves privacy. This paper describes a novel protocol that allows a user to authenticate using voice on a mobile/remote device without compromising their privacy. We first discuss the Vaulted Verification protocol, which has recently been introduced in research literature, and then describe its limitations. We then introduce a novel adaptation and extension of the Vaulted Verification protocol to voice, dubbed Vaulted Voice Verification (V3). Following that we show a performance evaluation and then conclude with a discussion of security and future work.
Pires, Nuno M M; Tao Dong; Berntzen, Lasse; Lonningdal, Torill
2017-07-01
This work focuses on the development of a sophisticated technique via STR typing to unequivocally verify the authenticity of urine samples before sent to laboratories. STR profiling was conducted with the CSF1PO, TPOX, TH01 Multiplex System coupled with a smartphone-based detection method. The promising capability of the method to identify distinct STR profiles from urine of different persons opens the possibility to conduct sample authenticity tests. On-site STR profiling could be realized with a self-contained autonomous device with an integrated PCR microchip shown hereby.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-06-28
... INTERNATIONAL TRADE COMMISSION [Investigation No. 337-TA-697] In the Matter of Certain Authentication Systems, Including Software and Handheld Electronic Devices; Notice of Commission Decision Not to... importation of certain authentication systems, including software and handheld electronic devices, by reason...
A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics.
Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai
2018-01-10
Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user's fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication.
A Continuous Identity Authentication Scheme Based on Physiological and Behavioral Characteristics
Wu, Guannan; Wang, Jian; Zhang, Yongrong; Jiang, Shuai
2018-01-01
Wearable devices have flourished over the past ten years providing great advantages to people and, recently, they have also been used for identity authentication. Most of the authentication methods adopt a one-time authentication manner which cannot provide continuous certification. To address this issue, we present a two-step authentication method based on an own-built fingertip sensor device which can capture motion data (e.g., acceleration and angular velocity) and physiological data (e.g., a photoplethysmography (PPG) signal) simultaneously. When the device is worn on the user’s fingertip, it will automatically recognize whether the wearer is a legitimate user or not. More specifically, multisensor data is collected and analyzed to extract representative and intensive features. Then, human activity recognition is applied as the first step to enhance the practicability of the authentication system. After correctly discriminating the motion state, a one-class machine learning algorithm is applied for identity authentication as the second step. When a user wears the device, the authentication process is carried on automatically at set intervals. Analyses were conducted using data from 40 individuals across various operational scenarios. Extensive experiments were executed to examine the effectiveness of the proposed approach, which achieved an average accuracy rate of 98.5% and an F1-score of 86.67%. Our results suggest that the proposed scheme provides a feasible and practical solution for authentication. PMID:29320463
Seo, Jung Woo; Lee, Sang Jin
2016-01-01
Weather information provides a safe working environment by contributing to the economic activity of the nation, and plays role of the prevention of natural disasters, which can cause large scaled casualties and damage of property. Especially during times of war, weather information plays a more important role than strategy, tactics and information about trends of the enemy. Also, it plays an essential role for the taking off and landing of fighter jet and the sailing of warships. If weather information, which plays a major role in national security and economy, gets misused for cyber terrorism resulting false weather information, it could be a huge threat for national security and the economy. We propose a plan to safely transmit the measured value from meteorological sensors through a meteorological telecommunication network in order to guarantee the confidentiality and integrity of the data despite cyber-attacks. Also, such a plan allows one to produce reliable weather forecasts by performing mutual authentication through authentication devices. To make sure of this, one can apply an Identity Based Signature to ensure the integrity of measured data, and transmit the encrypted weather information with mutual authentication about the authentication devices. There are merits of this research: It is not necessary to manage authentication certificates unlike the Public Key Infrastructure methodology, and it provides a powerful security measure with the capability to be realized in a small scale computing environment, such as the meteorological observation system due to the low burden on managing keys.
DOE Office of Scientific and Technical Information (OSTI.GOV)
A series of software programs that enables students to progress from completely unsecured control of devices to control that protects network commands with authentication, integrity and confidentiality. The working example provided is for turning LED lights on and off on a Raspberry Pi computer.
Authentication Without Secrets
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pierson, Lyndon G.; Robertson, Perry J.
This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integritymore » of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.« less
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan; Jassim, Sabah; Sellahewa, Harin
2010-04-01
The use of mobile communication devices with advance sensors is growing rapidly. These sensors are enabling functions such as Image capture, Location applications, and Biometric authentication such as Fingerprint verification and Face & Handwritten signature recognition. Such ubiquitous devices are essential tools in today's global economic activities enabling anywhere-anytime financial and business transactions. Cryptographic functions and biometric-based authentication can enhance the security and confidentiality of mobile transactions. Using Biometric template security techniques in real-time biometric-based authentication are key factors for successful identity verification solutions, but are venerable to determined attacks by both fraudulent software and hardware. The EU-funded SecurePhone project has designed and implemented a multimodal biometric user authentication system on a prototype mobile communication device. However, various implementations of this project have resulted in long verification times or reduced accuracy and/or security. This paper proposes to use built-in-self-test techniques to ensure no tampering has taken place on the verification process prior to performing the actual biometric authentication. These techniques utilises the user personal identification number as a seed to generate a unique signature. This signature is then used to test the integrity of the verification process. Also, this study proposes the use of a combination of biometric modalities to provide application specific authentication in a secure environment, thus achieving optimum security level with effective processing time. I.e. to ensure that the necessary authentication steps and algorithms running on the mobile device application processor can not be undermined or modified by an imposter to get unauthorized access to the secure system.
Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi
2017-09-21
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.
Han, Youn-Hee; Min, Sung-Gi
2017-01-01
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152
Hardware device to physical structure binding and authentication
Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.
2013-08-20
Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.
ERIC Educational Resources Information Center
Hsu, Yu-Chang; Ching, Yu-Hui
2012-01-01
This research applied a mixed-method design to explore how best to promote learning in authentic contexts in an online graduate course in instructional message design. The students used Twitter apps on their mobile devices to collect, share, and comment on authentic design examples found in their daily lives. The data sources included tweets…
Hamlet, Jason R; Bauer, Todd M; Pierson, Lyndon G
2014-09-30
Deterrence of device subversion by substitution may be achieved by including a cryptographic fingerprint unit within a computing device for authenticating a hardware platform of the computing device. The cryptographic fingerprint unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware platform. The PUF circuit is used to generate a PUF value. A key generator is coupled to generate a private key and a public key based on the PUF value while a decryptor is coupled to receive an authentication challenge posed to the computing device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.
Caranguian, Luther Paul R; Pancho-Festin, Susan; Sison, Luis G
2012-01-01
In this study, we focused on the interoperability and authentication of medical devices in the context of telemedical systems. A recent standard called the ISO/IEEE 11073 Personal Health Device (X73-PHD) Standards addresses the device interoperability problem by defining common protocols for agent (medical device) and manager (appliance) interface. The X73-PHD standard however has not addressed security and authentication of medical devices which is important in establishing integrity of a telemedical system. We have designed and implemented a security policy within the X73-PHD standards. The policy will enable device authentication using Asymmetric-Key Cryptography and the RSA algorithm as the digital signature scheme. We used two approaches for performing the digital signatures: direct software implementation and use of embedded security modules (ESM). The two approaches were evaluated and compared in terms of execution time and memory requirement. For the standard 2048-bit RSA, ESM calculates digital signatures only 12% of the total time for the direct implementation. Moreover, analysis shows that ESM offers more security advantage such as secure storage of keys compared to using direct implementation. Interoperability with other systems was verified by testing the system with LNI Healthlink, a manager software that implements the X73-PHD standard. Lastly, security analysis was done and the system's response to common attacks on authentication systems was analyzed and several measures were implemented to protect the system against them.
van den Bosch, Ralph; Taris, Toon W
2014-01-01
Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.
Flexible and Transparent User Authentication for Mobile Devices
NASA Astrophysics Data System (ADS)
Clarke, Nathan; Karatzouni, Sevasti; Furnell, Steven
The mobile device has become a ubiquitous technology that is capable of supporting an increasingly large array of services, applications and information. Given their increasing importance, it is imperative to ensure that such devices are not misused or abused. Unfortunately, a key enabling control to prevent this, user authentication, has not kept up with the advances in device technology. This paper presents the outcomes of a 2 year study that proposes the use of transparent and continuous biometric authentication of the user: providing more comprehensive identity verification; minimizing user inconvenience; and providing security throughout the period of use. A Non-Intrusive and Continuous Authentication (NICA) system is described that maintains a continuous measure of confidence in the identity of the user, removing access to sensitive services and information with low confidence levels and providing automatic access with higher confidence levels. An evaluation of the framework is undertaken from an end-user perspective via a trial involving 27 participants. Whilst the findings raise concerns over education, privacy and intrusiveness, overall 92% of users felt the system offered a more secure environment when compared to existing forms of authentication.
Using cloud models of heartbeats as the entity identifier to secure mobile devices.
Fu, Donglai; Liu, Yanhua
2017-01-01
Mobile devices are extensively used to store more private and often sensitive information. Therefore, it is important to protect them against unauthorised access. Authentication ensures that authorised users can use mobile devices. However, traditional authentication methods, such as numerical or graphic passwords, are vulnerable to passive attacks. For example, an adversary can steal the password by snooping from a shorter distance. To avoid these problems, this study presents a biometric approach that uses cloud models of heartbeats as the entity identifier to secure mobile devices. Here, it is identified that these concepts including cloud model or cloud have nothing to do with cloud computing. The cloud model appearing in the study is the cognitive model. In the proposed method, heartbeats are collected by two ECG electrodes that are connected to one mobile device. The backward normal cloud generator is used to generate ECG standard cloud models characterising the heartbeat template. When a user tries to have access to their mobile device, cloud models regenerated by fresh heartbeats will be compared with ECG standard cloud models to determine if the current user can use this mobile device. This authentication method was evaluated from three aspects including accuracy, authentication time and energy consumption. The proposed method gives 86.04% of true acceptance rate with 2.73% of false acceptance rate. One authentication can be done in 6s, and this processing consumes about 2000 mW of power.
Privacy preserving, real-time and location secured biometrics for mCommerce authentication
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Al-Assam, Hisham; Jassim, Sabah; Lami, Ihsan A.
2011-06-01
Secure wireless connectivity between mobile devices and financial/commercial establishments is mature, and so is the security of remote authentication for mCommerce. However, the current techniques are open for hacking, false misrepresentation, replay and other attacks. This is because of the lack of real-time and current-precise-location in the authentication process. This paper proposes a new technique that includes freshly-generated real-time personal biometric data of the client and present-position of the mobile device used by the client to perform the mCommerce so to form a real-time biometric representation to authenticate any remote transaction. A fresh GPS fix generates the "time and location" to stamp the biometric data freshly captured to produce a single, real-time biometric representation on the mobile device. A trusted Certification Authority (CA) acts as an independent authenticator of such client's claimed realtime location and his/her provided fresh biometric data. Thus eliminates the necessity of user enrolment with many mCommerce services and application providers. This CA can also "independently from the client" and "at that instant of time" collect the client's mobile device "time and location" from the cellular network operator so to compare with the received information, together with the client's stored biometric information. Finally, to preserve the client's location privacy and to eliminate the possibility of cross-application client tracking, this paper proposes shielding the real location of the mobile device used prior to submission to the CA or authenticators.
A Hybrid Authentication and Authorization Process for Control System Networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.
2010-08-25
Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybridmore » authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.« less
ERIC Educational Resources Information Center
Everett, Donna R.
This guide presents performance-based authentic assessment ideas, samples, and suggestions to help marketing teachers and students respond to changes and pressures from outside the classroom. It contains 21 activities, each accompanied by a method of authentic assessment. In most cases, the authentic assessment method is a scoring device. The…
User authentication based on the NFC host-card-emulation technology
NASA Astrophysics Data System (ADS)
Kološ, Jan; Kotyrba, Martin
2017-11-01
This paper deals with implementation of algorithms for data exchange between mobile devices supporting NFC HCE (Host-Card-Emulation) and a contactless NFC reader communicating in a read/write mode. This solution provides multiplatform architecture for data exchange between devices with a focus on safe and simple user authentication.
Emmerich, Astrid I; Rigotti, Thomas
2017-01-01
This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle.
Park, Namje; Kang, Namhi
2015-12-24
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, "things" are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks.
Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.
Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu
2016-01-01
People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.
Self-organized Anonymous Authentication in Mobile Ad Hoc Networks
NASA Astrophysics Data System (ADS)
Freudiger, Julien; Raya, Maxim; Hubaux, Jean-Pierre
Pervasive communications bring along new privacy challenges, fueled by the capability of mobile devices to communicate with, and thus “sniff on”, each other directly. We design a new mechanism that aims at achieving location privacy in these forthcoming mobile networks, whereby mobile nodes collect the pseudonyms of the nodes they encounter to generate their own privacy cloaks. Thus, privacy emerges from the mobile network and users gain control over the disclosure of their locations. We call this new paradigm self-organized location privacy. In this work, we focus on the problem of self-organized anonymous authentication that is a necessary prerequisite for location privacy. We investigate, using graph theory, the optimality of different cloak constructions and evaluate with simulations the achievable anonymity in various network topologies. We show that peer-to-peer wireless communications and mobility help in the establishment of self-organized anonymous authentication in mobile networks.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things.
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-07
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie-Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes.
Authentication Based on Non-Interactive Zero-Knowledge Proofs for the Internet of Things
Martín-Fernández, Francisco; Caballero-Gil, Pino; Caballero-Gil, Cándido
2016-01-01
This paper describes the design and analysis of a new scheme for the authenticated exchange of confidential information in insecure environments within the Internet of Things, which allows a receiver of a message to authenticate the sender and compute a secret key shared with it. The proposal is based on the concept of a non-interactive zero-knowledge proof, so that in a single communication, relevant data may be inferred to verify the legitimacy of the sender. Besides, the new scheme uses the idea under the Diffie–Hellman protocol for the establishment of a shared secret key. The proposal has been fully developed for platforms built on the Android Open Source Project, so it can be used in any device or sensor with this operating system. This work provides a performance study of the implementation and a comparison between its promising results and others obtained with similar schemes. PMID:26751454
Ivanov, Vladimir I; Yu, Paul L; Baras, John S
2010-09-01
Medical information is extremely sensitive in nature - a compromise, such as eavesdropping or tampering by a malicious third party, may result in identity theft, incorrect diagnosis and treatment, and even death. Therefore, it is important to secure the transfer of medical information from the patient to the recording system. We consider a portable, wireless device transferring medical information to a remote server. We decompose this problem into two sub-problems and propose security solutions to each of them: (1) to secure the link between the patient and the portable device, and (2) to secure the link between the portable device and the network. Thus we push the limits of the network security to the edge by authenticating the user using their biometric information; authenticating the device to the network at the physical layer; and strengthening the security of the wireless link with a key exchange mechanism. The proposed authentication methods can be used for recording the readings of medical data in a central database and for accessing medical records in various settings.
Emmerich, Astrid I.; Rigotti, Thomas
2017-01-01
This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work ability and depressivity, but not intrinsic motivation at T2, about 6 months later. Work-related authenticity at T2 was predicted by intrinsic motivation and depressivity, but not by work ability at T1. We conclude that work-related authenticity and healthy psychological functioning are positively reinforcing each other. Thus, enabling employees to be authentic supposedly increases their well-being and is a pivotal opportunity for organizations to foster health and performance-related indicators like work ability and prevent negative health indicators like depressivity. At the same time, authenticity of employees can be fostered through workplace health promotion. PMID:28316581
Recognizing User Identity by Touch on Tabletop Displays: An Interactive Authentication Method
ERIC Educational Resources Information Center
Torres Peralta, Raquel
2012-01-01
Multi-touch tablets allow users to interact with computers through intuitive, natural gestures and direct manipulation of digital objects. One advantage of these devices is that they can offer a large, collaborative space where several users can work on a task at the same time. However the lack of privacy in these situations makes standard…
A DRM based on renewable broadcast encryption
NASA Astrophysics Data System (ADS)
Ramkumar, Mahalingam; Memon, Nasir
2005-07-01
We propose an architecture for digital rights management based on a renewable, random key pre-distribution (KPD) scheme, HARPS (hashed random preloaded subsets). The proposed architecture caters for broadcast encryption by a trusted authority (TA) and by "parent" devices (devices used by vendors who manufacture compliant devices) for periodic revocation of devices. The KPD also facilitates broadcast encryption by peer devices, which permits peers to distribute content, and efficiently control access to the content encryption secret using subscription secrets. The underlying KPD also caters for broadcast authentication and mutual authentication of any two devices, irrespective of the vendors manufacturing the device, and thus provides a comprehensive solution for securing interactions between devices taking part in a DRM system.
Security challenge to using smartphones for SHM
NASA Astrophysics Data System (ADS)
Abueh, Yeka; Liu, Hong
2016-04-01
Pervasive smartphones have demonstrated great potential in structural health monitoring (SHM) of civil infrastructures. Their sensing, processing, and communication capabilities along with crowdsourcing facility ease technical difficulties and reduce financial burdens of instrumentation and monitoring for SHM in civil infrastructures. However, smartphones are vulnerable to unintentional misuses and malicious attacks. This paper analyzes the vulnerabilities of smartphones in performing SHM and reveals the exploitation of those vulnerabilities. The work probes the attack surface of both devices and data. Device attack scenarios include hacking individual smartphones to modify the data stored on them and orchestrating smartphones to launch a distributed denial-of-service attack. Specifically, experiments are conducted to remotely access an Android smartphone and modify the sensing data of structural health stored on it. The work also presents a case study that reveals the sensitivity of a popular perturbation analysis method to faulty data delivered by a smartphone. The paper provides the direction of meeting the security challenge to using smartphones for SHM. As the first line of defense, device authentication is implemented in the smartphone to stop spoofing. Subsequently, message authentication is devised to maintain data integrity. There is a need to apply data science for the SHM immunity system against the sensitivity to data inaccuracy. The work also evaluates the cost-effectiveness of the proposed security measures, recommending varying levels of security to mitigate the adversaries to smartphones used in SHM systems. It calls for security solutions at the design stage of SHM systems rather than patching up after their implementations.
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment.
Das, Ashok Kumar; Wazid, Mohammad; Kumar, Neeraj; Khan, Muhammad Khurram; Choo, Kim-Kwang Raymond; Park, YoungHo
2017-09-18
Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly-accepted Real-Or-Random model, as well as using the popular formal security verification tool, known as the Automated Validation of Internet Security Protocols and Applications (AVISPA). Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.
Mutual Authentication Scheme in Secure Internet of Things Technology for Comfortable Lifestyle
Park, Namje; Kang, Namhi
2015-01-01
The Internet of Things (IoT), which can be regarded as an enhanced version of machine-to-machine communication technology, was proposed to realize intelligent thing-to-thing communications by utilizing the Internet connectivity. In the IoT, “things” are generally heterogeneous and resource constrained. In addition, such things are connected to each other over low-power and lossy networks. In this paper, we propose an inter-device authentication and session-key distribution system for devices with only encryption modules. In the proposed system, unlike existing sensor-network environments where the key distribution center distributes the key, each sensor node is involved with the generation of session keys. In addition, in the proposed scheme, the performance is improved so that the authenticated device can calculate the session key in advance. The proposed mutual authentication and session-key distribution system can withstand replay attacks, man-in-the-middle attacks, and wiretapped secret-key attacks. PMID:26712759
A user authentication scheme using physiological and behavioral biometrics for multitouch devices.
Koong, Chorng-Shiuh; Yang, Tzu-I; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage.
A User Authentication Scheme Using Physiological and Behavioral Biometrics for Multitouch Devices
Koong, Chorng-Shiuh; Tseng, Chien-Chao
2014-01-01
With the rapid growth of mobile network, tablets and smart phones have become sorts of keys to access personal secured services in our daily life. People use these devices to manage personal finances, shop on the Internet, and even pay at vending machines. Besides, it also helps us get connected with friends and business partners through social network applications, which were widely used as personal identifications in both real and virtual societies. However, these devices use inherently weak authentication mechanism, based upon passwords and PINs that is not changed all the time. Although forcing users to change password periodically can enhance the security level, it may also be considered annoyances for users. Biometric technologies are straightforward because of the simple authentication process. However, most of the traditional biometrics methodologies require diverse equipment to acquire biometric information, which may be expensive and not portable. This paper proposes a multibiometric user authentication scheme with both physiological and behavioral biometrics. Only simple rotations with fingers on multitouch devices are required to enhance the security level without annoyances for users. In addition, the user credential is replaceable to prevent from the privacy leakage. PMID:25147864
Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo
2012-12-01
The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.
NASA Astrophysics Data System (ADS)
Cui, Yank; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki
As pervasive computing technologies develop fast, the privacy protection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is obviously more dangerous. Towards settling this problem, in this paper, we propose two lightweight authentication protocols which are privacy-preserving against active attack, in an asymmetric way. That asymmetric style with privacy-oriented simplification succeeds to reduce the load of low-cost devices and drastically decrease the computation cost for the management of server. This is because that, unlike the usual management of the identities, our approach does not require any synchronization nor exhaustive search in the database, which enjoys great convenience in case of a large-scale system. The protocols are based on a fast asymmetric encryption with specialized simplification and only one cryptographic hash function, which consequently assigns an easy work to pervasive devices. Besides, our results do not require the strong assumption of the random oracle.
Seeing-Is-Believing: Using Camera Phones for Human-Verifiable Authentication
2004-11-01
the context of, e.g., a smart home (Section 7). Our implementation is detailed in Section 8, with a security analysis is Section 9. Section 10...establishment of security parame- ters [17]. This work considers a smart home , where a user may want to establish a security context for controlling...appliances or other devices in a smart - home . We refer to the security property discussed in this work as presence, where it is desirable that only users or
An Efficient Authenticated Key Transfer Scheme in Client-Server Networks
NASA Astrophysics Data System (ADS)
Shi, Runhua; Zhang, Shun
2017-10-01
In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.
Spanakis, Emmanouil G; Spanakis, Marios; Karantanas, Apostolos; Marias, Kostas
2016-08-01
The most commonly used method for user authentication in ICT services or systems is the application of identification tools such as passwords or personal identification numbers (PINs). The rapid development in ICT technology regarding smart devices (laptops, tablets and smartphones) has allowed also the advance of hardware components that capture several biometric traits such as fingerprints and voice. These components are aiming among others to overcome weaknesses and flaws of password usage under the prism of improved user authentication with higher level of security, privacy and usability. To this respect, the potential application of biometrics for secure user authentication regarding access in systems with sensitive data (i.e. patient's data from electronic health records) shows great potentials. SpeechXRays aims to provide a user recognition platform based on biometrics of voice acoustics analysis and audio-visual identity verification. Among others, the platform aims to be applied as an authentication tool for medical personnel in order to gain specific access to patient's electronic health records. In this work a short description of SpeechXrays implementation tool regarding eHealth is provided and analyzed. This study explores security and privacy issues, and offers a comprehensive overview of biometrics technology applications in addressing the e-Health security challenges. We present and describe the necessary requirement for an eHealth platform concerning biometric security.
Authentic leaders creating healthy work environments for nursing practice.
Shirey, Maria R
2006-05-01
Implementation of authentic leadership can affect not only the nursing workforce and the profession but the healthcare delivery system and society as a whole. Creating a healthy work environment for nursing practice is crucial to maintain an adequate nursing workforce; the stressful nature of the profession often leads to burnout, disability, and high absenteeism and ultimately contributes to the escalating shortage of nurses. Leaders play a pivotal role in retention of nurses by shaping the healthcare practice environment to produce quality outcomes for staff nurses and patients. Few guidelines are available, however, for creating and sustaining the critical elements of a healthy work environment. In 2005, the American Association of Critical-Care Nurses released a landmark publication specifying 6 standards (skilled communication, true collaboration, effective decision making, appropriate staffing, meaningful recognition, and authentic leadership) necessary to establish and sustain healthy work environments in healthcare. Authentic leadership was described as the "glue" needed to hold together a healthy work environment. Now, the roles and relationships of authentic leaders in the healthy work environment are clarified as follows: An expanded definition of authentic leadership and its attributes (eg, genuineness, trustworthiness, reliability, compassion, and believability) is presented. Mechanisms by which authentic leaders can create healthy work environments for practice (eg, engaging employees in the work environment to promote positive behaviors) are described. A practical guide on how to become an authentic leader is advanced. A research agenda to advance the study of authentic leadership in nursing practice through collaboration between nursing and business is proposed.
NASA Astrophysics Data System (ADS)
Gharami, Snigdha; Dinakaran, M.
2017-11-01
We see challenges in authenticating each aspect of electronic usage, starting from transaction to social interaction the authenticity and availability of correct information is guided in various ways. Authentication and authorization follow one another; a process of authentication is calculated on multiple layers of steps. In this paper we discuss various possibilities of modifying and using ways to deal with authentication and authorization mechanism. Idea is to work through authentication with mathematical calculations. We will go through various scenarios and find out the system of information that fits best at the moment of need. We will take account of new approaches of authentication and authorization while working on mathematical paradigm of information. The paper also takes an eye on quantum cryptography and discusses on how it could help one in the present scenario. This paper is divided into sections discussing on various paradigm of authentication and how one can achieve it in secure way, this paper is part of research work where analysis of various constraints are to be followed in the extended research work.
NASA Technical Reports Server (NTRS)
Lyle, Stacey D.
2009-01-01
A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server.
Secure and Privacy Enhanced Gait Authentication on Smart Phone
Choi, Deokjai
2014-01-01
Smart environments established by the development of mobile technology have brought vast benefits to human being. However, authentication mechanisms on portable smart devices, particularly conventional biometric based approaches, still remain security and privacy concerns. These traditional systems are mostly based on pattern recognition and machine learning algorithms, wherein original biometric templates or extracted features are stored under unconcealed form for performing matching with a new biometric sample in the authentication phase. In this paper, we propose a novel gait based authentication using biometric cryptosystem to enhance the system security and user privacy on the smart phone. Extracted gait features are merely used to biometrically encrypt a cryptographic key which is acted as the authentication factor. Gait signals are acquired by using an inertial sensor named accelerometer in the mobile device and error correcting codes are adopted to deal with the natural variation of gait measurements. We evaluate our proposed system on a dataset consisting of gait samples of 34 volunteers. We achieved the lowest false acceptance rate (FAR) and false rejection rate (FRR) of 3.92% and 11.76%, respectively, in terms of key length of 50 bits. PMID:24955403
User Authentication in Smartphones for Telehealth
SMITH, KATHERINE A.; ZHOU, LEMING; WATZLAF, VALERIE J. M.
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. PMID:29238444
User Authentication in Smartphones for Telehealth.
Smith, Katherine A; Zhou, Leming; Watzlaf, Valerie J M
2017-01-01
Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.
Analysis of MD5 authentication in various routing protocols using simulation tools
NASA Astrophysics Data System (ADS)
Dinakaran, M.; Darshan, K. N.; Patel, Harsh
2017-11-01
Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.
Authentic leadership: a new theory for nursing or back to basics?
Wong, Carol; Cummings, Greta
2009-01-01
Authentic leadership is an emerging theoretical model purported to focus on the root component of effective leadership. The purpose of this paper is to describe the relevance of authentic leadership to the advancement of nursing leadership practice and research and address the question of whether this is a new theory for leadership or an old one in new packaging. The paper outlines the origins and key elements of the model, assesses the theoretical, conceptual and measurement issues associated with authentic leadership and compares it with other leadership theories frequently reported in the nursing literature. The emerging authentic leadership theory holds promise for explaining the underlying processes by which authentic leaders and followers influence work outcomes and organizational performance. Construct validity of authentic leadership has preliminary documentation and a few studies have shown positive relationships between authenticity and trust. Furthermore, the clarity of the authenticity construct and comprehensiveness of the overall theoretical framework provide a fruitful base for future research examining the relationship between authentic leadership and the creation of healthier work environments. A clear focus on the relational aspects of leadership, the foundational moral/ethical component, a potential linkage of positive psychological capital to work engagement and the emphasis on leader and follower development in the authentic leadership framework are closely aligned to current and future nursing leadership practice and research priorities for the creation of sustainable changes in nursing work environments.
Secure E-Business applications based on the European Citizen Card
NASA Astrophysics Data System (ADS)
Zipfel, Christian; Daum, Henning; Meister, Gisela
The introduction of ID cards enhanced with electronic authentication services opens up the possibility to use these for identification and authentication in e-business applications. To avoid incompatible national solutions, the specification of the European Citizen Card aims at defining interoperable services for such use cases. Especially the given device authentication methods can help to eliminate security problems with current e-business and online banking applications.
Android Based Behavioral Biometric Authentication via Multi-Modal Fusion
2014-06-12
such as the way he or she uses the mouse, or interacts with the Graphical User Interface (GUI) [9]. Described simply, standard biometrics is determined...as a login screen on a standard computer. Active authentication is authentication that occurs dynamically throughout interaction with the device. A...because they are higher level constructs in themselves. The Android framework was specifically used for capturing the multitouch gestures: pinch and zoom
The influence of authentic leadership and areas of worklife on work engagement of registered nurses.
Bamford, Megan; Wong, Carol A; Laschinger, Heather
2013-04-01
To examine the relationships among nurses' perceptions of nurse managers' authentic leadership, nurses' overall person-job match in the six areas of worklife and their work engagement. Reports have highlighted the impact of demanding and unsupportive work environments on nurses' wellbeing, resulting in a need for strong nursing leadership to build sustainable and healthier work environments. A secondary analysis of data collected from a non-experimental, predictive design survey of a random sample of 280 registered nurses working in acute care hospitals was conducted. An overall person-job match in the six areas of worklife fully mediated the relationship between authentic leadership and work engagement. Further, authentic leadership, overall person-job match in the six areas of worklife and years of nursing experience explained 33.1% of the variance in work engagement. Findings suggest that nurses who work for managers demonstrating higher levels of authentic leadership report a greater overall person-job match in the six areas of worklife and greater work engagement. As nurse managers' play a key role in promoting work engagement among nurses, authentic leadership development for nurse managers focusing on self-awareness, relational transparency, ethics and balanced processing would be beneficial. © 2012 Blackwell Publishing Ltd.
Device Data Protection in Mobile Healthcare Applications
NASA Astrophysics Data System (ADS)
Weerasinghe, Dasun; Rajarajan, Muttukrishnan; Rakocevic, Veselin
The rapid growth in mobile technology makes the delivery of healthcare data and services on mobile phones a reality. However, the healthcare data is very sensitive and has to be protected against unauthorized access. While most of the development work on security of mobile healthcare today focuses on the data encryption and secure authentication in remote servers, protection of data on the mobile device itself has gained very little attention. This paper analyses the requirements and the architecture for a secure mobile capsule, specially designed to protect the data that is already on the device. The capsule is a downloadable software agent with additional functionalities to enable secure external communication with healthcare service providers, network operators and other relevant communication parties.
Giallonardo, Lisa M; Wong, Carol A; Iwasiw, Carroll L
2010-11-01
To examine the relationships between new graduate nurses' perceptions of preceptor authentic leadership, work engagement and job satisfaction. During a time when the retention of new graduate nurses is of the upmost importance, the reliance on preceptors to facilitate the transition of new graduate nurses is paramount. A predictive non-experimental survey design was used to examine the relationships between study variables. The final sample consisted of 170 randomly selected Registered Nurses (RNs) with <3 years experience and who worked in an acute care setting. Hierarchical multiple regression demonstrated that 20% of the variance in job satisfaction was explained by authentic leadership and work engagement. Furthermore, work engagement was found to partially mediate the relationship between authentic leadership of preceptors and engagement of new graduate nurses. New graduate nurses paired with preceptors who demonstrate high levels of authentic leadership feel more engaged and are more satisfied. Engagement is an important mechanism by which authentic leadership affects job satisfaction. Managers must be aware of the role preceptors' authentic leadership plays in promoting work engagement and job satisfaction of new nurses. © 2010 The Authors. Journal compilation © 2010 Blackwell Publishing Ltd.
HERMA-Heartbeat Microwave Authentication
NASA Technical Reports Server (NTRS)
Haque, Salman-ul Mohammed (Inventor); Chow, Edward (Inventor); McKee, Michael Ray (Inventor); Tkacenko, Andre (Inventor); Lux, James Paul (Inventor)
2018-01-01
Systems and methods for identifying and/or authenticating individuals utilizing microwave sensing modules are disclosed. A HEaRtbeat Microwave Authentication (HERMA) system can enable the active identification and/or authentication of a user by analyzing reflected RF signals that contain a person's unique characteristics related to their heartbeats. An illumination signal is transmitted towards a person where a reflected signal captures the motion of the skin and tissue (i.e. displacement) due to the person's heartbeats. The HERMA system can utilize existing transmitters in a mobile device (e.g. Wi-Fi, Bluetooth, Cellphone signals) as the illumination source with at least one external receive antenna. The received reflected signals can be pre-processed and analyzed to identify and/or authenticate a user.
Li, Chun-Ta; Shih, Dong-Her; Wang, Chun-Cheng
2018-04-01
With the rapid development of wireless communication technologies and the growing prevalence of smart devices, telecare medical information system (TMIS) allows patients to receive medical treatments from the doctors via Internet technology without visiting hospitals in person. By adopting mobile device, cloud-assisted platform and wireless body area network, the patients can collect their physiological conditions and upload them to medical cloud via their mobile devices, enabling caregivers or doctors to provide patients with appropriate treatments at anytime and anywhere. In order to protect the medical privacy of the patient and guarantee reliability of the system, before accessing the TMIS, all system participants must be authenticated. Mohit et al. recently suggested a lightweight authentication protocol for cloud-based health care system. They claimed their protocol ensures resilience of all well-known security attacks and has several important features such as mutual authentication and patient anonymity. In this paper, we demonstrate that Mohit et al.'s authentication protocol has various security flaws and we further introduce an enhanced version of their protocol for cloud-assisted TMIS, which can ensure patient anonymity and patient unlinkability and prevent the security threats of report revelation and report forgery attacks. The security analysis proves that our enhanced protocol is secure against various known attacks as well as found in Mohit et al.'s protocol. Compared with existing related protocols, our enhanced protocol keeps the merits of all desirable security requirements and also maintains the efficiency in terms of computation costs for cloud-assisted TMIS. We propose a more secure mutual authentication and privacy preservation protocol for cloud-assisted TMIS, which fixes the mentioned security weaknesses found in Mohit et al.'s protocol. According to our analysis, our authentication protocol satisfies most functionality features for privacy preservation and effectively cope with cloud-assisted TMIS with better efficiency. Copyright © 2018 Elsevier B.V. All rights reserved.
Authentication based on gestures with smartphone in hand
NASA Astrophysics Data System (ADS)
Varga, Juraj; Švanda, Dominik; Varchola, Marek; Zajac, Pavol
2017-08-01
We propose a new method of authentication for smartphones and similar devices based on gestures made by user with the device itself. The main advantage of our method is that it combines subtle biometric properties of the gesture (something you are) with a secret information that can be freely chosen by the user (something you know). Our prototype implementation shows that the scheme is feasible in practice. Further development, testing and fine tuning of parameters is required for deployment in the real world.
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles
Xu, Wenyu; Zhang, Jing; Xu, Yan; Liu, Lu
2018-01-01
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles. PMID:29735941
Rezende, Kariolanda C A; Moreira, Roger Cardoso; Logrado, Lucio Paulo Lima; Talhavini, Márcio; Coltro, Wendell K T
2016-10-01
This report describes for the first time the use of microchip electrophoresis (ME) devices integrated with capacitively coupled contactless conductivity detection (C 4 D) to investigate the authenticity of seized whiskey samples, which were probably adulterated by simple dilution with tap water. The proposed microfluidic platform was explored for the monitoring of anionic species (Cl - and F - ) in both original and tampered samples. The best separations were achieved within 70 s using a running buffer composed of lactic acid and histidine (pH = 5.9). ME-C 4 D devices were used to analyze samples from three different brands (five samples each). Based on the presence of inorganic anions like Cl - , F - , SO 4 2- and NO 2 - in different amounts, the authenticity of seized whiskeys was compared to original samples. According to the reported data, the proposed microfluidic platform can be useful to help regulatory authorities in the investigation and monitoring of authenticity of commercialized whiskey beverages. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Privacy-Preserving Authentication Using a Double Pseudonym for Internet of Vehicles.
Cui, Jie; Xu, Wenyu; Zhong, Hong; Zhang, Jing; Xu, Yan; Liu, Lu
2018-05-07
The Internet of Vehicles (IoV) plays an important role in smart transportation to reduce the drivers’s risk of having an accident and help them manage small emergencies. Therefore, security and privacy issues of the message in the tamper proof device (TPD) broadcasted to other vehicles and roadside units (RSUs) have become an important research subject in the field of smart transportation. Many authentication schemes are proposed to tackle the challenges above and most of them are heavy in computation and communication. In this paper, we propose a novel authentication scheme that utilizes the double pseudonym method to hide the real identity of vehicles and adopts the dynamic update technology to periodically update the information (such as member secret, authentication key, internal pseudo-identity) stored in the tamper-proof device to prevent the side-channel attack. Because of not using bilinear pairing, our scheme yields a better performance in terms of computation overhead and communication overhead, and is more suitable to be applied in the Internet of Vehicles.
Threshold Things That Think: Authorisation for Resharing
NASA Astrophysics Data System (ADS)
Peeters, Roel; Kohlweiss, Markulf; Preneel, Bart
As we are evolving towards ubiquitous computing, users carry an increasing number of mobile devices with sensitive information. The security of this information can be protected using threshold cryptography, in which secret computations are shared between multiple devices. Threshold cryptography can be made more robust by resharing protocols, which allow recovery from partial compromises. This paper introduces user-friendly and secure protocols for the authorisation of resharing protocols. We present both automatic and manual protocols, utilising a group manual authentication protocol to add a new device. We analyse the security of these protocols: our analysis considers permanent and temporary compromises, denial of service attacks and manual authentications errors of the user.
A Selective Group Authentication Scheme for IoT-Based Medical Information System.
Park, YoHan; Park, YoungHo
2017-04-01
The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir's threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.
Rajeswari, S Raja; Seenivasagam, V
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.
Comparative Study on Various Authentication Protocols in Wireless Sensor Networks
Rajeswari, S. Raja; Seenivasagam, V.
2016-01-01
Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated. PMID:26881272
TOKEN: Trustable Keystroke-Based Authentication for Web-Based Applications on Smartphones
NASA Astrophysics Data System (ADS)
Nauman, Mohammad; Ali, Tamleek
Smartphones are increasingly being used to store personal information as well as to access sensitive data from the Internet and the cloud. Establishment of the identity of a user requesting information from smartphones is a prerequisite for secure systems in such scenarios. In the past, keystroke-based user identification has been successfully deployed on production-level mobile devices to mitigate the risks associated with naïve username/password based authentication. However, these approaches have two major limitations: they are not applicable to services where authentication occurs outside the domain of the mobile device - such as web-based services; and they often overly tax the limited computational capabilities of mobile devices. In this paper, we propose a protocol for keystroke dynamics analysis which allows web-based applications to make use of remote attestation and delegated keystroke analysis. The end result is an efficient keystroke-based user identification mechanism that strengthens traditional password protected services while mitigating the risks of user profiling by collaborating malicious web services.
Holograms and authentication: meeting future demands
NASA Astrophysics Data System (ADS)
Lancaster, Ian M.
2004-06-01
The use of holograms as authentication or security devices is the most valuable application of holograms yet devised. In 20 years, this has developed from the first use of a hologram on credit cards, to the situation today where governments turn to holograms as a key security feature on the protected documents they issue, including banknotes, identity documents and tax banderols. At the same time, holograms (and related devices) are the most recognised visible feature used to authenticate and protect branded and OEM products; this sector covers the gamut from CD jewel-box seals to the protection of safety-related items such as medicines and vehicle replacement parts. There has been creative synergy between the commercial suppliers of such holograms and the practical holography community. But new technologies are coming forward to challenge the role of holograms, a challenge that is aided by the counterfeiting of security holograms. What are the characteristics of those technologies and can holograms provide similar resources to users? Examples of collaboration between hologram producers and producers of other technologies to create combination devices suggest a possible route forward for holography to maintain its role in authentication and security. By scrutinising and adapting to needs, often by combination with other techniques, holographers may be able to retain their role in this important application.
South African managers in public service: on being authentic.
Barnard, Antoni; Simbhoo, Nirvana
2014-01-01
South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work-life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work.
Exploring the Use of Discrete Gestures for Authentication
NASA Astrophysics Data System (ADS)
Chong, Ming Ki; Marsden, Gary
Research in user authentication has been a growing field in HCI. Previous studies have shown that peoples’ graphical memory can be used to increase password memorability. On the other hand, with the increasing number of devices with built-in motion sensors, kinesthetic memory (or muscle memory) can also be exploited for authentication. This paper presents a novel knowledge-based authentication scheme, called gesture password, which uses discrete gestures as password elements. The research presents a study of multiple password retention using PINs and gesture passwords. The study reports that although participants could use kinesthetic memory to remember gesture passwords, retention of PINs is far superior to retention of gesture passwords.
Designing ECG-based physical unclonable function for security of wearable devices.
Shihui Yin; Chisung Bae; Sang Joon Kim; Jae-Sun Seo
2017-07-01
As a plethora of wearable devices are being introduced, significant concerns exist on the privacy and security of personal data stored on these devices. Expanding on recent works of using electrocardiogram (ECG) as a modality for biometric authentication, in this work, we investigate the possibility of using personal ECG signals as the individually unique source for physical unclonable function (PUF), which eventually can be used as the key for encryption and decryption engines. We present new signal processing and machine learning algorithms that learn and extract maximally different ECG features for different individuals and minimally different ECG features for the same individual over time. Experimental results with a large 741-subject in-house ECG database show that the distributions of the intra-subject (same person) Hamming distance of extracted ECG features and the inter-subject Hamming distance have minimal overlap. 256-b random numbers generated from the ECG features of 648 (out of 741) subjects pass the NIST randomness tests.
NASA Technical Reports Server (NTRS)
Lyle, Stacey D.
2009-01-01
A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.
Spectroscopically Enhanced Method and System for Multi-Factor Biometric Authentication
NASA Astrophysics Data System (ADS)
Pishva, Davar
This paper proposes a spectroscopic method and system for preventing spoofing of biometric authentication. One of its focus is to enhance biometrics authentication with a spectroscopic method in a multifactor manner such that a person's unique ‘spectral signatures’ or ‘spectral factors’ are recorded and compared in addition to a non-spectroscopic biometric signature to reduce the likelihood of imposter getting authenticated. By using the ‘spectral factors’ extracted from reflectance spectra of real fingers and employing cluster analysis, it shows how the authentic fingerprint image presented by a real finger can be distinguished from an authentic fingerprint image embossed on an artificial finger, or molded on a fingertip cover worn by an imposter. This paper also shows how to augment two widely used biometrics systems (fingerprint and iris recognition devices) with spectral biometrics capabilities in a practical manner and without creating much overhead or inconveniencing their users.
A Key Establishment Protocol for RFID User in IPTV Environment
NASA Astrophysics Data System (ADS)
Jeong, Yoon-Su; Kim, Yong-Tae; Sohn, Jae-Min; Park, Gil-Cheol; Lee, Sang-Ho
In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.
Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-01-01
A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328
Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.
Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti
2017-03-31
A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.
A critical review on the applications of artificial neural networks in winemaking technology.
Moldes, O A; Mejuto, J C; Rial-Otero, R; Simal-Gandara, J
2017-09-02
Since their development in 1943, artificial neural networks were extended into applications in many fields. Last twenty years have brought their introduction into winery, where they were applied following four basic purposes: authenticity assurance systems, electronic sensory devices, production optimization methods, and artificial vision in image treatment tools, with successful and promising results. This work reviews the most significant approaches for neural networks in winemaking technologies with the aim of producing a clear and useful review document.
M-AssIST: Interaction and Scaffolding Matters in Authentic Assessment
ERIC Educational Resources Information Center
Santos, Patricia; Cook, John; Hernández-Leo, Davinia
2015-01-01
Authentic assessment is important in formal and informal learning. Technology has the potential to be used to support the assessment of higher order skills particularly with respect to real life tasks. In particular, the use of mobile devices allows the learner to increase her interactions with physical objects, various environments (indoors and…
Opportunistic Mobility Support for Resource Constrained Sensor Devices in Smart Cities
Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer
2015-01-01
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment. PMID:25738767
Opportunistic mobility support for resource constrained sensor devices in smart cities.
Granlund, Daniel; Holmlund, Patrik; Åhlund, Christer
2015-03-02
A multitude of wireless sensor devices and technologies are being developed and deployed in cities all over the world. Sensor applications in city environments may include highly mobile installations that span large areas which necessitates sensor mobility support. This paper presents and validates two mechanisms for supporting sensor mobility between different administrative domains. Firstly, EAP-Swift, an Extensible Authentication Protocol (EAP)-based sensor authentication protocol is proposed that enables light-weight sensor authentication and key generation. Secondly, a mechanism for handoffs between wireless sensor gateways is proposed. We validate both mechanisms in a real-life study that was conducted in a smart city environment with several fixed sensors and moving gateways. We conduct similar experiments in an industry-based anechoic Long Term Evolution (LTE) chamber with an ideal radio environment. Further, we validate our results collected from the smart city environment against the results produced under ideal conditions to establish best and real-life case scenarios. Our results clearly validate that our proposed mechanisms can facilitate efficient sensor authentication and handoffs while sensors are roaming in a smart city environment.
Biometrics: Accessibility challenge or opportunity?
Blanco-Gonzalo, Ramon; Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael
2018-01-01
Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products.
Biometrics: Accessibility challenge or opportunity?
Lunerti, Chiara; Sanchez-Reillo, Raul; Guest, Richard Michael
2018-01-01
Biometric recognition is currently implemented in several authentication contexts, most recently in mobile devices where it is expected to complement or even replace traditional authentication modalities such as PIN (Personal Identification Number) or passwords. The assumed convenience characteristics of biometrics are transparency, reliability and ease-of-use, however, the question of whether biometric recognition is as intuitive and straightforward to use is open to debate. Can biometric systems make some tasks easier for people with accessibility concerns? To investigate this question, an accessibility evaluation of a mobile app was conducted where test subjects withdraw money from a fictitious ATM (Automated Teller Machine) scenario. The biometric authentication mechanisms used include face, voice, and fingerprint. Furthermore, we employed traditional modalities of PIN and pattern in order to check if biometric recognition is indeed a real improvement. The trial test subjects within this work were people with real-life accessibility concerns. A group of people without accessibility concerns also participated, providing a baseline performance. Experimental results are presented concerning performance, HCI (Human-Computer Interaction) and accessibility, grouped according to category of accessibility concern. Our results reveal links between individual modalities and user category establishing guidelines for future accessible biometric products. PMID:29565989
Ranak, M S A Noman; Azad, Saiful; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)-a.k.a., Force Touch in Apple's MacBook, Apple Watch, ZTE's Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on-is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme.
Ranak, M. S. A. Noman; Nor, Nur Nadiah Hanim Binti Mohd; Zamli, Kamal Z.
2017-01-01
Due to recent advancements and appealing applications, the purchase rate of smart devices is increasing at a higher rate. Parallely, the security related threats and attacks are also increasing at a greater ratio on these devices. As a result, a considerable number of attacks have been noted in the recent past. To resist these attacks, many password-based authentication schemes are proposed. However, most of these schemes are not screen size independent; whereas, smart devices come in different sizes. Specifically, they are not suitable for miniature smart devices due to the small screen size and/or lack of full sized keyboards. In this paper, we propose a new screen size independent password-based authentication scheme, which also offers an affordable defense against shoulder surfing, brute force, and smudge attacks. In the proposed scheme, the Press Touch (PT)—a.k.a., Force Touch in Apple’s MacBook, Apple Watch, ZTE’s Axon 7 phone; 3D Touch in iPhone 6 and 7; and so on—is transformed into a new type of code, named Press Touch Code (PTC). We design and implement three variants of it, namely mono-PTC, multi-PTC, and multi-PTC with Grid, on the Android Operating System. An in-lab experiment and a comprehensive survey have been conducted on 105 participants to demonstrate the effectiveness of the proposed scheme. PMID:29084262
Authentic leadership, performance, and job satisfaction: the mediating role of empowerment.
Wong, Carol A; Laschinger, Heather K S
2013-04-01
To report a study conducted to test a model linking authentic leadership of managers with nurses' perceptions of structural empowerment, performance, and job satisfaction. Authentic leadership has been proposed as the root element of effective leadership needed to build healthier work environments because there is special attention to the development of empowering leader-follower relationships. Although the influence of leadership style and empowerment on job satisfaction is well documented, there are few studies examining the influence of authentic leadership on nurses' empowerment and work outcomes. A non-experimental, predictive survey. In 2008, a random sample of 600 Registered Nurses working in acute care hospitals across Ontario in Canada was surveyed. The final sample consisted of 280 (48% response rate) nurses. Variables were measured using the Authentic Leadership Questionnaire, Conditions of Work Effectiveness Questionnaire, Global Job Satisfaction Survey, and General Performance scale. The theoretical model was tested using structural equation modelling. The final model fit the data acceptably. Authentic leadership significantly and positively influenced staff nurses' structural empowerment, which in turn increased job satisfaction and self-rated performance. The results suggest that the more managers are seen as authentic, by emphasizing transparency, balanced processing, self-awareness and high ethical standards, the more nurses perceive they have access to workplace empowerment structures, are satisfied with their work, and report higher performance. © 2012 Blackwell Publishing Ltd.
Informal Language Learning in Authentic Setting, Using Mobile Devices and SNS
ERIC Educational Resources Information Center
Aladjem, Ruthi; Jou, Bibiana
2016-01-01
One of the challenges of teaching a foreign language in non-immersive contexts, is extending the exposure of learners to the target language, beyond school hours. Since it is quite common to find linguistic and cultural exponents of foreign languages, in authentic contexts (i.e., the "Linguistic Landscape"), those exponents may serve as…
Restricted Authentication and Encryption for Cyber-physical Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kirkpatrick, Michael S; Bertino, Elisa; Sheldon, Frederick T
2009-01-01
Cyber-physical systems (CPS) are characterized by the close linkage of computational resources and physical devices. These systems can be deployed in a number of critical infrastructure settings. As a result, the security requirements of CPS are different than traditional computing architectures. For example, critical functions must be identified and isolated from interference by other functions. Similarly, lightweight schemes may be required, as CPS can include devices with limited computing power. One approach that offers promise for CPS security is the use of lightweight, hardware-based authentication. Specifically, we consider the use of Physically Unclonable Functions (PUFs) to bind an access requestmore » to specific hardware with device-specific keys. PUFs are implemented in hardware, such as SRAM, and can be used to uniquely identify the device. This technology could be used in CPS to ensure location-based access control and encryption, both of which would be desirable for CPS implementations.« less
Learning How to Lead: A Lifetime Journey
ERIC Educational Resources Information Center
Baugher, Shirley L.
2005-01-01
Much has been written about theories of leadership, leadership qualities, and the development of leadership. In this article, the author focuses on the work of Kevin Cashman, who proposed the following "Five Touchstones" that are crucial to authentic leadership: (1) Know Yourself Authentically; (2) Listen Authentically; (3) Express Authentically;…
TealLock 5.20 security software program for handheld devices.
Tahil, Fatimah A
2004-07-01
The TealLock has a simple graphic interface, and the program is user-friendly with well thought out options to customize security settings. The program is inexpensive and works seamlessly with the Palm OS platform's built-in basic Security application. The developer offers a 30-day free trial version and there is no downside to trying it to see if it meets your needs. It seems to be an effective security software program for psychiatrists who keep confidential and sensitive patient information on their PDAs. In keeping with HIPAA regulations, the TealLock bolsters security for protected health information stored on PDAs or other handheld devices by providing safeguards that address authentication, access control, encryption, and selected aspects of transmission.
2012-06-01
some advantages over alternative live tissue models when a mechanical device is employed to reduce arterial flow rates. Authentic human anatomy is...vessels to reduce and stop blood flow require authentic human anatomy for optimal testing. Cadaver I was approximately 60 year old male with a total
Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita
2014-05-01
Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.
Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad
2015-01-01
Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes’ participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.’s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.’s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic. PMID:26580963
NASA Astrophysics Data System (ADS)
Knobler, Ron; Scheffel, Peter; Jackson, Scott; Gaj, Kris; Kaps, Jens Peter
2013-05-01
Various embedded systems, such as unattended ground sensors (UGS), are deployed in dangerous areas, where they are subject to compromise. Since numerous systems contain a network of devices that communicate with each other (often times with commercial off the shelf [COTS] radios), an adversary is able to intercept messages between system devices, which jeopardizes sensitive information transmitted by the system (e.g. location of system devices). Secret key algorithms such as AES are a very common means to encrypt all system messages to a sufficient security level, for which lightweight implementations exist for even very resource constrained devices. However, all system devices must use the appropriate key to encrypt and decrypt messages from each other. While traditional public key algorithms (PKAs), such as RSA and Elliptic Curve Cryptography (ECC), provide a sufficiently secure means to provide authentication and a means to exchange keys, these traditional PKAs are not suitable for very resource constrained embedded systems or systems which contain low reliability communication links (e.g. mesh networks), especially as the size of the network increases. Therefore, most UGS and other embedded systems resort to pre-placed keys (PPKs) or other naïve schemes which greatly reduce the security and effectiveness of the overall cryptographic approach. McQ has teamed with the Cryptographic Engineering Research Group (CERG) at George Mason University (GMU) to develop an approach using revolutionary cryptographic techniques that provides both authentication and encryption, but on resource constrained embedded devices, without the burden of large amounts of key distribution or storage.
South African managers in public service: On being authentic
Simbhoo, Nirvana
2014-01-01
South African managers in public service consistently face challenges related to managing a well-adjusted and productive diverse workforce. Following the notion that leadership authenticity fosters positive psychological employee capacity, the aim of this study was to explore the meaning essence of authenticity as lived in the work–life experiences of senior managers in public service. Five senior managers in public service were purposefully selected based on their articulated challenges with being authentic at work, whilst attending a diversity sensitivity workshop. From a hermeneutic phenomenological perspective, in-depth interviews were used, and an interpretative phenomenological analysis yielded two predominant themes offering a description of what it means to be authentic. Authenticity is experienced as an affective state that results from a continuous self-appraisal of the extent to which expression of self is congruent with a subjective and socially constructed expectation of self in relation to others. Authenticity seems to develop through a continuous process of internal and external adaptation, and it leads to ultimately building a differentiated yet integrated identity of self. A reciprocal dynamic between feeling authentic and self-confidence alludes to the potential importance of authenticity dynamics in identity work. PMID:24434054
Antecedents, mediators, and outcomes of authentic leadership in healthcare: A systematic review.
Alilyyani, Bayan; Wong, Carol A; Cummings, Greta
2018-07-01
Leaders are essential in every organization to achieve patient safety and healthy work environments. Authentic leadership is a relational leadership style purported to promote healthy work environments that influence staff performance and organizational outcomes. Given recent growth in authentic leadership research in healthcare and the importance of new knowledge to inform leadership development, there is an obligation to determine what is known about the antecedents and outcomes of authentic leadership in healthcare settings and clarify mechanisms by which authentic leadership affects healthcare staff and patient outcomes. The aim of this systematic review was to examine the antecedents, mediators and outcomes associated with authentic leadership in healthcare. Systematic review. The search strategy included 11 electronic databases: ABI Inform Dateline, Academic Search Complete, Cochrane Database of Systematic Reviews, PubMed, CINAHL, Embase, ERIC, PsycINFO, Scopus, Web of Science, and ProQuest Dissertations & Theses. The search was conducted in January 2017. Published English-only quantitative research that examined the antecedents, mediators and outcomes of authentic leadership practices of leaders in healthcare settings was included. Quality assessment, data extractions, and analysis were completed on all included studies. Data extracted from included studies were analyzed through descriptive and narrative syntheses. Content analysis was used to group antecedents, outcomes and mediators into categories which were then compared to authentic leadership theory. 1036 titles and abstracts were screened yielding 136 manuscripts for full-text review which resulted in 21 included studies reported in 38 manuscripts. Significant associations between authentic leadership and 43 outcomes were grouped into two major themes: healthcare staff outcomes with 5 subthemes (personal psychological states, satisfaction with work, work environment factors, health & well-being, and performance) and patient outcomes. There were 23 mediators between authentic leadership and 35 different outcomes in the included studies and one antecedent of authentic leadership. Findings of this review provide support for authentic leadership theory and suggest need for additional testing in future studies using longitudinal and interventional designs in more varied healthcare settings with diverse and interprofessional healthcare samples. Knowledge generated through this systematic review provides a more comprehensive understanding of authentic leadership, which can be used to educate future leaders and has the potential to improve leadership development strategies and positive outcomes in healthcare workplaces. Copyright © 2018 Elsevier Ltd. All rights reserved.
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
NASA Astrophysics Data System (ADS)
Mannan, Mohammad; van Oorschot, P. C.
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users' financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a user's long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The user's long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a user's long-term secrets to a client PC only after encrypting the secrets using a pre-installed, "correct" public key of a remote service (the intended recipient of the secrets). The proposed protocol (
NASA Technical Reports Server (NTRS)
Westmeyer, Paul A. (Inventor); Wertenberg, Russell F. (Inventor); Krage, Frederick J. (Inventor); Riegel, Jack F. (Inventor)
2017-01-01
An authentication procedure utilizes multiple independent sources of data to determine whether usage of a device, such as a desktop computer, is authorized. When a comparison indicates an anomaly from the base-line usage data, the system, provides a notice that access of the first device is not authorized.
World Language Students' Ethnographic Investigations of Culture through Mobile Devices
ERIC Educational Resources Information Center
Tuttle, Harry G.; Tuttle, Lori A.
2017-01-01
World language teachers can transform how their students learn culture through the use of mobile devices. When world language students use their mobile devices to access authentic current culture, they go from being passive receivers of culture to active cultural investigators. These students go from learning thin surface culture to exploring…
Evaluation of complex gonioapparent samples using a bidirectional spectrometer.
Rogelj, Nina; Penttinen, Niko; Gunde, Marta Klanjšek
2015-08-24
Many applications use gonioapparent targets whose appearance depends on irradiation and viewing angles; the strongest effects are provided by light diffraction. These targets, optically variable devices (OVDs), are used in both security and authentication applications. This study introduces a bidirectional spectrometer, which enables to analyze samples with most complex angular and spectral properties. In our work, the spectrometer is evaluated with samples having very different types of reflection, concerning spectral and angular distributions. Furthermore, an OVD containing several different grating patches is evaluated. The device uses automatically adjusting exposure time to provide maximum signal dynamics and is capable of doing steps as small as 0.01°. However, even 2° steps for the detector movement showed that this device is more than capable of characterizing even the most complex reflecting surfaces. This study presents sRGB visualizations, discussion of bidirectional reflection, and accurate grating period calculations for all of the grating samples used.
Smartphone-based secure authenticated session sharing in Internet of Personal Things
NASA Astrophysics Data System (ADS)
Krishnan, Ram; Ninglekhu, Jiwan
2015-03-01
In the context of password-based authentication, a user can only memorize limited number of usernames and passwords. They are generally referred to as user-credentials. Longer character length of passwords further adds complication in mastering them. The expansion of the Internet and our growing dependency on it, has made it almost impossible for us to handle the big pool of user-credentials. Using simple, same or similar passwords is considered a poor practice, as it can easily be compromised by password cracking tools and social engineering attacks. Therefore, a robust and painless technique to manage personal credentials for websites is desirable. In this paper, a novel technique for user-credentials management via a smart mobile device such as a smartphone in a local network is proposed. We present a secure user-credential management scheme in which user's account login (username) and password associated with websites domain name is saved into the mobile device's database using a mobile application. We develop a custom browser extension application for client and use it to import user's credentials linked with the corresponding website from the mobile device via the local Wi-Fi network connection. The browser extension imports and identifies the authentication credentials and pushes them into the target TextBox locations in the webpage, ready for the user to execute. This scheme is suitably demonstrated between two personal devices in a local network.
A Multifactor Secure Authentication System for Wireless Payment
NASA Astrophysics Data System (ADS)
Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip
Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.
Martinez, Larry R; Sawyer, Katina B; Thoroughgood, Christian N; Ruggs, Enrica N; Smith, Nicholas A
2017-02-01
The present research examined the relation between authentic identity expression and transgender employees' work-related attitudes and experiences. Drawing on Kernis' (2003) theoretical conceptualization of authenticity and expanding on current workplace identity management research, we predicted that employees who had taken steps to reduce the discrepancy between their inner gender identities and their outward manifestations of gender would report more positive job attitudes and workplace experiences, in part because the reduction of this discrepancy is related to greater feelings of authenticity. In Study 1, we found that the extent to which one has transitioned was related to higher job satisfaction and perceived person-organization (P-O) fit and lower perceived discrimination. In Study 2, we replicate and extend these results by showing that the extent to which employees felt that others at work perceived them in a manner consistent with how they perceived themselves (relational authenticity) mediated the relations between extent of transition and all 3 of these outcomes. However, perceptions of alignment between one's felt and expressed identity (action authenticity) only mediated this link for job satisfaction. We discuss the theoretical and practical implications of our results, as well as avenues for future research on authenticity in the workplace. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
On the security of consumer wearable devices in the Internet of Things.
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands.
On the security of consumer wearable devices in the Internet of Things
Tahir, Hasan; Tahir, Ruhma; McDonald-Maier, Klaus
2018-01-01
Miniaturization of computer hardware and the demand for network capable devices has resulted in the emergence of a new class of technology called wearable computing. Wearable devices have many purposes like lifestyle support, health monitoring, fitness monitoring, entertainment, industrial uses, and gaming. Wearable devices are hurriedly being marketed in an attempt to capture an emerging market. Owing to this, some devices do not adequately address the need for security. To enable virtualization and connectivity wearable devices sense and transmit data, therefore it is essential that the device, its data and the user are protected. In this paper the use of novel Integrated Circuit Metric (ICMetric) technology for the provision of security in wearable devices has been suggested. ICMetric technology uses the features of a device to generate an identification which is then used for the provision of cryptographic services. This paper explores how a device ICMetric can be generated by using the accelerometer and gyroscope sensor. Since wearable devices often operate in a group setting the work also focuses on generating a group identification which is then used to deliver services like authentication, confidentiality, secure admission and symmetric key generation. Experiment and simulation results prove that the scheme offers high levels of security without compromising on resource demands. PMID:29668756
An improved anonymous authentication scheme for roaming in ubiquitous networks.
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.
An improved anonymous authentication scheme for roaming in ubiquitous networks
Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick
2018-01-01
With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575
Sensor sentinel computing device
Damico, Joseph P.
2016-08-02
Technologies pertaining to authenticating data output by sensors in an industrial environment are described herein. A sensor sentinel computing device receives time-series data from a sensor by way of a wireline connection. The sensor sentinel computing device generates a validation signal that is a function of the time-series signal. The sensor sentinel computing device then transmits the validation signal to a programmable logic controller in the industrial environment.
Wireless Technology Infrastructures for Authentication of Patients: PKI that Rings
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D.
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system. PMID:15684133
Wireless technology infrastructures for authentication of patients: PKI that rings.
Sax, Ulrich; Kohane, Isaac; Mandl, Kenneth D
2005-01-01
As the public interest in consumer-driven electronic health care applications rises, so do concerns about the privacy and security of these applications. Achieving a balance between providing the necessary security while promoting user acceptance is a major obstacle in large-scale deployment of applications such as personal health records (PHRs). Robust and reliable forms of authentication are needed for PHRs, as the record will often contain sensitive and protected health information, including the patient's own annotations. Since the health care industry per se is unlikely to succeed at single-handedly developing and deploying a large scale, national authentication infrastructure, it makes sense to leverage existing hardware, software, and networks. This report proposes a new model for authentication of users to health care information applications, leveraging wireless mobile devices. Cell phones are widely distributed, have high user acceptance, and offer advanced security protocols. The authors propose harnessing this technology for the strong authentication of individuals by creating a registration authority and an authentication service, and examine the problems and promise of such a system.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-01-05
... Systems, Including Software and Handheld Electronic Devices; Notice of Investigation AGENCY: U.S... software and handheld electronic devices, by reason of infringement of certain claims of U.S. Patent No 7... software and handheld electronic devices, that infringe one or more of claims 31-35, 38, 41, 51, 54, 56, 58...
Robust authentication through stochastic femtosecond laser filament induced scattering surfaces
DOE Office of Scientific and Technical Information (OSTI.GOV)
Zhang, Haisu; Tzortzakis, Stelios, E-mail: stzortz@iesl.forth.gr; Materials Science and Technology Department, University of Crete, 71003 Heraklion
2016-05-23
We demonstrate a reliable authentication method by femtosecond laser filament induced scattering surfaces. The stochastic nonlinear laser fabrication nature results in unique authentication robust properties. This work provides a simple and viable solution for practical applications in product authentication, while also opens the way for incorporating such elements in transparent media and coupling those in integrated optical circuits.
Security Analysis and Improvements of Authentication and Access Control in the Internet of Things
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-01-01
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18–21 June 2012, pp. 588–592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost. PMID:25123464
Self-Assembled Resonance Energy Transfer Keys for Secure Communication over Classical Channels.
Nellore, Vishwa; Xi, Sam; Dwyer, Chris
2015-12-22
Modern authentication and communication protocols increasingly use physical keys in lieu of conventional software-based keys for security. This shift is primarily driven by the ability to derive a unique, unforgeable signature from a physical key. The sole demonstration of an unforgeable key, thus far, has been through quantum key distribution, which suffers from limited communication distances and expensive infrastructure requirements. Here, we show a method for creating unclonable keys by molecular self-assembly of resonance energy transfer (RET) devices. It is infeasible to clone the RET-key due to the inability to characterize the key using current technology, the large number of input-output combinations per key, and the variation of the key's response with time. However, the manufacturer can produce multiple identical devices, which enables inexpensive, secure authentication and communication over classical channels, and thus any distance. Through a detailed experimental survey of the nanoscale keys, we demonstrate that legitimate users are successfully authenticated 99.48% of the time and the false-positives are only 0.39%, over two attempts. We estimate that a legitimate user would have a computational advantage of more than 10(340) years over an attacker. Our method enables the discovery of physical key based multiparty authentication and communication schemes that are both practical and possess unprecedented security.
Security analysis and improvements of authentication and access control in the Internet of Things.
Ndibanje, Bruce; Lee, Hoon-Jae; Lee, Sang-Gon
2014-08-13
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
Transform Modern Language Learning through Mobile Devices
ERIC Educational Resources Information Center
Tuttle, Harry Grover
2013-01-01
College professors can transform their modern language classes through mobile devices. Their students' learning becomes more active, more personalized, more contextual, and more culturally authentic as illustrated through the author's modern language mobile learning classroom examples. In addition, their students engage in many diverse types of…
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-11
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.
Quantum tagging for tags containing secret classical data
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kent, Adrian
Various authors have considered schemes for quantum tagging, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is potentially unbounded. All of the schemes proposed elsewhere in the literature assume that the adversary is able to inspect the interior of the tagging device. All of these schemes have been shown to be breakable if the adversary has unbounded predistributed entanglement. We consider here the case in which the tagging device contains a finitemore » key string shared with distant sites but kept secret from the adversary, and show this allows the location of the tagging device to be authenticated securely and indefinitely. Our protocol relies on quantum key distribution between the tagging device and at least one distant site, and demonstrates a new practical application of quantum key distribution. It also illustrates that the attainable security in position-based cryptography can depend crucially on apparently subtle details in the security scenario considered.« less
NASA Astrophysics Data System (ADS)
Amerimehr, Ali; Hadain Dehkordi, Massoud
2018-03-01
We analyze the security of a quantum secure direct communication and authentication protocol based on single photons. We first give an impersonation attack on the protocol. The cryptanalysis shows that there is a gap in the authentication procedure of the protocol so that an opponent can reveal the secret information by an undetectable attempt. We then propose an improvement for the protocol and show it closes the gap by applying a mutual authentication procedure. In the improved protocol single photons are transmitted once in a session, so it is easy to implement as the primary protocol. Furthermore, we use a novel technique for secret order rearrangement of photons by which not only quantum storage is eliminated also a secret key can be reused securely. So the new protocol is applicable in practical approaches like embedded system devices.
Authentic leadership and nurses' voice behaviour and perceptions of care quality.
Wong, Carol A; Spence Laschinger, Heather K; Cummings, Greta G
2010-11-01
The purpose of the present study was to test a theoretical model linking authentic leadership with staff nurses' trust in their manager, work engagement, voice behaviour and perceived unit care quality. Authentic leadership is a guide for effective leadership needed to build trust and healthier work environments because there is special attention given to honesty, integrity and high ethical standards in the development of leader-follower relationships. A non-experimental, predictive survey design was used to test the hypothesized model in a random sample of 280 (48% response rate) registered nurses working in acute care hospitals in Ontario. The final model fitted the data acceptably (χ(2)=17.24, d.f.=11, P=0.10, IFI=0.99, CFI=0.99, RMSEA=0.045). Authentic leadership significantly and positively influenced staff nurses' trust in their manager and work engagement which in turn predicted voice behaviour and perceived unit care quality. These findings suggest that authentic leadership and trust in the manager play a role in fostering trust, work engagement, voice behaviour and perceived quality of care. Nursing leaders can improve care quality and workplace conditions by paying attention to facilitating genuine and positive relationships with their staff. © 2010 The Authors. Journal compilation © 2010 Blackwell Publishing Ltd.
Fuzzy-cellular neural network for face recognition HCI Authentication
NASA Astrophysics Data System (ADS)
Hoomod, Haider K.; ali, Ahmed abd
2018-05-01
Because of the rapid development of mobile devices technology, ease of use and interact with humans. May have found a mobile device most uses in our communications. Mobile devices can carry large amounts of personal and sensitive data, but often left not guaranteed (pin) locks are inconvenient to use and thus have seen low adoption while biometrics is more convenient and less susceptible to fraud and manipulation. Were propose in this paper authentication technique for using a mobile face recognition based on cellular neural networks [1] and fuzzy rules control. The good speed and get recognition rate from applied the proposed system in Android system. The images obtained in real time for 60 persons each person has 20 t0 60 different shot face images (about 3600 images), were the results for (FAR = 0), (FRR = 1.66%), (FER = 1.66) and accuracy = 98.34
NASA Astrophysics Data System (ADS)
Lenzini, Gabriele
We describe an existing software architecture for context and proximity aware services that enables trust-based and context-aware authentication. A service is proximity aware when it automatically detects the presence of entities in its proximity. Authentication is context-aware when it uses contextual information to discern among different identities and to evaluate to which extent they are authentic. The software architecture that we describe here is functioning in our Institute: It manages a sensor network to detect the presence and location of users and their devices. A context manager is responsible to merge the different sources of contextual information, to solve potential contradictions, and to determine the level of authentication of the identity of the person approaching one of the services offered in the coffee-break corners of our Institute. In our solution for context-aware authentication, sensors are managed as if they were recommenders having subjective belief, disbelief, and uncertainty (i.e., trust) on the position and identity of users. A sensor’s subjective trust depends on what it has been sensing in the environment. We discuss the results of an array of simulations that we conducted to validate our concept of trust-based and context-aware authentication. We use Subjective Logic to manage trust.
Ninth Grade Student Responses to Authentic Science Instruction
NASA Astrophysics Data System (ADS)
Ellison, Michael Steven
This mixed methods case study documents an effort to implement authentic science and engineering instruction in one teacher's ninth grade science classrooms in a science-focused public school. The research framework and methodology is a derivative of work developed and reported by Newmann and others (Newmann & Associates, 1996). Based on a working definition of authenticity, data were collected for eight months on the authenticity in the experienced teacher's pedagogy and in student performance. Authenticity was defined as the degree to which a classroom lesson, an assessment task, or an example of student performance demonstrates construction of knowledge through use of the meaning-making processes of science and engineering, and has some value to students beyond demonstrating success in school (Wehlage et al., 1996). Instruments adapted for this study produced a rich description of the authenticity of the teacher's instruction and student performance. The pedagogical practices of the classroom teacher were measured as moderately authentic on average. However, the authenticity model revealed the teacher's strategy of interspersing relatively low authenticity instructional units focused on building science knowledge with much higher authenticity tasks requiring students to apply these concepts and skills. The authenticity of the construction of knowledge and science meaning-making processes components of authentic pedagogy were found to be greater, than the authenticity of affordances for students to find value in classroom activities beyond demonstrating success in school. Instruction frequently included one aspect of value beyond school, connections to the world outside the classroom, but students were infrequently afforded the opportunity to present their classwork to audiences beyond the teacher. When the science instruction in the case was measured to afford a greater level of authentic intellectual work, a higher level of authentic student performance on science classwork was also measured. In addition, direct observation measures of student behavioral engagement showed that behavioral engagement was generally high, but not associated with the authenticity of the pedagogy. Direct observation measures of student self-regulation found evidence that when instruction focused on core science and engineering concepts and made stronger connections to the student's world beyond the classroom, student self-regulated learning was greater, and included evidence of student ownership. In light of the alignment between the model of authenticity used in this study and the Next Generation Science Standards (NGSS), the results suggest that further research on the value beyond school component of the model could improve understanding of student engagement and performance in response to the implementation of the NGSS. In particular, it suggests a unique role environmental education can play in affording student success in K-12 science and a tool to measure that role.
Choi, Han Gyo; Ahn, Sung Hee
2016-02-01
The aim of this study was to examine the mediating effect of empowerment in the relationship of nurse managers' authentic leadership, with nurses' organizational commitment and job satisfaction. The participants in this study were 273 registered nurses working in five University hospitals located in Seoul and Gyeonggi Province. The measurements included the Authentic Leadership Questionnaire, Condition of Work Effectiveness Questionnaire-II, Organizational Commitment Questionnaire and Korea-Minnesota Satisfaction Questionnaire. Data were analyzed using t-test, ANOVA, Scheffé test, Pearson correlation coefficients, simple and multiple regression techniques with the SPSS 18.0 program. Mediation analysis was performed according to the Baron and Kenny method and Sobel test. There were significant correlations among authentic leadership, empowerment, organizational commitment and job satisfaction. Empowerment showed perfect mediating effects in the relationship between authentic leadership and organizational commitment. It had partial mediating effects in the relationship between authentic leadership and job satisfaction. In this study, nurse managers' authentic leadership had significant influences on nurses organizational commitment and job satisfaction via empowerment. Therefore, to enhance nurses' organizational commitment and job satisfaction, it is necessary to build effective strategies to enhance nurse manager's authentic leadership and to develop empowering education programs for nurses.
NASA Astrophysics Data System (ADS)
Sadhukhan, Pampa; Sen, Rijurekha; Das, Pradip K.
Several methods for providing location based service (LBS) to mobile devices in indoor environment using wireless technologies like WLAN, RFID and Bluetooth have been proposed, implemented and evaluated. However, most of them do not focus on heterogeneity of mobile platforms, memory constraint of mobile devices, the adaptability of client or device to the new services it discovers whenever it reaches a new location. In this paper, we have proposed a Middleware based approach of LBS provision in the indoor environment, where a Bluetooth enabled Base Station (BS) detects Bluetooth enabled mobile devices and pushes a proper client application only to those devices that belong to some registered subscriber of LBS. This dynamic deployment enables the mobile clients to access any new service without having preinstalled interface to that service beforehand and thus the client's memory consumption is reduced. Our proposed work also addresses the other issues like authenticating the clients before providing them LBSs and introducing paid services. We have evaluated its performance in term of file transfer time with respect to file size and throughput with respect to distance. Experimental results on service consumption time by the mobile client for different services are also presented.
Authentic leadership, organizational culture, and healthy work environments.
Shirey, Maria R
2009-01-01
The purpose of this article is to showcase the relationship among authentic leadership, organizational culture, and healthy work environments using a stress and coping lens. A qualitative descriptive study was conducted to determine what situations contribute to nurse manager stress, what coping strategies they utilize, what health outcomes they report, and what decision-making processes they follow to address stressful situations in their roles. A purposive sample of 21 nurse managers employed at 3 US acute care hospitals completed a demographic questionnaire and 14-question interview incorporating components of the Critical Decision Method. A secondary analysis of the data was conducted to identify differences in nurse manager narratives based upon differences in the organizational cultures where the managers worked. Of the 21 nurse managers studied, differences were evident in the organizational cultures reported. Nurse managers working in the positive organizational cultures (n = 12) generally worked in healthy work environments and engaged in more authentic leadership behaviors. Conversely, nurse managers working in the negative organizational cultures (n = 9) worked in unhealthy work environments and reported less optimism and more challenges engaging in authentic leadership practices. Organizational culture and leadership matter in creating and sustaining healthy work environments. Nurse managers play a pivotal role in creating these environments, yet they need supportive structures and resources to more effectively execute their roles.
21 CFR 1311.116 - Additional requirements for biometrics.
Code of Federal Regulations, 2011 CFR
2011-04-01
... controlled substances. (f) The biometric subsystem must store device ID data at enrollment (i.e., biometric registration) with the biometric data and verify the device ID at the time of authentication to the electronic prescription application. (g) The biometric subsystem must protect the biometric data (raw data or templates...
21 CFR 1311.116 - Additional requirements for biometrics.
Code of Federal Regulations, 2010 CFR
2010-04-01
... controlled substances. (f) The biometric subsystem must store device ID data at enrollment (i.e., biometric registration) with the biometric data and verify the device ID at the time of authentication to the electronic prescription application. (g) The biometric subsystem must protect the biometric data (raw data or templates...
Barriers to Securing Data on Bluetooth®-Enabled Mobile Devices: A Phenomenological Study
ERIC Educational Resources Information Center
Hines, Natasha
2015-01-01
Company data on mobile devices is vulnerable and subject to unauthorized access. The general problem is that information security incidents compromise the integrity and authenticity of electronic data. The specific problem is that organizational security policies, procedures, and training do not adequately address the vulnerabilities associated…
Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys
DOE Office of Scientific and Technical Information (OSTI.GOV)
Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.
The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for themore » addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.« less
A rhythm-based authentication scheme for smart media devices.
Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience.
A Rhythm-Based Authentication Scheme for Smart Media Devices
Lee, Jae Dong; Park, Jong Hyuk
2014-01-01
In recent years, ubiquitous computing has been rapidly emerged in our lives and extensive studies have been conducted in a variety of areas related to smart devices, such as tablets, smartphones, smart TVs, smart refrigerators, and smart media devices, as a measure for realizing the ubiquitous computing. In particular, smartphones have significantly evolved from the traditional feature phones. Increasingly higher-end smartphone models that can perform a range of functions are now available. Smart devices have become widely popular since they provide high efficiency and great convenience for not only private daily activities but also business endeavors. Rapid advancements have been achieved in smart device technologies to improve the end users' convenience. Consequently, many people increasingly rely on smart devices to store their valuable and important data. With this increasing dependence, an important aspect that must be addressed is security issues. Leaking of private information or sensitive business data due to loss or theft of smart devices could result in exorbitant damage. To mitigate these security threats, basic embedded locking features are provided in smart devices. However, these locking features are vulnerable. In this paper, an original security-locking scheme using a rhythm-based locking system (RLS) is proposed to overcome the existing security problems of smart devices. RLS is a user-authenticated system that addresses vulnerability issues in the existing locking features and provides secure confidentiality in addition to convenience. PMID:25110743
An authentication scheme to healthcare security under wireless sensor networks.
Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa
2012-12-01
In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.
Authentic Assessment: Creating a Blueprint for Course Design
ERIC Educational Resources Information Center
Villarroel, Verónica; Bloxham, Susan; Bruna, Daniela; Bruna, Carola; Herrera-Seda, Constanza
2018-01-01
Authenticity has been identified as a key characteristic of assessment design which promotes learning. Authentic assessment aims to replicate the tasks and performance standards typically found in the world of work, and has been found to have a positive impact on student learning, autonomy, motivation, self-regulation and metacognition; abilities…
ERIC Educational Resources Information Center
Lakin, Amy L.
2016-01-01
Purpose: The purpose of this paper is to determine the most fair, authentic, and reliable elements to include in a portfolio of faculty work, specifically at teaching-centered institutions. Design/methodology/approach: This paper examines and evaluates relevant literature pertaining to faculty portfolios of work and recommends portfolio formats…
Reliable Location-Based Services from Radio Navigation Systems
Qiu, Di; Boneh, Dan; Lo, Sherman; Enge, Per
2010-01-01
Loran is a radio-based navigation system originally designed for naval applications. We show that Loran-C’s high-power and high repeatable accuracy are fantastic for security applications. First, we show how to derive a precise location tag—with a sensitivity of about 20 meters—that is difficult to project to an exact location. A device can use our location tag to block or allow certain actions, without knowing its precise location. To ensure that our tag is reproducible we make use of fuzzy extractors, a mechanism originally designed for biometric authentication. We build a fuzzy extractor specifically designed for radio-type errors and give experimental evidence to show its effectiveness. Second, we show that our location tag is difficult to predict from a distance. For example, an observer cannot predict the location tag inside a guarded data center from a few hundreds of meters away. As an application, consider a location-aware disk drive that will only work inside the data center. An attacker who steals the device and is capable of spoofing Loran-C signals, still cannot make the device work since he does not know what location tag to spoof. We provide experimental data supporting our unpredictability claim. PMID:22163532
Reliable location-based services from radio navigation systems.
Qiu, Di; Boneh, Dan; Lo, Sherman; Enge, Per
2010-01-01
Loran is a radio-based navigation system originally designed for naval applications. We show that Loran-C's high-power and high repeatable accuracy are fantastic for security applications. First, we show how to derive a precise location tag--with a sensitivity of about 20 meters--that is difficult to project to an exact location. A device can use our location tag to block or allow certain actions, without knowing its precise location. To ensure that our tag is reproducible we make use of fuzzy extractors, a mechanism originally designed for biometric authentication. We build a fuzzy extractor specifically designed for radio-type errors and give experimental evidence to show its effectiveness. Second, we show that our location tag is difficult to predict from a distance. For example, an observer cannot predict the location tag inside a guarded data center from a few hundreds of meters away. As an application, consider a location-aware disk drive that will only work inside the data center. An attacker who steals the device and is capable of spoofing Loran-C signals, still cannot make the device work since he does not know what location tag to spoof. We provide experimental data supporting our unpredictability claim.
Optically secured information retrieval using two authenticated phase-only masks.
Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong
2015-10-23
We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.
Optically secured information retrieval using two authenticated phase-only masks
Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong
2015-01-01
We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices. PMID:26494213
Optically secured information retrieval using two authenticated phase-only masks
NASA Astrophysics Data System (ADS)
Wang, Xiaogang; Chen, Wen; Mei, Shengtao; Chen, Xudong
2015-10-01
We propose an algorithm for jointly designing two phase-only masks (POMs) that allow for the encryption and noise-free retrieval of triple images. The images required for optical retrieval are first stored in quick-response (QR) codes for noise-free retrieval and flexible readout. Two sparse POMs are respectively calculated from two different images used as references for authentication based on modified Gerchberg-Saxton algorithm (GSA) and pixel extraction, and are then used as support constraints in a modified double-phase retrieval algorithm (MPRA), together with the above-mentioned QR codes. No visible information about the target images or the reference images can be obtained from each of these authenticated POMs. This approach allows users to authenticate the two POMs used for image reconstruction without visual observation of the reference images. It also allows user to friendly access and readout with mobile devices.
An Efficient Remote Authentication Scheme for Wireless Body Area Network.
Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen
2017-02-01
Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.
Large Devices of Industrial Culture: the Preservation of their Historical Evidence
NASA Astrophysics Data System (ADS)
Keller-Kempas, Ruth
Development of material science and engineering technology is present in devices of the last 150 years. How can the historical evidence of their construction and use, the transfer of technological stages of development be preserved as a special quality in cultural tradition? The conservation of technical artefacts as a cultural heritage of western civilisation has developed scientific methods of conservation so as to respect their authenticity as materialised references of the past. During the last fifteen years these methods have been evaluated in the unique training program for this specialisation of conservation discipline at the HTW Berlin, University for Applied Sciences. They are enough standardised now to be applied without hesitation on objects being kept indoor in a museum or private collection. It is much more difficult to keep devices outside or, as is the case in Observatory - at climates changing between inside aud outside situations. The paper will show a few examples of how to develop concepts for conservation and how it is teclinically possible to preserve the very important original surfaces of the objects, their authentic materiality. As soon as the objects are kept as part of cultural history or history of science they change their function and can not be kept in the same manner as before. They give evidence of their materiality. The archaeometry of modern times is a new and expanding branch of historic research. Moreover the surface of a historic device is the point of contact between passed times and the presence for the general public as much as for the scientists. It will be demonstrated how large the loss of historic information and thus of cultural value of objects can be by renovation instead of considerate conservation. Some examples of careful conservation work carried out on big objects other than an observatory are presented. The paper will then summarise the possibilities and difficulties of doing such work on large devices still in use. The scientific research in this specialist field of conservation has only just begun und will be continued in large scientific projects in the future: “The relation to the past is always an integral dimension of the form, of being of the present, and restoration, dealing materially with the object, always exteriorizes this relationship in a manifest an indisputable manner, even in its least conscious aspects.”
Embedding of Authentic Assessment in Work-Integrated Learning Curriculum
ERIC Educational Resources Information Center
Bosco, Anna Maria; Ferns, Sonia
2014-01-01
Contemporary perspectives of higher education endorse a work integrated learning (WIL) approach to curriculum content, delivery and assessment. It is agreed that authenticity in learning relates to real-world experience, however, differentiating and strategically linking WIL provision and facilitation to assessment tasks and collation of authentic…
Urban Middle School Students' Reflections on Authentic Science Inquiry
ERIC Educational Resources Information Center
Rivera Maulucci, María S.; Brown, Bryan A.; Grey, Salina T.; Sullivan, Shayna
2014-01-01
This study explores the experiences of six urban middle school students in an authentic science inquiry program. Drawing on data including teaching journal entries, student work folders, and semi-structured focus group interviews of six participants, the findings explore six dimensions of authentic science inquiry, an approach to science inquiry…
A Framework for Authenticity in the Mathematics and Statistics Classroom
ERIC Educational Resources Information Center
Garrett, Lauretta; Huang, Li; Charleton, Maria Calhoun
2016-01-01
Authenticity is a term commonly used in reference to pedagogical and curricular qualities of mathematics teaching and learning, but its use lacks a coherent framework. The work of researchers in engineering education provides such a framework. Authentic qualities of mathematics teaching and learning are fit within a model described by Strobel,…
Kerfoot, Karlene
2006-12-01
There is leadership, and then there is authentic leadership. If you are not willing to engage from your heart, to passionately work to create a greater quality of work life for front-line staff every day, and to push yourself to the ultimate limit to make that happen, you might be a leader, but you will not be perceived as an authentic leader. Authentic leaders love, challenge people to do what they didn't believe was possible, and generate the energy to make the impossible possible by their passion for their people, their patients, and for doing the right thing. Thankfully, there are leaders who are willing to live on the edge, model their love, and inspire people to change the world. Will you be one of them?
Kerfoot, Karlene
2006-10-01
There is leadership, and then there is authentic leadership. If you are not willing to engage from your heart, to passionately work to create a greater quality of work life for front-line staff every day, and to push yourself to the ultimate limit to make that happen, you might be a leader, but you will not be perceived as an authentic leader. Authentic leaders love, challenge people to do what they didn't believe was possible, and generate the energy to make the impossible possible by their passion for their people, their patients, and for doing the right thing. Thankfully, there are leaders who are willing to live on the edge, model their love, and inspire people to change the world. Will you be one of them?
ERIC Educational Resources Information Center
Buckmiller, Tom M.; Kruse, Jerrid W.
2015-01-01
Using the Project-Based Learning (PBL) and Authentic Intellectual Work (AIW) models, we sought to create coursework that had value beyond the classroom. Refinements in the self-publishing book industry provide the opportunity to present student work to a larger audience and in a different, more engaging format. With the help of free software, our…
Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng
2018-01-01
Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719
Visualizing Solutions: Apps as Cognitive Stepping-Stones in the Learning Process
ERIC Educational Resources Information Center
Stevenson, Michael; Hedberg, John; Highfield, Kate; Diao, Mingming
2015-01-01
In many K-12 and higher education contexts, the use of smart mobile devices increasingly affords learning experiences that are situated, authentic and connected. While earlier reviews of mobile technology may have led to criticism of these devices as being largely for consumption, many current uses emphasize creativity and productivity, with…
Going to the MALL: Mobile Assisted Language Learning
ERIC Educational Resources Information Center
Chinnery, George M.
2006-01-01
Practically since their availability, a succession of audiovisual recording devices (e.g., reel-to-reel, VCRs, PCs) has been used to capture language samples, and myriad playback and broadcast devices (e.g., phonographs, radios, televisions) have provided access to authentic speech samples. The espousal of audiolingual theory in the 1950s brought…
Authentication of Radio Frequency Identification Devices Using Electronic Characteristics
ERIC Educational Resources Information Center
Chinnappa Gounder Periaswamy, Senthilkumar
2010-01-01
Radio frequency identification (RFID) tags are low-cost devices that are used to uniquely identify the objects to which they are attached. Due to the low cost and size that is driving the technology, a tag has limited computational capabilities and resources. This limitation makes the implementation of conventional security protocols to prevent…
Using Quantum Confinement to Uniquely Identify Devices
Roberts, J.; Bagci, I. E.; Zawawi, M. A. M.; Sexton, J.; Hulbert, N.; Noori, Y. J.; Young, M. P.; Woodhead, C. S.; Missous, M.; Migliorato, M. A.; Roedig, U.; Young, R. J.
2015-01-01
Modern technology unintentionally provides resources that enable the trust of everyday interactions to be undermined. Some authentication schemes address this issue using devices that give a unique output in response to a challenge. These signatures are generated by hard-to-predict physical responses derived from structural characteristics, which lend themselves to two different architectures, known as unique objects (UNOs) and physically unclonable functions (PUFs). The classical design of UNOs and PUFs limits their size and, in some cases, their security. Here we show that quantum confinement lends itself to the provision of unique identities at the nanoscale, by using fluctuations in tunnelling measurements through quantum wells in resonant tunnelling diodes (RTDs). This provides an uncomplicated measurement of identity without conventional resource limitations whilst providing robust security. The confined energy levels are highly sensitive to the specific nanostructure within each RTD, resulting in a distinct tunnelling spectrum for every device, as they contain a unique and unpredictable structure that is presently impossible to clone. This new class of authentication device operates with minimal resources in simple electronic structures above room temperature. PMID:26553435
BossPro: a biometrics-based obfuscation scheme for software protection
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.; Al-Assam, Hisham
2013-05-01
This paper proposes to integrate biometric-based key generation into an obfuscated interpretation algorithm to protect authentication application software from illegitimate use or reverse-engineering. This is especially necessary for mCommerce because application programmes on mobile devices, such as Smartphones and Tablet-PCs are typically open for misuse by hackers. Therefore, the scheme proposed in this paper ensures that a correct interpretation / execution of the obfuscated program code of the authentication application requires a valid biometric generated key of the actual person to be authenticated, in real-time. Without this key, the real semantics of the program cannot be understood by an attacker even if he/she gains access to this application code. Furthermore, the security provided by this scheme can be a vital aspect in protecting any application running on mobile devices that are increasingly used to perform business/financial or other security related applications, but are easily lost or stolen. The scheme starts by creating a personalised copy of any application based on the biometric key generated during an enrolment process with the authenticator as well as a nuance created at the time of communication between the client and the authenticator. The obfuscated code is then shipped to the client's mobile devise and integrated with real-time biometric extracted data of the client to form the unlocking key during execution. The novelty of this scheme is achieved by the close binding of this application program to the biometric key of the client, thus making this application unusable for others. Trials and experimental results on biometric key generation, based on client's faces, and an implemented scheme prototype, based on the Android emulator, prove the concept and novelty of this proposed scheme.
Evaluating authentication options for mobile health applications in younger and older adults
Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G.; Vogel, Daniel; Gebotys, Robert; Yang, Jilan
2018-01-01
Objective Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Methodology Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). Results A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. Conclusions On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability. PMID:29300736
Evaluating authentication options for mobile health applications in younger and older adults.
Grindrod, Kelly; Khan, Hassan; Hengartner, Urs; Ong, Stephanie; Logan, Alexander G; Vogel, Daniel; Gebotys, Robert; Yang, Jilan
2018-01-01
Apps promoting patient self-management may improve health outcomes. However, methods to secure stored information on mobile devices may adversely affect usability. We tested the reliability and usability of common user authentication techniques in younger and older adults. Usability testing was conducted in two age groups, 18 to 30 years and 50 years and older. After completing a demographic questionnaire, each participant tested four authentication options in random order: four-digit personal identification number (PIN), graphical password (GRAPHICAL), Android pattern-lock (PATTERN), and a swipe-style Android fingerprint scanner (FINGERPRINT). Participants rated each option using the Systems Usability Scale (SUS). A total of 59 older and 43 younger participants completed the study. Overall, PATTERN was the fastest option (3.44s), and PIN had the fewest errors per attempt (0.02). Participants were able to login using PIN, PATTERN, and GRAPHICAL at least 98% of the time. FINGERPRINT was the slowest (26.97s), had an average of 1.46 errors per attempt, and had a successful login rate of 85%. Overall, PIN and PATTERN had higher SUS scores than FINGERPRINT and GRAPHICAL. Compared to younger participants, older participants were also less likely to find PATTERN to be tiring, annoying or time consuming and less likely to consider PIN to be time consuming. Younger participants were more likely to rate GRAPHICAL as annoying, time consuming and tiring than older participants. On mobile devices, PIN and pattern-lock outperformed graphical passwords and swipe-style fingerprints. All participants took longer to authenticate using the swipe-style fingerprint compared to other options. Older participants also took two to three seconds longer to authenticate using the PIN, pattern and graphical passwords though this did not appear to affect perceived usability.
NASA Astrophysics Data System (ADS)
Shekar, B. H.; Bhat, S. S.
2017-05-01
Locating the boundary parameters of pupil and iris and segmenting the noise free iris portion are the most challenging phases of an automated iris recognition system. In this paper, we have presented person authentication frame work which uses particle swarm optimization (PSO) to locate iris region and circular hough transform (CHT) to device the boundary parameters. To undermine the effect of the noise presented in the segmented iris region we have divided the candidate region into N patches and used Fuzzy c-means clustering (FCM) to classify the patches into best iris region and not so best iris region (noisy region) based on the probability density function of each patch. Weighted mean Hammimng distance is adopted to find the dissimilarity score between the two candidate irises. We have used Log-Gabor, Riesz and Taylor's series expansion (TSE) filters and combinations of these three for iris feature extraction. To justify the feasibility of the proposed method, we experimented on the three publicly available data sets IITD, MMU v-2 and CASIA v-4 distance.
Molecules for security measures: from keypad locks to advanced communication protocols.
Andréasson, J; Pischel, U
2018-04-03
The idea of using molecules in the context of information security has sparked the interest of researchers from many scientific disciplines. This is clearly manifested in the diversity of the molecular platforms and the analytical techniques used for this purpose, some of which we highlight in this Tutorial Review. Moreover, those molecular systems can be used to emulate a broad spectrum of security measures. For a long time, molecular keypad locks enjoyed a clear preference and the review starts off with a description of how these devices developed. In the last few years, however, the field has evolved into something larger. Examples include more complex authentication protocols (multi-factor authentication and one-time passwords), the recognition of erroneous procedures in data transmission (parity devices), as well as steganographic and cryptographic protection.
ERIC Educational Resources Information Center
Kulophas, Dhirapat; Hallinger, Philip; Ruengtrakul, Auyporn; Wongwanich, Suwimon
2018-01-01
Purpose: In the context of Thailand's progress towards education reform, scholars have identified a lack of effective school-level leadership as an impeding factor. The purpose of this paper is to develop and validate a theoretical model of authentic leadership effects on teacher academic optimism and work engagement. Authentic leadership was…
Teacher Authenticity: A Theoretical and Empirical Investigation
ERIC Educational Resources Information Center
Akoury, Paul N.
2013-01-01
This study builds on a small, under-acknowledged body of educational works that speak to the problem of an overly technical focus on teaching, which negates a more authentic consideration of what it means to teach, including an exploration of the spiritual and moral dimensions. A need for educational change and the teacher's authentic way of…
An Authentic Journey: Teachers' Emergent Understandings about Authentic Assessment and Practice.
ERIC Educational Resources Information Center
Einbender, Lynne; Wood, Diane
As a challenge to traditional assessment, this paper describes how the work of a network of teachers to improve schooling through authentic assessment and practice may lead to a general reform of nearly all aspects of the educational enterprise. The paper springs from observation of participant teachers in the Four Seasons Project which is…
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs. PMID:22438729
Kumar, Pardeep; Lee, Sang-Gon; Lee, Hoon-Jae
2012-01-01
A wireless medical sensor network (WMSN) can sense humans' physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals' hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients' medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1) a two-factor (i.e., password and smartcard) professional authentication; (2) mutual authentication between the professional and the medical sensor; (3) symmetric encryption/decryption for providing message confidentiality; (4) establishment of a secure session key at the end of authentication; and (5) professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost). Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
Evaluation of the automatic optical authentication technologies for control systems of objects
NASA Astrophysics Data System (ADS)
Averkin, Vladimir V.; Volegov, Peter L.; Podgornov, Vladimir A.
2000-03-01
The report considers the evaluation of the automatic optical authentication technologies for the automated integrated system of physical protection, control and accounting of nuclear materials at RFNC-VNIITF, and for providing of the nuclear materials nonproliferation regime. The report presents the nuclear object authentication objectives and strategies, the methodology of the automatic optical authentication and results of the development of pattern recognition techniques carried out under the ISTC project #772 with the purpose of identification of unique features of surface structure of a controlled object and effects of its random treatment. The current decision of following functional control tasks is described in the report: confirmation of the item authenticity (proof of the absence of its substitution by an item of similar shape), control over unforeseen change of item state, control over unauthorized access to the item. The most important distinctive feature of all techniques is not comprehensive description of some properties of controlled item, but unique identification of item using minimum necessary set of parameters, properly comprising identification attribute of the item. The main emphasis in the technical approach is made on the development of rather simple technological methods for the first time intended for use in the systems of physical protection, control and accounting of nuclear materials. The developed authentication devices and system are described.
Glucoweb: a case study of secure, remote biomonitoring and communication.
Nigrin, D J; Kohane, I S
2000-01-01
As the Internet begins to play a greater role in many healthcare processes, it is inevitable that remote monitoring of patients' physiological parameters over the Internet will become increasingly commonplace. Internet-based communication between patients and their healthcare providers has already become prevalent, and has gained significant attention in terms of confidentiality issues. However, transmission of data directly from patients' physiological biomonitoring devices over the Web has garnered significantly less focus, especially in the area of authentication and security. In this paper, we describe a prototype system called Glucoweb, which allows patients with diabetes mellitus to transmit their self-monitored blood glucose data directly from their personal glucometer device to their diabetes care provider over the Internet. No customized software is necessary on the patient's computer, only a Web browser and active Internet connection. We use this example to highlight key authentication and security measures that should be considered for devices that transmit healthcare data to remote locations.
Iris Cryptography for Security Purpose
NASA Astrophysics Data System (ADS)
Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.
2018-04-01
In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.
Bringing Real Solar Physics to the High School Classroom
NASA Astrophysics Data System (ADS)
Seaton, Daniel
2006-06-01
UNH's Partnership for Research Opportunities to Benefit Education (PROBE) project sends graduate students into high school classrooms across New Hampshire in order to help introduce students to authentic scientific inquiry. As one of ten graduate fellows, I worked with students in in ninth through twelfth grades in physical science, physics, earth science, and astronomy classes; helping students carry out individual and class projects on physics and solar physics. Projects related to solar physics included the production and analysis of plasma using a microwave oven, measurement of the solar constant, measurement of the solar rotation rate, solar spectroscopy, analysis of data from TRACE and SOHO, and the construction of various solar-powered devices. This work was generously supported by a grant from the National Science Foundation's GK-12 initiative (NSF#0338277).
ERIC Educational Resources Information Center
Prieto, Linda; Arreguín-Anderson, María G.; Yuen, Timothy T.; Ek, Lucila D.; Sánchez, Patricia; Machado-Casas, Margarita; García, Adriana
2016-01-01
This paper presents four projects in which mobile devices are used to support authentic learning in an afterschool technology club, "La Clase Mágica" (LCM@UTSA), designed to motivate underrepresented elementary school children in science, technology, engineering, and mathematics. The implementation of mobile devices into our LCM@UTSA is…
Authentic leadership and nurse-assessed adverse patient outcomes.
Wong, Carol A; Giallonardo, Lisa M
2013-07-01
Our purpose was to test a model examining relationships among authentic leadership, nurses' trust in their manager, areas of work life and nurse-assessed adverse patient outcomes. Although several work environment factors have been cited as critical to patient outcomes, studies linking nursing leadership styles with patient outcomes are limited suggesting the need for additional research to investigate the mechanisms by which leadership may influence patient outcomes. Secondary analysis of data collected in a cross-sectional survey of 280 (48% response rate) registered nurses working in acute care hospitals in Ontario was conducted using structural equation modelling. The final model fit the data acceptably (χ(2) = 1.30, df = 2, P = 0.52, IFI = 0.99, CFI = 1.00, RMSEA = 0.00). Authentic leadership was significantly associated with decreased adverse patient outcomes through trust in the manager and areas of work life. The findings suggest that nurses who see their managers as demonstrating high levels of authentic leadership report increased trust, greater congruence in the areas of work life and lower frequencies of adverse patient outcomes. Managers who emphasize transparency, balanced processing, self-awareness and high ethical standards in their interactions with nurses may contribute to safer work environments for patients and nurses. © 2013 John Wiley & Sons Ltd.
A Lightweight Protocol for Secure Video Streaming.
Venčkauskas, Algimantas; Morkevicius, Nerijus; Bagdonas, Kazimieras; Damaševičius, Robertas; Maskeliūnas, Rytis
2018-05-14
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing "Fog Node-End Device" layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard.
NASA Astrophysics Data System (ADS)
Sridevi, B.; Supriya, T. S.; Rajaram, S.
2013-01-01
The current generation of wireless networks has been designed predominantly to support voice and more recently data traffic. WiMAX is currently one of the hottest technologies in wireless. The main motive of the mobile technologies is to provide seamless cost effective mobility. But this is affected by Authentication cost and handover delay since on each handoff the Mobile Station (MS) has to undergo all steps of authentication. Pre-Authentication is used to reduce the handover delay and increase the speed of the Intra-ASN Handover. Proposed Pre-Authentication method is intended to reduce the authentication delay by getting pre authenticated by central authority called Pre Authentication Authority (PAA). MS requests PAA for Pre Authentication Certificate (PAC) before performing handoff. PAA verifies the identity of MS and provides PAC to MS and also to the neighboring target Base Stations (tBSs). MS having time bound PAC can skip the authentication process when recognized by target BS during handoff. It also prevents the DOS (Denial Of Service) attack and Replay attack. It has no wastage of unnecessary key exchange of the resources. The proposed work is simulated by NS2 model and by MATLAB.
NASA Astrophysics Data System (ADS)
Gallagher, J. H. R.; Potter, N.; Evans, B. J. K.
2016-12-01
OPeNDAP, in conjunction with the Australian National University, documented the installation process needed to add authentication to OPeNDAP-enabled data servers (Hyrax, TDS, etc.) and examined 13 OPeNDAP clients to determine how best to add authentication using LDAP, Shibboleth and OAuth2 (we used NASA's URS). We settled on a server configuration (architecture) that uses the Apache web server and a collection of open-source modules to perform the authentication and authorization actions. This is not the only way to accomplish those goals, but using Apache represents a good balance between functionality, leveraging existing work that has been well vetted and includes support for a wide variety of web services, include those that depend on a servlet engine such as tomcat (which both Hyrax and TDS do). Or work shows how LDAP, OAuth2 and Shibboleth can all be accommodated using this readily available software stack. Also important is that the Apache software is very widely used and is fairly robust - extremely important for security software components. In order to make use of a server requiring authentication, clients must support the authentication process. Because HTTP has included authentication for well over a decade, and because HTTP/HTTPS can be used by simply linking programs with a library, both the LDAP and OAuth2/URS authentication schemes have almost universal support within the OPeNDAP client base. The clients, i.e. the HTTP client libraries they employ, understand how to submit the credentials to the correct server when confronted by an HTTP/S Unauthorized (401) response. Interestingly OAuth2 can achieve it's SSO objectives while relying entirely on normative HTTP transport. All 13 of the clients examined worked.The situation with Shibboleth is different. While Shibboleth does use HTTP, it also requires the client to either scrape a web page or support the SAML2.0 ECP profile, which, for programmatic clients, means using SOAP messages. Since working with SOAP is outside the scope of HTTP, support for Shibboleth must be added explicitly into the client software. Some of the potential burden of enabling OPeNDAP clients to work with Shibboleth may be mitigated by getting both NetCDF-C and NetCDF-Java libraries to use the Shibboleth ECP profile. If done, this would get 9 of the 13 clients we examined working.
Email authentication using symmetric and asymmetric key algorithm encryption
NASA Astrophysics Data System (ADS)
Halim, Mohamad Azhar Abdul; Wen, Chuah Chai; Rahmi, Isredza; Abdullah, Nurul Azma; Rahman, Nurul Hidayah Ab.
2017-10-01
Protection of sensitive or classified data from unauthorized access, hackers and other personals is virtue. Storage of data is done in devices such as USB, external hard disk, laptops, I-Pad or at cloud. Cloud computing presents with both ups and downs. However, storing information elsewhere increases risk of being attacked by hackers. Besides, the risk of losing the device or being stolen is increased in case of storage in portable devices. There are array of mediums of communications and even emails used to send data or information but these technologies come along with severe weaknesses such as absence of confidentiality where the message sent can be altered and sent to the recipient. No proofs are shown to the recipient that the message received is altered. The recipient would not find out unless he or she checks with the sender. Without encrypted of data or message, sniffing tools and software can be used to hack and read the information since it is in plaintext. Therefore, an electronic mail authentication is proposed, namely Hybrid Encryption System (HES). The security of HES is protected using asymmetric and symmetric key algorithms. The asymmetric algorithm is RSA and symmetric algorithm is Advance Encryption Standard. With the combination for both algorithms in the HES may provide the confidentiality and authenticity to the electronic documents send from the sender to the recipient. In a nutshell, the HES will help users to protect their valuable documentation and data from illegal third party user.
Continuous QKD and high speed data encryption
NASA Astrophysics Data System (ADS)
Zbinden, Hugo; Walenta, Nino; Guinnard, Olivier; Houlmann, Raphael; Wen, Charles Lim Ci; Korzh, Boris; Lunghi, Tommaso; Gisin, Nicolas; Burg, Andreas; Constantin, Jeremy; Legré, Matthieu; Trinkler, Patrick; Caselunghe, Dario; Kulesza, Natalia; Trolliet, Gregory; Vannel, Fabien; Junod, Pascal; Auberson, Olivier; Graf, Yoan; Curchod, Gilles; Habegger, Gilles; Messerli, Etienne; Portmann, Christopher; Henzen, Luca; Keller, Christoph; Pendl, Christian; Mühlberghuber, Michael; Roth, Christoph; Felber, Norbert; Gürkaynak, Frank; Schöni, Daniel; Muheim, Beat
2013-10-01
We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.
Secure Server Login by Using Third Party and Chaotic System
NASA Astrophysics Data System (ADS)
Abdulatif, Firas A.; zuhiar, Maan
2018-05-01
Server is popular among all companies and it used by most of them but due to the security threat on the server make this companies are concerned when using it so that in this paper we will design a secure system based on one time password and third parity authentication (smart phone). The proposed system make security to the login process of server by using one time password to authenticate person how have permission to login and third parity device (smart phone) as other level of security.
SegAuth: A Segment-based Approach to Behavioral Biometric Authentication
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2016-01-01
Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective—behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user’s distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user’s authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets. PMID:28573214
SegAuth: A Segment-based Approach to Behavioral Biometric Authentication.
Li, Yanyan; Xie, Mengjun; Bian, Jiang
2016-10-01
Many studies have been conducted to apply behavioral biometric authentication on/with mobile devices and they have shown promising results. However, the concern about the verification accuracy of behavioral biometrics is still common given the dynamic nature of behavioral biometrics. In this paper, we address the accuracy concern from a new perspective-behavior segments, that is, segments of a gesture instead of the whole gesture as the basic building block for behavioral biometric authentication. With this unique perspective, we propose a new behavioral biometric authentication method called SegAuth, which can be applied to various gesture or motion based authentication scenarios. SegAuth can achieve high accuracy by focusing on each user's distinctive gesture segments that frequently appear across his or her gestures. In SegAuth, a time series derived from a gesture/motion is first partitioned into segments and then transformed into a set of string tokens in which the tokens representing distinctive, repetitive segments are associated with higher genuine probabilities than those tokens that are common across users. An overall genuine score calculated from all the tokens derived from a gesture is used to determine the user's authenticity. We have assessed the effectiveness of SegAuth using 4 different datasets. Our experimental results demonstrate that SegAuth can achieve higher accuracy consistently than existing popular methods on the evaluation datasets.
Developing More Authentic e-Courses by Integrating Working Life Mentoring and Social Media
ERIC Educational Resources Information Center
Leppisaari, Irja; Kleimola, Riina; Herrington, Jan; Maunula, Markus; Hohenthal, Tuula
2014-01-01
Studies show that affordances of social media have not yet been fully exploited in the promotion of authentic e-learning in higher education. The e-Learning of the Future project (2009-2011) has met these challenges through working life mentoring using social media. In this paper, we examine the planning and implementation of social media in nine…
ERIC Educational Resources Information Center
Pesonen, Inari
2008-01-01
This paper examines two improvisational processes, Authentic Movement (AM) and automatic drawing (AD), the possibility of their presentation to the viewer and the meanings such presentation may bring to the work presented. Improvisation has traditionally been used in the process of creating a finished work of art rather than in the finished art…
Ethnicity and Authenticity, or How Black (Hispanic, Native American, etc.) Do I Gotta Be?
ERIC Educational Resources Information Center
Salle, Ellen
1994-01-01
Considers the authenticity of the works of children's and juvenile authors who write about cultures or sexes other than their own. Examples are provided, including the works of Scott O'Dell, and limitations placed on authors, including minority authors, who are expected to write only from their own experiences are discussed. (36 references) (LRW)
Separation of high-resolution samples of overlapping latent fingerprints using relaxation labeling
NASA Astrophysics Data System (ADS)
Qian, Kun; Schott, Maik; Schöne, Werner; Hildebrandt, Mario
2012-06-01
The analysis of latent fingerprint patterns generally requires clearly recognizable friction ridge patterns. Currently, overlapping latent fingerprints pose a major problem for traditional crime scene investigation. This is due to the fact that these fingerprints usually have very similar optical properties. Consequently, the distinction of two or more overlapping fingerprints from each other is not trivially possible. While it is possible to employ chemical imaging to separate overlapping fingerprints, the corresponding methods require sophisticated fingerprint acquisition methods and are not compatible with conventional forensic fingerprint data. A separation technique that is purely based on the local orientation of the ridge patterns of overlapping fingerprints is proposed by Chen et al. and quantitatively evaluated using off-the-shelf fingerprint matching software with mostly artificially composed overlapping fingerprint samples, which is motivated by the scarce availability of authentic test samples. The work described in this paper adapts the approach presented by Chen et al. for its application on authentic high resolution fingerprint samples acquired by a contactless measurement device based on a Chromatic White Light (CWL) sensor. An evaluation of the work is also given, with the analysis of all adapted parameters. Additionally, the separability requirement proposed by Chen et al. is also evaluated for practical feasibility. Our results show promising tendencies for the application of this approach on high-resolution data, yet the separability requirement still poses a further challenge.
Kampa, Judith; Rigotti, Thomas; Otto, Kathleen
2017-04-07
In order to gain more knowledge on how the positive leadership concept of authentic leadership impacts follower strain, this study tries to uncover procedural justice as an underlying mechanism. In contrast to previous work, we exclusively base our theoretical model on justice theories. Specifically, we hypothesize that authentic leadership negatively predicts emotional exhaustion through perceptions of procedural justice. We assume that this indirect effect is conditional on followers' amount of emotional demands, and that the procedural justice-emotional exhaustion relationship is stronger when emotional demands are high. This finally results in a stronger exhaustion-reducing effect of authentic leadership. The proposed moderated mediation model was tested in a sample of N=628 employees nested in 168 teams using lagged data from three waves. Results provide support for all hypotheses. Authentic leadership is critical to employees' well-being as it contributes to an elevated perception of positive work conditions (procedural justice), especially in contexts with high emotional demands. Limitations and practical implications on leadership development are discussed.
KAMPA, Judith; RIGOTTI, Thomas; OTTO, Kathleen
2016-01-01
In order to gain more knowledge on how the positive leadership concept of authentic leadership impacts follower strain, this study tries to uncover procedural justice as an underlying mechanism. In contrast to previous work, we exclusively base our theoretical model on justice theories. Specifically, we hypothesize that authentic leadership negatively predicts emotional exhaustion through perceptions of procedural justice. We assume that this indirect effect is conditional on followers’ amount of emotional demands, and that the procedural justice-emotional exhaustion relationship is stronger when emotional demands are high. This finally results in a stronger exhaustion-reducing effect of authentic leadership. The proposed moderated mediation model was tested in a sample of N=628 employees nested in 168 teams using lagged data from three waves. Results provide support for all hypotheses. Authentic leadership is critical to employees’ well-being as it contributes to an elevated perception of positive work conditions (procedural justice), especially in contexts with high emotional demands. Limitations and practical implications on leadership development are discussed. PMID:27818452
A Formal Integrity Framework with Application to a Secure Information ATM (SIATM)
2012-10-01
work on Integrity and resultant implementations seems to have focussed more on a matters related to source authentication and transmission assurance...to have focussed more on a matters related to source authentication and transmission assurance. However, the quality of data aspect is becoming more...implementations seems to have focussed more on matters related to source authentication and transmission assur- ance, for which there is a
Authentication in Virtual Organizations: A Reputation Based PKI Interconnection Model
NASA Astrophysics Data System (ADS)
Wazan, Ahmad Samer; Laborde, Romain; Barrere, Francois; Benzekri, Abdelmalek
Authentication mechanism constitutes a central part of the virtual organization work. The PKI technology is used to provide the authentication in each organization involved in the virtual organization. Different trust models are proposed to interconnect the different PKIs in order to propagate the trust between them. While the existing trust models contain many drawbacks, we propose a new trust model based on the reputation of PKIs.
Authentic leadership and its effect on employees' organizational citizenship behaviours.
Edú Valsania, Sergio; Moriano León, Juan A; Molero Alonso, Fernando; Topa Cantisano, Gabriela
2012-11-01
The studies that have verified the positive association of authentic leadership with organizational citizenship behaviours (OCBs), have used global measures of both constructs. Therefore, the goal of this work is to analyze the effect of authentic leadership on employees' OCBs, specifically focusing on the relations of the four components of authentic leadership with the individual and organizational dimensions of the OCBs. The participants of this study were 220 Spanish employees (30.9% men and 69.1% women) who completed a questionnaire that included the variables of interest in this study: Authentic Leadership, OCB and Sociobiographical control variables. The results, obtained with stepwise multiple regression analysis, show that two components of authentic leadership-moral perspective and relational transparency-present significant relationships with OCB. Moreover, authentic leadership is a better predictor of employees' OCB when these behaviors are impersonal and directed towards the organization than when they are directed towards other people. These results have practical implications for human resources management in organizations, especially in selection processes and when training top executives.
Tucker, J Allan; DeGroft, Aaron H
2002-01-01
At the Ultrapath X meeting in Florence, the regular session opened with a presentation of Aaron DeGroft's engrossing story of investigating the authenticity of a portrait of Federico II Gonzaga, Duke of Mantua. In the early 1900s, this work had been deemed to be an authentic production by Titian, a great artist of the Italian Renaissance. A respected art historian, however, discovered a conflict of dates that led to the conclusion that this work was not authentic. In a process sometimes analogous to the practice of surgical pathology, Dr. DeGroft pursued a review of the original materials that refutes this seeming contradiction of dates. Dr. DeGroft also undertook an extensive art historical examination and scientific analysis, including the use of electron microscopy, to persuasively conclude that this portrait is authentic. Further, his work provided a bridge from the conference setting in Florence, rich in Renaissance art, to the contemporary update on ultrastructural pathology provided by the conference.
ERIC Educational Resources Information Center
Iowa Department of Education, 2012
2012-01-01
Case studies of Authentic Intellectual Work (AIW) in the Iowa project included four high schools that have been practicing this professional development model for the last five years. The schools, AHST Secondary School, Cedar Falls High School, Spencer High and Middle Schools and Valley High School were visited in April, 2011. The visits included…
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks.
Guo, Rui; Wen, Qiaoyan; Jin, Zhengping; Zhang, Hua
2013-01-01
Sensor networks have opened up new opportunities in healthcare systems, which can transmit patient's condition to health professional's hand-held devices in time. The patient's physiological signals are very sensitive and the networks are extremely vulnerable to many attacks. It must be ensured that patient's privacy is not exposed to unauthorized entities. Therefore, the control of access to healthcare systems has become a crucial challenge. An efficient and secure authentication protocol will thus be needed in wireless medical sensor networks. In this paper, we propose a certificateless authentication scheme without bilinear pairing while providing patient anonymity. Compared with other related protocols, the proposed scheme needs less computation and communication cost and preserves stronger security. Our performance evaluations show that this protocol is more practical for healthcare system in wireless medical sensor networks. PMID:23710147
Eat-by-light fiber-optic and micro-optic devices for food quality and safety assessment
NASA Astrophysics Data System (ADS)
Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Grimaldi, M. F.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.
2007-06-01
A selection is presented of fiber-optic and micro-optic devices that have been designed and tested for guaranteeing the quality and safety of typical foods, such as extra virgin olive oil, beer, and milk. Scattered colorimetry is used to authenticate various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids, which are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma that is capable of distinguishing different ageing levels of extra virgin olive oil is also presented. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer for the rapid monitoring of the carcinogenic M1 aflatoxin in milk, is experimented.
Eat-by-light: fiber-optic and micro-optic devices for food safety and quality assessment
NASA Astrophysics Data System (ADS)
Mignani, A. G.; Ciaccheri, L.; Cucci, C.; Mencaglia, A. A.; Cimato, A.; Attilio, C.; Thienpont, H.; Ottevaere, H.; Paolesse, R.; Mastroianni, M.; Monti, D.; Buonocore, G.; Del Nobile, A.; Mentana, A.; Dall'Asta, C.; Faccini, A.; Galaverna, G.; Dossena, A.
2007-07-01
A selection of fiber-optic and micro-optic devices is presented designed and tested for monitoring the quality and safety of typical foods, namely the extra virgin olive oil, the beer, and the milk. Scattered colorimetry is used for the authentication of various types of extra virgin olive oil and beer, while a fiber-optic-based device for UV-VIS-NIR absorption spectroscopy is exploited in order to obtain the hyperspectral optical signature of olive oil. This is done not only for authentication purposes, but also so as to correlate the spectral data with the content of fatty acids that are important nutritional factors. A micro-optic sensor for the detection of olive oil aroma is presented. It is capable of distinguishing different ageing levels of extra virgin olive oil. It shows effective potential for acting as a smart cap of bottled olive oil in order to achieve a non-destructive olfactory perception of oil ageing. Lastly, a compact portable fluorometer is experimented for the rapid monitoring of the carcinogenic M1 aflatoxin in milk.
Alexander, Catherine; Lopez, Ruth Palan
2018-01-01
The aim of this study is to understand the behaviors experienced nurse executives use to create healthy work environments (HWEs). The constructs of authentic leadership formed the conceptual framework for the study. The American Association of Critical-Care Nurses recommends authentic leadership as the preferred style of leadership for creating and sustaining HWEs. Behaviors associated with authentic leadership in nursing are not well understood. A purposive sample of 17 experienced nurse executives were recruited from across the United States for this qualitative study. Thematic analysis was used to analyze the in-depth, semistructured interviews. Four constructs of authentic leaders were supported and suggest unique applications of each including self-awareness (a private and professional self), balanced processing (open hearted), transparency (limiting exposure), and moral leadership (nursing compass). Authentic leadership may provide a sound foundation to support nursing leadership practices; however, its application to the discipline requires additional investigation.
Laschinger, Heather K S; Smith, Lesley Marie
2013-01-01
The aim of this study was to examine new-graduate nurses' perceptions of the influence of authentic leadership and structural empowerment on the quality of interprofessional collaboration in healthcare work environments. Although the challenges associated with true interprofessional collaboration are well documented, new-graduate nurses may feel particularly challenged in becoming contributing members. Little research exists to inform nurse leaders' efforts to facilitate effective collaboration in acute care settings. A predictive nonexperimental design was used to test a model integrating authentic leadership and workplace empowerment as resources that support interprofessional collaboration. Multiple regression analysis revealed that 24% of the variance in perceived interprofessional collaboration was explained by unit-leader authentic leadership and structural empowerment (R = 0.24, F = 29.55, P = .001). Authentic leadership (β = .294) and structural empowerment (β = .288) were significant independent predictors. Results suggest that authentic leadership and structural empowerment may promote interprofessional collaborative practice in new nurses.
A Rich Client-Server Based Framework for Convenient Security and Management of Mobile Applications
NASA Astrophysics Data System (ADS)
Badan, Stephen; Probst, Julien; Jaton, Markus; Vionnet, Damien; Wagen, Jean-Frédéric; Litzistorf, Gérald
Contact lists, Emails, SMS or custom applications on a professional smartphone could hold very confidential or sensitive information. What could happen in case of theft or accidental loss of such devices? Such events could be detected by the separation between the smartphone and a Bluetooth companion device. This event should typically block the applications and delete personal and sensitive data. Here, a solution is proposed based on a secured framework application running on the mobile phone as a rich client connected to a security server. The framework offers strong and customizable authentication and secured connectivity. A security server manages all security issues. User applications are then loaded via the framework. User data can be secured, synchronized, pushed or pulled via the framework. This contribution proposes a convenient although secured environment based on a client-server architecture using external authentications. Several features of the proposed system are exposed and a practical demonstrator is described.
Sewenig, Sabine; Bullinger, Dino; Hener, Uwe; Mosandl, Armin
2005-02-23
A new coupling system of GC-GC, connected via a Multi Column Switching Device MCS2 for measuring isotope ratios, is introduced. By means of several standard substances the precise and accurate measurement of isotopic values is proved. First applications concerning the authentication of raspberry aroma compounds are established. Consequently, the combination of constant flow multidimensional gas chromatography-combustion/pyrolysis-isotope ratio mass spectrometry (MDGC-C/P-IRMS) is applied to the authenticity assessment of (E)-alpha(beta)-ionone from six different raspberry cultivars. Furthermore, 12 commercially available raspberry products and samples of (E)-alpha(beta)-ionone, some declared to be natural, are investigated. delta(2)Eta(V)(-)(SMOW) and delta(13)C(V)(-)(PDB) values of (E)-alpha(beta)-ionone are determined, and characteristic authenticity ranges were concluded from raspberries by correlation of both delta(2)Eta(V)(-)(SMOW) and delta(13)C( V)(-)(PDB) values. The results are correlated with the determination of enantiomeric purities of (E)-alpha-ionone, using stir bar sorptive extraction enantio-multidimensional gas chromatography mass spectrometry (SBSE-enantio-MDGC-MS).
Next Generation Trusted Radiation Identification System (NG-TRIS).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Flynn, Adam J.; Amai, Wendy A.; Merkle, Peter Benedict
2010-05-01
The original Trusted Radiation Identification System (TRIS) was developed from 1999-2001, featuring information barrier technology to collect gamma radiation template measurements useful for arms control regime operations. The first TRIS design relied upon a multichannel analyzer (MCA) that was external to the protected volume of the system enclosure, undesirable from a system security perspective. An internal complex programmable logic device (CPLD) contained data which was not subject to software authentication. Physical authentication of the TRIS instrument case was performed by a sensitive but slow eddy-current inspection method. This paper describes progress to date for the Next Generation TRIS (NG-TRIS), whichmore » improves the TRIS design. We have incorporated the MCA internal to the trusted system volume, achieved full authentication of CPLD data, and have devised rapid methods to authenticate the system enclosure and weld seals of the NG-TRIS enclosure. For a complete discussion of the TRIS system and components upon which NG-TRIS is based, the reader is directed to the comprehensive user's manual and system reference of Seager, et al.« less
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham- Yahalom logic. PMID:27007951
Elliptic Curve Cryptography-Based Authentication with Identity Protection for Smart Grids.
Zhang, Liping; Tang, Shanyu; Luo, He
2016-01-01
In a smart grid, the power service provider enables the expected power generation amount to be measured according to current power consumption, thus stabilizing the power system. However, the data transmitted over smart grids are not protected, and then suffer from several types of security threats and attacks. Thus, a robust and efficient authentication protocol should be provided to strength the security of smart grid networks. As the Supervisory Control and Data Acquisition system provides the security protection between the control center and substations in most smart grid environments, we focus on how to secure the communications between the substations and smart appliances. Existing security approaches fail to address the performance-security balance. In this study, we suggest a mitigation authentication protocol based on Elliptic Curve Cryptography with privacy protection by using a tamper-resistant device at the smart appliance side to achieve a delicate balance between performance and security of smart grids. The proposed protocol provides some attractive features such as identity protection, mutual authentication and key agreement. Finally, we demonstrate the completeness of the proposed protocol using the Gong-Needham-Yahalom logic.
Enhancing the authenticity of assessments through grounding in first impressions.
Humă, Bogdana
2015-09-01
This article examines first impressions through a discursive and interactional lens. Until now, social psychologists have studied first impressions in laboratory conditions, in isolation from their natural environment, thus overseeing their discursive roles as devices for managing situated interactional concerns. I examine fragments of text and talk in which individuals spontaneously invoke first impressions of other persons as part of assessment activities in settings where the authenticity of speakers' stances might be threatened: (1) in activities with inbuilt evaluative components and (2) in sequential contexts where recipients have been withholding affiliation to speakers' actions. I discuss the relationship between authenticity, as a type of credibility issue related to intersubjective trouble, and the characteristics of first impression assessments, which render them useful for dealing with this specific credibility concern. I identify four features of first impression assessments which make them effective in enhancing authenticity: witness positioning (Potter, 1996, Representing reality: Discourse, rhetoric and social construction, Sage, London), (dis)location in time and space, automaticity, and extreme formulations (Edwards, 2003, Analyzing race talk: Multidisciplinary perspectives on the research interview, Cambridge University Press, New York). © 2014 The British Psychological Society.
Design and fabrication of a magnetically actuated non-invasive reusable drug delivery device.
Dsa, Joyline; Goswami, Manish; Singh, B R; Bhatt, Nidhi; Sharma, Pankaj; Chauhan, Meenakshi K
2018-07-01
We present a novel approach of designing and fabricating a noninvasive drug delivery device which is capable of delivering the drug to the target site in a controlled manner. The device utilizes a reservoir which can be reused once the drug has completely diffused from it. This micro-reservoir based fabricated device has been successfully tested using niosomes of insulin drug filled in, which was then sealed with a magnetic membrane of 20 µm thick and was actuated by applying magnetic field. The deflection of the membrane on application of magnetic field results in the drug release from the reservoir. The discharge of the drug solution and the release rates was controlled by external magnetic field. The simulation of the membrane deflection using COMSOL software was carried out to optimize the concentration of the ferrous nanopowder in PDMS matrix. The characterization of the devices was implemented in-vitro on water and in-vivo on Wistar rats. It was also validated using high-performance liquid chromatography (HPLC) by observing characteristic peak of insulin. The blood samples showed the retention time of 2.79 min at λ max of 280 nm which further authenticated the effectiveness of the proposed work. This noninvasive fabricated device provides reusability, precise control and can enable the patient or a physician to actively administrate the drug when required.
New Results on Unconditionally Secure Multi-receiver Manual Authentication
NASA Astrophysics Data System (ADS)
Wang, Shuhong; Safavi-Naini, Reihaneh
Manual authentication is a recently proposed model of communication motivated by the settings where the only trusted infrastructure is a low bandwidth authenticated channel, possibly realized by the aid of a human, that connects the sender and the receiver who are otherwise connected through an insecure channel and do not have any shared key or public key infrastructure. A good example of such scenarios is pairing of devices in Bluetooth. Manual authentication systems are studied in computational and information theoretic security model and protocols with provable security have been proposed. In this paper we extend the results in information theoretic model in two directions. Firstly, we extend a single receiver scenario to multireceiver case where the sender wants to authenticate the same message to a group of receivers. We show new attacks (compared to single receiver case) that can launched in this model and demonstrate that the single receiver lower bound 2log(1/ɛ) + O(1) on the bandwidth of manual channel stays valid in the multireceiver scenario. We further propose a protocol that achieves this bound and provides security, in the sense that we define, if up to c receivers are corrupted. The second direction is the study of non-interactive protocols in unconditionally secure model. We prove that unlike computational security framework, without interaction a secure authentication protocol requires the bandwidth of the manual channel to be at least the same as the message size, hence non-trivial protocols do not exist.
NASA Astrophysics Data System (ADS)
Miret, Josep M.; Sebé, Francesc
Low-cost devices are the key component of several applications: RFID tags permit an automated supply chain management while smart cards are a secure means of storing cryptographic keys required for remote and secure authentication in e-commerce and e-government applications. These devices must be cheap in order to permit their cost-effective massive manufacturing and deployment. Unfortunately, their low cost limits their computational power. Other devices such as nodes of sensor networks suffer from an additional constraint, namely, their limited battery life. Secure applications designed for these devices cannot make use of classical cryptographic primitives designed for full-fledged computers.
Rodríguez-Ramírez, Roberto; González-Córdova, Aarón F; Vallejo-Cordoba, Belinda
2011-01-31
This work presents an overview of the applicability of PCR-based capillary electrophoresis (CE) in food authentication and traceability of foods from animal origin. Analytical approaches for authenticating and tracing meat and meat products and fish and seafood products are discussed. Particular emphasis will be given to the usefulness of genotyping in food tracing by using CE-based genetic analyzers. Copyright © 2010 Elsevier B.V. All rights reserved.
New, More Authentic Model for AIDS Will Accelerate Studies | Poster
By Frank Blanchard, Staff Writer, and Jeff Lifson, Guest Writer Researchers are working to develop a more authentic animal model of human immunodeficiency virus (HIV) infection and AIDS that is expected to speed up studies of experimental treatments and vaccines.
Students' Involvement in Authentic Modelling Practices as Contexts in Chemistry Education
NASA Astrophysics Data System (ADS)
Prins, Gjalt T.; Bulte, Astrid M. W.; van Driel, Jan H.; Pilot, Albert
2009-11-01
In science education students should come to understand the nature and significance of models. A promising strategy to achieve this goal is using authentic modelling practices as contexts for meaningful learning of models and modelling. An authentic practice is defined as professionals working with common motives and purposes, pertaining to a similar type of procedure and applying relevant knowledge on the modelling issue they work on. In this study we evaluate whether the use of authentic practices initiates adequate students’ involvement. This was done by investigating students’ interests, ownership, familiarity and complexity. In addition, we evaluated students’ expressed modelling procedures in response to the modelling issues. We designed learning tasks which were enacted by a focus group of students. Three primary data sources were used to collect data. Firstly, a group discussion was organised in which students’ reflected on both authentic practices. Secondly, students filled in written questionnaires containing items on affective and cognitive aspects. Thirdly, the realised modelling procedures by students were analysed. The results show that students’ involvement was successfully initiated, evidenced by motivated students, willingness to continue and the completeness and quality of the realised modelling procedures. The design of the learning tasks proved to be successful in realising this involvement. The results obtained in this study support the strategy of using authentic modelling practices as contexts for meaningful learning of models and modelling.
Developmental Changes in Judgments of Authentic Objects
Frazier, Brandy N.; Gelman, Susan A.
2009-01-01
This study examined the development of an understanding of authenticity among 112 children (preschoolers, kindergarten, 1st-graders, and 4th-graders) and 119 college students. Participants were presented with pairs of photographs depicting authentic and non-authentic objects and asked to pick which one belongs in a museum and which one they would want to have. Results suggest that both children and adults recognize the special nature of authentic objects by reporting that they belong in a museum. However, this belief broadens with age, at first just for famous associations (preschool), then also for original creations (kindergarten), and finally for personal associations as well (4th grade). At all ages, an object's authentic nature is distinct from its desirability. Thus, from an early age, children appear to understand that the historical path of an authentic object affects its nature. This work demonstrates the importance of non-obvious properties in children's concepts. For preschool as well as older children, history (a non-visible property) adds meaning beyond the material or functional worth of an object. PMID:20160988
A Standard Mutual Authentication Protocol for Cloud Computing Based Health Care System.
Mohit, Prerna; Amin, Ruhul; Karati, Arijit; Biswas, G P; Khan, Muhammad Khurram
2017-04-01
Telecare Medical Information System (TMIS) supports a standard platform to the patient for getting necessary medical treatment from the doctor(s) via Internet communication. Security protection is important for medical records (data) of the patients because of very sensitive information. Besides, patient anonymity is another most important property, which must be protected. Most recently, Chiou et al. suggested an authentication protocol for TMIS by utilizing the concept of cloud environment. They claimed that their protocol is patient anonymous and well security protected. We reviewed their protocol and found that it is completely insecure against patient anonymity. Further, the same protocol is not protected against mobile device stolen attack. In order to improve security level and complexity, we design a light weight authentication protocol for the same environment. Our security analysis ensures resilience of all possible security attacks. The performance of our protocol is relatively standard in comparison with the related previous research.
Boamah, Sheila A; Read, Emily A; Spence Laschinger, Heather K
2017-05-01
To test a hypothesized model linking new graduate nurses' perceptions of their manager's authentic leadership behaviours to structural empowerment, short-staffing and work-life interference and subsequent burnout, job satisfaction and patient care quality. Authentic leadership and structural empowerment have been shown to reduce early career burnout among nurses. Short-staffing and work-life interference are also linked to burnout and may help explain the impact of positive, empowering leadership on burnout, which in turn influences job satisfaction and patient care quality. A time-lagged study of Canadian new graduate nurses was conducted. At Time 1, surveys were sent to 3,743 nurses (November 2012-March 2013) and 1,020 were returned (27·3% response rate). At Time 2 (May-July 2014), 406 nurses who responded at Time 1 completed surveys (39·8% response rate). Descriptive analysis was conducted in SPSS. Structural equation modelling in Mplus was used to test the hypothesized model. The hypothesized model was supported. Authentic leadership had a significant positive effect on structural empowerment, which in turn decreased both short-staffing and work-life interference. Short-staffing and work-life imbalance subsequently resulted in nurse burnout, lower job satisfaction and lower patient care quality 1 year later. The findings suggest that short-staffing and work-life interference are important factors influencing new graduate nurse burnout. Developing nurse managers' authentic leadership behaviours and working with them to create and sustain empowering work environments may help reduce burnout, increase nurse job satisfaction and improve patient care quality. © 2016 John Wiley & Sons Ltd.
A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards
NASA Astrophysics Data System (ADS)
Son, Kyungho; Han, Dong-Guk; Won, Dongho
In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.
Secure password-based authenticated key exchange for web services
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liang, Fang; Meder, Samuel; Chevassut, Olivier
This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options inmore » the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.« less
Dual domain watermarking for authentication and compression of cultural heritage images.
Zhao, Yang; Campisi, Patrizio; Kundur, Deepa
2004-03-01
This paper proposes an approach for the combined image authentication and compression of color images by making use of a digital watermarking and data hiding framework. The digital watermark is comprised of two components: a soft-authenticator watermark for authentication and tamper assessment of the given image, and a chrominance watermark employed to improve the efficiency of compression. The multipurpose watermark is designed by exploiting the orthogonality of various domains used for authentication, color decomposition and watermark insertion. The approach is implemented as a DCT-DWT dual domain algorithm and is applied for the protection and compression of cultural heritage imagery. Analysis is provided to characterize the behavior of the scheme under ideal conditions. Simulations and comparisons of the proposed approach with state-of-the-art existing work demonstrate the potential of the overall scheme.
Compressed sensing approach for wrist vein biometrics.
Lantsov, Aleksey; Ryabko, Maxim; Shchekin, Aleksey
2018-04-01
The work describes features of the compressed sensing (CS) approach utilized for development of a wearable system for wrist vein recognition with single-pixel detection; we consider this system useful for biometrics authentication purposes. The CS approach implies use of a spatial light modulation (SLM) which, in our case, can be performed differently-with a liquid crystal display or diffusely scattering medium. We show that compressed sensing combined with above-mentioned means of SLM allows us to avoid using an optical system-a limiting factor for wearable devices. The trade-off between the 2 different SLM approaches regarding issues of practical implementation of CS approach for wrist vein recognition purposes is discussed. A possible solution of a misalignment problem-a typical issue for imaging systems based upon 2D arrays of photodiodes-is also proposed. Proposed design of the wearable device for wrist vein recognition is based upon single-pixel detection. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
A Trusted Portable Computing Device
NASA Astrophysics Data System (ADS)
Ming-wei, Fang; Jun-jun, Wu; Peng-fei, Yu; Xin-fang, Zhang
A trusted portable computing device and its security mechanism were presented to solve the security issues, such as the attack of virus and Trojan horse, the lost and stolen of storage device, in mobile office. It used smart card to build a trusted portable security base, virtualization to create a secure virtual execution environment, two-factor authentication mechanism to identify legitimate users, and dynamic encryption to protect data privacy. The security environment described in this paper is characteristic of portability, security and reliability. It can meet the security requirement of mobile office.
The Perception and Mimicry of Facial Movements Predict Judgments of Smile Authenticity
Korb, Sebastian; With, Stéphane; Niedenthal, Paula; Kaiser, Susanne; Grandjean, Didier
2014-01-01
The mechanisms through which people perceive different types of smiles and judge their authenticity remain unclear. Here, 19 different types of smiles were created based on the Facial Action Coding System (FACS), using highly controlled, dynamic avatar faces. Participants observed short videos of smiles while their facial mimicry was measured with electromyography (EMG) over four facial muscles. Smile authenticity was judged after each trial. Avatar attractiveness was judged once in response to each avatar’s neutral face. Results suggest that, in contrast to most earlier work using static pictures as stimuli, participants relied less on the Duchenne marker (the presence of crow’s feet wrinkles around the eyes) in their judgments of authenticity. Furthermore, mimicry of smiles occurred in the Zygomaticus Major, Orbicularis Oculi, and Corrugator muscles. Consistent with theories of embodied cognition, activity in these muscles predicted authenticity judgments, suggesting that facial mimicry influences the perception of smiles. However, no significant mediation effect of facial mimicry was found. Avatar attractiveness did not predict authenticity judgments or mimicry patterns. PMID:24918939
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-07-09
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption.
Kim, Daehee; Kim, Dongwan; An, Sunshin
2016-01-01
Code dissemination in wireless sensor networks (WSNs) is a procedure for distributing a new code image over the air in order to update programs. Due to the fact that WSNs are mostly deployed in unattended and hostile environments, secure code dissemination ensuring authenticity and integrity is essential. Recent works on dynamic packet size control in WSNs allow enhancing the energy efficiency of code dissemination by dynamically changing the packet size on the basis of link quality. However, the authentication tokens attached by the base station become useless in the next hop where the packet size can vary according to the link quality of the next hop. In this paper, we propose three source authentication schemes for code dissemination supporting dynamic packet size. Compared to traditional source authentication schemes such as μTESLA and digital signatures, our schemes provide secure source authentication under the environment, where the packet size changes in each hop, with smaller energy consumption. PMID:27409616
Read, Emily A; Laschinger, Heather K S
2015-07-01
To examine a theoretical model testing the effects of authentic leadership, structural empowerment and relational social capital on the mental health and job satisfaction of new graduate nurses over the first year of practice. Relational social capital is an important interpersonal organizational resource that may foster new graduate nurses' workplace well-being and promote retention. Evidence shows that authentic leadership and structural empowerment are key aspects of the work environment that support new graduate nurses; however, the mediating role of relational social capital has yet to be explored. A longitudinal survey design was used to test the hypothesized model. One hundred ninety-one new graduate nurses in Ontario with <2 years of experience completed mail surveys in January-March 2010 and 1 year later in 2011. Path analysis using structural equation modelling was used to test the theoretical model. Participants were mostly female, working full time in medicine/surgery or critical care. All measures demonstrated acceptable reliability and validity. Path analysis results supported our hypothesized model; structural empowerment mediated the relationship between authentic leadership and nurses' relational social capital, which in turn had a negative effect on mental health symptoms and a positive effect on job satisfaction. All indirect paths in the model were significant. By creating structurally empowering work environments, authentic leaders foster relational social capital among new graduate nurses leading to positive health and retention outcomes. © 2015 John Wiley & Sons Ltd.
Student Teachers' Mathematics Attitudes, Authentic Investigations and Use of Metacognitive Tools
ERIC Educational Resources Information Center
Afamasaga-Fuata'i, Karoline; Sooaemalelagi, Lumaava
2014-01-01
Based on findings from a semester-long study, this article examines the development of Samoan prospective teachers' mathematical understandings and mathematics attitudes when investigating authentic contexts and applying working mathematically processes, mental computations and problem-solving strategies to find solutions of problems. The…
de Fuentes, Jose Maria; Gonzalez-Manzano, Lorena; Ribagorda, Arturo
2018-04-16
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices.
Gonzalez-Manzano, Lorena; Ribagorda, Arturo
2018-01-01
Smartphones are equipped with a set of sensors that describe the environment (e.g., GPS, noise, etc.) and their current status and usage (e.g., battery consumption, accelerometer readings, etc.). Several works have already addressed how to leverage such data for user-in-a-context continuous authentication, i.e., determining if the porting user is the authorized one and resides in his regular physical environment. This can be useful for an early reaction against robbery or impersonation. However, most previous works depend on assisted sensors, i.e., they rely upon immutable elements (e.g., cell towers, satellites, magnetism), thus being ineffective in their absence. Moreover, they focus on accuracy aspects, neglecting usability ones. For this purpose, in this paper, we explore the use of four non-assisted sensors, namely battery, transmitted data, ambient light and noise. Our approach leverages data stream mining techniques and offers a tunable security-usability trade-off. We assess the accuracy, immediacy, usability and readiness of the proposal. Results on 50 users over 24 months show that battery readings alone achieve 97.05% of accuracy and 81.35% for audio, light and battery all together. Moreover, when usability is at stake, robbery is detected in 100 s for the case of battery and in 250 s when audio, light and battery are applied. Remarkably, these figures are obtained with moderate training and storage needs, thus making the approach suitable for current devices. PMID:29659542
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things
Van den Abeele, Floris; Moerman, Ingrid; Demeester, Piet
2017-01-01
As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things. PMID:28696393
Secure Service Proxy: A CoAP(s) Intermediary for a Securer and Smarter Web of Things.
Van den Abeele, Floris; Moerman, Ingrid; Demeester, Piet; Hoebeke, Jeroen
2017-07-11
As the IoT continues to grow over the coming years, resource-constrained devices and networks will see an increase in traffic as everything is connected in an open Web of Things. The performance- and function-enhancing features are difficult to provide in resource-constrained environments, but will gain importance if the WoT is to be scaled up successfully. For example, scalable open standards-based authentication and authorization will be important to manage access to the limited resources of constrained devices and networks. Additionally, features such as caching and virtualization may help further reduce the load on these constrained systems. This work presents the Secure Service Proxy (SSP): a constrained-network edge proxy with the goal of improving the performance and functionality of constrained RESTful environments. Our evaluations show that the proposed design reaches its goal by reducing the load on constrained devices while implementing a wide range of features as different adapters. Specifically, the results show that the SSP leads to significant savings in processing, network traffic, network delay and packet loss rates for constrained devices. As a result, the SSP helps to guarantee the proper operation of constrained networks as these networks form an ever-expanding Web of Things.
NASA Astrophysics Data System (ADS)
Komogortsev, Oleg V.; Karpov, Alexey; Holland, Corey D.
2012-06-01
The widespread use of computers throughout modern society introduces the necessity for usable and counterfeit-resistant authentication methods to ensure secure access to personal resources such as bank accounts, e-mail, and social media. Current authentication methods require tedious memorization of lengthy pass phrases, are often prone to shouldersurfing, and may be easily replicated (either by counterfeiting parts of the human body or by guessing an authentication token based on readily available information). This paper describes preliminary work toward a counterfeit-resistant usable eye movement-based (CUE) authentication method. CUE does not require any passwords (improving the memorability aspect of the authentication system), and aims to provide high resistance to spoofing and shoulder-surfing by employing the combined biometric capabilities of two behavioral biometric traits: 1) oculomotor plant characteristics (OPC) which represent the internal, non-visible, anatomical structure of the eye; 2) complex eye movement patterns (CEM) which represent the strategies employed by the brain to guide visual attention. Both OPC and CEM are extracted from the eye movement signal provided by an eye tracking system. Preliminary results indicate that the fusion of OPC and CEM traits is capable of providing a 30% reduction in authentication error when compared to the authentication accuracy of individual traits.
Beyond Checklists and Rubrics: Engaging Students in Authentic Conversations about Their Writing
ERIC Educational Resources Information Center
Dawson, Christine M.
2009-01-01
Authentic discussions about writing are the sorts of conversations that professional or experienced writers might have, where writers explore purpose, effect, clarity, and interpretation. These discussions help students develop "writing skills and strategies because students are able to work at progressively higher levels with the guidance and…
Business as Usual? Not for These Middle-Grades Students
ERIC Educational Resources Information Center
Crawford, Heather; Wiest, Lynda
2011-01-01
A perpetual dilemma of schooling is how to help students develop skills needed for everyday life, including the work world. Quantitative literacy, also called numeracy, involves an ability to apply essential mathematics skills to authentic or near-authentic tasks. Carefully planned classroom activities can help students develop these important…
NASA Astrophysics Data System (ADS)
Klug Boonstra, S.; Swann, J.; Boonstra, D.; Manfredi, L.; Christensen, P. R.
2016-12-01
Recent research identifies the most effective learning as active, engaged learning in which students interact with phenomena, other students, and the teacher/leader to derive meaning and construct understanding of their surroundings. "Similarly, an engaging and effective science education goes well beyond the low-level factual recall that is emphasized in many science classes. It must develop the skills that students need to solve complex problems, work in teams, make and recognize evidence-based arguments, and interpret and communicate complex information" (emphasis added). Authentic science research projects provide active, engaged learning in which students interact with authentic science data in an authentic problem-solving context to derive meaning and construct understanding of the world. In formal (and many informal) settings, the teacher/leader is effectively the gatekeeper who determines the learning experiences in which the students will participate. From our experience of nearly a decade and a half of authentic science programming for 5thgrade through early college students working with NASA Mars data, supporting and enabling the teacher is perhaps the most critical and foundational element for designing a successful authentic research experience. Yet, a major barrier to this type of learning are teacher/leaders who are too often not equipped or who lack confidence to succeed in facilitating authentic research projects. The Mars Student Imaging Project has implemented an iterative process of design, testing, and redesign that has identified and implemented critical teacher/leader-enabling elements that have led to increasingly successful adoptions within formal and informal educational settings - allowing more students to gain the benefits of immersive research experience.
On authenticity: the question of truth in construction and autobiography.
Collins, Sara
2011-12-01
Freud was occupied with the question of truth and its verification throughout his work. He looked to archaeology for an evidence model to support his ideas on reconstruction. He also referred to literature regarding truth in reconstruction, where he saw shifts between historical fact and invention, and detected such swings in his own case histories. In his late work Freud pondered over the impossibility of truth in reconstruction by juxtaposing truth with 'probability'. Developments on the role of fantasy and myth in reconstruction and contemporary debates over objectivity have increasingly highlighted the question of 'truth' in psychoanalysis. I will argue that 'authenticity' is a helpful concept in furthering the discussion over truth in reconstruction. Authenticity denotes that which is genuine, trustworthy and emotionally accurate in a reconstruction, as observed within the immediacy of the analyst/patient interaction. As authenticity signifies genuineness in a contemporary context its origins are verifiable through the analyst's own observations of the analytic process itself. Therefore, authenticity is about the likelihood and approximation of historical truth rather than its certainty. In that respect it links with Freud's musings over 'probability'. Developments on writing 'truths' in autobiography mirror those in reconstruction, and lend corroborative support from another source. Copyright © 2011 Institute of Psychoanalysis.
The analyst's authenticity: "if you see something, say something".
Goldstein, George; Suzuki, Jessica Y
2015-05-01
The history of authenticity in psychoanalysis is as old as analysis itself, but the analyst's authenticity in particular has become an increasingly important area of focus in recent decades. This article traces the development of conceptions of analytic authenticity and proposes that the analyst's spontaneous verbalization of his or her unformulated experience in session can be a potent force in the course of an analysis. We acknowledge that although analytic authenticity can be a challenging ideal for the analyst to strive for, it contains the power to transform the experience of the patient and the analyst, as well as the meaning of their work together. Whether it comes in the form of an insight-oriented comment or a simple acknowledgment of things as they seem to be, a therapist's willingness to speak aloud something that has lost its language is a powerful clinical phenomenon that transcends theoretical orientation and modality. © 2015 Wiley Periodicals, Inc.
Spence Laschinger, Heather K; Wong, Carol A; Grau, Ashley L
2012-10-01
Retaining skilled and engaged nurses is critical during a time of shortage, however growing reports of workplace bullying threaten nurses' health and wellbeing, especially the transition of newly graduated nurses entering the profession. High rates of burnout and turnover among new nurses puts additional strain on limited financial resources in healthcare organizations and can compromise the quality of care provided to patients. The purpose of this study is to test a model linking authentic leadership to new graduate nurses' experiences of workplace bullying and burnout, and subsequently, job satisfaction and intentions to leave their jobs. This study employed a cross-sectional survey design with 342 new graduate nurses (defined as less than two years of practice experience) working in acute care hospitals in Ontario, Canada. Participants completed a questionnaire with measures of authentic leadership, workplace bullying, burnout, job satisfaction and turnover intentions. The model was tested using path analysis techniques within structural equation modeling. The model fit indices suggested that the original hypothesized model did not adequately fit the data (χ(2)=33.59, df=5, p=.000, χ(2)/df=6.72, IFI=.937, CFI=.937, RMSEA=.130), thus an additional theoretically justified direct path from authentic leadership to job satisfaction was added, which improved the fit substantially (χ(2)=5.26, df=4, p=.261, χ(2)/df=1.32, IFI=.997, CFI=.997, RMSEA=.030). Authentic leadership had a negative direct effect on workplace bullying, which in turn had a direct positive effect on emotional exhaustion. Authentic leadership also influenced job satisfaction indirectly through bullying and emotional exhaustion. Authentic leadership, workplace bullying and emotional exhaustion all had significant direct effects on job satisfaction, which in turn, was related to lower turnover intentions. The findings from this study demonstrate the fundamental importance of authentic leadership in creating supportive working environments. An authentic leadership style may reduce the probability of a unit culture of workplace bullying developing, contributing to a nursing workforce that is less burned out, more satisfied with their job, and ultimately, less likely to leave their position. Copyright © 2012 Elsevier Ltd. All rights reserved.
2012-01-01
password policies (or smart card authentication), disabling compo- nents of the operating system that were deemed unsafe, allowing users to only install...written nearly 100 applications for the iOS and Android platforms with over 1,500,000 downloads on iTunes and Google Play. CPT Braunstein is a
Discovering your authentic leadership.
George, Bill; Sims, Peter; McLean, Andrew N; Mayer, Diana
2007-02-01
The ongoing problems in business leadership over the past five years have underscored the need for a new kind of leader in the twenty-first century: the authentic leader. Author Bill George, a Harvard Business School professor and the former chairman and CEO of Medtronic, and his colleagues, conducted the largest leadership development study ever undertaken. They interviewed 125 business leaders from different racial, religious, national, and socioeconomic backgrounds to understand how leaders become and remain authentic. Their interviews showed that you do not have to be born with any particular characteristics or traits to lead. You also do not have to be at the top of your organization. Anyone can learn to be an authentic leader. The journey begins with leaders understanding their life stories. Authentic leaders frame their stories in ways that allow them to see themselves not as passive observers but as individuals who learn from their experiences. These leaders make time to examine their experiences and to reflect on them, and in doing so they grow as individuals and as leaders. Authentic leaders also work hard at developing self-awareness through persistent and often courageous self-exploration. Denial can be the greatest hurdle that leaders face in becoming self-aware, but authentic leaders ask for, and listen to, honest feedback. They also use formal and informal support networks to help them stay grounded and lead integrated lives. The authors argue that achieving business results over a sustained period of time is the ultimate mark of authentic leadership. It may be possible to drive short-term outcomes without being authentic, but authentic leadership is the only way to create long-term results.
Is This Real Life? Is This Just Fantasy?: Realism and Representations in Learning with Technology
NASA Astrophysics Data System (ADS)
Sauter, Megan Patrice
Students often engage in hands-on activities during science learning; however, financial and practical constraints often limit the availability of these activities. Recent advances in technology have led to increases in the use of simulations and remote labs, which attempt to recreate hands-on science learning via computer. Remote labs and simulations are interesting from a cognitive perspective because they allow for different relations between representations and their referents. Remote labs are unique in that they provide a yoked representation, meaning that the representation of the lab on the computer screen is actually linked to that which it represents: a real scientific device. Simulations merely represent the lab and are not connected to any real scientific devices. However, the type of visual representations used in the lab may modify the effects of the lab technology. The purpose of this dissertation is to examine the relation between representation and technology and its effects of students' psychological experiences using online science labs. Undergraduates participated in two studies that investigated the relation between technology and representation. In the first study, participants performed either a remote lab or a simulation incorporating one of two visual representations, either a static image or a video of the equipment. Although participants in both lab conditions learned, participants in the remote lab condition had more authentic experiences. However, effects were moderated by the realism of the visual representation. Participants who saw a video were more invested and felt the experience was more authentic. In a second study, participants performed a remote lab and either saw the same video as in the first study, an animation, or the video and an animation. Most participants had an authentic experience because both representations evoked strong feelings of presence. However, participants who saw the video were more likely to believe the remote technology was real. Overall, the findings suggest that participants' experiences with technology were shaped by representation. Students had more authentic experiences using the remote lab than the simulation. However, incorporating visual representations that enhance presence made these experiences even more authentic and meaningful than afforded by the technology alone.
Authentic leadership, empowerment and burnout: a comparison in new graduates and experienced nurses.
Laschinger, Heather K Spence; Wong, Carol A; Grau, Ashley L
2013-04-01
To examine the effect of authentic leadership and structural empowerment on the emotional exhaustion and cynicism of new graduates and experienced acute-care nurses. Employee empowerment is a fundamental component of healthy work environments that promote nurse health and retention, and nursing leadership is key to creating these environments. In a secondary analysis of data from two studies we compared the pattern of relationships among study variables in two Ontario groups: 342 new graduates with <2 years of experience and 273 nurses with more than 2 years of experience. A multi-group path analysis using Structural Equation Modelling indicated an acceptable fit of the final model (χ(2) = 17.52, df = 2, P < 0.001, CFI = 0.97, IFI = 0.97 and RMSEA = 0.11). Authentic leadership significantly and negatively influenced emotional exhaustion and cynicism through workplace empowerment in both groups. The authentic behaviour of nursing leaders was important to nurses' perceptions of structurally empowering conditions in their work environments, regardless of experience level, and ultimately contributed to lower levels of emotional exhaustion and cynicism. Leadership training for nurse managers may help develop the empowering work environments required in today's health-care organizations in order to attract and retain nurses. © 2012 Blackwell Publishing Ltd.
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
ERIC Educational Resources Information Center
Wilson, Mark V.; Wilson, Erin
2017-01-01
In this work we describe an authentic performance project for Instrumental Analysis in which students designed, built, and tested spectrophotometers made from simple components. The project addressed basic course content such as instrument design principles, UV-vis spectroscopy, and spectroscopic instrument components as well as skills such as…
Incorporating an Authentic Learning Strategy into Undergraduate Apparel and Merchandising Curriculum
ERIC Educational Resources Information Center
Ma, Yoon Jin; Lee, Hyun-Hwa
2012-01-01
An authentic learning strategy fostering students' active learning was studied using the scenario of a real-world project. Students from two different classes at two different universities worked as clients or consultants to develop an apparel sourcing strategy. Quantitative and qualitative data were gathered from 44 undergraduates enrolled in…
Literacy Cafe: Making Writing Authentic
ERIC Educational Resources Information Center
Daniels, Erika
2007-01-01
The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…
Beyond the Four Walls: Examining the Use of Authentic Learning Modules
ERIC Educational Resources Information Center
Jagielski, Donna Marie
2016-01-01
While attempting to provide real world experiences in STEM, educators face numerous challenges including adhering to curriculum requirements and working with potentially limited resources. The purpose of this action research study was to examine how the addition of authentic learning modules to the existing University of Arizona Middle School…
Improving a Field School Curriculum Using Modularized Lessons and Authentic Case-Based Learning
ERIC Educational Resources Information Center
Rea, Roy V.; Hodder, Dexter P.
2007-01-01
University course evaluations are replete with student comments expressing frustration with taking time out of work, paying money for, and putting energy into field education projects that lack authentic "real-world" problem-solving objectives. Here, we describe a model for field school education that borrows on pedagogical tools such as…
ERIC Educational Resources Information Center
Hsu, Pei-Ling; van Eijck, Michiel; Roth, Wolff-Michael
2010-01-01
Working at scientists' elbows is one suggestion that educators make to improve science education, because such "authentic experiences" provide students with various types of science knowledge. However, there is an ongoing debate in the literature about the assumption that authentic science activities can enhance students' understandings…
Use of Authentic Assessment with ABE Students.
ERIC Educational Resources Information Center
Gall, Mary Louise; And Others
This report describes a project that developed a formal process and the accompanying instruments for authentic assessment of the academic and life skills of adult basic education (ABE) students. The assessment was used to assess the skills of 50 ABE students. The students and teacher evaluated the work that was done, the results were compiled, a…
Sex work and three dimensions of self-esteem: self-worth, authenticity and self-efficacy.
Benoit, Cecilia; Smith, Michaela; Jansson, Mikael; Magnus, Samantha; Flagg, Jackson; Maurice, Renay
2018-01-01
Sex work is assumed to have a negative effect on self-esteem, nearly exclusively expressed as low self-worth, due to its social unacceptability and despite the diversity of persons, positions and roles within the sex industry. In this study, we asked a heterogeneous sample of 218 Canadian sex workers delivering services in various venues about how their work affected their sense of self. Using thematic analysis based on a three-dimensional conception of self-esteem - self-worth (viewing oneself in a favourable light), authenticity (being one's true self) and self-efficacy (competency) - we shed light on the relationship between involvement in sex work and self-esteem. Findings demonstrate that the relationship between sex work and self-esteem is complex: the majority of participants discussed multiple dimensions of self-esteem and often spoke of how sex work had both positive and negative effects on their sense of self. Social background factors, work location and life events and experiences also had an effect on self-esteem. Future research should take a more complex approach to understanding these issues by considering elements beyond self-worth, such as authenticity and self-efficacy, and examining how sex workers' backgrounds and individual motivations intersect with these three dimensions.
Cao, Yuan; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-01
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μm2 and consumes a power as low as 5.16 μW per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of −40∼120 ∘C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications. PMID:29360790
Multimodal person authentication on a smartphone under realistic conditions
NASA Astrophysics Data System (ADS)
Morris, Andrew C.; Jassim, Sabah; Sellahewa, Harin; Allano, Lorene; Ehlers, Johan; Wu, Dalei; Koreman, Jacques; Garcia-Salicetti, Sonia; Ly-Van, Bao; Dorizzi, Bernadette
2006-05-01
Verification of a person's identity by the combination of more than one biometric trait strongly increases the robustness of person authentication in real applications. This is particularly the case in applications involving signals of degraded quality, as for person authentication on mobile platforms. The context of mobility generates degradations of input signals due to the variety of environments encountered (ambient noise, lighting variations, etc.), while the sensors' lower quality further contributes to decrease in system performance. Our aim in this work is to combine traits from the three biometric modalities of speech, face and handwritten signature in a concrete application, performing non intrusive biometric verification on a personal mobile device (smartphone/PDA). Most available biometric databases have been acquired in more or less controlled environments, which makes it difficult to predict performance in a real application. Our experiments are performed on a database acquired on a PDA as part of the SecurePhone project (IST-2002-506883 project "Secure Contracts Signed by Mobile Phone"). This database contains 60 virtual subjects balanced in gender and age. Virtual subjects are obtained by coupling audio-visual signals from real English speaking subjects with signatures from other subjects captured on the touch screen of the PDA. Video data for the PDA database was recorded in 2 recording sessions separated by at least one week. Each session comprises 4 acquisition conditions: 2 indoor and 2 outdoor recordings (with in each case, a good and a degraded quality recording). Handwritten signatures were captured in one session in realistic conditions. Different scenarios of matching between training and test conditions are tested to measure the resistance of various fusion systems to different types of variability and different amounts of enrolment data.
Cao, Yuan; Zhao, Xiaojin; Ye, Wenbin; Han, Qingbang; Pan, Xiaofang
2018-01-23
Authentication is a crucial security service for the wireless sensor networks (WSNs) in versatile domains. The deployment of WSN devices in the untrusted open environment and the resource-constrained nature make the on-chip authentication an open challenge. The strong physical unclonable function (PUF) came in handy as light-weight authentication security primitive. In this paper, we present the first ring oscillator (RO) based strong physical unclonable function (PUF) with high resilience to both the electromagnetic (EM) side-channel attack and the support vector machine (SVM) modelling attack. By employing an RO based PUF architecture with the current starved inverter as the delay cell, the oscillation power is significantly reduced to minimize the emitted EM signal, leading to greatly enhanced immunity to the EM side-channel analysis attack. In addition, featuring superior reconfigurability due to the conspicuously simplified circuitries, the proposed implementation is capable of withstanding the SVM modelling attack by generating and comparing a large number of RO frequency pairs. The reported experimental results validate the prototype of a 9-stage RO PUF fabricated using standard 65 nm complementary-metal-oxide-semiconductor (CMOS) process. Operating at the supply voltage of 1.2 V and the frequency of 100 KHz, the fabricated RO PUF occupies a compact silicon area of 250 μ m 2 and consumes a power as low as 5.16 μ W per challenge-response pair (CRP). Furthermore, the uniqueness and the worst-case reliability are measured to be 50.17% and 98.30% for the working temperature range of -40∼120 ∘ C and the supply voltage variation of ±2%, respectively. Thus, the proposed PUF is applicable for the low power, low cost and secure WSN communications.
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2017-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead. PMID:28736582
Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.
Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz
2016-01-01
Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.
A Survey of Authentication Schemes in Telecare Medicine Information Systems.
Aslam, Muhammad Umair; Derhab, Abdelouahid; Saleem, Kashif; Abbas, Haider; Orgun, Mehmet; Iqbal, Waseem; Aslam, Baber
2017-01-01
E-Healthcare is an emerging field that provides mobility to its users. The protected health information of the users are stored at a remote server (Telecare Medical Information System) and can be accessed by the users at anytime. Many authentication protocols have been proposed to ensure the secure authenticated access to the Telecare Medical Information System. These protocols are designed to provide certain properties such as: anonymity, untraceability, unlinkability, privacy, confidentiality, availability and integrity. They also aim to build a key exchange mechanism, which provides security against some attacks such as: identity theft, password guessing, denial of service, impersonation and insider attacks. This paper reviews these proposed authentication protocols and discusses their strengths and weaknesses in terms of ensured security and privacy properties, and computation cost. The schemes are divided in three broad categories of one-factor, two-factor and three-factor authentication schemes. Inter-category and intra-category comparison has been performed for these schemes and based on the derived results we propose future directions and recommendations that can be very helpful to the researchers who work on the design and implementation of authentication protocols.
Objects prompt authentic scientific activities among learners in a museum programme
NASA Astrophysics Data System (ADS)
Achiam, Marianne; Simony, Leonora; Kramer Lindow, Bent Erik
2016-04-01
Although the scientific disciplines conduct practical work in different ways, all consider practical work as the essential way of connecting objects and phenomena with ideas and the abstract. Accordingly, practical work is regarded as central to science education as well. We investigate a practical, object-based palaeontology programme at a natural history museum to identify how palaeontological objects prompt scientific activity among upper secondary school students. We first construct a theoretical framework based on an analysis of the programme's palaeontological content. From this, we build our reference model, which considers the specimens used in the programme, possible palaeontological interpretations of these specimens, and the conditions inherent in the programme. We use the reference model to analyse the activities of programme participants, and illustrate how these activities are palaeontologically authentic. Finally, we discuss our findings, examining the mechanism by which the specimens prompt scientific activities. We also discuss our discipline-based approach, and how it allows us to positively identify participants' activities as authentic. We conclude by discussing the implications of our findings.
Leder, Drew; Krucoff, Mitchell W
2011-09-01
Modern medicine is often accused by diverse critics of being "too materialistic" and therefore insufficiently holistic and effective. Yet, this critique can be misleading, dependent upon the ambiguous meanings of "materialism." The term can refer to the prevalence of financial concerns in driving medical practice. Alternatively, it can refer to "mechanistic materialism," the patient viewed as a body-machine. In each case, this article shows that this represents not authentic "materialism" at play, but a focus upon high-level abstractions. "Bottom-line" financial or diagnostic numbers can distract practitioners from the embodied needs of sick patients. In this sense, medical practice is not materialist enough. Through a series of clinical examples, this article explores how an authentic materialism would look in current and future practice. The article examines the use of prayer/comfort shawls at the bedside; hospitals and nursing homes redesigned as enriched healing environments; and a paradigmatic medical device--the implantable cardioverter defibrillator--as it might be presented to patients, in contrast to current practice.
NASA Astrophysics Data System (ADS)
Kuseler, Torben; Lami, Ihsan A.
2012-06-01
This paper proposes a new technique to obfuscate an authentication-challenge program (named LocProg) using randomly generated data together with a client's current location in real-time. LocProg can be used to enable any handsetapplication on mobile-devices (e.g. mCommerce on Smartphones) that requires authentication with a remote authenticator (e.g. bank). The motivation of this novel technique is to a) enhance the security against replay attacks, which is currently based on using real-time nonce(s), and b) add a new security factor, which is location verified by two independent sources, to challenge / response methods for authentication. To assure a secure-live transaction, thus reducing the possibility of replay and other remote attacks, the authors have devised a novel technique to obtain the client's location from two independent sources of GPS on the client's side and the cellular network on authenticator's side. The algorithm of LocProg is based on obfuscating "random elements plus a client's data" with a location-based key, generated on the bank side. LocProg is then sent to the client and is designed so it will automatically integrate into the target application on the client's handset. The client can then de-obfuscate LocProg if s/he is within a certain range around the location calculated by the bank and if the correct personal data is supplied. LocProg also has features to protect against trial/error attacks. Analysis of LocAuth's security (trust, threat and system models) and trials based on a prototype implementation (on Android platform) prove the viability and novelty of LocAuth.
Security and Dependability Solutions for Networks and Devices
NASA Astrophysics Data System (ADS)
Gücrgens, Sigrid; Fuchs, Andreas
In this chapter we give an overview over the denotation of the SERENITY artefacts S&D Classes, Patterns and Implementations in the context of networks and devices. In order to demonstrate their necessity we sketch an example for confidential and authentic communication and storage that utilizes a trusted platform module, and model the relevant pattern. We then dissociate solutions for network and device related S&D requirements from those targeting the context of organizational or workflow and web services based solutions. Then we give a summary of the broad field of application for network and device solutions. Finally we clarify the meaning and interaction between classes, patterns and implementations by giving some concrete examples.
Data Driven Device Failure Prediction
2016-09-15
Microsoft enterprise authentication service and Apache web server in an effort to increase up-time and improve mission effectiveness. These new fault loads...54 4.2.2 Web Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59...predictor. Finally, the implementation is validated by running the same experiment on a web server. 1.1 Problem Statement According to the operational
Appropriating Quantified Self Technologies to Support Elementary Statistical Teaching and Learning
ERIC Educational Resources Information Center
Lee, Victor R.; Drake, Joel R.; Thayne, Jeffrey L.
2016-01-01
Wearable activity tracking devices associated with the Quantified Self movement have potential benefit for educational settings because they produce authentic and granular data about activities and experiences already familiar to youth. This article explores how that potential could be realized through explicit acknowledgment of and response to…
The Comparison of Students' Satisfaction between Ubiquitous and Web-Based Learning Environments
ERIC Educational Resources Information Center
Virtanen, Mari Aulikki; Kääriäinen, Maria; Liikanen, Eeva; Haavisto, Elina
2017-01-01
Higher education is moving towards digitalized learning. The rapid development of technological resources, devices and wireless networks enables more flexible opportunities to study and learn in innovative learning environments. New technologies enable combining of authentic and virtual learning spaces and digital resources as multifunctional…
Authentic Science Research in Elementary School After-School Science Clubs
ERIC Educational Resources Information Center
Feldman, Allan; Pirog, Kelly
2011-01-01
In this paper we report on teachers' and students' participation in authentic science research in out of school time science clubs at elementary schools. In the program four to five teachers worked alongside practicing scientists as part of their research groups. Each teacher facilitated a club with 10-15 students who, by extension, were members…
ERIC Educational Resources Information Center
Dijkstra, Elma; Goedhart, Martin
2011-01-01
Background and purpose: This study examines secondary-school students' opinions on participating in authentic science projects which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects, in which students work with and learn from…
ERIC Educational Resources Information Center
Swan, Kathy; Hofer, Mark; Swan, Gerry
2011-01-01
Three criteria for meaningful student learning--construction of knowledge, disciplined inquiry, and value beyond school--are assessed as authentic learning outcomes for an implementation of a digital documentary project in two fifth grade history classrooms where teachers' practices are constrained by a high-stakes testing climate. In all three…
Comparison of ZigBee Replay Attacks Using a Universal Software Radio Peripheral and USB Radio
2014-03-27
authentication code (CBC-MAC) CPU central processing unit CUT component under test db decibel dbm decibel referenced to one milliwatt FFD full- fuction ...categorized into two different types: full- fuction devices (FFDs) and reduced-function devices (RFDs). The difference between an FFD and an RFD is that...KillerBee Hardware. Although KillerBee can be used with any hardware that can interact with 802.15.4 networks, the primary development hardware is the
Evaluation of a single-pixel one-transistor active pixel sensor for fingerprint imaging
NASA Astrophysics Data System (ADS)
Xu, Man; Ou, Hai; Chen, Jun; Wang, Kai
2015-08-01
Since it first appeared in iPhone 5S in 2013, fingerprint identification (ID) has rapidly gained popularity among consumers. Current fingerprint-enabled smartphones unanimously consists of a discrete sensor to perform fingerprint ID. This architecture not only incurs higher material and manufacturing cost, but also provides only static identification and limited authentication. Hence as the demand for a thinner, lighter, and more secure handset grows, we propose a novel pixel architecture that is a photosensitive device embedded in a display pixel and detects the reflected light from the finger touch for high resolution, high fidelity and dynamic biometrics. To this purpose, an amorphous silicon (a-Si:H) dual-gate photo TFT working in both fingerprint-imaging mode and display-driving mode will be developed.
Authentic leadership and thriving among nurses: the mediating role of empathy.
Mortier, Anneleen Viona; Vlerick, Peter; Clays, Els
2016-04-01
To examine the relationship between perceived authentic leadership and two dimensions of thriving (learning and vitality) among nurses, and to study the mediating role of empathy in this relationship. Nurses' thriving is a key asset for health care organisations, and its significant role warrants the need to identify the underlying key determinants and psychological mechanisms. A cross-sectional design was carried out in a large hospital in September 2013. Self-administered questionnaires were distributed to 360 nurses. The main hypotheses were tested through hierarchical regression analyses. The significant positive relationship between perceived authentic leadership and vitality was mediated by perceived empathy. This mediation, however, was not confirmed in relation to learning. Nurse managers' authentic leadership enhances nurses' thriving at work. Furthermore, empathic nurse managers seem to increase the vitality of their nurses. Training nurse managers in authentic leadership skills is important for the nursing field, as those skills help nurse managers to better express empathy and consequently foster thriving in nursing. © 2015 John Wiley & Sons Ltd.
A service protocol for post-processing of medical images on the mobile device
NASA Astrophysics Data System (ADS)
He, Longjun; Ming, Xing; Xu, Lang; Liu, Qian
2014-03-01
With computing capability and display size growing, the mobile device has been used as a tool to help clinicians view patient information and medical images anywhere and anytime. It is uneasy and time-consuming for transferring medical images with large data size from picture archiving and communication system to mobile client, since the wireless network is unstable and limited by bandwidth. Besides, limited by computing capability, memory and power endurance, it is hard to provide a satisfactory quality of experience for radiologists to handle some complex post-processing of medical images on the mobile device, such as real-time direct interactive three-dimensional visualization. In this work, remote rendering technology is employed to implement the post-processing of medical images instead of local rendering, and a service protocol is developed to standardize the communication between the render server and mobile client. In order to make mobile devices with different platforms be able to access post-processing of medical images, the Extensible Markup Language is taken to describe this protocol, which contains four main parts: user authentication, medical image query/ retrieval, 2D post-processing (e.g. window leveling, pixel values obtained) and 3D post-processing (e.g. maximum intensity projection, multi-planar reconstruction, curved planar reformation and direct volume rendering). And then an instance is implemented to verify the protocol. This instance can support the mobile device access post-processing of medical image services on the render server via a client application or on the web page.
Fong, Simon; Zhuang, Yan
2012-01-01
User authentication has been widely used by biometric applications that work on unique bodily features, such as fingerprints, retina scan, and palm vessels recognition. This paper proposes a novel concept of biometric authentication by exploiting a user's medical history. Although medical history may not be absolutely unique to every individual person, the chances of having two persons who share an exactly identical trail of medical and prognosis history are slim. Therefore, in addition to common biometric identification methods, medical history can be used as ingredients for generating Q&A challenges upon user authentication. This concept is motivated by a recent advancement on smart-card technology that future identity cards are able to carry patents' medical history like a mobile database. Privacy, however, may be a concern when medical history is used for authentication. Therefore in this paper, a new method is proposed for abstracting the medical data by using attribute value taxonomies, into a hierarchical data tree (h-Data). Questions can be abstracted to various level of resolution (hence sensitivity of private data) for use in the authentication process. The method is described and a case study is given in this paper.
Person authentication using brainwaves (EEG) and maximum a posteriori model adaptation.
Marcel, Sébastien; Millán, José Del R
2007-04-01
In this paper, we investigate the use of brain activity for person authentication. It has been shown in previous studies that the brain-wave pattern of every individual is unique and that the electroencephalogram (EEG) can be used for biometric identification. EEG-based biometry is an emerging research topic and we believe that it may open new research directions and applications in the future. However, very little work has been done in this area and was focusing mainly on person identification but not on person authentication. Person authentication aims to accept or to reject a person claiming an identity, i.e., comparing a biometric data to one template, while the goal of person identification is to match the biometric data against all the records in a database. We propose the use of a statistical framework based on Gaussian Mixture Models and Maximum A Posteriori model adaptation, successfully applied to speaker and face authentication, which can deal with only one training session. We perform intensive experimental simulations using several strict train/test protocols to show the potential of our method. We also show that there are some mental tasks that are more appropriate for person authentication than others.
Authentication, privacy, security can exploit brainwave by biomarker
NASA Astrophysics Data System (ADS)
Jenkins, Jeffrey; Sweet, Charles; Sweet, James; Noel, Steven; Szu, Harold
2014-05-01
We seek to augment the current Common Access Control (CAC) card and Personal Identification Number (PIN) verification systems with an additional layer of classified access biometrics. Among proven devices such as fingerprint readers and cameras that can sense the human eye's iris pattern, we introduced a number of users to a sequence of 'grandmother images', or emotionally evoked stimuli response images from other users, as well as one of their own, for the purpose of authentication. We performed testing and evaluation of the Authenticity Privacy and Security (APS) brainwave biometrics, similar to the internal organ of the human eye's iris which cannot easily be altered. `Aha' recognition through stimulus-response habituation can serve as a biomarker, similar to keystroke dynamics analysis for inter and intra key fluctuation time of a memorized PIN number (FIST). Using a non-tethered Electroencephalogram (EEG) wireless smartphone/pc monitor interface, we explore the appropriate stimuli-response biomarker present in DTAB low frequency group waves. Prior to login, the user is shown a series of images on a computer display. They have been primed to click their mouse when the image is presented. DTAB waves are collected with a wireless EEG and are sent via Smartphone to a cloud based processing infrastructure. There, we measure fluctuations in DTAB waves from a wireless, non-tethered, single node EEG device between the Personal Graphic Image Number (PGIN) stimulus image and the response time from an individual's mental performance baseline. Towards that goal, we describe an infrastructure that supports distributed verification for web-based EEG authentication. The performance of machine learning on the relative Power Spectral Density EEG data may uncover features required for subsequent access to web or media content. Our approach provides a scalable framework wrapped into a robust Neuro-Informatics toolkit, viable for use in the Biomedical and mental health communities, as well as numerous consumer applications.
ERIC Educational Resources Information Center
Scott, Catherine Marie
2014-01-01
Reform-based science education emphasizes the need for engagement in authentic science, that is, work that resembles real-life scientific practices. However, few studies address the notion of authenticity from the participants' perspectives. As such, this study addresses the following: What events do young participants view as scientific? To what…
ERIC Educational Resources Information Center
Kohnen, Angela M.
2012-01-01
This qualitative study examined the importance of the genre and authenticity as teachers sought to bring science journalism to the high school science classroom. Undertaken as part of the National Science Foundation-funded grant "Science Literacy through Science Journalism (SciJourn)," this work was conducted as a series of smaller…
Practical and secure telemedicine systems for user mobility.
Rezaeibagha, Fatemeh; Mu, Yi
2018-02-01
The application of wireless devices has led to a significant improvement in the quality delivery of care in telemedicine systems. Patients who live in a remote area are able to communicate with the healthcare provider and benefit from the doctor consultations. However, it has been a challenge to provide a secure telemedicine system, which captures users (patients and doctors) mobility and patient privacy. In this work, we present several secure protocols for telemedicine systems, which ensure the secure communication between patients and doctors who are located in different geographical locations. Our protocols are the first of this kind featured with confidentiality of patient information, mutual authentication, patient anonymity, data integrity, freshness of communication, and mobility. Our protocols are based on symmetric-key schemes and capture all desirable security requirements in order to better serve our objectives of research for secure telemedicine services; therefore, they are very efficient in implementation. A comparison with related works shows that our work contributes first comprehensive solution to capture user mobility and patient privacy for telemedicine systems. Copyright © 2018 Elsevier Inc. All rights reserved.
Interdigitated electrode (IDE) for porcine detection based on titanium dioxide (TiO2) thin films
NASA Astrophysics Data System (ADS)
Nordin, N.; Hashim, U.; Azizah, N.
2016-07-01
Interdigited Electrode (IDE) porcine detection can be accomplished to authenticate the halal issue that has been a concern to Muslim not only in Malaysia but all around the world. The method used is photolithography that used the p-type photoresist on the spin coater with 2500 rpm. Bare IDEs device is deposited with Titanium Dioxide (TiO2) to improve the performance of the device. The result indicates that current-voltage (I-V) measurement of porcine probe line slightly above porcine target due to negative charges repelled each other. The IDE device can detect the porcine presence in food as lowest as 1.0 µM. Better performance of the device can be achieved with the replacement of gold deposited to trigger more sensitivity of the device.
Empirical grounding of the nature of scientific inquiry: A study of developing researchers
NASA Astrophysics Data System (ADS)
Stucky, Amy Preece
This work uses grounded theory methodology for developing theory about the nature of authentic scientific inquiry that occurs on a day-to-day basis in an academic research laboratory. Symbolic interaction and situated learning provide a theoretical framework. Data were collected from field notes, over 100 hours of videotape of researchers working in a chemical research laboratory, and interviews with participants. The phenomena of a research laboratory suggest that authentic daily work stretches scientists in three learning modalities: cognitive, affective and motivational beliefs and goals, which influence action to promote learning. A laboratory's line of research is divided into individual, thematic projects. Researchers are enabled in a specialized laboratory environment with sets of unique artifacts, substances, people and theoretical concepts to facilitate production of significant research goals. The work itself consists of chemical and mechanical processes facilitated by human actions, appropriate mental states, and theoretical explanations. The cognitive, affective (emotional), and conative (motivational) stretching then leads to explicit learning as well as implicit learning in the gain of experience and tacit knowledge. Implications of these findings about the nature of authentic scientific research on a day-to-day basis are applied to inquiry in science education in undergraduate and graduate education.
Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme. PMID:25302330
Security analysis and improvement of an anonymous authentication scheme for roaming services.
Lee, Youngsook; Paik, Juryon
2014-01-01
An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.'s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1) it fails to provide user anonymity against any third party as well as the foreign agent, (2) it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3) it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.'s scheme can be addressed without degrading the efficiency of the scheme.
On the security of a simple three-party key exchange protocol without server's public keys.
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.
On the Security of a Simple Three-Party Key Exchange Protocol without Server's Public Keys
Nam, Junghyun; Choo, Kim-Kwang Raymond; Park, Minkyu; Paik, Juryon; Won, Dongho
2014-01-01
Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010): (1) the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2) the protocol cannot protect clients' passwords against an offline dictionary attack; and (3) the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol. PMID:25258723
A dual channel three-terminal np-LDMOS with both majorities for conduction
NASA Astrophysics Data System (ADS)
Kong, Moufu; Yi, Bo; Zhang, Bingke
2018-02-01
A novel dual channel three-terminal np-LDMOS power device with both electrons and holes for conduction is proposed in this paper. Based on a new approach of inducing a large-signal which is processed by a simple circuit for controlling the gate of p-LDMOS inside the device, the new np-LDMOS only requires one external gate controlling voltage signal that can be performed as an n-LDMOS device. The SOA of the new device is improved in comparison with the n-LDMOS device, since the counteracting of electric flux density produced by the both type of carriers' currents. Furthermore, the specific on-resistance of the np-LDMOS device is reduced by about 19% when comparing with that of the conventional one. The control method and performances of the proposed power device are investigated and authenticated by numerical simulations.
78 FR 38240 - Authentication of Electronic Signatures on Electronically Filed Statements of Account
Federal Register 2010, 2011, 2012, 2013, 2014
2013-06-26
... up by any trick, scheme, or device a material fact; (2) makes any materially false, fictitious, or fraudulent statement or representation; or (3) makes or uses any false writing or document knowing the same to contain any materially false, fictitious, or fraudulent statement or entry; shall be fined under...
A Study of Contextualised Mobile Information Delivery for Language Learning
ERIC Educational Resources Information Center
de Jong, Tim; Specht, Marcus; Koper, Rob
2010-01-01
Mobile devices offer unique opportunities to deliver learning content in authentic learning situations. Apart from being able to play various kinds of rich multimedia content, they offer new ways of tailoring information to the learner's situation or context. This paper presents the results of a study of mobile media delivery for language…
Effects of Practice Type in the Here and Now Mobile Learning Environment
ERIC Educational Resources Information Center
Tutty, Jeremy I.; Martin, Florence
2014-01-01
This generation of technology is characterized by mobile and portable devices such as smartphones and tablet computers with wireless broadband access. Mobile technologies enable a new kind of learning called "here and now learning," where learners have access to information anytime and anywhere to perform authentic activities in the…
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks.
Zhu, Hongfei; Tan, Yu-An; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-05-22
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people's lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size.
An Identity-Based Anti-Quantum Privacy-Preserving Blind Authentication in Wireless Sensor Networks
Zhu, Hongfei; Tan, Yu-an; Zhu, Liehuang; Wang, Xianmin; Zhang, Quanxin; Li, Yuanzhang
2018-01-01
With the development of wireless sensor networks, IoT devices are crucial for the Smart City; these devices change people’s lives such as e-payment and e-voting systems. However, in these two systems, the state-of-art authentication protocols based on traditional number theory cannot defeat a quantum computer attack. In order to protect user privacy and guarantee trustworthy of big data, we propose a new identity-based blind signature scheme based on number theorem research unit lattice, this scheme mainly uses a rejection sampling theorem instead of constructing a trapdoor. Meanwhile, this scheme does not depend on complex public key infrastructure and can resist quantum computer attack. Then we design an e-payment protocol using the proposed scheme. Furthermore, we prove our scheme is secure in the random oracle, and satisfies confidentiality, integrity, and non-repudiation. Finally, we demonstrate that the proposed scheme outperforms the other traditional existing identity-based blind signature schemes in signing speed and verification speed, outperforms the other lattice-based blind signature in signing speed, verification speed, and signing secret key size. PMID:29789475
Measurement-device-independent quantum digital signatures
NASA Astrophysics Data System (ADS)
Puthoor, Ittoop Vergheese; Amiri, Ryan; Wallden, Petros; Curty, Marcos; Andersson, Erika
2016-08-01
Digital signatures play an important role in software distribution, modern communication, and financial transactions, where it is important to detect forgery and tampering. Signatures are a cryptographic technique for validating the authenticity and integrity of messages, software, or digital documents. The security of currently used classical schemes relies on computational assumptions. Quantum digital signatures (QDS), on the other hand, provide information-theoretic security based on the laws of quantum physics. Recent work on QDS Amiri et al., Phys. Rev. A 93, 032325 (2016);, 10.1103/PhysRevA.93.032325 Yin, Fu, and Zeng-Bing, Phys. Rev. A 93, 032316 (2016), 10.1103/PhysRevA.93.032316 shows that such schemes do not require trusted quantum channels and are unconditionally secure against general coherent attacks. However, in practical QDS, just as in quantum key distribution (QKD), the detectors can be subjected to side-channel attacks, which can make the actual implementations insecure. Motivated by the idea of measurement-device-independent quantum key distribution (MDI-QKD), we present a measurement-device-independent QDS (MDI-QDS) scheme, which is secure against all detector side-channel attacks. Based on the rapid development of practical MDI-QKD, our MDI-QDS protocol could also be experimentally implemented, since it requires a similar experimental setup.
A privacy authentication scheme based on cloud for medical environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn
2014-11-01
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Experiencing authenticity - the core of student learning in clinical practice.
Manninen, Katri
2016-10-01
Learning in clinical practice is challenging regarding organizational and pedagogical issues. Clinical education wards are one way to meet these challenges by focusing on both patient care and student learning. However, more knowledge is needed about how students' learning can be enhanced and about patients' and supervisors' roles in these settings. The aim was to explore nursing students' learning on a clinical education ward with an explicit pedagogical framework. Semi-structured interviews of students were analyzed using qualitative content analysis and an ethnographic study including observations and follow-up interviews of students, patients and supervisors was conducted. The core of student meaningful learning experiences both external and internal authenticity. Students in early stages immediately created mutual relationships, experienced both external and internal authenticity, and patients became active participants in student learning. Without a mutual relationship, patients passively let students practice on their bodies. Students nearing graduation experienced only external authenticity, creating uncertainty as a threshold for learning. Caring for patients with complex needs helped students overcome the threshold and experience internal authenticity. Supervisors' challenges were to balance patient care and student learning by working as a team. They supported students coping with the complex challenges on the ward. Students need to experience external and internal authenticity to make learning meaningful. Experiencing authenticity, involving meaning-making processes and knowledge construction, is linked to transformative learning and overcoming thresholds. Therefore, an explicit pedagogical framework, based on patient-centredness, peer learning and the supervisory team, creates the prerequisites for experiencing external and internal authenticity.
Optical benchmarking of security document readers for automated border control
NASA Astrophysics Data System (ADS)
Valentín, Kristián.; Wild, Peter; Å tolc, Svorad; Daubner, Franz; Clabian, Markus
2016-10-01
Authentication and optical verification of travel documents upon crossing borders is of utmost importance for national security. Understanding the workflow and different approaches to ICAO 9303 travel document scanning in passport readers, as well as highlighting normalization issues and designing new methods to achieve better harmonization across inspection devices are key steps for the development of more effective and efficient next- generation passport inspection. This paper presents a survey of state-of-the-art document inspection systems, showcasing results of a document reader challenge investigating 9 devices with regards to optical characteristics.
Application of Arrester Simulation Device in Training
NASA Astrophysics Data System (ADS)
Baoquan, Zhang; Ziqi, Chai; Genghua, Liu; Wei, Gao; Kaiyue, Wu
2017-12-01
Combining with the arrester simulation device put into use successfully, this paper introduces the application of arrester test in the insulation resistance measurement, counter test, Leakage current test under DC 1mA voltage and leakage current test under 0.75U1mA. By comparing with the existing training, this paper summarizes the arrester simulation device’s outstanding advantages including real time monitoring, multi-type fault data analysis and acousto-optic simulation. It effectively solves the contradiction between authenticity and safety in the existing test training, and provides a reference for further training.
Metabolite Profiling and Classification of DNA-Authenticated Licorice Botanicals
Simmler, Charlotte; Anderson, Jeffrey R.; Gauthier, Laura; Lankin, David C.; McAlpine, James B.; Chen, Shao-Nong; Pauli, Guido F.
2015-01-01
Raw licorice roots represent heterogeneous materials obtained from mainly three Glycyrrhiza species. G. glabra, G. uralensis, and G. inflata exhibit marked metabolite differences in terms of flavanones (Fs), chalcones (Cs), and other phenolic constituents. The principal objective of this work was to develop complementary chemometric models for the metabolite profiling, classification, and quality control of authenticated licorice. A total of 51 commercial and macroscopically verified samples were DNA authenticated. Principal component analysis and canonical discriminant analysis were performed on 1H NMR spectra and area under the curve values obtained from UHPLC-UV chromatograms, respectively. The developed chemometric models enable the identification and classification of Glycyrrhiza species according to their composition in major Fs, Cs, and species specific phenolic compounds. Further key outcomes demonstrated that DNA authentication combined with chemometric analyses enabled the characterization of mixtures, hybrids, and species outliers. This study provides a new foundation for the botanical and chemical authentication, classification, and metabolomic characterization of crude licorice botanicals and derived materials. Collectively, the proposed methods offer a comprehensive approach for the quality control of licorice as one of the most widely used botanical dietary supplements. PMID:26244884
Using Rose and Compass for Authentication
DOE Office of Scientific and Technical Information (OSTI.GOV)
White, G
2009-07-09
Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSEmore » is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.« less
Authentication of Botanical Origin in Herbal Teas by Plastid Noncoding DNA Length Polymorphisms.
Uncu, Ali Tevfik; Uncu, Ayse Ozgur; Frary, Anne; Doganlar, Sami
2015-07-01
The aim of this study was to develop a DNA barcode assay to authenticate the botanical origin of herbal teas. To reach this aim, we tested the efficiency of a PCR-capillary electrophoresis (PCR-CE) approach on commercial herbal tea samples using two noncoding plastid barcodes, the trnL intron and the intergenic spacer between trnL and trnF. Barcode DNA length polymorphisms proved successful in authenticating the species origin of herbal teas. We verified the validity of our approach by sequencing species-specific barcode amplicons from herbal tea samples. Moreover, we displayed the utility of PCR-CE assays coupled with sequencing to identify the origin of undeclared plant material in herbal tea samples. The PCR-CE assays proposed in this work can be applied as routine tests for the verification of botanical origin in herbal teas and can be extended to authenticate all types of herbal foodstuffs.
Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks
NASA Astrophysics Data System (ADS)
Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun
2017-10-01
With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.
Privacy preservation and authentication on secure geographical routing in VANET
NASA Astrophysics Data System (ADS)
Punitha, A.; Manickam, J. Martin Leo
2017-05-01
Vehicular Ad hoc Networks (VANETs) play an important role in vehicle-to-vehicle communication as it offers a high level of safety and convenience to drivers. In order to increase the level of security and safety in VANETs, in this paper, we propose a Privacy Preservation and Authentication on Secure Geographical Routing Protocol (PPASGR) for VANET. It provides security by detecting and preventing malicious nodes through two directional antennas such as forward (f-antenna) and backward (b-antenna). The malicious nodes are detected by direction detection, consistency detection and conflict detection. The location of the trusted neighbour is identified using TNT-based location verification scheme after the implementation of the Vehicle Tamper Proof Device (VTPD), Trusted Authority (TA) is generated that produces the anonymous credentials. Finally, VTPD generates pseudo-identity using TA which retrieves the real identity of the sender. Through this approach, the authentication, integrity and confidentiality for routing packets can be achieved. The simulation results show that the proposed approach reduces the packet drop due to attack and improves the packet delivery ratio.
Body identification, biometrics and medicine: ethical and social considerations.
Mordini, Emilio; Ottolini, Corinna
2007-01-01
Identity is important when it is weak. This apparent paradox is the core of the current debate on identity. Traditionally, verification of identity has been based upon authentication of attributed and biographical characteristics. After small scale societies and large scale, industrial societies, globalization represents the third period of personal identification. The human body lies at the heart of all strategies for identity management. The tension between human body and personal identity is critical in the health care sector. The health care sector is second only to the financial sector in term of the number of biometric users. Many hospitals and healthcare organizations are in progress to deploy biometric security architecture. Secure identification is critical in the health care system, both to control logic access to centralized archives of digitized patients' data, and to limit physical access to buildings and hospital wards, and to authenticate medical and social support personnel. There is also an increasing need to identify patients with a high degree of certainty. Finally there is the risk that biometric authentication devices can significantly reveal any health information. All these issues require a careful ethical and political scrutiny.
Fallatah, Fatmah; Laschinger, Heather K S; Read, Emily A
Nurses' turnover has a costly impact on organizations, patients, and nurses. Numerous studies have highlighted the critical role of nursing leadership in enhancing new nurses' retention. To examine the influence of authentic leadership on new nurses' job turnover intentions through their personal identification with the leader, organizational identification, and occupational coping self-efficacy. Secondary data analysis of a cross-sectional national study of Canadian new graduate nurses was conducted using structural equation modeling. Authentic leadership had a significant positive effect on nurses' personal identification with their leader and their organization. Personal identification mediated the relationship between authentic leadership and organizational identification. Organizational identification had a significant positive effect on occupational coping self-efficacy, which, in turn, had a negative effect on new graduate nurses' job turnover intentions. The findings demonstrate the vital role authentic leadership plays in retaining new graduate nurses. Authentic leaders foster personal and organizational identification among new graduate nurses, leading to increase in the confidence in their ability to manage work-related challenges, which subsequently results in positive outcomes in both new graduate nurses and the organization. Copyright © 2016 Elsevier Inc. All rights reserved.
Fong, Simon; Zhuang, Yan
2012-01-01
Many forms of biometrics have been proposed and studied for biometrics authentication. Recently researchers are looking into longitudinal pattern matching that based on more than just a singular biometrics; data from user's activities are used to characterise the identity of a user. In this paper we advocate a novel type of authentication by using a user's medical history which can be electronically stored in a biometric security card. This is a sequel paper from our previous work about defining abstract format of medical data to be queried and tested upon authentication. The challenge to overcome is preserving the user's privacy by choosing only the useful features from the medical data for use in authentication. The features should contain less sensitive elements and they are implicitly related to the target illness. Therefore exchanging questions and answers about a few carefully chosen features in an open channel would not easily or directly expose the illness, but yet it can verify by inference whether the user has a record of it stored in his smart card. The design of a privacy preserving model by backward inference is introduced in this paper. Some live medical data are used in experiments for validation and demonstration.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordin, N.; Azizah, N.; Hashim, U., E-mail: uda@unimap.edu.my
2016-07-06
Interdigited Electrode (IDE) porcine detection can be accomplished to authenticate the halal issue that has been a concern to Muslim not only in Malaysia but all around the world. The method used is photolithography that used the p-type photoresist on the spin coater with 2500 rpm. Bare IDEs device is deposited with Titanium Dioxide (TiO{sub 2}) to improve the performance of the device. The result indicates that current-voltage (I-V) measurement of porcine probe line slightly above porcine target due to negative charges repelled each other. The IDE device can detect the porcine presence in food as lowest as 1.0 µM.more » Better performance of the device can be achieved with the replacement of gold deposited to trigger more sensitivity of the device.« less
Agudelo, Juliana; Privman, Vladimir; Halámek, Jan
2017-07-05
We consider a new concept of biometric-based cybersecurity systems for active authentication by continuous tracking, which utilizes biochemical processing of metabolites present in skin secretions. Skin secretions contain a large number of metabolites and small molecules that can be targeted for analysis. Here we argue that amino acids found in sweat can be exploited for the establishment of an amino acid profile capable of identifying an individual user of a mobile or wearable device. Individual and combinations of amino acids processed by biocatalytic cascades yield physical (optical or electronic) signals, providing a time-series of several outputs that, in their entirety, should suffice to authenticate a specific user based on standard statistical criteria. Initial results, motivated by biometrics, indicate that single amino acid levels can provide analog signals that vary according to the individual donor, albeit with limited resolution versus noise. However, some such assays offer digital separation (into well-defined ranges of values) according to groups such as age, biological sex, race, and physiological state of the individual. Multi-input biocatalytic cascades that handle several amino acid signals to yield a single digital-type output, as well as continuous-tracking time-series data rather than a single-instance sample, should enable active authentication at the level of an individual. © 2017 Wiley-VCH Verlag GmbH & Co. KGaA, Weinheim.
ERIC Educational Resources Information Center
Seely, Brian J.
2015-01-01
This study aims to advance learning outdoors with mobile devices. As part of the ongoing Tree Investigators design-based research study, this research investigated a mobile application to support observation, identification, and explanation of the tree life cycle within an authentic, outdoor setting. Recognizing the scientific and conceptual…
2011-11-08
Corps’ V-22 Osprey aircraft, and the Navy’s SSN-688 Los Angeles Class nuclear-powered attack submarine . If authentic, these parts provide accurate power...even d Different color epoxy seals were noted within both lots according to SMT Corp., which is common in suspect counterfeit devices
The construction of a public key infrastructure for healthcare information networks in Japan.
Sakamoto, N
2001-01-01
The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.
Bullying in work groups: the impact of leadership.
Nielsen, Morten Birkeland
2013-04-01
The aim of this study is to examine whether and how laissez-faire, transformational, and authentic leadership styles are related to the occurrence of bullying in work groups. It is hypothesized that the investigated leadership styles have direct associations, as well as indirect associations through group cohesion and safety perceptions, with indicators of bullying among subordinates. Using a cross-sectional survey design, the variables were assessed in a randomly selected sample comprising 594 seafarers from two Norwegian shipping companies. Laissez-faire leadership was associated with an increased risk of exposure to bullying behavior, self-labeled victimization from bullying, and perpetrated bullying. Transformational leadership and authentic leadership were related to decreased risk of exposure to bullying behavior. Authentic leadership contributed to the variance in bullying beyond laissez-faire and transformational leadership. Analyses of indirect effects showed that the association between transformational leadership and bullying was fully mediated through safety perceptions, whereas a partial indirect association through safety perceptions was found for authentic leadership. This study makes a significant contribution to the literature by providing evidence for how leadership styles predict workplace bullying. The findings highlight the importance of recruiting, developing, and training leaders who promote both positive psychological capacities and positive perceptions among their subordinates. © 2012 The Author. Scandinavian Journal of Psychology © 2012 The Scandinavian Psychological Associations.
Carbon isotope ratios and isotopic correlations between components in fruit juices
NASA Astrophysics Data System (ADS)
Wierzchnicki, Ryszard
2013-04-01
Nowadays food products are defined by geographical origin, method of production and by some regulations concerning terms of their authenticity. Important data for confirm the authenticity of product are providing by isotopic methods of food control. The method checks crucial criteria which characterize the authenticity of inspected product. The European Union Regulations clearly show the tendency for application of the isotopic methods for food authenticity control (wine, honey, juice). The aim of the legislation steps is the protection of European market from possibility of the commercial frauds. Method of isotope ratio mass spectrometry is very effective tool for the use distinguishably the food products of various geographical origin. The basic problem for identification of the sample origin is the lack of databases of isotopic composition of components and information about the correlations of the data. The subject of the work was study the isotopic correlations existing between components of fruits. The chemical and instrumental methods of separation: water, sugars, organic acids and pulp from fruit were implemented. IRMS technique was used to measure isotopic composition of samples. The final results for original samples of fruits (apple, strawberry etc.) will be presented and discussed. Acknowledgement: This work was supported by the Polish Ministry of Science and Higher Education under grant NR12-0043-10/2010.
Performance evaluation of wavelet-based face verification on a PDA recorded database
NASA Astrophysics Data System (ADS)
Sellahewa, Harin; Jassim, Sabah A.
2006-05-01
The rise of international terrorism and the rapid increase in fraud and identity theft has added urgency to the task of developing biometric-based person identification as a reliable alternative to conventional authentication methods. Human Identification based on face images is a tough challenge in comparison to identification based on fingerprints or Iris recognition. Yet, due to its unobtrusive nature, face recognition is the preferred method of identification for security related applications. The success of such systems will depend on the support of massive infrastructures. Current mobile communication devices (3G smart phones) and PDA's are equipped with a camera which can capture both still and streaming video clips and a touch sensitive display panel. Beside convenience, such devices provide an adequate secure infrastructure for sensitive & financial transactions, by protecting against fraud and repudiation while ensuring accountability. Biometric authentication systems for mobile devices would have obvious advantages in conflict scenarios when communication from beyond enemy lines is essential to save soldier and civilian life. In areas of conflict or disaster the luxury of fixed infrastructure is not available or destroyed. In this paper, we present a wavelet-based face verification scheme that have been specifically designed and implemented on a currently available PDA. We shall report on its performance on the benchmark audio-visual BANCA database and on a newly developed PDA recorded audio-visual database that take include indoor and outdoor recordings.
Practical Pocket PC Application w/Biometric Security
NASA Technical Reports Server (NTRS)
Logan, Julian
2004-01-01
I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.
A secure biometrics-based authentication scheme for telecare medicine information systems.
Yan, Xiaopeng; Li, Weiheng; Li, Ping; Wang, Jiantao; Hao, Xinhong; Gong, Peng
2013-10-01
The telecare medicine information system (TMIS) allows patients and doctors to access medical services or medical information at remote sites. Therefore, it could bring us very big convenient. To safeguard patients' privacy, authentication schemes for the TMIS attracted wide attention. Recently, Tan proposed an efficient biometrics-based authentication scheme for the TMIS and claimed their scheme could withstand various attacks. However, in this paper, we point out that Tan's scheme is vulnerable to the Denial-of-Service attack. To enhance security, we also propose an improved scheme based on Tan's work. Security and performance analysis shows our scheme not only could overcome weakness in Tan's scheme but also has better performance.
NASA Astrophysics Data System (ADS)
Markman, Adam; Carnicer, Artur; Javidi, Bahram
2017-05-01
We overview our recent work [1] on utilizing three-dimensional (3D) optical phase codes for object authentication using the random forest classifier. A simple 3D optical phase code (OPC) is generated by combining multiple diffusers and glass slides. This tag is then placed on a quick-response (QR) code, which is a barcode capable of storing information and can be scanned under non-uniform illumination conditions, rotation, and slight degradation. A coherent light source illuminates the OPC and the transmitted light is captured by a CCD to record the unique signature. Feature extraction on the signature is performed and inputted into a pre-trained random-forest classifier for authentication.
NASA Astrophysics Data System (ADS)
Bontempi, E.; Benedetti, D.; Massardi, A.; Zacco, A.; Borgese, L.; Depero, L. E.
2008-07-01
Europe has a very rich and diversified cultural heritage of art works, including buildings, monuments and objects of all sizes, involving a great variety of materials. The continuous discovery of new art works opens the problem of their authentication. Advanced analytical techniques can be fundamental to understand the way of life, the culture and the technical and intellectual know-how of the artists. Indeed, the authentication of an art work involves the identification of the used materials, their production techniques and procedures used for the work realization. It is possible to know the origin and provenance of materials, including the location of the natural sources. Advanced analytical techniques also help one to understand degradation processes, corrosion, weathering, and preservation-conservation protocols. In this paper we present a painting attributed to Domenico Ghirlandaio. Ghirlandaio is a well-known artist of fifteenth century who contributes to the apprenticeship of Michelangelo Buonarroti. The study of the pigments used in this painting, which belongs to a private collection, has been supported mainly by means of laboratory two-dimensional X-ray microdiffraction (μXRD2). The possibility to obtain information about not only the phase, but also microstructure allows one to extract interesting consideration and to obtain evidence of the painter’s style and intention.
A novel biometric authentication approach using ECG and EMG signals.
Belgacem, Noureddine; Fournier, Régis; Nait-Ali, Amine; Bereksi-Reguig, Fethi
2015-05-01
Security biometrics is a secure alternative to traditional methods of identity verification of individuals, such as authentication systems based on user name and password. Recently, it has been found that the electrocardiogram (ECG) signal formed by five successive waves (P, Q, R, S and T) is unique to each individual. In fact, better than any other biometrics' measures, it delivers proof of subject's being alive as extra information which other biometrics cannot deliver. The main purpose of this work is to present a low-cost method for online acquisition and processing of ECG signals for person authentication and to study the possibility of providing additional information and retrieve personal data from an electrocardiogram signal to yield a reliable decision. This study explores the effectiveness of a novel biometric system resulting from the fusion of information and knowledge provided by ECG and EMG (Electromyogram) physiological recordings. It is shown that biometrics based on these ECG/EMG signals offers a novel way to robustly authenticate subjects. Five ECG databases (MIT-BIH, ST-T, NSR, PTB and ECG-ID) and several ECG signals collected in-house from volunteers were exploited. A palm-based ECG biometric system was developed where the signals are collected from the palm of the subject through a minimally intrusive one-lead ECG set-up. A total of 3750 ECG beats were used in this work. Feature extraction was performed on ECG signals using Fourier descriptors (spectral coefficients). Optimum-Path Forest classifier was used to calculate the degree of similarity between individuals. The obtained results from the proposed approach look promising for individuals' authentication.
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-11-17
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.
A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP
Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander
2017-01-01
The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN. PMID:29149040
NASA Astrophysics Data System (ADS)
Farroha, Bassam; Farroha, Deborah
2012-05-01
Gaining the competitive advantage in today's aggressive environment requires our corporate leaders and Warfighters alike to be armed with up-to-date knowledge related to friendly and opposing forces. This knowledge has to be delivered in real-time between the core enterprise and tactical/mobile units at the edge. The type and sensitivity of data delivered will vary depending on users, threat level and current rules of dissemination. This paper will describe the mobile security management that basis access rights on positive identification of user, authenticating the user and the edge device. Next, Access Management is granted on a fine grain basis where each data element is tagged with meta-data that is crypto-bound to the data itself to ensure authenticity of contents and observance of data sensitivity.
Software Authority Transition through Multiple Distributors
Han, Kyusunk; Shon, Taeshik
2014-01-01
The rapid growth in the use of smartphones and tablets has changed the software distribution ecosystem. The trend today is to purchase software through application stores rather than from traditional offline markets. Smartphone and tablet users can install applications easily by purchasing from the online store deployed in their device. Several systems, such as Android or PC-based OS units, allow users to install software from multiple sources. Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. These methods can, however, also present a problem whereby even licensed users cannot use their purchased application. In this paper, we discuss these issues and provide an authentication method that will make purchased applications available to the registered user at all times. PMID:25143971
Software authority transition through multiple distributors.
Han, Kyusunk; Shon, Taeshik
2014-01-01
The rapid growth in the use of smartphones and tablets has changed the software distribution ecosystem. The trend today is to purchase software through application stores rather than from traditional offline markets. Smartphone and tablet users can install applications easily by purchasing from the online store deployed in their device. Several systems, such as Android or PC-based OS units, allow users to install software from multiple sources. Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. These methods can, however, also present a problem whereby even licensed users cannot use their purchased application. In this paper, we discuss these issues and provide an authentication method that will make purchased applications available to the registered user at all times.
Leonardo da Vinci's Geology: The Authenticity of The Virgin of the Rocks
NASA Astrophysics Data System (ADS)
Pizzorusso, Ann
2017-04-01
Viewed from a geological perspective, all of Leonardo's paintings and drawings reveal a remarkable fidelity to nature. The Virgin of the Rocks in the National Gallery in London (1495-1508), attributed to him, displays no such fidelity. If we compare it to the Virgin of the Rocks in the Louvre in Paris (1483-86) whose geological accuracy is astounding, we cannot help questioning whether Leonardo painted the background in the National Gallery work. Over the centuries, various arguments have called into question the attribution of the National Gallery painting to Leonardo. Scholars have analyzed the brush strokes, undertaken document searches and tried to prove definitively that Leonardo produced the National Gallery version. However, there have always been doubts, naysayers and many unanswered questions concerning its authenticity. The fact that attribution of the work has been the subject of such controversy throughout history suggests that new diagnostic means of determining authenticity is in order. A comparison of the representations of geological formations in the two paintings offers such means. It seems unlikely that the same person could have portrayed rock formations so accurately in the Louvre work and so incongruously in the National Gallery painting.
Authenticated sensor interface device
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coleman, Jody Rustyn; Poland, Richard W.
A system and method for the secure storage and transmission of data is provided. A data aggregate device can be configured to receive secure data from a data source, such as a sensor, and encrypt the secure data using a suitable encryption technique, such as a shared private key technique, a public key encryption technique, a Diffie-Hellman key exchange technique, or other suitable encryption technique. The encrypted secure data can be provided from the data aggregate device to different remote devices over a plurality of segregated or isolated data paths. Each of the isolated data paths can include an optoisolatormore » that is configured to provide one-way transmission of the encrypted secure data from the data aggregate device over the isolated data path. External data can be received through a secure data filter which, by validating the external data, allows for key exchange and other various adjustments from an external source.« less
Huang, Qinlong; Yang, Yixian; Shi, Yuxiang
2018-02-24
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC.
Yang, Yixian; Shi, Yuxiang
2018-01-01
With the growing number of vehicles and popularity of various services in vehicular cloud computing (VCC), message exchanging among vehicles under traffic conditions and in emergency situations is one of the most pressing demands, and has attracted significant attention. However, it is an important challenge to authenticate the legitimate sources of broadcast messages and achieve fine-grained message access control. In this work, we propose SmartVeh, a secure and efficient message access control and authentication scheme in VCC. A hierarchical, attribute-based encryption technique is utilized to achieve fine-grained and flexible message sharing, which ensures that vehicles whose persistent or dynamic attributes satisfy the access policies can access the broadcast message with equipped on-board units (OBUs). Message authentication is enforced by integrating an attribute-based signature, which achieves message authentication and maintains the anonymity of the vehicles. In order to reduce the computations of the OBUs in the vehicles, we outsource the heavy computations of encryption, decryption and signing to a cloud server and road-side units. The theoretical analysis and simulation results reveal that our secure and efficient scheme is suitable for VCC. PMID:29495269
J2ME implementation of system for storing and accessing of sensitive data on patient's mobile device
NASA Astrophysics Data System (ADS)
Zabołotny, Wojciech M.; Wielgórski, Radosław; Nowik, Marcin
2011-10-01
This paper presents a system allowing to use a patient's mobile phone or PDA for storing of biomedical data, which then, during medical consultation or intervention may be used by the medical staff. The presented solution is aimed on providing both: reliable protection to sensitive patient's data, and easy access to information for authorized medical staff. In the presented system, data are stored in an encrypted form, and the encryption key is available only for authorized persons. The central authentication server verifies the current access rights of the person trying to obtain the information, before providing him or her with the key needed to access the patient's data. The key provided by the server is valid only for the particular device, which minimizes the risk of its misuse. For rare situations when no connection to the authentication server is available (e.g. intervention in the mountains or rural area), system assures an additional "emergency" method to access the encryption key in controlled, registered way. The system has been implemented in Java language and tested in the simulated environment provided by Sun Java Wireless Toolkit for CLDC.
NASA Astrophysics Data System (ADS)
Hsu, Pei-Ling; van Eijck, Michiel; Roth, Wolff-Michael
2010-06-01
Working at scientists' elbows is one suggestion that educators make to improve science education, because such "authentic experiences" provide students with various types of science knowledge. However, there is an ongoing debate in the literature about the assumption that authentic science activities can enhance students' understandings of scientific practice. The purpose of the study is to further address the debate in terms of the ethnographic data collected during an internship programme for high school students right through to their public presentations at the end. Drawing on activity theory to analyse these presentations, we found that students presented scientific practice as accomplished by individual personnel without collaboration in the laboratory. However, our ethnographic data of their internship interaction show that students have had conversations about the complex collaborations within and outside the laboratory. This phenomenon leads us to claim that students experienced authentic science in their internships, but their subsequent representations of authentic science are incomplete. That is, participating in authentic science internships and reporting scientific practice are embedded activities that constitute different goals and conditions rather than unrefracted reflections of one another. The debate on the influence on students' understanding of science practice is not simply related to situating students in authentic science contexts, but also related to students' values and ideology of reporting their understanding of and about science. To help students see these "invisible" moments of science practice is therefore crucial. We make suggestions for how the invisible in and of authentic science may be made visible.
NASA Astrophysics Data System (ADS)
Ivo, Penn
2004-04-01
Bluetooth is the new emerging technology for wireless communication. It can be used to connect almost any device to another device. The traditional example is to link a Personal Digital Assistant (PDA) or a laptop to a mobile phone. That way you can easily take remote connections with your PDA or laptop without getting your mobile phone from your pocket or messing around with cables. A Class 3 Bluetooth device has range of 0,1 - 10 meters. The architecture of Bluetooth is formed by the radio, the base frequency part and the Link Manager. Bluetooth uses the radio range of 2.45 GHz. The theoretical maximum bandwidth is 1 Mb/s, which is slowed down a bit by Forward Error Correction (FEC). Bluetooth specification designates the frequency hopping to be implemented with Gaussian Frequency Shift Keying (GFSK). The base frequency part of the Bluetooth architecture uses a combination of circuit and packet switching technologies. Bluetooth can support either one asynchronous data channel and up to three simultaneous synchronous speech channels, or one channel that transfers asynchronous data and synchronous speech simultaneously. The Link Manager is an essential part of the Bluetooth architecture. It uses Link Manager Protocol (LMP) to configure, authenticate and handle the connections between Bluetooth devices. Several Bluetooth devices can form an ad hoc network. In these piconets, one of the Bluetooth devices will act as a master and the others are slaves. The master sets the frequency-hopping behavior of the piconet. It is also possible to connect up to 10 piconets to each other to form so-called scatternets. Bluetooth has been designed to operate in noisy radio frequency environments, and uses a fast acknowledgement and frequency-hopping scheme to make the link robust, communication-wise. Bluetooth radio modules avoid interference from other signals by hopping to a new frequency after transmitting or receiving a packet. Compared with other systems operating in the same frequency band, the Bluetooth radio typically hops faster and uses shorter packets. This is because short packages and fast hopping limit the impact of microwave ovens and other sources of disturbances. Use of Forward Error Correction (FEC) limits the impact of random noise on long-distance links. Bluetooth transmissions are secure in a business and home environment. Bluetooth has built in sufficient encryption and authentication and is thus very secure in any environment. In addition to this, a frequency-hopping scheme with 1600 hops/sec. is employed. This is far quicker than any other competing system. This, together with an automatic output power adaption to reduce the range exactly to requirement, makes the system extremely difficult to eavesdrop. Information Integrity in Bluetooth has these components: Random Number Generation, Encryption, Encryption Key Management and Authentication.
A secure RFID authentication protocol adopting error correction code.
Chen, Chien-Ming; Chen, Shuai-Min; Zheng, Xinying; Chen, Pei-Yu; Sun, Hung-Min
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
A Secure RFID Authentication Protocol Adopting Error Correction Code
Zheng, Xinying; Chen, Pei-Yu
2014-01-01
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance. PMID:24959619
Laschinger, Heather K Spence; Borgogni, Laura; Consiglio, Chiara; Read, Emily
2015-06-01
New nurse burnout has personal and organizational costs. The combined effect of authentic leadership, person-job fit within areas of worklife, and occupational coping self-efficacy on new nurses' burnout and emotional wellbeing has not been investigated. This study tested a model linking authentic leadership, areas of worklife, occupational coping self-efficacy, burnout, and mental health among new graduate nurses. We also tested the validity of the concept of interpersonal strain at work as a facet of burnout. A cross-sectional national survey of Canadian new graduate nurses was conducted. Registered nurses working in direct patient care in acute care settings with less than 3 years of experience were selected from provincial registry databases of 10 Canadian provinces. A total of 1009 of 3743 surveyed new graduate nurses were included in the final sample (useable response rate 27%). Participants received a mail survey package that included a letter of information, study questionnaire, and a $2 coffee voucher. To optimize response rates non-responders received a reminder letter four weeks after the initial mailing, followed by a second survey package four weeks after that. Ethics approval was obtained from the university ethics board prior to starting the study. Descriptive statistics and scale reliabilities were analyzed. Structural equation modelling with maximum likelihood estimation was used to test the fit between the data and the hypothesized model and to assess the factor structure of the expanded burnout measure. The hypothesized model was an acceptable fit for the data (χ(2) (164)=1221.38; χ(2) ratio=7.447; CFI=.921; IFI=.921; RMSEA=.08). All hypothesized paths were significant. Authentic leadership had a positive effect on areas of worklife, which in turn had a positive effect on occupational coping self-efficacy, resulting in lower burnout, which was associated with poor mental health. Authentic leaders may play an important role in creating positive working conditions and strengthening new nurses' confidence that help them cope with job demands, thereby protecting them from developing burnout and poor mental health. Leadership training to develop supervisors' authentic leadership skills may promote the development of person-job fit, thereby increasing occupational self-efficacy and new nurses' wellbeing. Copyright © 2015 Elsevier Ltd. All rights reserved.
High Resolution Melting (HRM) applied to wine authenticity.
Pereira, Leonor; Gomes, Sónia; Castro, Cláudia; Eiras-Dias, José Eduardo; Brazão, João; Graça, António; Fernandes, José R; Martins-Lopes, Paula
2017-02-01
Wine authenticity methods are in increasing demand mainly in Denomination of Origin designations. The DNA-based methodologies are a reliable means of tracking food/wine varietal composition. The main aim of this work was the study of High Resolution Melting (HRM) application as a screening method for must and wine authenticity. Three sample types (leaf, must and wine) were used to validate the three developed HRM assays (Vv1-705bp; Vv2-375bp; and Vv3-119bp). The Vv1 HRM assay was only successful when applied to leaf and must samples. The Vv2 HRM assay successfully amplified all sample types, allowing genotype discrimination based on melting temperature values. The smallest amplicon, Vv3, produced a coincident melting curve shape in all sample types (leaf and wine) with corresponding genotypes. This study presents sensitive, rapid and efficient HRM assays applied for the first time to wine samples suitable for wine authenticity purposes. Copyright © 2016 Elsevier Ltd. All rights reserved.
Spence Laschinger, Heather K; Fida, Roberta
2015-05-01
A model linking authentic leadership, structural empowerment, and supportive professional practice environments to nurses' perceptions of patient care quality and job satisfaction was tested. Positive work environment characteristics are important for nurses' perceptions of patient care quality and job satisfaction (significant factors for retention). Few studies have examined the mechanism by which these characteristics operate to influence perceptions of patient care quality or job satisfaction. A cross-sectional provincial survey of 723 Canadian nurses was used to test the hypothesized models using structural equation modeling. The model was an acceptable fit and all paths were significant. Authentic leadership had a positive effect on structural empowerment, which had a positive effect on perceived support for professional practice and a negative effect on nurses' perceptions that inadequate unit staffing prevented them from providing high-quality patient care. These workplace conditions predicted job satisfaction. Authentic leaders play an important role in creating empowering professional practice environments that foster high-quality care and job satisfaction.
Impact of oral fluid collection device on cannabinoid stability following smoked cannabis.
Anizan, Sébastien; Bergamaschi, Mateus M; Barnes, Allan J; Milman, Garry; Desrosiers, Nathalie; Lee, Dayong; Gorelick, David A; Huestis, Marilyn A
2015-02-01
Evaluation of cannabinoid stability in authentic oral fluid (OF) is critical, as most OF stability studies employed fortified or synthetic OF. Participants (n = 16) smoked a 6.8% delta-9-tetrahydrocannabinol (THC) cigarette, and baseline concentrations of THC, 11-nor-9-carboxy-THC (THCCOOH), cannabidiol (CBD), and cannabinol (CBN) were determined within 24 h in 16 separate pooled samples (collected 1 h before to 10.5 or 13 h after smoking). OF was collected with the StatSure Saliva Sampler™ and Oral-Eze® devices. Oral-Eze samples were re-analyzed after room temperature (RT) storage for 1 week, and for both devices after 4 °C for 1 and 4 weeks, and -20 °C for 4 and 24 weeks. Concentrations ±20% from initial concentrations were considered stable. With the StatSure device, all cannabinoids were within 80-120% median %baseline for all storage conditions. Individual THC, CBD, CBN and THCCOOH pool concentrations were stable in 100%, 100%, 80-94% and >85%, respectively, across storage conditions. With the Oral-Eze device, at RT or refrigerated storage (for 1 and 4 weeks), THC, CBD and THCCOOH were stable in 94-100%, 78-89%, and 93-100% of samples, respectively, while CBN concentrations were 53-79% stable. However, after 24 weeks at -20 °C, stability decreased, especially for CBD, with a median of 56% stability. Overall, the collection devices' elution/stabilizing buffers provided good stability for OF cannabinoids, with the exception of the more labile CBN. To ensure OF cannabinoid concentration accuracy, these data suggest analysis within 4 weeks at 4 °C storage for Oral-Eze collection and within 4 weeks at 4 °C or 24 weeks at -20 °C for StatSure collection. Published 2014. This article is a U.S. Government work and is in the public domain in the USA. Published 2014. This article is a U.S. Government work and is in the public domain in the USA.
Geist, Melissa J; Sanders, Robby; Harris, Kevin; Arce-Trigatti, Andrea; Hitchcock-Cass, Cary
2018-05-24
A faculty team from nursing and chemical engineering developed a course that brought together students from each discipline for cross-disciplinary, team-based clinical immersion and collaboration. Health care processes and devices are rapidly changing, and nurses are uniquely positioned to be bedside innovators to improve patient care delivery. During each clinical immersion, the student teams rotated through various hospital units where they identified problems and worked together in the university's makerspace (iMaker Space) to design and build prototypes to improve health outcomes. Data from the Critical thinking Assessment Test provided evidence of gains in critical-thinking and problem-solving skills, while the problems identified in the clinical setting and prototypes developed demonstrated the impact of bringing nursing and engineering students together to design innovations. When challenged to identify authentic problems during their clinical immersion, the teams of nursing and engineering students proposed creative solutions and developed commercially viable prototypes.
Human Cortical Activity Evoked by the Assignment of Authenticity when Viewing Works of Art
Huang, Mengfei; Bridge, Holly; Kemp, Martin J.; Parker, Andrew J.
2011-01-01
The expertise of others is a major social influence on our everyday decisions and actions. Many viewers of art, whether expert or naïve, are convinced that the full esthetic appreciation of an artwork depends upon the assurance that the work is genuine rather than fake. Rembrandt portraits provide an interesting image set for testing this idea, as there is a large number of them and recent scholarship has determined that quite a few fakes and copies exist. Use of this image set allowed us to separate the brain’s response to images of genuine and fake pictures from the brain’s response to external advice about the authenticity of the paintings. Using functional magnetic resonance imaging, viewing of artworks assigned as “copy,” rather than “authentic,” evoked stronger responses in frontopolar cortex (FPC), and right precuneus, regardless of whether the portrait was actually genuine. Advice about authenticity had no direct effect on the cortical visual areas responsive to the paintings, but there was a significant psycho-physiological interaction between the FPC and the lateral occipital area, which suggests that these visual areas may be modulated by FPC. We propose that the activation of brain networks rather than a single cortical area in this paradigm supports the art scholars’ view that esthetic judgments are multi-faceted and multi-dimensional in nature. PMID:22164139
Developing Authentic Research Experiences in the K-12 Classroom
NASA Astrophysics Data System (ADS)
Hall, M. K.
2004-12-01
The excitement of an authentic science experiment in one's own backyard piques interest, but teachers need resources and professional development experiences to capitalize upon this excitement and create opportunities for their students' learning. Three obstacles must be overcome for success in carrying out authentic research in the classroom. First, scientists and teachers must work together to identify relevant and developmentally appropriate research questions for the target audience. Second, teachers need professional development experiences that engage them in authentic research and that provide support for introducing a similar research experience in their own classroom. Third, the outcome of the research experience must have value to the scientist, teacher and student to motivate sustained participation by all. I have directed two projects that have opened the door for teachers to conduct authentic research with their students: monitoring earthquakes with educational seismometers and investigating local environmental problems with a GIS. Classroom seismometers permit students and the public to see first-hand Earth's dynamic response to both human and natural events in their hometown and around the country. From plotting earthquakes occurring throughout the school year to reveal plate tectonic relationships, or conducting seismic hazard analysis of the local region, to analyzing patterns of foreshocks and aftershocks of major earthquakes, students have been actively engaged and motivated in their learning. GIS opens the opportunity to investigate problems of land, water and other resource uses, but presents special problems in acquiring appropriate and useful data. I will discuss the lessons learned from working with teachers in educational seismology and GIS programs and how those lessons can be applied to developing research experiences for teachers and students.
A Fast lattice-based polynomial digital signature system for m-commerce
NASA Astrophysics Data System (ADS)
Wei, Xinzhou; Leung, Lin; Anshel, Michael
2003-01-01
The privacy and data integrity are not guaranteed in current wireless communications due to the security hole inside the Wireless Application Protocol (WAP) version 1.2 gateway. One of the remedies is to provide an end-to-end security in m-commerce by applying application level security on top of current WAP1.2. The traditional security technologies like RSA and ECC applied on enterprise's server are not practical for wireless devices because wireless devices have relatively weak computation power and limited memory compared with server. In this paper, we developed a lattice based polynomial digital signature system based on NTRU's Polynomial Authentication and Signature Scheme (PASS), which enabled the feasibility of applying high-level security on both server and wireless device sides.
NASA Astrophysics Data System (ADS)
Pérez-Cabré, Elisabet; Millán, María S.; Javidi, Bahram
2006-09-01
Verification of a piece of information and/or authentication of a given object or person are common operations carried out by automatic security systems that can be applied, for instance, to control the entrance to restricted areas, access to public buildings, identification of cardholders, etc. Vulnerability of such security systems may depend on the ease of counterfeiting the information used as a piece of identification for verification and authentication. To protect data against tampering, the signature that identifies an object is usually encrypted to avoid an easy recognition at human sight and an easy reproduction using conventional devices for imaging or scanning. To make counterfeiting even more difficult, we propose to combine data from visible and near infrared (NIR) spectral bands. By doing this, neither the visible content nor the NIR data by theirselves are sufficient to allow the signature recognition and thus, the identification of a given object. Only the appropriate combination of both signals permits a satisfactory authentication. In addition, the resulting signature is encrypted following a fully-phase encryption technique and the obtained complex-amplitude distribution is encoded on an ID tag. Spatial multiplexing of the encrypted signature allows us to build a distortion-invariant ID tag, so that remote authentication can be achieved even if the tag is captured under rotation or at different distances. We also explore the possibility of using partial information of the encrypted signature to simplify the ID tag design.
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology
Winata, Doni
2018-01-01
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer’s smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol. PMID:29587399
An Indoor Positioning-Based Mobile Payment System Using Bluetooth Low Energy Technology.
Yohan, Alexander; Lo, Nai-Wei; Winata, Doni
2018-03-25
The development of information technology has paved the way for faster and more convenient payment process flows and new methodology for the design and implementation of next generation payment systems. The growth of smartphone usage nowadays has fostered a new and popular mobile payment environment. Most of the current generation smartphones support Bluetooth Low Energy (BLE) technology to communicate with nearby BLE-enabled devices. It is plausible to construct an Over-the-Air BLE-based mobile payment system as one of the payment methods for people living in modern societies. In this paper, a secure indoor positioning-based mobile payment authentication protocol with BLE technology and the corresponding mobile payment system design are proposed. The proposed protocol consists of three phases: initialization phase, session key construction phase, and authentication phase. When a customer moves toward the POS counter area, the proposed mobile payment system will automatically detect the position of the customer to confirm whether the customer is ready for the checkout process. Once the system has identified the customer is standing within the payment-enabled area, the payment system will invoke authentication process between POS and the customer's smartphone through BLE communication channel to generate a secure session key and establish an authenticated communication session to perform the payment transaction accordingly. A prototype is implemented to assess the performance of the proposed design for mobile payment system. In addition, security analysis is conducted to evaluate the security strength of the proposed protocol.
Nonintrusive multibiometrics on a mobile device: a comparison of fusion techniques
NASA Astrophysics Data System (ADS)
Allano, Lorene; Morris, Andrew C.; Sellahewa, Harin; Garcia-Salicetti, Sonia; Koreman, Jacques; Jassim, Sabah; Ly-Van, Bao; Wu, Dalei; Dorizzi, Bernadette
2006-04-01
In this article we test a number of score fusion methods for the purpose of multimodal biometric authentication. These tests were made for the SecurePhone project, whose aim is to develop a prototype mobile communication system enabling biometrically authenticated users to deal legally binding m-contracts during a mobile phone call on a PDA. The three biometrics of voice, face and signature were selected because they are all traditional non-intrusive and easy to use means of authentication which can readily be captured on a PDA. By combining multiple biometrics of relatively low security it may be possible to obtain a combined level of security which is at least as high as that provided by a PIN or handwritten signature, traditionally used for user authentication. As the relative success of different fusion methods depends on the database used and tests made, the database we used was recorded on a suitable PDA (the Qtek2020) and the test protocol was designed to reflect the intended application scenario, which is expected to use short text prompts. Not all of the fusion methods tested are original. They were selected for their suitability for implementation within the constraints imposed by the application. All of the methods tested are based on fusion of the match scores output by each modality. Though computationally simple, the methods tested have shown very promising results. All of the 4 fusion methods tested obtain a significant performance increase.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tamrin, Mohd Izzuddin Mohd; Turaev, Sherzod; Sembok, Tengku Mohd Tengku
There are tremendous works in biotechnology especially in area of DNA molecules. The computer society is attempting to develop smaller computing devices through computational models which are based on the operations performed on the DNA molecules. A Watson-Crick automaton, a theoretical model for DNA based computation, has two reading heads, and works on double-stranded sequences of the input related by a complementarity relation similar with the Watson-Crick complementarity of DNA nucleotides. Over the time, several variants of Watson-Crick automata have been introduced and investigated. However, they cannot be used as suitable DNA based computational models for molecular stochastic processes andmore » fuzzy processes that are related to important practical problems such as molecular parsing, gene disease detection, and food authentication. In this paper we define new variants of Watson-Crick automata, called weighted Watson-Crick automata, developing theoretical models for molecular stochastic and fuzzy processes. We define weighted Watson-Crick automata adapting weight restriction mechanisms associated with formal grammars and automata. We also study the generative capacities of weighted Watson-Crick automata, including probabilistic and fuzzy variants. We show that weighted variants of Watson-Crick automata increase their generative power.« less
Weighted Watson-Crick automata
NASA Astrophysics Data System (ADS)
Tamrin, Mohd Izzuddin Mohd; Turaev, Sherzod; Sembok, Tengku Mohd Tengku
2014-07-01
There are tremendous works in biotechnology especially in area of DNA molecules. The computer society is attempting to develop smaller computing devices through computational models which are based on the operations performed on the DNA molecules. A Watson-Crick automaton, a theoretical model for DNA based computation, has two reading heads, and works on double-stranded sequences of the input related by a complementarity relation similar with the Watson-Crick complementarity of DNA nucleotides. Over the time, several variants of Watson-Crick automata have been introduced and investigated. However, they cannot be used as suitable DNA based computational models for molecular stochastic processes and fuzzy processes that are related to important practical problems such as molecular parsing, gene disease detection, and food authentication. In this paper we define new variants of Watson-Crick automata, called weighted Watson-Crick automata, developing theoretical models for molecular stochastic and fuzzy processes. We define weighted Watson-Crick automata adapting weight restriction mechanisms associated with formal grammars and automata. We also study the generative capacities of weighted Watson-Crick automata, including probabilistic and fuzzy variants. We show that weighted variants of Watson-Crick automata increase their generative power.
A Lightweight Protocol for Secure Video Streaming
Morkevicius, Nerijus; Bagdonas, Kazimieras
2018-01-01
The Internet of Things (IoT) introduces many new challenges which cannot be solved using traditional cloud and host computing models. A new architecture known as fog computing is emerging to address these technological and security gaps. Traditional security paradigms focused on providing perimeter-based protections and client/server point to point protocols (e.g., Transport Layer Security (TLS)) are no longer the best choices for addressing new security challenges in fog computing end devices, where energy and computational resources are limited. In this paper, we present a lightweight secure streaming protocol for the fog computing “Fog Node-End Device” layer. This protocol is lightweight, connectionless, supports broadcast and multicast operations, and is able to provide data source authentication, data integrity, and confidentiality. The protocol is based on simple and energy efficient cryptographic methods, such as Hash Message Authentication Codes (HMAC) and symmetrical ciphers, and uses modified User Datagram Protocol (UDP) packets to embed authentication data into streaming data. Data redundancy could be added to improve reliability in lossy networks. The experimental results summarized in this paper confirm that the proposed method efficiently uses energy and computational resources and at the same time provides security properties on par with the Datagram TLS (DTLS) standard. PMID:29757988
R2NA: Received Signal Strength (RSS) Ratio-Based Node Authentication for Body Area Network
Wu, Yang; Wang, Kai; Sun, Yongmei; Ji, Yuefeng
2013-01-01
The body area network (BAN) is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB) channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU) in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS) measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.
Secure method for biometric-based recognition with integrated cryptographic functions.
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.
Reframing Teachers' Work for Educational Innovation
ERIC Educational Resources Information Center
Kunnari, Irma; Ilomäki, Liisa
2016-01-01
The universities of applied sciences in Finland aim to support students in achieving work life competences by integrating authentic research, development and innovation (RDI) practices into learning. However, pursuing an educational change from a traditional higher education culture to a networked model of working is challenging for teachers. This…
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane E.; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trust authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
Quantum key distribution using card, base station and trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nordholt, Jane Elizabeth; Hughes, Richard John; Newell, Raymond Thorson
Techniques and tools for quantum key distribution ("QKD") between a quantum communication ("QC") card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority and can also provide electric power to the QC card. When coupled to the base station, after authentication by the trusted authority, the QC card acquires keys through QKD with a trusted authority. The keys can be used to set up secure communication, for authentication, for access control, or formore » other purposes. The QC card can be implemented as part of a smart phone or other mobile computing device, or the QC card can be used as a fillgun for distribution of the keys.« less
ERIC Educational Resources Information Center
Smith, Calvin; Worsfold, Kate
2015-01-01
This paper describes the impacts of work-integrated learning (WIL) curriculum components on general employability skills--professional work-readiness, self-efficacy and team skills. Regression analyses emphasise the importance of the "authenticity" of WIL placements for the development of these generic outcomes. Other curricula factors…
Mindfulness, Authentic Functioning, and Work Engagement: A Growth Modeling Approach
ERIC Educational Resources Information Center
Leroy, Hannes; Anseel, Frederik; Dimitrova, Nicoletta G.; Sels, Luc
2013-01-01
Previous research has demonstrated that mindfulness helps reduce symptoms of work stress but research has yet to clarify "whether" and "how" mindfulness is linked to work engagement. Using self-determination theory we hypothesize that mindfulness is positively related to work engagement and that this relationship can be better understood through…
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-12-15
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients' personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack.
ERIC Educational Resources Information Center
Hung, Hui-Chun; Young, Shelley Shwu-Ching
2017-01-01
Handheld technologies with multi-touch functions have been embraced by the young generation and become their important tool for social and learning purposes. The purpose of this study was to explore how the state-of-art devices could be integrated into authentic art appreciation courses to motivate and enhance students' learning. It was conducted…
Authenticity in occupational therapy leadership: a case study of a servant leader.
Dillon, T H
2001-01-01
The purpose of this qualitative study was to examine the leadership of occupational therapy educator Sr. Genevieve Cummings at the College of St. Catherine in St. Paul, Minnesota, from 1960 to 1994. In-depth interviews were conducted with faculty, staff, administrators, and friends who knew her work intimately. Themes regarding her leadership were synthesized from the interview data and compared with trends in the leadership literature. The predominant themes representing the major elements of her success as a leader were enabling others, focusing on the greater good, collaborative visioning, and leadership through caring and service. The findings indicate that Sr. Genevieve led in uniquely authentic manner by serving the needs of students, faculty members, and the profession. Sr. Genevieve was an effective, authentic, and accomplished leader throughout her career. Her contributions had a significant impact on the field of occupational therapy and occupational therapy education. The legacy of her leadership serves as a model for others in occupational therapy who must balance multiple challenges, pressures, or roles and be able to work effectively with others.
Heckle, Rosa R; Lutters, Wayne G
2011-08-01
Healthcare providers and their IT staff, working in an effort to balance appropriate accessibility with stricter security mandates, are considering the use of a single network sign-on approach for authentication and password management. Single sign-on (SSO) promises to improve usability of authentication for multiple-system users, increase compliance, and help curb system maintenance costs. However, complexities are introduced when SSO is placed within a collaborative environment. These complexities include unanticipated workflow implications that introduce greater security vulnerability for the individual user. OBJECTIVES AND METHODOLOGY: In this work, we examine the challenges of implementing a single sign-on authentication technology in a hospital environment. The aim of the study was to document the factors that affected SSO adoption within the context of use. The ultimate goal is to better inform the design of usable authentication systems within collaborative healthcare work sites. The primary data collection techniques used are ethnographically informed - observation, contextual interviews, and document review. The study included a cross-section of individuals from various departments and varying rolls. These participants were a mix of both clinical and administrative staff, as well as the Information Technology group. The field work revealed fundamental mis-matches between the technology and routine work practices that will significantly impact its effective adoption. While single sign-on was effective in the administrative offices, SSO was not a good fit for collaborative areas. The collaborative needs of the clinical staff unearthed tensions in its implementation. An analysis of the findings revealed that the workflow, activities, and physical environment of the clinical areas create increased security vulnerabilities for the individual user. The clinical users were cognizant of these vulnerabilities and this created resistance to the implementation due to a concern for privacy. From a preliminary analysis of our on-going field study at a community hospital, there appears to be a number of mismatches between the SSO vision and the realities of routine work. While we cannot conclusively say if a SSO adoption will be effective in meeting its goals in a hospital environment, we do know that it will affect the work practice and that will make the management of the SSO system problematic. Copyright © 2011 Elsevier Ireland Ltd. All rights reserved.
Authentic leadership in healthcare: a scoping review.
Malila, Niina; Lunkka, Nina; Suhonen, Marjo
2018-02-05
Purpose The purpose of this paper is to review peer-reviewed original research articles on authentic leadership (AL) in health care to identify potential research gaps and present recommendations for future research. The objectives are to examine and map evidence of the main characteristics, research themes and methodologies in the studies. AL is a leader's non-authoritarian, ethical and transparent behaviour pattern. Design/methodology/approach A scoping review with thematic analysis was conducted. A three-step search strategy was used with database and manual searches. The included studies were composed of English language peer-reviewed original research articles referring to both AL and health care. Findings In total, 29 studies were included. The studies favoured Canadian nurses in acute care hospitals. AL was understood as its original definition. The review identified four research themes: well-being at work, patient care quality, work environment and AL promotion. Quantitative research methodology with the authentic leadership questionnaire and cross-sectional design were prevalent. Research limitations/implications Future research needs more variation in research themes, study populations, settings, organisations, work sectors, geographical origins and theory perspectives. Different research methodologies, such as qualitative and mixed methods research and longitudinal designs, should be used more. Originality/value This is presumably the first literature review to map the research on AL in health care.
NASA Astrophysics Data System (ADS)
Wegner, K.; Branch, B. D.; Smith, S. C.
2013-12-01
The Global Learning and Observations to Benefit the Environment (GLOBE) program is a worldwide hands-on, primary and secondary school-based science and education program (www.globe.gov). GLOBE's vision promotes and supports students, teachers and scientists to collaborate on inquiry-based authentic science investigations of the environment and the Earth system working in close partnership with NASA, NOAA and NSF Earth System Science Projects (ESSP's) in study and research about the dynamics of Earth's environment. GLOBE Partners conduct face-to-face Professional Development in more than 110 countries, providing authentic scientific research experience in five investigation areas: atmosphere, earth as a system, hydrology, land cover, and soil. This presentation will provide a sample for a new framework of Professional Development that was implemented in July 2013 at Purdue University lead by Mr. Steven Smith who has tested GLOBE training materials for future training. The presentation will demonstrate how institutions can provide educators authentic scientific research opportunities through various components, including: - Carrying out authentic research investigations - Learning how to enter their authentic research data into the GLOBE database and visualize it on the GLOBE website - Learn how to access to NASA's Earth System Science resources via GLOBE's new online 'e-Training Program' - Exploring the connections of their soil protocol measurements and the history of the soil in their area through iPad soils app - LIDAR data exposure, Hydrology data exposure
What Students Produce from the Net: Assessing Their Work.
ERIC Educational Resources Information Center
1996
Two papers that examine how to assess students' work in this age of electronic information sources include: "Students on the Net: Enhancing Learning through Authentic Assessment" (James Henri); and "Assessing Students' Work from the Net: An Impossible Dream?" (Paul Lupton) The first paper notes the problem of parents doing…
NASA Technical Reports Server (NTRS)
Hochstadt, Jake
2011-01-01
Ruby on Rails is an open source web application framework for the Ruby programming language. The first application I built was a web application to manage and authenticate other applications. One of the main requirements for this application was a single sign-on service. This allowed authentication to be built in one location and be implemented in many different applications. For example, users would be able to login using their existing credentials, and be able to access other NASA applications without authenticating again. The second application I worked on was an internal qualification plan app. Previously, the viewing of employee qualifications was managed through Excel spread sheets. I built a database driven application to streamline the process of managing qualifications. Employees would be able to login securely to view, edit and update their personal qualifications.
Content fragile watermarking for H.264/AVC video authentication
NASA Astrophysics Data System (ADS)
Ait Sadi, K.; Guessoum, A.; Bouridane, A.; Khelifi, F.
2017-04-01
Discrete cosine transform is exploited in this work to generate the authentication data that are treated as a fragile watermark. This watermark is embedded in the motion vectors. The advances in multimedia technologies and digital processing tools have brought with them new challenges for the source and content authentication. To ensure the integrity of the H.264/AVC video stream, we introduce an approach based on a content fragile video watermarking method using an independent authentication of each group of pictures (GOPs) within the video. This technique uses robust visual features extracted from the video pertaining to the set of selected macroblocs (MBs) which hold the best partition mode in a tree-structured motion compensation process. An additional security degree is offered by the proposed method through using a more secured keyed function HMAC-SHA-256 and randomly choosing candidates from already selected MBs. In here, the watermark detection and verification processes are blind, whereas the tampered frames detection is not since it needs the original frames within the tampered GOPs. The proposed scheme achieves an accurate authentication technique with a high fragility and fidelity whilst maintaining the original bitrate and the perceptual quality. Furthermore, its ability to detect the tampered frames in case of spatial, temporal and colour manipulations is confirmed.
Towards an ethics of authentic practice.
Murray, Stuart J; Holmes, Dave; Perron, Amélie; Rail, Geneviève
2008-10-01
This essay asks how we might best elaborate an ethics of authentic practice. Will we be able to agree on a set of shared terms through which ethical practice will be understood? How will we define ethics and the subject's relation to authoritative structures of power and knowledge? We begin by further clarifying our critique of evidence-based medicine (EBM), reflecting on the intimate relation between theory and practice. We challenge the charge that our position amounts to no more than 'subjectivism' and 'antiauthoritarian' theory. We argue that an ethical practice ought to question the authority of EBM without falling into the trap of dogmatic antiauthoritarianism. In this, we take up the work of Hannah Arendt, who offers terms to help understand our difficult political relation to authority in an authentic ethical practice. We continue with a discussion of Michel Foucault's use of 'free speech' or parrhesia, which he adopts from Ancient Greek philosophy. Foucault demonstrates that authentic ethical practice demands that we 'speak truth to power.' We conclude with a consideration of recent biotechnologies, and suggest that these biomedical practices force us to re-evaluate our theoretical understanding of the ethical subject. We believe that we are at a crucial juncture: we must develop an ethics of authentic practice that will be commensurable with new and emergent biomedical subjectivities.
2015-03-25
is another cognitive fingerprint that has been used extensively for authorship . This work has been ex- tended to authentication by relating keyboard...this work is the inference of high-level features such as personality, gender , and dominant hand but those features have not been integrated to date
ERIC Educational Resources Information Center
Advance CTE: State Leaders Connecting Learning to Work, 2016
2016-01-01
Work-based learning provides a continuum of activities--from career exploration and job shadowing to internships and apprenticeships--that help students develop technical and professional skills in an authentic work environment. While many work-based learning programs are designed and operated at the local level, several states have begun building…
Systems and methods for performing wireless financial transactions
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCown, Steven Harvey
2012-07-03
A secure computing module (SCM) is configured for connection with a host device. The SCM includes a processor for performing secure processing operations, a host interface for coupling the processor to the host device, and a memory connected to the processor wherein the processor logically isolates at least some of the memory from access by the host device. The SCM also includes a proximate-field wireless communicator connected to the processor to communicate with another SCM associated with another host device. The SCM generates a secure digital signature for a financial transaction package and communicates the package and the signature tomore » the other SCM using the proximate-field wireless communicator. Financial transactions are performed from person to person using the secure digital signature of each person's SCM and possibly message encryption. The digital signatures and transaction details are communicated to appropriate financial organizations to authenticate the transaction parties and complete the transaction.« less
Derived virtual devices: a secure distributed file system mechanism
NASA Technical Reports Server (NTRS)
VanMeter, Rodney; Hotz, Steve; Finn, Gregory
1996-01-01
This paper presents the design of derived virtual devices (DVDs). DVDs are the mechanism used by the Netstation Project to provide secure shared access to network-attached peripherals distributed in an untrusted network environment. DVDs improve Input/Output efficiency by allowing user processes to perform I/O operations directly from devices without intermediate transfer through the controlling operating system kernel. The security enforced at the device through the DVD mechanism includes resource boundary checking, user authentication, and restricted operations, e.g., read-only access. To illustrate the application of DVDs, we present the interactions between a network-attached disk and a file system designed to exploit the DVD abstraction. We further discuss third-party transfer as a mechanism intended to provide for efficient data transfer in a typical NAP environment. We show how DVDs facilitate third-party transfer, and provide the security required in a more open network environment.
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-20
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
NASA Astrophysics Data System (ADS)
Majumdar, Tapas; Haldar, Basudeb; Mallick, Arabinda
2017-02-01
A simple strategy is proposed to design and develop an intelligent device based on dual channel ion responsive spectral properties of a commercially available molecule, harmine (HM). The system can process different sets of opto-chemical inputs generating different patterns as fluorescence outputs at specific wavelengths which can provide an additional level of protection exploiting both password and pattern recognitions. The proposed system could have the potential to come up with highly secured combinatorial locks at the molecular level that could pose valuable real time and on-site applications for user authentication.
System and method for authentication
Duerksen, Gary L.; Miller, Seth A.
2015-12-29
Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.
Chica, Manuel
2012-11-01
A novel method for authenticating pollen grains in bright-field microscopic images is presented in this work. The usage of this new method is clear in many application fields such as bee-keeping sector, where laboratory experts need to identify fraudulent bee pollen samples against local known pollen types. Our system is based on image processing and one-class classification to reject unknown pollen grain objects. The latter classification technique allows us to tackle the major difficulty of the problem, the existence of many possible fraudulent pollen types, and the impossibility of modeling all of them. Different one-class classification paradigms are compared to study the most suitable technique for solving the problem. In addition, feature selection algorithms are applied to reduce the complexity and increase the accuracy of the models. For each local pollen type, a one-class classifier is trained and aggregated into a multiclassifier model. This multiclassification scheme combines the output of all the one-class classifiers in a unique final response. The proposed method is validated by authenticating pollen grains belonging to different Spanish bee pollen types. The overall accuracy of the system on classifying fraudulent microscopic pollen grain objects is 92.3%. The system is able to rapidly reject pollen grains, which belong to nonlocal pollen types, reducing the laboratory work and effort. The number of possible applications of this authentication method in the microscopy research field is unlimited. Copyright © 2012 Wiley Periodicals, Inc.
Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy.
Jakes, W; Gerdova, A; Defernez, M; Watson, A D; McCallum, C; Limer, E; Colquhoun, I J; Williamson, D C; Kemsley, E K
2015-05-15
This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz (1)H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional "authentic" beef region (p=0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze-thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz (1)H NMR represents a feasible high-throughput approach for screening raw meat. Copyright © 2014 The Authors. Published by Elsevier Ltd.. All rights reserved.
First Experiences Using XACML for Access Control in Distributed Systems
NASA Technical Reports Server (NTRS)
Lorch, Marcus; Proctor, Seth; Lepro, Rebekah; Kafura, Dennis; Shah, Sumit
2003-01-01
Authorization systems today are increasingly complex. They span domains of administration, rely on many different authentication sources, and manage permissions that can be as complex as the system itself. Worse still, while there are many standards that define authentication mechanisms, the standards that address authorization are less well defined and tend to work only within homogeneous systems. This paper presents XACML, a standard access control language, as one component of a distributed and inter-operable authorization framework. Several emerging systems which incorporate XACML are discussed. These discussions illustrate how authorization can be deployed in distributed, decentralized systems. Finally, some new and future topics are presented to show where this work is heading and how it will help connect the general components of an authorization system.
Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2016-01-01
Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…
Inkjet Printing of Lanthanide-Organic Frameworks for Anti-Counterfeiting Applications.
da Luz, Leonis L; Milani, Raquel; Felix, Jorlandio F; Ribeiro, Igor R B; Talhavini, Márcio; Neto, Brenno A D; Chojnacki, Jaroslaw; Rodrigues, Marcelo O; Júnior, Severino A
2015-12-16
Photoluminescent lanthanide-organic frameworks (Ln-MOFs) were printed onto plastic and paper foils with a conventional inkjet printer. Ln-MOF inks were used to reproduce color images that can only be observed under UV light irradiation. This approach opens a new window for exploring Ln-MOF materials in technological applications, such as optical devices (e.g., lab-on-a-chip), as proof of authenticity for official documents.
NASA Astrophysics Data System (ADS)
Kuo, Cynthia; Walker, Jesse; Perrig, Adrian
Bluetooth Simple Pairing and Wi-Fi Protected Setup specify mechanisms for exchanging authentication credentials in wireless networks. Both Simple Pairing and Protected Setup support multiple setup mechanisms, which increases security risks and hurts the user experience. To improve the security and usability of these specifications, we suggest defining a common baseline for hardware features and a consistent, interoperable user experience across devices.
ERIC Educational Resources Information Center
Crossley, Scott; Clevinger, Amanda; Kim, YouJin
2014-01-01
There has been a growing interest in the use of integrated tasks in the field of second language testing to enhance the authenticity of language tests. However, the role of text integration in test takers' performance has not been widely investigated. The purpose of the current study is to examine the effects of text-based relational (i.e.,…
Keystroke dynamics in the pre-touchscreen era
Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A.
2013-01-01
Biometric authentication seeks to measure an individual’s unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals’ typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts. PMID:24391568
Keystroke dynamics in the pre-touchscreen era.
Ahmad, Nasir; Szymkowiak, Andrea; Campbell, Paul A
2013-12-19
Biometric authentication seeks to measure an individual's unique physiological attributes for the purpose of identity verification. Conventionally, this task has been realized via analyses of fingerprints or signature iris patterns. However, whilst such methods effectively offer a superior security protocol compared with password-based approaches for example, their substantial infrastructure costs, and intrusive nature, make them undesirable and indeed impractical for many scenarios. An alternative approach seeks to develop similarly robust screening protocols through analysis of typing patterns, formally known as keystroke dynamics. Here, keystroke analysis methodologies can utilize multiple variables, and a range of mathematical techniques, in order to extract individuals' typing signatures. Such variables may include measurement of the period between key presses, and/or releases, or even key-strike pressures. Statistical methods, neural networks, and fuzzy logic have often formed the basis for quantitative analysis on the data gathered, typically from conventional computer keyboards. Extension to more recent technologies such as numerical keypads and touch-screen devices is in its infancy, but obviously important as such devices grow in popularity. Here, we review the state of knowledge pertaining to authentication via conventional keyboards with a view toward indicating how this platform of knowledge can be exploited and extended into the newly emergent type-based technological contexts.
ERIC Educational Resources Information Center
Nicola-Richmond, Kelli; Richards, Kieva; Britt, Kellie
2016-01-01
Student preparation for work-integrated learning using simulated learning experiences is an under researched field in occupational therapy. In 2013 the Deakin University occupational therapy degree introduced a simulated learning experience for students aimed at preparing them for work-integrated learning experiences. The session gave students an…
Designing a Safer Interactive Healthcare System - The Impact of Authentic User Participation
NASA Astrophysics Data System (ADS)
Went, Kathryn L.; Gregor, Peter; Ricketts, Ian W.
Information technology has been widely promoted in the healthcare sector to improve current practice and patient safety. However, end users are seldom involved extensively in the design and development of healthcare systems, with lip service often paid to the idea of true user involvement. In this case study the impact of sustained authentic user participation was explored using an interdisciplinary team, consisting of experts both in interaction and healthcare design and consultant anaesthetists, nurses, and pharmacists, to create an electronic prescribing and administration system. This paper details the interface that was created and provides examples of the way in which the design evolved in response to the sustained authentic user participation methods. The working prototype both reduced the opportunity for user error and was preferred by its users to the existing manual system.
Fiber Optic Tamper Indicating Enclosure (TIE); A Case Study in Authentication
DOE Office of Scientific and Technical Information (OSTI.GOV)
Anheier, Norman C.; Benz, Jacob M.; Tanner, Jennifer E.
2015-07-15
A robust fiber optic-based tamper-indicating enclosure (TIE) has been developed by PNNL through funding by the National Nuclear Security Administration Office of Nuclear Verification over the past few years. The objective of this work is to allow monitors to have confidence in both the authenticity and integrity of the TIE and the monitoring equipment inside, throughout the time it may be located at a host facility. Incorporating authentication features into the design were the focus of fiscal year 2014 development efforts. Throughout the development process, modifications have been made to the physical TIE design based on lessons learned via exercisesmore » and expert elicitation. The end result is a robust and passive TIE which can be utilized to protect monitoring party equipment left in a host facility.« less
Juang, Kevin; Greenstein, Joel
2018-04-01
We developed a new authentication system based on passphrases instead of passwords. Our new system incorporates a user-generated mnemonic picture displayed during login, definition tooltips, error correction to reduce typographical errors, a decoy-based input masking technique, and random passphrase generation using either a specialized wordlist or a sentence template. Passphrases exhibit a greater level of security than traditional passwords, but their wider adoption has been hindered by human factors issues. Our assertion is that the added features of our system work particularly well with passphrases and help address these shortcomings. We conducted a study to evaluate our new system with a customized 1,450-word list and our new system with a 6-word sentence structure against the control conditions of a user-created passphrase of at least 24 characters and a system-generated passphrase using a 10,326-word list. Fifty participants completed two sessions so that we could measure the usability and security of the authentication schemes. With the new system conditions, memorability was improved, and security was equivalent to or better than the control conditions. Usability and overall ratings also favored the new system conditions over the control conditions. Our research presents a new authentication system using innovative techniques that improve on the usability and security of existing password and passphrase authentication systems. In computer security, drastic changes should never happen overnight, but we recommend that our contributions be incorporated into current authentication systems to help facilitate a transition from passwords to usable passphrases.
ERIC Educational Resources Information Center
Advance CTE: State Leaders Connecting Learning to Work, 2016
2016-01-01
Work-based learning is an educational strategy that offers students an opportunity to reinforce and deepen their classroom learning, explore future career fields and demonstrate their skills in an authentic setting. Managing work-based learning requires layers of coordination, which is typically done by an individual or organizational…
Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions
Chiou, Shin-Yan
2013-01-01
Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied. PMID:23762851
Deng, Yong-Yuan; Chen, Chin-Ling; Tsaur, Woei-Jiunn; Tang, Yung-Wen; Chen, Jung-Hsuan
2017-01-01
As sensor networks and cloud computation technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come together as an Internet of Things (IoT). At the same time, aging populations have increased the need for expanded and more efficient elderly care services. Fortunately, elderly people can now wear sensing devices which relay data to a personal wireless device, forming a body area network (BAN). These personal wireless devices collect and integrate patients’ personal physiological data, and then transmit the data to the backend of the network for related diagnostics. However, a great deal of the information transmitted by such systems is sensitive data, and must therefore be subject to stringent security protocols. Protecting this data from unauthorized access is thus an important issue in IoT-related research. In regard to a cloud healthcare environment, scholars have proposed a secure mechanism to protect sensitive patient information. Their schemes provide a general architecture; however, these previous schemes still have some vulnerability, and thus cannot guarantee complete security. This paper proposes a secure and lightweight body-sensor network based on the Internet of Things for cloud healthcare environments, in order to address the vulnerabilities discovered in previous schemes. The proposed authentication mechanism is applied to a medical reader to provide a more comprehensive architecture while also providing mutual authentication, and guaranteeing data integrity, user untraceability, and forward and backward secrecy, in addition to being resistant to replay attack. PMID:29244776
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-08-16
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.
Application of Structured Light System Technique for Authentication of Wooden Panel Paintings.
Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente
2016-06-14
This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application.
Application of Structured Light System Technique for Authentication of Wooden Panel Paintings
Buchón-Moragues, Fernando; Bravo, José María; Ferri, Marcelino; Redondo, Javier; Sánchez-Pérez, Juan Vicente
2016-01-01
This paper presents a new application of photogrammetric techniques for protecting cultural heritage. The accuracy of the method and the fact that it can be used to carry out different tests without contact between the sample and the instruments can make this technique very useful for authenticating and cataloging artworks. The application focuses on the field of pictorial artworks, and wooden panel paintings in particular. In these works, the orography formed by the brushstrokes can be easily digitalized using a photogrammetric technique, called Structured Light System, with submillimeter accuracy. Thus, some of the physical characteristics of the brushstrokes, like minimum and maximum heights or slopes become a fingerprint of the painting. We explain in detail the general principles of the Structured Light System Technique and the specific characteristics of the commercial set-up used in this work. Some experiments are carried out on a sample painted by us to check the accuracy limits of the technique and to propose some tests that can help to stablish a methodology for authentication purposes. Finally, some preliminary results obtained on a real pictorial artwork are presented, providing geometrical information of its metric features as an example of the possibilities of this application. PMID:27314353
ERIC Educational Resources Information Center
Levy, Steven
2008-01-01
Teachers in Expeditionary Learning schools have discovered that finding an authentic audience for a genuine product is the key to getting students to take responsibility for their own work. The author, a school designer for Expeditionary Learning Schools Outward Bound, describes three examples of projects in which students worked on curriculum…
Implementing an Interdisciplinary Student Centric Approach to Work-Integrated Learning
ERIC Educational Resources Information Center
Marchioro, Gary; Ryan, Maria M.; Perkins, Tim
2014-01-01
This paper describes the implementation of an innovative approach to work-integrated learning using interdisciplinary projects within a university Faculty of Business. Further, it discusses the implementation of integrated and authentic assessments involving academic units in the marketing, urban planning and business communication disciplines.…
Perceptions of Desirable Graduate Competencies for Science and Technology New Graduates
ERIC Educational Resources Information Center
Coll, Richard; Zegwaard, Karsten
2006-01-01
Work-integrated learning (WIL) programmes that combine on-campus classroom-based study with off-campus authentic work experience are a growing area of interest internationally. Despite widespread practice of WIL, there are few reports that shed light on appropriate pedagogies for the work experience in particular. As with any form of education,…
Group Work in Elementary Science: Towards Organisational Principles for Supporting Pupil Learning
ERIC Educational Resources Information Center
Howe, Christine; Tolmie, Andy; Thurston, Allen; Topping, Keith; Christie, Donald; Livingston, Kay; Jessiman, Emma; Donaldson, Caroline
2007-01-01
Group work has been promoted in many countries as a key component of elementary science. However, little guidance is given as to how group work should be organized, and because previous research has seldom been conducted in authentic classrooms, its message is merely indicative. A study is reported, which attempts to address these limitations.…
Personal authentication through dorsal hand vein patterns
NASA Astrophysics Data System (ADS)
Hsu, Chih-Bin; Hao, Shu-Sheng; Lee, Jen-Chun
2011-08-01
Biometric identification is an emerging technology that can solve security problems in our networked society. A reliable and robust personal verification approach using dorsal hand vein patterns is proposed in this paper. The characteristic of the approach needs less computational and memory requirements and has a higher recognition accuracy. In our work, the near-infrared charge-coupled device (CCD) camera is adopted as an input device for capturing dorsal hand vein images, it has the advantages of the low-cost and noncontact imaging. In the proposed approach, two finger-peaks are automatically selected as the datum points to define the region of interest (ROI) in the dorsal hand vein images. The modified two-directional two-dimensional principal component analysis, which performs an alternate two-dimensional PCA (2DPCA) in the column direction of images in the 2DPCA subspace, is proposed to exploit the correlation of vein features inside the ROI between images. The major advantage of the proposed method is that it requires fewer coefficients for efficient dorsal hand vein image representation and recognition. The experimental results on our large dorsal hand vein database show that the presented schema achieves promising performance (false reject rate: 0.97% and false acceptance rate: 0.05%) and is feasible for dorsal hand vein recognition.
Park, KeeHyun; Lim, SeungHyeon
2015-01-01
In this paper, a multilayer secure biomedical data management system for managing a very large number of diverse personal health devices is proposed. The system has the following characteristics: the system supports international standard communication protocols to achieve interoperability. The system is integrated in the sense that both a PHD communication system and a remote PHD management system work together as a single system. Finally, the system proposed in this paper provides user/message authentication processes to securely transmit biomedical data measured by PHDs based on the concept of a biomedical signature. Some experiments, including the stress test, have been conducted to show that the system proposed/constructed in this study performs very well even when a very large number of PHDs are used. For a stress test, up to 1,200 threads are made to represent the same number of PHD agents. The loss ratio of the ISO/IEEE 11073 messages in the normal system is as high as 14% when 1,200 PHD agents are connected. On the other hand, no message loss occurs in the multilayered system proposed in this study, which demonstrates the superiority of the multilayered system to the normal system with regard to heavy traffic.
Lim, SeungHyeon
2015-01-01
In this paper, a multilayer secure biomedical data management system for managing a very large number of diverse personal health devices is proposed. The system has the following characteristics: the system supports international standard communication protocols to achieve interoperability. The system is integrated in the sense that both a PHD communication system and a remote PHD management system work together as a single system. Finally, the system proposed in this paper provides user/message authentication processes to securely transmit biomedical data measured by PHDs based on the concept of a biomedical signature. Some experiments, including the stress test, have been conducted to show that the system proposed/constructed in this study performs very well even when a very large number of PHDs are used. For a stress test, up to 1,200 threads are made to represent the same number of PHD agents. The loss ratio of the ISO/IEEE 11073 messages in the normal system is as high as 14% when 1,200 PHD agents are connected. On the other hand, no message loss occurs in the multilayered system proposed in this study, which demonstrates the superiority of the multilayered system to the normal system with regard to heavy traffic. PMID:26247034
Scalable Engineering of Quantum Optical Information Processing Architectures (SEQUOIA)
2016-12-13
arrays. Figure 4: An 8-channel fiber-coupled SNSPD array. 1.4 Post -fabrication-tunable linear optic fabrication We have analyzed the...performance of the programmable nanophotonic processor (PNP) that is dynamically tunable via post -fabrication active phase tuning to predict the scaling of...various device losses. PACS numbers: 42.50. Ex , 03.67.Dd, 03.67.Lx, 42.50.Dv I. INTRODUCTION Quantum key distribution (QKD) enables two distant authenticated
Actor-network Procedures: Modeling Multi-factor Authentication, Device Pairing, Social Interactions
2011-08-29
unmodifiable properties of your body; or the capabilities that you cannot convey to others, such as your handwriting . An identity can thus be determined by...network, two principals with the same set of secrets but, say , different computational powers, can be distinguished by timing their responses. Or they... says that configurations are finite sets. Partially ordered multisets, or pomsets were introduced and extensively studied by Vaughan Pratt and his
Teacher Professional Development to Foster Authentic Student Research Experiences
NASA Astrophysics Data System (ADS)
Conn, K.; Iyengar, E.
2004-12-01
This presentation reports on a new teacher workshop design that encourages teachers to initiate and support long-term student-directed research projects in the classroom setting. Teachers were recruited and engaged in an intensive marine ecology learning experience at Shoals Marine Laboratory, Appledore Island, Maine. Part of the weeklong summer workshop was spent in field work, part in laboratory work, and part in learning experimental design and basic statistical analysis of experimental results. Teachers were presented with strategies to adapt their workshop learnings to formulate plans for initiating and managing authentic student research projects in their classrooms. The authors will report on the different considerations and constraints facing the teachers in their home school settings and teachers' progress in implementing their plans. Suggestions for replicating the workshop will be offered.
Google Classroom and Open Clusters: An Authentic Science Research Project for High School Students
NASA Astrophysics Data System (ADS)
Johnson, Chelen H.; Linahan, Marcella; Cuba, Allison Frances; Dickmann, Samantha Rose; Hogan, Eleanor B.; Karos, Demetra N.; Kozikowski, Kendall G.; Kozikowski, Lauren Paige; Nelson, Samantha Brooks; O'Hara, Kevin Thomas; Ropinski, Brandi Lucia; Scarpa, Gabriella; Garmany, Catharine D.
2016-01-01
STEM education is about offering unique opportunities to our students. For the past three years, students from two high schools (Breck School in Minneapolis, MN, and Carmel Catholic High School in Mundelein, IL) have collaborated on authentic astronomy research projects. This past year they surveyed archival data of open clusters to determine if a clear turnoff point could be unequivocally determined. Age and distance to each open cluster were calculated. Additionally, students requested time on several telescopes to obtain original data to compare to the archival data. Students from each school worked in collaborative teams, sharing and verifying results through regular online hangouts and chats. Work papers were stored in a shared drive and on a student-designed Google site to facilitate dissemination of documents between the two schools.
Secure anonymous mutual authentication for star two-tier wireless body area networks.
Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga
2016-10-01
Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is also low. Our proposed protocol is a lightweight anonymous mutually authentication protocol to mutually authenticate the sensor nodes with the controller node (hub) in a star two-tier WBAN topology. Results show that our protocol proves efficiency over previously proposed protocols and at the same time, achieves the necessary security requirements for a secure anonymous mutual authentication scheme. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.
Malik, Nishtha; Dhar, Rajib Lochan; Handa, Subhash Chander
2016-11-01
Nurses play a dominant role in the healthcare sector. However, the working condition of nurses in India is far from satisfactory due to a variety of factors. This is further compounded by the lack of respect for nurses and their profession. Therefore, there is a need to examine factors that could mitigate this situation. The objective of this paper is to examine the relationship between authentic leadership and employee creativity, while determining the mediating effect of knowledge sharing behaviour and moderating effect of use of information technology on this association. A questionnaire-based survey was used to collect the data. Macro process (Hayes) was used to examine the mediating role of knowledge sharing behaviour and the moderating role of use of information technology in the relationship between authentic leadership and employee creativity. Data was collected from 43 small- and medium-sized hospitals in the state of Uttarakhand, India. The participants in the present study were 405 nurses and their 81 supervisors from the above hospitals. Results indicate that authentic leadership is positively linked to the creativity of employees. Further, knowledge sharing behaviour is found to mediate the relationship between authentic leadership and employee creativity, while use of information technology acts as a moderator between knowledge sharing behaviour and employee creativity. The findings of this investigation can help healthcare managers understand the importance of knowledge creation and knowledge sharing among healthcare workers. This paper draws attention to the need for hospital administrators to establish an appropriate information technology infrastructure to effectively manage the knowledge pool of the organization. This study also highlights the importance of effective leadership style, namely authentic leadership, in positively influencing employee creativity in healthcare institutions, a service oriented industry. This study contributes to existing research on authentic leadership and employee creativity by showing that knowledge sharing behaviour and use of information technology are important and relevant variables that affect the degree of influence that authentic leadership has on employee creativity. Copyright © 2016 Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Bernard, Warren
2005-11-01
Authentic research projects are one type of inquiry activity as defined by the American Association for the Advancement of Science (1993) and are a core component in science education reform movements. The purpose of this study was to examine high school students' perspectives of an authentic research project. The context for this study was a local Science and Engineering Fair (SEF) that involved students from a Metro-Atlanta public high school. This study provided information about this type of activity from the student's perspective, an emic viewpoint. In this qualitative study, demographic information was used for the purposeful selection of fourteen students making up the study sample. In this descriptive ethnography, data were collected via an open-ended survey, three individual interviews, a web log, and a group interview. Interviews were audio taped and conducted according to the protocol established by Lincoln and Guba (1998). Transcripts of the interviews, web logs, and survey responses were coded and analyzed by the constant comparative method as described by Glaser and Strauss (1965). Reliability and validity were achieved through member checks and triangulation. Using Gowin's Vee diagram (1981) as a theoretical framework for analysis, themes emerged describing the students' research experience. The themes included the students' initial reactions, difficulty getting started, accepting ownership of their project, growing interest, acknowledged benefits of the research experience, and a reflective look back at their experience. Overall, students described the authentic research experience as a worthwhile activity. The implications of the study are two-fold. At the practitioner level, teachers should engage students in research, but should do so in a manner that maximizes authenticity. Examples may include having students present a formal prospectus and work with a scientist mentor. For Science Educators in teacher preparation programs, there should be an experience with authentic research for pre-service teachers during the certification program. Future research may focus on the students' perspectives of ownership through the process of the authentic research and teachers' perspectives of the authentic research experience.
Experiential and authentic learning approaches in vaccine management.
Kartoglu, Umit; Vesper, James; Teräs, Hanna; Reeves, Thomas
2017-04-19
A high level of concern is placed on the storage, handling, transportation, and distribution of vaccines and other pharmaceutical products, particularly those that are time and temperature sensitive. While active and passive cooling equipment and monitoring devices are important, it is the various personnel responsible for executing and writing procedures, designing and operating systems, and investigating problems and helping prevent them who are paramount in establishing and maintaining a "cold chain" for time and temperature sensitive pharmaceutical products (TTSPPs). These professionals must possess the required competencies, knowledge, skills and abilities so they can effectively perform these activities with appropriate levels of expertise. These are complex tasks that require the development of higher cognitive skills that cannot be adequately addressed through professional development opportunities based on simple information delivery and content acquisition. This paper describes two unique learning solutions (one on a bus called the "wheels course" and the other online called "e-learning") that have been developed by WHO Global Learning Opportunities (WHO/GLO) to provide participants with opportunities not just to learn about cold chain systems or vaccine management, but, rather, to develop high levels of expertise in their respective fields through experiential and authentic learning activities. In these interactive learning environments, participants have opportunities to address real-life situations in contexts similar to what they may face in their own work environments and develop solutions and critical thinking skills they can apply when they return to their jobs. This paper further delineates the managerial and operational vaccine management functions encompassed in these two unique learning environments. The paper also describes the alignment of the objectives addressed in the "wheels course" and the e-learning version with effective vaccine management (EVM) criteria as prescribed by WHO. The paper concludes with an example of a real world product developed by course graduates (specifically a decision tree that is now used by some national programmes). These types of products, valuable in their own right, often emerge when learning environments based on authentic learning principles are designed and implemented as they were by WHO/GLO. Copyright © 2017 The Author(s). Published by Elsevier Ltd.. All rights reserved.
Supervised Multi-Authority Scheme with Blind Signature for IoT with Attribute Based Encryption
NASA Astrophysics Data System (ADS)
Nissenbaum, O. V.; Ponomarov, K. Y.; Zaharov, A. A.
2018-04-01
This article proposes a three-side cryptographic scheme for verifying device attributes with a Supervisor and a Certification Authority (CA) for attribute-based encryption. Two options are suggested: using a message authentication code and using a digital signature. The first version is suitable for networks with one CA, and the second one for networks with several CAs, including dynamic systems. Also, the addition of this scheme with a blind signature is proposed to preserve the confidentiality of the device attributes from the CA. The introduction gives a definition and a brief historical overview of attribute-based encryption (ABE), addresses the use of ABE in the Internet of Things.
Roshan, Abdul-Rahman A; Gad, Haidy A; El-Ahmady, Sherweit H; Khanbash, Mohamed S; Abou-Shoer, Mohamed I; Al-Azizi, Mohamed M
2013-08-14
This work describes a simple model developed for the authentication of monofloral Yemeni Sidr honey using UV spectroscopy together with chemometric techniques of hierarchical cluster analysis (HCA), principal component analysis (PCA), and soft independent modeling of class analogy (SIMCA). The model was constructed using 13 genuine Sidr honey samples and challenged with 25 honey samples of different botanical origins. HCA and PCA were successfully able to present a preliminary clustering pattern to segregate the genuine Sidr samples from the lower priced local polyfloral and non-Sidr samples. The SIMCA model presented a clear demarcation of the samples and was used to identify genuine Sidr honey samples as well as detect admixture with lower priced polyfloral honey by detection limits >10%. The constructed model presents a simple and efficient method of analysis and may serve as a basis for the authentication of other honey types worldwide.
Authentic Integration: a model for integrating mathematics and science in the classroom
NASA Astrophysics Data System (ADS)
Treacy, Páraic; O'Donoghue, John
2014-07-01
Attempts at integrating mathematics and science have been made previously but no definitive, widely adopted teaching model has been developed to date. Research suggests that hands-on, practical, student-centred tasks should form a central element when designing an effective model for the integration of mathematics and science. Aided by this research, the author created a new model entitled 'Authentic Integration' which caters for the specific needs of integration of mathematics and science. This model requires that each lesson be based around a rich task which relates to the real world and ensures that hands-on group work, inquiry, and discussion are central to the lesson. It was found that Authentic Integration, when applied in four Irish post-primary schools, positively affected pupil understanding. The teachers who completed the intervention displayed a very positive attitude towards the approach, intimating that they would continue to implement the practice in their classrooms.
Petrakis, Eleftherios A; Cagliani, Laura R; Polissiou, Moschos G; Consonni, Roberto
2015-04-15
In the present work, a preliminary study for the detection of adulterated saffron and the identification of the adulterant used by means of (1)H NMR and chemometrics is reported. Authentic Greek saffron and four typical plant-derived materials utilised as bulking agents in saffron, i.e., Crocus sativus stamens, safflower, turmeric, and gardenia were investigated. A two-step approach, relied on the application of both OPLS-DA and O2PLS-DA models to the (1)H NMR data, was adopted to perform authentication and prediction of authentic and adulterated saffron. Taking into account the deficiency of established methodologies to detect saffron adulteration with plant adulterants, the method developed resulted reliable in assessing the type of adulteration and could be viable for dealing with extensive saffron frauds at a minimum level of 20% (w/w). Copyright © 2014 Elsevier Ltd. All rights reserved.
Linking teaching and research in an undergraduate course and exploring student learning experiences
NASA Astrophysics Data System (ADS)
Wallin, Patric; Adawi, Tom; Gold, Julie
2017-01-01
In this case study, we first describe how teaching and research are linked in a master's course on tissue engineering. A central component of the course is an authentic research project that the students carry out in smaller groups and in collaboration with faculty. We then explore how the students experience learning in this kind of discovery-oriented environment. Data were collected through a survey, reflective writing, and interviews. Using a general inductive approach for qualitative analysis, we identified three themes related to the students' learning experiences: learning to navigate the field, learning to do real research, and learning to work with others. Overall, the students strongly valued learning in a discovery-oriented environment and three aspects of the course contributed to much of its success: taking a holistic approach to linking teaching and research, engaging students in the whole inquiry process, and situating authentic problems in an authentic physical and social context.
ERIC Educational Resources Information Center
Melber, Leah M.
2003-01-01
There's no better way to understand the work of a scientist than to have it explained in the scientist's own words. Scientific journals, personal accounts of research projects, and documentaries can give students an authentic view of the scientific process. It's an important step towards getting students excited about science and the work of…
Beyond Passwords: Usage and Policy Transformation
2007-03-01
case scenario for lost productivity due to users leaving their CAC at work, in their computer, is costing 261 work years per year with an estimated ...one for your CAC) are you currently using? ..................................................................................................... 43...PASSWORDS: USAGE AND POLICY TRANSFORMATION I. Introduction Background Currently , the primary method for network authentication on the
Aesthetic Description and Realism in Art Education.
ERIC Educational Resources Information Center
Brown, Neil C. M.
1989-01-01
Looks at the usefulness of a stable realism for questions related to the description and understanding of art works. Explores two theories which may resolve the antagonism between representational meanings and their assertion as true properties of the work: (1) Wiggin's concept of authentic effect; and (2) Petit's theory of rectification and…
Personal Power and the Common Good
ERIC Educational Resources Information Center
Schmidt, Jon; Jones, Jerryelyn L.
2010-01-01
Authentic service learning in city schools helps students work toward important change in their own communities. Students are able to face and address issues that have an immediate impact on their neighbors and themselves. Two examples from Chicago neighborhoods illustrate how powerful the concept is: Students worked with a community organization…
Followers' agreeableness and extraversion and their loyalty towards authentic leadership.
Monzani, Lucas; Ripoll, Pilar; Peiró, José María
2014-01-01
Effective leaders understand that loyal followers are the key for success. To win their loyalty, leaders usually build social exchange relationships with them, through a wide range of behaviours, such as honouring agreements or using open and transparent communication. However, the effect of these behaviours on their followers' loyalty can differ depending on followers' individual differences, especially in relational traits such as agreeableness and extraversion. We explored the moderating role of followers' agreeableness and extraversion in the relationship between authentic leadership (using transactional leadership as reference group) and followers' loyalty. A two-wave experiment, where 224 participants with and without work experience were randomly assigned to either a transactional or authentic leadership style condition was conducted. Our results show that followers in the authentic leadership condition had higher levels of loyalty toward their leader. Moreover, followers' agreeableness played a negative moderating role in this relationship whereas extraversion played a positive moderating role in it. Our results indicate that followers' characteristics influence the effect of situational factors on their attitudes, such as loyalty, providing support for the need of a more integrative approach to leadership, where followers need to be considered as active elements of this process ofinfluence.
DNA authentication of animal-derived concentrated Chinese medicine granules.
Jiang, Li-Li; Lo, Yat-Tung; Chen, Wei-Ting; Shaw, Pang-Chui
2016-09-10
Concentrated Chinese medicine granules (CCMG) offer patients a convenient option for traditional therapy. However with morphological and microscopic characteristics lost, it is difficult to authenticate and control the quality of these medicinal products. This study is the first to examine the feasibility of using DNA techniques to authenticate animal-derived CCMG, which has so far lacking of effective means for authentication. Primers targeting amplicons of different sizes were designed to determine the presence of PCR-amplifiable DNA fragments in two types of CCMG, namely Zaocys and Scorpio. Species-specific primers were designed to differentiate the genuine drugs from their adulterants. The specificity of the designed primers was evaluated in crude drugs (including genuine and adulterant) and CCMG. Results showed that by using species-specific primers, DNA fragments of less than 200bp could be isolated from the CCMG and the concerned source materials. This study demonstrated the presence of small size DNA in animal-derived CCMG and the DNA is effective in species identification. The work has extended the application of DNA techniques in herbal medicine and this approach may be further developed for quality control and regulatory compliance in the CCMG industry. Copyright © 2016 Elsevier B.V. All rights reserved.
Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication
NASA Astrophysics Data System (ADS)
Murdoch, Steven J.; Anderson, Ross
Banks worldwide are starting to authenticate online card transactions using the '3-D Secure' protocol, which is branded as Verified by Visa and MasterCard SecureCode. This has been partly driven by the sharp increase in online fraud that followed the deployment of EMV smart cards for cardholder-present payments in Europe and elsewhere. 3-D Secure has so far escaped academic scrutiny; yet it might be a textbook example of how not to design an authentication protocol. It ignores good design principles and has significant vulnerabilities, some of which are already being exploited. Also, it provides a fascinating lesson in security economics. While other single sign-on schemes such as OpenID, InfoCard and Liberty came up with decent technology they got the economics wrong, and their schemes have not been adopted. 3-D Secure has lousy technology, but got the economics right (at least for banks and merchants); it now boasts hundreds of millions of accounts. We suggest a path towards more robust authentication that is technologically sound and where the economics would work for banks, merchants and customers - given a gentle regulatory nudge.
Implementation of QoSS (Quality-of-Security Service) for NoC-Based SoC Protection
NASA Astrophysics Data System (ADS)
Sepúlveda, Johanna; Pires, Ricardo; Strum, Marius; Chau, Wang Jiang
Many of the current electronic systems embedded in a SoC (System-on-Chip) are used to capture, store, manipulate and access critical data, as well as to perform other key functions. In such a scenario, security is considered as an important issue. The Network-on-chip (NoC), as the foreseen communication structure of next-generation SoC devices, can be used to efficiently incorporate security. Our work proposes the implementation of QoSS (Quality of Security Service) to overcome present SoC vulnerabilities. QoSS is a novel concept for data protection that introduces security as a dimension of QoS. In this paper, we present the implementation of two security services (access control and authentication), that may be configured to assume one from several possible levels, the implementation of a technique to avoid denial-of-service (DoS) attacks, evaluate their effectiveness and estimate their impact on NoC performance.
ERIC Educational Resources Information Center
Orville, Richard E.
1976-01-01
Correspondence of Benjamin Franklin provides authenticity to a historical account of early work in the field of lightning. Present-day theories concerning the formation and propagation of lightning are expressed and photographic evidence provided. (CP)
Korycki, Rafal
2014-05-01
Since the appearance of digital audio recordings, audio authentication has been becoming increasingly difficult. The currently available technologies and free editing software allow a forger to cut or paste any single word without audible artifacts. Nowadays, the only method referring to digital audio files commonly approved by forensic experts is the ENF criterion. It consists in fluctuation analysis of the mains frequency induced in electronic circuits of recording devices. Therefore, its effectiveness is strictly dependent on the presence of mains signal in the recording, which is a rare occurrence. Recently, much attention has been paid to authenticity analysis of compressed multimedia files and several solutions were proposed for detection of double compression in both digital video and digital audio. This paper addresses the problem of tampering detection in compressed audio files and discusses new methods that can be used for authenticity analysis of digital recordings. Presented approaches consist in evaluation of statistical features extracted from the MDCT coefficients as well as other parameters that may be obtained from compressed audio files. Calculated feature vectors are used for training selected machine learning algorithms. The detection of multiple compression covers up tampering activities as well as identification of traces of montage in digital audio recordings. To enhance the methods' robustness an encoder identification algorithm was developed and applied based on analysis of inherent parameters of compression. The effectiveness of tampering detection algorithms is tested on a predefined large music database consisting of nearly one million of compressed audio files. The influence of compression algorithms' parameters on the classification performance is discussed, based on the results of the current study. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Content-based audio authentication using a hierarchical patchwork watermark embedding
NASA Astrophysics Data System (ADS)
Gulbis, Michael; Müller, Erika
2010-05-01
Content-based audio authentication watermarking techniques extract perceptual relevant audio features, which are robustly embedded into the audio file to protect. Manipulations of the audio file are detected on the basis of changes between the original embedded feature information and the anew extracted features during verification. The main challenges of content-based watermarking are on the one hand the identification of a suitable audio feature to distinguish between content preserving and malicious manipulations. On the other hand the development of a watermark, which is robust against content preserving modifications and able to carry the whole authentication information. The payload requirements are significantly higher compared to transaction watermarking or copyright protection. Finally, the watermark embedding should not influence the feature extraction to avoid false alarms. Current systems still lack a sufficient alignment of watermarking algorithm and feature extraction. In previous work we developed a content-based audio authentication watermarking approach. The feature is based on changes in DCT domain over time. A patchwork algorithm based watermark was used to embed multiple one bit watermarks. The embedding process uses the feature domain without inflicting distortions to the feature. The watermark payload is limited by the feature extraction, more precisely the critical bands. The payload is inverse proportional to segment duration of the audio file segmentation. Transparency behavior was analyzed in dependence of segment size and thus the watermark payload. At a segment duration of about 20 ms the transparency shows an optimum (measured in units of Objective Difference Grade). Transparency and/or robustness are fast decreased for working points beyond this area. Therefore, these working points are unsuitable to gain further payload, needed for the embedding of the whole authentication information. In this paper we present a hierarchical extension of the watermark method to overcome the limitations given by the feature extraction. The approach is a recursive application of the patchwork algorithm onto its own patches, with a modified patch selection to ensure a better signal to noise ratio for the watermark embedding. The robustness evaluation was done by compression (mp3, ogg, aac), normalization, and several attacks of the stirmark benchmark for audio suite. Compared on the base of same payload and transparency the hierarchical approach shows improved robustness.
Where There Is a WIL There Is a Way: Using a Critical Reflective Approach to Enhance Work Readiness
ERIC Educational Resources Information Center
Wingrove, Dallas; Turner, Michelle
2015-01-01
Creating authentic learning experiences that prepare students for their future work in an ever-changing workforce represents a key challenge in higher education. One key way to enable the integration of learning and work is to foster students' capacity for critical reflection and reflexive thinking. This paper seeks to contribute to knowledge of…
Technology-assisted psychoanalysis.
Scharff, Jill Savege
2013-06-01
Teleanalysis-remote psychoanalysis by telephone, voice over internet protocol (VoIP), or videoteleconference (VTC)-has been thought of as a distortion of the frame that cannot support authentic analytic process. Yet it can augment continuity, permit optimum frequency of analytic sessions for in-depth analytic work, and enable outreach to analysands in areas far from specialized psychoanalytic centers. Theoretical arguments against teleanalysis are presented and countered and its advantages and disadvantages discussed. Vignettes of analytic process from teleanalytic sessions are presented, and indications, contraindications, and ethical concerns are addressed. The aim is to provide material from which to judge the authenticity of analytic process supported by technology.
The impact of database quality on keystroke dynamics authentication
NASA Astrophysics Data System (ADS)
Panasiuk, Piotr; Rybnik, Mariusz; Saeed, Khalid; Rogowski, Marcin
2016-06-01
This paper concerns keystroke dynamics, also partially in the context of touchscreen devices. The authors concentrate on the impact of database quality and propose their algorithm to test database quality issues. The algorithm is used on their own
Data-Dependent Fingerprints for Wireless Device Authentication
2014-05-20
enhanced when using a modulation based on orthogonal frequency division multiplexing ( OFDM ) that has a large range of signal levels. However, in...at 70 MHz. The radios use OFDM with 64-point FFT block sizes for transmission so that the bandwidth is divided into Nd = 64 data and Nc = 5 cyclic...τℓTs) (1) where Ts is the OFDM symbol period (and therefore discrete-time sampling period) and L is the number of multipaths in the channel with
Karunathilaka, Sanjeewa R; Kia, Ali-Reza Fardin; Srigley, Cynthia; Chung, Jin Kyu; Mossoba, Magdi M
2016-10-01
A rapid tool for evaluating authenticity was developed and applied to the screening of extra virgin olive oil (EVOO) retail products by using Fourier-transform near infrared (FT-NIR) spectroscopy in combination with univariate and multivariate data analysis methods. Using disposable glass tubes, spectra for 62 reference EVOO, 10 edible oil adulterants, 20 blends consisting of EVOO spiked with adulterants, 88 retail EVOO products and other test samples were rapidly measured in the transmission mode without any sample preparation. The univariate conformity index (CI) and the multivariate supervised soft independent modeling of class analogy (SIMCA) classification tool were used to analyze the various olive oil products which were tested for authenticity against a library of reference EVOO. Better discrimination between the authentic EVOO and some commercial EVOO products was observed with SIMCA than with CI analysis. Approximately 61% of all EVOO commercial products were flagged by SIMCA analysis, suggesting that further analysis be performed to identify quality issues and/or potential adulterants. Due to its simplicity and speed, FT-NIR spectroscopy in combination with multivariate data analysis can be used as a complementary tool to conventional official methods of analysis to rapidly flag EVOO products that may not belong to the class of authentic EVOO. Published 2016. This article is a U.S. Government work and is in the public domain in the USA.
Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho
2016-01-01
In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes. PMID:27537890
ERIC Educational Resources Information Center
Kutnick, Peter; Berdondini, Lucia
2009-01-01
This quasi-experimental study was part of the SPRinG project (Social Pedagogy Research into Group Work). The review notes group work in "authentic" classrooms rarely fulfils its interactive or attainment potential. SPRinG classes undertook a programme of relational training to enhance children's group working skills while control classes…
Use Rubrics and Reach ALL Learners.
ERIC Educational Resources Information Center
Active Learner: A Foxfire Journal for Teachers, 1998
1998-01-01
Describes the use of student-developed rubrics, conferencing, and reflective journaling to improve writing skills in a third-grade classroom. A rubric--a written tool used to authentically assess a piece of work--lists criteria for the work and includes a system for evaluating each criteria. Rubrics enabled the students to evaluate their own work…
The Courage to Seek Authentic Feedback
ERIC Educational Resources Information Center
Wiggins, Alexis
2011-01-01
Educators assess students' work and behavior every day. They are professional feedback-givers, dispensing grades, advice, support, and red ink. They believe in the power of feedback to communicate what students are doing well and how they can do better. However, some teachers shy away from opportunities for feedback on their own work. Some don't…
ERIC Educational Resources Information Center
Patterson, Eira Wyn
2018-01-01
Collaborative group work has the potential for providing rich opportunities for children to learn through talk with peers; however, in practice, little effective engagement in learning is observed within authentic learning contexts. Exploratory talk is associated with high levels of cognitive challenge within collaborative group work. Detailed…
ERIC Educational Resources Information Center
Ma, Songge
2012-01-01
Purpose: This paper aims to explore what Chinese doctors have learned in authentic medical practice, what they want to learn, and the dynamics behind their professional learning in working contexts. Design/methodology/approach: The paper uses Narrative Inquiry, qualitative data which were collected by open-ended face-to-face interviews and…
On the Traceability of Commercial Saffron Samples Using ¹H-NMR and FT-IR Metabolomics.
Consonni, Roberto; Ordoudi, Stella A; Cagliani, Laura R; Tsiangali, Maria; Tsimidou, Maria Z
2016-02-29
In previous works on authentic samples of saffron of known history (harvest and processing year, storage conditions, and length of time) some biomarkers were proposed using both FT-IR and NMR metabolomics regarding the shelf life of the product. This work addresses the difficulties to trace back the "age" of commercial saffron samples of unknown history, sets a limit value above which these products can be considered substandard, and offers a useful tool to combat saffron mislabeling and fraud with low-quality saffron material. Investigations of authentic and commercial saffron samples of different origin and harvest year, which had been stored under controlled conditions for different lengths of time, allowed a clear-cut clustering of samples in two groups according to the storage period irrespectively of the provenience. In this respect, the four-year cut off point proposed in our previous work assisted to trace back the "age" of unknown samples and to check for possible mislabeling practices.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.
Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol
2013-01-01
The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601
NASA Astrophysics Data System (ADS)
Siswono, T. Y. E.; Kohar, A. W.; Rosyidi, A. H.; Hartono, S.; Masriyah
2018-01-01
Designing problem like in PISA is known as a challenging activity for teachers particularly as the use of authentic context within that type of problem. This paper aims to describe the experiences of secondary mathematics teachers in designing PISA-like problems within an innovative training program focusing on building teachers’ understanding on the concept of mathematical literacy. The teachers were engaged in a set of problem-solving and problem-posing activities using PISA-based problem within indoor and outdoor field experiences. Within indoor field experience, the teachers worked collaboratively in groups on designing PISA-like problems with a given context through problem generation and reformulation techniques. Within outdoor field experience, they worked on designing PISA-like problems with self-chosen context from the place where the outdoor field experience took place. Our analysis indicates that there were improvements on the PISA-like problems designed by teachers based on its level use of context from indoor to outdoor experience. Also, the teachers were relatively successful with creating appropriate and motivating contexts by harnessing a variety of context consisting of personal, occupational, societal, and scientific contexts. However, they still experienced difficulties in turning these contexts into an appropriate problem satisfying PISA framework such as regarding authenticity of context use, language structure, and PISA task profile.
Schulz, Simon; Angarano, Marco; Fabritius, Martin; Mülhaupt, Rolf; Dard, Michel; Obrecht, Marcel; Tomakidi, Pascal
2014-01-01
Standard preclinical assessments in vitro often have limitations regarding their transferability to human beings, mainly evoked by their nonhuman and tissue-different/nontissue-specific source. Here, we aimed at employing tissue-authentic simple and complex interactive fibroblast-epithelial cell systems and their in vivo-relevant biomarkers for preclinical in vitro assessment of nonwoven-based gelatin/polycaprolactone membranes (NBMs) for treatment of soft tissue defects. NBMs were composed of electrospun gelatin and polycaprolactone nanofiber nonwovens. Scanning electron microscopy in conjunction with actin/focal contact integrin fluorescence revealed successful adhesion and proper morphogenesis of keratinocytes and fibroblasts, along with cells' derived extracellular matrix deposits. The “feel-good factor” of cells under study on the NBM was substantiated by forming a confluent connective tissue entity, which was concomitant with a stratified epithelial equivalent. Immunohistochemistry proved tissue authenticity over time by abundance of the biomarker vimentin in the connective tissue entity, and chronological increase of keratins KRT1/10 and involucrin expression in epithelial equivalents. Suitability of the novel NBM as wound dressing was evidenced by an almost completion of epithelial wound closure in a pilot mini-pig study, after a surgical intervention-caused gingival dehiscence. In summary, preclinical assessment by tissue-authentic cell systems and the animal pilot study revealed the NBM as an encouraging therapeutic medical device for prospective clinical applications. PMID:24494668
Secure Control Systems for the Energy Sector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Smith, Rhett; Campbell, Jack; Hadley, Mark
2012-03-31
Schweitzer Engineering Laboratories (SEL) will conduct the Hallmark Project to address the need to reduce the risk of energy disruptions because of cyber incidents on control systems. The goals is to develop solutions that can be both applied to existing control systems and designed into new control systems to add the security measures needed to mitigate energy network vulnerabilities. The scope of the Hallmark Project contains four primary elements: 1. Technology transfer of the Secure Supervisory Control and Data Acquisition (SCADA) Communications Protocol (SSCP) from Pacific Northwest National Laboratories (PNNL) to Schweitzer Engineering Laboratories (SEL). The project shall use thismore » technology to develop a Federal Information Processing Standard (FIPS) 140-2 compliant original equipment manufacturer (OEM) module to be called a Cryptographic Daughter Card (CDC) with the ability to directly connect to any PC enabling that computer to securely communicate across serial to field devices. Validate the OEM capabilities with another vendor. 2. Development of a Link Authenticator Module (LAM) using the FIPS 140-2 validated Secure SCADA Communications Protocol (SSCP) CDC module with a central management software kit. 3. Validation of the CDC and Link Authenticator modules via laboratory and field tests. 4. Creation of documents that record the impact of the Link Authenticator to the operators of control systems and on the control system itself. The information in the documents can assist others with technology deployment and maintenance.« less
Protocols development for security and privacy of radio frequency identification systems
NASA Astrophysics Data System (ADS)
Sabbagha, Fatin
There are benefits to adopting radio frequency identification (RFID) technology, although there are methods of attack that can compromise the system. This research determined how that may happen and what possible solutions can keep that from happening. Protocols were developed to implement better security. In addition, new topologies were developed to handle the problems of the key management. Previously proposed protocols focused on providing mutual authentication and privacy between readers and tags. However, those protocols are still vulnerable to be attacked. These protocols were analyzed and the disadvantages shown for each one. Previous works assumed that the channels between readers and the servers were secure. In the proposed protocols, a compromised reader is considered along with how to prevent tags from being read by that reader. The new protocols provide mutual authentication between readers and tags and, at the same time, remove the compromised reader from the system. Three protocols are proposed. In the first protocol, a mutual authentication is achieved and a compromised reader is not allowed in the network. In the second protocol, the number of times a reader contacts the server is reduced. The third protocol provides authentication and privacy between tags and readers using a trusted third party. The developed topology is implemented using python language and simulates work to check the efficiency regarding the processing time. The three protocols are implemented by writing codes in C language and then compiling them in MSP430. IAR Embedded workbench is used, which is an integrated development environment with the C/C++ compiler to generate a faster code and to debug the microcontroller. In summary, the goal of this research is to find solutions for the problems on previously proposed protocols, handle a compromised reader, and solve key management problems.
NASA Astrophysics Data System (ADS)
Sorensen, A. E.; Dauer, J. M.; Corral, L.; Fontaine, J. J.
2017-12-01
A core component of public scientific literacy, and thereby informed decision-making, is the ability of individuals to reason about complex systems. In response to students having difficulty learning about complex systems, educational research suggests that conceptual representations, or mental models, may help orient student thinking. Mental models provide a framework to support students in organizing and developing ideas. The PMC-2E model is a productive tool in teaching ideas of modeling complex systems in the classroom because the conceptual representation framework allows for self-directed learning where students can externalize systems thinking. Beyond mental models, recent work emphasizes the importance of facilitating integration of authentic science into the formal classroom. To align these ideas, a university class was developed around the theme of carnivore ecology, founded on PMC-2E framework and authentic scientific data collection. Students were asked to develop a protocol, collect, and analyze data around a scientific question in partnership with a scientist, and then use data to inform their own learning about the system through the mental model process. We identified two beneficial outcomes (1) scientific data is collected to address real scientific questions at a larger scale and (2) positive outcomes for student learning and views of science. After participating in the class, students report enjoying class structure, increased support for public understanding of science, and shifts in nature of science and interest in pursuing science metrics on post-assessments. Further work is ongoing investigating the linkages between engaging in authentic scientific practices that inform student mental models, and how it might promote students' systems-thinking skills, implications for student views of nature of science, and development of student epistemic practices.
Speech watermarking: an approach for the forensic analysis of digital telephonic recordings.
Faundez-Zanuy, Marcos; Lucena-Molina, Jose J; Hagmüller, Martin
2010-07-01
In this article, the authors discuss the problem of forensic authentication of digital audio recordings. Although forensic audio has been addressed in several articles, the existing approaches are focused on analog magnetic recordings, which are less prevalent because of the large amount of digital recorders available on the market (optical, solid state, hard disks, etc.). An approach based on digital signal processing that consists of spread spectrum techniques for speech watermarking is presented. This approach presents the advantage that the authentication is based on the signal itself rather than the recording format. Thus, it is valid for usual recording devices in police-controlled telephone intercepts. In addition, our proposal allows for the introduction of relevant information such as the recording date and time and all the relevant data (this is not always possible with classical systems). Our experimental results reveal that the speech watermarking procedure does not interfere in a significant way with the posterior forensic speaker identification.
ERIC Educational Resources Information Center
Advance CTE: State Leaders Connecting Learning to Work, 2016
2016-01-01
As state education agencies turn their focus to preparing students for both college and careers, work-based learning is becoming an increasingly popular strategy for students to reinforce and deepen their classroom learning, explore future career fields and demonstrate their skills in an authentic setting. While much of the hard work to identify,…
Optics for People Stuck in Traffic: License Plates.
ERIC Educational Resources Information Center
Chagnon, Paul
1995-01-01
Explains the theory behind the working of Scotchlite, a retrodirective material used for coating automotive license plates, and the Ensure Imaging System that allows law enforcement officers to verify the authenticity of the plate. (JRH)
Quantum Dialogue with Authentication Based on Bell States
NASA Astrophysics Data System (ADS)
Shen, Dongsu; Ma, Wenping; Yin, Xunru; Li, Xiaoping
2013-06-01
We propose an authenticated quantum dialogue protocol, which is based on a shared private quantum entangled channel. In this protocol, the EPR pairs are randomly prepared in one of the four Bell states for communication. By performing four Pauli operations on the shared EPR pairs to encode their shared authentication key and secret message, two legitimate users can implement mutual identity authentication and quantum dialogue without the help from the third party authenticator. Furthermore, due to the EPR pairs which are used for secure communication are utilized to implement authentication and the whole authentication process is included in the direct secure communication process, it does not require additional particles to realize authentication in this protocol. The updated authentication key provides the counterparts with a new authentication key for the next authentication and direct communication. Compared with other secure communication with authentication protocols, this one is more secure and efficient owing to the combination of authentication and direct communication. Security analysis shows that it is secure against the eavesdropping attack, the impersonation attack and the man-in-the-middle (MITM) attack.
Gladden, Matthew E.
2017-01-01
Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the “CIA Triad” of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel “posthumanized” human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses. PMID:29163010
Gladden, Matthew E
2017-01-01
Previous works exploring the challenges of ensuring information security for neuroprosthetic devices and their users have typically built on the traditional InfoSec concept of the "CIA Triad" of confidentiality, integrity, and availability. However, we argue that the CIA Triad provides an increasingly inadequate foundation for envisioning information security for neuroprostheses, insofar as it presumes that (1) any computational systems to be secured are merely instruments for expressing their human users' agency, and (2) computing devices are conceptually and practically separable from their users. Drawing on contemporary philosophy of technology and philosophical and critical posthumanist analysis, we contend that futuristic neuroprostheses could conceivably violate these basic InfoSec presumptions, insofar as (1) they may alter or supplant their users' biological agency rather than simply supporting it, and (2) they may structurally and functionally fuse with their users to create qualitatively novel "posthumanized" human-machine systems that cannot be secured as though they were conventional computing devices. Simultaneously, it is noted that many of the goals that have been proposed for future neuroprostheses by InfoSec researchers (e.g., relating to aesthetics, human dignity, authenticity, free will, and cultural sensitivity) fall outside the scope of InfoSec as it has historically been understood and touch on a wide range of ethical, aesthetic, physical, metaphysical, psychological, economic, and social values. We suggest that the field of axiology can provide useful frameworks for more effectively identifying, analyzing, and prioritizing such diverse types of values and goods that can (and should) be pursued through InfoSec practices for futuristic neuroprostheses.
A Clock Fingerprints-Based Approach for Wireless Transmitter Identification
NASA Astrophysics Data System (ADS)
Zhao, Caidan; Xie, Liang; Huang, Lianfen; Yao, Yan
Cognitive radio (CR) was proposed as one of the promising solutions for low spectrum utilization. However, security problems such as the primary user emulation (PUE) attack severely limit its applications. In this paper, we propose a clock fingerprints-based authentication approach to prevent PUE attacks in CR networks with the help of curve fitting and classifier. An experimental setup was constructed using the WLAN cards and software radio devices, and the corresponding results show that satisfied identification can be achieved for wireless transmitters.
1983-12-01
Initializes the data tables shared by both the Local and Netowrk Operating Systems. 3. Invint: Written in Assembly Language. Initializes the Input/Output...connection with an appropriate type and grade of transport service and appropriate security authentication (Ref 6:38). Data Transfer within a session...V.; Kent, S. Security in oihr Level Protocolst Anorgaches. Alternatives and Recommendations, Draft Report ICST/HLNP-81-19, Wash ingt on,,D.C.: Dept
Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-11-21
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.
Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai
2017-01-01
Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions. PMID:29160861
An Efficient Mutual Authentication Framework for Healthcare System in Cloud Computing.
Kumar, Vinod; Jangirala, Srinivas; Ahmad, Musheer
2018-06-28
The increasing role of Telecare Medicine Information Systems (TMIS) makes its accessibility for patients to explore medical treatment, accumulate and approach medical data through internet connectivity. Security and privacy preservation is necessary for medical data of the patient in TMIS because of the very perceptive purpose. Recently, Mohit et al.'s proposed a mutual authentication protocol for TMIS in the cloud computing environment. In this work, we reviewed their protocol and found that it is not secure against stolen verifier attack, many logged in patient attack, patient anonymity, impersonation attack, and fails to protect session key. For enhancement of security level, we proposed a new mutual authentication protocol for the similar environment. The presented framework is also more capable in terms of computation cost. In addition, the security evaluation of the protocol protects resilience of all possible security attributes, and we also explored formal security evaluation based on random oracle model. The performance of the proposed protocol is much better in comparison to the existing protocol.
Tracy, Jessica L; Prehn, Christine
2012-01-01
Two studies tested whether observers could differentiate between two facets of pride-authentic and hubristic-on the basis of a single prototypical pride nonverbal expression combined with relevant contextual information. In Study 1, participants viewed targets displaying posed pride expressions in response to success, while causal attributions for the success (target's effort vs. ability) and the source of this information (target vs. omniscient narrator conveying objective fact) were varied. Study 2 used a similar method, but attribution information came from both the target and an omniscient narrator; the congruence of these attributions was varied. Across studies, participants tended to label expressions as authentic pride, but were relatively more likely to label them as hubristic pride when (a) contextual information indicated that targets were arrogant and (b) no mitigating information about the target's potential value as a hard-working group member (i.e., that success was actually due to effort) was presented.
Addressing the vulnerabilities of pass-thoughts
NASA Astrophysics Data System (ADS)
Fernandez, Gabriel C.; Danko, Amanda S.
2016-05-01
As biometrics become increasingly pervasive, consumer electronics are reaping the benefits of improved authentication methods. Leveraging the physical characteristics of a user reduces the burden of setting and remembering complex passwords, while enabling stronger security. Multi-factor systems lend further credence to this model, increasing security via multiple passive data points. In recent years, brainwaves have been shown to be another feasible source for biometric authentication. Physically unique to an individual in certain circumstances, the signals can also be changed by the user at will, making them more robust than static physical characteristics. No paradigm is impervious however, and even well-established medical technologies have deficiencies. In this work, a system for biometric authentication via brainwaves is constructed with electroencephalography (EEG). The efficacy of EEG biometrics via existing consumer electronics is evaluated, and vulnerabilities of such a system are enumerated. Impersonation attacks are performed to expose the extent to which the system is vulnerable. Finally, a multimodal system combining EEG with additional factors is recommended and outlined.
Authentication of beef versus horse meat using 60 MHz 1H NMR spectroscopy
Jakes, W.; Gerdova, A.; Defernez, M.; Watson, A.D.; McCallum, C.; Limer, E.; Colquhoun, I.J.; Williamson, D.C.; Kemsley, E.K.
2015-01-01
This work reports a candidate screening protocol to distinguish beef from horse meat based upon comparison of triglyceride signatures obtained by 60 MHz 1H NMR spectroscopy. Using a simple chloroform-based extraction, we obtained classic low-field triglyceride spectra from typically a 10 min acquisition time. Peak integration was sufficient to differentiate samples of fresh beef (76 extractions) and horse (62 extractions) using Naïve Bayes classification. Principal component analysis gave a two-dimensional “authentic” beef region (p = 0.001) against which further spectra could be compared. This model was challenged using a subset of 23 freeze–thawed training samples. The outcomes indicated that storing samples by freezing does not adversely affect the analysis. Of a further collection of extractions from previously unseen samples, 90/91 beef spectra were classified as authentic, and 16/16 horse spectra as non-authentic. We conclude that 60 MHz 1H NMR represents a feasible high-throughput approach for screening raw meat. PMID:25577043
Fernandes, Telmo J R; Costa, Joana; Oliveira, M Beatriz P P; Mafra, Isabel
2017-09-01
This work aimed to exploit the use of DNA mini-barcodes combined with high resolution melting (HRM) for the authentication of gadoid species: Atlantic cod (Gadus morhua), Pacific cod (Gadus macrocephalus), Alaska pollock (Theragra chalcogramma) and saithe (Pollachius virens). Two DNA barcode regions, namely cytochrome c oxidase subunit I (COI) and cytochrome b (cytb), were analysed in silico to identify genetic variability among the four species and used, subsequently, to develop a real-time PCR method coupled with HRM analysis. The cytb mini-barcode enabled best discrimination of the target species with a high level of confidence (99.3%). The approach was applied successfully to identify gadoid species in 30 fish-containing foods, 30% of which were not as declared on the label. Herein, a novel approach for rapid, simple and cost-effective discrimination/clustering, as a tool to authenticate Gadidae fish species, according to their genetic relationship, is proposed. Copyright © 2017 Elsevier Ltd. All rights reserved.
Blanchard, Andrea Katryn; Sangha, Chaitanya AIDS Tadegattuva Mahila; Nair, Sapna G.; Thalinja, Raghavendra; Srikantamurthy, H.S.; Ramanaik, Satyanaryana; Javalkar, Prakash; Pillai, Priya; Isac, Shajy; Collumbien, Martine; Heise, Lori; Bhattacharjee, Parinita; Bruce, Sharon Gail
2016-01-01
Community-based participatory research has been seen to hold great promise by researchers aiming to bridge research and action in global health programs and practice. However, there is still much debate around whether achieving authenticity in terms of in-depth collaboration between community and academic partners is possible while pursuing academic expectations for quality. This article describes the community-based methodology for a qualitative study to explore intimate partner violence and HIV/AIDS among women in sex work, or female sex workers, and their male partners in Karnataka, South India. Developed through collaborative processes, the study methodology followed an interpretive approach to qualitative inquiry, with three key components including long-term partnerships, knowledge exchange, and orientation toward action. We then discuss lessons learned on how to pursue authenticity in terms of truly collaborative processes with inherent value that also contribute to, rather than hinder, the instrumental goal of enhancing the quality and relevance of the research outcomes. PMID:27378133
ERIC Educational Resources Information Center
Corbalan, Gemma; Kester, Liesbeth; van Merrienboer, Jeroen J. G.
2008-01-01
Complex skill acquisition by performing authentic learning tasks is constrained by limited working memory capacity [Baddeley, A. D. (1992). Working memory. "Science, 255", 556-559]. To prevent cognitive overload, task difficulty and support of each newly selected learning task can be adapted to the learner's competence level and perceived task…
"No tempo de Zicartola": Locating Cultural Mediation and Social Change, 1963-65
ERIC Educational Resources Information Center
Dietrich, Elise M.
2017-01-01
In 1960s Rio de Janeiro, the Brazilian white middle class embraced the samba music written by working-class blacks as a source of authentic national culture. Cultural mediators, or individuals that bridged sociocultural spheres and negotiated the terms in which work was produced and circulated, were essential to samba's mainstream acceptance. This…
ERIC Educational Resources Information Center
Mena, Irene B.; Schmitz, Sven; McLaughlin, Dennis
2015-01-01
This paper describes the implementation and assessment of an aerospace engineering course in which undergraduate students worked on research projects with graduate research mentors. The course was created using the principles from cooperative learning and project-based learning, and consisted of students working in small groups on a complex,…
Interoperable PKI Data Distribution in Computational Grids
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pala, Massimiliano; Cholia, Shreyas; Rea, Scott A.
One of the most successful working examples of virtual organizations, computational grids need authentication mechanisms that inter-operate across domain boundaries. Public Key Infrastructures(PKIs) provide sufficient flexibility to allow resource managers to securely grant access to their systems in such distributed environments. However, as PKIs grow and services are added to enhance both security and usability, users and applications must struggle to discover available resources-particularly when the Certification Authority (CA) is alien to the relying party. This article presents how to overcome these limitations of the current grid authentication model by integrating the PKI Resource Query Protocol (PRQP) into the Gridmore » Security Infrastructure (GSI).« less
Integrating teaching and authentic research in the field and laboratory settings
NASA Astrophysics Data System (ADS)
Daryanto, S.; Wang, L.; Kaseke, K. F.; Ravi, S.
2016-12-01
Typically authentic research activities are separated from rigorous classroom teaching. Here we assessed the potential of integrating teaching and research activities both in the field and in the laboratory. We worked with students from both US and abroad without strong science background to utilize advanced environmental sensors and statistical tool to conduct innovative projects. The students include one from Namibia and two local high school students in Indianapolis (through Project SEED, Summer Experience for the Economically Disadvantaged). They conducted leaf potential measurements, isotope measurements and meta-analysis. The experience showed us the great potential of integrating teaching and research in both field and laboratory settings.
Yang, Meixue; Liu, Bin; Zhao, Miaomiao; Li, Fan; Wang, Guoqing; Zhou, Fengfeng
2013-01-01
Although electrocardiogram (ECG) fluctuates over time and physical activity, some of its intrinsic measurements serve well as biometric features. Considering its constant availability and difficulty in being faked, the ECG signal is becoming a promising factor for biometric authentication. The majority of the currently available algorithms only work well on healthy participants. A novel normalization and interpolation algorithm is proposed to convert an ECG signal into multiple template cycles, which are comparable between any two ECGs, no matter the sampling rates or health status. The overall accuracies reach 100% and 90.11% for healthy participants and cardiovascular disease (CVD) patients, respectively.
Zhao, Miaomiao; Li, Fan; Wang, Guoqing; Zhou, Fengfeng
2013-01-01
Although electrocardiogram (ECG) fluctuates over time and physical activity, some of its intrinsic measurements serve well as biometric features. Considering its constant availability and difficulty in being faked, the ECG signal is becoming a promising factor for biometric authentication. The majority of the currently available algorithms only work well on healthy participants. A novel normalization and interpolation algorithm is proposed to convert an ECG signal into multiple template cycles, which are comparable between any two ECGs, no matter the sampling rates or health status. The overall accuracies reach 100% and 90.11% for healthy participants and cardiovascular disease (CVD) patients, respectively. PMID:23977063
Tennant, Michele R; Edwards, Mary; Miyamoto, Michael M
2012-04-01
How can the library-based research project of a genetics course be reinvigorated and made sustainable without sacrificing educational integrity? The University of Florida's Health Science Center Library provides the case study. Since 1996, the librarian has codeveloped, supported, and graded all components of the project. In 2009, the project evolved from a single-authored paper to a group-work poster, with graded presentations hosted by the library. In 2010, students were surveyed regarding class enhancements. Responses indicated a preference for collaborative work and the poster format and suggested the changes facilitated learning. Instructors reported that the poster format more clearly documented students' understanding of genetics. Results suggest project enhancements contributed to greater appreciation, understanding, and application of classroom material and offered a unique and authentic learning experience, without compromising educational integrity. The library benefitted through increased visibility as a partner in the educational mission and development of a sustainable instructional collaboration.
ERIC Educational Resources Information Center
Wood, Alex M.; Linley, P. Alex; Maltby, John; Baliousis, Michael; Joseph, Stephen
2008-01-01
This article describes the development of a measure of dispositional authenticity and tests whether authenticity is related to well-being, as predicted by several counseling psychology perspectives. Scales were designed to measure a tripartite conception of authenticity, comprising self-alienation, authentic living, and accepting external…
Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity
ERIC Educational Resources Information Center
De Bruyckere, Pedro; Kirschner, Paul A.
2017-01-01
Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…
Osathanunkul, Maslin; Suwannapoom, Chatmongkon; Khamyong, Nuttaluck; Pintakum, Danupol; Lamphun, Santisuk Na; Triwitayakorn, Kanokporn; Osathanunkul, Kitisak; Madesis, Panagiotis
2016-01-01
Andrographis paniculata Nees is a medicinal plant with multiple pharmacological properties. It has been used over many centuries as a household remedy. A. paniculata products sold on the markets are in processed forms so it is difficult to authenticate. Therefore buying the herbal products poses a high-risk of acquiring counterfeited, substituted and/or adulterated products. Due to these issues, a reliable method to authenticate products is needed. High resolution melting analysis coupled with DNA barcoding (Bar-HRM) was applied to detect adulteration in commercial herbal products. The rbcL barcode was selected to use in primers design for HRM analysis to produce standard melting profile of A. paniculata species. DNA of the tested commercial products was isolated and their melting profiles were then generated and compared with the standard A. paniculata. The melting profiles of the rbcL amplicons of the three closely related herbal species (A. paniculata, Acanthus ebracteatus and Rhinacanthus nasutus) are clearly separated so that they can be distinguished by the developed method. The method was then used to authenticate commercial herbal products. HRM curves of all 10 samples tested are similar to A. paniculata which indicated that all tested products were contained the correct species as labeled. The method described in this study has been proved to be useful in aiding identification and/or authenticating A. paniculata. This Bar-HRM analysis has allowed us easily to determine the A. paniculata species in herbal products on the markets even they are in processed forms. We propose the use of DNA barcoding combined with High Resolution Melting analysis for authenticating of Andrographis paniculata products.The developed method can be used regardless of the type of the DNA template (fresh or dried tissue, leaf, and stem).rbcL region was chosen for the analysis and work well with our samplesWe can easily determine the A. paniculata species in herbal products tested. Abbreviations used: bp: Base pair, Tm: Melting temperature.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.
An, Younghwa
2012-01-01
Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. PMID:22899887
ERIC Educational Resources Information Center
Weiskopf, Jimmy
1994-01-01
Describes the work of Pacho Piaguaju, a Siona Indian and one of the last authentic native shamans of the Colombian Amazon. He has set for himself the task of preserving his people's knowledge of medicinal plants, partly through the education of Colombian schoolchildren. (LZ)
ERIC Educational Resources Information Center
Lüddecke, Florian
2016-01-01
Whereas the importance of authenticity in relation to educational contexts has been highlighted, educational authenticity (EA) has mainly referred to a real-life/world convergence or the notion of teacher authenticity, implying that authenticity can be taught and learnt. This view, however, has largely overlooked philosophical considerations so…
ERIC Educational Resources Information Center
Nematollahi, Shirin; Maghsoudi, Mojtaba
2015-01-01
In this current study the researchers have tried to investigate the possible effect of authentic and non-authentic texts on Iranian EFL learners' vocabulary retention. Despite the great deal of studies conducted in the area of EFL/ESL learning, the effect of authentic versus non-authentic texts have almost gained little attention and been…
Fulfillment of HTTP Authentication Based on Alcatel OmniSwitch 9700
NASA Astrophysics Data System (ADS)
Liu, Hefu
This paper provides a way of HTTP authentication On Alcatel OmniSwitch 9700. Authenticated VLANs control user access to network resources based on VLAN assignment and user authentication. The user can be authenticated through the switch via any standard Web browser software. Web browser client displays the username and password prompts. Then a way for HTML forms can be given to pass HTTP authentication data when it's submitted. A radius server will provide a database of user information that the switch checks whenever it tries to authenticate through the switch. Before or after authentication, the client can get an address from a Dhcp server.
ERIC Educational Resources Information Center
Lee, Sang Joon; Ngampornchai, Anchalee; Trail-Constant, Trudian; Abril, Andres; Srinivasan, Sandhya
2016-01-01
Due to the realistic, complex natures of authentic cases involved in case-based learning, the use of group work has been encouraged and expected to enhance the quality of interaction among participants and to improve students' learning experiences. The purpose of this study was to investigate whether the case-based online group work increased…
The Centrality of Social Presence in Online Teaching and Learning in Social Work
ERIC Educational Resources Information Center
Bentley, Kia J.; Secret, Mary C.; Cummings, Cory R.
2015-01-01
Social presence is the extent to which persons are perceived to be real and are able to be authentically known and connected to others in mediated communication. A full appreciation of the concept offers social work educators an antidote to skepticism of online learning and provides an avenue for modeling the development and maintenance--indeed,…
ERIC Educational Resources Information Center
Jung, Hyunyi; Brady, Corey
2016-01-01
Partnership with teachers for professional development has been considered beneficial because of the potential of collaborative work in the teacher's own classroom to be relevant to practice. From this perspective, both teachers and researchers can draw on their own expertise and work as authentic partners. In this study, we address the need for…
The non-contact biometric identified bio signal measurement sensor and algorithms.
Kim, Chan-Il; Lee, Jong-Ha
2018-01-01
In these days, wearable devices have been developed for effectively measuring biological data. However, these devices have tissue allege and noise problem. To solve these problems, biometric measurement based on a non-contact method, such as face image sequencing is developed. This makes it possible to measure biometric data without any operation and side effects. However, it is impossible for a remote center to identify the person whose data are measured by the novel methods. In this paper, we propose the novel non-contact heart rate and blood pressure imaging system, Deep Health Eye. This system has authentication process at the same time as measuring bio signals, through non-contact method. In the future, this system can be convenient home bio signal monitoring system by combined with smart mirror.
Access control for electronic patient records.
Glagola, M J
1998-01-01
The transition from hardcopy records to electronic records is in the forefront for healthcare today. For healthcare facilities, a major issue is determining who can access patients' medical information and how access to this information can be controlled. There are three components to access control: identification, authentication and authorization. Checking proof of identity is a means of authenticating someone--through a driver's license, passport or their fingerprints. Similar processes are needed in a computer environment, through the use of passwords, one-time passwords or smartcards, encryption and kerberos, and call-back procedures. New in the area of access control are biometric devices, which are hardware/software combinations that digitize a physical characteristic and compare the sample with previously stored samples. Fingerprints, voiceprints and facial features are examples. Their cost is currently prohibitive, but in time, they may become more common. Digital certificates and certification authorities are other means used to authenticate identify. When a system challenges a user's identity at log on, the user provides a certification that tells the system to go to the issuing certification authority and find proof the user's claim is valid. Low-level certifications offer little value for sensitive data, but high-level certification is now being introduced. It requires more specific, detailed information on the applicant. Authorization, the final component of access control, establishes what a specific user can and cannot access. To have effective access control, transaction logging and system monitoring are needed to ensure the various techniques are being used and performing properly.
Securing health sensing using integrated circuit metric.
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-10-20
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.
Securing Health Sensing Using Integrated Circuit Metric
Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus
2015-01-01
Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250
Graph State-Based Quantum Group Authentication Scheme
NASA Astrophysics Data System (ADS)
Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying
2017-02-01
Motivated by the elegant structure of the graph state, we design an ingenious quantum group authentication scheme, which is implemented by operating appropriate operations on the graph state and can solve the problem of multi-user authentication. Three entities, the group authentication server (GAS) as a verifier, multiple users as provers and the trusted third party Trent are included. GAS and Trent assist the multiple users in completing the authentication process, i.e., GAS is responsible for registering all the users while Trent prepares graph states. All the users, who request for authentication, encode their authentication keys on to the graph state by performing Pauli operators. It demonstrates that a novel authentication scheme can be achieved with the flexible use of graph state, which can synchronously authenticate a large number of users, meanwhile the provable security can be guaranteed definitely.
A new security model for collaborative environments
DOE Office of Scientific and Technical Information (OSTI.GOV)
Agarwal, Deborah; Lorch, Markus; Thompson, Mary
Prevalent authentication and authorization models for distributed systems provide for the protection of computer systems and resources from unauthorized use. The rules and policies that drive the access decisions in such systems are typically configured up front and require trust establishment before the systems can be used. This approach does not work well for computer software that moderates human-to-human interaction. This work proposes a new model for trust establishment and management in computer systems supporting collaborative work. The model supports the dynamic addition of new users to a collaboration with very little initial trust placed into their identity and supportsmore » the incremental building of trust relationships through endorsements from established collaborators. It also recognizes the strength of a users authentication when making trust decisions. By mimicking the way humans build trust naturally the model can support a wide variety of usage scenarios. Its particular strength lies in the support for ad-hoc and dynamic collaborations and the ubiquitous access to a Computer Supported Collaboration Workspace (CSCW) system from locations with varying levels of trust and security.« less
22 CFR 92.36 - Authentication defined.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Authentication defined. 92.36 Section 92.36... Notarial Acts § 92.36 Authentication defined. An authentication is a certification of the genuineness of... recognized in another jurisdiction. Documents which may require authentication include legal instruments...
NASA Astrophysics Data System (ADS)
Moia, Franco
2002-04-01
With linear photo-polymerization (LPP) ROLIC has invented a photo-patternable technology enabling to align not only conventional liquid crystals but also liquid crystals polymers (LCP). ROLIC's optical security device technology derives from its LPP/LCP technology. LPP/LCP security devices are created by structured photo-alignment of an LPP layer through phot-masks, thus generating a high resolution, photo-patterned aligning layer which carries the aligning information of the image to be created. The subsequent LCP layer transforms the aligning information into an optical phase image with low and/or very high information content, such as invisible photographic pictures. The building block capability of the LPP/LCP technology allows the manufacturing of cholesteric and non-cholesteric LPP/LCP devices which cover 1st and/or 2nd level applications. Apart from black/white security devices colored information zones can be integrated. Moreover, we have developed an LPP/LCP security device which covers all three- 1st, 2nd and 3rd- inspection levels in one and the same authentication device: besides a color shift by tilting the device (1st level) and the detection of normally hidden information by use of a simple sheet polarizer (2nd level) the new device contains encrypted hidden information which can be visualized only by superimposing an LPP/LCP inspection tool (key) for decryption (3rd level). This optical key is also based on the LPP/LCP technology and is itself a 3rd level security device.
Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.
Calder-Dawe, Octavia; Gavey, Nicola
2017-12-01
This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.
ERIC Educational Resources Information Center
Walter, Bethany
2005-01-01
Developing learning experiences around real-world scenarios engages students in hands-on, authentic learning that promotes skills such as: research methods, collaboration, workplace skills, persistence, information organization and application, and self-reflection practice. The final work, new skills, and knowledge may then be demonstrated to an…
Large-scale evaluation of multimodal biometric authentication using state-of-the-art systems.
Snelick, Robert; Uludag, Umut; Mink, Alan; Indovina, Michael; Jain, Anil
2005-03-01
We examine the performance of multimodal biometric authentication systems using state-of-the-art Commercial Off-the-Shelf (COTS) fingerprint and face biometric systems on a population approaching 1,000 individuals. The majority of prior studies of multimodal biometrics have been limited to relatively low accuracy non-COTS systems and populations of a few hundred users. Our work is the first to demonstrate that multimodal fingerprint and face biometric systems can achieve significant accuracy gains over either biometric alone, even when using highly accurate COTS systems on a relatively large-scale population. In addition to examining well-known multimodal methods, we introduce new methods of normalization and fusion that further improve the accuracy.
Identification of chemical markers in Cordyceps sinensis by HPLC-MS/MS.
Hu, Hankun; Xiao, Ling; Zheng, Baogen; Wei, Xin; Ellis, Alexis; Liu, Yi-Ming
2015-10-01
Authentication and quality assessment of Cordyceps sinensis, a precious and pricey natural product that offers a variety of health benefits, is highly significant. To identify effective chemical markers, authentic C. sinensis was thoroughly screened by using HPLC-MS/MS. In addition to many previously reported ingredients, two glycosides, i.e., cyclo-Ala-Leu-rhamnose and Phe-o-glucose, were detected for the first time in this material. Six ingredients detected, including cordycepin, D-mannitol, Phe, Phe-o-glucose, cyclo-Gly-Pro, and cyclo-Ala-Leu-rhamnose, were selected as a collection of chemical markers. An HPLC-MS/MS method was developed to simultaneously quantify them with sensitivity and specificity. The method had limits of detection ranging from 0.008 μg mL(-1) for cordycepin to 0.75 μg mL(-1) for cyclo-Gly-Pro. Recovery was found between 96 and 103 % in all tests. To evaluate the effectiveness of the marker collection proposed, five authentic C. sinensis samples and five samples of its substitutes were analyzed. Cordycepin, D-mannitol, and Phe were found present in all samples. The contents ranged from 0.0076 to 0.029 % (w/w) for cordycepin, 0.33 to 18.9 % for mannitol, and 0.0013 to 0.642 % for Phe. Interestingly, the two glycosides, Phe-o-glucose and cyclo-Ala-Leu-rhamnose, were detected only in authentic C. sinensis samples. These results indicated that the proposed protocol based on HPLC-MS/MS quantification of the markers might have a great potential in authentication and quality assessment of C. sinensis. Graphical abstract Chemical markers of C. sinensis identified in this work.
NASA Astrophysics Data System (ADS)
Dijkstra, Elma; Goedhart, Martin
2011-07-01
Background and purpose This study examines secondary-school students' opinions on participating in authentic science projects which are part of an international EU project on climate change research in seven countries. Partnerships between schools and research institutes result in student projects, in which students work with and learn from scientists about the global carbon cycle. This study focuses in particular on differences between male and female students, as female students normally like traditional school science less than male students. Sample and design Data, drawn from 1370 students from 60 secondary schools across Europe, were collected through questionnaires taken at the end of the projects. The evaluated aspects were: organization; enjoyment; difficulty; and impact of the projects. Results The findings suggest that authentic science education is appreciated very much by both male students and even more by female students. The projects had positive impacts on climate change ideas, in particular for female students. Female students felt that they had learned many new things more often than male students. Conclusions Both male and female students have positive opinions about the authentic science projects. The results further point to positive effects of activities in which students have an active role, like hands-on experiments or presentation of results. The findings are placed in the international context of science education and their implications for policy are discussed.
Vavrek, Jayson R; Henderson, Brian S; Danagoulian, Areg
2018-04-24
Future nuclear arms reduction efforts will require technologies to verify that warheads slated for dismantlement are authentic without revealing any sensitive weapons design information to international inspectors. Despite several decades of research, no technology has met these requirements simultaneously. Recent work by Kemp et al. [Kemp RS, Danagoulian A, Macdonald RR, Vavrek JR (2016) Proc Natl Acad Sci USA 113:8618-8623] has produced a novel physical cryptographic verification protocol that approaches this treaty verification problem by exploiting the isotope-specific nature of nuclear resonance fluorescence (NRF) measurements to verify the authenticity of a warhead. To protect sensitive information, the NRF signal from the warhead is convolved with that of an encryption foil that contains key warhead isotopes in amounts unknown to the inspector. The convolved spectrum from a candidate warhead is statistically compared against that from an authenticated template warhead to determine whether the candidate itself is authentic. Here we report on recent proof-of-concept warhead verification experiments conducted at the Massachusetts Institute of Technology. Using high-purity germanium (HPGe) detectors, we measured NRF spectra from the interrogation of proxy "genuine" and "hoax" objects by a 2.52 MeV endpoint bremsstrahlung beam. The observed differences in NRF intensities near 2.2 MeV indicate that the physical cryptographic protocol can distinguish between proxy genuine and hoax objects with high confidence in realistic measurement times.
22 CFR 92.38 - Forms of certificate of authentication.
Code of Federal Regulations, 2010 CFR
2010-04-01
... 22 Foreign Relations 1 2010-04-01 2010-04-01 false Forms of certificate of authentication. 92.38... SERVICES Specific Notarial Acts § 92.38 Forms of certificate of authentication. The form of a certificate of authentication depends on the statutory requirements of the jurisdiction where the authenticated...
18 CFR 375.102 - Custody and authentication of Commission records.
Code of Federal Regulations, 2010 CFR
2010-04-01
... authentication of Commission records. 375.102 Section 375.102 Conservation of Power and Water Resources FEDERAL... Provisions § 375.102 Custody and authentication of Commission records. (a) Custody of official records. (1...) Authentication of Commission action. All orders and other actions of the Commission shall be authenticated or...
ERIC Educational Resources Information Center
Bialystok, Lauren
2015-01-01
Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…