Research on Multi-level Security of Shibboleth Authentication Mechanism

Author(s):  
Wang Ying
Author(s):  
Innocent Kabandana ◽  
A.N. Nanda Kumar

In a democratic process voting plays a vital role in selection of policy as well as candidates. Voting though gives the freedom to voter to cast his opinion it is not free fraudulent. In order to have secure voting and convey the opinion of authorized voter in this paper we have presented a java based framework for fraud proof electronic voting system. In this framework we ensure that only the authorized voter is permitted to cast his vote and mitigate illegal voters cast votes on faking or pretending to be someone else. Proposed FPF provides a multi-level of authentication mechanism to validate the voter. The proposed system is tested for efficiency and robustness in comparing it with the existing system and is found to be efficient through comparative analysis. At present FPF is successful in mitigating the unauthorized voting further enhancement in the electronic voting system is being carried out as future work.


2021 ◽  
Vol 13 (1) ◽  
pp. 400
Author(s):  
A. F. M. Suaib Akhter ◽  
Mohiuddin Ahmed ◽  
A. F. M. Shahen Shah ◽  
Adnan Anwar ◽  
Ahmet Zengin

Existing research shows that Cluster-based Medium Access Control (CB-MAC) protocols perform well in controlling and managing Vehicular Ad hoc Network (VANET), but requires ensuring improved security and privacy preserving authentication mechanism. To this end, we propose a multi-level blockchain-based privacy-preserving authentication protocol. The paper thoroughly explains the formation of the authentication centers, vehicles registration, and key generation processes. In the proposed architecture, a global authentication center (GAC) is responsible for storing all vehicle information, while Local Authentication Center (LAC) maintains a blockchain to enable quick handover between internal clusters of vehicle. We also propose a modified control packet format of IEEE 802.11 standards to remove the shortcomings of the traditional MAC protocols. Moreover, cluster formation, membership and cluster-head selection, and merging and leaving processes are implemented while considering the safety and non-safety message transmission to increase the performance. All blockchain communication is performed using high speed 5G internet while encrypted information is transmitted while using the RSA-1024 digital signature algorithm for improved security, integrity, and confidentiality. Our proof-of-concept implements the authentication schema while considering multiple virtual machines. With detailed experiments, we show that the proposed method is more efficient in terms of time and storage when compared to the existing methods. Besides, numerical analysis shows that the proposed transmission protocols outperform traditional MAC and benchmark methods in terms of throughput, delay, and packet dropping rate.


Author(s):  
Innocent Kabandana ◽  
A.N. Nanda Kumar

In a democratic process voting plays a vital role in selection of policy as well as candidates. Voting though gives the freedom to voter to cast his opinion it is not free fraudulent. In order to have secure voting and convey the opinion of authorized voter in this paper we have presented a java based framework for fraud proof electronic voting system. In this framework we ensure that only the authorized voter is permitted to cast his vote and mitigate illegal voters cast votes on faking or pretending to be someone else. Proposed FPF provides a multi-level of authentication mechanism to validate the voter. The proposed system is tested for efficiency and robustness in comparing it with the existing system and is found to be efficient through comparative analysis. At present FPF is successful in mitigating the unauthorized voting further enhancement in the electronic voting system is being carried out as future work.


The usage and management of information technology resources and services are revolutionized with the arrival of Cloud Computing. But, the revolution always comes with problems. Authentication is one such problem. Especially for Graphical Password Authentication System, there is a threat of shoulder surfing attack. This research presents a multi-level graphical password authentication mechanism by extending an existing method. UGPSCCCT (User guided Graphical Password Scheme for Cloud using Caesar Cipher Technique) is the existing method and this method is extended in this paper such that another level of security is added. The user credentials in this method are transmitted to the server in encryption format. A key is generated for every login to encrypt user details. The analysis of the proposed method is done by calculating the computational cost and communication cost of the proposed method


Author(s):  
Ferdinand Keller ◽  
Tatjana Stadnitski ◽  
Jakob Nützel ◽  
Renate Schepker
Keyword(s):  

Zusammenfassung. Fragestellung: Über Veränderungen in der emotionalen Befindlichkeit von Jugendlichen während einer Suchttherapie ist wenig bekannt. Methode: Die Jugendlichen füllten wöchentlich einen entsprechenden Fragebogen aus, analog ihre Bezugsbetreuer eine parallelisierte Kurzfassung. Von 42 Jugendlichen liegen insgesamt 853 Bogen und von den Bezugsbetreuern 708 Bogen vor. Die Fragebogen wurden zunächst faktorenanalytisch hinsichtlich ihrer Dimensionalität ausgewertet, anschließend wurden gruppenbezogene Verlaufsanalysen (Multi-Level-Modelle) und Abhängigkeitsanalysen auf Einzelfallebene (Zeitreihenanalysen) durchgeführt. Ergebnisse: Im Jugendlichenfragebogen ergaben sich vier Faktoren: negative Befindlichkeit, Wertschätzung von Therapie/Betreuung, Motivation und Suchtdynamik. Die Übereinstimmung zwischen den Jugendlichen- und der (einfaktoriellen) Betreuereinschätzung fiel insgesamt niedrig bis mäßig aus, brachte aber auf Einzelfallebene differenziertere Ergebnisse. Im Verlauf nahmen die Werte auf allen vier Jugendlichenskalen ab. Einzig der Verlauf der Wertschätzung in der Eingewöhnungsphase war prädiktiv für den späteren Abbruch der Maßnahme: Bei den Abbrechern nahm die Wertschätzung ab, während sie bei den Beendern initial stieg. Schlussfolgerungen: Der bedeutsamste Faktor in Bezug auf die Therapiebeendigung suchtkranker Jugendlicher scheint die Wertschätzung von Therapie/Betreuung zu sein, während die Motivation jugendtypische Schwankungen aufweist. Der Suchtdynamik kam eine deutlich weniger bedeutende Rolle zu als allgemein angenommen. Programme in der Langzeittherapie sollten die Wertschätzung von Therapie/Betreuung künftig mehr fokussieren als die Suchtdynamik.


2017 ◽  
Author(s):  
Todd D. Smith ◽  
Mari-Amanda Dyal ◽  
Yongjia Pu ◽  
Stephanie Dickinson ◽  
David M. DeJoy

Sign in / Sign up

Export Citation Format

Share Document