scholarly journals REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs

2020 ◽  
Vol 10 (6) ◽  
pp. 2007 ◽  
Author(s):  
Mishall Al-Zubaidie ◽  
Zhongwei Zhang ◽  
Ji Zhang

Healthcare institutions require advanced technology to collect patients’ data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks.

2010 ◽  
Vol 20-23 ◽  
pp. 505-511
Author(s):  
Xuan Wu Zhou

Compared with symmetric cryptosystem, asymmetric cryptosystem has much superiority in many application cases. Yet, the computation in a public key cryptosystem is much more complex than symmetric cryptosystem. In the paper, we applied HCC (Hyper-elliptic Curves Cryptosystem) as a typical fast public key cryptosystem into the designing of efficient blind signature scheme and presented an improved blind signature with fast cryptography algorithms. By utilizing probabilistic blinding algorithm, the scheme renders effective protection for the secrecy of original user, the signature generator or outer adversaries can not attack the secret message via the blinded information with effective polynomial algorithms. The scheme avoids the relevance between different signatures and interim parameters from the same original user, thus it effectively prevents signature forgery and replay attack. As security analysis for the scheme, we presented similar blind signature without relevant improving algorithms based on discrete logarithm cryptosystem. The analysis and comparison with other schemes both justify the security, reliability and high efficiency of the improved blind signature scheme regarding software and hardware application environment.


2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Yingying Zhang ◽  
Jiwen Zeng ◽  
Wei Li ◽  
Huilin Zhu

Ring signature is a kind of digital signature which can protect the identity of the signer. Certificateless public key cryptography not only overcomes key escrow problem but also does not lose some advantages of identity-based cryptography. Certificateless ring signature integrates ring signature with certificateless public key cryptography. In this paper, we propose an efficient certificateless ring signature; it has only three bilinear pairing operations in the verify algorithm. The scheme is proved to be unforgeable in the random oracle model.


Author(s):  
Prajnamaya Dass ◽  
Pranay Kumar Saha ◽  
Hari Om

Wireless technology is widely spread everywhere in the real world and has a biggest contribution to mankind. However, with the vitality of wireless architectures, security protocols are vulnerable to attackers outside the system, failure in wireless connectivity and machine failures. Protocols must be streamlined to combat with these abnormal conditions. In this paper, the authors provide a review of an existing protocol by Lee et al. They found that the protocol proposed by Lee et al., Enhanced two factor key exchange protocol in public wireless LANs is vulnerable to traceable attack. It is a serious type of attack where the attacker can target a particular user/client. To ensure security, the authors propose an improved scheme which anonymously provides secure authentication satisfying synchronization, untraceability of user and resists common attacks in a wireless network. As most of the real time security protocols use bio-metric based authentication schemes, they also propose a smartcard based secure authentication scheme for wireless networks. Their proposed schemes are proved safe under the formal security analysis of BAN logic. Both of their protocols are simulated using Automated Validation of Internet Security Protocols and Applications (AVISPA). The simulation of their protocols under On-the-Fly-Model-Checker (OFMC) and Constant Logic based Attack Searcher (CL-AtSe) models of AVISPA results in a SAFE state. The authors have compared their proposed schemes against some of the recently proposed wireless authentication schemes in terms of attack resistivity and operational cost. Experimental results elicit a significant improvement over the existing schemes with low cost. Proposed untraceable, synchronized schemes can be applied for authentication purposes in public wireless networks, client server authentication system etc. with effective cost.


2019 ◽  
Vol 2019 ◽  
pp. 1-26 ◽  
Author(s):  
Mishall Al-Zubaidie ◽  
Zhongwei Zhang ◽  
Ji Zhang

Providing a mechanism to authenticate users in healthcare applications is an essential security requirement to prevent both external and internal attackers from penetrating patients’ identities and revealing their health data. Many schemes have been developed to provide authentication mechanisms to ensure that only legitimate users are authorised to connect, but these schemes still suffer from vulnerable security. Various attacks expose patients’ data for malicious tampering or destruction. Transferring health-related data and information between users and the health centre makes them exposed to penetration by adversaries as they may move through an insecure channel. In addition, previous mechanisms have suffered from the poor protection of users’ authentication information. To ensure the protection of patients’ information and data, we propose a scheme that authenticates users based on the information of both the device and the legitimate user. In this paper, we propose a Robust Authentication Model for Healthcare Users (RAMHU) that provides mutual authentication between the server and clients. This model utilizes an Elliptic Curve Integrated Encryption Scheme (ECIES) and PHOTON to achieve strong security and good overall performance. RAMHU relies on multiple-pseudonym, physical address, and one-time password mechanisms to authenticate legitimate users. Moreover, extensive informal and formal security analysis with the automated validation of Internet security protocols and applications (AVISPA) tool demonstrate that our model offers a high level of security in repelling a wide variety of possible attacks.


2019 ◽  
Vol 4 (2) ◽  
pp. 356-362
Author(s):  
Jennifer W. Means ◽  
Casey McCaffrey

Purpose The use of real-time recording technology for clinical instruction allows student clinicians to more easily collect data, self-reflect, and move toward independence as supervisors continue to provide continuation of supportive methods. This article discusses how the use of high-definition real-time recording, Bluetooth technology, and embedded annotation may enhance the supervisory process. It also reports results of graduate students' perception of the benefits and satisfaction with the types of technology used. Method Survey data were collected from graduate students about their use and perceived benefits of advanced technology to support supervision during their 1st clinical experience. Results Survey results indicate that students found the use of their video recordings useful for self-evaluation, data collection, and therapy preparation. The students also perceived an increase in self-confidence through the use of the Bluetooth headsets as their supervisors could provide guidance and encouragement without interrupting the flow of their therapy sessions by entering the room to redirect them. Conclusions The use of video recording technology can provide opportunities for students to review: videos of prospective clients they will be treating, their treatment videos for self-assessment purposes, and for additional data collection. Bluetooth technology provides immediate communication between the clinical educator and the student. Students reported that the result of that communication can improve their self-confidence, perceived performance, and subsequent shift toward independence.


2020 ◽  
Vol 2 (2) ◽  
Author(s):  
Suzanna Schmeelk ◽  
Lixin Tao

Many organizations, to save costs, are movinheg to t Bring Your Own Mobile Device (BYOD) model and adopting applications built by third-parties at an unprecedented rate.  Our research examines software assurance methodologies specifically focusing on security analysis coverage of the program analysis for mobile malware detection, mitigation, and prevention.  This research focuses on secure software development of Android applications by developing knowledge graphs for threats reported by the Open Web Application Security Project (OWASP).  OWASP maintains lists of the top ten security threats to web and mobile applications.  We develop knowledge graphs based on the two most recent top ten threat years and show how the knowledge graph relationships can be discovered in mobile application source code.  We analyze 200+ healthcare applications from GitHub to gain an understanding of their software assurance of their developed software for one of the OWASP top ten moble threats, the threat of “Insecure Data Storage.”  We find that many of the applications are storing personally identifying information (PII) in potentially vulnerable places leaving users exposed to higher risks for the loss of their sensitive data.


2021 ◽  
Vol 2083 (4) ◽  
pp. 042009
Author(s):  
Zifeng Zhu ◽  
Fei Tian

Abstract Three American mathematicians made the NTRU public-key cryptosystem in 1996, it has a fast speed, small footprint, and also it is easy to produce key advantages. The NTRU signature algorithm is based on an integer base, the performance of the signature algorithm will change when the integer base becomes other bases. Based on the definition of “high-dimensional density” of lattice signatures, this paper chooses the ETRU signature algorithm formed by replacing the integer base with the Eisenstein integer base as a representative, and analyzes and compares the performance, security of NTRU and ETRU signature algorithms, SVP and CVP and other difficult issues, the speed of signature and verification, and the consumption of resources occupied by the algorithm.


2020 ◽  
pp. 1-10
Author(s):  
Ankit Rawat ◽  
Mohd Fazle Azeem

The modeling of BLDC motor and performance analysis under diverse operating speed settings has been presented in this paper. BLDC motors gaining more & more attention from different Industrial and domestic appliance manufacturers due to its compact size, high efficiency and robust structure. Voluminous research and developments in the domains of material science and power electronics led to substantial increase in applications of BLDC motor to electric drives. This paper deals with the modeling of BLDC motor drive system along with a comparative study of modified queens bee evolution based GA tuned & manually tuned control schemes using MATLAB /SIMULINK. In order to evaluate the performance of proposed drive, simulation is carried out at different Mechanical load & speed conditions. Test outcomes thus achieved show that the model performance is satisfactory.


2017 ◽  
Author(s):  
C. Bradford Biddle

On March 9, 1995, the Utah Digital Signature Act (the “Utah Act”) was signed into law.1 Complex and ambitious, the Utah Act is intended to promote the use of digital signatures on computer-based documents and to facilitate electronic commerce.2 The Utah Act implements an infrastructure in which computer users utilize “certification authorities,” online databases called repositories, and public-key encryption technology in order to “sign” electronic documents in a legally binding fashion. In addition to setting out a regulatory scheme designed to implement this infrastructure, the Utah Act provides certain digital signatures with legal status as valid signatures and addresses a variety of issues relating to the status of digitally-signed electronic documents in contract and evidence law.


Sign in / Sign up

Export Citation Format

Share Document