scholarly journals Security Analysis of Mobile Authentication Using QR-Codes

Author(s):  
Siwon Sung ◽  
Joonghwan Lee ◽  
Jinmok Kim ◽  
Jongho Mun ◽  
Dongho Won
2018 ◽  
Vol 8 (12) ◽  
pp. 2506 ◽  
Author(s):  
Kai Fan ◽  
Chen Zhang ◽  
Kan Yang ◽  
Hui Li ◽  
Yintang Yang

The Internet of Things (IoT) aims to achieve the interconnection of all devices in our lives. Due to the complex network environment, the IoT with mobile devices often faces many security problems, such as privacy leakages and identity forgery attacks. As a developing technology in mobile IoT, near field communication (NFC) is widely used in electronic payments and identity authentications. The current NFC studies mainly focus on payment technology, but there are a few studies on privacy protection and the lightweight requirements in the mobile IoT authentication protocol. We focus on the lightweight privacy protection authentication technology in mobile IoT. In the paper, we summarize the clustering model in mobile IoT networks and propose a lightweight authentication protocol. A security analysis shows that the protocol can resist many security threats, such as privacy leakages, identity forgeries, and replay attacks. The simulation also shows that the protocol is lightweight, with the utilization of look-up-tables (LUTs) and registers in our protocol being less than 0.5%. Our work can provide a secure and lightweight mobile authentication serve in the NFC-based mobile IoT network such as smart home and office attendance.


2011 ◽  
Vol 10 (6) ◽  
pp. 2
Author(s):  
Sally Koch Kubetin
Keyword(s):  

Author(s):  
Yu.M. Sklyarova ◽  
I.Yu. Sklyarov ◽  
E.N. Lapina

2020 ◽  
Vol 10 (5) ◽  
pp. 43-49
Author(s):  
MARINA MARKHGEYM ◽  
◽  
ANNA BEZUGLAYA

The article presents the author’s analysis of constitutional texts, regulations and analytical materials of the countries of the Commonwealth of Independent States in order to consolidate in them the consolidated powers of the chambers of parliaments associated with the implementation of food security. Analysis of legal acts of the studied group of states showed that the sphere of food security (as part of the agrarian and food sphere/function) is one of the eventual spheres of interaction between the chambers of parliament. In the course of the study, two approaches of states to the formalization of provisions related to food security in constitutional texts were identified. The first approach is to consolidate norms that indirectly affect the field of food security (Belarus, Kazakhstan, Russia); the second - in the absence of such provisions (Tajikistan and Uzbekistan). It has been established that the interaction of the chambers of parliaments in the field of food security is implemented through the adoption of laws, as well as through various parliamentary events (parliamentary hearings, round tables, seminars, meetings, etc.). It is concluded that the available options for interaction between the chambers of parliaments of states in the field of food security reflect their independent approaches, which are developed on the basis of legal doctrine and practice.


2010 ◽  
Vol 69 (7) ◽  
pp. 629-638
Author(s):  
J. Sisniega-Gonzalez ◽  
E. Aguirre-Anaya ◽  
Mariko Nakano-Miyatake ◽  
Hector Manuel Perez-Meana

Author(s):  
Gustavo Poot Tah ◽  
Erika Llanes Castro ◽  
José Luis López Martínez ◽  
Victor Chi Pech

This paper presents the design and development of a mobile application that uses QR codes for the inventory control of a computer center. This application was developed to support the administration of the computer center of the Multidisciplinary Unit Tizimin, with the aim to reduce costs and time of searching for articles when making an inventory, by leveraging the capabilities of smartphones and tablets. The implementation of the system was carried out using free software.


Sign in / Sign up

Export Citation Format

Share Document