WorldWideScience

Sample records for network authentication investigation

  1. Final report for the network authentication investigation and pilot.

    Energy Technology Data Exchange (ETDEWEB)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  2. An Authentication Protocol for Future Sensor Networks.

    Science.gov (United States)

    Bilal, Muhammad; Kang, Shin-Gak

    2017-04-28

    Authentication is one of the essential security services in Wireless Sensor Networks (WSNs) for ensuring secure data sessions. Sensor node authentication ensures the confidentiality and validity of data collected by the sensor node, whereas user authentication guarantees that only legitimate users can access the sensor data. In a mobile WSN, sensor and user nodes move across the network and exchange data with multiple nodes, thus experiencing the authentication process multiple times. The integration of WSNs with Internet of Things (IoT) brings forth a new kind of WSN architecture along with stricter security requirements; for instance, a sensor node or a user node may need to establish multiple concurrent secure data sessions. With concurrent data sessions, the frequency of the re-authentication process increases in proportion to the number of concurrent connections. Moreover, to establish multiple data sessions, it is essential that a protocol participant have the capability of running multiple instances of the protocol run, which makes the security issue even more challenging. The currently available authentication protocols were designed for the autonomous WSN and do not account for the above requirements. Hence, ensuring a lightweight and efficient authentication protocol has become more crucial. In this paper, we present a novel, lightweight and efficient key exchange and authentication protocol suite called the Secure Mobile Sensor Network (SMSN) Authentication Protocol. In the SMSN a mobile node goes through an initial authentication procedure and receives a re-authentication ticket from the base station. Later a mobile node can use this re-authentication ticket when establishing multiple data exchange sessions and/or when moving across the network. This scheme reduces the communication and computational complexity of the authentication process. We proved the strength of our protocol with rigorous security analysis (including formal analysis using the BAN

  3. Routing Data Authentication in Wireless Networks; TOPICAL

    International Nuclear Information System (INIS)

    TORGERSON, MARK D.; VAN LEEUWEN, BRIAN P.

    2001-01-01

    In this paper, we discuss several specific threats directed at the routing data of an ad hoc network. We address security issues that arise from wrapping authentication mechanisms around ad hoc routing data. We show that this bolt-on approach to security may make certain attacks more difficult, but still leaves the network routing data vulnerable. We also show that under a certain adversarial model, most existing routing protocols cannot be secured with the aid of digital signatures

  4. Network layer security and secret key authentication

    OpenAIRE

    Llovet Ureña, Marcel

    2015-01-01

    The goal of this project is to update Von Mann Young Rhee’s book, ‘Internet Security: Cryptographic Principles, Algorithms and Protocols’ which is about network layer security and secret key authentication. It is an extremely important aspect in modern life to have security in the network to protect our information and prevent eavesdroppers or maleficent programs, for example. This is the reason why this project aims to update these kinds of algorithms and hash functions. This project uses me...

  5. Kerberos authentication: The security answer for unsecured networks

    Energy Technology Data Exchange (ETDEWEB)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  6. BIOMETRIC CRYPTOGRAPHY AND NETWORK AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    Tonimir Kišasondi

    2007-06-01

    Full Text Available In this paper we will present some schemes for strengthening network authentification over insecure channels with biometric concepts or how to securely transfer or use biometric characteristics as cryptographic keys. We will show why some current authentification schemes are insufficient and we will present our concepts of biometric hashes and authentification that rely on unimodal and multimodal biometrics. Our concept can be applied on any biometric authentification scheme and is universal for all systems.

  7. Vein matching using artificial neural network in vein authentication systems

    Science.gov (United States)

    Noori Hoshyar, Azadeh; Sulaiman, Riza

    2011-10-01

    Personal identification technology as security systems is developing rapidly. Traditional authentication modes like key; password; card are not safe enough because they could be stolen or easily forgotten. Biometric as developed technology has been applied to a wide range of systems. According to different researchers, vein biometric is a good candidate among other biometric traits such as fingerprint, hand geometry, voice, DNA and etc for authentication systems. Vein authentication systems can be designed by different methodologies. All the methodologies consist of matching stage which is too important for final verification of the system. Neural Network is an effective methodology for matching and recognizing individuals in authentication systems. Therefore, this paper explains and implements the Neural Network methodology for finger vein authentication system. Neural Network is trained in Matlab to match the vein features of authentication system. The Network simulation shows the quality of matching as 95% which is a good performance for authentication system matching.

  8. A Secure Mobility Network Authentication Scheme Ensuring User Anonymity

    Directory of Open Access Journals (Sweden)

    Ya-Fen Chang

    2017-12-01

    Full Text Available With the rapid growth of network technologies, users are used to accessing various services with their mobile devices. To ensure security and privacy in mobility networks, proper mechanisms to authenticate the mobile user are essential. In this paper, a mobility network authentication scheme based on elliptic curve cryptography is proposed. In the proposed scheme, a mobile user can be authenticated without revealing who he is for user anonymity, and a session key is also negotiated to protect the following communications. The proposed mobility network authentication scheme is analyzed to show that it can ensure security, user anonymity, and convenience. Moreover, Burrows-Abadi-Needham logic (BAN logic is used to deduce the completeness of the proposed authentication scheme.

  9. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks.

    Science.gov (United States)

    Rajeswari, S Raja; Seenivasagam, V

    2016-01-01

    Wireless sensor networks (WSNs) consist of lightweight devices with low cost, low power, and short-ranged wireless communication. The sensors can communicate with each other to form a network. In WSNs, broadcast transmission is widely used along with the maximum usage of wireless networks and their applications. Hence, it has become crucial to authenticate broadcast messages. Key management is also an active research topic in WSNs. Several key management schemes have been introduced, and their benefits are not recognized in a specific WSN application. Security services are vital for ensuring the integrity, authenticity, and confidentiality of the critical information. Therefore, the authentication mechanisms are required to support these security services and to be resilient to distinct attacks. Various authentication protocols such as key management protocols, lightweight authentication protocols, and broadcast authentication protocols are compared and analyzed for all secure transmission applications. The major goal of this survey is to compare and find out the appropriate protocol for further research. Moreover, the comparisons between various authentication techniques are also illustrated.

  10. Advanced information processing system: Authentication protocols for network communication

    Science.gov (United States)

    Harper, Richard E.; Adams, Stuart J.; Babikyan, Carol A.; Butler, Bryan P.; Clark, Anne L.; Lala, Jaynarayan H.

    1994-01-01

    In safety critical I/O and intercomputer communication networks, reliable message transmission is an important concern. Difficulties of communication and fault identification in networks arise primarily because the sender of a transmission cannot be identified with certainty, an intermediate node can corrupt a message without certainty of detection, and a babbling node cannot be identified and silenced without lengthy diagnosis and reconfiguration . Authentication protocols use digital signature techniques to verify the authenticity of messages with high probability. Such protocols appear to provide an efficient solution to many of these problems. The objective of this program is to develop, demonstrate, and evaluate intercomputer communication architectures which employ authentication. As a context for the evaluation, the authentication protocol-based communication concept was demonstrated under this program by hosting a real-time flight critical guidance, navigation and control algorithm on a distributed, heterogeneous, mixed redundancy system of workstations and embedded fault-tolerant computers.

  11. Authentication Based on Multilayer Clustering in Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Suh Heyi-Sook

    2005-01-01

    Full Text Available In this paper, we describe a secure cluster-routing protocol based on a multilayer scheme in ad hoc networks. This work provides scalable, threshold authentication scheme in ad hoc networks. We present detailed security threats against ad hoc routing protocols, specifically examining cluster-based routing. Our proposed protocol, called "authentication based on multilayer clustering for ad hoc networks" (AMCAN, designs an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. The AMCAN strategy takes advantage of a multilayer architecture that is designed for an authentication protocol in a cluster head (CH using a new concept of control cluster head (CCH scheme. We propose an authentication protocol that uses certificates containing an asymmetric key and a multilayer architecture so that the CCH is achieved using the threshold scheme, thereby reducing the computational overhead and successfully defeating all identified attacks. We also use a more extensive area, such as a CCH, using an identification protocol to build a highly secure, highly available authentication service, which forms the core of our security framework.

  12. Complementing Security Breach of Authentication by Using Shared Authentication Information in Mobile WiMAX Networks

    Science.gov (United States)

    Kim, Youngwook; Lim, Hyoung-Kyu; Bahk, Saewoong

    The signalling protocol vulnerability opens DDoS problem in Mobile WiMAX networks. This letter proposes an authentication method that uses the unrevealed upper 64bits of Cipher-based MAC as a solution. It runs for MSs in idle mode and reduces the calculation complexity by 59% under DDoS attack while incurring 1% overhead under normal condition.

  13. Analysis of Broadcast Authentication Mechanism in Selected Network Topologies

    Directory of Open Access Journals (Sweden)

    T. Vanek

    2011-04-01

    Full Text Available This paper deals with simulation of the broadcast authentication protocols using Colored Petri Nets and further optimizations in Matlab environment. Typical application of broadcast authentication protocols can be configurations where only one transmitter with multiple recipients exists (such as message exchange in sensor networks routing protocols, or the leader election process in sensors network. Authentication of every packet seems to be very effective way to mitigate an attack, however resulting in increase of end-to-end delay. To mitigate this drawback, the broadcast authentication protocols have been proposed. Concept of optimization of the broadcast authentication protocol DREAM parameters in a special case of fully N-ary tree and general random topology containing the same amount of nodes with regard to delay and energy consumption minimization is showed in the paper. Protocol DREAM was taken as an example of broadcast authenticating protocol to show how Color Petri Nets can be used to create a fully functional model of the protocol.

  14. Research and Mass Deployment of Non-cognitive Authentication Strategy Based on Campus Wireless Network

    Directory of Open Access Journals (Sweden)

    Huangfu Dapeng

    2018-01-01

    Full Text Available With the rapid development of Internet +, the dependence on wireless networks and wireless terminals are increasing. Campus wireless network has become the main network of teachers and students in campus on the internet. As there are uneven clients and a wide variety of intelligent terminals now. Simplified authentication and network security become the most urgent problem for wireless network. This paper used the Portal + Mac authentication method to realize the non-cognitive authentication of teachers and students on basis of the analysis of the advantages and disadvantages of mainstream authentication of campus wireless network, such as 802.1X authentication, Portal authentication, Mac authentication and DHCP authentication. Teachers and students only need portal certification at the first time, then surf the internet with non-perceived authentication at the second time and later. This method increases network security, and is better to meet the needs of teachers and students.

  15. Blockchain based trust & authentication for decentralized sensor networks

    OpenAIRE

    Moinet, Axel; Darties, Benoît; Baril, Jean-Luc

    2017-01-01

    Sensor networks and Wireless Sensor Networks (WSN) are key components for the development of the Internet of Things. These networks are subject of two kinds of constraints. Adaptability by the mean of mutability and evolutivity, and constrained node resources such as energy consumption, computational complexity or memory usage. In this context, none of the existing protocols and models allows reliable peer authentication and trust level management. In the field of virtual economic transaction...

  16. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  17. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  18. RUASN: A Robust User Authentication Framework for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2011-05-01

    Full Text Available In recent years, wireless sensor networks (WSNs have been considered as a potential solution for real-time monitoring applications and these WSNs have potential practical impact on next generation technology too. However, WSNs could become a threat if suitable security is not considered before the deployment and if there are any loopholes in their security, which might open the door for an attacker and hence, endanger the application. User authentication is one of the most important security services to protect WSN data access from unauthorized users; it should provide both mutual authentication and session key establishment services. This paper proposes a robust user authentication framework for wireless sensor networks, based on a two-factor (password and smart card concept. This scheme facilitates many services to the users such as user anonymity, mutual authentication, secure session key establishment and it allows users to choose/update their password regularly, whenever needed. Furthermore, we have provided the formal verification using Rubin logic and compare RUASN with many existing schemes. As a result, we found that the proposed scheme possesses many advantages against popular attacks, and achieves better efficiency at low computation cost.

  19. Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction

    OpenAIRE

    Younsung Choi; Youngsook Lee; Dongho Won

    2016-01-01

    Wireless sensor networks are used to monitor physical or environmental conditions. However, authenticating a user or sensor in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication networks, resource limitation, and unattended operation. As a result, various authentication schemes have been proposed to provide secure and efficient communication. He et al. suggested a robust biometrics-based user authent...

  20. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  1. Investigating the Effects of Authentic Childhood Games in Teaching English

    Science.gov (United States)

    Hursen, Cigdem; Salaz, Dursun

    2016-01-01

    The purpose of this study is to investigate the effects of authentic childhood games in teaching English. The study group of the research consists of 43 5-year-old kindergarten students. The study was carried out in the first semester of 2014-2015 academic year. An experimental method was used in this study to state the effects of teaching English…

  2. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  3. The Power of Investigating: Guiding Authentic Assessments

    Science.gov (United States)

    McGough, Julie V.; Nyberg, Lisa M.

    2017-01-01

    Children want to explore, dig, build, play, and wonder. To do this they need to touch, feel, see, observe, listen, manipulate, plan, and create. How does a teacher build and maintain a learning environment that will help students investigate meaningful questions? How does a teacher plan and manage ongoing investigations? How does a teacher use…

  4. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    OpenAIRE

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that th...

  5. Student Independent Investigations for Authentic Learning

    Science.gov (United States)

    Westberg, Karen L.; Leppien, Jann H.

    2018-01-01

    Including opportunities for students to conduct independent investigations is a mainstay of gifted education programs and services. When carefully designed and skillfully facilitated, students' interest-based, independent study experiences result in increased intrinsic motivation, growth in 21st-century critical and creativity skills, greater…

  6. Investigations on a brass armour: Authentic or forgery?

    Energy Technology Data Exchange (ETDEWEB)

    Martini, C., E-mail: carla.martini@unibo.it [Department of Industrial Engineering (DIN), University of Bologna, Via Risorgimento 4, 40136 Bologna (Italy); Chiavari, C., E-mail: cristina.chiavari@unibo.it [C.I.R.I. M.A.M (Advanced Applications in Mechanical Engineering and Materials Technology Interdepartmental Centre for Industrial Research), University of Bologna, Via Risorgimento 2, 40136 Bologna (Italy); Ospitali, F., E-mail: francesca.ospitali@unibo.it [Department of Industrial Chemistry “Toso Montanari”, University of Bologna, Viale Risorgimento 4, 40136 Bologna (Italy); Grazzi, F., E-mail: francesco.grazzi@fi.isc.cnr.it [Consiglio Nazionale delle Ricerche, Istituto dei Sistemi Complessi, Via Madonna del Piano 10, 50019 Sesto Fiorentino, FI (Italy); Scherillo, A., E-mail: antonella.scherillo@stfc.ac.uk [Consiglio Nazionale delle Ricerche, Istituto dei Sistemi Complessi, Via Madonna del Piano 10, 50019 Sesto Fiorentino, FI (Italy); Science and Technology Facility Council, ISIS Neutron Source, OX0QJ Didcot (United Kingdom); Soffritti, C., E-mail: chiara.soffritti@unife.it [TekneHub, Department of Architecture, University of Ferrara, Via Quartieri 8, 44122 Ferrara (Italy); Department of Engineering, University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy); Garagnani, G.L., E-mail: gian.luca.garagnani@unife.it [Department of Engineering, University of Ferrara, Via Saragat 1, 44122 Ferrara (Italy)

    2013-10-01

    A copper-based armour, supposedly excavated in Eastern Georgia and tentatively dated to the I–II century AD, was investigated with the aim of checking its authenticity. The finding consisted of several pieces, mostly in a good state of conservation: helmet, lorica musculata (i.e. muscled cuirass), forearm guards, pterygies (covering the lower body and thighs), shin greaves and a spear tip. The combination of conventional metallography with in situ and non-destructive investigations (including Time of Flight Neutron Diffraction (ToF-ND)) on the front of the lorica, on one of the pterygies and on the spear tip showed that the composition and microstructure of the armour was not fully homogeneous. However, the results from the muscled cuirass are fairly coherent and raise suspicion about the authenticity of the piece, namely because of the (i) presence of metallic Al in the alloy, in solid solution with Cu, (ii) prevalence of an as-cast microstructure, which lead to a heavy weight as well to the need for a high amount of metal by comparison to hammered sheet and (iii) presence of an artificial patina, combined with earthy deposits which are not explainable if the original patina was removed before artificial patination for aesthetical reasons. - Highlights: • Cu-based armour from Eastern Georgia (I–II century AD?): check authenticity. • Conventional metallography combined with in situ and non-destructive investigations (ToF-ND). • Suspicious points: Al in the alloy, as-cast microstructure, artificial patina.

  7. Investigations on a brass armour: Authentic or forgery?

    International Nuclear Information System (INIS)

    Martini, C.; Chiavari, C.; Ospitali, F.; Grazzi, F.; Scherillo, A.; Soffritti, C.; Garagnani, G.L.

    2013-01-01

    A copper-based armour, supposedly excavated in Eastern Georgia and tentatively dated to the I–II century AD, was investigated with the aim of checking its authenticity. The finding consisted of several pieces, mostly in a good state of conservation: helmet, lorica musculata (i.e. muscled cuirass), forearm guards, pterygies (covering the lower body and thighs), shin greaves and a spear tip. The combination of conventional metallography with in situ and non-destructive investigations (including Time of Flight Neutron Diffraction (ToF-ND)) on the front of the lorica, on one of the pterygies and on the spear tip showed that the composition and microstructure of the armour was not fully homogeneous. However, the results from the muscled cuirass are fairly coherent and raise suspicion about the authenticity of the piece, namely because of the (i) presence of metallic Al in the alloy, in solid solution with Cu, (ii) prevalence of an as-cast microstructure, which lead to a heavy weight as well to the need for a high amount of metal by comparison to hammered sheet and (iii) presence of an artificial patina, combined with earthy deposits which are not explainable if the original patina was removed before artificial patination for aesthetical reasons. - Highlights: • Cu-based armour from Eastern Georgia (I–II century AD?): check authenticity. • Conventional metallography combined with in situ and non-destructive investigations (ToF-ND). • Suspicious points: Al in the alloy, as-cast microstructure, artificial patina

  8. Delegation Based User Authentication Framework over Cognitive Radio Networks

    Directory of Open Access Journals (Sweden)

    Hyunsung Kim

    2017-12-01

    Full Text Available To address the ever increasing demand for wireless bandwidth, cognitive radio networks (CRNs have been proposed to improve the efficiency of channel utilization. CRN permits unlicensed users to utilize the idle spectrum as long as it does not introduce interference to the primary users due to the Federal Communications Commission’s recent regulatory policies. In this paper, we first identify some required distinctive security and privacy features for CRNs focused on ECMA-392, which is the first industrial standard for personal or portable devices in the television white spaces. After that, we propose a delegation based user authentication framework as a basic security and privacy module with full consideration of the required features over CRNs. The proposed framework provides privacy preserving yet accountable security within the CRN entities. Security and privacy analyses show that the proposed framework supports unlinkability, context privacy, anonymity, no registration and conditional traceability, which are the required security and privacy aspects in CRNs.

  9. Secure and Authenticated Data Communication in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Omar Alfandi

    2015-08-01

    Full Text Available Securing communications in wireless sensor networks is increasingly important as the diversity of applications increases. However, even today, it is equally important for the measures employed to be energy efficient. For this reason, this publication analyzes the suitability of various cryptographic primitives for use in WSNs according to various criteria and, finally, describes a modular, PKI-based framework for confidential, authenticated, secure communications in which most suitable primitives can be employed. Due to the limited capabilities of common WSN motes, criteria for the selection of primitives are security, power efficiency and memory requirements. The implementation of the framework and the singular components have been tested and benchmarked in our testbed of IRISmotes.

  10. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-01-01

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes. PMID:26184224

  11. A User Authentication Scheme Based on Elliptic Curves Cryptography for Wireless Ad Hoc Networks.

    Science.gov (United States)

    Chen, Huifang; Ge, Linlin; Xie, Lei

    2015-07-14

    The feature of non-infrastructure support in a wireless ad hoc network (WANET) makes it suffer from various attacks. Moreover, user authentication is the first safety barrier in a network. A mutual trust is achieved by a protocol which enables communicating parties to authenticate each other at the same time and to exchange session keys. For the resource-constrained WANET, an efficient and lightweight user authentication scheme is necessary. In this paper, we propose a user authentication scheme based on the self-certified public key system and elliptic curves cryptography for a WANET. Using the proposed scheme, an efficient two-way user authentication and secure session key agreement can be achieved. Security analysis shows that our proposed scheme is resilient to common known attacks. In addition, the performance analysis shows that our proposed scheme performs similar or better compared with some existing user authentication schemes.

  12. EAP-Kerberos: A Low Latency EAP Authentication Method for Faster Handoffs in Wireless Access Networks

    Science.gov (United States)

    Zrelli, Saber; Okabe, Nobuo; Shinoda, Yoichi

    The wireless medium is a key technology for enabling ubiquitous and continuous network connectivity. It is becoming more and more important in our daily life especially with the increasing adoption of networking technologies in many fields such as medical care and transportation systems. Although most wireless technologies nowadays provide satisfying bandwidth and higher speeds, several of these technologies still lack improvements with regard to handoff performance. In this paper, we focus on wireless network technologies that rely on the Extensible Authentication Protocol for mutual authentication between the station and the access network. Such technologies include local area wireless networks (IEEE 802.11) as well as broadband wireless networks (IEEE 802.16). We present a new EAP authentication method based on a three party authentication scheme, namely Kerberos, that considerably shortens handoff delays. Compared to other methods, the proposed method has the advantage of not requiring any changes on the access points, making it readily deployable at reasonable costs.

  13. ASL TALK. An Investigation of Authentic Spiritual Leadership (ASL): A Discursive Study

    NARCIS (Netherlands)

    Bünger, Y.

    2011-01-01

    This study explores how a global network of people construct an idea(l) of leadership, by combining authenticity, spirituality and leadership in (con-)text of current socio-cultural movements, CSR, 'ethical profit', and stages of leadership history. The concept of a unity of authenticity,

  14. A Mutual Authentication Framework for Wireless Medical Sensor Networks.

    Science.gov (United States)

    Srinivas, Jangirala; Mishra, Dheerendra; Mukhopadhyay, Sourav

    2017-05-01

    Wireless medical sensor networks (WMSN) comprise of distributed sensors, which can sense human physiological signs and monitor the health condition of the patient. It is observed that providing privacy to the patient's data is an important issue and can be challenging. The information passing is done via the public channel in WMSN. Thus, the patient, sensitive information can be obtained by eavesdropping or by unauthorized use of handheld devices which the health professionals use in monitoring the patient. Therefore, there is an essential need of restricting the unauthorized access to the patient's medical information. Hence, the efficient authentication scheme for the healthcare applications is needed to preserve the privacy of the patients' vital signs. To ensure secure and authorized communication in WMSN, we design a symmetric key based authentication protocol for WMSN environment. The proposed protocol uses only computationally efficient operations to achieve lightweight attribute. We analyze the security of the proposed protocol. We use a formal security proof algorithm to show the scheme security against known attacks. We also use the Automated Validation of Internet Security Protocols and Applications (AVISPA) simulator to show protocol secure against man-in-the-middle attack and replay attack. Additionally, we adopt an informal analysis to discuss the key attributes of the proposed scheme. From the formal proof of security, we can see that an attacker has a negligible probability of breaking the protocol security. AVISPA simulator also demonstrates the proposed scheme security against active attacks, namely, man-in-the-middle attack and replay attack. Additionally, through the comparison of computational efficiency and security attributes with several recent results, proposed scheme seems to be battered.

  15. Study on a Biometric Authentication Model based on ECG using a Fuzzy Neural Network

    Science.gov (United States)

    Kim, Ho J.; Lim, Joon S.

    2018-03-01

    Traditional authentication methods use numbers or graphic passwords and thus involve the risk of loss or theft. Various studies are underway regarding biometric authentication because it uses the unique biometric data of a human being. Biometric authentication technology using ECG from biometric data involves signals that record electrical stimuli from the heart. It is difficult to manipulate and is advantageous in that it enables unrestrained measurements from sensors that are attached to the skin. This study is on biometric authentication methods using the neural network with weighted fuzzy membership functions (NEWFM). In the biometric authentication process, normalization and the ensemble average is applied during preprocessing, characteristics are extracted using Haar-wavelets, and a registration process called “training” is performed in the fuzzy neural network. In the experiment, biometric authentication was performed on 73 subjects in the Physionet Database. 10-40 ECG waveforms were tested for use in the registration process, and 15 ECG waveforms were deemed the appropriate number for registering ECG waveforms. 1 ECG waveforms were used during the authentication stage to conduct the biometric authentication test. Upon testing the proposed biometric authentication method based on 73 subjects from the Physionet Database, the TAR was 98.32% and FAR was 5.84%.

  16. Strong authentication of remote users over insecure networks by using fingerprint-biometric and smart cards

    Science.gov (United States)

    Khan, Muhammad K.; Zhang, Jiashu

    2006-04-01

    Recently, Lee et al. and Lin-Lai proposed fingerprint-based remote user authentication schemes using smart cards. We demonstrate that their schemes are vulnerable and susceptible to the attack and have practical pitfalls. Their schemes perform only unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, so their schemes suscept from the server spoofing attack. To overcome the flaw, we present a strong remote user authentication scheme by using fingerprint-biometric and smart cards. The proposed scheme is an extended and generalized form of ElGamal's signature scheme whose security is based on discrete logarithm problem, which is not yet forged. Proposed scheme not only overcome drawbacks and problems of previous schemes, but also provide a strong authentication of remote users over insecure network. In addition, computational costs and efficiency of the proposed scheme are better than other related schemes.

  17. The research and implementation of a unified identity authentication in e-government network

    Science.gov (United States)

    Feng, Zhou

    Current problem existing in e-government network is that the applications of information system are developed independently by various departments, and each has its own specific set of authentication and access control mechanism. To build a comprehensive information system in favor of sharing and exchanging information, a sound and secure unified e-government authentication system is firstly needed. The paper, combining with practical development of e-government network, carries out a thorough discussion on how to achieve data synchronization between unified authentication system and related application systems.

  18. ECG-cryptography and authentication in body area networks.

    Science.gov (United States)

    Zhang, Zhaoyang; Wang, Honggang; Vasilakos, Athanasios V; Fang, Hua

    2012-11-01

    Wireless body area networks (BANs) have drawn much attention from research community and industry in recent years. Multimedia healthcare services provided by BANs can be available to anyone, anywhere, and anytime seamlessly. A critical issue in BANs is how to preserve the integrity and privacy of a person's medical data over wireless environments in a resource efficient manner. This paper presents a novel key agreement scheme that allows neighboring nodes in BANs to share a common key generated by electrocardiogram (ECG) signals. The improved Jules Sudan (IJS) algorithm is proposed to set up the key agreement for the message authentication. The proposed ECG-IJS key agreement can secure data communications over BANs in a plug-n-play manner without any key distribution overheads. Both the simulation and experimental results are presented, which demonstrate that the proposed ECG-IJS scheme can achieve better security performance in terms of serval performance metrics such as false acceptance rate (FAR) and false rejection rate (FRR) than other existing approaches. In addition, the power consumption analysis also shows that the proposed ECG-IJS scheme can achieve energy efficiency for BANs.

  19. Enhanced Two-Factor Authentication and Key Agreement Using Dynamic Identities in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    I-Pin Chang

    2015-11-01

    Full Text Available Key agreements that use only password authentication are convenient in communication networks, but these key agreement schemes often fail to resist possible attacks, and therefore provide poor security compared with some other authentication schemes. To increase security, many authentication and key agreement schemes use smartcard authentication in addition to passwords. Thus, two-factor authentication and key agreement schemes using smartcards and passwords are widely adopted in many applications. Vaidya et al. recently presented a two-factor authentication and key agreement scheme for wireless sensor networks (WSNs. Kim et al. observed that the Vaidya et al. scheme fails to resist gateway node bypassing and user impersonation attacks, and then proposed an improved scheme for WSNs. This study analyzes the weaknesses of the two-factor authentication and key agreement scheme of Kim et al., which include vulnerability to impersonation attacks, lost smartcard attacks and man-in-the-middle attacks, violation of session key security, and failure to protect user privacy. An efficient and secure authentication and key agreement scheme for WSNs based on the scheme of Kim et al. is then proposed. The proposed scheme not only solves the weaknesses of previous approaches, but also increases security requirements while maintaining low computational cost.

  20. Applications of Multi-Channel Safety Authentication Protocols in Wireless Networks.

    Science.gov (United States)

    Chen, Young-Long; Liau, Ren-Hau; Chang, Liang-Yu

    2016-01-01

    People can use their web browser or mobile devices to access web services and applications which are built into these servers. Users have to input their identity and password to login the server. The identity and password may be appropriated by hackers when the network environment is not safe. The multiple secure authentication protocol can improve the security of the network environment. Mobile devices can be used to pass the authentication messages through Wi-Fi or 3G networks to serve as a second communication channel. The content of the message number is not considered in a multiple secure authentication protocol. The more excessive transmission of messages would be easier to collect and decode by hackers. In this paper, we propose two schemes which allow the server to validate the user and reduce the number of messages using the XOR operation. Our schemes can improve the security of the authentication protocol. The experimental results show that our proposed authentication protocols are more secure and effective. In regard to applications of second authentication communication channels for a smart access control system, identity identification and E-wallet, our proposed authentication protocols can ensure the safety of person and property, and achieve more effective security management mechanisms.

  1. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    Science.gov (United States)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  2. Investigating the Predictive Role of Authenticity on Subjective Vitality with Structural Equation Modelling

    Science.gov (United States)

    Akin, Umran; Akin, Ahmet

    2014-01-01

    Authenticity is a basic personality characteristic that has an important influence on both the psychological and social lives of individuals. Subjective vitality also assumes a facilitative role regarding positive mental health indicators. Therefore, the purpose of this study is to investigate the predictive role of authenticity on subjective…

  3. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  4. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Science.gov (United States)

    Kang, Dongwoo; Jung, Jaewook; Lee, Donghoon; Kim, Hyoungshick; Won, Dongho

    2017-01-01

    The Proxy Mobile IPv6 (PMIPv6) is a network-based mobility management protocol that allows a Mobile Node(MN) connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG). As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  5. Security analysis and enhanced user authentication in proxy mobile IPv6 networks.

    Directory of Open Access Journals (Sweden)

    Dongwoo Kang

    Full Text Available The Proxy Mobile IPv6 (PMIPv6 is a network-based mobility management protocol that allows a Mobile Node(MN connected to the PMIPv6 domain to move from one network to another without changing the assigned IPv6 address. The user authentication procedure in this protocol is not standardized, but many smartcard based authentication schemes have been proposed. Recently, Alizadeh et al. proposed an authentication scheme for the PMIPv6. However, it could allow an attacker to derive an encryption key that must be securely shared between MN and the Mobile Access Gate(MAG. As a result, outsider adversary can derive MN's identity, password and session key. In this paper, we analyze Alizadeh et al.'s scheme regarding security and propose an enhanced authentication scheme that uses a dynamic identity to satisfy anonymity. Furthermore, we use BAN logic to show that our scheme can successfully generate and communicate with the inter-entity session key.

  6. Broadcast authentication for wireless sensor networks using nested hashing and the Chinese remainder theorem.

    Science.gov (United States)

    Eldefrawy, Mohamed Hamdy; Khan, Muhammad Khurram; Alghathbar, Khaled; Cho, Eun-Suk

    2010-01-01

    Secure broadcasting is an essential feature for critical operations in wireless sensor network (WSNs). However, due to the limited resources of sensor networks, verifying the authenticity for broadcasted messages is a very difficult issue. μTESLA is a broadcast authentication protocol, which uses network-wide loose time synchronization with one-way hashed keys to provide the authenticity verification. However, it suffers from several flaws considering the delay tolerance, and the chain length restriction. In this paper, we propose a protocol which provides broadcast authentication for wireless sensor networks. This protocol uses a nested hash chain of two different hash functions and the Chinese Remainder Theorem (CRT). The two different nested hash functions are employed for the seed updating and the key generation. Each sensor node is challenged independently with a common broadcasting message using the CRT. Our algorithm provides forward and non-restricted key generation, and in addition, no time synchronization is required. Furthermore, receivers can instantly authenticate packets in real time. Moreover, the comprehensive analysis shows that this scheme is efficient and practical, and can achieve better performance than the μTESLA system.

  7. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  8. Investigating minority student participation in an authentic science research experience

    Science.gov (United States)

    Preston, Stephanie Danette

    In the United States, a problem previously overlooked in increasing the total number of scientifically literate citizens is the lack of diversity in advanced science classes and in science, technology, engineering, and mathematics (STEM) fields. Groups traditionally underserved in science education and thus underrepresented in the STEM fields include: low-income, racial/ethnic minorities, and females of all ethnic and racial backgrounds. Despite the number of these students who are initially interested in science very few of them thrive in the discipline. Some scholars suggest that the declining interest for students underrepresented in science is traceable to K-12th grade learning experiences and access to participating in authentic science. Consequently, the diminishing interest of minorities and women in science contributes negatively to the representation of these groups in the STEM disciplines. The purpose of this study was to investigate a summer science research experience for minority students and the nature of students' participation in scientific discourse and practices within the context of the research experience. The research questions that guided this study are: The nature of the Summer Experience in Earth and Mineral Science (SEEMS) research experience . (A) What are the SEEMS intended outcomes? (B) To what extent does SEEMS enacted curriculum align with the intended outcomes of the program? The nature of students engagement in the SEEMS research. (A) In what ways do students make sense of and apply science concepts as they engage in the research (e.g., understand problem, how they interpret data, how they construct explanations), and the extent to which they use the science content appropriately? (B) In what ways do students engage in the cultural practices of science, such as using scientific discourse, interpreting inscriptions, and constructing explanations from evidence (engaging in science practices, knowing science and doing science)? The

  9. A Network Topology Control and Identity Authentication Protocol with Support for Movable Sensor Nodes.

    Science.gov (United States)

    Zhang, Ying; Chen, Wei; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming

    2015-12-01

    It is expected that in the near future wireless sensor network (WSNs) will be more widely used in the mobile environment, in applications such as Autonomous Underwater Vehicles (AUVs) for marine monitoring and mobile robots for environmental investigation. The sensor nodes' mobility can easily cause changes to the structure of a network topology, and lead to the decline in the amount of transmitted data, excessive energy consumption, and lack of security. To solve these problems, a kind of efficient Topology Control algorithm for node Mobility (TCM) is proposed. In the topology construction stage, an efficient clustering algorithm is adopted, which supports sensor node movement. It can ensure the balance of clustering, and reduce the energy consumption. In the topology maintenance stage, the digital signature authentication based on Error Correction Code (ECC) and the communication mechanism of soft handover are adopted. After verifying the legal identity of the mobile nodes, secure communications can be established, and this can increase the amount of data transmitted. Compared to some existing schemes, the proposed scheme has significant advantages regarding network topology stability, amounts of data transferred, lifetime and safety performance of the network.

  10. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks

    Directory of Open Access Journals (Sweden)

    Changji Wang

    2017-06-01

    Full Text Available Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  11. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  12. A Bilinear Pairing-Based Dynamic Key Management and Authentication for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor networks have been used in a variety of environments; a wireless network infrastructure, established to communicate and exchange information in a monitoring area, has also been applied in different environments. However, for sensitive applications, security is the paramount issue. In this paper, we propose using bilinear pairing to design dynamic key management and authentication scheme of the hierarchical sensor network. We use the dynamic key management and the pairing-based cryptography (PBC to establish the session key and the hash message authentication code (HMAC to support the mutual authentication between the sensors and the base station. In addition, we also embed the capability of the Global Positioning System (GPS to cluster nodes to find the best path of the sensor network. The proposed scheme can also provide the requisite security of the dynamic key management, mutual authentication, and session key protection. Our scheme can defend against impersonation attack, replay attack, wormhole attack, and message manipulation attack.

  13. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    Science.gov (United States)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  14. Source Authentication for Multicast in Mobile Ad Hoc Networks

    National Research Council Canada - National Science Library

    Ramachandran, Prabha

    2003-01-01

    Recent emergence and popularity of mobile ad hoc networks in a host of current-day applications has instigated a suite of research challenges, primarily in routing and security issues for such networks...

  15. DEVELOPMENT OF A COMPUTER SYSTEM FOR IDENTITY AUTHENTICATION USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Timur Kartbayev

    2017-03-01

    Full Text Available The aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics’ changes over time (e.g., due to aging. The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites.

  16. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-01-01

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs. PMID:24919012

  17. Security Enhanced User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-06-01

    Full Text Available Wireless sensor networks (WSNs consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC for WSNs. However, it turned out that Yeh et al.’s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.’s protocol. However, Shi et al.’s improvement introduces other security weaknesses. In this paper, we show that Shi et al.’s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  18. E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks

    Directory of Open Access Journals (Sweden)

    Hoon-Jae Lee

    2012-02-01

    Full Text Available A wireless medical sensor network (WMSN can sense humans’ physiological signs without sacrificing patient comfort and transmit patient vital signs to health professionals’ hand-held devices. The patient physiological data are highly sensitive and WMSNs are extremely vulnerable to many attacks. Therefore, it must be ensured that patients’ medical signs are not exposed to unauthorized users. Consequently, strong user authentication is the main concern for the success and large scale deployment of WMSNs. In this regard, this paper presents an efficient, strong authentication protocol, named E-SAP, for healthcare application using WMSNs. The proposed E-SAP includes: (1 a two-factor (i.e., password and smartcard professional authentication; (2 mutual authentication between the professional and the medical sensor; (3 symmetric encryption/decryption for providing message confidentiality; (4 establishment of a secure session key at the end of authentication; and (5 professionals can change their password. Further, the proposed protocol requires three message exchanges between the professional, medical sensor node and gateway node, and achieves efficiency (i.e., low computation and communication cost. Through the formal analysis, security analysis and performance analysis, we demonstrate that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.

  19. Cryptanalysis and security improvements of 'two-factor user authentication in wireless sensor networks'.

    Science.gov (United States)

    Khan, Muhammad Khurram; Alghathbar, Khaled

    2010-01-01

    User authentication in wireless sensor networks (WSN) is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  20. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Choi, Younsung; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Nam, Junghyun; Won, Dongho

    2014-06-10

    Wireless sensor networks (WSNs) consist of sensors, gateways and users. Sensors are widely distributed to monitor various conditions, such as temperature, sound, speed and pressure but they have limited computational ability and energy. To reduce the resource use of sensors and enhance the security of WSNs, various user authentication protocols have been proposed. In 2011, Yeh et al. first proposed a user authentication protocol based on elliptic curve cryptography (ECC) for WSNs. However, it turned out that Yeh et al.'s protocol does not provide mutual authentication, perfect forward secrecy, and key agreement between the user and sensor. Later in 2013, Shi et al. proposed a new user authentication protocol that improves both security and efficiency of Yeh et al.'s protocol. However, Shi et al.'s improvement introduces other security weaknesses. In this paper, we show that Shi et al.'s improved protocol is vulnerable to session key attack, stolen smart card attack, and sensor energy exhausting attack. In addition, we propose a new, security-enhanced user authentication protocol using ECC for WSNs.

  1. Secure Authentication for Remote Patient Monitoring with Wireless Medical Sensor Networks.

    Science.gov (United States)

    Hayajneh, Thaier; Mohd, Bassam J; Imran, Muhammad; Almashaqbeh, Ghada; Vasilakos, Athanasios V

    2016-03-24

    There is broad consensus that remote health monitoring will benefit all stakeholders in the healthcare system and that it has the potential to save billions of dollars. Among the major concerns that are preventing the patients from widely adopting this technology are data privacy and security. Wireless Medical Sensor Networks (MSNs) are the building blocks for remote health monitoring systems. This paper helps to identify the most challenging security issues in the existing authentication protocols for remote patient monitoring and presents a lightweight public-key-based authentication protocol for MSNs. In MSNs, the nodes are classified into sensors that report measurements about the human body and actuators that receive commands from the medical staff and perform actions. Authenticating these commands is a critical security issue, as any alteration may lead to serious consequences. The proposed protocol is based on the Rabin authentication algorithm, which is modified in this paper to improve its signature signing process, making it suitable for delay-sensitive MSN applications. To prove the efficiency of the Rabin algorithm, we implemented the algorithm with different hardware settings using Tmote Sky motes and also programmed the algorithm on an FPGA to evaluate its design and performance. Furthermore, the proposed protocol is implemented and tested using the MIRACL (Multiprecision Integer and Rational Arithmetic C/C++) library. The results show that secure, direct, instant and authenticated commands can be delivered from the medical staff to the MSN nodes.

  2. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks.

    Science.gov (United States)

    Peter, Steffen; Reddy, Bhanu Pratap; Momtaz, Farshad; Givargis, Tony

    2016-04-22

    Body area sensor networks (BANs) utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG) signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  3. Design of Secure ECG-Based Biometric Authentication in Body Area Sensor Networks

    Directory of Open Access Journals (Sweden)

    Steffen Peter

    2016-04-01

    Full Text Available Body area sensor networks (BANs utilize wireless communicating sensor nodes attached to a human body for convenience, safety, and health applications. Physiological characteristics of the body, such as the heart rate or Electrocardiogram (ECG signals, are promising means to simplify the setup process and to improve security of BANs. This paper describes the design and implementation steps required to realize an ECG-based authentication protocol to identify sensor nodes attached to the same human body. Therefore, the first part of the paper addresses the design of a body-area sensor system, including the hardware setup, analogue and digital signal processing, and required ECG feature detection techniques. A model-based design flow is applied, and strengths and limitations of each design step are discussed. Real-world measured data originating from the implemented sensor system are then used to set up and parametrize a novel physiological authentication protocol for BANs. The authentication protocol utilizes statistical properties of expected and detected deviations to limit the number of false positive and false negative authentication attempts. The result of the described holistic design effort is the first practical implementation of biometric authentication in BANs that reflects timing and data uncertainties in the physical and cyber parts of the system.

  4. Secure anonymous mutual authentication for star two-tier wireless body area networks.

    Science.gov (United States)

    Ibrahim, Maged Hamada; Kumari, Saru; Das, Ashok Kumar; Wazid, Mohammad; Odelu, Vanga

    2016-10-01

    Mutual authentication is a very important service that must be established between sensor nodes in wireless body area network (WBAN) to ensure the originality and integrity of the patient's data sent by sensors distributed on different parts of the body. However, mutual authentication service is not enough. An adversary can benefit from monitoring the traffic and knowing which sensor is in transmission of patient's data. Observing the traffic (even without disclosing the context) and knowing its origin, it can reveal to the adversary information about the patient's medical conditions. Therefore, anonymity of the communicating sensors is an important service as well. Few works have been conducted in the area of mutual authentication among sensor nodes in WBAN. However, none of them has considered anonymity among body sensor nodes. Up to our knowledge, our protocol is the first attempt to consider this service in a two-tier WBAN. We propose a new secure protocol to realize anonymous mutual authentication and confidential transmission for star two-tier WBAN topology. The proposed protocol uses simple cryptographic primitives. We prove the security of the proposed protocol using the widely-accepted Burrows-Abadi-Needham (BAN) logic, and also through rigorous informal security analysis. In addition, to demonstrate the practicality of our protocol, we evaluate it using NS-2 simulator. BAN logic and informal security analysis prove that our proposed protocol achieves the necessary security requirements and goals of an authentication service. The simulation results show the impact on the various network parameters, such as end-to-end delay and throughput. The nodes in the network require to store few hundred bits. Nodes require to perform very few hash invocations, which are computationally very efficient. The communication cost of the proposed protocol is few hundred bits in one round of communication. Due to the low computation cost, the energy consumed by the nodes is

  5. Geospatial Authentication

    Science.gov (United States)

    Lyle, Stacey D.

    2009-01-01

    A software package that has been designed to allow authentication for determining if the rover(s) is/are within a set of boundaries or a specific area to access critical geospatial information by using GPS signal structures as a means to authenticate mobile devices into a network wirelessly and in real-time has been developed. The advantage lies in that the system only allows those with designated geospatial boundaries or areas into the server. The Geospatial Authentication software has two parts Server and Client. The server software is a virtual private network (VPN) developed in Linux operating system using Perl programming language. The server can be a stand-alone VPN server or can be combined with other applications and services. The client software is a GUI Windows CE software, or Mobile Graphical Software, that allows users to authenticate into a network. The purpose of the client software is to pass the needed satellite information to the server for authentication.

  6. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  7. Secured Hash Based Burst Header Authentication Design for Optical Burst Switched Networks

    Science.gov (United States)

    Balamurugan, A. M.; Sivasubramanian, A.; Parvathavarthini, B.

    2017-12-01

    The optical burst switching (OBS) is a promising technology that could meet the fast growing network demand. They are featured with the ability to meet the bandwidth requirement of applications that demand intensive bandwidth. OBS proves to be a satisfactory technology to tackle the huge bandwidth constraints, but suffers from security vulnerabilities. The objective of this proposed work is to design a faster and efficient burst header authentication algorithm for core nodes. There are two important key features in this work, viz., header encryption and authentication. Since the burst header is an important in optical burst switched network, it has to be encrypted; otherwise it is be prone to attack. The proposed MD5&RC4-4S based burst header authentication algorithm runs 20.75 ns faster than the conventional algorithms. The modification suggested in the proposed RC4-4S algorithm gives a better security and solves the correlation problems between the publicly known outputs during key generation phase. The modified MD5 recommended in this work provides 7.81 % better avalanche effect than the conventional algorithm. The device utilization result also shows the suitability of the proposed algorithm for header authentication in real time applications.

  8. A Secured Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography

    Directory of Open Access Journals (Sweden)

    Hsin-Wen Wei

    2011-05-01

    Full Text Available User authentication is a crucial service in wireless sensor networks (WSNs that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das’ protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  9. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Park, YoHan; Park, YoungHo

    2016-12-14

    Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.'s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

  10. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  11. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  12. A secured authentication protocol for wireless sensor networks using elliptic curves cryptography.

    Science.gov (United States)

    Yeh, Hsiu-Lien; Chen, Tien-Ho; Liu, Pin-Chuan; Kim, Tai-Hoo; Wei, Hsin-Wen

    2011-01-01

    User authentication is a crucial service in wireless sensor networks (WSNs) that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattended environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited in computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained environment. In this paper, we review several proposed WSN user authentication protocols, with a detailed review of the M.L Das protocol and a cryptanalysis of Das' protocol that shows several security weaknesses. Furthermore, this paper proposes an ECC-based user authentication protocol that resolves these weaknesses. According to our analysis of security of the ECC-based protocol, it is suitable for applications with higher security requirements. Finally, we present a comparison of security, computation, and communication costs and performances for the proposed protocols. The ECC-based protocol is shown to be suitable for higher security WSNs.

  13. An authentication scheme to healthcare security under wireless sensor networks.

    Science.gov (United States)

    Hsiao, Tsung-Chih; Liao, Yu-Ting; Huang, Jen-Yan; Chen, Tzer-Shyong; Horng, Gwo-Boa

    2012-12-01

    In recent years, Taiwan has been seeing an extension of the average life expectancy and a drop in overall fertility rate, initiating our country into an aged society. Due to this phenomenon, how to provide the elderly and patients with chronic diseases a suitable healthcare environment has become a critical issue presently. Therefore, we propose a new scheme that integrates healthcare services with wireless sensor technology in which sensor nodes are employed to measure patients' vital signs. Data collected from these sensor nodes are then transmitted to mobile devices of the medical staff and system administrator, promptly enabling them to understand the patients' condition in real time, which will significantly improve patients' healthcare quality. As per the personal data protection act, patients' vital signs can only be accessed by authorized medical staff. In order to protect patients', the system administrator will verify the medical staff's identity through the mobile device using a smart card and password mechanism. Accordingly, only the verified medical staff can obtain patients' vital signs data such as their blood pressure, pulsation, and body temperature, etc.. Besides, the scheme includes a time-bounded characteristic that allows the verified staff access to data without having to have to re-authenticate and re-login into the system within a set period of time. Consequently, the time-bounded property also increases the work efficiency of the system administrator and user.

  14. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  15. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-01-01

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.’s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme. PMID:28441331

  16. An efficient anonymous authentication scheme for wireless body area networks using elliptic curve cryptosystem.

    Science.gov (United States)

    Zhao, Zhenguo

    2014-02-01

    With the development of wireless networks and medical sensors, wireless body area networks are playing more and more important role in the field of healthcare service. The data transmitted in WBANs is very sensitive since it will be used in clinical diagnoses or measurements. Therefore, security and privacy of communication in WBANs derive increasing attentions from the academia and industry. In this paper, we propose an identity (ID)-based efficient anonymous authentication scheme for WBANs using elliptic curve cryptosystem (ECC). Due to the ID-based concept, there is no certificate is needed in the proposed scheme. Moreover, the proposed scheme not only provides mutual authentication between the client and the application provider but also provides client anonymity. Performance analysis shows that improvements of 50.58% and 3.87% in the client side and the application provider side separately. Then the proposed scheme is more suitable for WBANs.

  17. Design and Research of a New secure Authentication Protocol in GSM networks

    Directory of Open Access Journals (Sweden)

    Qi Ai-qin

    2016-01-01

    Full Text Available As the first line of defense in the security application system, Authentication is an important security service. Its typical scheme is challenge/response mechanism and this scheme which is simple-structured and easy to realize has been used worldwide. But these protocols have many following problems In the GSM networks such as the leakage of user indentity privacy, no security protection between home registers and foreign registers and the vicious intruders’ information stealing and so on. This paper presents an authentication protocol in GSM networks based on maths operation and modular square root technique . The analysis of the security and performance has also been done. The results show that it is more robust and secure compared to the previous agreements.

  18. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    Directory of Open Access Journals (Sweden)

    Yan-Ming Lai

    Full Text Available Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs, and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.

  19. A New Ticket-Based Authentication Mechanism for Fast Handover in Mesh Network.

    Science.gov (United States)

    Lai, Yan-Ming; Cheng, Pu-Jen; Lee, Cheng-Chi; Ku, Chia-Yi

    2016-01-01

    Due to the ever-growing popularity mobile devices of various kinds have received worldwide, the demands on large-scale wireless network infrastructure development and enhancement have been rapidly swelling in recent years. A mobile device holder can get online at a wireless network access point, which covers a limited area. When the client leaves the access point, there will be a temporary disconnection until he/she enters the coverage of another access point. Even when the coverages of two neighboring access points overlap, there is still work to do to make the wireless connection smoothly continue. The action of one wireless network access point passing a client to another access point is referred to as the handover. During handover, for security concerns, the client and the new access point should perform mutual authentication before any Internet access service is practically gained/provided. If the handover protocol is inefficient, in some cases discontinued Internet service will happen. In 2013, Li et al. proposed a fast handover authentication mechanism for wireless mesh network (WMN) based on tickets. Unfortunately, Li et al.'s work came with some weaknesses. For one thing, some sensitive information such as the time and date of expiration is sent in plaintext, which increases security risks. For another, Li et al.'s protocol includes the use of high-quality tamper-proof devices (TPDs), and this unreasonably high equipment requirement limits its applicability. In this paper, we shall propose a new efficient handover authentication mechanism. The new mechanism offers a higher level of security on a more scalable ground with the client's privacy better preserved. The results of our performance analysis suggest that our new mechanism is superior to some similar mechanisms in terms of authentication delay.

  20. An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications

    Science.gov (United States)

    Kumar, Pardeep; Ylianttila, Mika; Gurtov, Andrei; Lee, Sang-Gon; Lee, Hoon-Jae

    2014-01-01

    Robust security is highly coveted in real wireless sensor network (WSN) applications since wireless sensors' sense critical data from the application environment. This article presents an efficient and adaptive mutual authentication framework that suits real heterogeneous WSN-based applications (such as smart homes, industrial environments, smart grids, and healthcare monitoring). The proposed framework offers: (i) key initialization; (ii) secure network (cluster) formation (i.e., mutual authentication and dynamic key establishment); (iii) key revocation; and (iv) new node addition into the network. The correctness of the proposed scheme is formally verified. An extensive analysis shows the proposed scheme coupled with message confidentiality, mutual authentication and dynamic session key establishment, node privacy, and message freshness. Moreover, the preliminary study also reveals the proposed framework is secure against popular types of attacks, such as impersonation attacks, man-in-the-middle attacks, replay attacks, and information-leakage attacks. As a result, we believe the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a safeguard to real heterogeneous WSN applications. PMID:24521942

  1. Cryptanalysis and Improvement of the Robust User Authentication Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yung-Cheng Lee

    2012-10-01

    Full Text Available Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to remedy the flaws. The improved scheme withstands the replay attack and off-line guessing attack, and the users can freely update their passwords via public channels.

  2. On securing wireless sensor network--novel authentication scheme against DOS attacks.

    Science.gov (United States)

    Raja, K Nirmal; Beno, M Marsaline

    2014-10-01

    Wireless sensor networks are generally deployed for collecting data from various environments. Several applications specific sensor network cryptography algorithms have been proposed in research. However WSN's has many constrictions, including low computation capability, less memory, limited energy resources, vulnerability to physical capture, which enforce unique security challenges needs to make a lot of improvements. This paper presents a novel security mechanism and algorithm for wireless sensor network security and also an application of this algorithm. The proposed scheme is given to strong authentication against Denial of Service Attacks (DOS). The scheme is simulated using network simulator2 (NS2). Then this scheme is analyzed based on the network packet delivery ratio and found that throughput has improved.

  3. The #nofilter Self: The Contest for Authenticity among Social Networking Sites, 2002–2016

    Directory of Open Access Journals (Sweden)

    Meredith Salisbury

    2017-01-01

    Full Text Available This study traces appeals to authenticity, over time, in the promotional material of leading social-networking sites (SNSs. Using the Internet Archive’s Wayback Machine, the public-facing websites of major SNS platforms—beginning with Friendster in 2002—were sampled at six-month intervals, with promotional language and visuals examined for authenticity claims. The authors tracked these appeals, with attention to changes in promotional copy, through to July 2016, among the most popular social media services (as determined by English-language web presence and active monthly user figures or, when unavailable, reported network size. The study found that nearly all SNSs invoked authenticity—directly or through language like “real life” and “genuine”—in their promotional materials. What stood out was the profoundly reactive nature of these claims, with new services often defining themselves, openly or implicitly, against legacy services’ inauthenticity. A recurring marketing strategy, in other words, has been to call out competitors’ phoniness by substituting (and touting some other, differently grounded mode of authenticity. Since the affordances of social sites, even those touting evanescence or anonymity, make them vulnerable to similar charges, the cycle gets replayed with numbing regularity.

  4. Efficient and Secure Temporal Credential-Based Authenticated Key Agreement Using Extended Chaotic Maps for Wireless Sensor Networks.

    Science.gov (United States)

    Lee, Tian-Fu

    2015-06-25

    A secure temporal credential-based authenticated key agreement scheme for Wireless Sensor Networks (WSNs) enables a user, a sensor node and a gateway node to realize mutual authentication using temporal credentials. The user and the sensor node then negotiate a common secret key with the help of the gateway node, and establish a secure and authenticated channel using this common secret key. To increase efficiency, recent temporal credential-based authenticated key agreement schemes for WSNs have been designed to involve few computational operations, such as hash and exclusive-or operations. However, these schemes cannot protect the privacy of users and withstand possible attacks. This work develops a novel temporal credential-based authenticated key agreement scheme for WSNs using extended chaotic maps, in which operations are more efficient than modular exponential computations and scalar multiplications on an elliptic curve. The proposed scheme not only provides higher security and efficiency than related schemes, but also resolves their weaknesses.

  5. Secure message authentication system for node to node network

    Science.gov (United States)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  6. Anonymous authentication and location privacy preserving schemes for LTE-A networks

    Directory of Open Access Journals (Sweden)

    Zaher Jabr Haddad

    2017-11-01

    Full Text Available Long Term Evaluation Advanced (LTE-A is the third generation partnership project for cellular network that allows subscribers to roam into networks (i.e., the Internet and wireless connections using spacial purpose base-stations, such as wireless access points and home node B. In such LTE-A based networks, neither base-stations, nor the Internet and wireless connections are trusted because base-stations are operated by un-trusted subscribers. Attackers may exploit these vulnerabilities to violate the privacy of the LTE-A subscribers. On the other hand, the tradeoff between privacy and authentication is another challenge in such networks. Therefore, in this paper, we propose two anonymous authentication schemes based on one-time pseudonymes and Schnorr Zero Knowledge Protocols. Instead of the international mobile subscriber identity, these schemes enable the user equipment, base-stations and mobility management entity to mutually authenticate each others and update the location of the user equipment without evolving the home subscriber server. The security analysis demonstrate that the proposed schemes thwart security and privacy attacks, such as malicious, international mobile subscriber identity catching, and tracking attacks. Additionally, our proposed schemes preserve the location privacy of user equipment since no entity except the mobility management entity and Gate-Way Mobile Location Center can link between the pseudonymes and the international mobile subscriber identity. Also attackers have no knowledge about international mobile subscriber identity. Hence, the proposed schemes achieve backward/forward secrecy. Furthermore, the performance evaluation shows that the proposed handover schemes impose a small overhead on the mobile nodes and it has smaller computation and communication overheads than those in other schemes.

  7. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Directory of Open Access Journals (Sweden)

    Mojtaba Alizadeh

    Full Text Available Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  8. Cryptanalysis and Improvement of "A Secure Password Authentication Mechanism for Seamless Handover in Proxy Mobile IPv6 Networks".

    Science.gov (United States)

    Alizadeh, Mojtaba; Zamani, Mazdak; Baharun, Sabariah; Abdul Manaf, Azizah; Sakurai, Kouichi; Anada, Hiroaki; Anada, Hiroki; Keshavarz, Hassan; Ashraf Chaudhry, Shehzad; Khurram Khan, Muhammad

    2015-01-01

    Proxy Mobile IPv6 is a network-based localized mobility management protocol that supports mobility without mobile nodes' participation in mobility signaling. The details of user authentication procedure are not specified in this standard, hence, many authentication schemes have been proposed for this standard. In 2013, Chuang et al., proposed an authentication method for PMIPv6, called SPAM. However, Chuang et al.'s Scheme protects the network against some security attacks, but it is still vulnerable to impersonation and password guessing attacks. In addition, we discuss other security drawbacks such as lack of revocation procedure in case of loss or stolen device, and anonymity issues of the Chuang et al.'s scheme. We further propose an enhanced authentication method to mitigate the security issues of SPAM method and evaluate our scheme using BAN logic.

  9. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method.

    Science.gov (United States)

    Dhamodharan, Udaya Suriya Raj Kumar; Vayanaperumal, Rajamani

    2015-01-01

    Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method) with MAP (message authentication and passing) for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  10. Detecting and Preventing Sybil Attacks in Wireless Sensor Networks Using Message Authentication and Passing Method

    Directory of Open Access Journals (Sweden)

    Udaya Suriya Raj Kumar Dhamodharan

    2015-01-01

    Full Text Available Wireless sensor networks are highly indispensable for securing network protection. Highly critical attacks of various kinds have been documented in wireless sensor network till now by many researchers. The Sybil attack is a massive destructive attack against the sensor network where numerous genuine identities with forged identities are used for getting an illegal entry into a network. Discerning the Sybil attack, sinkhole, and wormhole attack while multicasting is a tremendous job in wireless sensor network. Basically a Sybil attack means a node which pretends its identity to other nodes. Communication to an illegal node results in data loss and becomes dangerous in the network. The existing method Random Password Comparison has only a scheme which just verifies the node identities by analyzing the neighbors. A survey was done on a Sybil attack with the objective of resolving this problem. The survey has proposed a combined CAM-PVM (compare and match-position verification method with MAP (message authentication and passing for detecting, eliminating, and eventually preventing the entry of Sybil nodes in the network. We propose a scheme of assuring security for wireless sensor network, to deal with attacks of these kinds in unicasting and multicasting.

  11. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  12. A provably-secure ECC-based authentication scheme for wireless sensor networks.

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-11-06

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes.

  13. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ling Xiong

    2017-11-01

    Full Text Available Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation—the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  14. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-11-01

    Full Text Available A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000. Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC, and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure schemes.

  15. A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Nam, Junghyun; Kim, Moonseong; Paik, Juryon; Lee, Youngsook; Won, Dongho

    2014-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (in short, a SUA-WSN scheme) is designed to restrict access to the sensor data only to users who are in possession of both a smart card and the corresponding password. While a significant number of SUA-WSN schemes have been suggested in recent years, their intended security properties lack formal definitions and proofs in a widely-accepted model. One consequence is that SUA-WSN schemes insecure against various attacks have proliferated. In this paper, we devise a security model for the analysis of SUA-WSN schemes by extending the widely-accepted model of Bellare, Pointcheval and Rogaway (2000). Our model provides formal definitions of authenticated key exchange and user anonymity while capturing side-channel attacks, as well as other common attacks. We also propose a new SUA-WSN scheme based on elliptic curve cryptography (ECC), and prove its security properties in our extended model. To the best of our knowledge, our proposed scheme is the first SUA-WSN scheme that provably achieves both authenticated key exchange and user anonymity. Our scheme is also computationally competitive with other ECC-based (non-provably secure) schemes. PMID:25384009

  16. A Lightweight Anonymous Authentication Protocol with Perfect Forward Secrecy for Wireless Sensor Networks.

    Science.gov (United States)

    Xiong, Ling; Peng, Daiyuan; Peng, Tu; Liang, Hongbin; Liu, Zhicai

    2017-11-21

    Due to their frequent use in unattended and hostile deployment environments, the security in wireless sensor networks (WSNs) has attracted much interest in the past two decades. However, it remains a challenge to design a lightweight authentication protocol for WSNs because the designers are confronted with a series of desirable security requirements, e.g., user anonymity, perfect forward secrecy, resistance to de-synchronization attack. Recently, the authors presented two authentication schemes that attempt to provide user anonymity and to resist various known attacks. Unfortunately, in this work we shall show that user anonymity of the two schemes is achieved at the price of an impractical search operation-the gateway node may search for every possible value. Besides this defect, they are also prone to smart card loss attacks and have no provision for perfect forward secrecy. As our main contribution, a lightweight anonymous authentication scheme with perfect forward secrecy is designed, and what we believe the most interesting feature is that user anonymity, perfect forward secrecy, and resistance to de-synchronization attack can be achieved at the same time. As far as we know, it is extremely difficult to meet these security features simultaneously only using the lightweight operations, such as symmetric encryption/decryption and hash functions.

  17. A Temporal Credential-Based Mutual Authentication with Multiple-Password Scheme for Wireless Sensor Networks

    Science.gov (United States)

    Zhang, Ruisheng; Liu, Qidong

    2017-01-01

    Wireless sensor networks (WSNs), which consist of a large number of sensor nodes, have become among the most important technologies in numerous fields, such as environmental monitoring, military surveillance, control systems in nuclear reactors, vehicle safety systems, and medical monitoring. The most serious drawback for the widespread application of WSNs is the lack of security. Given the resource limitation of WSNs, traditional security schemes are unsuitable. Approaches toward withstanding related attacks with small overhead have thus recently been studied by many researchers. Numerous studies have focused on the authentication scheme for WSNs, but most of these works cannot achieve the security performance and overhead perfectly. Nam et al. proposed a two-factor authentication scheme with lightweight sensor computation for WSNs. In this paper, we review this scheme, emphasize its drawbacks, and propose a temporal credential-based mutual authentication with a multiple-password scheme for WSNs. Our scheme uses multiple passwords to achieve three-factor security performance and generate a session key between user and sensor nodes. The security analysis phase shows that our scheme can withstand related attacks, including a lost password threat, and the comparison phase shows that our scheme involves a relatively small overhead. In the comparison of the overhead phase, the result indicates that more than 95% of the overhead is composed of communication and not computation overhead. Therefore, the result motivates us to pay further attention to communication overhead than computation overhead in future research. PMID:28135288

  18. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP.

    Science.gov (United States)

    Garcia-Carrillo, Dan; Marin-Lopez, Rafael; Kandasamy, Arunprabhu; Pelov, Alexander

    2017-11-17

    The Internet-of-Things (IoT) landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN), the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN) offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP), which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA) infrastructures and the Extensible Authentication Protocol (EAP) protocol. For this integration, we use the Constrained Application Protocol (CoAP) to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  19. A CoAP-Based Network Access Authentication Service for Low-Power Wide Area Networks: LO-CoAP-EAP

    Directory of Open Access Journals (Sweden)

    Dan Garcia-Carrillo

    2017-11-01

    Full Text Available The Internet-of-Things (IoT landscape is expanding with new radio technologies. In addition to the Low-Rate Wireless Personal Area Network (LR-WPAN, the recent set of technologies conforming the so-called Low-Power Wide Area Networks (LP-WAN offers long-range communications, allowing one to send small pieces of information at a reduced energy cost, which promotes the creation of new IoT applications and services. However, LP-WAN technologies pose new challenges since they have strong limitations in the available bandwidth. In general, a first step prior to a smart object being able to gain access to the network is the process of network access authentication. It involves authentication, authorization and key management operations. This process is of vital importance for operators to control network resources. However, proposals for managing network access authentication in LP-WAN are tailored to the specifics of each technology, which could introduce interoperability problems in the future. In this sense, little effort has been put so far into providing a wireless-independent solution for network access authentication in the area of LP-WAN. To fill this gap, we propose a service named Low-Overhead CoAP-EAP (LO-CoAP-EAP, which is based on previous work designed for LR-WPAN. LO-CoAP-EAP integrates the use of Authentication, Authorization and Accounting (AAA infrastructures and the Extensible Authentication Protocol (EAP protocol. For this integration, we use the Constrained Application Protocol (CoAP to design a network authentication service independent of the type of LP-WAN technology. LO-CoAP-EAP represents a trade-off between flexibility, wireless technology independence, scalability and performance in LP-WAN.

  20. The Investigation of Authentic vs. Pedagogical Tape Scripts on Listening Comprehension Ability of Tourism Students

    Directory of Open Access Journals (Sweden)

    Ayda Rahmani

    2015-03-01

    Full Text Available The present study is an attempt to investigate the effects of authentic vs. pedagogical tape scripts on Iranian EFL learners' listening comprehension ability. For this purpose an OPT (Oxford Placement Test was administered to a total of 78 Iranian EFL learners. Then, 40 of them who were considered as intermediate learners were selected. The participants were randomly divided into two groups i.e. an experimental group and a control group. Both groups were pretested prior to the study. Then, the experimental group received the treatment in the form of listening to authentic or real English i.e. the real conversations by native speakers of English; while, the control group was exposed to pedagogical listening skills that were specially recorded for EFL learners of foreigners After ten sessions, both groups were post tested. Then the results of the posttests were subjects of statistical analysis (paired-samples t-test and independent-samples t-test. The results indicated that the experimental group did better than the control group and there is a significant difference between the mean scores of the experimental group who were exposed to authentic tape scripts and the control group who received a normal practice of listening proficiency i.e. a placebo.

  1. R2NA: Received Signal Strength (RSS Ratio-Based Node Authentication for Body Area Network

    Directory of Open Access Journals (Sweden)

    Yang Wu

    2013-12-01

    Full Text Available The body area network (BAN is an emerging branch of wireless sensor networks for personalized applications. The services in BAN usually have a high requirement on security, especially for the medical diagnosis. One of the fundamental directions to ensure security in BAN is how to provide node authentication. Traditional research using cryptography relies on prior secrets shared among nodes, which leads to high resource cost. In addition, most existing non-cryptographic solutions exploit out-of-band (OOB channels, but they need the help of additional hardware support or significant modifications to the system software. To avoid the above problems, this paper presents a proximity-based node authentication scheme, which only uses wireless modules equipped on sensors. With only one sensor and one control unit (CU in BAN, we could detect a unique physical layer characteristic, namely, the difference between the received signal strength (RSS measured on different devices in BAN. Through the above-mentioned particular difference, we can tell whether the sender is close enough to be legitimate. We validate our scheme through both theoretical analysis and experiments, which are conducted on the real Shimmer nodes. The results demonstrate that our proposed scheme has a good security performance.

  2. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-12-01

    Full Text Available As an essential part of Internet of Things (IoT, wireless sensor networks (WSNs have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  3. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  4. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ayman Tajeddine

    2015-02-01

    Full Text Available In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN. CENTERA utilizes the more powerful base station (BS to gather minimal neighbor trust information from nodes and calculate the best routes after isolating different types of “bad” nodes. By periodically accumulating these simple local observations and approximating the nodes’ battery lives, the BS draws a global view of the network, calculates three quality metrics—maliciousness, cooperation, and compatibility—and evaluates the Data Trust and Forwarding Trust values of each node. Based on these metrics, the BS isolates “bad”, “misbehaving” or malicious nodes for a certain period, and put some nodes on probation. CENTERA increases the node’s bad/probation level with repeated “bad” behavior, and decreases it otherwise. Then it uses a very efficient method to distribute the routing information to “good” nodes. Based on its target environment, and if required, CENTERA uses an authentication scheme suitable for severely constrained nodes, ranging from the symmetric RC5 for safe environments under close administration, to pairing-based cryptography (PBC for hostile environments with a strong attacker model. We simulate CENTERA using TOSSIM and verify its correctness and show some energy calculations.

  5. Monitoring the authenticity of low-fat yogurts by an artificial neural network.

    Science.gov (United States)

    da Cruz, A G; Walter, E H M; Cadena, R S; Faria, J A F; Bolini, H M A; Frattini Fileti, A M

    2009-10-01

    The growing consumption of low- and reduced-fat dairy products demands routine control of their authenticity by health agencies. The usual analyses of fat in dairy products are very simple laboratory methods; however, they require manipulation and use of reagents of a corrosive nature, such as sulfuric acid, to break the chemical bounds between fat and proteins. Additionally, they generate chemical residues that require an appropriate destination. In this work, the use of an artificial neural network based on simple instrumental analyses, such as pH, color, and hardness (inputs) is proposed for the classification of commercial yogurts in the low- and reduced-fat categories (outputs). A total of 108 strawberry-flavored yogurts (48 probiotic low-fat, 36 low-fat, and 24 full-fat yogurts) belonging to several commercial brands and from different batches were used in this research. The statistical analysis showed different features for each yogurt category; thus, a database was built and a neural model was trained with the Levenberg-Marquardt algorithm by using the neural network toolbox of the software MATLAB 7.0.1. Validation with unseen data pairs showed that the proposed model was 100% efficient. Because the instrumental analyses do not require any sample preparation and do not produce any chemical residues, the proposed procedure is a fast and interesting approach to monitoring the authenticity of these products.

  6. Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

    Directory of Open Access Journals (Sweden)

    Jung-oh Park

    2015-01-01

    Full Text Available Recently, as the utilization of CCTV (closed circuit television is emerging as an issue, the studies on CCTV are receiving much attention. Accordingly, due to the development of CCTV, CCTV has IP addresses and is connected to network; it is exposed to many threats on the existing web environment. In this paper, steganography is utilized to confirm the Data Masquerading and Data Modification and, in addition, to strengthen the security; the user information is protected based on PKI (public key infrastructure, SN (serial number, and R value (random number attributed at the time of login and the user authentication protocol to block nonauthorized access of malicious user in network CCTV environment was proposed. This paper should be appropriate for utilization of user infringement-related CCTV where user information protection-related technology is not applied for CCTV in the future.

  7. AUTHENTICATION ARCHITECTURE USING THRESHOLD CRYPTOGRAPHY IN KERBEROS FOR MOBILE AD HOC NETWORKS

    Directory of Open Access Journals (Sweden)

    Hadj Gharib

    2014-06-01

    Full Text Available The use of wireless technologies is gradually increasing and risks related to the use of these technologies are considerable. Due to their dynamically changing topology and open environment without a centralized policy control of a traditional network, a mobile ad hoc network (MANET is vulnerable to the presence of malicious nodes and attacks. The ideal solution to overcome a myriad of security concerns in MANET’s is the use of reliable authentication architecture. In this paper we propose a new key management scheme based on threshold cryptography in kerberos for MANET’s, the proposed scheme uses the elliptic curve cryptography method that consumes fewer resources well adapted to the wireless environment. Our approach shows a strength and effectiveness against attacks.

  8. UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks

    Directory of Open Access Journals (Sweden)

    Jin Cao

    2018-01-01

    Full Text Available Machine Type Communication (MTC, as one of the most important wireless communication technologies in the future wireless communication, has become the new business growth point of mobile communication network. It is a key point to achieve seamless handovers within Evolved-Universal Terrestrial Radio Access Network (E-UTRAN for massive MTC (mMTC devices in order to support mobility in the Long Term Evolution-Advanced (LTE-A networks. When mMTC devices simultaneously roam from a base station to a new base station, the current handover mechanisms suggested by the Third-Generation Partnership Project (3GPP require several handover signaling interactions, which could cause the signaling load over the access network and the core network. Besides, several distinct handover procedures are proposed for different mobility scenarios, which will increase the system complexity. In this paper, we propose a simple and secure uniform group-based handover authentication scheme for mMTC devices based on the multisignature and aggregate message authentication code (AMAC techniques, which is to fit in with all of the mobility scenarios in the LTE-A networks. Compared with the current 3GPP standards, our scheme can achieve a simple authentication process with robust security protection including privacy preservation and thus avoid signaling congestion. The correctness of the proposed group handover authentication protocol is formally proved in the Canetti-Krawczyk (CK model and verified based on the AVISPA and SPAN.

  9. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

    Directory of Open Access Journals (Sweden)

    Blerim Rexha

    2018-02-01

    Full Text Available Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capability on smartphones, tablets, and laptops, face authentication provides an attractive alternative of legacy passwords for its memory-less authentication process, which is so sophisticated that it can unlock the device faster than a fingerprint. Nevertheless, face authentication in the context of smartphones has proven to be vulnerable to attacks. In most current implementations, a sufficiently high-resolution face image displayed on another mobile device will be enough to circumvent security measures and bypass the authentication process. In order to prevent such bypass attacks, gesture recognition together with location is proposed to be additionally modeled. Gestures provide a faster and more convenient method of authentication compared to a complex password. The focus of this paper is to build a secure authentication system with face, location and gesture recognition as components. User gestures and location data are a sequence of time series; therefore, in this paper we propose to use unsupervised learning in the long short-term memory recurrent neural network to actively learn to recognize, group and discriminate user gestures and location. Moreover, a clustering-based technique is also implemented for recognizing gestures and location.

  10. Constructing "Authentic" Science: Results from a University/High School Collaboration Integrating Digital Storytelling and Social Networking

    Science.gov (United States)

    Olitsky, Stacy; Becker, Elizabeth A.; Jayo, Ignacio; Vinogradov, Philip; Montcalmo, Joseph

    2018-02-01

    This study explores the implications of a redesign of a college course that entailed a new partnership between a college neuroscience classroom and a high school. In this course, the college students engaged in original research projects which included conducting brain surgery and behavioural tests on rats. They used digital storytelling and social networking to communicate with high school students and were visited by the students during the semester. The aims of the redesign were to align the course with science conducted in the field and to provide opportunities to disseminate scientific knowledge through emerging technologies. This study investigates the impact of these innovations on the college and high school students' perceptions of authentic science, including their relationship with science-centred communities. We found that these collaborative tools increased college students' perceptions that authentic science entailed communication with the general public, in addition to supporting prior perceptions of the importance of conducting experiments and presenting results to experts. In addition, the view of science as high-status knowledge was attenuated as students integrated non-formal communication practices into presentations, showing the backstage process of learning, incorporating music and youth discourse styles, and displaying emotional engagement. An impact of these hybrid presentation approaches was an increase in the high school students' perceptions of the accessibility of laboratory science. We discuss how the use of technologies that are familiar to youth, such as iPads, social networking sites, and multimedia presentations, has the potential to prioritize students' voices and promote a more inclusive view of science.

  11. Authenticating the Leader

    DEFF Research Database (Denmark)

    Johnsen, Christian Garmann

    As authentic leadership, with its dictum of being true to the self, has become increasingly influential among practitioners and mainstream leadership scholars, critical writers have drawn attention to the negative consequences of this development. Yet, few scholars have investigated the problem...... of authentication within discourse of authentic leadership. If authentic leadership is to make any sense, it is necessary to be able to distinguish the authentic from the inauthentic leader – in other words, it is necessary to authenticate the leader. This paper uses Gilles Deleuze’s reading of Plato as the point...... of departure for discussing the problem of authentication – separating the authentic leader form the inauthentic one – in the leadership guru Bill George’s model of authentic leadership. By doing so, the paper offers a way of conceptualizing the problem of authenticating leaders, as well as challenging...

  12. An Improved Digital Signature Protocol to Multi-User Broadcast Authentication Based on Elliptic Curve Cryptography in Wireless Sensor Networks (WSNs

    Directory of Open Access Journals (Sweden)

    Hamed Bashirpour

    2018-03-01

    Full Text Available In wireless sensor networks (WSNs, users can use broadcast authentication mechanisms to connect to the target network and disseminate their messages within the network. Since data transfer for sensor networks is wireless, as a result, attackers can easily eavesdrop deployed sensor nodes and the data sent between them or modify the content of eavesdropped data and inject false data into the sensor network. Hence, the implementation of the message authentication mechanisms (in order to avoid changes and injecting messages into the network of wireless sensor networks is essential. In this paper, we present an improved protocol based on elliptic curve cryptography (ECC to accelerate authentication of multi-user message broadcasting. In comparison with previous ECC-based schemes, complexity and computational overhead of proposed scheme is significantly decreased. Also, the proposed scheme supports user anonymity, which is an important property in broadcast authentication schemes for WSNs to preserve user privacy and user untracking.

  13. Student Planetary Investigators: A Program to Engage Students in Authentic Research Using NASA Mission Data

    Science.gov (United States)

    Hallau, K.; Turney, D.; Beisser, K.; Edmonds, J.; Grigsby, B.

    2015-12-01

    The Student Planetary Investigator (PI) Program engages students in authentic scientific research using NASA mission data. This student-focused STEM (Science, Technology, Engineering and Math) program combines problem-based learning modules, Next Generation Science Standards (NGSS) aligned curriculum, and live interactive webinars with mission scientists to create authentic research opportunities and career-ready experiences that prepare and inspire students to pursue STEM occupations. Primarily for high school students, the program employs distance-learning technologies to stream live presentations from mission scientists, archive those presentations to accommodate varied schedules, and collaborate with other student teams and scientists. Like its predecessor, the Mars Exploration Student Data Team (MESDT) program, the Student PI is free and open to teams across the country. To date, students have drafted research-based reports using data from the Lunar Reconnaissance Orbiter Mini-RF instrument and the MESSENGER Mercury orbiter, with plans to offer similar programs aligned with additional NASA missions in the future pending available funding. Overall, the program has reached about 600 students and their educators. Assessments based on qualitative and quantitative data gathered for each Student PI program have shown that students gain new understanding about the scientific process used by real-world scientists as well as gaining enthusiasm for STEM. Additionally, it is highly adaptable to other disciplines and fields. The Student PI program was created by the Johns Hopkins University Applied Physics Laboratory (APL) Space Department Education and Public Outreach office with support from NASA mission and instrument science and engineering teams.

  14. An Advanced Temporal Credential-Based Security Scheme with Mutual Authentication and Key Agreement for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chun-Ta Li

    2013-07-01

    Full Text Available Wireless sensor networks (WSNs can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs. Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.’s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users’ attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.’s authentication scheme are left unchanged.

  15. An advanced temporal credential-based security scheme with mutual authentication and key agreement for wireless sensor networks.

    Science.gov (United States)

    Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi

    2013-07-24

    Wireless sensor networks (WSNs) can be quickly and randomly deployed in any harsh and unattended environment and only authorized users are allowed to access reliable sensor nodes in WSNs with the aid of gateways (GWNs). Secure authentication models among the users, the sensor nodes and GWN are important research issues for ensuring communication security and data privacy in WSNs. In 2013, Xue et al. proposed a temporal-credential-based mutual authentication and key agreement scheme for WSNs. However, in this paper, we point out that Xue et al.'s scheme cannot resist stolen-verifier, insider, off-line password guessing, smart card lost problem and many logged-in users' attacks and these security weaknesses make the scheme inapplicable to practical WSN applications. To tackle these problems, we suggest a simple countermeasure to prevent proposed attacks while the other merits of Xue et al.'s authentication scheme are left unchanged.

  16. Security analysis and improvements of two-factor mutual authentication with key agreement in wireless sensor networks.

    Science.gov (United States)

    Kim, Jiye; Lee, Donghoon; Jeon, Woongryul; Lee, Youngsook; Won, Dongho

    2014-04-09

    User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks). In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker's own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  17. An authenticated encrypted routing protocol against attacks in mobile ad-hoc networks

    Directory of Open Access Journals (Sweden)

    C.C. Suma

    2017-01-01

    Full Text Available Mobile Ad hoc Network is stated as a cluster that contains Digital data terminals and they are furnished with the wireless transceivers which are able to communicate with each other with no need of any fixed architecture or concentrated authority. Security is one of the major issues in MANETs because of vast applications such as Military Battlefields, emergency and rescue operations[10]. In order to provide anonymous communications and to identify the malicious nodes in MANETs, many authors have proposed different secure routing protocols but each protocol have their own advantages and disadvantages. In MANTE’s each and every node in the communicating network functions like router and transmits the packets among the networking nodes for the purpose of communication[11]. Sometimes nodes may be attacked by the malicious nodes or the legitimate node will be caught by foemen there by controlling and preventing the nodes to perform the assigned task or nodes may be corrupted due to loss of energy. So, due to these drawbacks securing the network under the presence of adversaries is an important thing. The existing protocols were designed with keeping anonymity and the identification of vicious nodes in the network as the main goal. For providing better security, the anonymity factors such as Unidentifiability and Unlinkability must be fully satisfied[1]. Many anonymous routing schemes that concentrate on achieving anonymity are proposed in the past decade and they provides the security at different levels and also provides the privacy protection that is of different cost. In this paper we consider a protocol called Authenticated Secure Routing Protocol proposed which provides both security & anonymity. Anonymity is achieved in this protocol using Group signature. Over all by using this protocol performance in terms of throughput as well as the packet dropping rate is good compared to the other living protocols.

  18. Secure Data Aggregation in Wireless Sensor Network-Fujisaki Okamoto(FO) Authentication Scheme against Sybil Attack.

    Science.gov (United States)

    Nirmal Raja, K; Maraline Beno, M

    2017-07-01

    In the wireless sensor network(WSN) security is a major issue. There are several network security schemes proposed in research. In the network, malicious nodes obstruct the performance of the network. The network can be vulnerable by Sybil attack. When a node illicitly assertions multiple identities or claims fake IDs, the WSN grieves from an attack named Sybil attack. This attack threatens wireless sensor network in data aggregation, synchronizing system, routing, fair resource allocation and misbehavior detection. Henceforth, the research is carried out to prevent the Sybil attack and increase the performance of the network. This paper presents the novel security mechanism and Fujisaki Okamoto algorithm and also application of the work. The Fujisaki-Okamoto (FO) algorithm is ID based cryptographic scheme and gives strong authentication against Sybil attack. By using Network simulator2 (NS2) the scheme is simulated. In this proposed scheme broadcasting key, time taken for different key sizes, energy consumption, Packet delivery ratio, Throughput were analyzed.

  19. The Failure of Inquiry: Preparing Science Teachers with an Authentic Investigation

    Science.gov (United States)

    Lustick, David

    2009-12-01

    This mixed methodology action research study examined the impact of a curricular innovation designed to provide an authentic science inquiry learning experience for 15 secondary science teacher candidates enrolled in a master’s level initial certification program. The class investigated the question “How can peak autumn color in New England be determined?” The project goals were to help teacher candidates acquire the skills, knowledge, and dispositions necessary to foster learning through inquiry in their respective content areas as defined by teacher preparation professional standards. Though the teacher candidates were successful at identifying a likely answer to the question, the project failed to achieve its learning goals. Reasons for the project’s failure and implications for the science education community are discussed.

  20. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  1. Secure and Efficient Two-Factor User Authentication Scheme with User Anonymity for Network Based E-Health Care Applications.

    Science.gov (United States)

    Li, Xiong; Niu, Jianwei; Karuppiah, Marimuthu; Kumari, Saru; Wu, Fan

    2016-12-01

    Benefited from the development of network and communication technologies, E-health care systems and telemedicine have got the fast development. By using the E-health care systems, patient can enjoy the remote medical service provided by the medical server. Medical data are important privacy information for patient, so it is an important issue to ensure the secure of transmitted medical data through public network. Authentication scheme can thwart unauthorized users from accessing services via insecure network environments, so user authentication with privacy protection is an important mechanism for the security of E-health care systems. Recently, based on three factors (password, biometric and smart card), an user authentication scheme for E-health care systems was been proposed by Amin et al., and they claimed that their scheme can withstand most of common attacks. Unfortunate, we find that their scheme cannot achieve the untraceability feature of the patient. Besides, their scheme lacks a password check mechanism such that it is inefficient to find the unauthorized login by the mistake of input a wrong password. Due to the same reason, their scheme is vulnerable to Denial of Service (DoS) attack if the patient updates the password mistakenly by using a wrong password. In order improve the security level of authentication scheme for E-health care application, a robust user authentication scheme with privacy protection is proposed for E-health care systems. Then, security prove of our scheme are analysed. Security and performance analyses show that our scheme is more powerful and secure for E-health care systems when compared with other related schemes.

  2. An Investigation of the Predictive Role of Authenticity on Subjective Vitality

    Science.gov (United States)

    Gocet Tekin, Emine; Satici, Begum

    2014-01-01

    This study aims to determine the relationship between authenticity and subjective vitality among university students in Turkey. The study was carried out with 284 university students (164 female, 120 male, M[subscript age] = 19.91 years, SD = 1.79, and age range: 17-30). Participants completed the Turkish version of the Authenticity Scale and…

  3. On the Authenticity of a Relic: An Archaeometric Investigation of the Supposed Bread Stack of Saint Francesco of Assisi

    DEFF Research Database (Denmark)

    Rasmussen, K. L.; Degano, I.; Colombini, M. P.

    2017-01-01

    The relic ``the sack of Saint Francesco'' has for the first time been investigated by scientific means. The sack is kept at the Franciscan Friary of Folloni near Montella in southern Italy. According to legend, the sack appeared on the doorstep of the Friary in the winter of 1224 containing bread...... shows that the sack indeed could be authentic....

  4. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  5. Fuzzy Extractor and Elliptic Curve Based Efficient User Authentication Protocol for Wireless Sensor Networks and Internet of Things

    Directory of Open Access Journals (Sweden)

    Anup Kumar Maurya

    2017-10-01

    Full Text Available To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs and the Internet of Things (IoT. Session key establishment between the sensor node and the user is also required for secure communication. In this paper, we perform the security analysis of A.K.Das’s user authentication scheme (given in 2015, Choi et al.’s scheme (given in 2016, and Park et al.’s scheme (given in 2016. The security analysis shows that their schemes are vulnerable to various attacks like user impersonation attack, sensor node impersonation attack and attacks based on legitimate users. Based on the cryptanalysis of these existing protocols, we propose a secure and efficient authenticated session key establishment protocol which ensures various security features and overcomes the drawbacks of existing protocols. The formal and informal security analysis indicates that the proposed protocol withstands the various security vulnerabilities involved in WSNs. The automated validation using AVISPA and Scyther tool ensures the absence of security attacks in our scheme. The logical verification using the Burrows-Abadi-Needham (BAN logic confirms the correctness of the proposed protocol. Finally, the comparative analysis based on computational overhead and security features of other existing protocol indicate that the proposed user authentication system is secure and efficient. In future, we intend to implement the proposed protocol in real-world applications of WSNs and IoT.

  6. User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

    Directory of Open Access Journals (Sweden)

    Gerald Wagenknecht

    2013-03-01

    Full Text Available The intention of an authentication and authorization infrastructure (AAI is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP. Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.

  7. An Investigation of the Effects of Authentic Science Experiences Among Urban High School Students

    Science.gov (United States)

    Chapman, Angela

    Providing equitable learning opportunities for all students has been a persistent issue for some time. This is evident by the science achievement gap that still exists between male and female students as well as between White and many non-White student populations (NCES, 2007, 2009, 2009b) and an underrepresentation of female, African-American, Hispanic, and Native Americans in many science, technology, engineering, and mathematics (STEM) related careers (NCES, 2009b). In addition to gender and ethnicity, socioeconomic status and linguistic differences are also factors that can marginalize students in the science classroom. One factor attributed to the achievement gap and low participation in STEM career is equitable access to resources including textbooks, laboratory equipment, qualified science teachers, and type of instruction. Extensive literature supports authentic science as one way of improving science learning. However, the majority of students do not have access to this type of resource. Additionally, extensive literature posits that culturally relevant pedagogy is one way of improving education. This study examines students' participation in an authentic science experience and argues that this is one way of providing culturally relevant pedagogy in science classrooms. The purpose of this study was to better understand how marginalized students were affected by their participation in an authentic science experience, within the context of an algae biofuel project. Accordingly, an interpretivist approach was taken. Data were collected from pre/post surveys and tests, semi-structured interviews, student journals, and classroom observations. Data analysis used a mixed methods approach. The data from this study were analyzed to better understand whether students perceived the experience to be one of authentic science, as well as how students science identities, perceptions about who can do science, attitudes toward science, and learning of science practices

  8. Investigating biofuels through network analysis

    International Nuclear Information System (INIS)

    Curci, Ylenia; Mongeau Ospina, Christian A.

    2016-01-01

    Biofuel policies are motivated by a plethora of political concerns related to energy security, environmental damages, and support of the agricultural sector. In response to this, much scientific work has chiefly focussed on analysing the biofuel domain and on giving policy advice and recommendations. Although innovation has been acknowledged as one of the key factors in sustainable and cost-effective biofuel development, there is an urgent need to investigate technological trajectories in the biofuel sector by starting from consistent data and appropriate methodological tools. To do so, this work proposes a procedure to select patent data unequivocally related to the investigated sector, it uses co-occurrence of technological terms to compute patent similarity and highlights content and interdependencies of biofuels technological trajectories by revealing hidden topics from unstructured patent text fields. The analysis suggests that there is a breaking trend towards modern generation biofuels and that innovators seem to focus increasingly on the ability of alternative energy sources to adapt to the transport/industrial sector. - Highlights: • Innovative effort is devoted to biofuels additives and modern biofuels technologies. • A breaking trend can be observed from the second half of the last decade. • A patent network is identified via text mining techniques that extract latent topics.

  9. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jiye Kim

    2014-04-01

    Full Text Available User authentication and key management are two important security issues in WSNs (Wireless Sensor Networks. In WSNs, for some applications, the user needs to obtain real-time data directly from sensors and several user authentication schemes have been recently proposed for this case. We found that a two-factor mutual authentication scheme with key agreement in WSNs is vulnerable to gateway node bypassing attacks and user impersonation attacks using secret data stored in sensor nodes or an attacker’s own smart card. In this paper, we propose an improved scheme to overcome these security weaknesses by storing secret data in unique ciphertext form in each node. In addition, our proposed scheme should provide not only security, but also efficiency since sensors in a WSN operate with resource constraints such as limited power, computation, and storage space. Therefore, we also analyze the performance of the proposed scheme by comparing its computation and communication costs with those of other schemes.

  10. Investigating the Effects of Authentic Activities on Foreign Language Learning: A Design-Based Research Approach

    Science.gov (United States)

    Ozverir, Ildeniz; Osam, Ulker Vanci; Herrington, Jan

    2017-01-01

    Achieving communicative competency in English classes has been a key goal in contexts where English is taught as a foreign language (EFL). During this process, however, integrating the difficulty and complexity of real life tasks into classroom teaching has often been disregarded. Lack of opportunities for authentic language use often results in…

  11. Robust general N user authentication scheme in a centralized quantum communication network via generalized GHZ states

    Science.gov (United States)

    Farouk, Ahmed; Batle, J.; Elhoseny, M.; Naseri, Mosayeb; Lone, Muzaffar; Fedorov, Alex; Alkhambashi, Majid; Ahmed, Syed Hassan; Abdel-Aty, M.

    2018-04-01

    Quantum communication provides an enormous advantage over its classical counterpart: security of communications based on the very principles of quantum mechanics. Researchers have proposed several approaches for user identity authentication via entanglement. Unfortunately, these protocols fail because an attacker can capture some of the particles in a transmitted sequence and send what is left to the receiver through a quantum channel. Subsequently, the attacker can restore some of the confidential messages, giving rise to the possibility of information leakage. Here we present a new robust General N user authentication protocol based on N-particle Greenberger-Horne-Zeilinger (GHZ) states, which makes eavesdropping detection more effective and secure, as compared to some current authentication protocols. The security analysis of our protocol for various kinds of attacks verifies that it is unconditionally secure, and that an attacker will not obtain any information about the transmitted key. Moreover, as the number of transferred key bits N becomes larger, while the number of users for transmitting the information is increased, the probability of effectively obtaining the transmitted authentication keys is reduced to zero.

  12. User-Centered Authentication: LDAP, WRAP, X.509, XML (SIG LAN: Library Automation and Networks).

    Science.gov (United States)

    Coble, Jim

    2000-01-01

    Presents an abstract for a planned panel session on technologies for user-centered authentication and authorization currently deployed in pilot or production implementations in academic computing. Presentations included: "Implementing LSAP for Single-Password Access to Campus Resources" (Layne Nordgren); "Implementing a Scalable…

  13. Design of a mutual authentication based on NTRUsign with a perturbation and inherent multipoint control protocol frames in an Ethernet-based passive optical network

    Science.gov (United States)

    Yin, Aihan; Ding, Yisheng

    2014-11-01

    Identity-related security issues inherently present in passive optical networks (PON) still exist in the current (1G) and next-generation (10G) Ethernet-based passive optical network (EPON) systems. We propose a mutual authentication scheme that integrates an NTRUsign digital signature algorithm with inherent multipoint control protocol (MPCP) frames over an EPON system between the optical line terminal (OLT) and optical network unit (ONU). Here, a primitive NTRUsign algorithm is significantly modified through the use of a new perturbation so that it can be effectively used for simultaneously completing signature and authentication functions on the OLT and the ONU sides. Also, in order to transmit their individual sensitive messages, which include public key, signature, and random value and so forth, to each other, we redefine three unique frames according to MPCP format frame. These generated messages can be added into the frames and delivered to each other, allowing the OLT and the ONU to go ahead with a mutual identity authentication process to verify their legal identities. Our simulation results show that this proposed scheme performs very well in resisting security attacks and has low influence on the registration efficiency to to-be-registered ONUs. A performance comparison with traditional authentication algorithms is also presented. To the best of our knowledge, no detailed design of mutual authentication in EPON can be found in the literature up to now.

  14. Criminal Network Investigation: Processes, Tools, and Techniques

    DEFF Research Database (Denmark)

    Petersen, Rasmus Rosenqvist

    important challenge for criminal network investigation, despite the massive attention it receives from research and media. Challenges such as the investigation process, the context of the investigation, human factors such as thinking and creativity, and political decisions and legal laws are all challenges......Criminal network investigations such as police investigations, intelligence analysis, and investigative journalism involve a range of complex knowledge management processes and tasks. Criminal network investigators collect, process, and analyze information related to a specific target to create...... that could mean the success or failure of criminal network investigations. % include commission reports as indications of process related problems .. to "play a little politics" !! Information, process, and human factors, are challenges we find to be addressable by software system support. Based on those...

  15. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Science.gov (United States)

    Han, Youn-Hee; Min, Sung-Gi

    2017-01-01

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism. PMID:28934152

  16. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks

    Directory of Open Access Journals (Sweden)

    Ki-Wook Kim

    2017-09-01

    Full Text Available Many Internet of Things (IoT services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  17. An Authentication and Key Management Mechanism for Resource Constrained Devices in IEEE 802.11-based IoT Access Networks.

    Science.gov (United States)

    Kim, Ki-Wook; Han, Youn-Hee; Min, Sung-Gi

    2017-09-21

    Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been proposed as yet. We therefore propose a new AKM mechanism for an IoT access network, which is based on IEEE 802.11 key management with the IEEE 802.1X authentication mechanism. The proposed AKM mechanism does not require any pre-configured security information between the access network domain and the IoT service domain. It considers the resource constraints of IoT devices, allowing IoT devices to delegate the burden of AKM processes to a powerful agent. The agent has sufficient power to support various authentication methods for the access point, and it performs cryptographic functions for the IoT devices. Performance analysis shows that the proposed mechanism greatly reduces computation costs, network costs, and memory usage of the resource-constrained IoT device as compared to the existing IEEE 802.11 Key Management with the IEEE 802.1X authentication mechanism.

  18. Authentic Learning for Computer Network with Mobile Device-Based Hands-On Labware

    OpenAIRE

    Kai Qian; Ming Yang; Minzhe Guo; Prabir Bhattacharya; Lixin Tao

    2013-01-01

    Computer network courses are essential parts of college computer science curriculum and hands-on networking experience is well recognized as an effective approach to help students understand better about the network concepts, the layered architecture of network protocols, and the dynamics of the networks. However, existing networking labs are usually server-based and relatively cumbersome, which require a certain level of specialty and resource to set up and maintain the lab environment. Many...

  19. Efficient and anonymous two-factor user authentication in wireless sensor networks: achieving user anonymity with lightweight sensor computation.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Han, Sangchul; Kim, Moonseong; Paik, Juryon; Won, Dongho

    2015-01-01

    A smart-card-based user authentication scheme for wireless sensor networks (hereafter referred to as a SCA-WSN scheme) is designed to ensure that only users who possess both a smart card and the corresponding password are allowed to gain access to sensor data and their transmissions. Despite many research efforts in recent years, it remains a challenging task to design an efficient SCA-WSN scheme that achieves user anonymity. The majority of published SCA-WSN schemes use only lightweight cryptographic techniques (rather than public-key cryptographic techniques) for the sake of efficiency, and have been demonstrated to suffer from the inability to provide user anonymity. Some schemes employ elliptic curve cryptography for better security but require sensors with strict resource constraints to perform computationally expensive scalar-point multiplications; despite the increased computational requirements, these schemes do not provide user anonymity. In this paper, we present a new SCA-WSN scheme that not only achieves user anonymity but also is efficient in terms of the computation loads for sensors. Our scheme employs elliptic curve cryptography but restricts its use only to anonymous user-to-gateway authentication, thereby allowing sensors to perform only lightweight cryptographic operations. Our scheme also enjoys provable security in a formal model extended from the widely accepted Bellare-Pointcheval-Rogaway (2000) model to capture the user anonymity property and various SCA-WSN specific attacks (e.g., stolen smart card attacks, node capture attacks, privileged insider attacks, and stolen verifier attacks).

  20. Energy-Efficient Source Authentication for Secure Group Communication with Low-Powered Smart Devices in Hybrid Wireless/Satellite Networks

    Directory of Open Access Journals (Sweden)

    Baras JohnS

    2011-01-01

    Full Text Available We describe a new class of lightweight, symmetric-key digital certificates called extended TESLA certificates and a source authentication protocol for wireless group communication that is based on the certificate. The certificate binds the identity of a wireless smart device to the anchor element of its key chain; keys from the chain are used for computing message authentication codes (MACs on messages sourced by the device. The authentication protocol requires a centralized infrastructure in the network: we describe the protocol in a hybrid wireless network with a satellite overlay interconnecting the wireless devices. The satellite is used as the Certificate Authority (CA and also acts as the proxy for the senders in disclosing the MAC keys to the receivers. We also design a probabilistic nonrepudiation mechanism that utilizes the satellite's role as the CA and sender proxy. Through analysis, we show that the authentication protocol is secure against malicious adversaries. We also present detailed simulation results that demonstrate that the proposed protocol is much cheaper than traditional public key-based authentication technologies for metrics like processing delay, storage requirements, and energy consumption of the smart devices.

  1. Authentication Mechanism Based on Adaptable Context Management Framework for Secure Network Services

    Directory of Open Access Journals (Sweden)

    Sepczuk Mariusz

    2014-06-01

    Full Text Available A system, which uses context information is a new trend in IT. A lot of researchers create frameworks, which collect some data and perform actions based on them. Recently, there have been observed more and more different security solutions, in which we can use context. But not each works dynamically and ensures a high level of user's quality of experience (QoE. This paper outlines what the context information is and shows a secure and user-friendly authentication mechanism for a mail box in cloud computing, based on using contextual data.

  2. Innovative business models within niche tourist markets: shared identity, authenticity and flexibile networks. The case of three italian SMEs

    Directory of Open Access Journals (Sweden)

    Federica Montaguti

    2016-07-01

    Full Text Available Innovative business models within niche tourist markets: shared identity, authenticity and flexibile networks. The case of three italian SMEs The evolution of business models is a crucial challenge for tourism companies, which should understand how they can stimulate their creativity and introduce innovation. However for many firms, in particular for SMEs, this process is not so easy to be adopted. Even more difficult it is to understand how the business model should change to be successful in solving what appears to be one of the main problems for SMEs, especially within mature, tourist destinations, i.e. targeting new profitable segments. The paper discusses the main findings of a research project carried out by the authors about changes in the business models of Italian tourism companies, underlining in particular three case-studies of interest in terms of the innovation put in place and that relate to SMEs. The analysis, based on the business model canvas, the value constellation and the storytelling, found out that these three firms are flexible companies that have characteristics emblematic of the knowledge and information economy business models. They successfully answer the needs of specific niches, finding new opportunities within a mature tourism market and famous destinations, thanks to their ability to develop wide flexible networks, where customers are an active part, and thanks to the value proposed to the clients, centred on the idea of a shared identity between the clients and the company’s founders and of an authenticity guaranteed by the life story of the founders themselves.

  3. Using Authentic Data to Facilitate Comparative Planetology & Student-led Classroom Investigations

    Science.gov (United States)

    Graff, Paige; Runco, Susan

    2014-01-01

    This session will engage participants in a hands-on activity that uses stunning NASA imagery from space to help participants gain an understanding of how scientists use Earth to gain a better understanding of other planetary bodies in the solar system. Participants will make observations, develop identification criteria, and use evidence to justify inferences made about processes sculpting the surface of different planetary worlds. Participants will also "build" a comparative planetology feature wall that will facilitate a comparative view of major geologic processes and features across the inner solar system. This session will highlight additional comparative planetology activities and demonstrate how the use of authentic data and imagery can help facilitate student-led research in the classroom, helping teachers address the Next Generation Science Standards.

  4. Access to Network Login by Three-Factor Authentication for Effective Information Security.

    Science.gov (United States)

    Vaithyasubramanian, S; Christy, A; Saravanan, D

    2016-01-01

    Today's technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.

  5. The Impact of an Authentic Science Experience on STEM Identity: A Preliminary Analysis of YouthAstroNet and MicroObservatory Telescope Network Participant Data

    Science.gov (United States)

    Dussault, Mary E.; Wright, Erika A.; Sadler, Philip; Sonnert, Gerhard; ITEAMS II Team

    2018-01-01

    Encouraging students to pursue careers in science, technology, engineering, and mathematics (STEM) is a high priority for national K-12 education improvement initiatives in the United States. Many educators have claimed that a promising strategy for nurturing early student interest in STEM is to engage them in authentic inquiry experiences. “Authentic” refers to investigations in which the questions are of genuine interest and importance to students, and the inquiry more closely resembles the way real science is done. Science education researchers and practitioners at the Harvard-Smithsonian Center for Astrophysics have put this theory into action with the development of YouthAstroNet, a nationwide online learning community of middle-school aged students, educators, and STEM professionals that features the MicroObservatory Robotic Telescope Network, professional image analysis software, and complementary curricula for use in a variety of learning settings. This preliminary study examines factors that influence YouthAstroNet participants' Science Affinity, STEM Identity, and STEM Career Interest, using the matched pre/post survey results of 261 participants as the data source. The pre/post surveys included some 40 items measuring affinity, identity, knowledge, and career interest. In addition, the post intervention instrument included a number of items in which students reported the instructional strategies they experienced as part of the program. A simple analysis of pre-post changes in affinity and interest revealed very little significant change, and for those items where a small pre-post effect was observed, the average change was most often negative. However, after accounting for students' different program treatment experiences and for their prior attitudes and interests, a predictor of significant student gains in Affinity, STEM Identity, Computer/Math Identity, and STEM Career Interest could be identified. This was the degree to which students reported

  6. Applying the flow-capturing location-allocation model to an authentic network: Edmonton, Canada

    NARCIS (Netherlands)

    M.J. Hodgson (John); K.E. Rosing (Kenneth); A.L.G. Storrier (Leontien)

    1996-01-01

    textabstractTraditional location-allocation models aim to locate network facilities to optimally serve demand expressed as weights at nodes. For some types of facilities demand is not expressed at nodes, but as passing network traffic. The flow-capturing location-allocation model responds to this

  7. Access to Network Login by Three-Factor Authentication for Effective Information Security

    Directory of Open Access Journals (Sweden)

    S. Vaithyasubramanian

    2016-01-01

    Full Text Available Today’s technology development in the field of computer along with internet of things made huge difference in the transformation of our lives. Basic computer framework and web client need to make significant login signify getting to mail, long range interpersonal communication, internet keeping money, booking tickets, perusing online daily papers, and so forth. The login user name and secret key mapping validate if the logging user is the intended client. Secret key is assumed an indispensable part in security. The objective of MFA is to make a layered safeguard and make it more troublesome for an unauthenticated entity to get to an objective, for example, a physical area, processing gadget, system, or database. In the event that one element is bargained or broken, the assailant still has two more boundaries to rupture before effectively breaking into the objective. An endeavor has been made by utilizing three variable types of authentication. In this way managing additional secret key includes an additional layer of security.

  8. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  9. A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Gulshan Kumar

    2017-01-01

    Full Text Available Localization is a concerning issue in the applications of wireless sensor networks. Along with the accuracy of the location estimation of the sensor nodes, the security of the estimation is another priority. Wireless sensor networks often face various attacks where the attackers try to manipulate the estimated location or try to provide false beacons. In this paper, we have proposed a methodology that will address this problem of security aspects in localization of the sensor nodes. Moreover, we have considered the network environment with random node deployment and mobility as these two conditions are less addressed in previous research works. Further, our proposed algorithm provides low overhead due to the usage of less control messages in a limited transmission range. In addition, we have also proposed an algorithm to detect the malicious anchor nodes inside the network. The simulated results show that our proposed algorithm is efficient in terms of time consumption, localization accuracy, and localization ratio in the presence of malicious nodes.

  10. A critical review on the use of artificial neural networks in olive oil production, characterization and authentication.

    Science.gov (United States)

    Gonzalez-Fernandez, I; Iglesias-Otero, M A; Esteki, M; Moldes, O A; Mejuto, J C; Simal-Gandara, J

    2018-01-30

    Artificial neural networks (ANN) are computationally based mathematical tools inspired by the fundamental cell of the nervous system, the neuron. ANN constitute a simplified artificial replica of the human brain consisting of parallel processing neural elements similar to neurons in living beings. ANN is able to store large amounts of experimental information to be used for generalization with the aid of an appropriate prediction model. ANN has proved useful for a variety of biological, medical, economic and meteorological purposes, and in agro-food science and technology. The olive oil industry has a substantial weight in Mediterranean's economy. The different steps of the olive oil production process, which include olive tree and fruit care, fruit harvest, mechanical and chemical processing, and oil packaging have been examined in depth with a view to their optimization, and so have the authenticity, sensory properties and other quality-related properties of olive oil. This paper reviews existing literature on the use of bioinformatics predictive methods based on ANN in connection with the production, processing and characterization of olive oil. It examines the state of the art in bioinformatics tools for optimizing or predicting its quality with a view to identifying potential deficiencies or aspects for improvement.

  11. Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network

    Directory of Open Access Journals (Sweden)

    Samsul Huda

    2016-08-01

    Full Text Available MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code and AES (Advanced Encryption standard schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.

  12. Actor-network Procedures: Modeling Multi-factor Authentication, Device Pairing, Social Interactions

    Science.gov (United States)

    2011-08-29

    is done by broadcast from the sender to all nodes in the network. The recipient does not observe the sender directly (although, of course, the sender...channels: each node broadcasts to all nodes; there is no notion of distance; the recipient cannot observe the sender4 • visual channel: the events at all...on Usable Privacy and Security, SOUPS ’09, pages 38:1–38:1, New York, NY, USA, 2009. ACM. [36] Richard A. Kemmerer, Catherine Meadows, and Jonathan K

  13. Speaker Authentication

    CERN Document Server

    Li, Qi (Peter)

    2012-01-01

    This book focuses on use of voice as a biometric measure for personal authentication. In particular, "Speaker Recognition" covers two approaches in speaker authentication: speaker verification (SV) and verbal information verification (VIV). The SV approach attempts to verify a speaker’s identity based on his/her voice characteristics while the VIV approach validates a speaker’s identity through verification of the content of his/her utterance(s). SV and VIV can be combined for new applications. This is still a new research topic with significant potential applications. The book provides with a broad overview of the recent advances in speaker authentication while giving enough attention to advanced and useful algorithms and techniques. It also provides a step by step introduction to the current state of the speaker authentication technology, from the fundamental concepts to advanced algorithms. We will also present major design methodologies and share our experience in developing real and successful speake...

  14. Increasing Trustworthiness of Face Authentication in Mobile Devices by Modeling Gesture Behavior and Location Using Neural Networks

    OpenAIRE

    Blerim Rexha; Gresa Shala; Valon Xhafa

    2018-01-01

    Personal mobile devices currently have access to a significant portion of their user’s private sensitive data and are increasingly used for processing mobile payments. Consequently, securing access to these mobile devices is a requirement for securing access to the sensitive data and potentially costly services. Face authentication is one of the promising biometrics-based user authentication mechanisms that has been widely available in this era of mobile computing. With a built-in camera capa...

  15. InSight Mission Education and Communication: Powerhouse partners leverage global networks to put authentic planetary science into the hands and minds of students of all ages

    Science.gov (United States)

    Banerdt, W. B.; Jones, J. H.

    2015-12-01

    InSight Mission Education and Communication: Powerhouse Partners Leverage Global Networks To Put Authentic Planetary Science into the Hands and Minds of Students. NASA's InSight (Interior Exploration using Seismic Investigations, Geodesy and Heat Transport) is a NASA Discovery Program mission that will place a single geophysical lander on Mars to study its deep interior. InSight will launch in March 2016 aboard an Atlas V 401 rocket from Space Launch Complex 3E at Vandenberg Air Force Base in California, and land on Mars in September 2016, beginning science return in October 2016.By using sophisticated geophysical instruments, InSight will delve deep beneath the surface of Mars, detecting the fingerprints of the processes of terrestrial planet formation, as well as measuring the planet's "vital signs": Its "pulse" (seismology), "temperature" (heat flow probe), and "reflexes" (precision tracking). InSight's E/PO Partners all of which already work with NSF, Department of Education and NASA will put authentic Mars data and analysis tools in the hands of educators, students and the public. IRIS - Incorporated Research Institutions for Seismology provides lessons, seismograph software, animations, videos, and will use InSight data to focus on how students can compare seismic data from Mars and Earth. SCEC - Southern California Earthquake Center's "Vital Signs of the Planet" professional development program for science teachers is creating, and test teaching standards-aligned STEM materials to help additional teachers work with comparative planetary concepts. They are also installinglow cost strong motion research accelerometers in all participating schools. ASP - Astronomical Society of the Pacific will deliver Planet Core Outreach toolkits with an InSight focus to 380 amateur astronomy clubs engaged in Informal Education. Space Math - delivered twenty standards based mathematics lessons using InSight and Mars physical and science data which enable students to acquire

  16. Authentication Without Secrets

    Energy Technology Data Exchange (ETDEWEB)

    Pierson, Lyndon G. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Robertson, Perry J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  17. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Petersen, Franziska Bork

    2013-01-01

    In this thesis I investigate what 'authenticity' means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of 'bodily authenticity'. ...

  18. Security Enhancement Using Mutual Authentication in Existing CDMA Systems

    OpenAIRE

    L. Krishna Bharathi; Gnanou Florence Sudha

    2010-01-01

    Even though CDMA2000 wireless networks are being widely deployed as a cellular digital standard around the world, it has some hidden vulnerabilities concerned with security issues. The existing CDMA systems use authentication mechanism by CAVE (Cellular Authentication and Voice Encryption) algorithm. This authentication method has several disadvantages. Only one way authentication is provided, that is, only a base station authenticates a subscriber. And, CAVE algorithm is prone to cryptograph...

  19. Network Authentication Protocol Studies

    Science.gov (United States)

    2009-04-01

    This is called the “Decision Diffie-Hellman Problem” ( DDH ) [68]. For the protocols discussed in this paper, the cryptographic strength of the generated...group key is solely dependent upon the strength of the underlying two-party protocols. That said, we will not address the DDH problem further in this

  20. Brand new authentic places

    DEFF Research Database (Denmark)

    Stender, Marie

    created and transformed by architects and designers, estate agents and, eventually, residents? Based on ethnographic fieldwork in 3-4 new residential neighbourhoods in the Copenhagen Region, the project will investigate how stories of authenticity give places meaning and identity. The project will unfold...... neighbourhoods stories of authenticity seems to be of great importance giving value and identity to place and people. By way of design and branding new places are implied with notions of the real, the original and the unique referring to e.g. its historical past, architectural uniqueness, sustainability or sense...

  1. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...

  2. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    analysis should complement and support corporate social responsibility, management spirituality, authentic leadership / authentic follower, and other secular research by offering a research methods bridge between empirically grounded theology and secular studies, with the common goal of improving workplace......This research takes up the concept of authenticity as a criterion variable for theology of the workplace analysis, a domain which explores employment parameters in light of religious teaching on the social question at national, organizational or firm-specific levels. Following a review...... of the concept in Western culture, philosophy, and management studies, Religious Society of Friends (Quaker) and Roman Catholic social teachings are investigated for positively correlative data to help develop the criterion variable. From the literature review of concept and historical data in both traditions...

  3. VIOLIN: vaccine investigation and online information network.

    Science.gov (United States)

    Xiang, Zuoshuang; Todd, Thomas; Ku, Kim P; Kovacic, Bethany L; Larson, Charles B; Chen, Fang; Hodges, Andrew P; Tian, Yuying; Olenzek, Elizabeth A; Zhao, Boyang; Colby, Lesley A; Rush, Howard G; Gilsdorf, Janet R; Jourdian, George W; He, Yongqun

    2008-01-01

    Vaccines are among the most efficacious and cost-effective tools for reducing morbidity and mortality caused by infectious diseases. The vaccine investigation and online information network (VIOLIN) is a web-based central resource, allowing easy curation, comparison and analysis of vaccine-related research data across various human pathogens (e.g. Haemophilus influenzae, human immunodeficiency virus (HIV) and Plasmodium falciparum) of medical importance and across humans, other natural hosts and laboratory animals. Vaccine-related peer-reviewed literature data have been downloaded into the database from PubMed and are searchable through various literature search programs. Vaccine data are also annotated, edited and submitted to the database through a web-based interactive system that integrates efficient computational literature mining and accurate manual curation. Curated information includes general microbial pathogenesis and host protective immunity, vaccine preparation and characteristics, stimulated host responses after vaccination and protection efficacy after challenge. Vaccine-related pathogen and host genes are also annotated and available for searching through customized BLAST programs. All VIOLIN data are available for download in an eXtensible Markup Language (XML)-based data exchange format. VIOLIN is expected to become a centralized source of vaccine information and to provide investigators in basic and clinical sciences with curated data and bioinformatics tools for vaccine research and development. VIOLIN is publicly available at http://www.violinet.org.

  4. Investigating accident causation through information network modelling.

    Science.gov (United States)

    Griffin, T G C; Young, M S; Stanton, N A

    2010-02-01

    Management of risk in complex domains such as aviation relies heavily on post-event investigations, requiring complex approaches to fully understand the integration of multi-causal, multi-agent and multi-linear accident sequences. The Event Analysis of Systemic Teamwork methodology (EAST; Stanton et al. 2008) offers such an approach based on network models. In this paper, we apply EAST to a well-known aviation accident case study, highlighting communication between agents as a central theme and investigating the potential for finding agents who were key to the accident. Ultimately, this work aims to develop a new model based on distributed situation awareness (DSA) to demonstrate that the risk inherent in a complex system is dependent on the information flowing within it. By identifying key agents and information elements, we can propose proactive design strategies to optimize the flow of information and help work towards avoiding aviation accidents. Statement of Relevance: This paper introduces a novel application of an holistic methodology for understanding aviation accidents. Furthermore, it introduces an ongoing project developing a nonlinear and prospective method that centralises distributed situation awareness and communication as themes. The relevance of findings are discussed in the context of current ergonomic and aviation issues of design, training and human-system interaction.

  5. System and method for authentication

    Science.gov (United States)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  6. Framework for network modularization and Bayesian network analysis to investigate the perturbed metabolic network.

    Science.gov (United States)

    Kim, Hyun Uk; Kim, Tae Yong; Lee, Sang Yup

    2011-01-01

    Genome-scale metabolic network models have contributed to elucidating biological phenomena, and predicting gene targets to engineer for biotechnological applications. With their increasing importance, their precise network characterization has also been crucial for better understanding of the cellular physiology. We herein introduce a framework for network modularization and Bayesian network analysis (FMB) to investigate organism's metabolism under perturbation. FMB reveals direction of influences among metabolic modules, in which reactions with similar or positively correlated flux variation patterns are clustered, in response to specific perturbation using metabolic flux data. With metabolic flux data calculated by constraints-based flux analysis under both control and perturbation conditions, FMB, in essence, reveals the effects of specific perturbations on the biological system through network modularization and Bayesian network analysis at metabolic modular level. As a demonstration, this framework was applied to the genetically perturbed Escherichia coli metabolism, which is a lpdA gene knockout mutant, using its genome-scale metabolic network model. After all, it provides alternative scenarios of metabolic flux distributions in response to the perturbation, which are complementary to the data obtained from conventionally available genome-wide high-throughput techniques or metabolic flux analysis.

  7. Integrated microfluidic platforms for investigating neuronal networks

    Science.gov (United States)

    Kim, Hyung Joon

    This dissertation describes the development and application of integrated microfluidics-based assay platforms to study neuronal activities in the nervous system in-vitro. The assay platforms were fabricated using soft lithography and micro/nano fabrication including microfluidics, surface patterning, and nanomaterial synthesis. The use of integrated microfluidics-based assay platform allows culturing and manipulating many types of neuronal tissues in precisely controlled microenvironment. Furthermore, they provide organized multi-cellular in-vitro model, long-term monitoring with live cell imaging, and compatibility with molecular biology techniques and electrophysiology experiment. In this dissertation, the integrated microfluidics-based assay platforms are developed for investigation of neuronal activities such as local protein synthesis, impairment of axonal transport by chemical/physical variants, growth cone path finding under chemical/physical cues, and synaptic transmission in neuronal circuit. Chapter 1 describes the motivation, objectives, and scope for developing in-vitro platform to study various neuronal activities. Chapter 2 introduces microfluidic culture platform for biochemical assay with large-scale neuronal tissues that are utilized as model system in neuroscience research. Chapter 3 focuses on the investigation of impaired axonal transport by beta-Amyloid and oxidative stress. The platform allows to control neuronal processes and to quantify mitochondrial movement in various regions of axons away from applied drugs. Chapter 4 demonstrates the development of microfluidics-based growth cone turning assay to elucidate the mechanism underlying axon guidance under soluble factors and shear flow. Using this platform, the behaviors of growth cone of mammalian neurons are verified under the gradient of inhibitory molecules and also shear flow in well-controlled manner. In Chapter 5, I combine in-vitro multicellular model with microfabricated MEA

  8. Authentic Teachers: Student Criteria Perceiving Authenticity of Teachers

    Science.gov (United States)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2016-01-01

    Authenticity is seen by many as a key for good learning and education. There is talk of authentic instruction, authentic learning, authentic problems, authentic assessment, authentic tools and authentic teachers. The problem is that while authenticity is an often-used adjective describing almost all aspects of teaching and learning, the concept…

  9. A Review Of Multimodal Biometric Authentication Systems

    Directory of Open Access Journals (Sweden)

    Kunal Kumar

    2015-08-01

    Full Text Available Authentication is the process of validating the identity of a person based on certain input that the person provides. Authentication has become a major topic of research due to the increasing number of attacks on computer networks around the globe. This review paper focuses on multimodal biometric authentication systems in use today. The aim is to elicit the best combination of authentication factors for multimodal use. We study the strengths and weakness of selected biometric mechanisms and recommend novel solutions to include in multimodal biometric systems to improve on the current biometric drawbacks. We believe this paper will provide security researchers some useful insight whilst designing better biometric systems.

  10. Tibetan Interpretations of Authenticity

    DEFF Research Database (Denmark)

    Sobisch, Jan-Ulrich

    2015-01-01

    The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions.......The four means of authentication are arguments for the authentication of Buddhist teachings in a Tibetan tradition. Different traditions emphasize different means of authentication. These reveal interesting facts about the self-image of these traditions....

  11. Investigation of the properties of fully reacted unstoichiometric polydimethylsiloxane networks and their extracted network fractions

    DEFF Research Database (Denmark)

    Frankær, Sarah Maria Grundahl; Jensen, Mette Krog; Bejenariu, Anca Gabriela

    2012-01-01

    We investigated the linear dynamic response of a series of fully reacted unstoichiometric polydimethylsiloxane (PDMS) networks and of the two corresponding network fractions namely the sol and the washed network. The sol and the washed network were separated by a simple extraction process. This way...

  12. AIS authentication

    CERN Multimedia

    2006-01-01

    Users are invited to use the NICE password for AIS authentication. As announced in CNL June-August 2006 (see http://www.cerncourier.com/articles/cnl/3/6/14/1) it is possible to use the NICE username and password to log on to AIS. The procedure is now fully operational and users can themselves reset the AIS password such that the NICE password will be used for authentication required by AIS applications. We strongly recommend CERN users who have a NICE account (this is the case of most users) to do this, with the objective to reduce the number of passwords they need to remember. This can be achieved very easily, directly from the Change Password option on the AIS login (https://aislogin.cern.ch/). Users should just select the '[Change Password]' option displayed at the bottom of the page, provide the 'Old Password' and then click on the button 'Use Nice password' followed by 'Submit'. Change Password option on the AIS login windowSetting the AIS password - Use Nice Password It should be noted that the proce...

  13. AUTHENTIC LEADERSHIP IN EDUCATIONAL INSTITUTIONS

    Directory of Open Access Journals (Sweden)

    Nebojsa Pavlovic

    2015-06-01

    Full Text Available This work investigates authentic leadership models in the organizational culture of a school. The aim of this quantitative research is to define the factors of authentic leadership in educational institutions in order to provide answers to the questions related to the existence of specific authentic leadership in a school. The sample included 227 randomly selected directors of secondary and primary schools in the former Yugoslav republics: Serbia, Montenegro, and the Republic Srpska. The research included the use of an ALQ questionnaire for the estimation of leadership behavior. The components of authentic leadership are defined using factor analysis and other statistics techniques. The findings developed in this research indicated the fact that directors in educational institutions have a specific authentic leadership style. We suggest the concept of authentic leadership based on the four following factors: Communication-conformist, self-consciousness, self-discovery, and self-concept. Supporting these factors provides the directors with the possibility of obtaining a high level of authentic leadership.

  14. Authenticity and commoditization at home

    DEFF Research Database (Denmark)

    Stender, Marie

    This paper investigates how interest and affect are entangled in the built environment of new Danish homes. The paper unfolds tensions and conflicts in the process from design through branding to occupancy of the house, and the relationship between authenticity and commoditization is explored....... The aim is to unfold how forces of commoditization and singularization intertwine as the house is transformed from an architectural expression into real estate for sale and eventually into somebody's home. What tensions are revealed in this process and how are interest and affect entangled? Authenticity...... seems to be a key concept in contemporary branding of products, places, and more recently also private homes. On the one hand authenticity thus seems to be closely related to the commercial value of things, on the other hand the authentic is held to be an expression of an inner nature or feeling...

  15. Robustness of digital artist authentication

    DEFF Research Database (Denmark)

    Jacobsen, Robert; Nielsen, Morten

    is in focus, while the robustness has not been considered, i.e. the degree to which the data collection process influences the decision of the method. However, in order for an authentication method to be successful in practice, it needs to be robust to plausible error sources from the data collection....... In this paper we investigate the robustness of the newly proposed authenticity method introduced by the authors based on second generation multiresolution analysis. This is done by modelling a number of realistic factors that can occur in the data collection.......In many cases it is possible to determine the authenticity of a painting from digital reproductions of the paintings; this has been demonstrated for a variety of artists and with different approaches. Common to all these methods in digital artist authentication is that the potential of the method...

  16. Should Teachers Be Authentic?

    Science.gov (United States)

    Bialystok, Lauren

    2015-01-01

    Authenticity is often touted as an important virtue for teachers. But what do we mean when we say that a teacher ought to be "authentic"? Research shows that discussions of teacher authenticity frequently refer to other character traits or simply to teacher effectiveness, but authenticity is a unique concept with a long philosophical…

  17. Investigating physics learning with layered student interaction networks

    DEFF Research Database (Denmark)

    Bruun, Jesper; Traxler, Adrienne

    Centrality in student interaction networks (SINs) can be linked to variables like grades [1], persistence [2], and participation [3]. Recent efforts in the field of network science have been done to investigate layered - or multiplex - networks as mathematical objects [4]. These networks can be e......, this study investigates how target entropy [5,1] and pagerank [6,7] are affected when we take time and modes of interaction into account. We present our preliminary models and results and outline our future work in this area....

  18. Definition of Entity Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2010-01-01

    Authentication is considered a pre-requisite for communication security, but the definition of authentication is generally not agreed upon. Many attacks on authentication protocols are the result of misunderstanding of the goals of authentication. This state of affairs indicate limitations...... in theoretical understanding of the meanings of authentication. We provide a new insight in this direction and formalize it in CFPS (Common Framework for authentication Protocols' Specifications). CFPS provides a precise scope of definition for authentication protocols, which could make the design and analysis...

  19. Network of educational investigation: Teaching innovatio

    Directory of Open Access Journals (Sweden)

    Rosana de Pablo Redondo

    2011-04-01

    Full Text Available The new educational reality, with the introduction of the European Higher Education Area (EHEA; and new requirements for education require a rethinking of the teaching process, which will use new technologies as key instruments. However, the concept of educational innovation goes beyond the widespread use of Information Technologies (IT. Structural changes are needed in educational institutions, which must be reorganized according to a new paradigm.This paper presents the strategic transformation developed by the National University of Distance Education (UNED; which involves the introduction of new instruments, new methodologies for current and prospective students and a new network organizational structure that facilitates global access to content and new methodologies. We emphasize Teaching Innovation Network, with special attention to the Educational Innovation in Finance. It shows a real example of combination of institutional change and educational initiatives. It combines efforts towards a better service and attention to students and the rest of the university community. And last, but not least, this new paradigm it is not only feasible but efficient because improvements outweigh organizational implications and economic costs

  20. Efficient biometric authenticated key agreements based on extended chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Lou, Der-Chyuan; Lee, Tian-Fu; Lin, Tsung-Hung

    2015-05-01

    Authenticated key agreements for telecare medicine information systems provide patients, doctors, nurses and health visitors with accessing medical information systems and getting remote services efficiently and conveniently through an open network. In order to have higher security, many authenticated key agreement schemes appended biometric keys to realize identification except for using passwords and smartcards. Due to too many transmissions and computational costs, these authenticated key agreement schemes are inefficient in communication and computation. This investigation develops two secure and efficient authenticated key agreement schemes for telecare medicine information systems by using biometric key and extended chaotic maps. One scheme is synchronization-based, while the other nonce-based. Compared to related approaches, the proposed schemes not only retain the same security properties with previous schemes, but also provide users with privacy protection and have fewer transmissions and lower computational cost.

  1. On investigating social dynamics in tactical opportunistic mobile networks

    Science.gov (United States)

    Gao, Wei; Li, Yong

    2014-06-01

    The efficiency of military mobile network operations at the tactical edge is challenging due to the practical Disconnected, Intermittent, and Limited (DIL) environments at the tactical edge which make it hard to maintain persistent end-to-end wireless network connectivity. Opportunistic mobile networks are hence devised to depict such tactical networking scenarios. Social relations among warfighters in tactical opportunistic mobile networks are implicitly represented by their opportunistic contacts via short-range radios, but were inappropriately considered as stationary over time by the conventional wisdom. In this paper, we develop analytical models to probabilistically investigate the temporal dynamics of this social relationship, which is critical to efficient mobile communication in the battlespace. We propose to formulate such dynamics by developing various sociological metrics, including centrality and community, with respect to the opportunistic mobile network contexts. These metrics investigate social dynamics based on the experimentally validated skewness of users' transient contact distributions over time.

  2. Cost Effective RADIUS Authentication for Wireless Clients

    Directory of Open Access Journals (Sweden)

    Alexandru ENACEANU

    2010-12-01

    Full Text Available Network administrators need to keep administrative user information for each network device, but network devices usually support only limited functions for user management. WLAN security is a modern problem that needs to be solved and it requires a lot of overhead especially when applied to corporate wireless networks. Administrators can set up a RADIUS server that uses an external database server to handle authentication, authorization, and accounting for network security issues.

  3. Investigation of efficient features for image recognition by neural networks.

    Science.gov (United States)

    Goltsev, Alexander; Gritsenko, Vladimir

    2012-04-01

    In the paper, effective and simple features for image recognition (named LiRA-features) are investigated in the task of handwritten digit recognition. Two neural network classifiers are considered-a modified 3-layer perceptron LiRA and a modular assembly neural network. A method of feature selection is proposed that analyses connection weights formed in the preliminary learning process of a neural network classifier. In the experiments using the MNIST database of handwritten digits, the feature selection procedure allows reduction of feature number (from 60 000 to 7000) preserving comparable recognition capability while accelerating computations. Experimental comparison between the LiRA perceptron and the modular assembly neural network is accomplished, which shows that recognition capability of the modular assembly neural network is somewhat better. Copyright © 2011 Elsevier Ltd. All rights reserved.

  4. Post-Session Authentication

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.

    2012-01-01

    Entity authentication provides confidence in the claimed identity of a peer entity, but the manner in which this goal is achieved results in different types of authentication. An important factor in this regard is the order between authentication and the execution of the associated session. In th...... as the only setup assumption. We hope post-session authentication can be used to devise new strategies for building trust among strangers....

  5. HOW AUTHENTIC SHOULD A LEARNING CONTEXT BE? USING REAL AND SIMULATED PROFILES IN A CLASSROOM INTERVENTION TO IMPROVE SAFETY ON SOCIAL NETWORK SITES

    Directory of Open Access Journals (Sweden)

    Ellen Vanderhoven

    2015-06-01

    Full Text Available With the rise of social network sites (SNSs, there is an increasing need for safety education within the current cyber society. To this end, a variety of educational materials have been developed to prepare children to be vigilant when interacting on such sites. However, little is known about the critical design aspects necessary to make these materials effective. In this study, we build on the results of two previous studies, in which we found that general instructional principles drawn from constructivism, such as collaborative learning, are not always appropriate to teach children how to behave safely online. This study therefore focuses on the importance of authentic learning and active learning as critical design features. A quasi-experimental study was conducted in secondary schools in order to compare the impact of two classroom interventions about the risks on SNSs. As part of the intervention, students were presented scaffolds towards different risks related to an SNS-profile through a series of questions. In the control condition, these questions concerned a simulated SNS-profile on paper containing signs of many risks. In the experimental condition, students had to answer the same questions about their own SNS-profile on a computer. It was hypothesized that the simulated profile would not be experienced as realistic, and that students would have difficulties identifying with it. On the other hand, teenagers were expected to be able to recognize more risks on the simulated ‘worst-case scenario’ profile than on their own profile, which would facilitate the scaffolding process in the control condition. The results of the study mostly confirmed these hypotheses. Furthermore, the question arose as to whether the intervention based on the student’s own realistic profile was educationally more valuable than the intervention based on the simulated profile, but no such added value was found. On the contrary, the scaffolding questions

  6. Authenticity in Adult Learning

    Science.gov (United States)

    Ashton, Sam

    2010-01-01

    This paper is concerned with the relationship between authenticity and adult learning and prompted by some studies in which adult "authentic learning" is a central concept. The implication revealed by them is that real-worldness of learning contexts, learning content and learning tasks is perceived as conferring authenticity on learning. Here,…

  7. Authenticating the Leader

    DEFF Research Database (Denmark)

    Garmann Johnsen, Christian

    2018-01-01

    In the wake of a series of corporate scandals, there has been a growing call for authentic leadership in order to ensure ethical conduct in contemporary organizations. Authentic leadership, however, depends upon the ability to draw a distinction between the authentic and inauthentic leader. This ...... or her own value-commitments....

  8. Authentication Assurance Levels

    International Nuclear Information System (INIS)

    Kouzes, Richard T.; Cash, James R.; Devaney, David M.; Geelhood, Bruce D.; Hansen, Randy R.; Melton, Ronald B.; Pitts, W. Karl

    2002-01-01

    This Common Criteria approach has been applied to create a definition of Authentication Assurance Levels that can quantify the level of assurance reached for a system subject to a set of authentication procedures. The arms-control authentication application of the Common Criteria expands on more typical information security evaluations in that it must contend with information barriers and preclude sophisticated intentional subversion attempts.

  9. Investigation of multimedia didactic courseware of network on image diagnosis

    International Nuclear Information System (INIS)

    Yang Xiaochun; Gong Jianping; Shen Junkang; Lu Zhian; Chen Guangqiang

    2001-01-01

    Objective: To investigate the methods of the design of multimedia didactic courseware of network on image diagnosis and its characteristic. Methods: Based on the teaching material of 'image diagnosis', the images were collected with computers and scanners, and processed with graphic software, and then the multimedia didactic courseware was designed with Frontpage. Results: The design of multimedia didactic courseware of network has been completed. Domain name has been applied. Part of the courseware has been passed to the website. Conclusion: Multimedia didactic courseware of network, with bright prospects, is superior in agility of didactic style, in abundance of content, and in timeliness of information

  10. Children's and Adolescents' Perception of the Authenticity of Smiles

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-01-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six…

  11. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    Energy Technology Data Exchange (ETDEWEB)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  12. Multi-factor authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  13. Authenticity or School-only?

    DEFF Research Database (Denmark)

    Fougt, Simon Skov

    Challenging the apparent distinction among educational researchers between ‘authenticity’ outside schools and ‘school-only’ inside schools, this paper investigates the concept of meaningfulness from different perspectives with a focus on formal learning in schools, as it states that teaching...... and learning inside school also can be authentic....

  14. Using Action Research to Investigate Social Networking Technologies

    Science.gov (United States)

    Worrall, Lisa; Harris, Katy

    2013-01-01

    This article outlines the first cycle of an Action Research (AR) investigation into why professional learners are not using the Social Networking Technologies (SNTs) of their bespoke website. It presents the rationale of how this study came about, the ontological and epistemological stance of the authors and how this led to the particular choice…

  15. Data Authentication Demonstration for Radionuclide Stations

    Energy Technology Data Exchange (ETDEWEB)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  16. Application of artificial neural networks to determine the authentication of fattening diets of Iberian pigs according to their triacylglycerol profiles

    Directory of Open Access Journals (Sweden)

    León-Camacho, M.

    2013-04-01

    Full Text Available The triacylglycerols in the subcutaneous fat from Iberian pigs reared on four different feeding types, Montanera, Recebo, extensive Cebo and intensive Cebo, have been determined by gas chromatography with a flame ionization detector. Analyses were performed in a column coated with a bonded stationary phase (50% phenyl-50% methylpolysiloxane with hydrogen as the carrier gas. Lipids were extracted by melting the subcutaneous fat in a microwave oven and then filtering and dissolving it in hexane. A total amount of 2783 samples from several campaigns were considered. Using the triacylglycerols as chemical descriptors, a study on the discriminating power to differentiate samples according to the pig feeding type and system was performed. With this aim, pattern recognition techniques, such as linear discriminant analysis (LDA and multilayer perceptron artificial neural networks (MLPANN, have been used. ANN performed better than LDA, with a mean prediction ability of approximately 97% in the differentiation of fattening diets such as Montanera, extensive Cebo and intensive Cebo. In the case of including the recebo fattening diet, the model presents a mean performance of 82%. The differentiation of fattening systems has also been achieved by means of ANN, with a mean performance of 96%.Se ha determinado mediante cromatografía de gases con detector de ionización de llama los triglicéridos de la grasa subcutánea de cerdos ibéricos, cebados con cuatro tipos de alimentación: montanera, recebo, cebo extensivo y cebo intensivo. Los análisis se realizaron en una columna con una fase estacionaria ligada químicamente (50% fenil-50% metilpolisiloxano usando hidrógeno como gas portador. La grasa subcutánea se extrajo por fusión en horno de microondas, posteriormente se filtró y se disolvió en hexano. Un total de 2.783 muestras de varias campañas fueron analizadas. Usando los triglicéridos como descriptores químicos se ha llevado a cabo un estudio

  17. Xavier's Take on Authentic Writing: Structuring Choices for Expression and Impact

    Science.gov (United States)

    Behizadeh, Nadia

    2015-01-01

    Because authenticity in education is a subjective judgment regarding the meaningfulness of an activity, a need exists to co-investigate with students classroom factors increasing authenticity of writing. In this case study, one 8th grade student's needs for authentic writing are explored in detail. Xavier's take on authentic writing…

  18. Authentication: Hot and cool

    OpenAIRE

    Cohen, E; Cohen, SA

    2012-01-01

    Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, “cool” and “hot”. Through a range of examples, we demonstrate the implications of the two modes for the dynamics of the constitution of tourist attr...

  19. Reading Authentic Texts

    DEFF Research Database (Denmark)

    Balling, Laura Winther

    2013-01-01

    Most research on cognates has focused on words presented in isolation that are easily defined as cognate between L1 and L2. In contrast, this study investigates what counts as cognate in authentic texts and how such cognates are read. Participants with L1 Danish read news articles in their highly...... proficient L2, English, while their eye-movements were monitored. The experiment shows a cognate advantage for morphologically simple words, but only when cognateness is defined relative to translation equivalents that are appropriate in the context. For morphologically complex words, a cognate disadvantage...... is observed which may be due to problems of integrating cognate with non-cognate morphemes. The results show that fast non-selective access to the bilingual lexicon is conditioned by the communicative context. Importantly, a range of variables are statistically controlled in the regression analyses, including...

  20. The embodiment of authentic leadership.

    Science.gov (United States)

    Waite, Roberta; McKinney, Nicole; Smith-Glasgow, Mary Ellen; Meloy, Faye A

    2014-01-01

    Development of student leadership capacity and efficacy is critical to the nursing profession, and vital to this process is a strong foundation in critical thinking that includes a depth of understanding of self (i.e., authentic leadership development). This article will (a) present a theoretical overview of authentic leadership as compared with other popular leadership theories, (b) provide an overview of development/implementation of an authentic leadership course, the first in a series of six one-credit courses as an integral component of the Macy Undergraduate Leadership Fellows Program for upper-level nursing students, and (c) discuss related implications for nursing education. Findings from an investigator-developed quantitative pre-post survey and qualitative evaluation questions are provided. Student feedback regarding the comprehensive nature of the course was extremely positive and affirmed the value of introspection associated with authentic leadership in ongoing personal and professional development. Critical pedagogy and action-oriented learning strategies also proved beneficial to student engagement. Copyright © 2014 Elsevier Inc. All rights reserved.

  1. Authenticity and autochthonous traditions in archaic and Hellenistic poetry

    NARCIS (Netherlands)

    Klooster, Julia; Bakker, Egbert J.

    J.J.H. Klooster, ‘Authenticity and autochthonous traditions in archaic and Hellenistic poetry’. In E. Bakker (ed): Authorship, Authority and Authenticity in Archaic and Classical Greek Song. Proceedings of the Network for the Study of Archaic and Classical Greek Song, Vol. 2, Leiden: Brill

  2. Investigating the effects of virtual social networks on entrepreneurial marketing

    OpenAIRE

    Kambeiz Talebi; Mahnaz Behrad; Amir Ekhlassi

    2014-01-01

    This paper presents an empirical investigation to study the effects of virtual social networks on entrepreneurial marketing. The study designs a questionnaire in Likert scale based on a model originally developed by Morris et al. (2002) [Morris, M. H., Schindehutte, M., & LaForge, R. W. (2002). Entrepreneurial marketing: a construct for integrating emerging entrepreneurship and marketing perspectives. Journal of Marketing Theory and Practice, 10(4), 1-19.]. The study considers the effects of ...

  3. Towards distortion-free robust image authentication

    International Nuclear Information System (INIS)

    Coltuc, D

    2007-01-01

    This paper investigates a general framework for distortion-free robust image authentication by multiple marking. First, by robust watermarking a subsampled version of image edges is embedded. Then, by reversible watermarking the information needed to recover the original image is inserted, too. The hiding capacity of the reversible watermarking is the essential requirement for this approach. Thus in case of no attacks not only image is authenticated but also the original is exactly recovered. In case of attacks, reversibility is lost, but image can still be authenticated. Preliminary results providing very good robustness against JPEG compression are presented

  4. Authenticity at work

    NARCIS (Netherlands)

    van den Bosch, Ralph

    2016-01-01

    Authenticity at work, loosely defined as the degree to which an individual stays true to their core self, has impact on workers in the workplace. This thesis shows that authenticity at work can be measured with a reliable and valid instrument: the IAM Work. Furthermore, results of this thesis show

  5. Proteomics for the authentication of fish species.

    Science.gov (United States)

    Mazzeo, Maria Fiorella; Siciliano, Rosa Anna

    2016-09-16

    Assessment of seafood authenticity and origin, mainly in the case of processed products (fillets, sticks, baby food) represents the crucial point to prevent fraudulent deceptions thus guaranteeing market transparency and consumers health. The most dangerous practice that jeopardies fish safety is intentional or unintentional mislabeling, originating from the substitution of valuable fish species with inferior ones. Conventional analytical methods for fish authentication are becoming inadequate to comply with the strict regulations issued by the European Union and with the increase of mislabeling due to the introduction on the market of new fish species and market globalization. This evidence prompts the development of high-throughput approaches suitable to identify unambiguous biomarkers of authenticity and screen a large number of samples with minimal time consumption. Proteomics provides suitable and powerful tools to investigate main aspects of food quality and safety and has given an important contribution in the field of biomarkers discovery applied to food authentication. This report describes the most relevant methods developed to assess fish identity and offers a perspective on their potential in the evaluation of fish quality and safety thus depicting the key role of proteomics in the authentication of fish species and processed products. The assessment of fishery products authenticity is a main issue in the control quality process as deceptive practices could imply severe health risks. Proteomics based methods could significantly contribute to detect falsification and frauds, thus becoming a reliable operative first-line testing resource in food authentication. Copyright © 2016 Elsevier B.V. All rights reserved.

  6. Examining the relationship between authenticity and self-handicapping.

    Science.gov (United States)

    Akin, Ahmet; Akin, Umran

    2014-12-01

    Self-handicapping includes strategies of externalization in which people excuse failure and internalize success, but which also prevents them from behaving in an authentic way. The goal was to investigate the relation of authenticity with self-handicapping. The study was conducted with 366 university students (176 men, 190 women; M age = 20.2 yr.). Participants completed the Turkish version of the Authenticity Scale and the Self-handicapping Scale. Self-handicapping was correlated positively with two factors of authenticity, accepting external influence and self-alienation, and negatively with the authentic living factor. A multiple regression analysis indicated that self-handicapping was predicted positively by self-alienation and accepting external influence and negatively by authentic living, accounting for 21% of the variance collectively. These results demonstrated the negative association of authenticity with self-handicapping.

  7. Perceived Authenticity of the Visitor Experience in Museums

    DEFF Research Database (Denmark)

    Hede, Anne-Marie; Garma, Romana; Josiassen, Alexander

    2014-01-01

    of perceived authenticity, resonating with Bal's (1996) research in this area. Findings also confirm that consumer scepticism and expectations are antecedents to perceived authenticity of the visitor experience in museums, and that perceived authenticity in turn affects visitor satisfaction and perceived...... corporate hypocrisy. Practical implications -This research provides a framework for museums to manage visitors' perceptions of authenticity, and to plan and design exhibits accordingly. Originality/value - Our research, set in the museum context, articulates the basis of perceived authenticity, its....... To investigate authenticity in a model with two antecedents and two outcomes, an additional data set was collected. Hypotheses were tested using structural equation modelling. Findings -The results show that perceived authenticity of the museum, the visitor and the materials in the museum are dimensions...

  8. AUTHENTICITY IN THE BLOGOSPHERE

    Directory of Open Access Journals (Sweden)

    Waclaw Branicki

    2010-01-01

    Full Text Available The primary purpose of this article is to answer the question of whether writing a blog defined as a personal diary can help to better understand himself. Self-awareness is a prerequisite for authentic existence. In the first part analyzed the concept of authenticity. Pointed out the relationship of authenticity to the categories of freedom, truth and responsibility. The second part presents the relationship between authentic existence and the process of self-disclosure, which may take place in the blogosphere. In the third part presents the question whether a writing blog affects the level authenticity of existence. It was recognized that a key element of this phenomenon is the sense of responsibility.

  9. Investigating the effects of virtual social networks on entrepreneurial marketing

    Directory of Open Access Journals (Sweden)

    Kambeiz Talebi

    2014-10-01

    Full Text Available This paper presents an empirical investigation to study the effects of virtual social networks on entrepreneurial marketing. The study designs a questionnaire in Likert scale based on a model originally developed by Morris et al. (2002 [Morris, M. H., Schindehutte, M., & LaForge, R. W. (2002. Entrepreneurial marketing: a construct for integrating emerging entrepreneurship and marketing perspectives. Journal of Marketing Theory and Practice, 10(4, 1-19.]. The study considers the effects of three components of virtual social network (VSN; namely structural VSN, interaction VSN and functional VSN on entrepreneurial marketing. Using structural equation modeling, the study has determined positive and meaningful effects of all three VSN components on entrepreneurial marketing.

  10. Investigation of Wireless Sensor Networks for Structural Health Monitoring

    Directory of Open Access Journals (Sweden)

    Ping Wang

    2012-01-01

    Full Text Available Wireless sensor networks (WSNs are one of the most able technologies in the structural health monitoring (SHM field. Through intelligent, self-organising means, the contents of this paper will test a variety of different objects and different working principles of sensor nodes connected into a network and integrated with data processing functions. In this paper the key issues of WSN applied in SHM are discussed, including the integration of different types of sensors with different operational modalities, sampling frequencies, issues of transmission bandwidth, real-time ability, and wireless transmitter frequency. Furthermore, the topology, data fusion, integration, energy saving, and self-powering nature of different systems will be investigated. In the FP7 project “Health Monitoring of Offshore Wind Farms,” the above issues are explored.

  11. A game theoretic investigation of deception in network security

    Energy Technology Data Exchange (ETDEWEB)

    Carroll, Thomas E.; Grosu, Daniel

    2010-12-03

    We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. Finally, we discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network.

  12. Gsm Networks: A Review Of Security Threats And Mitigation Measures

    African Journals Online (AJOL)

    Gsm Networks: A Review Of Security Threats And Mitigation Measures. ... Information Manager (The) ... This paper investigates the security measures used in GSM networks which include Authentication, Encryption, Equipment Identification and Subscriber Identity Confidentiality, as well as the manifestation of network ...

  13. Backend solutions for AA in the MUSE network supporting FMC

    NARCIS (Netherlands)

    Neerbos, A.N.R. van; Prins, M.; Melander, B.; Pimilla Larrucea, I.; Thakur, M.J.; Fredricx, F.

    2007-01-01

    The European MUSE project investigated fixed-mobile convergence from the perspective of an unbundled fixed network. A major part of the work consisted of finding solutions for the authentication and authorisation of users who roam from their home network to a visited network. This paper shows how AA

  14. Biometric Authentication System on Mobile Personal Devices

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    We propose a secure, robust, and low-cost biometric authentication system on the mobile personal device for the personal network. The system consists of the following five key modules: 1) face detection; 2) face registration; 3) illumination normalization; 4) face verification; and 5) information

  15. Biometric authentication for a mobile personal device

    NARCIS (Netherlands)

    Tao, Q.; Veldhuis, Raymond N.J.

    2006-01-01

    Secure access is prerequisite for a mobile personal device (MPD) in a personal network (PN). An authentication method using biometrics, specifically face, is proposed in this paper. A fast face detection and registration method based on a Viola-Jones detector is implemented, and a

  16. Maths Meets Myths: Network Investigations of Ancient Narratives

    Science.gov (United States)

    Kenna, Ralph; Mac Carron, Pádraig

    2016-02-01

    Three years ago, we initiated a programme of research in which ideas and tools from statistical physics and network theory were applied to the field of comparative mythology. The eclecticism of the work, together with the perspectives it delivered, led to widespread media coverage and academic discussion. Here we review some aspects of the project, contextualised with a brief history of the long relationship between science and the humanities. We focus in particular on an Irish epic, summarising some of the outcomes of our quantitative investigation. We also describe the emergence of a new sub-discipline and our hopes for its future.

  17. ESnet authentication services and trust federations

    International Nuclear Information System (INIS)

    Muruganantham, Dhivakaran; Helm, Mike; Genovese, Tony

    2005-01-01

    ESnet provides authentication services and trust federation support for SciDAC projects, collaboratories, and other distributed computing applications. The ESnet ATF team operates the DOEGrids Certificate Authority, available to all DOE Office of Science programs, plus several custom CAs, including one for the National Fusion Collaboratory and one for NERSC. The secure hardware and software environment developed to support CAs is suitable for supporting additional custom authentication and authorization applications that your program might require. Seamless, secure interoperation across organizational and international boundaries is vital to collaborative science. We are fostering the development of international PKI federations by founding the TAGPMA, the American regional PMA, and the worldwide IGTF Policy Management Authority (PMA), as well as participating in European and Asian regional PMAs. We are investigating and prototyping distributed authentication technology that will allow us to support the 'roaming scientist' (distributed wireless via eduroam), as well as more secure authentication methods (one-time password tokens)

  18. Richard Peters and Valuing Authenticity

    Science.gov (United States)

    Degenhardt, M. A. B.

    2009-01-01

    Richard Peters has been praised for the authenticity of his philosophy, and inquiry into aspects of the development of his philosophy reveals a profound authenticity. Yet authenticity is something he seems not to favour. The apparent paradox is resolved by observing historical changes in the understanding of authenticity as an important value.…

  19. Authenticity and Constructivism in Education

    Science.gov (United States)

    Splitter, Laurance J.

    2009-01-01

    This paper examines the concept of authenticity and its relevance in education, from a philosophical perspective. Under the heading of educational authenticity (EA), I critique Fred Newmann's views on authentic pedagogy and intellectual work. I argue against the notion that authentic engagement is usefully analyzed in terms of a relationship…

  20. A Review Of Authentication Methods

    Directory of Open Access Journals (Sweden)

    Nilesh A. Lal

    2015-08-01

    Full Text Available Authentication is process of granting a user access to an information system. There are three main types of authentication mechanisms password entry smart card and biometric. Each authentication mechanism functions differently and has their strengths and weakness. In this paper we review different types of authentication mechanisms their vulnerabilities and recommend novel solutions.

  1. Authenticity and its Contemporary Challenges

    DEFF Research Database (Denmark)

    Bork Petersen, Franziska

    2013-01-01

    In this thesis I investigate what ‘authenticity’ means in a contemporary popular context and how it is used in the staging of bodies. Furthermore, I analyse works of dance and fashion from the past fifteen years with a focus on their strategies of challenging the notion of ‘bodily authenticity...... self’. I scrutinise the staging techniques and the codes of appearance that bodies have to comply with in order to be deemed ‘authentic’ on the shows. To define them and place them in the history of the idea of ‘bodily authenticity’, I complement my study with an outline of how ‘authenticity...... and by a depiction of 'working hard'. But various techniques also mask the hard work, for example by showing a participant ‘having fun’ performing it. Contemporary works of dance and fashion challenge the problematic implications in the notion of ‘bodily authenticity’. I analyse three strategies of undermining...

  2. Power Quality Investigation of Distribution Networks Embedded Wind Turbines

    Directory of Open Access Journals (Sweden)

    A. Elsherif

    2016-01-01

    Full Text Available In recent years a multitude of events have created a new environment for the electric power infrastructure. The presence of small-scale generation near load spots is becoming common especially with the advent of renewable energy sources such as wind power energy. This type of generation is known as distributed generation (DG. The expansion of the distributed generators- (DGs- based wind energy raises constraints on the distribution networks operation and power quality issues: voltage sag, voltage swell, voltage interruption, harmonic contents, flickering, frequency deviation, unbalance, and so forth. Consequently, the public distribution network conception and connection studies evolve in order to keep the distribution system operating in optimal conditions. In this paper, a comprehensive power quality investigation of a distribution system with embedded wind turbines has been carried out. This investigation is carried out in a comparison aspect between the conventional synchronous generators, as DGs are widely in use at present, and the different wind turbines technologies, which represent the foresightedness of the DGs. The obtained results are discussed with the IEC 61400-21 standard for testing and assessing power quality characteristics of grid-connected wind energy and the IEEE 1547-2003 standard for interconnecting distributed resources with electric power systems.

  3. Infusing Authentic Inquiry into Biotechnology

    Science.gov (United States)

    Hanegan, Nikki L.; Bigler, Amber

    2009-10-01

    Societal benefit depends on the general public's understandings of biotechnology (Betsch in World J Microbiol Biotechnol 12:439-443, 1996; Dawson and Cowan in Int J Sci Educ 25(1):57-69, 2003; Schiller in Business Review: Federal Reserve Bank of Philadelphia (Fourth Quarter), 2002; Smith and Emmeluth in Am Biol Teach 64(2):93-99, 2002). A National Science Foundation funded survey of high school biology teachers reported that hands-on biotechnology education exists in advanced high school biology in the United States, but is non-existent in mainstream biology coursework (Micklos et al. in Biotechnology labs in American high schools, 1998). The majority of pre-service teacher content preparation courses do not teach students appropriate content knowledge through the process of inquiry. A broad continuum exists when discussing inquiry-oriented student investigations (Hanegan et al. in School Sci Math J 109(2):110-134, 2009). Depending on the amount of structure in teacher lessons, inquiries can often be categorized as guided or open. The lesson can be further categorized as simple or authentic (Chinn and Malhotra in Sci Educ 86(2):175-218, 2002). Although authentic inquiries provide the best opportunities for cognitive development and scientific reasoning, guided and simple inquiries are more often employed in the classroom (Crawford in J Res Sci Teach 37(9):916-937, 2000; NRC in Inquiry and the national science education standards: a guide for teaching and learning, 2000). For the purposes of this study we defined inquiry as "authentic" if original research problems were resolved (Hanegan et al. in School Sci Math J 109(2):110-134, 2009; Chinn and Malhotra in Sci Educ 86(2):175-218, 2002; Roth in Authentic school science: knowing and learning in open-inquiry science laboratories, 1995). The research question to guide this study through naturalistic inquiry research methods was: How will participants express whether or not an authentic inquiry experience enhanced

  4. Authenticity in Anatomy Art.

    Science.gov (United States)

    Adkins, Jessica

    2017-01-12

    The aim of this paper is to observe the evolution and evaluate the 'realness' and authenticity in Anatomy Art, an art form I define as one which incorporates accurate anatomical representations of the human body with artistic expression. I examine the art of 17th century wax anatomical models, the preservations of Frederik Ruysch, and Gunther von Hagens' Body Worlds plastinates, giving consideration to authenticity of both body and art. I give extra consideration to the works of Body Worlds since the exhibit creator believes he has created anatomical specimens with more educational value and bodily authenticity than ever before. Ultimately, I argue that von Hagens fails to offer Anatomy Art 'real human bodies,' and that the lack of bodily authenticity of his plastinates results in his creations being less pedagogic than he claims.

  5. Authentic Material 2.

    Science.gov (United States)

    Beeching, Kate

    1982-01-01

    Discusses techniques for the exploitation of authentic material, with reference to the self-instruction manual, designed for highly literate, undergraduate students, which accompanies the BBC course "Allez France." (EKN)

  6. Automatic generation of investigator bibliographies for institutional research networking systems.

    Science.gov (United States)

    Johnson, Stephen B; Bales, Michael E; Dine, Daniel; Bakken, Suzanne; Albert, Paul J; Weng, Chunhua

    2014-10-01

    Publications are a key data source for investigator profiles and research networking systems. We developed ReCiter, an algorithm that automatically extracts bibliographies from PubMed using institutional information about the target investigators. ReCiter executes a broad query against PubMed, groups the results into clusters that appear to constitute distinct author identities and selects the cluster that best matches the target investigator. Using information about investigators from one of our institutions, we compared ReCiter results to queries based on author name and institution and to citations extracted manually from the Scopus database. Five judges created a gold standard using citations of a random sample of 200 investigators. About half of the 10,471 potential investigators had no matching citations in PubMed, and about 45% had fewer than 70 citations. Interrater agreement (Fleiss' kappa) for the gold standard was 0.81. Scopus achieved the best recall (sensitivity) of 0.81, while name-based queries had 0.78 and ReCiter had 0.69. ReCiter attained the best precision (positive predictive value) of 0.93 while Scopus had 0.85 and name-based queries had 0.31. ReCiter accesses the most current citation data, uses limited computational resources and minimizes manual entry by investigators. Generation of bibliographies using named-based queries will not yield high accuracy. Proprietary databases can perform well but requite manual effort. Automated generation with higher recall is possible but requires additional knowledge about investigators. Copyright © 2014 Elsevier Inc. All rights reserved.

  7. Authentic Italian food as Mamma used to make it!

    DEFF Research Database (Denmark)

    Madsen, Jan Halberg; d'Ambrosio, Luigi

    2015-01-01

    The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests.......The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests....

  8. Pre-Authentication Schemes for UMTS-WLAN Interworking

    Directory of Open Access Journals (Sweden)

    Ali Al Shidhani

    2009-01-01

    Full Text Available Interworking Universal Mobile Telecommunication System (UMTS and IEEE 802.11 Wireless Local Area Networks (WLANs introduce new challenges including the design of secured and fast handover protocols. Handover operations within and between networks must not compromise the security of the networks involved. In addition, handovers must be instantaneous to sustain the quality of service (QoS of the applications running on the User Equipment (UE. There is a need to design fast and secured handover protocols to operate in UMTS-WLAN interworking architectures. This paper proposes two secured pre-authentication protocols in the UMTS-WLAN interworking architectures. Performance analysis of the proposed protocols show superior results in comparison to existing protocols in terms of authentication signaling cost, authentication delay and load on critical nodes involved in the authentication procedure. Additionally, the security of the proposed protocols was verified by the Automated Validation of Internet Security Protocols and Applications (AVISPA security analyzer.

  9. A Network Investigation on Idiopathic Hypogonadotropic Hypogonadism in China

    Directory of Open Access Journals (Sweden)

    Weiwei Zhao

    2013-01-01

    Full Text Available Idiopathic hypogonadotropic hypogonadism (IHH is a rare condition in which puberty does not take place naturally. We aimed to develop and follow an internet-based cohort and to improve our understanding of the disease. We established an internet-based questionnaire survey. A total of 74 male IHH patients were recruited from the Chinese largest IHH network social group. The clinical symptoms before treatment mainly included small testis, underdeveloped secondary sexual characteristics, and sexual dysfunction. After treatment, the penis length, testicular volume, external genital organ development, pubic hair, beard, laryngeal prominence, erection, and spermatorrhea were improved significantly (P<0.001. 18.9% of the patients completed fertility; however, more than half of the patients still complained of poor happiness and low physical strength. In addition, improvements in penis and pubic hair development, testosterone normalization and the physical strength in IHH patients who received gonadotropin and androgen replacement therapy were better than in those who received single gonadotropin therapy (P<0.05 for all. In conclusion, disease-specific network investigation can be used as an alternative method of medical research for rare diseases. The results of our cross-sectional study showed the effectiveness of hormone replacement therapy for IHH and implied that gonadotropin and androgen replacement therapy may be superior to gonadotropin treatment alone.

  10. Investigating a Novel Measure of Brain Networking Following Sports Concussion.

    Science.gov (United States)

    Broglio, S P; Rettmann, A; Greer, J; Brimacombe, S; Moore, B; Narisetty, N; He, X; Eckner, J

    2016-08-01

    Clinicians managing sports-related concussions are left to their clinical judgment in making diagnoses and return-to-play decisions. This study was designed to evaluate the utility of a novel measure of functional brain networking for concussion management. 24 athletes with acutely diagnosed concussion and 21 control participants were evaluated in a research laboratory. At each of the 4 post-injury time points, participants completed the Axon assessment of neurocognitive function, a self-report symptom inventory, and the auditory oddball and go/no-go tasks while electroencephalogram (EEG) readings were recorded. Brain Network Activation (BNA) scores were calculated from EEG data related to the auditory oddball and go/no-go tasks. BNA scores were unable to differentiate between the concussed and control groups or by self-report symptom severity. These findings conflict with previous work implementing electrophysiological assessments in concussed athletes, suggesting that BNA requires additional investigation and refinement before clinical implementation. © Georg Thieme Verlag KG Stuttgart · New York.

  11. The authentic worker's well-being and performance: the relationship between authenticity at work, well-being, and work outcomes.

    Science.gov (United States)

    van den Bosch, Ralph; Taris, Toon W

    2014-01-01

    Previous research on authenticity has mainly focused on trait conceptualizations of authenticity (e.g., Wood et al., 2008), whereas in specific environments (e.g., at work) state conceptualizations of authenticity (cf. Van den Bosch & Taris, 2013) are at least as relevant. For example, working conditions are subject to change, and this could well have consequences for employees' perceived level of authenticity at work. The current study employs a work-specific, state-like conceptualization of authenticity to investigate the relations between authenticity at work, well-being, and work outcomes. A series of ten separate hierarchical regression analyses using data from 685 participants indicated that after controlling for selected work characteristics and demographic variables, authenticity at work accounted for on average 11% of the variance of various wellbeing and work outcomes. Of the three subscales of authenticity at work (i.e., authentic living, self-alienation, and accepting influence), self-alienation was the strongest predictor of outcomes, followed by authentic living and accepting external influence, respectively. These findings are discussed in the light of their practical and theoretical implications.

  12. State of the Art Authentication, Access Control, and Secure Integration in Smart Grid

    Directory of Open Access Journals (Sweden)

    Neetesh Saxena

    2015-10-01

    Full Text Available The smart grid (SG is a promising platform for providing more reliable, efficient, and cost effective electricity to the consumers in a secure manner. Numerous initiatives across the globe are taken by both industry and academia in order to compile various security issues in the smart grid network. Unfortunately, there is no impactful survey paper available in the literature on authentications in the smart grid network. Therefore, this paper addresses the required objectives of an authentication protocol in the smart grid network along with the focus on mutual authentication, access control, and secure integration among different SG components. We review the existing authentication protocols, and analyze mutual authentication, privacy, trust, integrity, and confidentiality of communicating information in the smart grid network. We review authentications between the communicated entities in the smart grid, such as smart appliance, smart meter, energy provider, control center (CC, and home/building/neighborhood area network gateways (GW. We also review the existing authentication schemes for the vehicle-to-grid (V2G communication network along with various available secure integration and access control schemes. We also discuss the importance of the mutual authentication among SG entities while providing confidentiality and privacy preservation, seamless integration, and required access control with lower overhead, cost, and delay. This paper will help to provide a better understanding of current authentication, authorization, and secure integration issues in the smart grid network and directions to create interest among researchers to further explore these promising areas.

  13. Literacies for Surveillance: Social Network Sites and Background Investigations

    Directory of Open Access Journals (Sweden)

    Sarah Jackson Young

    2015-09-01

    Full Text Available In September 2013, civilian contractor Aaron Alexis entered the Washington Navy Yard and murdered twelve people before being fatally shot by police. This incident, together with an incident three months earlier involving Edward Snowden, caused the U.S. government to critically examine their background investigation (BI process; because both Snowden and Alexis had supposedly slipped through the cracks of their investigations, there must be some flaw in the BI procedure. The U.S. Committee on Oversight and Reform concluded that rules forbidding “background checkers from looking at the Internet or social media when performing checks” was one of the main factors contributing to defective BIs (Report, 2014. Since the report’s release, the Director of National Intelligence has been debating and trialing whether information from the Internet should be used to form a data double for BIs (Kopp, 2014; Rockwell, 2014. Using this conversation as a discussion catalyst, I argue that due to the nature of the data double, if the United States were to adopt the use of social networking sites (SNSs for security clearance purposes, neglecting to take into account basic principles of SNSs into the process of BIs may lead to misinformation and unfavorable adjudication. Ultimately, being literate about the social practices involved in SNSs and surveillance would benefit not only investigators, but anyone, including academics, looking at individuals in online spaces.

  14. Development of Network-type Archaeological Investigation System

    Science.gov (United States)

    Chiba, F.; Yokokoyama, S.; Kaneda, A.; Konno, K.

    2015-08-01

    The Great East Japan Earthquake on March 11, 2011 is said to be a once-in-1000-year catastrophic quake. The Tsunami triggered by the earthquake destroyed broad coastal areas in northeast Japan. As recovery from the earthquake proceeds, the demand for new road construction, housing hill development, and residential construction is rapidly increasing. Culture plays a critical role in the district's recovery. For that reason, before development, cultural properties in the corresponding districts must be urgently investigated. This is a must, although balancing cultural recovery with rapid economic recovery is no easy task. With this in mind, we have developed a new system focusing on speedy archaeological investigation and adequate documentation. The authors reexamined the existing investigation process to categorize tasks into two types: those that must be done only at archaeological sites (site A) and ones available at other places (site B). We then formulated a scheme where the tasks on both sites are performed simultaneously in parallel over the network. Experiments are ongoing. This presentation reports the process and issues of our research and development.

  15. Children's and adolescents' perception of the authenticity of smiles.

    Science.gov (United States)

    Thibault, Pascal; Gosselin, Pierre; Brunel, Marie-Lise; Hess, Ursula

    2009-03-01

    Recently, Thibault and colleagues described the Duchenne marker as a cultural dialect for the perception of smile authenticity. The current study had the goal to follow up on this finding and to investigate the cues that French Canadian children use to evaluate the authenticity of smiles from members of three ethnic groups. The authenticity of six smiles differing in intensity and presence of orbicularis oculi (Duchenne marker) was rated by 1206 children from 4 to 17 years of age. No differences were found as a function of encoder group. All children perceived medium Duchenne smiles as more authentic than equally intense medium non-Duchenne smiles. Furthermore, results suggest a decrease in the reliance on intensity across the age span. Younger children use the intensity marker along the whole continuum to infer authenticity. In contrast, older children (14- to 17-year-olds) rated all smiles that did not contain the Duchenne marker as roughly equally low in authenticity.

  16. Analysis of MD5 authentication in various routing protocols using simulation tools

    Science.gov (United States)

    Dinakaran, M.; Darshan, K. N.; Patel, Harsh

    2017-11-01

    Authentication being an important paradigm of security and Computer Networks require secure paths to make the flow of the data even more secure through some security protocols. So MD-5(Message Digest 5) helps in providing data integrity to the data being sent through it and authentication to the network devices. This paper gives a brief introduction to the MD-5, simulation of the networks by including MD-5 authentication using various routing protocols like OSPF, EIGRP and RIPv2. GNS3 is being used to simulate the scenarios. Analysis of the MD-5 authentication is done in the later sections of the paper.

  17. Development of a Mobile EEG-based Biometric Authentication System

    DEFF Research Database (Denmark)

    Klonovs, Juris; Petersen, Christoffer Kjeldgaard; Olesen, Henning

    In recent years the need for greater security for storing personal and business data or accessing corporate networks on mobile devices is growing rapidly, and one of the potential solutions is to employ the innovative biometric authentication techniques. This paper presents the development...... of a mobile biometric authentication system based on electroencephalogram (EEG) recordings in combination with already proven technologies such as facial detection and near-field communication (NFC). The overall goal of this work is to fill the gap between mobile web technologies and wireless EEG devices...... and present a mobile prototype system capable of authenticating users based on the uniqueness of their brainwaves. Furthermore, we implement a novel authentication process, which leads the authentication system to be more secure. We also give suggestions for future improvements of the system....

  18. A Lightweight Continuous Authentication Protocol for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Yo-Hsuan Chuang

    2018-04-01

    Full Text Available Modern societies are moving toward an information-oriented environment. To gather and utilize information around people’s modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs. Within this kind of Internet of Things (IoT environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  19. A Lightweight Continuous Authentication Protocol for the Internet of Things.

    Science.gov (United States)

    Chuang, Yo-Hsuan; Lo, Nai-Wei; Yang, Cheng-Ying; Tang, Ssu-Wei

    2018-04-05

    Modern societies are moving toward an information-oriented environment. To gather and utilize information around people's modern life, tiny devices with all kinds of sensing devices and various sizes of gateways need to be deployed and connected with each other through the Internet or proxy-based wireless sensor networks (WSNs). Within this kind of Internet of Things (IoT) environment, how to authenticate each other between two communicating devices is a fundamental security issue. As a lot of IoT devices are powered by batteries and they need to transmit sensed data periodically, it is necessary for IoT devices to adopt a lightweight authentication protocol to reduce their energy consumption when a device wants to authenticate and transmit data to its targeted peer. In this paper, a lightweight continuous authentication protocol for sensing devices and gateway devices in general IoT environments is introduced. The concept of valid authentication time period is proposed to enhance robustness of authentication between IoT devices. To construct the proposed lightweight continuous authentication protocol, token technique and dynamic features of IoT devices are adopted in order to reach the design goals: the reduction of time consumption for consecutive authentications and energy saving for authenticating devices through by reducing the computation complexity during session establishment of continuous authentication. Security analysis is conducted to evaluate security strength of the proposed protocol. In addition, performance analysis has shown the proposed protocol is a strong competitor among existing protocols for device-to-device authentication in IoT environments.

  20. Authenticity in Employment Relations

    DEFF Research Database (Denmark)

    Tackney, Charles Thomas

    2018-01-01

    Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study of employm......Authenticity is developed and deployed as a criterion variable for a theology of the workplace inquiry that combines theory and methodological development with data analysis. The goal is to show that social science method can offer an empirically valid, prophetic dimension to the study...... of employment and work parameters in light of religious teachings on the social question at national, organizational, or firm-specific levels. The function of a criterion variable is described, noting that the switch from a dependent variable approach introduces an open-system dynamism to social science...... theology and allied fields for the common cause of assessing authenticity in firm, organization, and higher system functions....

  1. Investigation of road network features and safety performance.

    Science.gov (United States)

    Wang, Xuesong; Wu, Xingwei; Abdel-Aty, Mohamed; Tremont, Paul J

    2013-07-01

    The analysis of road network designs can provide useful information to transportation planners as they seek to improve the safety of road networks. The objectives of this study were to compare and define the effective road network indices and to analyze the relationship between road network structure and traffic safety at the level of the Traffic Analysis Zone (TAZ). One problem in comparing different road networks is establishing criteria that can be used to scale networks in terms of their structures. Based on data from Orange and Hillsborough Counties in Florida, road network structural properties within TAZs were scaled using 3 indices: Closeness Centrality, Betweenness Centrality, and Meshedness Coefficient. The Meshedness Coefficient performed best in capturing the structural features of the road network. Bayesian Conditional Autoregressive (CAR) models were developed to assess the safety of various network configurations as measured by total crashes, crashes on state roads, and crashes on local roads. The models' results showed that crash frequencies on local roads were closely related to factors within the TAZs (e.g., zonal network structure, TAZ population), while crash frequencies on state roads were closely related to the road and traffic features of state roads. For the safety effects of different networks, the Grid type was associated with the highest frequency of crashes, followed by the Mixed type, the Loops & Lollipops type, and the Sparse type. This study shows that it is possible to develop a quantitative scale for structural properties of a road network, and to use that scale to calculate the relationships between network structural properties and safety. Copyright © 2013 Elsevier Ltd. All rights reserved.

  2. Authentic leadership to the future

    Directory of Open Access Journals (Sweden)

    Dimovski Vlado

    2012-01-01

    Full Text Available Authentic leadership is the latest evolutionary stage in leadership development and emphasizes the leader's authenticity. The construct of authenticity was researched by ancient Greek philosophers as 'know thy-self ', and 'thy true self '. Authentic leadership began to develop after 2004. The main reason why the researchers place so much attention to authentic leadership is fact that authentic leadership reaches all of the employees in organizations. Authentic leaders must identify the strengths of their followers and help them with their development and integration towards a common goal, purpose, vision and identity of the organization. Authentic leadership is seen as the final stage in the development of leadership styles, properties of this leadership style, and the consequences of this style have not been fully explored. In our paper we will explore this new style of leadership and its implications.

  3. Two-factor authentication

    CERN Document Server

    Stanislav, Mark

    2015-01-01

    During the book, readers will learn about the various technical methods by which two-factor authentication is implemented, security concerns with each type of implementation, and contextual details to frame why and when these technologies should be used. Readers will also be provided with insight about the reasons that two-factor authentication is a critical security control, events in history that have been important to prove why organization and individual would want to use two factor, and core milestones in the progress of growing the market.

  4. Girls' Relationship Authenticity and Self-Esteem across Adolescence

    Science.gov (United States)

    Impett, Emily A.; Sorsoli, Lynn; Schooler, Deborah; Henson, James M.; Tolman; Deborah L.

    2008-01-01

    Feminist psychologists have long posited that relationship authenticity (i.e., the congruence between what one thinks and feels and what one does and says in relational contexts) is integral to self-esteem and well-being. Guided by a feminist developmental framework, the authors investigated the role of relationship authenticity in promoting…

  5. A new approach in development of data flow control and investigation system for computer networks

    International Nuclear Information System (INIS)

    Frolov, I.; Vaguine, A.; Silin, A.

    1992-01-01

    This paper describes a new approach in development of data flow control and investigation system for computer networks. This approach was developed and applied in the Moscow Radiotechnical Institute for control and investigations of Institute computer network. It allowed us to solve our network current problems successfully. Description of our approach is represented below along with the most interesting results of our work. (author)

  6. Investigating scientific literacy documents with linguistic network analysis

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry; Dolin, Jens

    2009-01-01

    International discussions of scientific literacy (SL) are extensive and numerous sizeable documents on SL exist. Thus, comparing different conceptions of SL is methodologically challenging. We developed an analytical tool which couples the theory of complex networks with text analysis in order...... on the network data. For example a minimal description length approach partitioned the network in to groups of words, which was then seen to represent different visions appearing in the discussion of SL. In short, the networks allow for quantitative analyses as well as a quick visual overview of SL documents....

  7. Study of Wireless Authentication Center with Mixed Encryption in WSN

    Directory of Open Access Journals (Sweden)

    Yiqin Lu

    2016-01-01

    Full Text Available WSN (wireless sensor network has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit and WiFi (Wireless Fidelity module and uses RSA, AES (Advanced Encryption Standard, and SHA-1 (Secure Hash Algorithm 1 to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.

  8. A robust cloud access scheme with mutual authentication

    Directory of Open Access Journals (Sweden)

    Chen Chin-Ling

    2016-01-01

    Full Text Available Due to the progress of network technology, we can access some information through remote servers, and we also can save and access lots of personal data in remote servers. Therefore, to protect these data and resist unauthorized access is an important issue. Some researchers proposed authentication scheme, but there still exist some security weaknesses. This article is based on the concept of HDFS (Hadoop Distributed File System, and offers a robust authentication scheme. The proposed scheme achieves mutual authentication, prevents re-play attack, solves asynchronous issue, and prevents offline password guessing attack.

  9. Topic Map for Authentic Travel

    OpenAIRE

    Wandsvik, Atle; Zare, Mehdi

    2007-01-01

    E-business is a new trend in Internet use. Authentic travel is an approach to travel and travel business which helps the traveler experience what is authentic in the travel destination. But how can the traveler find those small authentic spots and organize them together to compose a vacation? E-business techniques, combined withTopic Maps, can help.

  10. Synergy between Authentic Assessment Activities and Learner Autonomy: How Does This Promote Shared Authenticity in Online Higher Education?

    Science.gov (United States)

    Gikandi, Joyce

    2013-01-01

    The purpose of this study was to establish whether and how authentic assessment activities and learner autonomy converged to productively engage both the teacher and learners in shared authenticity. The study employed case study methodology to investigate the phenomena within an online course in ICT designed for continuing professionals in…

  11. A Taxonomy for Enhancing Usability, Flexibility, and Security of User Authentication

    Directory of Open Access Journals (Sweden)

    Susan Gottschlich

    2017-12-01

    Full Text Available Two technology trends – a move toward software defined capabilities and toward networked devices – support both unprecedented innovations and requirements for security. A fundamental aspect of security is user authentication, which allows devices and software applications to establish their user’s identity and identity is in turn used to establish which of its capabilities the user is authorized to access. While multiple authentication steps, known as multifactor authentication, are being used more widely throughout the military, government, businesses, and consumer sectors, the selection and implementation of which authentication factors to require is typically defined by security policy. Security policy is in turn typically established by a security organization that may have no formal metrics or means to guide its selection of authentication factors. This paper will present a taxonomy for describing authentication factors including important attributes that characterize authentication robustness to aid in the selection of factors that are consistent with the user’s mission. One particular authentication factor that I have developed will be discussed in the context of this taxonomy to motivate the need to broaden current definitions and security policies. The ultimate goal of this paper is to inspire the development of standards for authentication technologies to both support mission aware authentication innovation and to inform decision making about security policies concerning user authentication and authorization. Further, this paper aims to demonstrate that such an approach will fundamentally enhance both security and usability of increasingly networked, software-defined devices, equipment and software applications.

  12. Enhanced smartcard-based password-authenticated key agreement using extended chaotic maps.

    Directory of Open Access Journals (Sweden)

    Tian-Fu Lee

    Full Text Available A smartcard based password-authenticated key agreement scheme enables a legal user to log in to a remote authentication server and access remote services through public networks using a weak password and a smart card. Lin recently presented an improved chaotic maps-based password-authenticated key agreement scheme that used smartcards to eliminate the weaknesses of the scheme of Guo and Chang, which does not provide strong user anonymity and violates session key security. However, the improved scheme of Lin does not exhibit the freshness property and the validity of messages so it still fails to withstand denial-of-service and privileged-insider attacks. Additionally, a single malicious participant can predetermine the session key such that the improved scheme does not exhibit the contributory property of key agreements. This investigation discusses these weaknesses and proposes an enhanced smartcard-based password-authenticated key agreement scheme that utilizes extended chaotic maps. The session security of this enhanced scheme is based on the extended chaotic map-based Diffie-Hellman problem, and is proven in the real-or-random and the sequence of games models. Moreover, the enhanced scheme ensures the freshness of communicating messages by appending timestamps, and thereby avoids the weaknesses in previous schemes.

  13. Tools for Authentication

    Energy Technology Data Exchange (ETDEWEB)

    White, G

    2008-07-09

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  14. Authentication of Hadith

    African Journals Online (AJOL)

    OYELAKIN

    the side of one of the narrators. Hadith forgery featured in Islam barely two decades after the prophet and scholars did their best to differentiate it from authentic ones. Despite this, for Khan, it is possible that some traditions regarded as genuine merely due to their isnad may not be genuine in textual outlook. Since the isnad ...

  15. Authentic Italian food as Mamma used to make it

    DEFF Research Database (Denmark)

    d'Ambrosio, Luigi; Madsen, Jan Halberg

    2014-01-01

    Research description and purpose: The purpose of this investigation is to explore how Italian restaurants define authentic Italian culinary experiences and how these experiences are designed and rendered to the restaurants’ guests. Design/Methodology: The purpose of this research is exploratory...... are unique to this case and cannot be expected replicated, nor generalized. Originality/value: This article investigates how the authentic Italian culinary experience is defined and designed by restaurant owners or managers in the specific context of the city of Aalborg, Denmark. The originality...... of this research resides in the contribution to a better understanding of how authentic experiences are defined and designed at the supply side in the restaurant industry. Moreover, this article takes on a critical perspective on Gilmore and Pine’s genres of authenticity. Keywords: Genres of authenticity, culinary...

  16. Final report and recommendations of the ESnet Authentication Pilot Project

    Energy Technology Data Exchange (ETDEWEB)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  17. Book Review: Mastering Windows Network Forensics and Investigation, 2/e

    Directory of Open Access Journals (Sweden)

    John C. Ebert

    2012-12-01

    Full Text Available Anson, S., Bunting, S., Johnson, R., & Pearson, S. (2012. Mastering Windows Network Forensics and Investigation, 2nd ed. Indianapolis: John Wiley & Sons. 674 pages, ISBN: 978-1-118-16382-5, $59.99 USA/$71.99 CAN.Reviewed by John C. Ebert, Metropolitan State University (eberjo@metrostate.eduThe book is available as a paperback and e-book. The e-book versions allow you to preview several chapters at any of a number of online vendors. The e-book prices vary from the same as the soft cover version ($59.99 to about $38.99. Some of the vendor's e-books retain the color illustrations found in the print version, but others produce them in grey scale, so you might want to look out for that. The book is divided into four parts (17 chapters plus two appendices.I am compelled to give the book illustrations a highly unfavorable assessment regarding their readability qualities. Their content is otherwise fine and meaningful. Time and again the illustrations are so miniscule that even those of us with the best of vision will be seriously challenged. I hold out the recommendation to review your e-book options over the hardcopy edition. At least in an e-book you have the hope of doing a page-zoom. Review your e-book providers carefully; some I reviewed had "fuzzy graphics." Notwithstanding the problem illustrations, I still recommend this book for its in-the-trenches information and the desktop reference it will become.(see PDF for full review

  18. Smartphone Sensors for Stone Lithography Authentication

    Directory of Open Access Journals (Sweden)

    Giuseppe Schirripa Spagnolo

    2014-05-01

    Full Text Available Nowadays mobile phones include quality photo and video cameras, access to wireless networks and the internet, GPS assistance and other innovative systems. These facilities open them to innovative uses, other than the classical telephonic communication one. Smartphones are a more sophisticated version of classic mobile phones, which have advanced computing power, memory and connectivity. Because fake lithographs are flooding the art market, in this work, we propose a smartphone as simple, robust and efficient sensor for lithograph authentication. When we buy an artwork object, the seller issues a certificate of authenticity, which contains specific details about the artwork itself. Unscrupulous sellers can duplicate the classic certificates of authenticity, and then use them to “authenticate” non-genuine works of art. In this way, the buyer will have a copy of an original certificate to attest that the “not original artwork” is an original one. A solution for this problem would be to insert a system that links together the certificate and the related specific artwork. To do this it is necessary, for a single artwork, to find unique, unrepeatable, and unchangeable characteristics. In this article we propose an innovative method for the authentication of stone lithographs. We use the color spots distribution captured by means of a smartphone camera as a non-cloneable texture of the specific artworks and an information management system for verifying it in mobility stone lithography.

  19. Graph methods for the investigation of metabolic networks in parasitology.

    Science.gov (United States)

    Cottret, Ludovic; Jourdan, Fabien

    2010-08-01

    Recently, a way was opened with the development of many mathematical methods to model and analyze genome-scale metabolic networks. Among them, methods based on graph models enable to us quickly perform large-scale analyses on large metabolic networks. However, it could be difficult for parasitologists to select the graph model and methods adapted to their biological questions. In this review, after briefly addressing the problem of the metabolic network reconstruction, we propose an overview of the graph-based approaches used in whole metabolic network analyses. Applications highlight the usefulness of this kind of approach in the field of parasitology, especially by suggesting metabolic targets for new drugs. Their development still represents a major challenge to fight against the numerous diseases caused by parasites.

  20. Authentic feminist? Authenticity and feminist identity in teenage feminists' talk.

    Science.gov (United States)

    Calder-Dawe, Octavia; Gavey, Nicola

    2017-12-01

    This article explores how young people's feminist identities take shape in conjunction with a contemporary ideal of personal authenticity: to know and to express the 'real me'. Drawing from interviews with 18 teenagers living in Auckland, New Zealand, we examine a novel convergence of authenticity and feminism in participants' identity talk. For social psychologists interested in identity and politics, this convergence is intriguing: individualizing values such as authenticity are generally associated with disengagement with structural critique and with a repudiation of politicized and activist identities. Rather than seeking to categorize authentic feminism as an instance of either 'good/collective' or 'bad/individualized' feminist politics, we use discourse analysis to examine how the identity position of authentic feminist was constructed and to explore implications for feminist politics. On one hand, interviewees mobilized authentic feminism to affirm their commitment to normative liberal values of authenticity and self-expression. At the same time, the position of authentic feminist appeared to authorize risky feminist identifications and to justify counter-normative feelings, desires, and actions. To conclude, we explore how encountering others' intolerance of authentic feminism exposed interviewees to the limits of authenticity discourse, propelling some towards new understandings of the social world and their space for action within it. © 2017 The British Psychological Society.

  1. Selective enhancement of attentional networks in college table tennis athletes: a preliminary investigation.

    Science.gov (United States)

    Wang, Biye; Guo, Wei; Zhou, Chenglin

    2016-01-01

    The purpose of the study was to investigate the characteristics of the attentional network in college table tennis athletes. A total of 65 college students categorized as table tennis athlete group or non-athlete group participated in the study. All participants completed the attentional network test (ANT) which measured the alerting, orienting and executive control networks. The results showed a significant difference between the athlete and non-athlete group for executive control network ( p   0.05) or orienting ( p  > 0.05) networks. These results combined suggest that college table tennis athletes exhibited selectively enhanced executive control of attentional networks.

  2. Intrinsic network activity in tinnitus investigated using functional MRI

    Science.gov (United States)

    Leaver, Amber M.; Turesky, Ted K.; Seydell-Greenwald, Anna; Morgan, Susan; Kim, Hung J.; Rauschecker, Josef P.

    2016-01-01

    Tinnitus is an increasingly common disorder in which patients experience phantom auditory sensations, usually ringing or buzzing in the ear. Tinnitus pathophysiology has been repeatedly shown to involve both auditory and non-auditory brain structures, making network-level studies of tinnitus critical. In this magnetic resonance imaging (MRI) study, we used two resting-state functional connectivity (RSFC) approaches to better understand functional network disturbances in tinnitus. First, we demonstrated tinnitus-related reductions in RSFC between specific brain regions and resting-state networks (RSNs), defined by independent components analysis (ICA) and chosen for their overlap with structures known to be affected in tinnitus. Then, we restricted ICA to data from tinnitus patients, and identified one RSN not apparent in control data. This tinnitus RSN included auditory-sensory regions like inferior colliculus and medial Heschl’s gyrus, as well as classically non-auditory regions like the mediodorsal nucleus of the thalamus, striatum, lateral prefrontal and orbitofrontal cortex. Notably, patients’ reported tinnitus loudness was positively correlated with RSFC between the mediodorsal nucleus and the tinnitus RSN, indicating that this network may underlie the auditory-sensory experience of tinnitus. These data support the idea that tinnitus involves network dysfunction, and further stress the importance of communication between auditory-sensory and fronto-striatal circuits in tinnitus pathophysiology. PMID:27091485

  3. How does language change as a lexical network? An investigation based on written Chinese word co-occurrence networks

    Science.gov (United States)

    Chen, Heng; Chen, Xinying

    2018-01-01

    Language is a complex adaptive system, but how does it change? For investigating this process, four diachronic Chinese word co-occurrence networks have been built based on texts that were written during the last 2,000 years. By comparing the network indicators that are associated with the hierarchical features in language networks, we learn that the hierarchy of Chinese lexical networks has indeed evolved over time at three different levels. The connections of words at the micro level are continually weakening; the number of words in the meso-level communities has increased significantly; and the network is expanding at the macro level. This means that more and more words tend to be connected to medium-central words and form different communities. Meanwhile, fewer high-central words link these communities into a highly efficient small-world network. Understanding this process may be crucial for understanding the increasing structural complexity of the language system. PMID:29489837

  4. Networks in biological systems: An investigation of the Gene Ontology as an evolving network

    International Nuclear Information System (INIS)

    Coronnello, C; Tumminello, M; Micciche, S; Mantegna, R.N.

    2009-01-01

    Many biological systems can be described as networks where different elements interact, in order to perform biological processes. We introduce a network associated with the Gene Ontology. Specifically, we construct a correlation-based network where the vertices are the terms of the Gene Ontology and the link between each two terms is weighted on the basis of the number of genes that they have in common. We analyze a filtered network obtained from the correlation-based network and we characterize its evolution over different releases of the Gene Ontology.

  5. Investigating scientific literacy documents with linguistic network analysis

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry; Dolin, Jens

    2009-01-01

    in the one statement sentences. Using the program Pajek, we drew a map of the text showing the number of times a concept appeared in the one statement sentences, and the strength of links between words. Different SL texts was analysed in this way. The network description allowed for different calculations......International discussions of scientific literacy (SL) are extensive and numerous sizeable documents on SL exist. Thus, comparing different conceptions of SL is methodologically challenging. We developed an analytical tool which couples the theory of complex networks with text analysis in order...... to obtain clear visual images of what is meant by SL expressed in written text. The raw text was first parsed into one statement sentences. Then, a linguistic type network was created with nodes being the words used in SL texts, and a link between two words established if they were adjacent to each other...

  6. Investigations on an environmental technology transfer information network; Kankyo gijutsu iten joho network chosa

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1996-03-01

    With developing countries (APEC countries) as the main objects, investigations were carried out to issue environmental technology transfer information that Japan has accumulated, and advance exchanges of technical information with persons related inside and outside Japan. As a result of the investigations, it was found that the environmental technology information that serves more effectively for the developing countries is the technical information that has been developed by repeating improvements, has provided actual results in work sites, and is actually used, rather than the state-of-art technologies. Based on this result, business entities having factories and operation centers located in Mie Prefecture and the city of Yokkaichi were asked to provide data for the actually used environmental technologies. Out of 51 items provided by 17 companies, nine items were selected to be used as prototype database materials for an information network. The objects of information sources will be expanded to a nationwide scale in the future to improve the contents of the database. Problems of handling information copyrights and technical know-hows were presented in the course of data collection, urging the necessity of due considerations on the matter. Necessity was indicated on maintenance and management of data base as well as its quantitative expansion. 1 ref., 4 figs.

  7. Anonymous Authentication for Smartcards

    Directory of Open Access Journals (Sweden)

    J. Hajny

    2010-06-01

    Full Text Available The paper presents an innovative solution in the field of RFID (Radio-Frequency IDentification smartcard authentication. Currently the smartcards are used for many purposes - e.g. employee identification, library cards, student cards or even identity credentials. Personal identity is revealed to untrustworthy entities every time we use these cards. Such information could later be used without our knowledge and for harmful reasons like shopping pattern scanning or even movement tracking. We present a communication scheme for keeping one’s identity private in this paper. Although our system provides anonymity, it does not allow users to abuse this feature. The system is based on strong cryptographic primitives that provide features never available before. Besides theoretical design of the anonymous authentication scheme and its analysis we also provide implementation results.

  8. FPGA Authentication Methods.

    Energy Technology Data Exchange (ETDEWEB)

    Brotz, Jay Kristoffer [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hymel, Ross W [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Punnoose, Ratish J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Mannos, Tom [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Grant, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom); Evans, Neil [Atomic Weapons Establishment (AWE), Berkshire (United Kingdom)

    2017-05-01

    One of the greatest challenges facing designers of equipment to be used in a nuclear arms control treaty is how to convince the other party in the treaty to trust its results and functionality. Whether the host provides equipment meant to prove treaty obligations and the inspector needs to gain that trust (commonly referred to as authentication), or the inspector provides this equipment and the host needs to gain this trust (commonly considered to be included in certification), one party generally has higher confidence in the equipment at the start of a treaty regime and the other party needs to gain that confidence prior to use. While we focus on authentication in this document—that is, the inspector gaining confidence in host-provided equipment—our conclusions will likely apply to host certification of inspector-provided equipment.

  9. International safeguards data authentication

    Energy Technology Data Exchange (ETDEWEB)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  10. Authenticity affects the recognition of emotions in speech: behavioral and fMRI evidence.

    Science.gov (United States)

    Drolet, Matthis; Schubotz, Ricarda I; Fischer, Julia

    2012-03-01

    The aim of the present study was to determine how authenticity of emotion expression in speech modulates activity in the neuronal substrates involved in emotion recognition. Within an fMRI paradigm, participants judged either the authenticity (authentic or play acted) or emotional content (anger, fear, joy, or sadness) of recordings of spontaneous emotions and reenactments by professional actors. When contrasting between task types, active judgment of authenticity, more than active judgment of emotion, indicated potential involvement of the theory of mind (ToM) network (medial prefrontal cortex, temporoparietal cortex, retrosplenium) as well as areas involved in working memory and decision making (BA 47). Subsequently, trials with authentic recordings were contrasted with those of reenactments to determine the modulatory effects of authenticity. Authentic recordings were found to enhance activity in part of the ToM network (medial prefrontal cortex). This effect of authenticity suggests that individuals integrate recollections of their own experiences more for judgments involving authentic stimuli than for those involving play-acted stimuli. The behavioral and functional results show that authenticity of emotional prosody is an important property influencing human responses to such stimuli, with implications for studies using play-acted emotions.

  11. Investigating Driver Fatigue versus Alertness Using the Granger Causality Network

    Directory of Open Access Journals (Sweden)

    Wanzeng Kong

    2015-08-01

    Full Text Available Driving fatigue has been identified as one of the main factors affecting drivers’ safety. The aim of this study was to analyze drivers’ different mental states, such as alertness and drowsiness, and find out a neurometric indicator able to detect drivers’ fatigue level in terms of brain networks. Twelve young, healthy subjects were recruited to take part in a driver fatigue experiment under different simulated driving conditions. The Electroencephalogram (EEG signals of the subjects were recorded during the whole experiment and analyzed by using Granger-Causality-based brain effective networks. It was that the topology of the brain networks and the brain’s ability to integrate information changed when subjects shifted from the alert to the drowsy stage. In particular, there was a significant difference in terms of strength of Granger causality (GC in the frequency domain and the properties of the brain effective network i.e., causal flow, global efficiency and characteristic path length between such conditions. Also, some changes were more significant over the frontal brain lobes for the alpha frequency band. These findings might be used to detect drivers’ fatigue levels, and as reference work for future studies.

  12. Biometrics for home networks security

    KAUST Repository

    Ansari, Imran Shafique

    2009-01-01

    Hacking crimes committed to the home networks are increasing. Advanced network protection is not always possible for the home networks. In this paper we will study the ability of using biometric systems for authentication in home networks. ©2009 IEEE.

  13. Authentication Protocols for Internet of Things: A Comprehensive Survey

    Directory of Open Access Journals (Sweden)

    Mohamed Amine Ferrag

    2017-01-01

    Full Text Available In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT is presented. Specifically more than forty authentication protocols developed for or applied in the context of the IoT are selected and examined in detail. These protocols are categorized based on the target environment: (1 Machine to Machine Communications (M2M, (2 Internet of Vehicles (IoV, (3 Internet of Energy (IoE, and (4 Internet of Sensors (IoS. Threat models, countermeasures, and formal security verification techniques used in authentication protocols for the IoT are presented. In addition a taxonomy and comparison of authentication protocols that are developed for the IoT in terms of network model, specific security goals, main processes, computation complexity, and communication overhead are provided. Based on the current survey, open issues are identified and future research directions are proposed.

  14. METHODS FOR QUALITY ENHANCEMENT OF USER VOICE SIGNAL IN VOICE AUTHENTICATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    O. N. Faizulaieva

    2014-03-01

    Full Text Available The reasonability for the usage of computer systems user voice in the authentication process is proved. The scientific task for improving the signal/noise ratio of the user voice signal in the authentication system is considered. The object of study is the process of input and output of the voice signal of authentication system user in computer systems and networks. Methods and means for input and extraction of voice signal against external interference signals are researched. Methods for quality enhancement of user voice signal in voice authentication systems are suggested. As modern computer facilities, including mobile ones, have two-channel audio card, the usage of two microphones is proposed in the voice signal input system of authentication system. Meanwhile, the task of forming a lobe of microphone array in a desired area of voice signal registration (100 Hz to 8 kHz is solved. The usage of directional properties of the proposed microphone array gives the possibility to have the influence of external interference signals two or three times less in the frequency range from 4 to 8 kHz. The possibilities for implementation of space-time processing of the recorded signals using constant and adaptive weighting factors are investigated. The simulation results of the proposed system for input and extraction of signals during digital processing of narrowband signals are presented. The proposed solutions make it possible to improve the value of the signal/noise ratio of the useful signals recorded up to 10, ..., 20 dB under the influence of external interference signals in the frequency range from 4 to 8 kHz. The results may be useful to specialists working in the field of voice recognition and speaker’s discrimination.

  15. k-Times Anonymous Authentication

    Science.gov (United States)

    Teranishi, Isamu; Furukawa, Jun; Sako, Kazue

    We propose an authentication scheme in which users can be authenticated anonymously so long as times that they are authenticated is within an allowable number. The proposed scheme has two features: 1) no one, not even an authority, can identify users who have been authenticated within the allowable number, 2) anyone can trace, without help from the authority, dishonest users who have been authenticated beyond the allowable number by using the records of these authentications. Our scheme can be applied to e-voting, e-cash, electronic coupons, and trial browsing of content. In these applications, our scheme, unlike the previous one, conceals users' participation from protocols and guarantees that they will remain anonymous to everyone.

  16. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    Inhabitants in smart environments are often authenticated when they enter the smart environment, e.g., through biometrics or smart-/swipe-card systems. It may sometimes be necessary to re-authenticate when an inhabitant wishes to enter a restricted area or access ambient services or location based...... information, e.g., it is common to have swipe card terminals placed next to doors to restricted areas. This means that all access to protected resources must have individual means of authenticating users, which makes the access control system more expensive and less flexible, because access controls...... will not be installed unless it is absolutely necessary. The cost of installing and maintaining an authentication infrastructure and the inconvenience of repeatedly authenticating toward different location based service providers mean that new models of authentication are needed in smart environments. This paper...

  17. The influence of trait-emotional intelligence on authentic leadership

    Directory of Open Access Journals (Sweden)

    Martina Kotzé

    2015-11-01

    Full Text Available Orientation: Authentic leadership is a relatively new construct that has recently gained increasing attention resulting from challenges faced by organisations relating to ethical meltdowns, corruption and fraud. Research purpose: This study seeks to explore the relationship between components of emotional intelligence and authentic leadership. Motivation for the study: Several authors called for more empirical investigations into the antecedents of authentic leadership. Despite the important role that emotions play in leadership, empirical studies were lacking about the influence of different components of emotional intelligence to authentic leadership. Research design, approach and method: Data were collected, using questionnaires obtained from 341 full-time employed applicants to MBA and leadership programmes in a South African Business School. Relationships between variables were analysed, using Pearson product-moment correlations and stepwise multiple regression. Main findings: The results indicated that emotional intelligence has positive statistically significant associations with authentic leadership. Specifically, those who scored high on all the emotional intelligence components also scored high on authentic leadership. In addition, the emotional intelligence component of empathy was a statistically significant predictor of authentic leadership. Practical/managerial implications: Initial findings suggest the potential value of recognising and developing the emotional intelligence of leaders to enable them to lead their organisations authentically to desired, successful outcomes. As empathy has been shown to be the most important emotional intelligence predictor of authentic leadership, leaders need to understand when subordinates perceive a leader as displaying empathic emotion. Contribution: This study contributes to the literature and empirical research on the antecedents of authentic leadership.

  18. CLAS: A Novel Communications Latency Based Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Zuochao Dou

    2017-01-01

    Full Text Available We design and implement a novel communications latency based authentication scheme, dubbed CLAS, that strengthens the security of state-of-the-art web authentication approaches by leveraging the round trip network communications latency (RTL between clients and authenticators. In addition to the traditional credentials, CLAS profiles RTL values of clients and uses them to defend against password compromise. The key challenges are (i to prevent RTL manipulation, (ii to alleviate network instabilities, and (iii to address mobile clients. CLAS addresses the first challenge by introducing a novel network architecture, which makes it extremely difficult for attackers to simulate legitimate RTL values. The second challenge is addressed by outlier removal and multiple temporal profiling, while the last challenge is addressed by augmenting CLAS with out-of-band-channels or other authentication schemes. CLAS restricts login to profiled locations while demanding additional information for nonprofiled ones, which highly reduces the attack surface even when the legitimate credentials are compromised. Additionally, unlike many state-of-the-art authentication mechanisms, CLAS is resilient to phishing, pharming, man-in-the-middle, and social engineering attacks. Furthermore, CLAS is transparent to users and incurs negligible overhead. The experimental results show that CLAS can achieve very low false positive and false negative rates.

  19. Secure and robust authentication for DC MicroGrids based on power talk communication

    DEFF Research Database (Denmark)

    Angjelichinoski, Marko; Danzi, Pietro; Stefanovic, Cedomir

    2017-01-01

    We propose a novel framework for secure and reliable authentication of Distributed Energy Resources to the centralized secondary/tertiary control system of a DC MicroGrid (MG), networked using the IEEE 802.11 wireless interface. The key idea is to perform the authentication using power talk...

  20. Authentic, Original, and Valuable

    DEFF Research Database (Denmark)

    Tupasela, Aaro Mikael; Tamminen, Sakari

    2015-01-01

    The idea of genetic authenticity and origin has been an important issue within genetics for decades for scientific, political, and economic reasons. The question of where species and populations come from, as well as the linking of genetic traits to particular geographical locations, has resurfaced....... Using the case of human and non-human genetics to compare and contrast the various facets associated with genetic identity, we seek to develop a broader picture of the ways in which genetics plays an important role in stabilizing categories of origin....

  1. Multiplex visibility graphs to investigate recurrent neural network dynamics

    Science.gov (United States)

    Bianchi, Filippo Maria; Livi, Lorenzo; Alippi, Cesare; Jenssen, Robert

    2017-03-01

    A recurrent neural network (RNN) is a universal approximator of dynamical systems, whose performance often depends on sensitive hyperparameters. Tuning them properly may be difficult and, typically, based on a trial-and-error approach. In this work, we adopt a graph-based framework to interpret and characterize internal dynamics of a class of RNNs called echo state networks (ESNs). We design principled unsupervised methods to derive hyperparameters configurations yielding maximal ESN performance, expressed in terms of prediction error and memory capacity. In particular, we propose to model time series generated by each neuron activations with a horizontal visibility graph, whose topological properties have been shown to be related to the underlying system dynamics. Successively, horizontal visibility graphs associated with all neurons become layers of a larger structure called a multiplex. We show that topological properties of such a multiplex reflect important features of ESN dynamics that can be used to guide the tuning of its hyperparamers. Results obtained on several benchmarks and a real-world dataset of telephone call data records show the effectiveness of the proposed methods.

  2. A Net of Friends: Investigating Friendship by Integrating Attachment Theory and Social Network Analysis.

    Science.gov (United States)

    Gillath, Omri; Karantzas, Gery C; Selcuk, Emre

    2017-11-01

    The current article focuses on attachment style-an individual difference widely studied in the field of close relationships-and its application to the study of social networks. Specifically, we investigated whether attachment style predicts perception and management of social networks. In Study 1, we examined the associations of attachment style with perceptions of network tie strength and multiplexity. In Studies 2a and 2b, we investigated the association between attachment style and network management skills (initiating, maintaining, and dissolving ties) and whether network management skills mediated the associations of attachment style with network tie strength and multiplexity. In Study 3, experimentally enhancing attachment security made people more likely to initiate and less likely to dissolve social ties (for the latter, especially among those high on avoidance or anxiety). As for maintenance, security priming also increased maintenance; however, mainly among people high on attachment anxiety or low on attachment avoidance.

  3. Authenticity, Culture and Language Learning

    Science.gov (United States)

    MacDonald, Malcolm N.; Badger, Richard; Dasli, Maria

    2006-01-01

    In philosophy, authenticity has been used with two meanings: one entails the notion of correspondence; the other entails the notion of genesis (Cooper, 1983: 15). As in certain branches of philosophy, language teaching has perhaps clung too long to the first of these notions of authenticity at the expense of the other. This paper reviews four key…

  4. ATD and CoP in a framework for investigating social networks in physics classrooms

    DEFF Research Database (Denmark)

    Bruun, Jesper

    2011-01-01

    The article presents a tool for analysing transcribed and annotated video recordings. The tool relies on a network representation of the data, where the nodes derive from categories of activities. Following a summary of the observed learning situation, it is suggested how anthropological theory o...... of the didactical (ATD) and communities of practice (CoP) can be incorporated in the network representation in order to investigate student discussion networks in physics classrooms....

  5. A Multifactor Secure Authentication System for Wireless Payment

    Science.gov (United States)

    Sanyal, Sugata; Tiwari, Ayu; Sanyal, Sudip

    Organizations are deploying wireless based online payment applications to expand their business globally, it increases the growing need of regulatory requirements for the protection of confidential data, and especially in internet based financial areas. Existing internet based authentication systems often use either the Web or the Mobile channel individually to confirm the claimed identity of the remote user. The vulnerability is that access is based on only single factor authentication which is not secure to protect user data, there is a need of multifactor authentication. This paper proposes a new protocol based on multifactor authentication system that is both secure and highly usable. It uses a novel approach based on Transaction Identification Code and SMS to enforce another security level with the traditional Login/password system. The system provides a highly secure environment that is simple to use and deploy with in a limited resources that does not require any change in infrastructure or underline protocol of wireless network. This Protocol for Wireless Payment is extended as a two way authentications system to satisfy the emerging market need of mutual authentication and also supports secure B2B communication which increases faith of the user and business organizations on wireless financial transaction using mobile devices.

  6. MetNet Network Mission for Martian Atmospheric Investigations

    Science.gov (United States)

    Harri, A.-M.; Alexashkin, S.; Arrugeo, I.; Schmidt, W.; Vazquez, L.; Genzer, M.; Haukka, H.

    2014-07-01

    A new kind of planetary exploration mission for Mars called MetNet is being developed for martian atmospheric investigations. The eventual scope of the MetNet Mission is to deploy tens of small landers on the martian surface.

  7. Authentication and Data Security in ITS Telecommunications Solutions

    Directory of Open Access Journals (Sweden)

    Tomas Zelinka

    2014-04-01

    Full Text Available Paper presents telecommunications security issues with dynamically changing networking. Paper also presents performance indicators of authentication as an integral part of the approach to non-public information. Expected level of security depend on relevant ITS services requirements, different solutions require different levels of quality. Data volumes transferred both in private data vehicle on board networks as well as between vehicles and infrastructure or other vehicles significantly and progressively grow. This trend leads to increase of the fatal problems if security of the wide area networks is not relevantly treated. Relevant communications security treatment becomes crucial part of the ITS telecommunications solution because probability of hazards appearances grow if vehicles networks are integrated in the dynamically organized wide area networks. Besides of available "off shelf" security tools solution based on non-public universal identifier with dynamical extension and data selection according to actor role or category is presented including performances indicators for the authentication process.

  8. Investigation of membrane mechanics using spring networks: application to red-blood-cell modelling.

    Science.gov (United States)

    Chen, Mingzhu; Boyle, Fergal J

    2014-10-01

    In recent years a number of red-blood-cell (RBC) models have been proposed using spring networks to represent the RBC membrane. Some results predicted by these models agree well with experimental measurements. However, the suitability of these membrane models has been questioned. The RBC membrane, like a continuum membrane, is mechanically isotropic throughout its surface, but the mechanical properties of a spring network vary on the network surface and change with deformation. In this work spring-network mechanics are investigated in large deformation for the first time via an assessment of the effect of network parameters, i.e. network mesh, spring type and surface constraint. It is found that a spring network is conditionally equivalent to a continuum membrane. In addition, spring networks are employed for RBC modelling to replicate the optical tweezers test. It is found that a spring network is sufficient for modelling the RBC membrane but strain-hardening springs are required. Moreover, the deformation profile of a spring network is presented for the first time via the degree of shear. It is found that spring-network deformation approaches continuous as the mesh density increases. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. Disclosing Sexual Assault Within Social Networks: A Mixed-Method Investigation.

    Science.gov (United States)

    Dworkin, Emily R; Pittenger, Samantha L; Allen, Nicole E

    2016-03-01

    Most survivors of sexual assault disclose their experiences within their social networks, and these disclosure decisions can have important implications for their entry into formal systems and well-being, but no research has directly examined these networks as a strategy to understand disclosure decisions. Using a mixed-method approach that combined survey data, social network analysis, and interview data, we investigate whom, among potential informal responders in the social networks of college students who have experienced sexual assault, survivors contact regarding their assault, and how survivors narrate the role of networks in their decisions about whom to contact. Quantitative results suggest that characteristics of survivors, their social networks, and members of these networks are associated with disclosure decisions. Using data from social network analysis, we identified that survivors tended to disclose to a smaller proportion of their network when many network members had relationships with each other or when the network had more subgroups. Our qualitative analysis helps to contextualize these findings. © Society for Community Research and Action 2016.

  10. Why Do You Adopt Social Networking Sites? Investigating the Driving Factors through Structural Equation Modelling

    Science.gov (United States)

    Jan, Muhammad Tahir

    2017-01-01

    Purpose: The purpose of this paper is to investigate those factors that are associated with the adoption of social networking sites from the perspective of Muslim users residing in Malaysia. Design/methodology/approach: A complete self-administered questionnaire was collected from 223 Muslim users of social networking sites in Malaysia. Both…

  11. Investigating a holobiont: Microbiota perturbations and transkingdom networks.

    Science.gov (United States)

    Greer, Renee; Dong, Xiaoxi; Morgun, Andrey; Shulzhenko, Natalia

    2016-01-01

    The scientific community has recently come to appreciate that, rather than existing as independent organisms, multicellular hosts and their microbiota comprise a complex evolving superorganism or metaorganism, termed a holobiont. This point of view leads to a re-evaluation of our understanding of different physiological processes and diseases. In this paper we focus on experimental and computational approaches which, when combined in one study, allowed us to dissect mechanisms (traditionally named host-microbiota interactions) regulating holobiont physiology. Specifically, we discuss several approaches for microbiota perturbation, such as use of antibiotics and germ-free animals, including advantages and potential caveats of their usage. We briefly review computational approaches to characterize the microbiota and, more importantly, methods to infer specific components of microbiota (such as microbes or their genes) affecting host functions. One such approach called transkingdom network analysis has been recently developed and applied in our study. (1) Finally, we also discuss common methods used to validate the computational predictions of host-microbiota interactions using in vitro and in vivo experimental systems.

  12. An efficient chaotic maps-based authentication and key agreement scheme using smartcards for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2013-12-01

    A smartcard-based authentication and key agreement scheme for telecare medicine information systems enables patients, doctors, nurses and health visitors to use smartcards for secure login to medical information systems. Authorized users can then efficiently access remote services provided by the medicine information systems through public networks. Guo and Chang recently improved the efficiency of a smartcard authentication and key agreement scheme by using chaotic maps. Later, Hao et al. reported that the scheme developed by Guo and Chang had two weaknesses: inability to provide anonymity and inefficient double secrets. Therefore, Hao et al. proposed an authentication scheme for telecare medicine information systems that solved these weaknesses and improved performance. However, a limitation in both schemes is their violation of the contributory property of key agreements. This investigation discusses these weaknesses and proposes a new smartcard-based authentication and key agreement scheme that uses chaotic maps for telecare medicine information systems. Compared to conventional schemes, the proposed scheme provides fewer weaknesses, better security, and more efficiency.

  13. Tiqr: a novel take on two-factor authentication

    NARCIS (Netherlands)

    van Rijswijk, Roland M.; van Dijk, Joost

    2011-01-01

    Authentication is of paramount importance for all modern networked applications. The username/password paradigm is ubiquitous. This paradigm suffices for many applications that require a relatively low level of assurance about the identity of the end user, but it quickly breaks down when a stronger

  14. Analysis and Comparison on Novel Sensor Network Security Access Technology

    Directory of Open Access Journals (Sweden)

    Ping LIU

    2014-01-01

    Full Text Available The article introduces against technical defects of traditional network access control system, detail NAC, NAP, UAC and TNC four kinds of new network security access technology, and this article analyzes and compares them. Security framework for wireless sensor networks SPINS defines the mechanism and algorithm of complete and effective in confidentiality, point-to-point message authentication, integrity, authentication, broadcast authentication.

  15. The influence of tie strength on evolutionary games on networks: An empirical investigation

    Science.gov (United States)

    Buesser, Pierre; Peña, Jorge; Pestelacci, Enea; Tomassini, Marco

    2011-11-01

    Extending previous work on unweighted networks, we present here a systematic numerical investigation of standard evolutionary games on weighted networks. In the absence of any reliable model for generating weighted social networks, we attribute weights to links in a few ways supported by empirical data ranging from totally uncorrelated to weighted bipartite networks. The results of the extensive simulation work on standard complex network models show that, except in a case that does not seem to be common in social networks, taking the tie strength into account does not change in a radical manner the long-run steady-state behavior of the studied games. Besides model networks, we also included a real-life case drawn from a coauthorship network. In this case also, taking the weights into account only changes the results slightly with respect to the raw unweighted graph, although to draw more reliable conclusions on real social networks many more cases should be studied as these weighted networks become available.

  16. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  17. Authentic leadership: application to women leaders

    Science.gov (United States)

    Hopkins, Margaret M.; O’Neil, Deborah A.

    2015-01-01

    The purpose of this perspective article is to present the argument that authentic leadership is a gendered representation of leadership. We first provide a brief history of leadership theories and definitions of authentic leadership. We then critique authentic leadership and offer arguments to support the premise that authentic leadership is not gender-neutral and is especially challenging for women. PMID:26236254

  18. Physical trust-based persistent authentication

    DEFF Research Database (Denmark)

    Fujita, Masahiro; Jensen, Christian D.; Arimura, Shiori

    2015-01-01

    Recently companies have applied two-factor user authentication. Persistent Authentication is one of the interesting authentication mechanisms to establish security and usability of two-factor authentication systems. However, there is room to improve its feasibility and usability. In this paper, we...... propose a new type of persistent authentication, called Persistent Authentication Based On physical Trust (PABOT). PABOT uses a context of “physical trust relationship” that is built by visual contact between users, and thus can offer a persistent authentication mechanism with better usability and higher...

  19. Emotional state and its impact on voice authentication accuracy

    Science.gov (United States)

    Voznak, Miroslav; Partila, Pavol; Penhaker, Marek; Peterek, Tomas; Tomala, Karel; Rezac, Filip; Safarik, Jakub

    2013-05-01

    The paper deals with the increasing accuracy of voice authentication methods. The developed algorithm first extracts segmental parameters, such as Zero Crossing Rate, the Fundamental Frequency and Mel-frequency cepstral coefficients from voice. Based on these parameters, the neural network classifier detects the speaker's emotional state. These parameters shape the distribution of neurons in Kohonen maps, forming clusters of neurons on the map characterizing a particular emotional state. Using regression analysis, we can calculate the function of the parameters of individual emotional states. This relationship increases voice authentication accuracy and prevents unjust rejection.

  20. Developing a multimodal biometric authentication system using soft computing methods.

    Science.gov (United States)

    Malcangi, Mario

    2015-01-01

    Robust personal authentication is becoming ever more important in computer-based applications. Among a variety of methods, biometric offers several advantages, mainly in embedded system applications. Hard and soft multi-biometric, combined with hard and soft computing methods, can be applied to improve the personal authentication process and to generalize the applicability. This chapter describes the embedded implementation of a multi-biometric (voiceprint and fingerprint) multimodal identification system based on hard computing methods (DSP) for feature extraction and matching, an artificial neural network (ANN) for soft feature pattern matching, and a fuzzy logic engine (FLE) for data fusion and decision.

  1. Investigating the structure of semantic networks in low and high creative persons.

    Science.gov (United States)

    Kenett, Yoed N; Anaki, David; Faust, Miriam

    2014-01-01

    According to Mednick's (1962) theory of individual differences in creativity, creative individuals appear to have a richer and more flexible associative network than less creative individuals. Thus, creative individuals are characterized by "flat" (broader associations) instead of "steep" (few, common associations) associational hierarchies. To study these differences, we implement a novel computational approach to the study of semantic networks, through the analysis of free associations. The core notion of our method is that concepts in the network are related to each other by their association correlations-overlap of similar associative responses ("association clouds"). We began by collecting a large sample of participants who underwent several creativity measurements and used a decision tree approach to divide the sample into low and high creative groups. Next, each group underwent a free association generation paradigm which allowed us to construct and analyze the semantic networks of both groups. Comparison of the semantic memory networks of persons with low creative ability and persons with high creative ability revealed differences between the two networks. The semantic memory network of persons with low creative ability seems to be more rigid, compared to the network of persons with high creative ability, in the sense that it is more spread out and breaks apart into more sub-parts. We discuss how our findings are in accord and extend Mednick's (1962) theory and the feasibility of using network science paradigms to investigate high level cognition.

  2. Investigating the structure of semantic networks in low and high creative persons

    Directory of Open Access Journals (Sweden)

    Yoed Nissan Kenett

    2014-06-01

    Full Text Available According to Mednick’s (1962 theory of individual differences in creativity, creative individuals appear to have a richer and more flexible associative network than less creative individuals. Thus, creative individuals are characterized by flat (broader associations instead of steep (few, common associations associational hierarchies. To study these differences, we implement a novel computational approach to the study of semantic networks, through the analysis of free associations. The core notion of our method is that concepts in the network are related to each other by their association correlations - overlap of similar associative responses (association clouds. We began by collecting a large sample of participants who underwent several creativity measurements and used a decision tree approach to divide the sample into low and high creative groups. Next, each group underwent a free association generation paradigm which allowed us to construct and analyze the semantic networks of both groups. Comparison of the semantic memory networks of persons with low creative ability and persons with high creative ability revealed differences between the two networks. The semantic memory network of persons with low creative ability seems to be more rigid, compared to the network of persons with high creative ability, in the sense that it is more spread out and breaks apart into more sub-parts. We discuss how our findings are in accord and extend Mednick’s (1962 theory and the feasibility of using network science paradigms to investigate high level cognition.

  3. The fantasy of authenticity: touring with Lacan

    OpenAIRE

    Knudsen, Daniel C.; Rickly, J.M.; Vidon, Elizabeth S.

    2016-01-01

    Amidst the plethora of research regarding the meaning of authenticity, there remains uncertainty as to the work authenticity performs in tourism. Existential authenticity conceptually shifts focus from the objects of touristic practice to a sense of Being, suggesting that authenticity can be achieved, albeit only in the liminal moments of tourism experiences. Psychoanalysis would contend otherwise – authenticity will always be beyond our reach. In a 2006 publication, Tim Oakes broaches the to...

  4. Authentication Method for Privacy Protection in Smart Grid Environment

    Directory of Open Access Journals (Sweden)

    Do-Eun Cho

    2014-01-01

    Full Text Available Recently, the interest in green energy is increasing as a means to resolve problems including the exhaustion of the energy source and, effective management of energy through the convergence of various fields. Therefore, the projects of smart grid which is called intelligent electrical grid for the accomplishment of low carbon green growth are being carried out in a rush. However, as the IT is centered upon the electrical grid, the shortage of IT also appears in smart grid and the complexity of convergence is aggravating the problem. Also, various personal information and payment information within the smart grid are gradually becoming big data and target for external invasion and attack; thus, there is increase in concerns for this matter. The purpose of this study is to analyze the security vulnerabilities and security requirement within smart grid and the authentication and access control method for privacy protection within home network. Therefore, we propose a secure access authentication and remote control method for user’s home device within home network environment, and we present their security analysis. The proposed access authentication method blocks the unauthorized external access and enables secure remote access to home network and its devices with a secure message authentication protocol.

  5. Final report for the mobile node authentication LDRD project.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Lanzone, Andrew J.

    2005-09-01

    In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

  6. Quantum direct communication with authentication

    International Nuclear Information System (INIS)

    Lee, Hwayean; Lim, Jongin; Yang, HyungJin

    2006-01-01

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states

  7. Authentication techniques for smart cards

    International Nuclear Information System (INIS)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system

  8. Authentication techniques for smart cards

    Energy Technology Data Exchange (ETDEWEB)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  9. Important subjective life experiences and sense of authenticity: retrospective survey among Japanese university students.

    Science.gov (United States)

    Ito, Masaya; Kodama, Masahiro

    2008-12-01

    This study investigated the relation of important subjective life experiences with sense of authenticity for 238 Japanese university students who responded to the Sense of Authenticity Scale and provided free descriptions regarding their important life experiences. Analyses suggested a group with high scores on the Sense of Authenticity Scale tended to cite extracurricular activities as important life experiences, while those with low scores tended to cite cramming for examinations. Results were discussed in terms of interpersonal relationships.

  10. Relationships among Tourists' Needs for Uniqueness, Perceived Authenticity and Behavioral Intentions

    OpenAIRE

    Deniz Karagöz Yüncü

    2016-01-01

    This study tested a structural model which investigates the relationships among tourists’ need for uniqueness, perceived authenticity (object-based authenticity and existential authenticity) and behavioral intentions to consume cultural and heritage destinations. The sample of the study comprised of 281 participants in a cultural heritage site, in Cappadocia, Turkey. The data were provided via face to face interviews in two months (September and October) which considered the high season. Stru...

  11. Defining the questions: a research agenda for nontraditional authentication in arms control

    Energy Technology Data Exchange (ETDEWEB)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  12. Beneficiary contact moderates relationship between authentic leadership and engagement

    Directory of Open Access Journals (Sweden)

    Caren B. Scheepers

    2016-07-01

    Full Text Available Orientation: Beneficiary contact moderates the relationship between authentic leadership and work engagement. Research purpose: The objective of this study was to examine the moderating effect of the breadth, depth and frequency of employee interaction with the beneficiaries of their work on the positive impact of authentic leadership on work engagement. Motivation for the study: Investigating the boundary conditions of the relationship between leaders and followers is vital to enhance the positive effect of leadership. Authentic leadership has not previously been examined with respect to beneficiary contact as a specific situational factor. The researchers therefore set out to ascertain whether beneficiary contact has a strengthening or weakening effect on the impact of authentic leadership on work engagement. Research design, approach and method: The researchers administered the Authentic Leadership Questionnaire (ALQ, the Utrecht Work Engagement Scale (UWES-9 and Grant’s scale on Beneficiary Contact. Main findings: The findings showed that beneficiary contact had a weakening effect on the positive relationship between authentic leadership and work engagement. Practical/managerial implications: Ideally, organisations create environments conducive to work engagement in which leadership plays an important role. This study found that one factor in the work environment, namely beneficiary contact, might have an adverse effect on the positive relationship that authentic leadership has on work engagement. Leaders should therefore take organisational contextual realities into account, such as regular, intense interaction of employees with the beneficiaries of their work. This situation could create strain for individual employees, requiring additional organisational support. Contribution/value-add: Organisations need to recognise the impact of beneficiary contact on the relationship between authentic leadership and work engagement. The researchers

  13. Measuring Evidential Weight in Digital Forensic Investigations: a Role for Bayesian Networks in Digital Forensic Triage

    OpenAIRE

    Overill, Richard Edward; Chow, Kam-Pui

    2017-01-01

    A method for obtaining a quantitative measure of the relative weight of each individual item of evidence in a digital forensic investigation by means of a Bayesian network is described. The resulting evidential weights can then be used to determine a near-optimal cost-effective triage scheme for the investigation in question.

  14. Authenticity in art

    International Nuclear Information System (INIS)

    Fleming, S.J.

    1975-01-01

    After a general introductory chapter, the subject is treated under three headings: paintings, ceramics and metals. The scientific tests for authenticity are described in their application to one or more of these branches of art. The traditional method of visual stylistic judgement is compared with and supplemented by scientific methods which (as well as 'wet' chemical analysis, optical microscopy, ultraviolet, infrared, electron and X-ray microscopy, X-ray crystallography and X-ray fluorescence, and direct age determination) include the following or more direct 'nuclear' interest: neutron (or proton, deuteron and high-energy photon) activation analysis for determining impurity and trace element content, gamma radiography for bronzes, neutron autoradiography or examining paintings, radiocarbon dating, other isotope dating (e.g. with lead isotopes and the radium-lead ratio), high temperature thermoluminescence for ceramics, and mass spectroscopy to determine isotope ratios indicative of particular sources of materials. As well as the reference in each chapter there is an additional bibliography. (U.K.)

  15. Investigating DMOs through the Lens of Social Network Analysis: Theoretical Gaps, Methodological Challenges and Practitioner Perspectives

    Directory of Open Access Journals (Sweden)

    Dean HRISTOV

    2015-06-01

    Full Text Available The extant literature on networks in tourism management research has traditionally acknowledged destinations as the primary unit of analysis. This paper takes an alternative perspective and positions Destination Management Organisations (DMOs at the forefront of today’s tourism management research agenda. Whilst providing a relatively structured approach to generating enquiry, network research vis-à-vis Social Network Analysis (SNA in DMOs is often surrounded by serious impediments. Embedded in the network literature, this conceptual article aims to provide a practitioner perspective on addressing the obstacles to undertaking network studies in DMO organisations. A simple, three-step methodological framework for investigating DMOs as interorganisational networks of member organisations is proposed in response to complexities in network research. The rationale behind introducing such framework lies in the opportunity to trigger discussions and encourage further academic contributions embedded in both theory and practice. Academic and practitioner contributions are likely to yield insights into the importance of network methodologies applied to DMO organisations.

  16. An Empirical Investigation of Catastrophic Forgetting in Gradient-Based Neural Networks

    OpenAIRE

    Goodfellow, Ian J.; Mirza, Mehdi; Xiao, Da; Courville, Aaron; Bengio, Yoshua

    2013-01-01

    Catastrophic forgetting is a problem faced by many machine learning models and algorithms. When trained on one task, then trained on a second task, many machine learning models "forget" how to perform the first task. This is widely believed to be a serious problem for neural networks. Here, we investigate the extent to which the catastrophic forgetting problem occurs for modern neural networks, comparing both established and recent gradient-based training algorithms and activation functions. ...

  17. Evaluation and Investigation of the Delay in VoIP Networks

    Directory of Open Access Journals (Sweden)

    V. Janata

    2011-06-01

    Full Text Available The paper is focused mainly on the delay problems, which considerably influence the final quality of connections in VoIP (Voice over IP networks. The paper provides a detailed exploration of the nature and mechanisms of the delay. The main purpose of the investigation was an attempt to formulate a mathematical model of delay in the VoIP network and its subsequent analysis by laboratory data.

  18. A Text-Independent Speaker Authentication System for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Florentin Thullier

    2017-09-01

    Full Text Available This paper presents a text independent speaker authentication method adapted to mobile devices. Special attention was placed on delivering a fully operational application, which admits a sufficient reliability level and an efficient functioning. To this end, we have excluded the need for any network communication. Hence, we opted for the completion of both the training and the identification processes directly on the mobile device through the extraction of linear prediction cepstral coefficients and the naive Bayes algorithm as the classifier. Furthermore, the authentication decision is enhanced to overcome misidentification through access privileges that the user should attribute to each application beforehand. To evaluate the proposed authentication system, eleven participants were involved in the experiment, conducted in quiet and noisy environments. Public speech corpora were also employed to compare this implementation to existing methods. Results were efficient regarding mobile resources’ consumption. The overall classification performance obtained was accurate with a small number of samples. Then, it appeared that our authentication system might be used as a first security layer, but also as part of a multilayer authentication, or as a fall-back mechanism.

  19. An automatic method to generate domain-specific investigator networks using PubMed abstracts

    Directory of Open Access Journals (Sweden)

    Gwinn Marta

    2007-06-01

    Full Text Available Abstract Background Collaboration among investigators has become critical to scientific research. This includes ad hoc collaboration established through personal contacts as well as formal consortia established by funding agencies. Continued growth in online resources for scientific research and communication has promoted the development of highly networked research communities. Extending these networks globally requires identifying additional investigators in a given domain, profiling their research interests, and collecting current contact information. We present a novel strategy for building investigator networks dynamically and producing detailed investigator profiles using data available in PubMed abstracts. Results We developed a novel strategy to obtain detailed investigator information by automatically parsing the affiliation string in PubMed records. We illustrated the results by using a published literature database in human genome epidemiology (HuGE Pub Lit as a test case. Our parsing strategy extracted country information from 92.1% of the affiliation strings in a random sample of PubMed records and in 97.0% of HuGE records, with accuracies of 94.0% and 91.0%, respectively. Institution information was parsed from 91.3% of the general PubMed records (accuracy 86.8% and from 94.2% of HuGE PubMed records (accuracy 87.0. We demonstrated the application of our approach to dynamic creation of investigator networks by creating a prototype information system containing a large database of PubMed abstracts relevant to human genome epidemiology (HuGE Pub Lit, indexed using PubMed medical subject headings converted to Unified Medical Language System concepts. Our method was able to identify 70–90% of the investigators/collaborators in three different human genetics fields; it also successfully identified 9 of 10 genetics investigators within the PREBIC network, an existing preterm birth research network. Conclusion We successfully created a

  20. Supervised neural network modeling: an empirical investigation into learning from imbalanced data with labeling errors.

    Science.gov (United States)

    Khoshgoftaar, Taghi M; Van Hulse, Jason; Napolitano, Amri

    2010-05-01

    Neural network algorithms such as multilayer perceptrons (MLPs) and radial basis function networks (RBFNets) have been used to construct learners which exhibit strong predictive performance. Two data related issues that can have a detrimental impact on supervised learning initiatives are class imbalance and labeling errors (or class noise). Imbalanced data can make it more difficult for the neural network learning algorithms to distinguish between examples of the various classes, and class noise can lead to the formulation of incorrect hypotheses. Both class imbalance and labeling errors are pervasive problems encountered in a wide variety of application domains. Many studies have been performed to investigate these problems in isolation, but few have focused on their combined effects. This study presents a comprehensive empirical investigation using neural network algorithms to learn from imbalanced data with labeling errors. In particular, the first component of our study investigates the impact of class noise and class imbalance on two common neural network learning algorithms, while the second component considers the ability of data sampling (which is commonly used to address the issue of class imbalance) to improve their performances. Our results, for which over two million models were trained and evaluated, show that conclusions drawn using the more commonly studied C4.5 classifier may not apply when using neural networks.

  1. Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6

    Directory of Open Access Journals (Sweden)

    HyunGon Kim

    2010-01-01

    Full Text Available Wireless communication service providers have been showing strong interest in Proxy Mobile IPv6 for providing network-based IP mobility management. This could be a prominent way to support IP mobility to mobile nodes, because Proxy Mobile IPv6 requires minimal functionalities on the mobile node. While several extensions for Proxy Mobile IPv6 are being developed in the Internet Engineering Task Force, there has been little attentions paid to developing efficient authentication mechanisms. An authentication scheme for a mobility protocol must protect signaling messages against various security threats, e.g., session stealing attack, intercept attack by redirection, replay attack, and key exposure, while minimizing authentication latency. In this paper, we propose a Diffie-Hellman key based authentication scheme that utilizes the low layer signaling to exchange Diffie-Hellman variables and allows mobility service provisioning entities to exchange mobile node's profile and ongoing sessions securely. By utilizing the low layer signaling and context transfer between relevant nodes, the proposed authentication scheme minimizes authentication latency when the mobile node moves across different networks. In addition, thanks to the use of the Diffie-Hellman key agreement, pre-established security associations between mobility service provisioning entities are not required in the proposed authentication scheme so that network scalability in an operationally efficient manner is ensured. To ascertain its feasibility, security analysis and performance analysis are presented.

  2. Screening of grated cheese authenticity by nir spectroscopy

    Directory of Open Access Journals (Sweden)

    Chiara Cevoli

    2013-09-01

    Full Text Available Parmigiano–Reggiano (PR cheese is one of the oldest traditional cheeses produced in Europe, and it is still one of the most valuable Protected Designation of Origin (PDO cheeses of Italy. The denomination of origin is extended to the grated cheese when manufactured exclusively from whole Parmigiano-Reggiano cheese wheels that respond to the production standard. The grated cheese must be matured for a period of at least 12 months and characterized by a rind content not over 18%. In this investigation the potential of near infrared spectroscopy (NIR, coupled to different statistical methods, were used to estimate the authenticity of grated Parmigiano Reggiano cheese PDO. Cheese samples were classified as: compliance PR, competitors, non-compliance PR (defected PR, and PR with rind content greater then 18%. NIR spectra were obtained using a spectrophotometer Vector 22/N (Bruker Optics, Milan, Italy in the diffuse reflectance mode. Instrument was equipped with a rotating integrating sphere. Principal Component Analysis (PCA was conducted for an explorative spectra analysis, while the Artificial Neural Networks (ANN were used to classify spectra, according to different cheese categories. Subsequently the rind percentage and month of ripening were estimated by a Partial Least Squares regression (PLS. Score plots of the PCA show a clear separation between compliance PR samples and the rest of the sample was observed. Competitors samples and the defected PR samples were grouped together. The classification performance for all sample classes, obtained by ANN analysis, was higher of 90%, in test set validation. Rind content and month of ripening were predicted by PLS a with a determination coefficient greater then 0.95 (test set. These results showed that the method can be suitable for a fast screening of grated cheese authenticity.

  3. Investigating Background Pictures for Picture Gesture Authentication

    Science.gov (United States)

    2017-06-01

    Referring back to the working example in Figure 2.1, the POIs include the heads of each person , their eyes , their noses, their mouths, the linear edge of...are two eyes and a POI with no semantics. • Figure 5.1(c) is a person with the following identified POIs: a body, a face, three eyes , three mouths...iden- tified: 1 body, 6 mouths, 2 eyes , 6 circle types, 4 color types, and one with no semantics. • Figure 5.1(e) is the front of a BMW automobile

  4. Optical information authentication via compressed sensing and double random phase encoding

    Science.gov (United States)

    Chen, Junxin; Bao, Nan; Zhu, Zhi-liang

    2017-10-01

    This paper presents a novel information authentication scheme via compressed sensing and double random phase encoding. Two alternative architectures have been investigated, in which significantly compressed data with micro percentage is sufficient for authentication. At the decoder end, a noise-like image with no leakage of the plaintext is recovered and subsequently authenticated using a nonlinear optical correlation approach. The authentication effectiveness, noise resistance and security performance of the proposed scheme have been experimentally validated. This work was supported by the Fundamental Research Funds for the Central Universities (N162410002-4, N151904002), the National Natural Science Foundation of China (No. 61374178).

  5. A network pharmacology approach to investigate the pharmacological effects of Guizhi Fuling Wan on uterine fibroids.

    Science.gov (United States)

    Zeng, Liuting; Yang, Kailin; Liu, Huiping; Zhang, Guomin

    2017-11-01

    To investigate the pharmacological mechanism of Guizhi Fuling Wan (GFW) in the treatment of uterine fibroids, a network pharmacology approach was used. Information on GFW compounds was collected from traditional Chinese medicine (TCM) databases, and input into PharmMapper to identify the compound targets. Genes associated with uterine fibroids genes were then obtained from the GeneCards and Online Mendelian Inheritance in Man databases. The interaction data of the targets and other human proteins was also collected from the STRING and IntAct databases. The target data were input into the Database for Annotation, Visualization and Integrated Discovery for gene ontology (GO) and pathway enrichment analyses. Networks of the above information were constructed and analyzed using Cytoscape. The following networks were compiled: A compound-compound target network of GFW; a herb-compound target-uterine fibroids target network of GWF; and a compound target-uterine fibroids target-other human proteins protein-protein interaction network, which were subjected to GO and pathway enrichment analyses. According to this approach, a number of novel signaling pathways and biological processes underlying the effects of GFW on uterine fibroids were identified, including the negative regulation of smooth muscle cell proliferation, apoptosis, and the Ras, wingless-type, epidermal growth factor and insulin-like growth factor-1 signaling pathways. This network pharmacology approach may aid the systematical study of herbal formulae and make TCM drug discovery more predictable.

  6. Investigating the Tradeoffs between Power Consumption and Quality of Service in a Backbone Network

    Directory of Open Access Journals (Sweden)

    Erol Gelenbe

    2013-05-01

    Full Text Available Energy saving in networks has traditionally focussed on reducing battery consumption through smart wireless network design. Recently, researchers have turned their attention to the energy cost and carbon emissions of the backbone network that both fixed and mobile communications depend on, proposing primarily mechanisms that turn equipments OFF or put them into deep sleep. This is an effective way of saving energy, provided that the nodes can return to working condition quickly, but it introduces increased delays and packet losses that directly affect the quality of communication experienced by the users. Here we investigate the associated tradeoffs between power consumption and quality of service in backbone networks that employ deep sleep energy savings. We examine these tradeoffs by conducting experiments on a real PC-based network topology, where nodes are put into deep sleep at random times and intervals, resulting in a continuously changing network with reduced total power consumption. The average power consumption, the packet loss and the average delay of this network are examined with respect to the average value of the ON rate and the ON/OFF cycle of the nodes.

  7. Authentication codes that permit arbitration

    Energy Technology Data Exchange (ETDEWEB)

    Simmons, G.J.

    1987-01-01

    Objective of authentication is to detect attempted deceptions in a communications channel. Traditionally this has been restricted to providing the authorized receiver with a capability of detecting unauthentic messages. The known codes have all left open the possibility for either the transmitter to disavow a message that he actually sent to the receiver, i.e., an authentic message, or else for the receiver to falsely attribute a message of his own devising to the transmitter. Of course the party being deceived would know that he was the victim of a deception by the other, but would be unable to ''prove'' this to a third party. Ideally, authentication should provide a means to detect attempted deceptions by insiders (the transmitter or receiver) as well as outsiders (the opponent). It has been an open question of whether it was possible to devise authentication codes that would permit a third party, an arbiter, to decide (in probability) whether the transmitter or the receiver was cheating in the event of a dispute. We answer this question in that both permits the receiver to detect outsider deceptions, as well affirmative by first constructing an example of an authentication code as permitting a designated arbiter to detect insider deceptions and then by generalizing this construction to an infinite class of such codes.

  8. Robust Self-Authenticating Network Coding

    Science.gov (United States)

    2008-11-30

    34Practical byzantine fault tolerance." in OSDI: Proc. Symp. Operating Systems DtSign and Implementation. New Orleans, LA . 1999, pp. 173-186. [23] K P...Institute of Technology This work was partly supported by the Fundacao para a Ciencia e Tecnologia (Portuguese foundation lor Science and Technology

  9. Deep Brain Stimulation, Authenticity and Value.

    Science.gov (United States)

    Pugh, Jonathan; Maslen, Hannah; Savulescu, Julian

    2017-10-01

    Deep brain stimulation has been of considerable interest to bioethicists, in large part because of the effects that the intervention can occasionally have on central features of the recipient's personality. These effects raise questions regarding the philosophical concept of authenticity. In this article, we expand on our earlier work on the concept of authenticity in the context of deep brain stimulation by developing a diachronic, value-based account of authenticity. Our account draws on both existentialist and essentialist approaches to authenticity, and Laura Waddell Ekstrom's coherentist approach to personal autonomy. In developing our account, we respond to Sven Nyholm and Elizabeth O'Neill's synchronic approach to authenticity, and explain how the diachronic approach we defend can have practical utility, contrary to Alexandre Erler and Tony Hope's criticism of autonomy-based approaches to authenticity. Having drawn a distinction between the authenticity of an individual's traits and the authenticity of that person's values, we consider how our conception of authenticity applies to the context of anorexia nervosa in comparison to other prominent accounts of authenticity. We conclude with some reflections on the prudential value of authenticity, and by highlighting how the language of authenticity can be invoked to justify covert forms of paternalism that run contrary to the value of individuality that seems to be at the heart of authenticity.

  10. Designing assignment using authentic assessment

    Science.gov (United States)

    Arlianty, Widinda Normalia; Febriana, Beta Wulan; Diniaty, Artina; Fauzi'ah, Lina

    2017-12-01

    This research is conducted to get an overview of the use of authentic assessment in the department of chemistry education, Islamic University of Indonesia. This research was conducted on the students of semester five, odd semester of academic year 2016/2017. Authentic assessment is an assessment process that is capable of measuring the knowledge, attitudes and skills of learners. Chemistry teacher candidates are required to be equipped with teaching and judging skills. Teachers were required can design and carry out assessment of the process and learning outcomes of students in an objective, accountable, and informative. Teacher creativity is required in the assessment. Therefore, authentic assessment is very appropriate used to improve the competence of students in education department as teachers candidates in the preparation of learning assessments.

  11. Are Imaging and Lesioning Convergent Methods for Assessing Functional Specialisation? Investigations Using an Artificial Neural Network

    Science.gov (United States)

    Thomas, Michael S. C.; Purser, Harry R. M.; Tomlinson, Simon; Mareschal, Denis

    2012-01-01

    This article presents an investigation of the relationship between lesioning and neuroimaging methods of assessing functional specialisation, using synthetic brain imaging (SBI) and lesioning of a connectionist network of past-tense formation. The model comprised two processing "routes": one was a direct route between layers of input and output…

  12. Stroke Investigative Research and Education Network: Community Engagement and Outreach within Phenomics Core

    Science.gov (United States)

    Jenkins, Carolyn; Arulogun, Oyedunni Sola; Singh, Arti; Mande, Aliyu T.; Ajayi, Eric; Benedict, Calys Tagoe; Ovbiagele, Bruce; Lackland, Daniel T.; Sarfo, Fred Stephen; Akinyemi, Rufus; Akpalu, Albert; Obiako, Reginald; Melikam, Enzinne Sylvia; Laryea, Ruth; Shidali, Vincent; Sagoe, Kwamena; Ibinaiye, Philip; Fakunle, Adekunie Gregory; Owolabi, Lukman F.; Owolabi, Mayowa O.

    2016-01-01

    Stroke is the leading cause of neurological hospital admissions in sub-Saharan Africa (SSA) and the second leading cause of death globally. The Stroke Investigative Research and Education Network [SIREN] seeks to comprehensively characterize the genomic, sociocultural, economic, and behavioral risk factors for stroke and to build effective teams…

  13. Investigating Factors Related to Virtual Private Network Adoption in Small Businesses

    Science.gov (United States)

    Lederer, Karen

    2012-01-01

    The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…

  14. Polymeric self-authenticating banknotes

    Science.gov (United States)

    Zientek, Paul

    1998-04-01

    This paper discusses a new concept in overt security called the self-authenticating banknote. The self-authenticating banknote concept is built around the transparent window feature of the polymer banknote. This feature allows the incorporation of transmission based optical devices on a banknote so that the user, by folding the note over on itself and looking through an optical device which is a part of the note itself, can visually inspect and verify certain security features on the banknote. This paper presents a number of examples of optical devices which are presently being developed for this purpose.

  15. Authentic Assessment in Business Education: Its Effects on Student Satisfaction and Promoting Behaviour

    Science.gov (United States)

    James, Lincoln Then; Casidy, Riza

    2018-01-01

    The purpose of this research is to investigate the effects of authentic assessment on student satisfaction and promoting behaviour. The sample comprised 120 students enrolled in an undergraduate business programme. A model was proposed and tested using conditional process analysis. It was found that authentic assessments are positively related to…

  16. Measuring Teacher Authenticity: Criteria Students Use in Their Perception of Teacher Authenticity

    Science.gov (United States)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2017-01-01

    Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational settings use when forming their perceptions of…

  17. Measuring teacher authenticity: Criteria students use in their perception of teacher authenticity

    NARCIS (Netherlands)

    De Bruyckere, Pedro; Kirschner, Paul A.

    2018-01-01

    Authenticity is an often-heard term with respect to education. Tasks should be authentic, the learning environment should be authentic and, above all, the teacher should be authentic. Previous qualitative research has shown that there are four primary criteria that students in formal educational

  18. Investigating the safety impact of roadway network features of suburban arterials in Shanghai.

    Science.gov (United States)

    Wang, Xuesong; Yuan, Jinghui; Schultz, Grant G; Fang, Shouen

    2018-02-02

    With rapid changes in land use development along suburban arterials in Shanghai, there is a corresponding increase in traffic demand on these arterials. To accommodate the local traffic needs of high accessibility and efficiency, an increased number of signalized intersections and accesses have been installed. However, the absence of a defined hierarchical road network, together with irregular signal spacing and access density, tends to deteriorate arterial safety. Previous studies on arterial safety were generally based on a single type of road entity, either intersection or roadway segment, and they analyzed the safety contributing factors (e.g. signal density and access density) on only that type of road entity, while these suburban arterial characteristics could significantly influence the safety performance of both intersections and roadway segments. Macro-level safety modeling was usually applied to investigate the relationships between zonal crash frequencies and demographics, road network features, and traffic characteristics, but the previous researchers did not consider the specific arterial characteristics of signal density and access density. In this study, a new modeling strategy was proposed to analyze the safety impacts of zonal roadway network features (i.e., road network patterns and road network density) along with the suburban arterial characteristics of signal density and access density. Bayesian Conditional Autoregressive Poisson Log-normal models were developed for suburban arterials in 173 traffic analysis zones in the suburban area of Shanghai. Results identified that the grid pattern road network with collector roads parallel to arterials was associated with fewer crashes than networks without parallel collectors. On the other hand, lower road network density, higher signal density and higher access density tended to increase the crash occurrence on suburban arterials. Copyright © 2018 Elsevier Ltd. All rights reserved.

  19. An Anonymous Access Authentication Scheme Based on Proxy Ring Signature for CPS-WMNs

    Directory of Open Access Journals (Sweden)

    Tianhan Gao

    2017-01-01

    Full Text Available Access security and privacy have become a bottleneck for the popularization of future Cyber-Physical System (CPS networks. Furthermore, users’ need for privacy-preserved access during movement procedure is more urgent. To address the anonymous access authentication issue for CPS Wireless Mesh Network (CPS-WMN, a novel anonymous access authentication scheme based on proxy ring signature is proposed. A hierarchical authentication architecture is presented first. The scheme is then achieved from the aspect of intergroup and intragroup anonymous mutual authentication through proxy ring signature mechanism and certificateless signature mechanism, respectively. We present a formal security proof of the proposed protocol with SVO logic. The simulation and performance analysis demonstrate that the proposed scheme owns higher efficiency and adaptability than the typical one.

  20. Active Authentication Linguistic Modalities

    Science.gov (United States)

    2013-12-01

    Rosenberg Self-Esteem Scale, the Myers - Briggs Personality Inventory (MBTI), the NEO PI-R, the Multiple Intelligences Developmental Assessment Scales (MIDAS...corresponding categories (thus producing a nominal task from an ordinal one). • Myers - Briggs : The Myers - Briggs Type Inventory (MBTI) categorizes a person...MBTI Myers - Briggs Personality Inventory • MMCN Multimedia Computing and Networking • NEO Neuroticism-Extroversion-Openness • NEO PI-R NEO Personality

  1. Authenticity, Autonomy and Altruism: Keys for Transformation

    Science.gov (United States)

    Clarken, Rodney

    2011-01-01

    The value of authentic knowing, autonomous behavior and altruistic motivation is presented. Authenticity, autonomy and altruism are primary human capacities and keys for individual and collective transformation. Realizing the full development of these three basic potentialities can serve as goals and standards for well-being. Authenticity,…

  2. 29 CFR 18.50 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Authenticity. 18.50 Section 18.50 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.50 Authenticity. The authenticity of all documents submitted as proposed...

  3. 28 CFR 68.46 - Authenticity.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Authenticity. 68.46 Section 68.46... ALIENS, UNFAIR IMMIGRATION-RELATED EMPLOYMENT PRACTICES, AND DOCUMENT FRAUD § 68.46 Authenticity. The authenticity of all documents submitted as proposed exhibits in advance of the hearing shall be deemed admitted...

  4. Authentic Montessori: The Teacher Makes the Difference

    Science.gov (United States)

    Huxel, Alexa C.

    2013-01-01

    What are the elements that make up authentic Montessori? Is Montessori something concrete or abstract? Are there intangibles that make Montessori what it is? Many classrooms today have Montessori materials and small tables and chairs. Are they authentic Montessori? When examining areas that traditionally make defining authentic Montessori…

  5. 1 authentic leadership and spiritual capital development

    African Journals Online (AJOL)

    2008-05-01

    May 1, 2008 ... The purpose of this paper is to examine authentic leadership and spiritual capital as key elements for the successful building of quality management and effective organizations. It highlights the nexus between authentic leadership and spiritual capital, describes the common features of authentic leadership.

  6. Using Artificial Intelligence Techniques to Implement a Multifactor Authentication System

    Directory of Open Access Journals (Sweden)

    Jackson Phiri

    2011-08-01

    Full Text Available The recent years have seen a rise in the number of cases of cyber-crime committed through identity theft and fraud. To address this problem, this paper uses adaptive neural-fuzzy inference system, fuzzy logic and artificial neural network to implement a multifactor authentication system through a technique of information fusion. To begin with, the identity attributes are mined using the three corpora from three major sources namely the social networks, a set of questionnaires and application forms from the various services offered both in the real and cyberspace. The statistical information generated by the corpora is then used to compose an identity attribute metric model. The composed identity attributes metrics values classified as biometrics, device metrics and pseudo metrics are then fused at the score level through a technique of information fusion in a multifactor authentication system by using each of the above artificial intelligence technologies and the results compared.

  7. A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards

    Science.gov (United States)

    Son, Kyungho; Han, Dong-Guk; Won, Dongho

    In this work we propose a novel smart card based privacy-protecting authentication scheme for roaming services. Our proposal achieves so-called Class 2 privacy protection, i.e., no information identifying a roaming user and also linking the user's behaviors is not revealed in a visited network. It can be used to overcome the inherent structural flaws of smart card based anonymous authentication schemes issued recently. As shown in our analysis, our scheme is computationally efficient for a mobile user.

  8. Multimodal Authentication - Biometric Password And Steganography

    Directory of Open Access Journals (Sweden)

    Alvin Prasad

    2017-06-01

    Full Text Available Security is a major concern for everyone be it individuals or organizations. As the nature of information systems is becoming distributed securing them is becoming difficult as well. New applications are developed by researchers and developers to counter security issues but as soon as the application is released new attacks are formed to bypass the application. Kerberos is an authentication protocol which helps in to verify and validate a user to a server. As it is a widely used protocol minimizing or preventing the password attack is important. In this research we have analyzed the Kerberos protocol and suggested some ideas which can be considered while updating Kerberos to prevent the password attack. In the proposed solution we are suggesting to use password and biometric technique while registering on the network to enjoy the services and a combination of cryptography and steganography technique while communicating back to the user.

  9. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    and wireless networks. All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can...... recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length. This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks...

  10. Symmetric Key Authentication Services Revisited

    NARCIS (Netherlands)

    Crispo, B.; Popescu, B.C.; Tanenbaum, A.S.

    2004-01-01

    Most of the symmetric key authentication schemes deployed today are based on principles introduced by Needham and Schroeder [15] more than twenty years ago. However, since then, the computing environment has evolved from a LAN-based client-server world to include new paradigms, including wide area

  11. Authentic Supervision Reconciles the Irreconcilables.

    Science.gov (United States)

    Pajak, Edward F.; Seyfarth, John T.

    1983-01-01

    Successful supervisors share a characteristic of "authenticity," rather than a particular pattern of behavior. From a background of Gestalt psychology, four steps are offered to help supervisors become aware of their own needs and feelings and recognize the "shoulds" that prevent real contact with others. (MLF)

  12. Authenticity and Relationships with Students

    Science.gov (United States)

    Frego, Katherine A.

    2006-01-01

    Although authenticity makes one vulnerable, the author believes that its impact on learning and on enjoyment of the teaching and learning process justifies the risk. This chapter describes how to offer a relationship to each student, focusing on appropriate caring for individuals and for learning. (Contains 1 figure.)

  13. Immersive Learning: Realism, Authenticity & Audience

    OpenAIRE

    Livingstone, Daniel

    2016-01-01

    For almost 20 years the Digital Design Studio has been exploring and applying virtual reality for a wide range of industrial, commercial and educational applications. Drawing from a range of recent projects, we explore the complex relationships between realism, authenticity and audience for effective engagement and education in immersive learning.

  14. Embodying Authenticity in Higher Education

    Science.gov (United States)

    Douglass, Laura

    2016-01-01

    Orienting to the community of higher education involves a learning experience that is authentic and embodied for one new college administrator. Reflecting on her experience, she articulates how her relationship to her body helps to understand and respond to the tensions of engaging with a scholarly community.

  15. Towards an Authentic Indian Environmentalism

    African Journals Online (AJOL)

    Jenny

    An attempt must therefore be made to formulate a more authentic Indian environmental perspective.To do this ... (of government forests), global warming and ozone depletion that feature in the media and existing school textbooks.To get started .... Not only that, numerous water parks and golf courses are springing up for the ...

  16. Literacy Cafe: Making Writing Authentic

    Science.gov (United States)

    Daniels, Erika

    2007-01-01

    The "Literacy Cafe," a celebration of genre study and student writing, offers students (and visitors!) a positive environment in which to engage in reading and discussion of writing without self-consciousness or fear of criticism. It works because students learn to recognize writing as a learning tool and a relevant, authentic skill in the real…

  17. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication...

  18. Investigation of real field application issues for resistive type SFCLs for distribution electric power networks

    Energy Technology Data Exchange (ETDEWEB)

    Rhee, S.B. [School of Information and Communication Engineering, Sungkyunkwan University, Suwon-shi, Gyeonggi-do 440-746 (Korea, Republic of); Lee, B.W., E-mail: bangwook@hanyang.ac.k [School of Electrical Engineering and Computer Science, Hanyang University, Ansan-shi, Gyeonggi-do 426-791 (Korea, Republic of)

    2010-11-01

    Conventional electric power networks were designed and operated not considering fault current limiting devices. Therefore, the performance and characteristics of resistive superconducting fault current limiter (SFCL) should be reviewed considering the coordination with other electric circuit protecting devices. In this paper, real field application issues of resistive SFCL were investigated considering utilities' demands and coordination with other protection devices. Pure resistive SFCL and hybrid resistive SFCL were compared in order to determine suitable solutions for electric power systems. SFCLs were modeled and analyzed using electro-magnetic transients program (EMTP) and their performances were compared to identify the adaptability to the conventional power networks. Consequently, Simulation results showed that hybrid resistive SFCL have more advantages than pure resistive SFCL considering the requirements and specification for the distribution networks.

  19. Investigation of real field application issues for resistive type SFCLs for distribution electric power networks

    Science.gov (United States)

    Rhee, S. B.; Lee, B. W.

    2010-11-01

    Conventional electric power networks were designed and operated not considering fault current limiting devices. Therefore, the performance and characteristics of resistive superconducting fault current limiter (SFCL) should be reviewed considering the coordination with other electric circuit protecting devices. In this paper, real field application issues of resistive SFCL were investigated considering utilities' demands and coordination with other protection devices. Pure resistive SFCL and hybrid resistive SFCL were compared in order to determine suitable solutions for electric power systems. SFCLs were modeled and analyzed using electro-magnetic transients program (EMTP) and their performances were compared to identify the adaptability to the conventional power networks. Consequently, Simulation results showed that hybrid resistive SFCL have more advantages than pure resistive SFCL considering the requirements and specification for the distribution networks.

  20. Reciprocal Relations between Work-Related Authenticity and Intrinsic Motivation, Work Ability and Depressivity: A Two-Wave Study

    OpenAIRE

    Emmerich, Astrid I.; Rigotti, Thomas

    2017-01-01

    This study investigates the role of context-specific authenticity at work for work-related outcomes (intrinsic motivation, work ability) and depressivity. Furthermore reciprocal relations between work-related authenticity and healthy psychological functioning are investigated. Longitudinal data from 1,243 employees from 63 subsidiaries of a non-profit organization in the social sector were analyzed using multilevel structural equation modeling. Work-related authenticity at T1 predicted work a...

  1. Investigation of the Impact of Extracting and Exchanging Health Information by Using Internet and Social Networks.

    Science.gov (United States)

    Pistolis, John; Zimeras, Stelios; Chardalias, Kostas; Roupa, Zoe; Fildisis, George; Diomidous, Marianna

    2016-06-01

    Social networks (1) have been embedded in our daily life for a long time. They constitute a powerful tool used nowadays for both searching and exchanging information on different issues by using Internet searching engines (Google, Bing, etc.) and Social Networks (Facebook, Twitter etc.). In this paper, are presented the results of a research based on the frequency and the type of the usage of the Internet and the Social Networks by the general public and the health professionals. The objectives of the research were focused on the investigation of the frequency of seeking and meticulously searching for health information in the social media by both individuals and health practitioners. The exchanging of information is a procedure that involves the issues of reliability and quality of information. In this research, by using advanced statistical techniques an effort is made to investigate the participant's profile in using social networks for searching and exchanging information on health issues. Based on the answers 93 % of the people, use the Internet to find information on health-subjects. Considering principal component analysis, the most important health subjects were nutrition (0.719 %), respiratory issues (0.79 %), cardiological issues (0.777%), psychological issues (0.667%) and total (73.8%). The research results, based on different statistical techniques revealed that the 61.2% of the males and 56.4% of the females intended to use the social networks for searching medical information. Based on the principal components analysis, the most important sources that the participants mentioned, were the use of the Internet and social networks for exchanging information on health issues. These sources proved to be of paramount importance to the participants of the study. The same holds for nursing, medical and administrative staff in hospitals.

  2. Investigation of global and local network properties of music perception with culturally different styles of music.

    Science.gov (United States)

    Li, Yan; Rui, Xue; Li, Shuyu; Pu, Fang

    2014-11-01

    Graph theoretical analysis has recently become a popular research tool in neuroscience, however, there have been very few studies on brain responses to music perception, especially when culturally different styles of music are involved. Electroencephalograms were recorded from ten subjects listening to Chinese traditional music, light music and western classical music. For event-related potentials, phase coherence was calculated in the alpha band and then constructed into correlation matrices. Clustering coefficients and characteristic path lengths were evaluated for global properties, while clustering coefficients and efficiency were assessed for local network properties. Perception of light music and western classical music manifested small-world network properties, especially with a relatively low proportion of weights of correlation matrices. For local analysis, efficiency was more discernible than clustering coefficient. Nevertheless, there was no significant discrimination between Chinese traditional and western classical music perception. Perception of different styles of music introduces different network properties, both globally and locally. Research into both global and local network properties has been carried out in other areas; however, this is a preliminary investigation aimed at suggesting a possible new approach to brain network properties in music perception. Copyright © 2014 Elsevier Ltd. All rights reserved.

  3. Exploring Windows Domain-Level Defenses Against Authentication Attacks

    Energy Technology Data Exchange (ETDEWEB)

    Nichols, Jeff A. {Cyber Sciences} [ORNL; Curtis, Laura [Pacific Northwest National Laboratory (PNNL)

    2016-01-01

    We investigated the security resilience of the current Windows Active Directory (AD) environments to Pass-the-Hash and Pass- the-Ticket credential theft attacks. While doing this, we discovered a way to trigger the removal of all previously issued authentication credentials for a client, thus preventing their use by attackers. After triggered, the user is forced to contact the domain administrators and to authenticate to the AD to continue. This could become the basis for a response that arrests the spread of a detected attack. Operating in a virtualized XenServer environment, we were able to carefully determine and recreate the conditions necessary to cause this response.

  4. Quantum cloning attacks against PUF-based quantum authentication systems

    Science.gov (United States)

    Yao, Yao; Gao, Ming; Li, Mo; Zhang, Jian

    2016-08-01

    With the advent of physical unclonable functions (PUFs), PUF-based quantum authentication systems have been proposed for security purposes, and recently, proof-of-principle experiment has been demonstrated. As a further step toward completing the security analysis, we investigate quantum cloning attacks against PUF-based quantum authentication systems and prove that quantum cloning attacks outperform the so-called challenge-estimation attacks. We present the analytical expression of the false-accept probability by use of the corresponding optimal quantum cloning machines and extend the previous results in the literature. In light of these findings, an explicit comparison is made between PUF-based quantum authentication systems and quantum key distribution protocols in the context of cloning attacks. Moreover, from an experimental perspective, a trade-off between the average photon number and the detection efficiency is discussed in detail.

  5. A Multimodal User Authentication System Using Faces and Gestures

    Directory of Open Access Journals (Sweden)

    Hyunsoek Choi

    2015-01-01

    Full Text Available As a novel approach to perform user authentication, we propose a multimodal biometric system that uses faces and gestures obtained from a single vision sensor. Unlike typical multimodal biometric systems using physical information, the proposed system utilizes gesture video signals combined with facial images. Whereas physical information such as face, fingerprints, and iris is fixed and not changeable, behavioral information such as gestures and signatures can be freely changed by the user, similar to a password. Therefore, it can be a countermeasure when the physical information is exposed. We aim to investigate the potential possibility of using gestures as a signal for biometric system and the robustness of the proposed multimodal user authentication system. Through computational experiments on a public database, we confirm that gesture information can help to improve the authentication performance.

  6. Authenticity as an aim of psychoanalysis.

    Science.gov (United States)

    Neri, Claudio

    2008-12-01

    This paper will present a series of predominantly clinical observations concerning the lengthy work a patient carries out, with the help of the analyst, in order to achieve greater personal authenticity. When this work is drawing to a close and the patient has gained a degree of authenticity, this authenticity remains within him, almost without his realizing it. The power of authenticity is instead revealed through the patient's most intimate and important relationships. In the long term, the patient's authenticity also alters his perception of himself and of his role in the world. He feels more alive and less overcome by a sense of futility, if earlier this had been the case.

  7. Quantum identity authentication with single photon

    Science.gov (United States)

    Hong, Chang ho; Heo, Jino; Jang, Jin Gak; Kwon, Daesung

    2017-10-01

    Quantum identity authentication with single photons is proposed in the paper. It can verify a user's identity without exposing to an authentication key information. The protocol guarantees high efficiency in that it can verify two bits of authentication information using just a single photon. The security of our authentication scheme is analyzed and confirmed in the case of a general attack. Moreover, the proposed protocol is practicable with current technology. Our quantum identity authentication protocol does not require quantum memory registration and any entangled photon sources.

  8. Nonlinear Fusion of Colors to Face Authentication Using EFM Method

    Directory of Open Access Journals (Sweden)

    D. Saigaa

    2010-01-01

    Full Text Available The authentication systems of face generally used the grayscale face image as input, but in this paper we studied the contribution of the color to the authentication system of face. For the extraction of face characteristics for the data base,we tested different spaces colors on the Enhanced Fisher linear discriminant Model (EFM which is presented as an alternative features extraction algorithm to Principal Component Analysis(PCA widely used in automatic face recognition. And once the characteristic vector is extracted, the next stage consists of comparing it with the vector characteristic of face which is authenticated, and with the use of each component color alone at the input of this system, we calculated the error rates in the two sets of validation and test for the data base XM2VTS according to the protocol of Lausanne. Finally, the results obtained in different spaces or components colorimetric are combined by the use of a nonlinear fusion with a simple neuron network MLP (Multi layer perceptron, the results obtained confirm the efficient of color to improve the performance of an authentication system of face.

  9. An investigation of 'sparse channel networks'. Characteristic behaviours and their causes

    International Nuclear Information System (INIS)

    Black, J.H.; Barker, J.A.; Woodman, N.D.

    2007-09-01

    This report represents a third study in a series concerned with groundwater flow in poorly permeable fractured crystalline rocks. The study has brought together three linked, but distinct, elements; a mathematical analysis of the intersection of ellipses, a review of field measurements associated with nuclear waste repository investigations and probabilistic simulations using a lattice network numerical model. We conclude that the model of channels that traverse fracture intersections without necessarily branching is a very likely representation of reality. More generally, assembling all the lines of evidence, it is suggested that groundwater flow systems in fractured crystalline rocks in the environs of underground laboratories have the following characteristics: Groundwater flows within a sparse network of channels just above the percolation limit. The frequency of intersections is low in that individual channels extend considerable distances between significant junctions. Individual channels often extend over many fracture surfaces and the resulting flow system is only weakly related to the density or size of mappable fractures. The sparseness of systems compared to the size of drifts and tunnels means that only a very few flow channels are intersected by drifts and tunnels. Highly convergent flow is required to connect to the rest of the network and this is misinterpreted as a skin of low hydraulic conductivity. Systems are so sparse that they are controlled by a few 'chokes' that give rise to compartments of head, and probably, of groundwater chemistry. Channels occur on all fracture planes, including those within fracture zones, and although the characteristics of the fracture zone channel networks may differ from those in surrounding rocks, they are nonetheless still channel networks. The actively flowing sparse channel network, occurring within any particular rock, is a naturally selected, small sub-set of the available channels. Hence, there are many

  10. Experimentation Using Short-Term Spectral Features for Secure Mobile Internet Voting Authentication

    Directory of Open Access Journals (Sweden)

    Surendra Thakur

    2015-01-01

    Full Text Available We propose a secure mobile Internet voting architecture based on the Sensus reference architecture and report the experiments carried out using short-term spectral features for realizing the voice biometric based authentication module of the architecture being proposed. The short-term spectral features investigated are Mel-Frequency Cepstral Coefficients (MFCCs, Mel-Frequency Discrete Wavelet Coefficients (MFDWC, Linear Predictive Cepstral Coefficients (LPCC, and Spectral Histogram of Oriented Gradients (SHOGs. The MFCC, MFDWC, and LPCC usually have higher dimensions that oftentimes lead to high computational complexity of the pattern matching algorithms in automatic speaker recognition systems. In this study, higher dimensions of each of the short-term features were reduced to an 81-element feature vector per Speaker using Histogram of Oriented Gradients (HOG algorithm while neural network ensemble was utilized as the pattern matching algorithm. Out of the four short-term spectral features investigated, the LPCC-HOG gave the best statistical results with R statistic of 0.9127 and mean square error of 0.0407. These compact LPCC-HOG features are highly promising for implementing the authentication module of the secure mobile Internet voting architecture we are proposing in this paper.

  11. APPLICATION OF UKRAINIAN GRID INFRASTRUCTURE FOR INVESTIGATION OF NONLINEAR DYNAMICS IN LARGE NEURONAL NETWORKS

    Directory of Open Access Journals (Sweden)

    O. О. Sudakov

    2015-12-01

    Full Text Available In present work the Ukrainian National Grid (UNG infrastructure was applied for investigation of synchronization in large networks of interacting neurons. This application is important for solving of modern neuroscience problems related to mechanisms of nervous system activities (memory, cognition etc. and nervous pathologies (epilepsy, Parkinsonism, etc.. Modern non-linear dynamics theories and applications provides powerful basis for computer simulations of biological neuronal networks and investigation of phenomena which mechanisms hardly could be clarified by other approaches. Cubic millimeter of brain tissue contains about 105 neurons, so realistic (Hodgkin-Huxley model and phenomenological (Kuramoto-Sakaguchi, FitzHugh-Nagumo, etc. models simulations require consideration of large neurons numbers.

  12. Efficency of mobile authentication service technology on phase 1 ...

    African Journals Online (AJOL)

    Objectives: This study investigated the presence of MAS codes on medicines mandated by NAFDAC to have the code and a preliminary assessment of MAS ... drug market still do not have MAS technology inscribed on them and efficiency of Mobile Authentication Service is directly a function of the competence of the service ...

  13. Authenticity of instruction and student performance: a prospective randomised trial.

    NARCIS (Netherlands)

    Rochelle, J.S. La; Durning, S.J.; Pangaro, L.N.; Artino, A.R.; Vleuten, C.P.M. van der; Schuwirth, L.

    2011-01-01

    OBJECTIVES: This study aimed to investigate the relationship between the authenticity of instructional formats and outcome measures within a pre-clerkship clinical reasoning course. METHODS: We conducted a randomised, prospective, crossover study with Year 2 medical students taking a pre-clerkship

  14. Authenticity, Shinichi Suzuki, and "Beautiful Tone with Living Soul, Please"

    Science.gov (United States)

    Thompson, Merlin

    2016-01-01

    While there is a great deal of scholarly inquiry into the Suzuki Method of music instruction, few resources examine how the various aesthetic and pedagogic themes associated with the Suzuki Method are grounded in Dr. Shinichi Suzuki's sense of self. Using the notion of authenticity--being true to oneself--as an investigative underpinning, I trace…

  15. Imaging techniques in digital forensic investigation: a study using neural networks

    Science.gov (United States)

    Williams, Godfried

    2006-09-01

    Imaging techniques have been applied to a number of applications, such as translation and classification problems in medicine and defence. This paper examines the application of imaging techniques in digital forensics investigation using neural networks. A review of applications of digital image processing is presented, whiles a Pedagogical analysis of computer forensics is also highlighted. A data set describing selected images in different forms are used in the simulation and experimentation.

  16. Metropolises in the Twittersphere: An Informetric Investigation of Informational Flows and Networks

    Directory of Open Access Journals (Sweden)

    Thorsten Förster

    2015-09-01

    Full Text Available Information flows on social media platforms are able to show trends and user interests as well as connections between users. In this paper, we present a method how to analyze city related networks on the social media platform Twitter based on the user content. Forty million tweets have been downloaded via Twitter’s REST API (application programming interface and Twitter’s Streaming API. The investigation focuses on two aspects: firstly, trend detection has been done to analyze 31 informational world cities, according the user activity, popularity of shared websites and topics defined by hashtags. Secondly, a hint of how connected informational cities are to each other is given by creating a clustered network based on the number of connections between different city pairs. Tokyo, New York City, London and Paris clearly lead the ranking of the most active cities if compared by the total number of tweets. The investigation shows that Twitter is very frequently used to share content from other services like Instagram or YouTube. The most popular topics in tweets reveal great differences between the cities. In conclusion, the investigation shows that social media services like Twitter also can be a mirror of the society they are used in and bring to light information flows of connected cities in a global network. The presented method can be applied in further research to analyze information flows regarding specific topics and/or geographical locations.

  17. Banknote recognition: investigating processing and cognition framework using competitive neural network.

    Science.gov (United States)

    Oyedotun, Oyebade K; Khashman, Adnan

    2017-02-01

    Humans are apt at recognizing patterns and discovering even abstract features which are sometimes embedded therein. Our ability to use the banknotes in circulation for business transactions lies in the effortlessness with which we can recognize the different banknote denominations after seeing them over a period of time. More significant is that we can usually recognize these banknote denominations irrespective of what parts of the banknotes are exposed to us visually. Furthermore, our recognition ability is largely unaffected even when these banknotes are partially occluded. In a similar analogy, the robustness of intelligent systems to perform the task of banknote recognition should not collapse under some minimum level of partial occlusion. Artificial neural networks are intelligent systems which from inception have taken many important cues related to structure and learning rules from the human nervous/cognition processing system. Likewise, it has been shown that advances in artificial neural network simulations can help us understand the human nervous/cognition system even furthermore. In this paper, we investigate three cognition hypothetical frameworks to vision-based recognition of banknote denominations using competitive neural networks. In order to make the task more challenging and stress-test the investigated hypotheses, we also consider the recognition of occluded banknotes. The implemented hypothetical systems are tasked to perform fast recognition of banknotes with up to 75 % occlusion. The investigated hypothetical systems are trained on Nigeria's Naira banknotes and several experiments are performed to demonstrate the findings presented within this work.

  18. Prevent the blue, be true to you: Authenticity buffers the negative impact of loneliness on alcohol-related problems, physical symptoms, and depressive and anxiety symptoms.

    Science.gov (United States)

    Bryan, Jennifer L; Baker, Zachary G; Tou, Reese Yw

    2017-04-01

    This study investigated authenticity as a moderator of the association between loneliness and depressive symptoms, anxiety, physical symptoms, and alcohol-related problems. It was expected that loneliness and health outcomes would be negatively related and that relationship would be weaker among those higher in authenticity. Significant interactions emerged between authenticity and loneliness for each outcome such that authenticity mitigated the relationship between higher loneliness and negative health outcomes. Results suggest that authenticity may be an underutilized resource for lonely individuals and warrants future investigation. The potential implications are diverse and could be incorporated in college adjustment and health promotion programs.

  19. A Thematic Analysis of Self-described Authentic Leadership Behaviors Among Experienced Nurse Executives.

    Science.gov (United States)

    Alexander, Catherine; Lopez, Ruth Palan

    2018-01-01

    The aim of this study is to understand the behaviors experienced nurse executives use to create healthy work environments (HWEs). The constructs of authentic leadership formed the conceptual framework for the study. The American Association of Critical-Care Nurses recommends authentic leadership as the preferred style of leadership for creating and sustaining HWEs. Behaviors associated with authentic leadership in nursing are not well understood. A purposive sample of 17 experienced nurse executives were recruited from across the United States for this qualitative study. Thematic analysis was used to analyze the in-depth, semistructured interviews. Four constructs of authentic leaders were supported and suggest unique applications of each including self-awareness (a private and professional self), balanced processing (open hearted), transparency (limiting exposure), and moral leadership (nursing compass). Authentic leadership may provide a sound foundation to support nursing leadership practices; however, its application to the discipline requires additional investigation.

  20. Three approaches to investigating functional compromise to the default mode network after traumatic axonal injury.

    Science.gov (United States)

    Arenivas, Ana; Diaz-Arrastia, Ramon; Spence, Jeffrey; Cullum, C Munro; Krishnan, Kamini; Bosworth, Christopher; Culver, Carlee; Kennard, Beth; Marquez de la Plata, Carlos

    2014-09-01

    The default mode network (DMN) is a reliably elicited functional neural network with potential clinical implications. Its discriminant and prognostic utility following traumatic axonal injury (TAI) have not been previously investigated. The present study used three approaches to analyze DMN functional connectedness, including a whole-brain analysis [A1], network-specific analysis [A2], and between-node (edge) analysis [A3]. The purpose was to identify the utility of each method in distinguishing between healthy and brain-injured individuals, and determine whether observed differences have clinical significance. Resting-state fMRI was acquired from 25 patients with TAI and 17 healthy controls. Patients were scanned 6-11 months post-injury, and functional and neurocognitive outcomes were assessed the same day. Using all three approaches, TAI subjects revealed significantly weaker functional connectivity (FC) than controls, and binary logistic regressions demonstrated all three approaches have discriminant value. Clinical outcomes were not correlated with FC using any approach. Results suggest that compromise to the functional connectedness of the DMN after TAI can be identified using resting-state FC; however, the degree of functional compromise to this network, as measured in this study, may not have clinical implications in chronic TAI.

  1. Improving Usability of Passphrase Authentication

    DEFF Research Database (Denmark)

    Nielsen, Glen; Vedel, Michael; Jensen, Christian D.

    2014-01-01

    . This is done to ensure an appropriate degree of security, but instead, it makes it difficult for users to remember their password, which results in passwords that are either insecure, but easy to remember, or written down on paper. In this paper we address the problem of usability in user authentication.......We promote the use of passphrases, which provide better security and are often easier to remember than passwords. Passphrases will be significantly longer than passwords, which makes them more difficult to enter correctly on a keyboard. We solve this problem by proposing a new passphrase validation algorithm......The combination of user-names and passwords has become the predominant method of user authentication in computer systems. Most users have multiple accounts on different systems, which impose different constraints on the length and complexity of passwords that the user is allowed to select...

  2. Digital image authentication from thumbnails

    Science.gov (United States)

    Kee, Eric; Farid, Hany

    2010-01-01

    We describe how to exploit the formation and storage of an embedded image thumbnail for image authentication. The creation of a thumbnail is modeled with a series of filtering operations, contrast adjustment, and compression. We automatically estimate these model parameters and show that these parameters differ significantly between camera manufacturers and photo-editing software. We also describe how this signature can be combined with encoding information from the underlying full resolution image to further refine the signature's distinctiveness.

  3. Persistent Authentication in Smart Environments

    DEFF Research Database (Denmark)

    Hansen, Mads Syska; Kirschmeyer, Martin; Jensen, Christian D.

    2008-01-01

    present a proof-of-concept implementation of the proposed mechanism, which employs camera based tracking with a single stationary 3D camera that uses the "time of flight" principle. A preliminary evaluation of the proposed mechanism indicates that persistent authentication is technically possible...... with the proposed hardware. The proposed model is sufficiently general to allow the addition of more cameras or supplemental tracking technologies, which will improve the robustness and scalability of the proposed mechanism....

  4. National Authentication Framework Implementation Study

    Science.gov (United States)

    2009-12-01

    Identifiers RA Registration Authority SAML Security Assertion Markup Language SFA Single-factor Authentication SMS Short Messaging System SOA ...Internet 2.0 and the growing interest in systems developed based upon the Service- Oriented Architecture ( SOA ). While core specifications upon which...August 2009. [4] S. Harris, CISSP: Exam Guide, 4th ed., New York: McGraw-Hill, 2008, pp. 1145. [5] J. Brainard, A. Juels, R. L. Rivest, M. Szydlo

  5. Multi-Factor Authentication: A Survey

    Directory of Open Access Journals (Sweden)

    Aleksandr Ometov

    2018-01-01

    Full Text Available Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication systems towards Multi-Factor Authentication (MFA starting from Single-Factor Authentication (SFA and through Two-Factor Authentication (2FA. Particularly, MFA is expected to be utilized for human-to-everything interactions by enabling fast, user-friendly, and reliable authentication when accessing a service. This paper surveys the already available and emerging sensors (factor providers that allow for authenticating a user with the system directly or by involving the cloud. The corresponding challenges from the user as well as the service provider perspective are also reviewed. The MFA system based on reversed Lagrange polynomial within Shamir’s Secret Sharing (SSS scheme is further proposed to enable more flexible authentication. This solution covers the cases of authenticating the user even if some of the factors are mismatched or absent. Our framework allows for qualifying the missing factors by authenticating the user without disclosing sensitive biometric data to the verification entity. Finally, a vision of the future trends in MFA is discussed.

  6. Authenticity assessment of dairy products.

    Science.gov (United States)

    de la Fuente, Miguel Angel; Juárez, Manuela

    2005-01-01

    The authenticity of dairy products has become a focal point, attracting the attention of scientists, producers, consumers, and policymakers. Among many others, some of the practices not allowed in milk and milk products are the substitution of part of the fat or proteins, admixtures of milk of different species, additions of low-cost dairy products (mainly whey derivatives), or mislabeling of products protected by denomination of origin. A range of analytical methods to detect frauds have been developed, modified, and continually reassessed to be one step ahead of manufacturers who pursue these illegal activities. Traditional procedures to assess the authenticity of dairy products include chromatographic, electrophoretic, and immunoenzymatic methods. New approaches such as capillary electrophoresis, polymerase chain reaction, and isotope ratio mass spectrometry have also emerged alongside the latest developments in the former procedures. This work intends to provide an updated and extensive overview since 1991 on the principal applications of all these techniques together with their advantages and disadvantages for detecting the authenticity of dairy products. The scope and limits of different tools are also discussed.

  7. Security Analysis and Improvement of an Anonymous Authentication Scheme for Roaming Services

    Directory of Open Access Journals (Sweden)

    Youngsook Lee

    2014-01-01

    Full Text Available An anonymous authentication scheme for roaming services in global mobility networks allows a mobile user visiting a foreign network to achieve mutual authentication and session key establishment with the foreign-network operator in an anonymous manner. In this work, we revisit He et al.’s anonymous authentication scheme for roaming services and present previously unpublished security weaknesses in the scheme: (1 it fails to provide user anonymity against any third party as well as the foreign agent, (2 it cannot protect the passwords of mobile users due to its vulnerability to an offline dictionary attack, and (3 it does not achieve session-key security against a man-in-the-middle attack. We also show how the security weaknesses of He et al.’s scheme can be addressed without degrading the efficiency of the scheme.

  8. Improving the Authentication Scheme and Access Control Protocol for VANETs

    Directory of Open Access Journals (Sweden)

    Wei-Chen Wu

    2014-11-01

    Full Text Available Privacy and security are very important in vehicular ad hoc networks (VANETs. VANETs are negatively affected by any malicious user’s behaviors, such as bogus information and replay attacks on the disseminated messages. Among various security threats, privacy preservation is one of the new challenges of protecting users’ private information. Existing authentication protocols to secure VANETs raise challenges, such as certificate distribution and reduction of the strong reliance on tamper-proof devices. In 2011, Yeh et al. proposed a PAACP: a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks. However, PAACP in the authorization phase is breakable and cannot maintain privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and demonstrate that the PAACP’s authorized credential (AC is not secure and private, even if the AC is secretly stored in a tamper-proof device. An eavesdropper can construct an AC from an intercepted blind document. Any eavesdropper can determine who has which access privileges to access which service. For this reason, this paper copes with these challenges and proposes an efficient scheme. We conclude that an improving authentication scheme and access control protocol for VANETs not only resolves the problems that have appeared, but also is more secure and efficient.

  9. New multicast authentication protocol for entrusted members using advanced encryption standard

    Directory of Open Access Journals (Sweden)

    Reham Abdellatif Abouhogail

    2011-12-01

    Full Text Available Today there is a widening in digital technologies and increasing in new multimedia services like: pay-per-view TV, interactive simulations, teleconferencing. So there is an increasing demand for multicast communication. There is a number of security issues in multicast communication directly related to the specific nature of multicast. In this paper, we propose a new scheme for authenticating streamed data delivered in real-time over an insecure network, and we concentrate on the multicast authentication problem. Important requirements of multicast communication protocols are: to perform authentication in real-time, to resist packet loss and to have low communication and computation overheads. In this paper, a new multicast authentication scheme is proposed. It is suitable for real time applications. It uses the advanced encryption standard algorithm to solve the problem of entrusted members. This scheme uses the idea of the new index number each time the member sends certain block of packets in the multicast group.

  10. Network workshop

    DEFF Research Database (Denmark)

    Bruun, Jesper; Evans, Robert Harry

    2014-01-01

    This paper describes the background for, realisation of and author reflections on a network workshop held at ESERA2013. As a new research area in science education, networks offer a unique opportunity to visualise and find patterns and relationships in complicated social or academic network data...... research community. With this workshop, participants were offered a way into network science based on authentic educational research data. The workshop was constructed as an inquiry lesson with emphasis on user autonomy. Learning activities had participants choose to work with one of two cases of networks...

  11. Investigation of Strategic Changes Using Patent Co-Inventor Network Analysis: The Case of Samsung Electronics

    Directory of Open Access Journals (Sweden)

    Sungchul Choi

    2016-12-01

    Full Text Available The aim of this paper is to propose a method to investigate a firm’s strategic changes. Technologies or technological capabilities are a major resource for achieving competitive advantages, so a firm’s R&D effort to improve capabilities on specific technologies is aligned with strategic direction. Therefore, this research analyzes changes in R&D efforts by identifying key R&D personnel using patent co-inventor network and social network analysis. Based on characteristics of application and granted patents, the method analyzes current and future R&D efforts and so identifies strategic changes of a firm. We conducted an empirical analysis using the patents of Samsung Electronics. Our method analyzed the current and future strategies of Samsung Electronics and the result shows clear strategic changes in their focal technologies and business.

  12. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2018-01-01

    that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change......Authenticity in organizations has gained increased focus in recent years. Authentic management and leadership are ways to motivate and make sustainable changes in the organization. But authenticity is also strategically worked with in order to serve social and political functions....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  13. An Examination of Career Indecision and Application to Dispositional Authenticity

    Science.gov (United States)

    White, Nathan J.; Tracey, Terence J. G.

    2011-01-01

    Authenticity has been viewed as a dimension related to life satisfaction, but we propose that authenticity is related to career outcomes. In this study, we examined the relation between authenticity and career indecision. Authenticity was assessed by the Authenticity Scale and it was found to be moderately related to different indices of career…

  14. Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity.

    NARCIS (Netherlands)

    Gulikers, Judith; Bastiaens, Theo; Kirschner, Paul A.; Kester, Liesbeth

    2008-01-01

    Gulikers, J. T. M., Bastiaens, Th. J., Kirschner, P. A., & Kester, L. (2008). Authenticity is in the Eye of the Beholder: Student and Teacher Perceptions of Assessment Authenticity. Journal of Vocational Education and Training, 60(4)

  15. The Duality of Authenticity in ELT

    OpenAIRE

    Joy, J. John Love

    2011-01-01

    Purpose: This study aims to find out the dual-perspectives on authenticity in English language teaching.Problem: The concept of authenticity has generated quite a ripple in ESL/EFL classrooms. Contrasting perspectives have emerged over the years in reaction to this concept. Some regard authenticity as an inevitable part of teaching as it provides students with opportunities to interact with reality in the classroom itself, whereas, some others consider it an ambitious construct and suggest ap...

  16. Disambiguating authenticity: Interpretations of value and appeal

    OpenAIRE

    O?Connor, Kieran; Carroll, Glenn R.; Kov?cs, Bal?zs

    2017-01-01

    While shaping aesthetic judgment and choice, socially constructed authenticity takes on some very different meanings among observers, consumers, producers and critics. Using a theoretical framework positing four distinct meanings of socially constructed authenticity-type, moral, craft, and idiosyncratic-we aim to document empirically the unique appeal of each type. We develop predictions about the relationships between attributed authenticity and corresponding increases in the value ascribed ...

  17. SERS investigations and electrical recording of neuronal networks with three-dimensional plasmonic nanoantennas (Conference Presentation)

    Science.gov (United States)

    De Angelis, Francesco

    2017-06-01

    SERS investigations and electrical recording of neuronal networks with three-dimensional plasmonic nanoantennas Michele Dipalo, Valeria Caprettini, Anbrea Barbaglia, Laura Lovato, Francesco De Angelis e-mail: francesco.deangelis@iit.it Istituto Italiano di Tecnologia, Via Morego 30, 16163, Genova Biological systems are analysed mainly by optical, chemical or electrical methods. Normally each of these techniques provides only partial information about the environment, while combined investigations could reveal new phenomena occurring in complex systems such as in-vitro neuronal networks. Aiming at the merging of optical and electrical investigations of biological samples, we introduced three-dimensional plasmonic nanoantennas on CMOS-based electrical sensors [1]. The overall device is then capable of enhanced Raman Analysis of cultured cells combined with electrical recording of neuronal activity. The Raman measurements show a much higher sensitivity when performed on the tip of the nanoantenna in respect to the flat substrate [2]; this effect is a combination of the high plasmonic field enhancement and of the tight adhesion of cells on the nanoantenna tip. Furthermore, when plasmonic opto-poration is exploited [3] the 3D nanoelectrodes are able to penetrate through the cell membrane thus accessing the intracellular environment. Our latest results (unpublished) show that the technique is completely non-invasive and solves many problems related to state-of-the-art intracellular recording approaches on large neuronal networks. This research received funding from ERC-IDEAS Program: "Neuro-Plasmonics" [Grant n. 616213]. References: [1] M. Dipalo, G. C. Messina, H. Amin, R. La Rocca, V. Shalabaeva, A. Simi, A. Maccione, P. Zilio, L. Berdondini, F. De Angelis, Nanoscale 2015, 7, 3703. [2] R. La Rocca, G. C. Messina, M. Dipalo, V. Shalabaeva, F. De Angelis, Small 2015, 11, 4632. [3] G. C. Messina et al., Spatially, Temporally, and Quantitatively Controlled Delivery of

  18. A neural network investigation of the crucial facets of urban sustainability.

    Science.gov (United States)

    Buscema, M; Diappi, L; Ottanà, M

    1998-02-01

    This paper focuses on the concept of a sustainable city and its theoretical implications for the Italian urban system. Urban sustainability is based on positive interactions among three different urban subsystems: social, economic and physical, where social well-being coexists with economic development and environmental quality. This utopian scenario does not appear in the existing cities. The aesthetic quality of natural and man-made environment is often associated with marginality and poverty, labor market variety and urban efficiency coexisting with pollution, criminality and high settlement costs. Moreover, since each city differs institutionally, historically, culturally and economically, few attempts have been implemented to build a comparative synthetic vision of the urban sustainability in different cities. The interactions among these selected systems are complex and unpredictable and present the opportunity for a new methodology of scientific investigation: the connectionistic approach. The dual aim of this study is to: investigate the underlying relationships among the three subsystems with a set of social, economic and physical attributes of the chief towns of a Province in Italy and ; verify if this underlying structure could reproduce the heterogeneity of urban realities, allowing one to distinguish groups of cities with different assets or drawbacks in their sustainability. The Data Base (DB), composed of 43 attributes for 95 cities, was processed by Self-Reflexive Neural Networks (SRNN) (Buscema, 1995). These Networks are a useful instrument of investigation and analogic questioning of the Data Base. Once the SRNN has learned the structure of the weights from the DB, by querying the network with the maximization or minimization of specific groups of attributes, it is possible to read the related properties and to rank the cities' urban profile.

  19. Numerical Investigation of a Chip Printed Antenna Performances for Wireless Implantable Body Area Network Applications

    Science.gov (United States)

    Ramli, N. H.; Jaafar, H.; Lee, Y. S.

    2018-03-01

    Recently, wireless implantable body area network (WiBAN) system become an active area of research due to their various applications such as healthcare, support systems for specialized occupations and personal communications. Biomedical sensors networks mounted in the human body have drawn greater attention for health care monitoring systems. The implantable chip printed antenna for WiBAN applications is designed and the antenna performances is investigated in term of gain, efficiency, return loss, operating bandwidth and radiation pattern at different environments. This paper is presents the performances of implantable chip printed antenna in selected part of human body (hand, chest, leg, heart and skull). The numerical investigation is done by using human voxel model in built in the CST Microwave Studio Software. Results proved that the chip printed antenna is suitable to implant in the human hand model. The human hand model has less complex structure as it consists of skin, fat, muscle, blood and bone. Moreover, the antenna is implanted under the skin. Therefore the signal propagation path length to the base station at free space environment is considerably short. The antenna’s gain, efficiency and Specific Absorption Rate (SAR) are - 13.62dBi, 1.50 % and 0.12 W/kg respectively; which confirms the safety of the antenna usage. The results of the investigations can be used as guidance while designing chip implantable antenna in future.

  20. User Authentication in Smartphones for Telehealth

    Science.gov (United States)

    SMITH, KATHERINE A.; ZHOU, LEMING; WATZLAF, VALERIE J. M.

    2017-01-01

    Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity. When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA) breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed. PMID:29238444

  1. The Evolution of The American Journal of Psychology 1, 1887-1903: A Network Investigation.

    Science.gov (United States)

    Green, Christopher D; Feinerer, Ingo

    2015-01-01

    The American Journal of Psychology (AJP) was the first academic journal in the United States dedicated to the "new" scientific form of the discipline. But where did the journal's founding owner/editor, G. Stanley Hall, find the "psychologists" he needed to fill the pages of such a venture 1887, when he was still virtually the only professor of psychology in the country? To investigate this question we used the substantive vocabularies of every full article published in AJP's first 14 volumes to generate networks of verbally similar articles. These networks reveal the variety of research communities that Hall drew on to launch and support the journal. Three separate networks, corresponding to 3 successive time blocks, show how Hall's constellation of participating research communities changed over AJP's first 17 years. Many of these communities started with rather nebulous boundaries but soon began to differentiate into groups of more distinct specialties. Some topics declined over time, but new ones regularly appeared to replace them. We sketch a quasievolutionary model to describe the intellectual ecology of AJP's early years.

  2. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests.

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-06-27

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments.

  3. Link Investigation of IEEE 802.15.4 Wireless Sensor Networks in Forests

    Science.gov (United States)

    Ding, Xingjian; Sun, Guodong; Yang, Gaoxiang; Shang, Xinna

    2016-01-01

    Wireless sensor networks are expected to automatically monitor the ecological evolution and wildlife habits in forests. Low-power links (transceivers) are often adopted in wireless sensor network applications, in order to save the precious sensor energy and then achieve long-term, unattended monitoring. Recent research has presented some performance characteristics of such low-power wireless links under laboratory or outdoor scenarios with less obstacles, and they have found that low-power wireless links are unreliable and prone to be affected by the target environment. However, there is still less understanding about how well the low-power wireless link performs in real-world forests and to what extent the complex in-forest surrounding environments affect the link performances. In this paper, we empirically evaluate the low-power links of wireless sensors in three typical different forest environments. Our experiment investigates the performance of the link layer compatible with the IEEE 802.15.4 standard and analyzes the variation patterns of the packet reception ratio (PRR), the received signal strength indicator (RSSI) and the link quality indicator (LQI) under diverse experimental settings. Some observations of this study are inconsistent with or even contradict prior results that are achieved in open fields or relatively clean environments and thus, provide new insights both into effectively evaluating the low-power wireless links and into efficiently deploying wireless sensor network systems in forest environments. PMID:27355957

  4. light-weight digital signature algorithm for wireless sensor networks

    Indian Academy of Sciences (India)

    M LAVANYA

    Abstract. The essential security mechanism in wireless sensor networks (WSNs) is authentication, where nodes can authenticate each other before transmitting a valid data to a sink. There are a number of public key authentication procedures available for WSN in recent years. Due to constraints in WSN environment there ...

  5. light-weight digital signature algorithm for wireless sensor networks

    Indian Academy of Sciences (India)

    M LAVANYA

    2017-09-14

    Sep 14, 2017 ... Abstract. The essential security mechanism in wireless sensor networks (WSNs) is authentication, where nodes can authenticate each other before transmitting a valid data to a sink. There are a number of public key authentication procedures available for WSN in recent years. Due to constraints in WSN ...

  6. Authenticity Lies in the Eye of the Beholder The Perception of Teachers' Authenticity by their Students

    NARCIS (Netherlands)

    De Bruyckere, Pedro

    2018-01-01

    Everything and everybody is urged to be authentic. Brands now need to create authentic experiences in music, artists survive if they are perceived as being real and nowadays, even in political elections, the perception of authenticity is an issue, certainly in the 2016 elections in the United

  7. The Relevance of Big Five Trait Content in Behavior to Subjective Authenticity: Do High Levels of Within-Person Behavioral Variability Undermine or Enable Authenticity Achievement?

    Science.gov (United States)

    Fleeson, William; Wilt, Joshua

    2010-01-01

    Individuals vary their behavior from moment to moment a great deal, often acting “out of character” for their traits. This article investigates the consequences for authenticity. We compared two hypotheses—trait consistency: individuals feel most authentic when acting in a way consistent with their traits; and state-content significance: some ways of acting feel more authentic because of their content and consequences, regardless of the actor’s corresponding traits. Three studies using experience-sampling methodology in laboratory and natural settings, with participants aged 18–51, strongly supported the state-content significance hypothesis and did not support the trait-consistency hypothesis. Authenticity was consistently associated with acting highly extraverted, agreeable, conscientious, emotionally stable, and intellectual, regardless of the actor’s traits. Discussion focuses on possible implications for within-person variability in behavior and for the nature of the self-concept. PMID:20545814

  8. Recognizing the authenticity of emotional expressions: F0 contour matters when you need to know.

    Science.gov (United States)

    Drolet, Matthis; Schubotz, Ricarda I; Fischer, Julia

    2014-01-01

    Authenticity of vocal emotion expression affects emotion recognition and brain activity in the so-called Theory of Mind (ToM) network, which is implied in the ability to explain and predict behavior by attributing mental states to other individuals. Exploiting the variability of the fundamental frequency (F0 contour), which varies more (higher contour) in play-acted expressions than authentic ones, we examined whether contour biases explicit categorization toward a particular authenticity or emotion category. Moreover, we tested whether contour modulates blood-oxygen-level dependent (BOLD) response in the ToM network and explored the role of task as a top-down modulator. The effects of contour on BOLD signal were analyzed by contrasting high and low contour stimuli within two previous fMRI studies that implemented emotion and authenticity rating tasks. Participants preferentially categorized higher contour stimuli as play-acted and lower contour stimuli as sad. Higher contour was found to up-regulate activation task-independently in the primary auditory cortex. Stimulus contour and task were found to interact in a network including medial prefrontal cortex, with an increase in BOLD signal for low-contour stimuli during explicit perception of authenticity and an increase for high-contour stimuli during explicit perception of emotion. Contour-induced BOLD effects appear to be purely stimulus-driven in early auditory and intonation perception, while being strongly task-dependent in regions involved in higher cognition.

  9. Investigating the social configuration of a community to understand how networked learning activities take place: The OERu case study

    NARCIS (Netherlands)

    Schreurs, Bieke; Van den Beemt, Antoine; Prinsen, Fleur; De Laat, Maarten; Witthaus, Gaby; Conole, Grainne

    2015-01-01

    Examining how OER (Open Educational Resources) communities come to live, function or learn can support in empowering educators in the use of open educational resources. In this paper we investigate how an OER community functions through its networked learning activities. Networked learning

  10. MetNet - In situ observational Network and Orbital platform to investigate the Martian environment

    Science.gov (United States)

    Harri, Ari-Matti; Leinonen, Jussi; Merikallio, Sini; Paton, Mark; Haukka, Harri; Polkko, Jouni

    2007-09-01

    MetNet Mars Mission is an in situ observational network and orbital platform mission to investigate the Martian environment and it has been proposed to European Space Agency in response to Call for proposals for the first planning cycle of Cosmic Vision 2015-2025 D/SCI/DJS/SV/val/21851. The MetNet Mars Mission is to be implemented in collaboration with ESA, FMI, LA, IKI and the payload providing science teams. The scope of the MetNet Mission is to deploy 16 MetNet Landers (MNLs) on the Martian surface by using inflatable descent system structures accompanied by an atmospheric sounder and data relay onboard the MetNet Orbiter (MNO), which is based on ESA Mars Express satellite platform. The MNLs are attached on the three sides of the satellite and most of the MNLs are deployed to Mars separately a few weeks prior to the arrival to Mars. The MetNet Orbiter will perform continuous atmospheric soundings thus complementing the accurate in situ observations at the Martian ground produced by the MetNet observation network, as well as the orbiter will serve as the primary data relay between the MetNet Landers and the Earth. The MNLs are equipped with a versatile science payload focused on the atmospheric science of Mars. Detailed characterisation of the Martian atmospheric circulation patterns, boundary layer phenomena, and climatological cycles, as well as interior investigations, require simultaneous in situ meteorological, seismic and magnetic measurements from networks of stations on the Martian surface. MetNet Mars Mission will also provide a crucial support for the safety of large landing missions in general and manned Mars missions in particular. Accurate knowledge of atmospheric conditions and weather data is essential to guarantee safe landings of the forthcoming Mars mission elements.

  11. Parallelizable and Authenticated Online Ciphers

    DEFF Research Database (Denmark)

    Andreeva, Elena; Bogdanov, Andrey; Luykx, Atul

    2013-01-01

    -purpose CPUs or dedicated hardware.We propose the first parallelizable online cipher, COPE. It performs two calls to the underlying block cipher per plaintext block and is fully parallelizable in both encryption and decryption. COPE is proven secure against chosenplaintext attacks assuming the underlying block...... cipher is a strong PRP. We then extend COPE to create COPA, the first parallelizable, online authenticated cipher with nonce-misuse resistance. COPA only requires two extra block cipher calls to provide integrity. The privacy and integrity of the scheme is proven secure assuming the underlying block...

  12. A high-throughput model for investigating neuronal function and synaptic transmission in cultured neuronal networks.

    Science.gov (United States)

    Virdee, Jasmeet K; Saro, Gabriella; Fouillet, Antoine; Findlay, Jeremy; Ferreira, Filipa; Eversden, Sarah; O'Neill, Michael J; Wolak, Joanna; Ursu, Daniel

    2017-11-03

    Loss of synapses or alteration of synaptic activity is associated with cognitive impairment observed in a number of psychiatric and neurological disorders, such as schizophrenia and Alzheimer's disease. Therefore successful development of in vitro methods that can investigate synaptic function in a high-throughput format could be highly impactful for neuroscience drug discovery. We present here the development, characterisation and validation of a novel high-throughput in vitro model for assessing neuronal function and synaptic transmission in primary rodent neurons. The novelty of our approach resides in the combination of the electrical field stimulation (EFS) with data acquisition in spatially separated areas of an interconnected neuronal network. We integrated our methodology with state of the art drug discovery instrumentation (FLIPR Tetra) and used selective tool compounds to perform a systematic pharmacological validation of the model. We investigated pharmacological modulators targeting pre- and post-synaptic receptors (AMPA, NMDA, GABA-A, mGluR2/3 receptors and Nav, Cav voltage-gated ion channels) and demonstrated the ability of our model to discriminate and measure synaptic transmission in cultured neuronal networks. Application of the model described here as an unbiased phenotypic screening approach will help with our long term goals of discovering novel therapeutic strategies for treating neurological disorders.

  13. Report on investigation in fiscal 2000 of industrial technology exchange with international networking organizations; 2000 nendo kokusaitekina network gata soshiki tono sangyo gijutsu koryu chosa hokokusho

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    With an objective to promote exchange of industrial technologies, investigations and analyses were made on identification of the current status of networking organizations in different countries working as windows for industrial technology exchange, and on the actual status of technology commercialization methods in overseas incubators. Activities were taken in the following three fields: 1) the current status of networking organizations and incubators in different countries, 2) typology of technology commercialization, technical fields, and success factors, and 3) possibility of the use of technology information in the networking organizations. In Item 1), investigations were performed on the current status and actual activity status of the networking organizations including research parks and individual incubators intended of information exchange, mainly in the United States, UK, and Finland. In Item 2), considerations are given on the points related to technology incubation based on the information about the networking organizations and incubators in each country, and the way the industry-academia cooperation should be. In Item 3), discussions were given on the roles of the networking organizations and the possibility of utilization of technological information in the networking organizations in Japan. (NEDO)

  14. Investigating Land Surface Phenology Derived from Satellite and GPS Network Microwave Remote Sensing

    Science.gov (United States)

    Jones, M. O.; Kimball, J. S.; Small, E. E.; Larson, K. M.

    2013-12-01

    The land surface phenology (LSP) start of season (SOS) metric signals the seasonal onset of vegetation activity, including canopy growth and associated increases in land-atmosphere water, energy and carbon (CO2) exchanges influencing weather and climate variability. The Vegetation Optical Depth (VOD) parameter determined from satellite passive microwave remote sensing provides for global LSP monitoring that is sensitive to changes in vegetation canopy water content and biomass, and insensitive to atmosphere and solar illumination constraints. Direct field measures of canopy water content and biomass changes desired for LSP validation are generally lacking due to prohibitive costs of maintaining regional monitoring networks. Alternatively, a Normalized Microwave Reflectance Index (NMRI) derived from GPS base station measurements is sensitive to daily vegetation water content changes and may provide for effective microwave LSP validation as a relatively high spatial (1000m2) and temporal resolution vegetation phenology measure. We compared NMRI (1.2 and 1.5 GHz) and satellite microwave (AMSR-E sensor) 18.7 GHz frequency VOD records (2007 to 2011) at over 300 GPS sites in North America and their derived SOS metrics for a subset of 24 homogenous land cover sites. Significant correlations were found at 276 of 305 sites, with generally favorable correspondence in the resulting SOS metrics. We also investigated the temporal dynamics of nine NMRI sites within a single 25km resolution VOD pixel and with corresponding 250m MODIS NDVI measures of the three dominant land covers within the pixel to assess the spatial scale discrepancies between these high, moderate, and coarse resolution retrievals. This study is the first attempt to compare satellite microwave LSP metrics to a GPS network derived reflectance index and highlights both the utility and limitations of the NMRI data for LSP validation. Integration of GPS base stations and the NMRI into current phenology observation

  15. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  16. Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things

    DEFF Research Database (Denmark)

    Mahalle, Parikshit N.; Anggorojati, Bayu; Prasad, Neeli R.

    2013-01-01

    In the last few years the Internet of Things (IoT) has seen widespread application and can be found in each field. Authentication and access control are important and critical functionalities in the context of IoT to enable secure communication between devices. Mobility, dynamic network topology...... and weak physical security of low power devices in IoT networks are possible sources for security vulnerabilities. It is promising to make an authentication and access control attack resistant and lightweight in a resource constrained and distributed IoT environment. This paper presents the Identity...... Authentication and Capability based Access Control (IACAC) model with protocol evaluation and performance analysis. To protect IoT from man-in-the-middle, replay and denial of service (Dos) attacks, the concept of capability for access control is introduced. The novelty of this model is that, it presents...

  17. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.’s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks. PMID:26866606

  18. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Science.gov (United States)

    Wang, Chengqi; Zhang, Xiao; Zheng, Zhiming

    2016-01-01

    With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  19. Cryptanalysis and Improvement of a Biometric-Based Multi-Server Authentication and Key Agreement Scheme.

    Directory of Open Access Journals (Sweden)

    Chengqi Wang

    Full Text Available With the security requirements of networks, biometrics authenticated schemes which are applied in the multi-server environment come to be more crucial and widely deployed. In this paper, we propose a novel biometric-based multi-server authentication and key agreement scheme which is based on the cryptanalysis of Mishra et al.'s scheme. The informal and formal security analysis of our scheme are given, which demonstrate that our scheme satisfies the desirable security requirements. The presented scheme provides a variety of significant functionalities, in which some features are not considered in the most of existing authentication schemes, such as, user revocation or re-registration and biometric information protection. Compared with several related schemes, our scheme has more secure properties and lower computation cost. It is obviously more appropriate for practical applications in the remote distributed networks.

  20. RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN

    Directory of Open Access Journals (Sweden)

    Wei Liang

    2016-01-01

    Full Text Available In the real application environment of wireless sensor networks (WSNs, the uncertain factor of data storage makes the authentication information be easily forged and destroyed by illegal attackers. As a result, it is hard for secure managers to conduct forensics on transmitted information in WSN. This work considers the regeneration encoding self-healing and secret sharing techniques and proposes an effective scheme to authenticate data in WSN. The data is encoded by regeneration codes and then distributed to other redundant nodes in the form of fragments. When the network is attacked, the scheme has the ability against tampering attack or collusion attack. Furthermore, the damaged fragments can be restored as well. Parts of fragments, encoded by regeneration code, are required for secure authentication of the original distributed data. Experimental results show that the proposed scheme reduces hardware communication overhead by five percent in comparison. Additionally, the performance of local recovery achieves ninety percent.

  1. Continuous user authentication using temporal information

    Science.gov (United States)

    Niinuma, Koichiro; Jain, Anil K.

    2010-04-01

    Conventional computer systems authenticate users only at the initial log-in session, which can be the cause of a critical security flaw. To resolve this problem, systems need continuous user authentication methods that continuously monitor and authenticate users based on some biometric trait(s). We propose a new method for continuous user authentication based on a Webcam that monitors a logged in user's face and color of clothing. Our method can authenticate users regardless of their posture in front of the workstation (laptop or PC). Previous methods for continuous user authentication cannot authenticate users without biometric observation. To alleviate this requirement, our method uses color information of users' clothing as an enrollment template in addition to their face information. The system cannot pre-register the clothing color information because this information is not permanent. To deal with the problem, our system automatically registers this information every time the user logs in and then fuses it with the conventional (password) identification system. We report preliminary authentication results and future enhancements to the proposed system.

  2. Enhancing Authentication Models Characteristic Metrics via ...

    African Journals Online (AJOL)

    In this work, we derive the universal characteristic metrics set for authentication models based on security, usability and design issues. We then compute the probability of the occurrence of each characteristic metrics in some single factor and multifactor authentication models in order to determine the effectiveness of these ...

  3. Ignoring Authentic African Literature Means Ignoring Africans

    Science.gov (United States)

    Romano, Carlin

    2005-01-01

    Africa produces imaginative and authentic literature whose texture makes it impossible to think of Africans as statistics. African writers, however have to struggle to get recognized in America due to their culture and other racial and social differences, hence suggesting that efforts should be made to give authentic African literature its due.

  4. Making it Real: Authenticity, Process and Pedagogy

    Science.gov (United States)

    Badger, Richard; MacDonald, Malcolm

    2010-01-01

    Authenticity has been a part of the intellectual resources of language teaching since the 1890s but its precise meaning and implications are contested. This commentary argues for a view of authenticity which recognizes the limits of the concept as a guide for pedagogic practice and acknowledges the fact that texts are processes rather than…

  5. Test-Task Authenticity: The Multiple Perspectives

    Science.gov (United States)

    Gan, Zhengdong

    2012-01-01

    Leung and Lewkowicz remind us that the debate over the past two decades that is most relevant to ELT (English languge teaching) pedagogy and curriculum concerns test-task authenticity. This paper first reviews how the authenticity debate in the literature of second language acquisition, pedagogy and testing has evolved. Drawing on a body of…

  6. Key Recovery Attacks on Recent Authenticated Ciphers

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Dobraunig, Christoph; Eichlseder, Maria

    2014-01-01

    In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems...

  7. An Authentication Protocol for Mobile IPTV Users Based on an RFID-USB Convergence Technique

    Science.gov (United States)

    Jeong, Yoon-Su; Kim, Yong-Tae

    With the growing trend towards convergence in broadcast and communications media, Internet Protocol television (IPTV) that delivers real-time multimedia content over diverse types of communications networks (e.g., broadband Internet, cable TV, and satellite TV) has become a mainstream technology. Authenticating mobile IPTV subscribers who are continuously on the move is a challenge. A complex authentication process often impairs conditional access security or service quality as increasing illegal users and delaying service. This paper proposes an RFID-USB authentication protocol, for mobile IPTV users, combined with USIM-based personalized authentication and lightweight authentication that utilizes the RFID-USB technology with an implanted agent module (called an "agent tag") which temporarily enhanced user status information. The proposed authentication protocol adopts a plug-and-play security agent module that is placed in both an RFID tag and an RFID-USB. The implanted security agents cooperate in such a way that multiple RFID tags are connected seamlessly to an RFID-USB.

  8. Authenticated group Diffie-Hellman key exchange: theory and practice

    Energy Technology Data Exchange (ETDEWEB)

    Chevassut, Olivier [Catholic Univ. of Louvain, Louvain-la-Neuve (Belgium)

    2002-10-01

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  9. The Duality of Authenticity in ELT

    Directory of Open Access Journals (Sweden)

    J. John Love Joy

    2011-11-01

    Full Text Available Purpose: This study aims to find out the dual-perspectives on authenticity in English language teaching.Problem: The concept of authenticity has generated quite a ripple in ESL/EFL classrooms. Contrasting perspectives have emerged over the years in reaction to this concept. Some regard authenticity as an inevitable part of teaching as it provides students with opportunities to interact with reality in the classroom itself, whereas, some others consider it an ambitious construct and suggest approaching it with caution.Method: In order to verify these perspectives, a survey of literature has been done to trace the genesis of authenticity and its various facets.Conclusion: As a result, we have found that a balanced outlook on authenticity is required by the teachers to promote better teaching-learning experiences.

  10. User Authentication in Smartphones for Telehealth

    Directory of Open Access Journals (Sweden)

    Katherine A. Smith

    2017-11-01

    Full Text Available Many functions previously conducted on desktop computers are now performed on smartphones. Smartphones provide convenience, portability, and connectivity.  When smartphones are used in the conduct of telehealth, sensitive data is invariably accessed, rendering the devices in need of user authentication to ensure data protection. User authentication of smartphones can help mitigate potential Health Insurance Portability and Accountability Act (HIPAA breaches and keep sensitive patient information protected, while also facilitating the convenience of smartphones within everyday life and healthcare. This paper presents and examines several types of authentication methods available to smartphone users to help ensure security of sensitive data from attackers. The applications of these authentication methods in telehealth are discussed.  Keywords: Authentication, Biometrics, HIPAA, Mobile security, Telehealth

  11. Remote Biometrics for Robust Persistent Authentication

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew; Jensen, Christian D.

    2014-01-01

    .g., through a smart card based access control system, to the location where the authentication is required by a location-based service. The PAISE model is extended with remote biometrics to prevent the decay of authentication confidence when authenticated users encounter and interact with other users...... in the environment. The result is a calm approach to authentication, where mobile users are transparently authenticated towards the system, which allows the provision of location-based services. The output of the remote biometrics are fused using error-rate-based fusion to solve a common problem that occurs in score...... level fusion, i.e., the scores of each biometric system are usually incompatible, as they have different score ranges as well as different probability distributions. We have integrated remote biometrics with the PAISE prototype and the experimental results on a publicly available dataset, show...

  12. Investigating the Influence Relationship Models for Stocks in Indian Equity Market: A Weighted Network Modelling Study.

    Science.gov (United States)

    Bhattacharjee, Biplab; Shafi, Muhammad; Acharjee, Animesh

    2016-01-01

    The socio-economic systems today possess high levels of both interconnectedness and interdependencies, and such system-level relationships behave very dynamically. In such situations, it is all around perceived that influence is a perplexing power that has an overseeing part in affecting the dynamics and behaviours of involved ones. As a result of the force & direction of influence, the transformative change of one entity has a cogent aftereffect on the other entities in the system. The current study employs directed weighted networks for investigating the influential relationship patterns existent in a typical equity market as an outcome of inter-stock interactions happening at the market level, the sectorial level and the industrial level. The study dataset is derived from 335 constituent stocks of 'Standard & Poor Bombay Stock Exchange 500 index' and study period is 1st June 2005 to 30th June 2015. The study identifies the set of most dynamically influential stocks & their respective temporal pattern at three hierarchical levels: the complete equity market, different sectors, and constituting industry segments of those sectors. A detailed influence relationship analysis is performed for the sectorial level network of the construction sector, and it was found that stocks belonging to the cement industry possessed high influence within this sector. Also, the detailed network analysis of construction sector revealed that it follows scale-free characteristics and power law distribution. In the industry specific influence relationship analysis for cement industry, methods based on threshold filtering and minimum spanning tree were employed to derive a set of sub-graphs having temporally stable high-correlation structure over this ten years period.

  13. Pore morphologies of root induced biopores from single pore to network scale investigated by XRCT

    Science.gov (United States)

    Peth, Stephan; Wittig, Marlen C.; Uteau Puschmann, Daniel; Pagenkemper, Sebastian; Haas, Christoph; Holthusen, Dörthe; Horn, Rainer

    2015-04-01

    Biopores are assumed to be an important factor for nutrient acquisition by providing biologically highly active soil-root interfaces to re-colonizing roots and controlling oxygen and water flows at the pedon scale and within the rhizosphere through the formation of branching channel networks which potentially enhance microbial turnover processes. Characteristic differences in pore morphologies are to be expected depending on the genesis of biopores which, for example, can be earthworm-induced or root-induced or subsequently modified by one of the two. Our understanding of biophysical interactions between plants and soil can be significantly improved by quantifying 3D biopore architectures across scales ranging from single biopores to pedon scale pore networks and linking pore morphologies to microscale measurements of transport processes (e.g. oxygen diffusion). While a few studies in the past have investigated biopore networks on a larger scale yet little is known on the micro-morphology of root-induces biopores and their associated rhizosphere. Also little data is available on lateral transport of oxygen through the rhizosphere which will strongly influence microbial turnover processes and consequently control the release and uptake of nutrients. This paper highlights results gathered within a research unit on nutrient acquisition from the subsoil. Here we focus on X-ray microtomography (XRCT) studies ranging from large soil columns (70 cm length and 20 cm diameter) to individual biopores and its surrounding rhizosphere. Samples were collected from sites with different preceding crops (fescue, chicory, alfalfa) and various cropping durations (1-3 years). We will present an approach for quantitative image analysis combined with micro-sensor measurements of oxygen diffusion and spatial gradients of O2 partial pressures to relate pore structure with transport functions. Implications of various biopore architectures for the accessibility of nutrient resources in

  14. Networks of Zeeman catastrophe machines for the investigation of complex systems

    International Nuclear Information System (INIS)

    Nagy, Péter; Tasnádi, Péter

    2014-01-01

    The investigation of chaotic motion and cooperative systems presents a great opportunity to involve modern physics into the basic course of mechanics taught to BSc-level students. In our previous paper (2014 Eur. J. Phys. 35 015018), it was demonstrated that a Zeeman machine can be a versatile and motivating tool for students to gain introductory knowledge about chaotic motion via interactive simulations. Although the Zeeman machine is known mainly for its quasi-static and catastrophic behaviour, its dynamic properties are also very interesting and show typical chaotic features. In this paper, we present a novel construction consisting of Zeeman machines linked into a network. Although Zeeman networks can be built with almost arbitrary topology, our discussion is restricted to a system where Zeeman machines are arranged in a two-dimensional periodical lattice and the angular variables of the machines are limited to discrete values only. It will be shown that the Zeeman-crystal is appropriate for studying the properties of a broad range of complex systems. Using NetLogo simulations (second- and first-order) phase transitions, its ferromagnetic- and anti-ferromagnetic-type behaviour is demonstrated. A limiting case of the theoretical model of Zeeman-crystal leads to a model that is analogous to the Potts clock model used frequently in statistical physics. The present paper is organically linked to our website (http://csodafizika.hu/zeeman) where downloadable simulations, which are discussed in the paper, can be found. (paper)

  15. Analytic tools for investigating the structure of network reliability measures with regard to observation correlations

    Science.gov (United States)

    Prószyński, W.; Kwaśniak, M.

    2018-03-01

    A global measure of observation correlations in a network is proposed, together with the auxiliary indices related to non-diagonal elements of the correlation matrix. Based on the above global measure, a specific representation of the correlation matrix is presented, being the result of rigorously proven theorem formulated within the present research. According to the theorem, each positive definite correlation matrix can be expressed by a scale factor and a so-called internal weight matrix. Such a representation made it possible to investigate the structure of the basic reliability measures with regard to observation correlations. Numerical examples carried out for two test networks illustrate the structure of those measures that proved to be dependent on global correlation index. Also, the levels of global correlation are proposed. It is shown that one can readily find an approximate value of the global correlation index, and hence the correlation level, for the expected values of auxiliary indices being the only knowledge about a correlation matrix of interest. The paper is an extended continuation of the previous study of authors that was confined to the elementary case termed uniform correlation. The extension covers arbitrary correlation matrices and a structure of correlation effect.

  16. Security for multihop wireless networks

    CERN Document Server

    Khan, Shafiullah

    2014-01-01

    Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks.Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, ep

  17. How authenticity, narrator, and plot of a story affect perceived brand image

    OpenAIRE

    Huang, Wen-yeh (Rene)

    2010-01-01

    Many successful brands have employed brand story to communicate with consumers. Brand story plays a part in helping consumers make sense of the brand. This study intended to investigate the relationship between brand story's demensions, including authenticity, narrator, plot, and consumers' perceptions of brand image. A 2x2x2 experimental design was employed to test the effect of abovementioned dimensions on perceived brand image. Findings suggested that brand story with high authenticity, cl...

  18. An EEG-Based Person Authentication System with Open-Set Capability Combining Eye Blinking Signals

    Directory of Open Access Journals (Sweden)

    Qunjian Wu

    2018-01-01

    Full Text Available The electroencephalogram (EEG signal represents a subject’s specific brain activity patterns and is considered as an ideal biometric given its superior forgery prevention. However, the accuracy and stability of the current EEG-based person authentication systems are still unsatisfactory in practical application. In this paper, a multi-task EEG-based person authentication system combining eye blinking is proposed, which can achieve high precision and robustness. Firstly, we design a novel EEG-based biometric evoked paradigm using self- or non-self-face rapid serial visual presentation (RSVP. The designed paradigm could obtain a distinct and stable biometric trait from EEG with a lower time cost. Secondly, the event-related potential (ERP features and morphological features are extracted from EEG signals and eye blinking signals, respectively. Thirdly, convolutional neural network and back propagation neural network are severally designed to gain the score estimation of EEG features and eye blinking features. Finally, a score fusion technology based on least square method is proposed to get the final estimation score. The performance of multi-task authentication system is improved significantly compared to the system using EEG only, with an increasing average accuracy from 92.4% to 97.6%. Moreover, open-set authentication tests for additional imposters and permanence tests for users are conducted to simulate the practical scenarios, which have never been employed in previous EEG-based person authentication systems. A mean false accepted rate (FAR of 3.90% and a mean false rejected rate (FRR of 3.87% are accomplished in open-set authentication tests and permanence tests, respectively, which illustrate the open-set authentication and permanence capability of our systems.

  19. Investigation of rotated PCA from the perspective of network communities applied to climate data

    Science.gov (United States)

    Hartman, David; Hlinka, Jaroslav; Vejmelka, Martin; Palus, Milan

    2013-04-01

    Applications of the rotated principal component analysis (RPCA) have a long history in climatology usually due to efforts of finding specific circulation patterns (Barnston and Livezey 1987). Using this approach several well known patterns like the North Atlantic Oscillation (NAO) or the Pacific/North American Pattern (PNA) can be identified (Barnston and Livezey 1987; Feldstein 2000). Applied to the whole globe this method gives several weakly related components that can be suspected of being important modes of climate variability. On the other hand, a relatively new topic in climate research is that of community detection and analysis (Tsonis et al. 2011), although the detection of communities in complex networks is a well established scientific field itself (Fortunato 2010; Girvan and Newman 2002). To analyze community structure one has to consider the climate system as a complex network (Tsonis and Swanson 2012), i.e. as a set of nodes represented by a climate-related variable on specific globe positions and a set of edges mutually connecting these nodes according to chosen measure of coherence (Hlinka et al. preprint). Determination of optimal community structure is well known to be a hard problem and there are several methods excelling in specific situations (Fortunato 2010) and several ways of measuring quality of resulting community structure such as modularity (Newman and Girvan 2004). Following the fact that RPCA gives us a set of components that can be represented as a community structure we investigate the potential of RPCA in community-detection context. For this purpose we use data from global National Centers for Environmental Prediction-National Center for Atmospheric Research (NCEP-NCAR) reanalysis (Kistler et al. 2001), more specifically surface air temperature (SAT) and surface pressure level (SPL). Acknowledgement: This study is supported by the Czech Science Foundation, Project No. P103/11/J068. Barnston, AG; Livezey RE (1987) Classification

  20. Multicast Delayed Authentication For Streaming Synchrophasor Data in the Smart Grid.

    Science.gov (United States)

    Câmara, Sérgio; Anand, Dhananjay; Pillitteri, Victoria; Carmo, Luiz

    2016-01-01

    Multicast authentication of synchrophasor data is challenging due to the design requirements of Smart Grid monitoring systems such as low security overhead, tolerance of lossy networks, time-criticality and high data rates. In this work, we propose inf -TESLA, Infinite Timed Efficient Stream Loss-tolerant Authentication, a multicast delayed authentication protocol for communication links used to stream synchrophasor data for wide area control of electric power networks. Our approach is based on the authentication protocol TESLA but is augmented to accommodate high frequency transmissions of unbounded length. inf TESLA protocol utilizes the Dual Offset Key Chains mechanism to reduce authentication delay and computational cost associated with key chain commitment. We provide a description of the mechanism using two different modes for disclosing keys and demonstrate its security against a man-in-the-middle attack attempt. We compare our approach against the TESLA protocol in a 2-day simulation scenario, showing a reduction of 15.82% and 47.29% in computational cost, sender and receiver respectively, and a cumulative reduction in the communication overhead.

  1. Network Mendelian randomization: using genetic variants as instrumental variables to investigate mediation in causal pathways.

    Science.gov (United States)

    Burgess, Stephen; Daniel, Rhian M; Butterworth, Adam S; Thompson, Simon G

    2015-04-01

    Mendelian randomization uses genetic variants, assumed to be instrumental variables for a particular exposure, to estimate the causal effect of that exposure on an outcome. If the instrumental variable criteria are satisfied, the resulting estimator is consistent even in the presence of unmeasured confounding and reverse causation. We extend the Mendelian randomization paradigm to investigate more complex networks of relationships between variables, in particular where some of the effect of an exposure on the outcome may operate through an intermediate variable (a mediator). If instrumental variables for the exposure and mediator are available, direct and indirect effects of the exposure on the outcome can be estimated, for example using either a regression-based method or structural equation models. The direction of effect between the exposure and a possible mediator can also be assessed. Methods are illustrated in an applied example considering causal relationships between body mass index, C-reactive protein and uric acid. These estimators are consistent in the presence of unmeasured confounding if, in addition to the instrumental variable assumptions, the effects of both the exposure on the mediator and the mediator on the outcome are homogeneous across individuals and linear without interactions. Nevertheless, a simulation study demonstrates that even considerable heterogeneity in these effects does not lead to bias in the estimates. These methods can be used to estimate direct and indirect causal effects in a mediation setting, and have potential for the investigation of more complex networks between multiple interrelated exposures and disease outcomes. © The Author 2014. Published by Oxford University Press on behalf of the International Epidemiological Association.

  2. Microfluidic Investigation of Oil Mobilization in Shale Fracture Networks at Reservoir Conditions

    Science.gov (United States)

    Porter, M. L.; Jimenez-Martinez, J.; Carey, J. W.; Viswanathan, H. S.

    2015-12-01

    Investigations of pore-scale fluid flow and transport phenomena using engineered micromodels has steadily increased in recent years. In these investigations fluid flow is restricted to two-dimensions allowing for real time visualization and quantification of complex flow and reactive transport behavior, which is difficult to obtain in other experimental systems. One drawback to these studies is the use of engineered materials that do not faithfully represent the rock properties (e.g., porosity, wettability, roughness, etc.) encountered in subsurface formations. In this work, we describe a unique high pressure (up to 1500 psi) and temperature (up to 80 °C) microfluidics experimental system in which we investigate fluid flow and transport in geo-material (e.g., shale, Portland cement, etc.) micromodels. The use of geo-material micromodels allows us to better represent fluid-rock interactions including wettability, chemical reactivity, and nano-scale porosity at conditions representative of natural subsurface environments. Here, we present experimental results in fracture systems with applications to hydrocarbon mobility in hydraulically fractured shale. Complex fracture network patterns are derived from 3D x-ray tomography images of actual fractures created in shale rock cores. We use both shale and glass micromodels, allowing for a detailed comparison between flow phenomena in the different materials. We discuss results from two-phase huff-and-puff experiments involving N2 and n-Decane, as well as three-phase displacement experiments involving supercritical CO2, brine, and n-Decane.

  3. Investigation of production method, geographical origin and species authentication in commercially relevant shrimps using stable isotope ratio and/or multi-element analyses combined with chemometrics: an exploratory analysis.

    Science.gov (United States)

    Ortea, Ignacio; Gallardo, José M

    2015-03-01

    Three factors defining the traceability of a food product are production method (wild or farmed), geographical origin and biological species, which have to be checked and guaranteed, not only in order to avoid mislabelling and commercial fraud, but also to address food safety issues and to comply with legal regulations. The aim of this study was to determine whether these three factors could be differentiated in shrimps using stable isotope ratio analysis of carbon and nitrogen and/or multi-element composition. Different multivariate statistics methods were applied to different data subsets in order to evaluate their performance in terms of classification or predictive ability. Although the success rates varied depending on the dataset used, the combination of both techniques allowed the correct classification of 100% of the samples according to their actual origin and method of production, and 93.5% according to biological species. Even though further studies including a larger number of samples in each group are needed in order to validate these findings, we can conclude that these methodologies should be considered for studies regarding seafood product authenticity. Copyright © 2014 Elsevier Ltd. All rights reserved.

  4. An Efficient User Authentication and User Anonymity Scheme with Provably Security for IoT-Based Medical Care System.

    Science.gov (United States)

    Li, Chun-Ta; Wu, Tsu-Yang; Chen, Chin-Ling; Lee, Cheng-Chi; Chen, Chien-Ming

    2017-06-23

    In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.

  5. Investigation of Artificial Neural Network Based Direct Torque Control for PMSM by Numerical Simulations

    OpenAIRE

    Fatih Korkmaz; M.Faruk Çakır; İsmail Topaloğlu; Rıza Gürbüz

    2012-01-01

    The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications.The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new col...

  6. Investigations into the performance of a distributed routing protocol for packet switching networks.

    OpenAIRE

    Lengerich, Anthony W.

    1982-01-01

    Approved for public release; distribution is unlimited Packet switching communication networks employ routing protocols to determine the path traversed by each packet as it passes through the network. Routing protocols which are adaptive and can restructure the packet paths in response to localized network congestion ace called "dynamic" routing protocols. Dynamic routing protocols seek to optimize the routing (provide the shortest path) for each packet in the network....

  7. Authentication of forensic DNA samples.

    Science.gov (United States)

    Frumkin, Dan; Wasserstrom, Adam; Davidson, Ariane; Grafit, Arnon

    2010-02-01

    Over the past twenty years, DNA analysis has revolutionized forensic science, and has become a dominant tool in law enforcement. Today, DNA evidence is key to the conviction or exoneration of suspects of various types of crime, from theft to rape and murder. However, the disturbing possibility that DNA evidence can be faked has been overlooked. It turns out that standard molecular biology techniques such as PCR, molecular cloning, and recently developed whole genome amplification (WGA), enable anyone with basic equipment and know-how to produce practically unlimited amounts of in vitro synthesized (artificial) DNA with any desired genetic profile. This artificial DNA can then be applied to surfaces of objects or incorporated into genuine human tissues and planted in crime scenes. Here we show that the current forensic procedure fails to distinguish between such samples of blood, saliva, and touched surfaces with artificial DNA, and corresponding samples with in vivo generated (natural) DNA. Furthermore, genotyping of both artificial and natural samples with Profiler Plus((R)) yielded full profiles with no anomalies. In order to effectively deal with this problem, we developed an authentication assay, which distinguishes between natural and artificial DNA based on methylation analysis of a set of genomic loci: in natural DNA, some loci are methylated and others are unmethylated, while in artificial DNA all loci are unmethylated. The assay was tested on natural and artificial samples of blood, saliva, and touched surfaces, with complete success. Adopting an authentication assay for casework samples as part of the forensic procedure is necessary for maintaining the high credibility of DNA evidence in the judiciary system.

  8. Image content authentication based on channel coding

    Science.gov (United States)

    Zhang, Fan; Xu, Lei

    2008-03-01

    The content authentication determines whether an image has been tampered or not, and if necessary, locate malicious alterations made on the image. Authentication on a still image or a video are motivated by recipient's interest, and its principle is that a receiver must be able to identify the source of this document reliably. Several techniques and concepts based on data hiding or steganography designed as a means for the image authentication. This paper presents a color image authentication algorithm based on convolution coding. The high bits of color digital image are coded by the convolution codes for the tamper detection and localization. The authentication messages are hidden in the low bits of image in order to keep the invisibility of authentication. All communications channels are subject to errors introduced because of additive Gaussian noise in their environment. Data perturbations cannot be eliminated but their effect can be minimized by the use of Forward Error Correction (FEC) techniques in the transmitted data stream and decoders in the receiving system that detect and correct bits in error. This paper presents a color image authentication algorithm based on convolution coding. The message of each pixel is convolution encoded with the encoder. After the process of parity check and block interleaving, the redundant bits are embedded in the image offset. The tamper can be detected and restored need not accessing the original image.

  9. Perfumed historic buildings: Issues of authenticity

    Directory of Open Access Journals (Sweden)

    Tošić Jovana

    2016-01-01

    Full Text Available Contemporary historical preservation practice includes olfactory preservation as an experimental method of architectural preservation. The implementation of manufactured scents in historic buildings raises important issues of authenticity. This paper focuses on three important issues in the relation between olfactory preservation and authenticity: the importance of phenomenology in memory evocation; the relative character of the authenticity concept; and the significance of social values in historic preservation. This requires a critical examination of charters, documents and theoretical interpretations which reflect a broader concept of authenticity. The paper discusses certain articles of the Venice Charter, the Nara Document on Authenticity, as well as the sense of smell in architectural experience through critical analysis of the theories of John Ruskin, Viollet-le-Duc, Roger Scruton and Juhani Pallasmaa and their concepts of authenticity. Authenticity issues are illustrated by the examples of olfactory preservation: olfactory reconstruction of Philip Johnson’s Glass House; interior restoration and olfactory reconstruction of the Arts Club in Mayfair, London; and the creation process of the perfume brand Arquiste, a meaningful example which relocates the olfactory reconstruction context. These critical analyses raise the question of scent in historic buildings as a value in itself.

  10. An Information Theoretic Investigation Of Complex Adaptive Supply Networks With Organizational Topologies

    Science.gov (United States)

    2016-12-22

    and business analytics in networks adapting to their environment. This dissertation also presents analysis of information transfer and information...statistical significance of the process relationships being studied. A null hypothesis testing approach has been taken in the Java Information Dynamics...this could spawn new approaches to business analytics or network management as a network adapts to its environment. Materials and Methods The

  11. BrainCrafter: An investigation into human-based neural network engineering

    DEFF Research Database (Denmark)

    Piskur, J.; Greve, P.; Togelius, J.

    2015-01-01

    This paper presents the online application Brain-Crafter, in which users can manually build artificial neural networks (ANNs) to control a robot in a maze environment. Users can either start to construct networks from scratch or elaborate on networks created by other users. In particular, Brain...

  12. An investigation of scalable anomaly detection techniques for a large network of Wi-Fi hotspots

    CSIR Research Space (South Africa)

    Machaka, P

    2015-01-01

    Full Text Available . The Neural Networks, Bayesian Networks and Artificial Immune Systems were used for this experiment. Using a set of data extracted from a live network of Wi-Fi hotspots managed by an ISP; we integrated algorithms into a data collection system to detect...

  13. Combining affinity propagation clustering and mutual information network to investigate key genes in fibroid.

    Science.gov (United States)

    Chen, Qian-Song; Wang, Dan; Liu, Bao-Lian; Gao, Shu-Feng; Gao, Dan-Li; Li, Gui-Rong

    2017-07-01

    The aim of the present study was to investigate key genes in fibroids based on the multiple affinity propogation-Krzanowski and Lai (mAP-KL) method, which included the maxT multiple hypothesis, Krzanowski and Lai (KL) cluster quality index, affinity propagation (AP) clustering algorithm and mutual information network (MIN) constructed by the context likelihood of relatedness (CLR) algorithm. In order to achieve this goal, mAP-KL was initially implemented to investigate exemplars in fibroid, and the maxT function was employed to rank the genes of training and test sets, and the top 200 genes were obtained for further study. In addition, the KL cluster index was applied to determine the quantity of clusters and the AP clustering algorithm was conducted to identify the clusters and their exemplars. Subsequently, the support vector machine (SVM) model was selected to evaluate the classification performance of mAP-KL. Finally, topological properties (degree, closeness, betweenness and transitivity) of exemplars in MIN constructed according to the CLR algorithm were assessed to investigate key genes in fibroid. The SVM model validated that the classification between normal controls and fibroid patients by mAP-KL had a good performance. A total of 9 clusters and exemplars were identified based on mAP-KL, which were comprised of CALCOCO2 , COL4A2 , COPS8 , SNCG , PA2G4 , C17orf70 , MARK3 , BTNL3 and TBC1D13 . By accessing the topological analysis for exemplars in MIN, SNCG and COL4A2 were identified as the two most significant genes of four types of methods, and they were denoted as key genes in the progress of fibroid. In conclusion, two key genes ( SNCG and COL4A2 ) and 9 exemplars were successfully investigated, and these may be potential biomarkers for the detection and treatment of fibroid.

  14. Staging constructions of authenticity in organizational change

    DEFF Research Database (Denmark)

    Dupret, Katia

    2018-01-01

    that are emotionally charged. Through a socio-material perspective this paper seeks to explore how change processes in organizations challenges the idea of authentic leadership as a merely individual ability or personality trait and suggest that the authentic leader is distributed into the practices of change....... The paper explores how staged organizational change where authentic role-play and scripts from everyday life combined with meta-reflection and feedback construct new forms of reflection where its ethical side-effects should be discussed....

  15. Instant Java password and authentication security

    CERN Document Server

    Mayoral, Fernando

    2013-01-01

    Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks. This book takes a hands-on approach to Java-based password hashing and authentication, detailing advanced topics in a recipe format.This book is ideal for developers new to user authentication and password security, and who are looking to get a good grounding in how to implement it in a reliable way.It's assumed that the reader will have some experience in Java already, as well as being familiar with the basic idea behind user authentication.

  16. Authenticated communication from quantum readout of PUFs

    Science.gov (United States)

    Škorić, Boris; Pinkse, Pepijn W. H.; Mosk, Allard P.

    2017-08-01

    Quantum readout of physical unclonable functions (PUFs) is a recently introduced method for remote authentication of objects. We present an extension of the protocol to enable the authentication of data: A verifier can check if received classical data were sent by the PUF holder. We call this modification QR-d or, in the case of the optical-PUF implementation, QSA-d. We discuss how QSA-d can be operated in a parallel way. We also present a protocol for authenticating quantum states.

  17. Authentic And Concurrent Evaluation-refining

    DEFF Research Database (Denmark)

    Eriksson, Carina Ihlström; Åkesson, Maria; Kautz, Karlheinz

    2011-01-01

    This paper addresses the need for more detailed accounts for evaluation in design science research literature. By revisiting a design project regarding the future e-newspaper we give detailed descriptions of its authentic and concurrent evaluation approach by illustrating the what, why and how...... as well as decisions on strategic levels. We emphasize a holistic and concurrent approach to evaluation compared to the general design science research thinking and argue that reflecting on how to seek authenticity is important. By authenticity we refer to the notion of how closely an evaluation captures...

  18. Investigation of the effect of cutting speed on the Surface Roughness parameters in CNC End Milling using Artificial Neural Network

    International Nuclear Information System (INIS)

    Al Hazza, Muataz H F; Adesta, Erry Y T

    2013-01-01

    This research presents the effect of high cutting speed on the surface roughness in the end milling process by using the Artificial Neural Network (ANN). An experimental investigation was conducted to measure the surface roughness for end milling. A set of sparse experimental data for finish end milling on AISI H13 at hardness of 48 HRC have been conducted. The artificial neural network (ANN) was applied to simulate and study the effect of high cutting speed on the surface roughness

  19. Investigation of thermal stratification in cisterns using analytical and Artificial Neural Networks methods

    International Nuclear Information System (INIS)

    Ameri Siahoui, H.R.; Dehghani, A.R.; Razavi, M.; Khani, M.R.

    2011-01-01

    The thermal characteristics of an underground cold-water reservoir are investigated analytically and using Artificial Neural Networks (ANN). An analytical solution is developed for the temperature distribution in the reservoir by assuming a linearized boundary condition at the water surface. For the general non-linear boundary condition, the temperature distribution is modeled using ANN. Very good agreements between the analytical and ANN results at various times during the withdrawal cycle are observed, ensuring the accuracy of the analytical and ANN procedures. The results show that a stable thermal stratification is preserved in the reservoir throughout the entire course of withdrawal cycle. As one important outcome of this research, two different regions are observed inside the thermally stratified tank during discharge cycle. The bottom region with a linear temperature distribution and the upper one in which a nearly exponential thermal stratification are developed. During withdrawal cycle, the outside temperature reaches as high as 42 o C, while cool water with the temperature varying from 12 to 13 o C is easily available from the underground water reservoir under investigation.

  20. Opportunities to investigate the functional phenology of ecosystems using a European Phenology Camera Network

    Science.gov (United States)

    Wingate, Lisa; Ogee, Jerome; Cremonese, Edoardo; Filippa, Gianluca; Mizunuma, Toshie; Migliavacca, Mirco; Plaza-Aguilar, Andres; Wilkinson, Matthew; Grace, John

    2015-04-01

    Plant phenology is orchestrated through subtle changes in photoperiod, temperature and soil moisture. Presently, the exact timing of plant development stages and their response to climate and management practices are crudely represented in land surface models. As visual observations of phenology are laborious, there is a need to supplement long-term observations with automated techniques such as those provided by digital repeat photography at high temporal and spatial resolution. We present the first synthesis from a growing observational network of digital cameras installed on flux towers across Europe above deciduous and evergreen forests as well as grasslands and croplands. Using colour indices from digital images and newly developed algorithms, we explored whether key changes in canopy phenology could be detected automatically across different land use types in the network. Our initial results indicate that a piecewise regression approach can capture the start and end of the growing season well, in addition to striking changes in colour signals caused by flowering and management practices such as mowing. We also investigated whether the seasonal patterns of red, green and blue colour fractions derived from digital images could be modelled mechanistically using the canopy radiative transfer model PROSAIL. This model can be used to simulate the RGB signal at the canopy scale when parameterised with quantitative information on seasonal changes in canopy leaf area and leaf pigment content (chlorophyll and carotenoid concentrations). From a model sensitivity analysis we found that variations in colour fractions, and in particular the spring 'green hump' observed repeatedly in deciduous broadleaf canopies across the network, seem essentially dominated by changes in pigment concentrations (chlorophyll and carotenoids). Using the model we were also able to explain why this spring maximum in green signal is often observed out of phase with the maximum period of canopy

  1. Simultaneous trimodal MR-PET-EEG imaging for the investigation of resting state networks in humans

    Energy Technology Data Exchange (ETDEWEB)

    Neuner, Irene [RWTH Aachen (Germany); Institute of Neuroscience and Medicine - 4, Forschungszentrum Juelich GmbH (Germany); Mauler, Joerg; Arrubla, Jorge; Kops, Elena Rota; Tellmann, Lutz; Scheins, Jurgen; Herzog, Hans [Institute of Neuroscience and Medicine - 4, Forschungszentrum Juelich GmbH (Germany); Langen, Karl Josef; Shah, Jon [RWTH Aachen (Germany)

    2015-05-18

    Glucose is the principal source of energy for the brain and its relationship to neuronal activity are poorly understood. The human brain uses 80% of its energy for ongoing neural activity that occurs in isolation from any particular stimulus. A promising tool for the investigation of glucose metabolism and its relationship to neuronal activity is simultaneous trimodal MR-PET-EEG data imaging. We here demonstrate the first in vivo human trimodal data at 3T. In one session MR, FDG-PET and EEG data were recorded simultaneously at a 3T hybrid MR-BrainPET scanner (Siemens, Germany) equipped with a 32 channel MR-compatible EEG system (Brain Products, Germany) in 11 healthy volunteers (11 males, mean age: 25.2 years SD: 1.2). MR and EEG data acquisition MP-RAGE (TR = 2250 ms, TE= 3.03 ms, 176 sagittal slices. 1 mm, GRAPPA factor 2. MR-based attenuation correction of PET data via UTE: flip angle=15. Two different echo times TE1=0.07 and TE2=2.46 ms, TR=200 ms. EPI sequence (TR: 2.2 s, TE: 30 ms, FOV: 200 mm, 165 volumes, The subjects were requested to close their eyes and relax EEG data were recorded using a 32-channel MR compatible EEG system. App. 200 MBq/μmol FDG were injected, data were acquired in list mode and iteratively reconstructed with all necessary corrections into 153 slices with 256 x 256 voxels sized 1.25 mm{sup 3}. The trimodal approach, recording PET data, MR data and EEG data simultaneously was successful. The high neuronal activity of the structures within the default mode network occurs on the basis of a high glucose consumption rate within the default node network. The activity of the default mode is not tied to a special EEG frequency band.

  2. Determination of authenticity of brand perfume using electronic nose prototypes

    International Nuclear Information System (INIS)

    Gebicki, Jacek; Szulczynski, Bartosz; Kaminski, Marian

    2015-01-01

    The paper presents the practical application of an electronic nose technique for fast and efficient discrimination between authentic and fake perfume samples. Two self-built electronic nose prototypes equipped with a set of semiconductor sensors were employed for that purpose. Additionally 10 volunteers took part in the sensory analysis. The following perfumes and their fake counterparts were analysed: Dior—Fahrenheit, Eisenberg—J’ose, YSL—La nuit de L’homme, 7 Loewe and Spice Bomb. The investigations were carried out using the headspace of the aqueous solutions. Data analysis utilized multidimensional techniques: principle component analysis (PCA), linear discrimination analysis (LDA), k-nearest neighbour (k-NN). The results obtained confirmed the legitimacy of the electronic nose technique as an alternative to the sensory analysis as far as the determination of authenticity of perfume is concerned. (paper)

  3. Determination of authenticity of brand perfume using electronic nose prototypes

    Science.gov (United States)

    Gebicki, Jacek; Szulczynski, Bartosz; Kaminski, Marian

    2015-12-01

    The paper presents the practical application of an electronic nose technique for fast and efficient discrimination between authentic and fake perfume samples. Two self-built electronic nose prototypes equipped with a set of semiconductor sensors were employed for that purpose. Additionally 10 volunteers took part in the sensory analysis. The following perfumes and their fake counterparts were analysed: Dior—Fahrenheit, Eisenberg—J’ose, YSL—La nuit de L’homme, 7 Loewe and Spice Bomb. The investigations were carried out using the headspace of the aqueous solutions. Data analysis utilized multidimensional techniques: principle component analysis (PCA), linear discrimination analysis (LDA), k-nearest neighbour (k-NN). The results obtained confirmed the legitimacy of the electronic nose technique as an alternative to the sensory analysis as far as the determination of authenticity of perfume is concerned.

  4. Ephemeral-Secret-Leakage Secure ID-Based Three-Party Authenticated Key Agreement Protocol for Mobile Distributed Computing Environments

    Directory of Open Access Journals (Sweden)

    Chao-Liang Liu

    2018-03-01

    Full Text Available A three-party Authenticated Key Agreement (AKA protocol in the distributed computing environment is a client that requests services from an application server through an authentication server. The authentication server is responsible for authenticating the participating entities and helping them to construct a common session key. Adopting the Key Transfer Authentication Protocol (KTAP in such an environment, the authentication server is able to monitor the communication messages to prevent and trace network crime. However, the session key in the KTAP setting is created only by the authentication server and is vulnerable to the resilience of key control. On the other hand, with the rapid growth of network technologies, mobile devices are widely used by people to access servers in the Internet. Many AKA protocols for mobile devices have been proposed, however, most protocols are vulnerable to Ephemeral Secret Leakage (ESL attacks which compromise the private keys of clients and the session key by an adversary from eavesdropped messages. This paper proposes a novel ESL-secure ID-based three-party AKA protocol for mobile distributed computing environments based on ESL-secure ID-based Authenticated Key Exchange (ID-AKE protocol. The proposed protocol solves the key control problem in KTAP while retaining the advantages of preventing and tracing network crime in KTAP and also resists ESL attacks. The AVISPA tool simulation results confirm the correctness of the protocol security analysis. Furthermore, we present a parallel version of the proposed ESL-secure ID-based three-party AKA protocol that is communication-efficient.

  5. Make me authentic, but not here: Reflexive struggles with academic identity and authentic leadership

    OpenAIRE

    Tomkins, Leah; Nicholds, Alyson

    2017-01-01

    This article presents a reflexive auto-ethnography of the experience of teaching authentic leadership to MBA students. It traces parallels between the challenges of authentic leadership and the challenges of academic identity work, grounded specifically in the experience of having to teach something one does not fully endorse. Both authentic leadership and academic identity work emerge as struggle – riddled with false starts, best intentions and self-deception, and entwined in the politics of...

  6. A microfluidic investigation of gas exsolution in glass and shale fracture networks

    Science.gov (United States)

    Porter, M. L.; Jimenez-Martinez, J.; Harrison, A.; Currier, R.; Viswanathan, H. S.

    2016-12-01

    Microfluidic investigations of pore-scale fluid flow and transport phenomena has steadily increased in recent years. In these investigations fluid flow is restricted to two-dimensions allowing for real-time visualization and quantification of complex flow and reactive transport behavior, which is difficult to obtain in other experimental systems. In this work, we describe a unique high pressure (up to 10.3 MPa) and temperature (up to 80 °C) microfluidics experimental system that allows us to investigate fluid flow and transport in geo-material (e.g., shale, Portland cement, etc.) micromodels. The use of geo-material micromodels allows us to better represent fluid-rock interactions including wettability, chemical reactivity, and nano-scale porosity at conditions representative of natural subsurface environments. Here, we present experimental results in fracture systems with applications to hydrocarbon mobility in fractured rocks. Complex fracture network patterns are derived from 3D x-ray tomography images of actual fractures created in shale rock cores. We use both shale and glass micromodels, allowing for a detailed comparison between flow phenomena in the different materials. We discuss results from two-phase gas (CO2 and N2) injection experiments designed to enhance oil recovery. In these experiments gas was injected into micromodels saturated with oil and allowed to soak for approximately 12 hours at elevated pressures. The pressure in the system was then decreased to atmospheric, causing the gas to expand and/or dissolve out of solution, subsequently mobilizing the oil. In addition to the experimental results, we present a relatively simple model designed to quantify the amount of oil mobilized as a function of decreasing system pressure. We will show comparisons between the experiments and model, and discuss the potential use of the model in field-scale reservoir simulations.

  7. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  8. Investigations on the Potential of Convolutional Neural Networks for Vehicle Classification Based on RGB and LIDAR Data

    Science.gov (United States)

    Niessner, R.; Schilling, H.; Jutzi, B.

    2017-05-01

    In recent years, there has been a significant improvement in the detection, identification and classification of objects and images using Convolutional Neural Networks. To study the potential of the Convolutional Neural Network, in this paper three approaches are investigated to train classifiers based on Convolutional Neural Networks. These approaches allow Convolutional Neural Networks to be trained on datasets containing only a few hundred training samples, which results in a successful classification. Two of these approaches are based on the concept of transfer learning. In the first approach features, created by a pretrained Convolutional Neural Network, are used for a classification using a support vector machine. In the second approach a pretrained Convolutional Neural Network gets fine-tuned on a different data set. The third approach includes the design and training for flat Convolutional Neural Networks from the scratch. The evaluation of the proposed approaches is based on a data set provided by the IEEE Geoscience and Remote Sensing Society (GRSS) which contains RGB and LiDAR data of an urban area. In this work it is shown that these Convolutional Neural Networks lead to classification results with high accuracy both on RGB and LiDAR data. Features which are derived by RGB data transferred into LiDAR data by transfer learning lead to better results in classification in contrast to RGB data. Using a neural network which contains fewer layers than common neural networks leads to the best classification results. In this framework, it can furthermore be shown that the practical application of LiDAR images results in a better data basis for classification of vehicles than the use of RGB images.

  9. Athos: Efficient Authentication of Outsourced File Systems

    DEFF Research Database (Denmark)

    Triandopoulos, Nikolaos; Goodrich, Michael T.; Papamanthou, Charalampos

    2008-01-01

    We study the problem of authenticated storage, where we wish to construct protocols that allow to outsource any complex file system to an untrusted server and yet ensure the file-system's integrity. We introduce Athos, a new, platform-independent and user-transparent architecture for authenticated...... outsourced storage. Using light-weight cryptographic primitives and efficient data-structuring techniques, we design authentication schemes that allow a client to efficiently verify that the file system is fully consistent with the exact history of updates and queries requested by the client. In Athos, file-system...... operations are verified in time that is logarithmic in the size of the file system using optimal storage complexity-constant storage overhead at the client and asymptotically no extra overhead at the server. We provide a prototype implementation of Athos validating its performance and its authentication...

  10. Authentic professional competence in clinical neuropsychology.

    Science.gov (United States)

    Denney, Robert L

    2010-08-01

    Authentic Professional Competence in Clinical Neuropsychology was Dr Denney's 2009 presidential address at the Annual Conference of the National Academy of Neuropsychology. In his address, he highlighted the need for clinical neuropsychologists to strive for authentic professional competence rather than a mere pretense of expertise. Undisputed credibility arises from authentic professional competence. Achieving authentic professional competence includes the completion of a thorough course of training within the defined specialty area and validation of expertise by one's peers through the board certification process. Included in the address were survey results regarding what the consumer believes about board certification as well as survey results regarding the experiences of recent neuropsychology diplomates. It is important for neuropsychologists to realize that the board certification process enhances public perception and credibility of the field as well as personal growth for the neuropsychologist. Lastly, he urged all neuropsychologists to support the unified training model and pursue board certification.

  11. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  12. Multi-factor authentication using quantum communication

    Science.gov (United States)

    Hughes, Richard John; Peterson, Charles Glen; Thrasher, James T.; Nordholt, Jane E.; Yard, Jon T.; Newell, Raymond Thorson; Somma, Rolando D.

    2018-02-06

    Multi-factor authentication using quantum communication ("QC") includes stages for enrollment and identification. For example, a user enrolls for multi-factor authentication that uses QC with a trusted authority. The trusted authority transmits device factor information associated with a user device (such as a hash function) and user factor information associated with the user (such as an encrypted version of a user password). The user device receives and stores the device factor information and user factor information. For multi-factor authentication that uses QC, the user device retrieves its stored device factor information and user factor information, then transmits the user factor information to the trusted authority, which also retrieves its stored device factor information. The user device and trusted authority use the device factor information and user factor information (more specifically, information such as a user password that is the basis of the user factor information) in multi-factor authentication that uses QC.

  13. Investigation of Spatial Data with Open Source Social Network Analysis and Geographic Information Systems Applications

    Science.gov (United States)

    Sabah, L.; Şimşek, M.

    2017-11-01

    Social networks are the real social experience of individuals in the online environment. In this environment, people use symbolic gestures and mimics, sharing thoughts and content. Social network analysis is the visualization of complex and large quantities of data to ensure that the overall picture appears. It is the understanding, development, quantitative and qualitative analysis of the relations in the social networks of Graph theory. Social networks are expressed in the form of nodes and edges. Nodes are people/organizations, and edges are relationships between nodes. Relations are directional, non-directional, weighted, and weightless. The purpose of this study is to examine the effects of social networks on the evaluation of person data with spatial coordinates. For this, the cluster size and the effect on the geographical area of the circle where the placements of the individual are influenced by the frequently used placeholder feature in the social networks have been studied.

  14. A Microfluidic Pore Network Approach to Investigate Water Transport in Fuel Cell Porous Transport Layers

    OpenAIRE

    Bazylak, A.; Berejnov, V.; Markicevic, B.; Sinton, D.; Djilali, N.

    2008-01-01

    Pore network modelling has traditionally been used to study displacement processes in idealized porous media related to geological flows, with applications ranging from groundwater hydrology to enhanced oil recovery. Very recently, pore network modelling has been applied to model the gas diffusion layer (GDL) of a polymer electrolyte membrane (PEM) fuel cell. Discrete pore network models have the potential to elucidate transport phenomena in the GDL with high computational efficiency, in cont...

  15. Physical Layer Authentication Enhancement Using Maximum SNR Ratio Based Cooperative AF Relaying

    Directory of Open Access Journals (Sweden)

    Jiazi Liu

    2017-01-01

    Full Text Available Physical layer authentication techniques developed in conventional macrocell wireless networks face challenges when applied in the future fifth-generation (5G wireless communications, due to the deployment of dense small cells in a hierarchical network architecture. In this paper, we propose a novel physical layer authentication scheme by exploiting the advantages of amplify-and-forward (AF cooperative relaying, which can increase the coverage and convergence of the heterogeneous networks. The essence of the proposed scheme is to select the best relay among multiple AF relays for cooperation between legitimate transmitter and intended receiver in the presence of a spoofer. To achieve this goal, two best relay selection schemes are developed by maximizing the signal-to-noise ratio (SNR of the legitimate link to the spoofing link at the destination and relays, respectively. In the sequel, we derive closed-form expressions for the outage probabilities of the effective SNR ratios at the destination. With the help of the best relay, a new test statistic is developed for making an authentication decision, based on normalized channel difference between adjacent end-to-end channel estimates at the destination. The performance of the proposed authentication scheme is compared with that in a direct transmission in terms of outage and spoofing detection.

  16. Authentic Material and Automaticity for Teaching English

    OpenAIRE

    Widyastuti, Widyastuti

    2017-01-01

    This article discusses how to make students of Science Education in first year feel interesting in English lesson, understanding the text well and can communicate English fluency. It has been suggested that Authentic Material and Automaticity Theory not only creates a friendly and fun condition in teaching reading but helps students to study comprehensibly so they are able to understand the text, structure, vocabulary easily, read fluently and they also can communicate in English. The authent...

  17. Authentic Leadership: Practices to Promote Integrity.

    Science.gov (United States)

    Hughes, Vickie

    Integrity is a highly desired leadership trait. Authentic leaders reflect on their behavior and seek feedback about how their actions affect others. How can a nurse develop as an authentic leader who consistently demonstrates integrity? The following are discussed: Reflection; Connection to Christ and others; Social and Emotional Intelligence providing perceptive competency and social awareness; Aesthetic Qualities whereby leaders apply experiential knowing in leadership situations; and effective expression of Gratitude as a meaningful act of valuing others.

  18. The investigation of social networks based on multi-component random graphs

    Science.gov (United States)

    Zadorozhnyi, V. N.; Yudin, E. B.

    2018-01-01

    The methods of non-homogeneous random graphs calibration are developed for social networks simulation. The graphs are calibrated by the degree distributions of the vertices and the edges. The mathematical foundation of the methods is formed by the theory of random graphs with the nonlinear preferential attachment rule and the theory of Erdôs-Rényi random graphs. In fact, well-calibrated network graph models and computer experiments with these models would help developers (owners) of the networks to predict their development correctly and to choose effective strategies for controlling network projects.

  19. Investigating meta-approaches for reconstructing gene networks in a mammalian cellular context.

    Directory of Open Access Journals (Sweden)

    Azree Nazri

    Full Text Available The output of state-of-the-art reverse-engineering methods for biological networks is often based on the fitting of a mathematical model to the data. Typically, different datasets do not give single consistent network predictions but rather an ensemble of inconsistent networks inferred under the same reverse-engineering method that are only consistent with the specific experimentally measured data. Here, we focus on an alternative approach for combining the information contained within such an ensemble of inconsistent gene networks called meta-analysis, to make more accurate predictions and to estimate the reliability of these predictions. We review two existing meta-analysis approaches; the Fisher transformation combined coefficient test (FTCCT and Fisher's inverse combined probability test (FICPT; and compare their performance with five well-known methods, ARACNe, Context Likelihood or Relatedness network (CLR, Maximum Relevance Minimum Redundancy (MRNET, Relevance Network (RN and Bayesian Network (BN. We conducted in-depth numerical ensemble simulations and demonstrated for biological expression data that the meta-analysis approaches consistently outperformed the best gene regulatory network inference (GRNI methods in the literature. Furthermore, the meta-analysis approaches have a low computational complexity. We conclude that the meta-analysis approaches are a powerful tool for integrating different datasets to give more accurate and reliable predictions for biological networks.

  20. Authenticated join processing in outsourced databases

    KAUST Repository

    Yang, Yin

    2009-01-01

    Database outsourcing requires that a query server constructs a proof of result correctness, which can be verified by the client using the data owner\\'s signature. Previous authentication techniques deal with range queries on a single relation using an authenticated data structure (ADS). On the other hand, authenticated join processing is inherently more complex than ranges since only the base relations (but not their combination) are signed by the owner. In this paper, we present three novel join algorithms depending on the ADS availability: (i) Authenticated Indexed Sort Merge Join (AISM), which utilizes a single ADS on the join attribute, (ii) Authenticated Index Merge Join (AIM) that requires an ADS (on the join attribute) for both relations, and (iii) Authenticated Sort Merge Join (ASM), which does not rely on any ADS. We experimentally demonstrate that the proposed methods outperform two benchmark algorithms, often by several orders of magnitude, on all performance metrics, and effectively shift the workload to the outsourcing service. Finally, we extend our techniques to complex queries that combine multi-way joins with selections and projections. ©2009 ACM.

  1. Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

    Directory of Open Access Journals (Sweden)

    Sang-Soo Yeo

    2014-01-01

    Full Text Available This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.

  2. Optimized Node Deployment Algorithm and Parameter Investigation in a Mobile Sensor Network for Robotic Systems

    Directory of Open Access Journals (Sweden)

    Rongxin Tang

    2015-10-01

    Full Text Available Mobile sensor networks are an important part of modern robotics systems and are widely used in robotics applications. Therefore, sensor deployment is a key issue in current robotics systems research. Since it is one of the most popular deployment methods, in recent years the virtual force algorithm has been studied in detail by many scientists. In this paper, we focus on the virtual force algorithm and present a corresponding parameter investigation for mobile sensor deployment. We introduce an optimized virtual force algorithm based on the exchange force, in which a new shielding rule grounded in Delaunay triangulation is adopted. The algorithm employs a new performance metric called ‘pair-correlation diversion', designed to evaluate the uniformity and topology of the sensor distribution. We also discuss the implementation of the algorithm's computation and analyse the influence of experimental parameters on the algorithm. Our results indicate that the area ratio, φs, and the exchange force constant, G, influence the final performance of the sensor deployment in terms of the coverage rate, the convergence time and topology uniformity. Using simulations, we were able to verify the effectiveness of our algorithm and we obtained an optimal region for the (φs, G-parameter space which, in the future, could be utilized as an aid for experiments in robotic sensor deployment.

  3. Investigating the differential effects of social networking site addiction and Internet gaming disorder on psychological health.

    Science.gov (United States)

    Pontes, Halley M

    2017-12-01

    Background and aims Previous studies focused on examining the interrelationships between social networking site (SNS) addiction and Internet gaming disorder (IGD) in isolation. Moreover, little is known about the potential simultaneous differential effects of SNS addiction and IGD on psychological health. This study investigated the interplay between these two technological addictions and ascertained how they can uniquely and distinctively contribute to increasing psychiatric distress when accounting for potential effects stemming from sociodemographic and technology-related variables. Methods A sample of 509 adolescents (53.5% males) aged 10-18 years (mean = 13.02, SD = 1.64) were recruited. Results It was found that key demographic variables can play a distinct role in explaining SNS addiction and IGD. Furthermore, it was found that SNS addiction and IGD can augment the symptoms of each other, and simultaneously contribute to deterioration of overall psychological health in a similar fashion, further highlighting potentially common etiological and clinical course between these two phenomena. Finally, the detrimental effects of IGD on psychological health were found to be slightly more pronounced than those produced by SNS addiction, a finding that warrants additional scientific scrutiny. Discussion and conclusion The implications of these results are further discussed in light of the existing evidence and debates regarding the status of technological addictions as primary and secondary disorders.

  4. Root cause investigation of deviations in protein chromatography based on mechanistic models and artificial neural networks.

    Science.gov (United States)

    Wang, Gang; Briskot, Till; Hahn, Tobias; Baumann, Pascal; Hubbuch, Jürgen

    2017-09-15

    In protein chromatography, process variations, such as aging of column or process errors, can result in deviations of the product and impurity levels. Consequently, the process performance described by purity, yield, or production rate may decrease. Based on visual inspection of the UV signal, it is hard to identify the source of the error and almost unfeasible to determine the quantity of deviation. The problem becomes even more pronounced, if multiple root causes of the deviation are interconnected and lead to an observable deviation. In the presented work, a novel method based on the combination of mechanistic chromatography models and the artificial neural networks is suggested to solve this problem. In a case study using a model protein mixture, the determination of deviations in column capacity and elution gradient length was shown. Maximal errors of 1.5% and 4.90% for the prediction of deviation in column capacity and elution gradient length respectively demonstrated the capability of this method for root cause investigation. Copyright © 2017 The Author(s). Published by Elsevier B.V. All rights reserved.

  5. A geophone wireless sensor network for investigating glacier stick-slip motion

    Science.gov (United States)

    Martinez, Kirk; Hart, Jane K.; Basford, Philip J.; Bragg, Graeme M.; Ward, Tyler; Young, David S.

    2017-08-01

    We have developed an innovative passive borehole geophone system, as part of a wireless environmental sensor network to investigate glacier stick-slip motion. The new geophone nodes use an ARM Cortex-M3 processor with a low power design capable of running on battery power while embedded in the ice. Only data from seismic events was stored, held temporarily on a micro-SD card until they were retrieved by systems on the glacier surface which are connected to the internet. The sampling rates, detection and filtering levels were determined from a field trial using a standard commercial passive seismic system. The new system was installed on the Skalafellsjökull glacier in Iceland and provided encouraging results. The results showed that there was a relationship between surface melt water production and seismic event (ice quakes), and these occurred on a pattern related to the glacier surface melt-water controlled velocity changes (stick-slip motion). Three types of seismic events were identified, which were interpreted to reflect a pattern of till deformation (Type A), basal sliding (Type B) and hydraulic transience (Type C) associated with stick-slip motion.

  6. Investigating Nonlinear Shoreline Multiperiod Change from Orthophoto Map Information by Using a Neural Network Model

    Directory of Open Access Journals (Sweden)

    Tienfuan Kerh

    2014-01-01

    Full Text Available The effects of extreme weather and overdevelopment may cause some coastal areas to exhibit erosion problems, which in turn may contribute to creating disasters of varying scale, particularly in regions comprising islands. This study used aerial survey information from three periods (1990, 2001, and 2010 and used graphical software to establish the spatial data of six beaches surrounding the island of Taiwan. An overlaying technique was then implemented to compare the sandy area of each beach in the aforementioned study periods. In addition, an artificial neural network model was developed based on available digitised coordinates for predicting coastline variation for 2015 and 2020. An onsite investigation was performed using a global positioning system for comparing the beaches. The results revealed that two beaches from this study may have experienced significant changes in total sandy areas under a statistical 95% confidence interval. The proposed method and the result of this study may provide a valuable reference in follow-up research and applications.

  7. Which stocks are profitable? A network method to investigate the effects of network structure on stock returns

    Science.gov (United States)

    Chen, Kun; Luo, Peng; Sun, Bianxia; Wang, Huaiqing

    2015-10-01

    According to asset pricing theory, a stock's expected returns are determined by its exposure to systematic risk. In this paper, we propose a new method for analyzing the interaction effects among industries and stocks on stock returns. We construct a complex network based on correlations of abnormal stock returns and use centrality and modularity, two popular measures in social science, to determine the effect of interconnections on industry and stock returns. Supported by previous studies, our findings indicate that a relationship exists between inter-industry closeness and industry returns and between stock centrality and stock returns. The theoretical and practical contributions of these findings are discussed.

  8. A robust and novel dynamic-ID-based authentication scheme for care team collaboration with smart cards.

    Science.gov (United States)

    Chang, Ya-Fen; Chen, Chia-Chen; Chang, Pei-Yu

    2013-04-01

    Nowadays, users/patients may gain desired medical services on-line because of the rapid development of computer network technologies. Conventional healthcare services are provided by a single server. However, care team collaboration by integrating services is the key to improve financial and clinical performance. How a user/patient accesses desired medical services provided by multiple servers becomes a challenge to realize care team collaboration. User authentication plays an important role to protect resources or services from being accessed by unauthorized users. In this paper, we first discuss the perceived security drawbacks of pervasive smart-card-based remote user authentication schemes. Then, we propose a novel dynamic-ID-based user authentication scheme based on elliptic curve cryptosystem (ECC) for multi-server environment with smart cards. The proposed scheme ensures user anonymity and computational efficiency and complies with essential requirements of a secure smart-card-based authentication scheme for multi-server environment to enable care team collaboration.

  9. Social Networks in the Tourism Industry: An Investigation of Charleston, South Carolina

    Science.gov (United States)

    Ying, Tianyu

    2010-01-01

    Over the last decade, increasing attention has been given to the networking in the tourism industry (Lynch, 2000; Pavlovich, 2003). The existing literature mainly focuses on the interrelationships among tourism stakeholders at sector level and the structure of the interorganizational networks in tourism industry. However, little research has been…

  10. Investigation of Social Studies Teachers' Intended Uses of Social Networks in Terms of Various Variables

    Science.gov (United States)

    Akgün, Ismail Hakan

    2016-01-01

    The aim of this research is to determine Social Studies teacher candidates' intended uses of social networks in terms of various variables. The research was carried out by using screening model of quantitative research methods. In the study, "The Social Network Intended Use Scale" was used as a data collection tool. As a result of the…

  11. An investigation into the functional and structural connectivity of the Default Mode Network

    NARCIS (Netherlands)

    van Oort, E.S.B.; van Cappellen van Walsum, Anne-Marie; Norris, David Gordon

    2014-01-01

    Connectivity analyses based on both resting-state (rs-)fMRI and diffusion weighted imaging studies suggest that the human brain contains regions that act as hubs for the entire brain, and that elements of the Default Mode Network (DMN) play a pivotal role in this network. In the present study, the

  12. Efficient Delivery of Investigational Antibacterial Agents via Sustainable Clinical Trial Networks

    NARCIS (Netherlands)

    McDonnell, Anthony; Rex, John H; Goossens, Herman; Bonten, Marc; Fowler, Vance G; Dane, Aaron

    2016-01-01

    The economics of antibiotics can be improved by infectious diseases-specific clinical trial networks. While developers would still need to implement an independent phase 1 program as well as studies focused on highly resistant pathogens, standardized procedures in a network focused on usual drug

  13. Investigating And Evaluating Of Network Failures And Performance Over Distributed WAN In Application Protocol Layer

    Directory of Open Access Journals (Sweden)

    Enoch Okoh Kofi

    2015-08-01

    Full Text Available The Experiment was done to find out network failures and application performance relationship over distributed Wide Area Net WAN. In order to access related application over the cloud there must be an internet connectivity which will help the respective workstations to access the remote server for applications being deployed over the network. Bandwidth improvement helps in reducing utilization over the network and it also helps in improving Application Efficiency of these Applications in terms of Response Time. Routers were configured under Enhance Interior Gateway Routing Protocol EIGRP to reduce utilization and to ensure load sharing over the network. Three scenarios were modeled and their performance efficiency was evaluated. A modeled computer Network with and without a fail Router under different scenarios and such Network was simulated with emphasis on the Application Performance. The Experiment was done for fifty workstations under three scenarios and these three scenarios were accessed and evaluated on experimental basis using Riverbed modeler to show the Effect of Application Network performance. The performance results show that increasing the bandwidth reduces utilization and also with the failure of one communication bandwidth users can still access Network Application with a minimal cost.

  14. Long-term verifiability of the electronic healthcare records' authenticity.

    Science.gov (United States)

    Lekkas, Dimitrios; Gritzalis, Dimitris

    2007-01-01

    To investigate whether the long-term preservation of the authenticity of electronic healthcare records (EHR) is possible. To propose a mechanism that enables the secure validation of an EHR for long periods, far beyond the lifespan of a digital signature and at least as long as the lifetime of a patient. The study is based on the fact that although the attributes of data authenticity, i.e. integrity and origin verifiability, can be preserved by digital signatures, the necessary period for the retention of EHRs is far beyond the lifespan of a simple digital signature. It is identified that the lifespan of signed data is restricted by the validity period of the relevant keys and the digital certificates, by the future unavailability of signature-verification data, and by suppression of trust relationships. In this paper, the notarization paradigm is exploited, and a mechanism for cumulative notarization of signed EHR is proposed. The proposed mechanism implements a successive trust transition towards new entities, modern technologies, and refreshed data, eliminating any dependency of the relying party on ceased entities, obsolete data, or weak old technologies. The mechanism also exhibits strength against various threat scenarios. A future relying party will have to trust only the fresh technology and information provided by the last notary, in order to verify the authenticity of an old signed EHR. A Cumulatively Notarized Signature is strong even in the case of the compromise of a notary in the chain.

  15. On the authenticity of individual dynamic binaural synthesis.

    Science.gov (United States)

    Brinkmann, Fabian; Lindau, Alexander; Weinzierl, Stefan

    2017-10-01

    A simulation that is perceptually indistinguishable from the corresponding real sound field could be termed authentic. Using binaural technology, such a simulation would theoretically be achieved by reconstructing the sound pressure at a listener's ears. However, inevitable errors in the measurement, rendering, and reproduction introduce audible degradations, as it has been demonstrated in previous studies for anechoic environments and static binaural simulations (fixed head orientation). The current study investigated the authenticity of individual dynamic binaural simulations for three different acoustic environments (anechoic, dry, wet) using a highly sensitive listening test design. The results show that about half of the participants failed to reliably detect any differences for a speech stimulus, whereas all participants were able to do so for pulsed pink noise. Higher detection rates were observed in the anechoic condition, compared to the reverberant spaces, while the source position had no significant effect. It is concluded that the authenticity mainly depends on how comprehensive the spectral cues are provided by the audio content, and the amount of reverberation, whereas the source position plays a minor role. This is confirmed by a broad qualitative evaluation, suggesting that remaining differences mainly affect the tone color rather than the spatial, temporal or dynamical qualities.

  16. The Effect of Using Authentic Task on Teaching Adjectives

    Directory of Open Access Journals (Sweden)

    Shadi Rastegaran

    2016-04-01

    Full Text Available In this study the researcher tried to investigate whether tasks have any effect on adjective learning or not. To achieve this purpose, the following research question was set forth by the researcher: “Does using authentic task have significant effect on adjective learning?” A proficiency test was administered to minimize the individual difference among learners and to make certain the homogeneity of them. Then, before starting the treatment, a vocabulary test was given to the learners to see if the knowledge of vocabulary items already exists among participants or not. After the test, the known words even by one learner were omitted from the whole study. Subsequently, each group received an especial kind of treatment for 12 sessions. At the end, a multiple choice vocabulary post-test similar to the pre-test was administered.  To analyze the findings of the study, SPSS (Statistical Package for social science was utilized and the obtained results indicated that using authentic tasks contributed to the enhancement of adjective learning. Keywords: Authentic task, task, activity, adjective, words

  17. Demystifying Authentication Concepts in Smartphones: Ways and Types to Secure Access

    Directory of Open Access Journals (Sweden)

    Sandeep Gupta

    2018-01-01

    Full Text Available Smartphones are the most popular and widespread personal devices. Apart from their conventional use, that is, calling and texting, they have also been used to perform multiple security sensitive activities, such as online banking and shopping, social networking, taking pictures, and e-mailing. On a positive side, smartphones have improved the quality of life by providing multiple services that users desire, for example, anytime-anywhere computing. However, on the other side, they also pose security and privacy threats to the users’ stored data. User authentication is the first line of defense to prevent unauthorized access to the smartphone. Several authentication schemes have been proposed over the years; however, their presentation might be perplexing to the new researchers to this domain, under the shade of several buzzwords, for example, active, continuous, implicit, static, and transparent, being introduced in academic papers without comprehensive description. Moreover, most of the reported authentication solutions were evaluated mainly in terms of accuracy, overlooking a very important aspect—the usability. This paper surveys various types and ways of authentication, designed and developed primarily to secure the access to smartphones and attempts to clarify correlated buzzwords, with the motivation to assist new researchers in understanding the gist behind those concepts. We also present the assessment of existing user authentication schemes exhibiting their security and usability issues.

  18. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’

    Directory of Open Access Journals (Sweden)

    Muhammad Khurram Khan

    2010-03-01

    Full Text Available User authentication in wireless sensor networks (WSN is a critical security issue due to their unattended and hostile deployment in the field. Since sensor nodes are equipped with limited computing power, storage, and communication modules; authenticating remote users in such resource-constrained environments is a paramount security concern. Recently, M.L. Das proposed a two-factor user authentication scheme in WSNs and claimed that his scheme is secure against different kinds of attack. However, in this paper, we show that the M.L. Das-scheme has some critical security pitfalls and cannot be recommended for real applications. We point out that in his scheme: users cannot change/update their passwords, it does not provide mutual authentication between gateway node and sensor node, and is vulnerable to gateway node bypassing attack and privileged-insider attack. To overcome the inherent security weaknesses of the M.L. Das-scheme, we propose improvements and security patches that attempt to fix the susceptibilities of his scheme. The proposed security improvements can be incorporated in the M.L. Das-scheme for achieving a more secure and robust two-factor user authentication in WSNs.

  19. Multi-factor challenge/response approach for remote biometric authentication

    Science.gov (United States)

    Al-Assam, Hisham; Jassim, Sabah A.

    2011-06-01

    Although biometric authentication is perceived to be more reliable than traditional authentication schemes, it becomes vulnerable to many attacks when it comes to remote authentication over open networks and raises serious privacy concerns. This paper proposes a biometric-based challenge-response approach to be used for remote authentication between two parties A and B over open networks. In the proposed approach, a remote authenticator system B (e.g. a bank) challenges its client A who wants to authenticate his/her self to the system by sending a one-time public random challenge. The client A responds by employing the random challenge along with secret information obtained from a password and a token to produce a one-time cancellable representation of his freshly captured biometric sample. The one-time biometric representation, which is based on multi-factor, is then sent back to B for matching. Here, we argue that eavesdropping of the one-time random challenge and/or the resulting one-time biometric representation does not compromise the security of the system, and no information about the original biometric data is leaked. In addition to securing biometric templates, the proposed protocol offers a practical solution for the replay attack on biometric systems. Moreover, we propose a new scheme for generating a password-based pseudo random numbers/permutation to be used as a building block in the proposed approach. The proposed scheme is also designed to provide protection against repudiation. We illustrate the viability and effectiveness of the proposed approach by experimental results based on two biometric modalities: fingerprint and face biometrics.

  20. Investigating solvability and complexity of linear active networks by means of matroids

    DEFF Research Database (Denmark)

    Petersen, Bjørn

    1979-01-01

    The solvability and complexity problems of finear active network are approached from a purely combinatorial point of view, using the concepts of matroid theory. Since the method is purely combinatorial, we take into account the network topology alone. Under this assumption necessary and sufficient...... conditions are given for the unique solvablity of linear active networks. The complexity and the number of dc-eigenfrequencies are also given. The method enables.you to decide if degeneracies are due to the topology alone, or if they are caused by special relations among network parameter values....... If the network parameter values are taken into account, the complexity and number of dc-eigenfrequencies given by the method, are only upper and lower bounds, respectively. The above conditions are fairly easily checked, and the complexity and number of dc-elgenfrequencies are found, using polynomially bounded...