22,997 research outputs found
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
With the recent proliferation of distributed systems and networking, remote
authentication has become a crucial task in many networking applications.
Various schemes have been proposed so far for the two-party remote
authentication; however, some of them have been proved to be insecure. In this
paper, we propose an efficient timestamp-based password authentication scheme
using smart cards. We show various types of forgery attacks against a
previously proposed timestamp-based password authentication scheme and improve
that scheme to ensure robust security for the remote authentication process,
keeping all the advantages that were present in that scheme. Our scheme
successfully defends the attacks that could be launched against other related
previous schemes. We present a detailed cryptanalysis of previously proposed
Shen et. al scheme and an analysis of the improved scheme to show its
improvements and efficiency.Comment: 6 page
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password
authentication scheme in an attempt to overcome the flaws of Yang-Shieh_s
legendary timestamp-based remote authentication scheme using smart cards. After
analyzing the improved scheme proposed by Yang-Wang-Chang, we have found that
their scheme is still insecure and vulnerable to four types of forgery attacks.
Hence, in this paper, we prove that, their claim that their scheme is
intractable is incorrect. Also, we show that even an attack based on Sun et
al._s attack could be launched against their scheme which they claimed to
resolve with their proposal.Comment: 3 Page
Developing an Efficient DMCIS with Next-Generation Wireless Networks
The impact of extreme events across the globe is extraordinary which
continues to handicap the advancement of the struggling developing societies
and threatens most of the industrialized countries in the globe. Various fields
of Information and Communication Technology have widely been used for efficient
disaster management; but only to a limited extent though, there is a tremendous
potential for increasing efficiency and effectiveness in coping with disasters
with the utilization of emerging wireless network technologies. Early warning,
response to the particular situation and proper recovery are among the main
focuses of an efficient disaster management system today. Considering these
aspects, in this paper we propose a framework for developing an efficient
Disaster Management Communications and Information System (DMCIS) which is
basically benefited by the exploitation of the emerging wireless network
technologies combined with other networking and data processing technologies.Comment: 6 page
A Secure Lightweight Approach of Node Membership Verification in Dense HDSN
In this paper, we consider a particular type of deployment scenario of a
distributed sensor network (DSN), where sensors of different types and
categories are densely deployed in the same target area. In this network, the
sensors are associated with different groups, based on their functional types
and after deployment they collaborate with one another in the same group for
doing any assigned task for that particular group. We term this sort of DSN as
a heterogeneous distributed sensor network (HDSN). Considering this scenario,
we propose a secure membership verification mechanism using one-way accumulator
(OWA) which ensures that, before collaborating for a particular task, any pair
of nodes in the same deployment group can verify each other-s legitimacy of
membership. Our scheme also supports addition and deletion of members (nodes)
in a particular group in the HDSN. Our analysis shows that, the proposed scheme
could work well in conjunction with other security mechanisms for sensor
networks and is very effective to resist any adversary-s attempt to be included
in a legitimate group in the network.Comment: 6 page
Smartening the Environment using Wireless Sensor Networks in a Developing Country
The miniaturization process of various sensing devices has become a reality
by enormous research and advancements accomplished in Micro Electro-Mechanical
Systems (MEMS) and Very Large Scale Integration (VLSI) lithography. Regardless
of such extensive efforts in optimizing the hardware, algorithm, and protocols
for networking, there still remains a lot of scope to explore how these
innovations can all be tied together to design Wireless Sensor Networks (WSN)
for smartening the surrounding environment for some practical purposes. In this
paper we explore the prospects of wireless sensor networks and propose a design
level framework for developing a smart environment using WSNs, which could be
beneficial for a developing country like Bangladesh. In connection to this, we
also discuss the major aspects of wireless sensor networks.Comment: 5 page
Protocol for direct counterfactual quantum communication
It has long been assumed in physics that for information to travel between
two parties in empty space, "Alice" and "Bob", physical particles have to
travel between them. Here, using the "chained" quantum Zeno effect, we show
how, in the ideal asymptotic limit, information can be transferred between
Alice and Bob without any physical particles traveling between them
- …
