Computer Networks and Distributed Systems
Behzad Seif; mohammad goodarzi
Volume 7, Issue 2 , May 2021, , Pages 93-102
Abstract
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of ...
Read More
Today, the use of wireless sensor networks has become very popular in many applications. Due to the connection in wireless sensor networks, it is done wirelessly, so they are naturally insecure and prone to various types of attacks. In the past, various solutions were offered in this regard, each of which had its problems. Therefore, in this proposed solution, an attempt was made to solve these problems. The proposed solution for securing sensor nodes uses authentication based on the ZKP protocol, which has been improved with Interlock, and game theory has also been used to more quickly identify intrusive nodes. One of the most important benefits of the proposed solution is to prevent attacks such as sleep deprivation. The proposed algorithm is able to detect quickly and is able to prevent network damage in the fastest possible time. The proposed solution was implemented and reviewed in MATLAB environment and the studies showed a very good performance of the proposed method.
Computer Networks and Distributed Systems
Olayemi Mikail Olaniyi; Ameh Innocent Ameh; Lukman Adewale Ajao; Omolara Ramota Lawal
Volume 5, Issue 2 , May 2019, , Pages 107-116
Abstract
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s ...
Read More
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card cloning, card skimming, cost of issuance and maintenance. In this paper, we present secure bio-cryptographic authentication system for cardless ATM using enhanced fingerprint biometrics trait and encrypted Personal Identification Number (PIN). Fingerprint biometrics is used to provide automatic identification/verification of a legitimate customer based on unique feature possessed by the customer. Log-Gabor filtering algorithm was used for enhancing low image quality and effect of noise on feature extracted from customer’s fingerprint minutiae. Truncated SHA 512/256 hash algorithm was used to secure the integrity and confidentiality of the PIN from sniffers and possible adversary within the channel of remote ATM banking transactions. Performance evaluation was carried out using False Acceptance Rate (FAR), False Rejection Rate (FRR) metrics and Collision Attack was performed on the Truncated SHA-512/256 hashed data (PIN). Results of the system performance shows Genuine Acceptance Rate (1-FRR) of 97.5% to 100%, Equal Error Rate of 0.0015% and Collision Attack carried out on the encrypted PIN message digest gave an unsuccessful attack. Therefore, the results of performance evaluation show the applicability of the developed system for secure cardless ATM transaction