Yazar "Mansoor, Khwaja" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System(Institute of Electrical and Electronics Engineers Inc., 2021) Khan, Muhammad Ayaz; Ghani, Anwar; Obaidat, Mohammad S.; Vijayakumar, Pandi; Mansoor, Khwaja; Chaudhry, Shehzad AshrafAs digital content transmission through the internet is convenient and quick, so the outspread of digital content is very high. However, along with this incredible speed and ease, current communication technologies and computers have also brought with them plenty of digital rights management complications. Digital Rights Management Systems are designed to limit the access to the utilization, alternation, and distribution of persevered digital content. This article scrutinized two recent schemes of Lee et al. and Yu et al. and it is found that these schemes are suspected to an insider attack, stolen smart-card attack, Daniel of services (Dos) attack, and impersonation attack. Furthermore, their proposal also suffers from incorrect issues. To fix these flaws, a robust anonymous authentication scheme using biometrics for Digital Rights Management System is proposed in this article. The proposed scheme is checked for correctness and its security is proved through BAN logic. The performance of the scheme is also analyzed using computation time and communication time. The results show that the designed scheme is highly secure with the same computation and communication cost as the existing protocols. © 2021 IEEE.Öğe Securing IoT-Based RFID Systems: A Robust Authentication Protocol Using Symmetric Cryptography(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2019) Mansoor, Khwaja; Ghani, Anwar; Chaudhry, Shehzad Ashraf; Shamshirband, Shahaboddin; Ghayyur, Shahbaz Ahmed Khan; Mosavi, AmirDespite the many conveniences of Radio Frequency Identification (RFID) systems, the underlying open architecture for communication between the RFID devices may lead to various security threats. Recently, many solutions were proposed to secure RFID systems and many such systems are based on only lightweight primitives, including symmetric encryption, hash functions, and exclusive OR operation. Many solutions based on only lightweight primitives were proved insecure, whereas, due to resource-constrained nature of RFID devices, the public key-based cryptographic solutions are unenviable for RFID systems. Very recently, Gope and Hwang proposed an authentication protocol for RFID systems based on only lightweight primitives and claimed their protocol can withstand all known attacks. However, as per the analysis in this article, their protocol is infeasible and is vulnerable to collision, denial-of-service (DoS), and stolen verifier attacks. This article then presents an improved realistic and lightweight authentication protocol to ensure protection against known attacks. The security of the proposed protocol is formally analyzed using Burrows Abadi-Needham (BAN) logic and under the attack model of automated security verification tool ProVerif. Moreover, the security features are also well analyzed, although informally. The proposed protocol outperforms the competing protocols in terms of security.Öğe Security and Key Management in IoT Based Wireless Sensor Networks: An Authentication Protocol Using Symmetric Key(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019) Ghani, Anwar; Mansoor, Khwaja; Mehmood, Shahid; Chaudhry, Shehzad Ashraf; Rahman, Arif Ur; Saqib, Malik NajmusWireless sensor networks (WSN) consist of hundreds of miniature sensor nodes to sense various events in the surrounding environment and report back to the base station. Sensor networks are at the base of internet of things (IoT) and smart computing applications where a function is performed as a result of sensed event or information. However, in resource-limited WSN authenticating a remote user is a vital security concern. Recently, researchers put forth various authentication protocols to address different security issues. Gope et al presented a protocol claiming resistance against known attacks. A thorough analysis of their protocol shows that it is vulnerable to user traceability, stolen verifier, and denial of service (DoS) attacks. In this article, an enhanced symmetric key-based authentication protocol for IoT-based WSN has been presented. The proposed protocol has the ability to counter user traceability, stolen verifier, and DoS attacks. Furthermore, the proposed protocol has been simulated and verified using Proverif and BAN logic. The proposed protocol has the same communication cost as the baseline protocol; however, in computation cost, it has 52.63% efficiency as compared with the baseline protocol.