4.5 Article

Advanced formal authentication protocol using smart cards for network applicants

Journal

COMPUTERS & ELECTRICAL ENGINEERING
Volume 66, Issue -, Pages 50-63

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.compeleceng.2017.12.045

Keywords

Attack; Authentication; Key agreement; Remote user; Security

Ask authors/readers for more resources

The rapid growth of internet technologies has provided various functions that allow easy remote user or customer access to its many systems. However, the responsibility of the system does not end after providing access to such remote users. The framework must consummate a precise level of security, because otherwise, an adversary may be able to disrupt the system or use its resources without authorization. This affects the system and its clients directly or obliquely, and to restrict access, an authentication scheme must be implemented. Recently, Nikooghadam et al. proposed an authentication and key agreement protocol and illustrated how it would be secure against various types of security attacks. In this study, we show that their proposed system is susceptible to insider, replay, and password-guessing attacks. We propose a more secure authentication system that can withstand discrete attacks, and measure the total execution time to determine what realistic implementation is needed to carry out an entire scheme. (C) 2017 Elsevier Ltd. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

Article Telecommunications

LAKA: Lightweight Authentication and Key Agreement Protocol for Internet of Things Based Wireless Body Area Network

Mukesh Soni, Dileep Kumar Singh

Summary: The concept of wireless body area network in the medical field is crucial for exchanging health data efficiently. A proposed secure and lightweight health authentication and key agreement protocol reduces security risks and communication overhead in WBAN communications.

WIRELESS PERSONAL COMMUNICATIONS (2022)

Article Computer Science, Information Systems

Internet of Things-Based Data Hiding Scheme for Wireless Communication

A. Shobanadevi, G. Maragathm, Syam Machinathu Parambil Gangadharan, Mukesh Soni, Rohit Kumar, Tien Anh Tran, Bhupesh Kumar Singh

Summary: The rise of information technology has made it easier to access digital information and the internet of things. However, these methods also pose a risk to privacy. A recent study proposes a composite reversible data hiding approach that aims to protect digital materials from illicit use and distribution while maintaining a high level of image quality. The suggested approach achieves this goal by merging the cover image with encrypted confidential data, resulting in a high rate of peak signal-to-noise ratio (PSNR).

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Article Engineering, Multidisciplinary

Network mining techniques to analyze the risk of the occupational accident via bayesian network

Nihar Ranjan Nayak, Sumit Kumar, Deepak Gupta, Ashish Suri, Mohd Naved, Mukesh Soni

Summary: This study identifies risk factors for occupational accidents and examines their impacts using Bayesian networks. The experimental findings show that machine learning methods can accurately predict certain occupational accident situations.

INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT (2022)

Article Health Care Sciences & Services

Detection of Emotion of Speech for RAVDESS Audio Using Hybrid Convolution Neural Network

Tanvi Puri, Mukesh Soni, Gaurav Dhiman, Osamah Ibrahim Khalaf, Malik Alazzam, Ihtiram Raza Khan

Summary: Emotion recognition plays a crucial role in human interaction, and through the use of intelligent systems and convolutional neural networks, we can classify and identify consumer emotions more accurately, categorizing them into different classes.

JOURNAL OF HEALTHCARE ENGINEERING (2022)

Article Mathematical & Computational Biology

Light Weighted Healthcare CNN Model to Detect Prostate Cancer on Multiparametric MRI

Mukesh Soni, Ihtiram Raza Khan, K. Suresh Babu, Syed Nasrullah, Abhishek Madduri, Saima Ahmed Rahin

Summary: The SEMRCNN model is proposed for autonomously extracting prostate cancer locations from MP-MRI. It achieves fine segmentation by utilizing feature maps and integrating information from different types of images. The model outperforms other segmentation models in prostate cancer MP-MRI.

COMPUTATIONAL INTELLIGENCE AND NEUROSCIENCE (2022)

Article Computer Science, Artificial Intelligence

Hybridizing Convolutional Neural Network for Classification of Lung Diseases

Mukesh Soni, S. Gomathi, Pankaj Kumar, Prathamesh P. Churi, Mazin Abed Mohammed, Akbal Omran Salman

Summary: Pulmonary disease is widespread globally, and timely diagnosis is crucial. To improve accuracy, a new hybrid deep learning architecture called STNCNN was developed. Tested on the dataset from NIH chest x-ray images, STNCNN achieved an accuracy of 69%, outperforming other methods. The proposed system simplifies the work of specialists and physicians, enhancing the efficiency of lung disease diagnosis.

INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH (2022)

Article Computer Science, Artificial Intelligence

New directions for security attacks, privacy, and malware detection in WBAN

Mukesh Soni, Dileep Kumar Singh

Summary: Wireless body area network (WBAN) is an important platform for transferring health data from the human body to a database. This study focuses on the security aspects of WBAN, including user verification, data correctness, and information secrecy. The researchers discuss various existing data transmission schemes and evaluate their strengths and weaknesses. They also describe essential security properties for WBAN communication, explain security attacks during message transmission, and propose countermeasures. This comprehensive study aids researchers in developing secure WBAN data transfer techniques.

EVOLUTIONARY INTELLIGENCE (2023)

Article Computer Science, Artificial Intelligence

Supervised Machine Learning Method for Ontology-based Financial Decisions in the Stock Market

Neha Sharma, Mukesh Soni, Sumit Kumar, Rajeev Kumar, Nabamita Deb, Anurag Shrivastava

Summary: Asian social networks play a crucial role in providing enhanced and real-time data mapping, as well as accessing diverse big data sources. The concept of sentiment analysis helps in understanding textual content in relation to the stock market. An intelligent ontology and knowledge-based Asian social network solution can improve decision making by extracting important information. This article focuses on predicting stock market news sentiments using ontological knowledge-based Convolution Neural Network (CNN) and swarm-based Artificial Bee Colony (ABC) algorithm.

ACM TRANSACTIONS ON ASIAN AND LOW-RESOURCE LANGUAGE INFORMATION PROCESSING (2023)

Article Computer Science, Information Systems

SAMPARK: Secure and lightweight communication protocols for smart parking management

Trupil Limbasiya, Sanjay K. Sahay, Debasis Das

Summary: The presence of many vehicles on the road creates various issues such as parking difficulties, traffic congestion, and energy consumption. Utilizing information and communication technology to address parking challenges while ensuring security and privacy is a valuable approach. The proposed SAMPARK protocol offers secure and lightweight smart parking management, demonstrating efficient performance in computational time, storage cost, and communication overhead according to test-bed results.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Engineering, Civil

QueryCom: Secure Message Communication and Data Searching Protocols for Smart Transportation

Trupil Limbasiya, Debasis Das

Summary: This study proposes a secure and efficient information exchange protocol called QueryCom for vehicular cloud computing in smart transportation. The protocol is designed using SHA-512 and AES-256 to ensure security and user anonymity. Furthermore, an index-based sequential searching method is used to effectively retrieve information from the vehicular cloud database.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Blockchain-based group authentication scheme for 6G communication network

Mukesh Soni, Dileep Kumar Singh

Summary: This passage discusses the objective of turning present technology into intelligent global habitats and the importance of 6G in meeting real-time application requirements. The research paper suggests a group-based handover authentication strategy for 6G heterogeneous networks to enhance efficiency and security in the authentication process.

PHYSICAL COMMUNICATION (2023)

Article Computer Science, Information Systems

Fusion-based Representation Learning Model for Multimode User-generated Social Network Content

R. John Martin, Rajvardhan Oak, Mukesh Soni, V. Mahalakshmi, Arsalan Muhammad Soomar, Anjali Joshi

Summary: With the development of mobile networks and apps, user-generated content (UGC) has become crucial for enhancing personalized services. UGC consists of multi-source heterogeneous data such as user reviews, tags, scores, images, and videos. Big data fusion presents both opportunities and challenges. The fusion and representation learning of multi-source UGC text and image play a vital role in improving customized services.

ACM JOURNAL OF DATA AND INFORMATION QUALITY (2023)

Article Engineering, Electrical & Electronic

Energy-efficient resource allocation over wireless communication systems through deep reinforcement learning

Kirti Shukla, Archana Kollu, Poonam Panwar, Mukesh Soni, Latika Jindal, Hemlata Patel, Ismail Keshta, Renato R. R. Maaliw III

Summary: As the Internet of Things (IoT) expands, the energy requirements of IoT terminal equipment increase. To tackle the energy scarcity issue and ensure uninterrupted and stable operation in the face of renewable energy and uncertain environments, a rational and efficient energy allocation strategy is necessary. This study proposes a deep reinforcement learning energy allocation strategy that utilizes the DQN algorithm to directly interact with an unknown environment. The best energy allocation method is independent of environmental knowledge, and a pretraining algorithm is introduced to maximize the initialization state of the strategy. Comparative and simulation experiments are conducted under various channel data conditions. The results demonstrate that the proposed energy allocation strategy surpasses the current strategy in multiple channel scenarios and exhibits a high adaptability.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2023)

Proceedings Paper Materials Science, Multidisciplinary

Design, Modelling, and Analysis of Novel Solar PV System using MATLAB

Ayan Banik, Anurag Shrivastava, Ravindra Manohar Potdar, Sanjiv Kumar Jain, Santosh Gopal Nagpure, Mukesh Soni

Summary: In this study, the characteristics of Single-Phase Solar Photovoltaic Rooftop System were analyzed using MATLAB. A new grid synchronization methodology and INC control technique were proposed for analyzing the output current and achieving maximum power tracking. Extensive testing confirmed the practicality and promising outcomes of the proposed power grid model.

MATERIALS TODAY-PROCEEDINGS (2022)

Proceedings Paper Materials Science, Multidisciplinary

Developing smart devices with automated Machine learning Approach: A review

Sunil A. Patel, Sanjay P. Patel, Yagna Bhupendra Kumar Adhyaru, Santosh Maheshwari, Pankaj Kumar, Mukesh Soni

Summary: Artificial Intelligence plays a major role in smart devices, with new AI development tools like AutoML rapidly gaining popularity for their self-adapting capabilities in building efficient smart devices.

MATERIALS TODAY-PROCEEDINGS (2022)

Article Computer Science, Hardware & Architecture

Discovering e-commerce user groups from online comments: An emotional correlation analysis-based clustering method

Jia Ke, Ying Wang, Mingyue Fan, Xiaojun Chen, Wenlong Zhang, Jianping Gou

Summary: This study integrates the emotional correlation analysis model and Self-organizing Map (SOM) to construct fine-grained user emotion vector based on review text and perform visual cluster analysis, which helps platform merchants quickly mine user clustering and characteristics.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

Multilevel-based algorithm for hyperspectral image interpretation

Shi Qiu, Huping Ye, Xiaohan Liao, Benyue Zhang, Miao Zhang, Zimu Zeng

Summary: This paper proposes a multilevel-based algorithm for hyperspectral image interpretation, which achieves semantic segmentation through multidimensional information fusion, and introduces a context interpretation module to improve detection performance.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

Maximizing the profit of omnichannel closed-loop supply chains with mean-variance criteria

Jianteng Xu, Qingguo Bai, Zhiwen Li, Lili Zhao

Summary: This study constructs two optimization models for the omnichannel closed-loop supply chain by leveraging the combined power of leader-follower game and mean-variance theories. The focus is on analyzing the performance of manufacturers who distribute products through physical stores. The results show that the risk-averse attitude of the physical store has a positive impact on the overall system profitability, but if the introduced physical store belongs to another firm, total profit experiences a decline.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

GraphPhys: Facial video-based physiological measurement with graph neural network

Jiahao Xiong, Weihua Ou, Zhonghua Liu, Jianping Gou, Wenjun Xiao, Haitao Liu

Summary: This paper proposes a novel remote photoplethysmography framework, named GraphPhys, which utilizes graph neural network to extract physiological signals and introduces Average Relative GraphConv for the task of remote physiological signal measurement. Experimental results show that the methods based on GraphPhys significantly outperform the original methods.

COMPUTERS & ELECTRICAL ENGINEERING (2024)

Article Computer Science, Hardware & Architecture

User financial credit analysis for blockchain regulation

Zhiyao Tong, Yiyi Hu, Chi Jiang, Yin Zhang

Summary: The rise of illicit activities involving blockchain digital currencies has become a growing concern. In order to prevent illegal activities, this study combines financial risk control with machine learning to identify and predict the risks of users with poor credit. Experimental results demonstrate high performance in user financial credit analysis.

COMPUTERS & ELECTRICAL ENGINEERING (2024)