The Internet today lacks an identity protocol for identifying people and organizations. As a result, service providers needed to build and maintain their own databases of user information. This solution is costly to the service providers, inefficient as much of the information is duplicated across different providers, difficult to secure as evidenced by recent large-scale personal data breaches around the world, and cumbersome to the users who need to remember different sets of credentials for different services. Furthermore, personal information could be collected for data mining, profiling and exploitation without users' knowledge or consent. The ideal solution would be self-sovereign identity, a new form of identity management that is owned and controlled entirely by each individual user. This solution would include the individual's consolidated digital identity as well as their set of verified attributes that have been cryptographically signed by various trusted issuers. The individual provides proof of identity and membership by sharing relevant parts of their identity with the service providers. Consent for access may also be revoked hence giving the individual full control over its own data. This survey critically investigates different blockchain based identity management and authentication frameworks. A summary of the state-of-the-art blockchain based identity management and authentication solutions from year 2014 to 2018 is presented. The paper concludes with the open issues, main challenges and directions highlighted for future work in this area. In a nutshell, the discovery of this new mechanism disrupted the existing identity management and authentication solutions and by providing a more promising secure platform.
This paper presents a taxonomy of anomaly detection techniques that is then used to survey and classify a number of research prototypes and commercial products. Commercial products and solutions based anomaly detection techniques are beginning to establish themselves in mainstream security solutions alongside firewalls, intrusion prevention systems and network monitoring solutions. These solutions are focused mainly on network-based anomaly detection, thus creating a new industry buzzword that describes it: Network BehaviorAnalysis. This classification is used predictably, pointing towards a number of areas of future research in the field of anomaly detection.
RFID tag carries vital information in their operation and thus concerns on privacy and security issues do arise. The problem of traceability is critical in open radio frequency environments. An adversary can trace and interact with tag and this is referred as tracking.Nevertheless, with a strong authentication mechanism, uprising security problems in RFID systems can be solved. We had demonstrated current vulnerabilities and proposed our authentication mechanism to overcome them. As long as the secret information stays secret, tag forgery is not possible. Targeting RFID tag with short tag ID, we employ a resource friendly symmetric encryption scheme, which is a stream cipher building block to enhance the security features in active type RFID tag.
Key management is deemed as the fundamental essential part of any secure communication. A secure sensor network communication protocol relies on the substantial secure, robust and efficient key management system. Implementing a private and public key pair for sensor network is impractical due to high computation and energy consumption. In this research, we put forward two group key management schemes for hierarchical self-organizing wireless sensor network architecture. Both of the schemes are designed in such a way that more computational and communication burden is placed on the forwarding node and the similar workload is kept as low as possible at the sensor nodes. Besides, multilevel security can be achieved to secure groups of sensors at different levels.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.