Search results
1 – 10 of over 2000Vipin Khattri, Sandeep Kumar Nayak and Deepak Kumar Singh
Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper…
Abstract
Purpose
Currency usage either in the physical or electronic marketplace through chip-based or magnetic strip-based plastic card becoming the vulnerable point for the handlers. Proper education and awareness can only thrive when concrete fraud detection techniques are being suggested together with potential mitigation possibilities. The purpose of this research study is tendering in the same direction with a suitable plan of action in developing the authentication strength metric to give weightage marks for authentication techniques.
Design/methodology/approach
In this research study, a qualitative in-depth exploration approach is being adapted for a better description, interpretation, conceptualization for attaining exhaustive insights into specific notions. A concrete method of observation is being adopted to study various time boxed reports on plastic card fraud and its possible impacts. Content and narrative analysis are being followed to interpret more qualitative and less quantitative story about existing fraud detection techniques. Moreover, an authentication strength metric is being developed on the basis of time, cost and human interactions.
Findings
The archived data narrated in various published research articles represent the local and global environment and the need for plastic card money. It gives the breathing sense and capabilities in the marketplace. The authentication strength metric gives a supporting hand for more solidification of the authentication technique with respect to the time, cost and human ease.
Practical implications
The research study is well controlled and sufficient interpretive. The empirical representation of authentication technique and fraud detection technique identification and suggestive mitigation gives this research study an implication view for the imbibing research youths. An application and metric based pathway of this research study provides a smoother way to tackle futuristic issues and challenges.
Originality/value
This research study represents comprehensive knowledge about the causes of the notion of plastic card fraud. The authentication strength metric represents the novelty of a research study which produced on the basis of rigorous documentary and classified research analysis. The creativity of the research study is rendering the profound and thoughtful reflection of the novel dimension in the same domain.
Details
Keywords
Sanjay Sudhir Kulkarni and Arjav A. Bavarva
Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and…
Abstract
Purpose
Fifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage and small cell deployments. Handover management is one of the main problems in the heterogeneous network. Also, handover satisfies the needs of ultra-reliable communications along with very high reliability and availability in 5G networks. Handover management deals with every active connection of a user’s device, which moves the connection between the user’s device and the counterparty from one network point to another. Thus, the handover decision determines the best access network and also decides whether the handover is performed or not.
Design/methodology/approach
The main intention of this survey is to review several existing handover technologies in 5G. Using the categories of analysis, the existing techniques are divided into different techniques such as authentication-based techniques, blockchain-based techniques, software-defined-based techniques and radio access-based techniques. The survey is made by considering the methods such as used software, categorization of methods and used in the research works. Furthermore, the handover rate is considered for performance evaluation for the handover techniques in 5G. The drawbacks present in the existing review papers are elaborated in research gaps and issues division.
Findings
Through the detailed analysis and discussion, it can be summarized that the widely concerned evaluation metric for the performance evaluation is the handover rate. It is exploited that the handover rate within the range of 91%–99% is achieved by three research papers.
Originality/value
A survey on the various handover mechanisms in 5G networks is expected in this study. The research papers used in this survey are gathered from different sources such as Google Scholar and IEEE. Also, this survey suggests a further extension for the handover mechanism in 5G networks by considering various research gaps and issues.
Details
Keywords
Michael Pearce, Sherali Zeadally and Ray Hunt
The purpose of this paper is to address some weaknesses in the handling of current multi‐factor authentication, suggests some criteria for overcoming these weaknesses and presents…
Abstract
Purpose
The purpose of this paper is to address some weaknesses in the handling of current multi‐factor authentication, suggests some criteria for overcoming these weaknesses and presents a simple proof of concept authentication system.
Design/methodology/approach
First, this paper evaluates some of the underlying practices and assumptions in multi‐factor authentication systems. Next, the paper assesses the implications of these when compared to a quantitative authentication risk management approach. Based upon these implications this paper next note the requirements for an improved system and detail some related research areas that meet these requirements. Finally, this paper discussed how a system that meets these requirements through the application of that research could provide benefits and outlined a simple points‐based authentication system.
Findings
The paper proposes that many of the weaknesses in authentication confidence management could be effectively mitigated through the deployment of a factor independent multi‐modal fusion quantitative authentication‐based system. This paper details a simple point‐based approach that does this and discuss how addressing the problems in handling authentication confidence could further optimise risk management in multi‐factor authentication systems.
Practical implications
This paper's suggestions for optimising multi‐factor authentication have many implications within medium to high‐security commercial and government applications. Correct authentication risk handling enables decisions regarding risk and authentication to be made more accurately.
Originality/value
This implications of the issues discussed in this paper have relevance to anyone who deploys or uses any medium to high‐security authentication system. As the bottom end of the medium to high‐security range includes online banking, there are implications for a wide range of stakeholders.
Details
Keywords
N.L. Clarke, S.M. Furnell, B.M. Lines and P.L. Reynolds
The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for…
Abstract
The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. This paper details the feasibility of a non‐intrusive subscriber authentication technique – the use of keystroke dynamics. This feasibility study comprises a number of investigations into the ability of neural networks to authenticate users successfully based on their interactions with a mobile phone keypad. The initial results are promising with network classification performing well, achieving a 9.8 per cent false rejection rate and an 11.0 per cent false acceptance rate.
Details
Keywords
Although the use of online authentication systems in banking services is expanding globally, little is known about cultural differences in forming consumers' responses to these…
Abstract
Purpose
Although the use of online authentication systems in banking services is expanding globally, little is known about cultural differences in forming consumers' responses to these services. This paper examines how the usability of an online security service and culture impact consumers' behaviour.
Design/methodology/approach
The authors conduct a 2 (usability: high vs low) × 2 (culture: US vs Korea) between-subjects, full factorial design.
Findings
The results indicate a differential influence of the usability of a security system by culture. In particular, US consumers exhibit greater behavioural intention in a high (vs low) usability condition, whereas Korean consumers showed more favourable responses in a low-usability condition. Moreover, perceived effort is confirmed as a crucial mediator that explains the psychological mechanism of the proposed effect.
Practical implications
This research contributes to the literature on online banking where security is an important determinant of success. Especially for managers involved in international banking services, the findings of cultural differences offer insights about the importance of local understanding and differentiation of bank services for specific target markets which can enhance consumers' response towards an online security service.
Originality/value
The current study is one of a very few attempts to examine the role of usability of an online security system in forming consumers' behavioural intention. More importantly, this study integrates the concept of culture to explain how usability influences positive or negative behavioural intention in an international market.
Details
Keywords
Anabela Martins, Nelson Lima and Paulo Sampaio
The purpose of this paper is to contribute to develop a standard providing requirements for managing the quality and competence of the biological resource centres (BRC).
Abstract
Purpose
The purpose of this paper is to contribute to develop a standard providing requirements for managing the quality and competence of the biological resource centres (BRC).
Design/methodology/approach
The methodology for the standard setting was based on the principles of credibility, transparency, alignment and consistency. A justification study was performed to establish its objectives and scope, avoid overlap and prevent the risks in implementation. International documents providing rules for standard development were taken into consideration. Requirements were assembled from several standards and participation of interested parties was promoted.
Findings
No relevant international document exists covering fundamental issues for BRC operation. It is possible to develop a consistent and aligned standard, under a credible and transparent process that fits BRC purposes.
Practical implications
This standard will strengthen the BRC technical competence increasing its capability to provide authenticated high-quality biological materials – a crucial factor for biotechnological developments in the fields of health, agriculture and environment. It will serve as a basis for the BRC compliance assessment and the launch pad for establishing the global BRC network.
Originality/value
Original paper.
Details
Keywords
S.M. Furnell, I. Papadopoulos and P. Dowland
Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username/password combinations, in spite…
Abstract
Modern IT systems have a continued requirement for reliable user authentication at login. However, the majority of systems are still using username/password combinations, in spite of a variety of recognised weaknesses. Identifies the need for improved login authentication, and investigates the suitability of two alternative methods, using cognitive questions and an image‐based PIN. The effectiveness of these techniques has already been evaluated in an earlier study, which assessed users' ability to recall the necessary information after a prolonged period of inactivity. Here, the evaluation is focused on the perceived acceptability of the techniques, based upon users' longer‐term opinions arising from a period of regular usage. Discovers that 56 per cent of the participants would support the use of such techniques as a replacement for traditional password or numeric PIN‐based authentication. However, also discovers that some users have the potential to compromise the security of the methods by using them inappropriately. As such, concludes that, although the use of alternative authentication techniques is viable, further research is needed to refine the approaches and identify the best combination of methods across a larger base of users.
Details
Keywords
In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user…
Abstract
Purpose
In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused.
Design/methodology/approach
In previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique.
Findings
Here, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished.
Originality/value
The foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner.
Details
Keywords
Liang Chen, Prathik Anandhan and Balamurugan S.
In this paper, an intelligent information assisted communication transportation framework (II-CTF) has been introduced to reduce congestion, data reliability in transportation and…
Abstract
Purpose
In this paper, an intelligent information assisted communication transportation framework (II-CTF) has been introduced to reduce congestion, data reliability in transportation and the environmental effects.
Design/methodology/approach
The main concern of II-CTF is to mitigate public congestion using current transport services, which helps to improve data reliability under hazardous circumstances and to avoid accidents when the driver cannot respond reasonably. The program uses machine learning assistance to predict optimal routes based on movement patterns and categorization of vehicles, which helps to minimize congestion of traffic.
Findings
In II-CTF, scheduling traffic optimization helps to reduce the energy and many challenges faced by traffic managers in terms of optimization of the route, average waiting time and congestion of traffic, travel, and environmental impact due to heavy traffic collision.
Originality/value
The II-CTF definition is supposed to attempt to overcome some of the problems of the transportation environment that pose difficulties and make the carriage simpler, safer, more efficient and green for all.
Details
Keywords
Hassan Sbeyti, Beatrice El Hage and Ahmad Fadlallah
The purpose of this paper is to extract the user behaviour and transform it into a unique signature that can be used as implicit authentication technique. Smart devices are…
Abstract
Purpose
The purpose of this paper is to extract the user behaviour and transform it into a unique signature that can be used as implicit authentication technique. Smart devices are equipped with multiple authentication techniques and still remain prone to attacks because all of these techniques require explicit intervention of the user. Entering a pin code, a password or even having a biometric print can be easily hacked by an adversary.
Design/methodology/approach
In this paper, the authors introduce a novel authentication model to be used as complementary to the existing authentication models. Particularly, the duration of usage of each application and the occurrence time were examined and modelled into a user signature. During the learning phase, a cubic spline function is used to extract the user signature based on his/her behavioural pattern.
Findings
Preliminary field experiments show a 70 per cent accuracy rate in determining the rightful owner of the device.
Originality/value
The main contribution of this paper is a framework that extracts the user behaviour and transforms it into a unique signature that can be used to implicitly authenticate the user.
Details