Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Yкраї́нська
  • Log In
    New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Alese, Boniface K."

Now showing 1 - 3 of 3
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    A Cancelable Biometric Based Security Protocol for Online Banking System
    (International Journal of Computer Science and Information Security, 2020-06) Tom, Joshua J.; Alese, Boniface K.; Thompson, Aderonke F.
    The internet revolution has brought significant benefits to humanity. Undeniably, most businesses in both the public and private sectors now provide their services online through the internet. One of the businesses that have embraced the use of the internet to provide services to their customers is the banking sector. Banks obtain competitive advantage and increased productivity through the adoption of online banking. Bank customers enjoy online banking as it provides them with anytime, anywhere banking experience. Away from the benefits is the issue of security of customer transaction data and customer privacy. Many authors have proposed various solutions to address the online banking security problem but while some focus solely on client authentication, others dwell only on security of the data transfer channels. In this paper, we propose a cancellable biometric based authentication protocol which guarantees secure mutual authentication, customer privacy and offer a secure end-to-end transmission of customer transaction data. The protocol in this paper is designed using Biohashing, a biometric template protection technique and dual cryptographic algorithm that combines Advanced Encryption Standard (AES) and Data Encryption Standard algorithms. With these, we realized strong authentication and secure transaction information exchange protocol for online banking
  • Loading...
    Thumbnail Image
    Item
    Efficient Anonymous Key Exchange Protocol for Roaming in Wireless Networks
    (International Journal of Scientific Research Engineering & Technology, 2018-02) Tom, Joshua J.; Alese, Boniface K.; Adewale, Olumide S.; Thompson, Aderonke F.
    Group signature schemes existentially provide anonymity, non-repudiation and can make a mobile device untraceable. But using group signature only in designing anonymous key exchange system is time wasting and consumes much of other computing resources hence the use of it must be minimal especially when deployed on resources-constrained mobile devices. In .this paper, we propose the combined use of group signature because of its inherent security properties which are very important when a mobile user roams in the insecure wireless network and message authentication code to reduce the huge computational burden occasioned by group signature’s expensive public key operations resulting in unbearable authentication latency. In this paper, we built two authenticators, a signature based authenticator and a message authentication code based authenticator. These models are based on the Canetti-Krawczyk model. We implemented the design using Java 8 on Android Studio 2.2 and tested it on Genymotion based emulator on Oracle VM VirtualBox. The experiment result showed a significant reduction in the authentication time when message authentication code based authenticator was executed compared to authentication time result in the group signature based authenticator. We further compared our model with a similar model and find that ours was superior in efficiency measured from authentication latency when a user roams from his home domain to a visited network and other networks subsequently while maintaining same security characteristics.
  • Loading...
    Thumbnail Image
    Item
    Performance and Security of Group Signature in Wireless Networks
    (International Journal of Computer (IJC), 2018) Tom, Joshua J.; Alese, Boniface K.; Thompson, Aderonke F.; Anebo, Nlerum P.
    A Group signature protocol is a cryptographic scheme that decouples a user identity and location from verification procedure during authentication. In a group signature scheme, a user is allowed to generate signatures on behalf of other group members but identity and location information of the signer is not known by a verifier. This ensures privacy, authentication and unlinkability of users. Although group signature is expensive to implement, its existential anonymity, non-repudiation and untraceablility properties make it attractive especially for resources-constrained devices in wireless network. A general group signature scheme usually contains six basic phases: setup (or key generation), join, message signing (or signature generation), signature verification, open and user revocation. In this paper, an evaluation of the performance of group signature based on three of the phases mentioned above is considered and its security in wireless networks examined. The key generation, signing and verification algorithms are implemented in Java 8. A proof of security of group signature by implication is also presented.

DSpace software copyright © 2002-2025 Abba & King Systems LLC

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback