Search results for: impersonation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10

Search results for: impersonation

10 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 34
9 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 74
8 Automated Video Surveillance System for Detection of Suspicious Activities during Academic Offline Examination

Authors: G. Sandhya Devi, G. Suvarna Kumar, S. Chandini

Abstract:

This research work aims to develop a system that will analyze and identify students who indulge in malpractices/suspicious activities during the course of an academic offline examination. Automated Video Surveillance provides an optimal solution which helps in monitoring the students and identifying the malpractice event immediately. This work is organized into three modules. The first module deals with performing an impersonation check using a PCA-based face recognition method which is done by cross checking his profile with the database. The presence or absence of the student is even determined in this module by implementing an image registration technique wherein a grid is formed by considering all the images registered using the frontal camera at the determined positions. Second, detecting such facial malpractices in which a student gets involved in conversation with another, trying to obtain unauthorized information etc., based on the threshold range evaluated by considering his/her mouth state whether open or closed. The third module deals with identification of unauthorized material or gadgets used in the examination hall by training the positive samples of the object through various stages. Here, a top view camera feed is analyzed to detect the suspicious activities. The system automatically alerts the administration when any suspicious activities are identified, thereby reducing the error rate caused due to manual monitoring. This work is an improvement over our previous work published in identifying suspicious activities done by examinees in an offline examination.

Keywords: impersonation, image registration, incrimination, object detection, threshold evaluation

Procedia PDF Downloads 201
7 Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being

Authors: Jeyaseelan Maria Michael

Abstract:

This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being.

Keywords: college students, cyberbullying, cyber victimization, psychological well-being

Procedia PDF Downloads 97
6 Crossing Boundaries: Emerging Identities from Folk Theatre

Authors: Sonia Wahengbam, Natasha Elangbam

Abstract:

Female impersonation has existed through the length of human civilization and the breadth of its cultures. Transvestism and drag queen cultures have created multi-sited spaces where in the shadow of art, one can cross the gender barrier and express one’s hidden identity. This paper will explore a dynamic cultural space that exists in Manipur, a state in the northeastern region of India, where the female impersonators (nupi shabis) of a folk theater (Shumang Leela) are using this traditional and popular art form to claim social acceptance of their homosexual identities through the medium of entertainment. It will highlight how by crossing the gender boundary, this third gender group has carved out a unique socio-economic niche where they have exploited their sexual identities to their advantage. The paper will trace the expanding cultural ‘’borderland’’ of Manipur where there is an increasing sense of ‘becoming’, belonging and sharing” of identities through the interweaving of old and new media. The research will be based on interviews with the nupi shabis, cultural critics and other experts.

Keywords: transvestism, Manipur, female impersonators (nupi shabis), Shumang Leela, gender

Procedia PDF Downloads 413
5 History on the Screen: Nasser and the Biographical Film in Egyptian Cinema

Authors: Omar Khalifah

Abstract:

The emergence of Muhammad Fadel’s 1996 film ‘Nasser 56’ ushered in a new era in Egyptian cinema. Not only was it the first biographical film of late Egyptian president Gamal ‘Abdel Nasser (1918-1970); it also broke a long-accepted taboo against cinematic depiction of modern political leaders. Passionately received by Egyptians and Arabs throughout the world, the success of ‘Nasser 56’ empowered other filmmakers to follow Fadel’s suit. Interestingly, the three biographical films that followed had, completely or partially, a Nasser dimension. In addition to another biographical film of Nasser, Anwar al-Qawadri’s ‘Gamal ‘Abdel Nasser’ (1999); Muhammad Khan’s ‘Ayyam al-Sadat (Days of Sadat)’ (2001), and Sherif Arafa’s ‘Halim (Halim)’ (2006) portray, as the titles clearly suggest, two significant figures whose lives thoroughly intersected with Nasser’s - Nasser’s successor Anwar al-Sadat and the legendary singer Abdel Halim Hafiz. Expectedly, therefore, Nasser himself is abundantly referenced in those films, albeit differently. This paper seeks to examine the ways in which Egyptian filmmakers impersonate Nasser on the screen. Starting with scholarly definitions of the biopic, the paper will first ponder the reasons that have made the biopic an unattractive genre to Egyptian filmmakers. It will then argue that the popularity of Nasser and his wide appeal to the public has transformed the status of the biopic genre in Egyptian cinema. However, the impersonation of Nasser in the four films above proved a daunting mission to filmmakers. As this paper will show, unless he is the main character, the reenactment of Nasser in films will constantly pose dilemmas to filmmakers, a few of which will be discussed in this paper.

Keywords: Ahmad Zaki, bio-pictures, Egyptian cinema, Nasser, Nasser 56

Procedia PDF Downloads 385
4 Fusion of Finger Inner Knuckle Print and Hand Geometry Features to Enhance the Performance of Biometric Verification System

Authors: M. L. Anitha, K. A. Radhakrishna Rao

Abstract:

With the advent of modern computing technology, there is an increased demand for developing recognition systems that have the capability of verifying the identity of individuals. Recognition systems are required by several civilian and commercial applications for providing access to secured resources. Traditional recognition systems which are based on physical identities are not sufficiently reliable to satisfy the security requirements due to the use of several advances of forgery and identity impersonation methods. Recognizing individuals based on his/her unique physiological characteristics known as biometric traits is a reliable technique, since these traits are not transferable and they cannot be stolen or lost. Since the performance of biometric based recognition system depends on the particular trait that is utilized, the present work proposes a fusion approach which combines Inner knuckle print (IKP) trait of the middle, ring and index fingers with the geometrical features of hand. The hand image captured from a digital camera is preprocessed to find finger IKP as region of interest (ROI) and hand geometry features. Geometrical features are represented as the distances between different key points and IKP features are extracted by applying local binary pattern descriptor on the IKP ROI. The decision level AND fusion was adopted, which has shown improvement in performance of the combined scheme. The proposed approach is tested on the database collected at our institute. Proposed approach is of significance since both hand geometry and IKP features can be extracted from the palm region of the hand. The fusion of these features yields a false acceptance rate of 0.75%, false rejection rate of 0.86% for verification tests conducted, which is less when compared to the results obtained using individual traits. The results obtained confirm the usefulness of proposed approach and suitability of the selected features for developing biometric based recognition system based on features from palmar region of hand.

Keywords: biometrics, hand geometry features, inner knuckle print, recognition

Procedia PDF Downloads 193
3 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 142
2 Unlocking Intergenerational Abortion Stories in Gardiennes By Fanny Cabon

Authors: Lou Gargouri

Abstract:

This paper examines how Fanny Cabon's solo performance, Gardiennes (2018) strategically crafts empathetic witnessing through the artist's vocal and physical embodiment of her female ancestors' testimonies, dramatizing the cyclical inheritance of reproductive trauma across generations. Drawing on affect theory and the concept of ethical co-presence, we argue that Cabon's raw voicing of illegal abortions, miscarriages, and abuse through her shape-shifting presence generates an intimate energy loop with the audience. This affective resonance catalyzes recognition of historical injustices, consecrating each singular experience while building collective solidarity. Central to Cabon's political efficacy is her transparent self-revelation through intimate impersonation, which fosters identification with diverse characters as interconnected subjects rather than objectified others. Her solo form transforms the isolation often associated with women's marginalization into radical inclusion, repositioning them from victims to empowered survivors. Comparative analysis with other contemporary works addressing abortion rights illuminates how Gardiennes subverts the traditional medical and clerical gazes that have long governed women's bodies. Ultimately, we contend Gardiennes models the potential of solo performance to harness empathy as a subversive political force. Cabon's theatrical alchemy circulates the effects of injustice through the ethical co-presence of performer and spectator, forging intersubjective connections that reframe marginalized groups traditionally objectified within dominant structures of patriarchal power. In dramatizing how the act of witnessing another's trauma can generate solidarity and galvanize resistance, Cabon's work demonstrates the role of embodied performance in catalyzing social change through the recuperation of women's voices and lived experiences. This paper thus aims to contribute to the emerging field of feminist solo performance criticism by illuminating how Cabon's innovative dramaturgy bridges the personal and the political. Her strategic mobilization of intimacy, identification, and co-presence offers a model for how the affective dynamics of autobiographical performance can be harnessed to confront gendered oppression and imagine more equitable futures. Gardiennes invites us to consider how the circulation of empathy through ethical spectatorship can foster the collective alliances necessary for advancing the unfinished project of women's liberation.

Keywords: gender and sexuality studies, solo performance, trauma studies, affect theory

Procedia PDF Downloads 13
1 A Scoping Review of Technology-Facilitated Gender-Based Violence: Findings from Asia

Authors: Vaiddehi Bansal, Laura Hinson, Mayumi Rezwan, Erin Leasure, Mithila Iyer, Connor Roth, Poulomi Pal, Kareem Kysia

Abstract:

As digital usage becomes increasingly ubiquitous worldwide, technology-facilitated gender-based violence (GBV) has garnered increasing attention in the recent years, especially during the COVID-19 pandemic. This form of violence is defined as “action by one or more people that harms others based on their sexual or gender identity or by enforcing harmful gender norms. This action is carried out using the internet and/or mobile technology that harms others based on their sexual or gender identity or by enforcing harmful gender norms”.Common forms of technology-facilitated GBV include cyberstalking, cyberbullying, sexual harassment, image-based abuse, doxing, hacking, gendertrolling, hate speech, and impersonation. Most literature on this pervasive yet complex issue has emerged from high-income countries, and few studies comprehensively summarize its prevalence, manifestations, and implications. This rigorous scoping review examines the evidence base of this phenomenon in low and middle-income countries across Asia, summarizing trends and gaps to inform actionable recommendations. The research team developed search terms to conduct a comprehensive search of peer-reviewed and grey literature. Query results were eligible for inclusion if they were published in English between 2006-2021 and with an explicit emphasis on technology-facilitated violence, gender, and the countries of interest in the Asia region. Title, abstracts, and full-texts were independently screened by two reviewers based on inclusion criteria, and data was extracted through deductive coding. Of 2,042 articles screened, 97 met inclusion criteria. The review revealed a gap in the evidence-base in Central Asia and the Pacific Islands. Findings across South and Southeast Asia indicate that technology-facilitated GBV comprises various forms of abuse, violence, and harassment that are largely shaped by country-specific societal norms and technological landscapes. The literature confirms that women, girls, and sexual minorities, especially those with intersecting marginalized identities, are often more vulnerable to experiencing online violence. Cultural norms and patriarchal structures tend to stigmatize survivors, limiting their ability to seek social and legal support. Survivors are also less likely to report their experience due to barriers such as lack of awareness of reporting mechanisms, the perception that digital platforms will not address their complaints, and cumbersome reporting systems. The COVID-19 pandemic has further exacerbated perpetration and strained support mechanisms. Prevalence varies by the form of violence but is difficult to estimate accurately due to underreporting and disjointed, outdated, or non-existent legal definitions. Addressing technology-facilitated GBV in Asia requires collective action from multiple actors, including government authorities, technology companies, digital and feminist movements, NGOs, and researchers.

Keywords: gender-based violence, technology, online sexual harassment, image-based abuse

Procedia PDF Downloads 96