legitimate user
Recently Published Documents


TOTAL DOCUMENTS

94
(FIVE YEARS 60)

H-INDEX

6
(FIVE YEARS 3)

2022 ◽  
Vol 18 (2) ◽  
pp. 1-20
Author(s):  
Yantao Li ◽  
Peng Tao ◽  
Shaojiang Deng ◽  
Gang Zhou

Smartphones have become crucial and important in our daily life, but the security and privacy issues have been major concerns of smartphone users. In this article, we present DeFFusion, a CNN-based continuous authentication system using Deep Feature Fusion for smartphone users by leveraging the accelerometer and gyroscope ubiquitously built into smartphones. With the collected data, DeFFusion first converts the time domain data into frequency domain data using the fast Fourier transform and then inputs both of them into a designed CNN, respectively. With the CNN-extracted features, DeFFusion conducts the feature selection utilizing factor analysis and exploits balanced feature concatenation to fuse these deep features. Based on the one-class SVM classifier, DeFFusion authenticates current users as a legitimate user or an impostor. We evaluate the authentication performance of DeFFusion in terms of impact of training data size and time window size, accuracy comparison on different features over different classifiers and on different classifiers with the same CNN-extracted features, accuracy on unseen users, time efficiency, and comparison with representative authentication methods. The experimental results demonstrate that DeFFusion has the best accuracy by achieving the mean equal error rate of 1.00% in a 5-second time window size.


2021 ◽  
Vol 2128 (1) ◽  
pp. 012003
Author(s):  
Azza Moawad ◽  
Koffi-Clément Yao ◽  
Ali Mansour ◽  
Roland Gautier

Abstract In this manuscript, we introduce a semi-blind spectrum sensing technique based on cepstral analysis for interweave cognitive systems. The misdetection problem of spread spectrum signals leads to erroneous sensing results, which affect the quality-of-service of a legitimate user. The simplicity and accuracy of cepstral analysis approaches make them reliable for signals detection. Therefore, we formulate the averaged autocepstrum detection technique that utilizes the strength of the autocepstral features of spread spectrum signals. The proposed technique is compared with the energy detection and eigenvalue-based detection techniques and shows reliability and efficacy in terms of detection accuracy.


Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7646
Author(s):  
Jie Tian ◽  
Hao Chen ◽  
Zhigang Wang ◽  
Xianhua Shi ◽  
Zhengyu Ji ◽  
...  

Recently, the concept of spatial and direction modulation (SDM) has been developed to reap the advantages of both spatial modulation (SM) and directional modulation (DM). On the one hand, DM ensures the transmission security at the expected direction. On the other hand, the structure of SM-aided distributed receivers can enhance the security even if the eavesdropper is located in the same direction as the legitimate receiver. However, the above advantages are achieved based on the assumption that the eavesdropper is not equipped with distributed receivers. On the other hand, the information security can no longer be guaranteed when the eavesdropper is also equipped with distributed receivers. To alleviate this problem, we considered a joint design of SDM and covert information mapping (CIM) in order to conceive of a more robust structure of CIM-SDM. Furthermore, both the detection performances at the eavesdropper and the legitimate user were quantified through theoretical derivation. In general, both the analysis and simulation results supported that the proposed CIM-SDM structure provides more robust secure performance compared to the original SDM, even if the extreme condition of distributed receivers at the eavesdropper is considered, at the cost of moderate performance loss at the legitimate user.


2021 ◽  
Author(s):  
◽  
David Sutton

<p>Accounting standards setters have progressively moved towards decision-useful, investor-focused fair value accounting standards for general purpose financial reporting (GPFR). With some qualification, the case is made that this development is positive for accounting as a discipline. This paper develops a referent theory of accounting to contextualize standards setters' implicit direction, derived from existing research and literature. A central element in the development of this theory is the case made for 'investor-as-GPFR user'. Against this, stakeholder theory and positive accounting theory will be identified as confounding influences on the development of a general theory of accounting. The argument is for the investor, both current and potential, as the sole legitimate user of GPFR. The practical implications of the theory are considered against the prevailing debate over optimal accounting valuation method; the debate between fair value measurement and historical cost. The case is made that a number of ostensible dichotomies in accounting thought, such as between relevance and accountability, are substantially reconcilable. The mutual exclusivity often implied of accounting information relevance and accountability-cum-reliability is rejected. The development of a general theory of accounting is timely as such a referent theory is necessary to legitimize standards setting and secure accounting's place in an increasingly diverse financial information market. Inferentially, trends in the evolution of fair value standards reflect the dominant concern to meet threats to the discipline as a whole; this standard setting trend qualified in speed and degree by the narrow interests of 'constituents'.</p>


2021 ◽  
Author(s):  
◽  
David Sutton

<p>Accounting standards setters have progressively moved towards decision-useful, investor-focused fair value accounting standards for general purpose financial reporting (GPFR). With some qualification, the case is made that this development is positive for accounting as a discipline. This paper develops a referent theory of accounting to contextualize standards setters' implicit direction, derived from existing research and literature. A central element in the development of this theory is the case made for 'investor-as-GPFR user'. Against this, stakeholder theory and positive accounting theory will be identified as confounding influences on the development of a general theory of accounting. The argument is for the investor, both current and potential, as the sole legitimate user of GPFR. The practical implications of the theory are considered against the prevailing debate over optimal accounting valuation method; the debate between fair value measurement and historical cost. The case is made that a number of ostensible dichotomies in accounting thought, such as between relevance and accountability, are substantially reconcilable. The mutual exclusivity often implied of accounting information relevance and accountability-cum-reliability is rejected. The development of a general theory of accounting is timely as such a referent theory is necessary to legitimize standards setting and secure accounting's place in an increasingly diverse financial information market. Inferentially, trends in the evolution of fair value standards reflect the dominant concern to meet threats to the discipline as a whole; this standard setting trend qualified in speed and degree by the narrow interests of 'constituents'.</p>


2021 ◽  
Vol 2021 ◽  
pp. 1-19
Author(s):  
Jianfeng Guan ◽  
Xuetao Li ◽  
Ying Zhang

Most of the current authentication mechanisms adopt the “one-time authentication,” which authenticate users for initial access. Once users have been authenticated, they can access network services without further verifications. In this case, after an illegal user completes authentication through identity forgery or a malicious user completes authentication by hijacking a legitimate user, his or her behaviour will become uncontrollable and may result in unknown risks to the network. These kinds of insider attacks have been increasingly threatening lots of organizations, and have boosted the emergence of zero trust architecture. In this paper, we propose a Multimodal Fusion-based Continuous Authentication (MFCA) scheme, which collects multidimensional behaviour characteristics during the online process, verifies their identities continuously, and locks out the users once abnormal behaviours are detected to protect data privacy and prevent the risk of potential attack. More specifically, MFCA integrates the behaviours of keystroke, mouse movement, and application usage and presents a multimodal fusion mechanism and trust model to effectively figure out user behaviours. To evaluate the performance of the MFCA, we designed and implemented the MFCA system and the experimental results show that the MFCA can detect illegal users in quick time with high accuracy.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Javier Junquera-Sánchez ◽  
Carlos Cilleruelo ◽  
Luis De-Marcos ◽  
José-Javier Martinez-Herráiz

Nowadays, the Zero Trust model has become one of the standard security models. This paradigm stipulates as mandatory the protection of each endpoint, looking for providing security to all the network. To meet this end, it is necessary to guarantee the integrity of the access control systems. One possibility for bringing security to the different endpoints is continuous authentication, as an access control system. Continuous authentication is the set of technologies capable of determining if a user’s identity remains in time; whether he is the legitimate user (i.e., the only one who should know the secret credentials) or the identity has been impersonated by someone else after the authentication’s process was completed. Continuous authentication does not require the active participation of the user. Aiming to identify the different technologies involved in continuous authentication’s implementations, evaluation methods, and its use cases, this paper presents a systematic review that synthesizes the state of the art. This review is conducted to get a picture about which data sources could allow continuous authentication, in which systems it has been successfully implemented, and which are the most adequate ways to process the data. This review also identifies the defining dimensions of continuous authentication systems.


2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Hao Li ◽  
Xiaoshuang Xing ◽  
Anqi Bi ◽  
Jin Qian

In this paper, we deal with the eavesdropping issue in Wireless Access in Vehicular Environments- (WAVE-) based vehicular networks. A proactive flexible interval intermittent jamming (FIJ) approach is proposed which predicts the time length T of the physical layer packet to be transmitted by the legitimate user and designs flexible jamming interval (JI) and jamming-free interval (JF) based on the predicted T . Our design prevents eavesdroppers from overhearing the information with low energy cost since the jamming signal is transmitted only within JI. Numerical analysis and simulation study validate the performance of our proactive FIJ, in terms of jamming energy cost and overhearing defense, by comparing with the existing intermittent jamming (IJ) and FIJ.


Author(s):  
Abishek Kashyap. S

Social networking is becoming so essential nowadays and is playing a bigger role in every man’s life for sharing information and knowledge. Also social network is used to see the everyday activities, photos, videos, political agendas and propagandas. Therefore, it is now becoming an important tool to stay updated in this dynamic world. With large chunks of data being generated every second, there is a growing concern about Data protection and user privacy in the Social media network. One of the major concerns being, ‘Fake Users’ - misusing the authorized user’s information like photos and videos without the authorized user’s permission and disguising oneself as a legitimate user. In our contemporary world, many fake profiles are being created for fraudulent activities like money making, malware / virus / Trojan distribution to use user data, especially with malicious intent. In this paper Java static watermarking is proposed. Java static watermark is used in our social media website in order to associate each user's footprint with respect to their unique ID, eliminating the crux of fake users. It is also very evident to say that data present on the cloud is no less prone to cyber-attacks. In this paper, integration of steganography methods for protection of sensitive data on the public cloud server is also proposed to validate its viability and its increased security. The Algorithms used ensure the individual information is kept secret and transmitted in a secure manner with user privacy preserving.


Sign in / Sign up

Export Citation Format

Share Document