In the next few years, the mobile pay‐TV systems will be very popular due to their extensive applications. Providing security and privacy are the most challenging issues in the secure development of mobile pay‐TV systems. To avoid unauthorized access to mobile pay‐TV services, it is very important to authenticate the mobile users and the head end system (HES) in an anonymous manner. Even though several authentication schemes were proposed to provide anonymous authentication, the previously proposed schemes are not fit for mobile pay‐TV applications due to their high computational complexity. Hence, a computationally efficient anonymous authentication scheme is proposed in this article for secure service provision in mobile pay‐TV systems. The proposed authentication scheme can effectively authenticate both the mobile users and the HES with low computational cost in an anonymous manner. In addition, an anonymous batch authentication scheme is also proposed in this article to authenticate a batch of users in the subscription phase to alleviate the authentication burden of the HES. The security analysis section shows that the proposed scheme is more efficient in terms of security and the performance analysis section shows the strength of this article in terms of computational cost, while performing anonymous authentication in mobile pay‐TV systems.
In Mobile Agent Technology, interoperability between agents is indispensably to secure the data from malicious agents under Multi-Agent System. To protect data and agents from malicious attacks, the multiagent system essentially needs to offer secure communication and access control mechanisms. Hence the digital signature and cryptosystem of asymmetric key based encryption and decryption provides secure communication and increases the confidentiality of accessing services designated only to a determined group of users. However, for the distribution of public key between agents we need to identify the trusted agent. The identification of trusted agent in a multi-agent platform is a challenging work. The technique of adapting USB Dongle is like a security device, which makes the identity of trusted agent, gives a robust mechanism for the identification of trusted agents in a Multi-Agent secured Distributed Computing System. In addition to that bio-metric based finger print sensor enables the owner's physical contribution to access the data.
Malware is a malicious software that can contaminate communication devices, where information can be lost, encrypting or deleting the sensitive data, altering or hijacking core computing activities and monitoring a user's computer activity without proper authorization. Analyzing the behavior of any new type of malware, that threatens the security of information is the challenging task. Previous studies and research has used static and dynamic based analysis. Althrough there are various methods to analysis the behaviour of the malware, the innovation of new technology lead to undesirable growth of malware. A procedure to analyze the characteristics and its nature is the need of the day. To mitigate this issue, malware specific procedures need to be evolved by analysing its behaviour. In this article, the authors present a heuristic-based malware static analysis testing (HMST) through a six step process including hash verification, PE structure analysis, packer signature analysis, entropy analysis, antivirus check and string analysis. Heuristic-based malware static analysis (MSA) depends on the six characterstics. The six characteristics sequence is quantified mathematially. Hash verification is presented as a dynamic function, PE structure analysis (PESA) as the functional string, Packer Signature (PS) by functional boundedness, Entropy Analysis (EA) with probability, antivirus check (AC) of the discrete lagorthm-bit representation and string analysis (SA) lies with the comutational complexity. Hence, an optimized string is proposed for transmitting securely. CFF Explorer, BinText, PeID, DIE and VirusTotal are used for analyzing the behavior of the samples in this study.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.