The submission deadline:

Join us Vkontakte and follow news in Russian

Welcome to visit Open Karelia

Upcoming Events
Event Dates

WWSSS 2017

01.07 - 08.07

21st FRUCT

06.11 - 10.11

You are here

Lightweight Authentication for Heterogeneous Information Systems

Background and Motivation: 

During the last decade the progress of authentication methods evolution resulted in a number of strong systems being proposed, starting from two-factor authentication techniques, already deployed for online banking or secure link establishment in Bluetooth and coming up to biometric scanners implemented in a number of portable devices. Listed approaches are reliable, well-analyzed and to some extend secure.

However, existing authentication techniques scale poorly when user have to perform a set of authentications in heterogeneous information systems that are not connected to each other.

Project Summary: 

The goal of the project is to design and develop a lightweight and scalable authentication scheme. The key idea is to use a so-called "wireless key" - special device that stores user identificators for different Information Systems in a secure way. So when user wants to perform an authentication he/she has just to connect its wireless key (e.g. using wired or wireless channel: USB, NFC, etc.) to the terminal. All the rest is to be performed by the software. 

The key difference of the proposed system with existing "wireless key" solutions is applicability to very cheap, small and energy-efficient hardware, like NFC tags.

The proposed authentication system consists of 3 parts: wireless key, terminal software (on the Information System side), (optional) user software to be installed on his/her home computer of mobile device.

Project goals and future research directions: 
<ol><li>Design a lightweight and scalable authentication scheme for wireless keys</li><li>Manufacture a test bench to evaluate the system performance and usability</li><li>Develop software to operate with proposed solution on both User and Information System sides</li><li>*Present a product, based on proposed solution, for commertial deployment</li></ol>
List of team members and their organizations: 
  1. Maria Komar (YarSU, Yaroslavl, Russia)
  2. Sviatoslav Edelev (Georg-August-University, Goettingen, Germany)
  3. Vitaly Petrov (TUT, Finland)
  4. Yevgeni Koucheryavy (TUT, Finland)
Project Timeline and Expected Deliverables: 
  1. April, 2013: Basic concept proposed in , V. Kirkizh, M. Komar, K. Alexandrov, V. Petrov "Wireless authentication for the web services", In Proc. of FRUCT 13 Conference, Demo Session, Petrozavodsk, Russia.
  2. June 2013: Formal problem statement and initial proposals are published in M. Komar, "Secure Document Storage", BSc thesis, YarSU, Yaroslavl, Russia.
  3. October 2013: Sketch of proposed system is presented during World Leading Event on Telecommunications V. Petrov, M. Komar, Y. Koucheryavy "A Lightweight Many-to-Many Authentication Protocol for Near Field Communications", In the Proceedings of the 21 IEEE International Conference on Network Protocols (IEEE ICNP), Poster Session, Gottingen, Germany, 2013.
  4. [Expected: April 2015] Prototype of the system to be presented
  5. [Expected: November 2016] Beta-version of the wireless key to be released
Final deadline: 
Sunday, January 10, 2016 (All day)


I got a topic Heterogeneous Information Systems from Dissertation Writing Service and I have to describe what actual Heterogeneous Information System is? I need more information can anyone give me some article links?

The authentication process can be evolve with the activities which are involved in it and there are some generic way through which we can evaluate the information system although information system can have lots of fundamentals Buy Essay Online which can be explained in many ways of it and that thing can also be understand in the mutual way and they have shared its motivations and also the project summary and it can be also be summarized with many points and its going to be the best.

As you topic is concern about heterogeneous information system.So i would like to sat that it is the best topic for especially those whom are looking for the actuall need.As majority of individuals are looking for online assistance regarding their requirement.As online technology is expanding day by day so it is directly impact on everyone whom are looking for online resources for their succuessful career.As i also go with online platforms for taking career assistance and sometime i used to get my academic writing assistance through this online facility for saving my time and effort.Once i took a Dissertation Help for my academic  writing and i really got amazed that after submittting it i got highest score in my class and it was great acheivement for me.So that i always used to get it through online and now i take career assistance through online service providers as it saves time and efforts and it is also reliable for me to go through with it.So i am looking for more useful information.Thanks for sharing it.

It is such an informative topic,i really like to visit here.As you have discussed about that Businesses are aware of these technological improvements and are setting up plans to apply these voice command abilities to their products. One such industry that is preparing utilize the voice recognition software are online technology.Jack has spoken directly with creative developers from online resources sites who are working to bring such Cheap Custom Essay for those individuals,whom are looking for online assistance as it saves time and effort.So i always get online assistance for the entire procedure works with software that listens to a voice and translates it into digital information, computing which sounds are being used.SO i am looking for more useful information accordingly.Thanks for sharing it.

During the last decade the progress of authentication strategies evolution resulted in a very variety of sturdy systems being planned, ranging from two-factor authentication techniques, already deployed for on-line banking or secure link institution in Bluetooth and arising to biometric scanners enforced in a very variety of transportable devices. Listed approaches area unit reliable, well-analyzed and to some extend secure.

I am actually keen about the future authentication methods that we will get to see. Biometric authentication methods are so common today to the level that they are being used in smartphones too. Even some of the phones do have Bluetooth authentication methods implemented already. So, what’s next? mobile home prices

Amid the most recent decade the advance of validation strategies development brought about various solid frameworks being proposed, beginning from two-figure confirmation procedures Write My Dissertation in proper life.

In any case, existing confirmation strategies scale inadequately when client need to play out an arrangement of verifications in heterogeneous data frameworks that are not associated with each other Professional research proposal writers