International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 102    Submit Your Rating     Cite This   Download        Certificate

VARIOUS NETWORK SECURITY ANALYSIS BASED ON AUTHENTICATION TECHNIQUES

    1 Author(s):  SAMEER

Vol -  6, Issue- 2 ,         Page(s) : 278 - 284  (2015 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Data security is the utmost critical component in ensuring safe transmission of information through the internet. It comprises authorization of access to information in a network, controlled by the network administrator. The task of Network security not only requires ensuring the security of end systems but of the entire network. Authentication is one of the primary and most commonly ways of ascertaining and ensuring security in the network. In this paper, an attempt has been made to analyze the various authentication techniques such as Knowledge-based, Token-based and Biometric-based etc. Furthermore, we consider multi-factor authentications by choosing a combination of above techniques and try to compare them.

  1. Jae-Jung Kim and Seng-Phil   Hong,AMethodof Risk“ Assessment for Multi-Factor Authentication”, Journal of Information Processing Systems, Vol.7, No.1, March 2011.
  2. Qinghua Li, Student Member, IEEE, and Guohong Cao, Fellow, IEEE "Multicast Authentication in the Smart Grid with One Time Signature", IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4,                      
  3. Online :Available: http://www.duosecurity.com. 
  4. Stamati Gkarafli, AnastasiosComparingtheProof Aby. KnowledgeEconomides,Authentication “ Techniques 
  5. Roger Meyer,Secure authentication“ on the internet”As the part of security reading room, SANS institute           2007. 
  6. R.   Dhamija,   and : A.“User Perrig,“DéjàStudyUsingImagesforAuthenticationVu”,   9th   USENIX 
  7. Security Symposium, 2000. 
  8. R. Morris, PasswordK.Thompson,security:Acasehistory“,” Comm. ACM, Vol.22, no. pp. 594-597. 
  9. B.   L.   Riddle,   M.   SPasswords.Miron,inuseina universityJ.Atimesharing.Semo,environment“,” 
  10. Computers and Security, Vol. 8, no. 7, 1989, pp. 569-579. 
  11. S. M. Bellovin,Encrypted keyM.exchange:Merritt,Password-based“protocols secure against dictionary attacks,” Proc. 1992 IEEE ComputeronResearchin SecuritySocietyandPrivacy, 1992,Conferencpp. 72-84. 
  12. R. Pond, J. Podd, J.WordBunnell,associationcomputerRpasswords:.Henderson,Theeffectof “ formulation techniques on recall andComputersguessingandSecurity, Volrates”,.19,no.7,2000, pp. 645-656. 
  13. S.   M.   Furnell,   P.   S.   Dowland,AuthenticationH.Mand. supervision:Illingworth,A 
  14. survey of user attitudes,”   Computers   and   Security,-539.   Vol.   19,   no.6, Harbitttr, A. andAMethodologyMenasce,forAnalyzingD.theAPerformance.,“ of Authentication Protocols”, November 2002
  15. Misbahuddin, M., Premchand, P. and Govardhan, A. “A User Friendly Password Authenticated Key Agreement for Multi Server Environment”, mberNove2009. 
  16. TSENG, Y.M., YANG, C.C. AND HAUR SU, J. Authentication“ and Billing Protocols for the Integration of WLAN and 3G Networks”,   2004.

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details