HYBRID METHODS OF AUTHENTICATION IN NETWORK SECURITY

نویسندگان

چکیده

In this paper, we present a comprehensive taxonomy of the most popular authentication mechanisms, main threats, vulnerabilities, possible types attacks and security issues that are associated with computer systems. Our contribution is to analyze architecture current environment from all aspects make comparative assessment different methods in order identify develop scalable reliable mechanism must deal multi-level strong requirements. We propose hybrid authentication, which combine integrate biometric technologies cryptographic asymmetric algorithms, elements play vital role field information aim resolve shortcomings traditional enhance level security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

analysis of power in the network society

اندیشمندان و صاحب نظران علوم اجتماعی بر این باورند که مرحله تازه ای در تاریخ جوامع بشری اغاز شده است. ویژگیهای این جامعه نو را می توان پدیده هایی از جمله اقتصاد اطلاعاتی جهانی ، هندسه متغیر شبکه ای، فرهنگ مجاز واقعی ، توسعه حیرت انگیز فناوری های دیجیتال، خدمات پیوسته و نیز فشردگی زمان و مکان برشمرد. از سوی دیگر قدرت به عنوان موضوع اصلی علم سیاست جایگاه مهمی در روابط انسانی دارد، قدرت و بازتولید...

15 صفحه اول

MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security

Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...

متن کامل

Network Security: Hybrid IDPS

This paper deals with the issue of computer security, which aims to develop a robust and independent security architecture. This architecture consists of several probes spatially distributed to several locations in the network (sensitive servers, DMZ, workstations, etc.). These probes are NIDPS, HIDPS, KIDPS and Arduino Yun Board. These same probes were semantically distributed according to thr...

متن کامل

A Hybrid Security Approach for Nodes Authentication in Wireless Sensor Network using Cellular Automata

We propose in this paper a computationally efficient security scheme for identifying network members in wireless sensor networks. The authentication process is done by first identifying the base station as being the authentic one with the use of fingerprinting information. Once the base station is authenticated, the others members of the network can then be authenticated by the base station. Th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Analele Universit??ii "Dun?rea de Jos" din Gala?i

سال: 2023

ISSN: ['2344-4738', '1221-454X']

DOI: https://doi.org/10.35219/eeaci.2022.1.02