Survey for Generating an Ideal Password Authentication Scheme Which Results In Fortification of Transport Layer Security Protocol
نویسنده
چکیده
Fortification of transport layer security protocol is required because whenever there is communication between Client and Server over a public link, then proving an identity becomes quiet complex. When resources are to be accessed from remote systems through public network then identity authentication parameters are the de-facto-standard. Paper elucidates upon various authentication parameters and generates a result that there is need for generating an ideal password authentication scheme. Analysis through a survey is done and outcome is formulated for efficient authentication type for online transactions. Evaluation of security and privacy for online transactions is examined in the paper and overall expectations of the user for e-purchasing, e-banking or e-communication etc is formulated. Complete paper explicates that user needs one more tier of security for complete secure and assured transactions in public network. Analysis is publicized through comparative bar charts in the paper with possibility of acceptance of the user in terms of bearing extra cost for ideal password authentication scheme which will result in fortification of transport layer security protocol.
منابع مشابه
Fortification of Transport Layer Security Protocol by using Password and Fingerprint as Identity Authentication Parameters
Whenever there is communication between Client and Server over a public link and resources are to be accessed from remote systems, then proving an identity becomes quiet complex because there is need of proper access rights with authentication. Complete security at the transport layer starts with proof of authentication, majority organizations only use password for security but this research pa...
متن کاملFortification of Transport Layer Security Protocol with Hashed Fingerprint Identity Parameter
Identity over the public links becomes quiet complex as Client and Server needs proper access rights with authentication. For determining clients identity with password Secured Shell Protocol or Public Key Infrastructure is deployed by various organizations. For end to end transport security SSL (Secured Socket Layer) is the de facto standard having Record and Handshake protocol dealing with da...
متن کاملFortification of Transport Layer Security Protocol
Proving an identity over a public link is complex when there is communication between Client and Server. Secure Shell protocol is deployed, to determine a client's identity through Password-based key exchange schemes, over a public network, by sharing a (short) password only, with a session key. Most of the existing schemes are vulnerable to various dictionary attacks. SSL is the de facto stand...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملGame-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a great technology and an interesting candidate to provide communications for IoT networks, but numerous security and privacy issues need to be considered. In this paper, we analyze the security and ...
متن کامل