Secured Authentication Protocol System Using Images
نویسندگان
چکیده
In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this paper a Secured Authentication Protocol System using Images (SAPSI) is presented. It ensures confidentiality, and authentication using server and Image based authentication mechanism. KeywordsConfidentiality, Security, Server, Image-Based Authentication System, Authentication.
منابع مشابه
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
In 2014, Yeh et al. proposed a robust smart card secured authentication scheme on SIP using elliptic curve cryptography to conquer many forms of attacks in previous protocols. Yeh et al. claimed that their proposed protocol is more efficient than Diffie-Hellman’s concept authentication protocols for SIP and performs secured mutual authentication, which can be implemented on different real netwo...
متن کاملHMAC-Based Authentication Protocol: Attacks and Improvements
As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملSecured Communication Protocol via Encrypted Key Ensuring Message Integrity
The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cry...
متن کاملSecurity Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System
Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010