Wide-ranging Survey on Authentication Mechanisms
نویسنده
چکیده
More than storing a huge volume of data in Datacenters, protecting them from threats is a major concern in our heterogeneous networks. From local host to cloud, finding a space to store data was the issue in the earlier whereas retrieving by the right person is the issue in the later. But in both the scenarios, protecting the data from illegal use and unethical access is dispute. Access to a sensitive data like bank account details, medical records and defense data must be restricted. Mere access privileges cannot serve the purpose. Identify the user before allowing him/her to access the data. Authenticating the user and authorize him to access the data every time could control the illegitimate accesses. This paper analysed the wide-range of authentication mechanisms irrespective of the networks.
منابع مشابه
A Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملRange Authentication Protocols for Localization
A distance bounding protocol is a type of challenge-response protocol used to measure the distance of a responder (or prover) from an initiator (or verifier). The advantage of the protocol is that, assuming that the prover does not collude with anybody else, he cannot make himself appear any closer than he is. If he colludes with somebody else, he can only appear as close as his cohort. Distanc...
متن کاملRole and Application of RFID Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns
The Internet of Things (IoT) is a very encouraging and fast-growing area that brings together the benefits of wireless systems, sensor networks, actuators, etc.A wide range of IoT applications have been targeted and several aspects of this field have been identified to address specific issues, as well as technologies and standards developed in various domains such as in radio frequency id...
متن کاملA Survey on User-Device Authentication on Emerging HCI Interfaces
As user demand and cost benefits of natural user interface technologies are hastening their wide adoption, computing devices come equipped with these natural interaction interfaces are becoming ubiquitous. Consequently, authentication mechanisms on them are becoming an essential security component to allow wider range of applications to be deployed on the devices including privacy and security ...
متن کاملSecure and Efficient Handover Schemes for WiMAX over EPON networks
In this paper, we propose an end-to-end network architecture based on Worldwide Interoperability for Microwave Access (WiMAX) over Ethernet Passive Optical Network (EPON) and present a security framework adopting both RSA and Extensible Authentication Protocol (EAP) authentication. We also introduce handover scenarios in the integrated network and propose corresponding handover schemes, for whi...
متن کامل