Redirigiendo al acceso original de articulo en 15 segundos...
ARTÍCULO
TITULO

A Novel Authentication Mechanism to Prevent Unauthorized Service Access for Mobile Device in Distributed Network

Pavani V L    

Resumen

The growth of distributed computer networks (DCN) is simple for the user to share information and computing capabilities with the host. User identification is an essential access control mechanism for the client-server networking architecture. The perception of single sign-on allows a legitimate user to access a different service provider on a DCN using a single session key. Recently, several user identification techniques being proposed for DCN. Unfortunately, the existing proposals cannot maintain user anonymity when the majority of probable attacks. In addition, the further time synchronization mechanism they use can result in widespread overhead costs. To overcome these shortcomings, we propose a novel authentication mechanism to prevent unauthorized service access for a mobile device in distributed networks. The mechanism implements methods to generate securely encrypted keys using RSA algorithm to validate the authentication of user login id and password.  Later, it implements a secure session key generation using DH algorithm which allows accessing the different services without repeating the authentication mechanism. An experimental evaluation was performed to measure execution time overhead for the registration process, an authentication process, session key generation process and Service Request Performance. The comparison results with existing authentication mechanism show an improvisation in all the measures.

 Artículos similares

       
 
Rogelio Reyes-Reyes, Clara Cruz-Ramos, Volodymyr Ponomaryov, Beatriz P. Garcia-Salgado and Javier Molina-Garcia    
In this paper, a fragile watermarking scheme for color image authentication and self-recovery with high tampering rates is proposed. The original image is sub-sampled and divided into non-overlapping blocks, where a watermark used for recovery purposes i... ver más
Revista: Applied Sciences

 
Yaser Ali Enaya,Mohammed Jawad Mohammed,Ghassan Abdulhussein Bilal     Pág. pp. 163 - 179
This study introduces a novel authentication methodology; it is based on pattern recognition of fingers size and pressure when users touch smartphone screen. By analyzing diagrams of these touches and applying data mining for the first time as an authent... ver más

 
Smruti Chourasia,Hrishikesh Bharadwaj Chakrapani,Queenie Das,Krati Agarwal,Lavanya K    
The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized k... ver más

 
Krzysztof Golofit and Piotr Z. Wieczorek    
The concept presented in this paper fits into the current trend of highly secured hardware authentication designs utilizing Physically Unclonable Functions (PUFs) or Physical Obfuscated Keys (POKs). We propose an idea that the PUF cryptographic keys can ... ver más
Revista: Applied Sciences

 
Mrinmoy Sarkar, Dhiman Chowdhury, Celia Shahnaz and Shaikh Anowarul Fattah    
Electrical network frequency (ENF) is a signature of a power distribution grid. It represents the deviation from the nominal frequency (50 or 60 Hz) of a power system network. The variations in ENF sequences within a grid are subject to load fluctuations... ver más
Revista: Applied Sciences