An Importance of the Authentication Mechanisms in the Networks: A Literature Survey
Author : D. Selvamani and V SelviVolume 7 No.2 July-December 2018 pp 57-60
Abstract
Security is very important for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a brief survey on the authentication mechanisms in the networks for ensuring the security in various domains.
Keywords
Network security, Authentication, Encryption, Decryption, Cloud, Big Data, Internet of Things, Ad Hoc Networks
References
[1] Yao, Xuanxia, et al., “A lightweight multicast authentication mechanism for small scale IoT applications”, IEEE Sensors Journal, Vol.13, No. 10, pp. 3693-3701, 2013.
[2] Lai, Chengzhe, et al., “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks”, Computer Networks, Vol.57, No. 17, pp.3492-3510, 2013.
[3] Zargar, SamanTaghavi, James Joshi and David Tipper, “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks”, IEEE Communications Surveys & Tutorials, Vol.15, No. 4, pp.2046-2069, 2013.
[4] Kothmayr, Thomas, et al., “DTLS based security and two-way authentication for the Internet of Things”, Ad Hoc Networks,Vol.11, No. 8, pp.2710-2723, 2013.
[5] Hu, Chunqiang, et al., “Body area network security: a fuzzy attribute-based signcryption scheme”, IEEE Journal on Selected Areas in Communications, Vol.31, No. 9, pp.37-46, 2013.
[6] Zhou, Jiliang, “Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol.9, No. 4, pp. 108968, 2013.
[7] He, Debiao and Ding Wang, “Robust biometrics-based authentication scheme for multiserver environment”, IEEE Systems Journal, Vol.9, No. 3, pp.816-823, 2015.
[8] Porambage, Pawani, et al., “Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed iot applications”,International Journal of Distributed Sensor Networks,Vol.10, No. 7, pp. 357430, 2014.
[9] Jan, Mian Ahmad, et al., “A robust authentication scheme for observing resources in the internet of things environment”, Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 13th International Conference, IEEE, 2014.
[10] Hummen, René, et al., “Delegation-based Authentication and Authorization for the IP-based Internet of Things”, Sensing, Communication and Networking (SECON), 2014 Eleventh Annual IEEE International Conference IEEE,2014.
[11] Porambage, Pawani, et al., “Two-phase authentication protocol for wireless sensor networks in distributed IoT applications”,Wireless Communications and Networking Conference (WCNC), IEEE, 2014.
[12] Shin, Soobok, HongjinYeh and Kangseok Kim, “An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks”, Peer-to-peer Networking and Applications, Vol. 8, No. 4, pp. 674-683, 2015.
[13] Memon, Imran, et al., “Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme”,Wireless PersonalCommunications, Vol. 84, No. 2, pp. 1487-1508, 2015.
[14] Gope, Prosanta and Tzonelih Hwang, “Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks”, Wireless Personal Communications, Vol. 82, No. 4, pp. 2231-2245, 2015.
[15] Wen, Fengtong, Willy Susilo and Guomin Yang, “A secure and effective anonymous user authentication scheme for roaming service in global mobility networks”, Wireless personal communications, Vol. 73, No. 3, pp. 993-1004, 2013.
[16] Jiang, Qi, et al., “Improvement of robust smart‐card‐based password authentication scheme”, International Journal of Communication Systems, Vol. 28, No. 2, pp. 383-393, 2015.
[17] Chen, Bae‐Ling, Wen‐Chung Kuo and Lih‐ChyauWuu, “Robust smart‐card‐based remote user password authentication scheme”, International Journal of Communication Systems, Vol. 27, No. 2, pp. 377-389, 2014.
[18] Neeraj Kumar, et al., “An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud”,Peer-to-Peer Networking and Applications, Vol. 9, No. 5, pp. 824-840, 2016.
[19] Yan, Zheng, Peng Zhang and Athanasios V. Vasilakos, “A security and trust framework for virtualized networks and software‐defined networking”,Security and communication networks, Vol. 9, No. 16, pp. 3059-3069, 2016.
[20] Kumari, Saru, et al., “An enhanced and secure trust‐extended authentication mechanism for vehicular ad‐hoc networks”, Security and Communication Networks, Vol. 9, No. 17, pp. 4255-4271, 2016.
[21] Ahmed, Adnan, et al., “A secure routing protocol with trust and energy awareness for wireless sensor network”,Mobile Networks and Applications, Vol. 21, No. 2, pp. 272-285, 2016.
[22] Mahmood, Khalid, et al., “A lightweight message authentication scheme for Smart Grid communications in power sector”, Computers & Electrical Engineering, Vol. 52, pp. 114-124, 2016.
[23] Lai, Chengzhe, et al., “GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications”, Computer Networks, Vol. 99, pp. 66-81, 2016.
[24] Ntalianis, Klimis and Nicolas Tsapatsoulis, “Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks”, IEEE Transactions on Emerging Topics in Computing, Vol. 4, No. 1, pp. 156-174, 2016.
[25] Jung, Jaewook, et al., “Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks”,Sensors, Vol. 17, No. 3, pp. 644.
[26] Li, Xiong, et al., “Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks”,Computer Networks, Vol. 129, pp. 429-443, 2017.
[27] Kumar, Kakelli Anil, Addepalli V. N. Krishna and K. ShahuChatrapati, “New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks”, Journal of Information and Optimization Sciences, Vol. 38, No. 2, pp. 341-365, 2017.
[28] Vijayakumar, Pandi, et al., “Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks”,Cluster Computing, Vol. 20, No. 3, pp. 2439-2450, 2017.
[29] Dhillon, ParwinderKaur and SheetalKalra, “A lightweight biometrics based remote user authentication scheme for IoT services”,Journal of Information Security and Applications, Vol. 34, pp. 255-270, 2017.
[30] Shen, Jian, et al., “Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks”,Journal of Network and Computer Applications, Vol. 106, pp. 117-123, 2018.
[31] Li, Xiong, et al., “A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments”,Journal of Network and Computer Applications, Vol. 103, pp. 194-204, 2018.
[32] Wei, Fushan, et al., “A provably secure password-based anonymous authentication scheme for wireless body area networks”,Computers & Electrical Engineering, Vol. 65, pp. 322-331, 2018.
[33] Tonyali, Samet, et al., “Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems”,Future Generation Computer Systems, Vol. 78, pp. 547-557, 2018.
[34] Sravani Challa, et al., “An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks”, Computers & Electrical Engineering, Vol. 69, pp. 534-554, 2018.
[35] Jianbing Ni, Xiaodong Lin and Xuemin Sherman Shen, “Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT”, IEEE Journal on Selected Areas in Communications, Vol. 36.3, pp. 644-657, 2018.
[36] SK Hafizu Islam, et al., “A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs”, Future Generation Computer Systems, Vol. 84, pp. 216-227, 2018.
[37] Mohamed M. Mansour, Fatty M. Salem and Elsayed M. Saad, “A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks”, International Conference on Advanced Intelligent Systems and Informatics, Springer, Cham, 2018.
AJES Vol.7 No.2 July-December 2018
D. Selvamani and V Selvi[1] Yao, Xuanxia, et al., “A lightweight multicast authentication mechanism for small scale IoT applications”, IEEE Sensors Journal, Vol.13, No. 10, pp. 3693-3701, 2013.
[2] Lai, Chengzhe, et al., “SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks”, Computer Networks, Vol.57, No. 17, pp.3492-3510, 2013.
[3] Zargar, SamanTaghavi, James Joshi and David Tipper, “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks”, IEEE Communications Surveys & Tutorials, Vol.15, No. 4, pp.2046-2069, 2013.
[4] Kothmayr, Thomas, et al., “DTLS based security and two-way authentication for the Internet of Things”, Ad Hoc Networks,Vol.11, No. 8, pp.2710-2723, 2013.
[5] Hu, Chunqiang, et al., “Body area network security: a fuzzy attribute-based signcryption scheme”, IEEE Journal on Selected Areas in Communications, Vol.31, No. 9, pp.37-46, 2013.
[6] Zhou, Jiliang, “Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks”, International Journal of Distributed Sensor Networks, Vol.9, No. 4, pp. 108968, 2013.
[7] He, Debiao and Ding Wang, “Robust biometrics-based authentication scheme for multiserver environment”, IEEE Systems Journal, Vol.9, No. 3, pp.816-823, 2015.
[8] Porambage, Pawani, et al., “Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed iot applications”,International Journal of Distributed Sensor Networks,Vol.10, No. 7, pp. 357430, 2014.
[9] Jan, Mian Ahmad, et al., “A robust authentication scheme for observing resources in the internet of things environment”, Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 13th International Conference, IEEE, 2014.
[10] Hummen, René, et al., “Delegation-based Authentication and Authorization for the IP-based Internet of Things”, Sensing, Communication and Networking (SECON), 2014 Eleventh Annual IEEE International Conference IEEE,2014.
[11] Porambage, Pawani, et al., “Two-phase authentication protocol for wireless sensor networks in distributed IoT applications”,Wireless Communications and Networking Conference (WCNC), IEEE, 2014.
[12] Shin, Soobok, HongjinYeh and Kangseok Kim, “An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks”, Peer-to-peer Networking and Applications, Vol. 8, No. 4, pp. 674-683, 2015.
[13] Memon, Imran, et al., “Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme”,Wireless PersonalCommunications, Vol. 84, No. 2, pp. 1487-1508, 2015.
[14] Gope, Prosanta and Tzonelih Hwang, “Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks”, Wireless Personal Communications, Vol. 82, No. 4, pp. 2231-2245, 2015.
[15] Wen, Fengtong, Willy Susilo and Guomin Yang, “A secure and effective anonymous user authentication scheme for roaming service in global mobility networks”, Wireless personal communications, Vol. 73, No. 3, pp. 993-1004, 2013.
[16] Jiang, Qi, et al., “Improvement of robust smart‐card‐based password authentication scheme”, International Journal of Communication Systems, Vol. 28, No. 2, pp. 383-393, 2015.
[17] Chen, Bae‐Ling, Wen‐Chung Kuo and Lih‐ChyauWuu, “Robust smart‐card‐based remote user password authentication scheme”, International Journal of Communication Systems, Vol. 27, No. 2, pp. 377-389, 2014.
[18] Neeraj Kumar, et al., “An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud”,Peer-to-Peer Networking and Applications, Vol. 9, No. 5, pp. 824-840, 2016.
[19] Yan, Zheng, Peng Zhang and Athanasios V. Vasilakos, “A security and trust framework for virtualized networks and software‐defined networking”,Security and communication networks, Vol. 9, No. 16, pp. 3059-3069, 2016.
[20] Kumari, Saru, et al., “An enhanced and secure trust‐extended authentication mechanism for vehicular ad‐hoc networks”, Security and Communication Networks, Vol. 9, No. 17, pp. 4255-4271, 2016.
[21] Ahmed, Adnan, et al., “A secure routing protocol with trust and energy awareness for wireless sensor network”,Mobile Networks and Applications, Vol. 21, No. 2, pp. 272-285, 2016.
[22] Mahmood, Khalid, et al., “A lightweight message authentication scheme for Smart Grid communications in power sector”, Computers & Electrical Engineering, Vol. 52, pp. 114-124, 2016.
[23] Lai, Chengzhe, et al., “GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications”, Computer Networks, Vol. 99, pp. 66-81, 2016.
[24] Ntalianis, Klimis and Nicolas Tsapatsoulis, “Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks”, IEEE Transactions on Emerging Topics in Computing, Vol. 4, No. 1, pp. 156-174, 2016.
[25] Jung, Jaewook, et al., “Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks”,Sensors, Vol. 17, No. 3, pp. 644.
[26] Li, Xiong, et al., “Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks”,Computer Networks, Vol. 129, pp. 429-443, 2017.
[27] Kumar, Kakelli Anil, Addepalli V. N. Krishna and K. ShahuChatrapati, “New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks”, Journal of Information and Optimization Sciences, Vol. 38, No. 2, pp. 341-365, 2017.
[28] Vijayakumar, Pandi, et al., “Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks”,Cluster Computing, Vol. 20, No. 3, pp. 2439-2450, 2017.
[29] Dhillon, ParwinderKaur and SheetalKalra, “A lightweight biometrics based remote user authentication scheme for IoT services”,Journal of Information Security and Applications, Vol. 34, pp. 255-270, 2017.
[30] Shen, Jian, et al., “Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks”,Journal of Network and Computer Applications, Vol. 106, pp. 117-123, 2018.
[31] Li, Xiong, et al., “A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments”,Journal of Network and Computer Applications, Vol. 103, pp. 194-204, 2018.
[32] Wei, Fushan, et al., “A provably secure password-based anonymous authentication scheme for wireless body area networks”,Computers & Electrical Engineering, Vol. 65, pp. 322-331, 2018.
[33] Tonyali, Samet, et al., “Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems”,Future Generation Computer Systems, Vol. 78, pp. 547-557, 2018.
[34] Sravani Challa, et al., “An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks”, Computers & Electrical Engineering, Vol. 69, pp. 534-554, 2018.
[35] Jianbing Ni, Xiaodong Lin and Xuemin Sherman Shen, “Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT”, IEEE Journal on Selected Areas in Communications, Vol. 36.3, pp. 644-657, 2018.
[36] SK Hafizu Islam, et al., “A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs”, Future Generation Computer Systems, Vol. 84, pp. 216-227, 2018.
[37] Mohamed M. Mansour, Fatty M. Salem and Elsayed M. Saad, “A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks”, International Conference on Advanced Intelligent Systems and Informatics, Springer, Cham, 2018.