
Asian Journal of Engineering and Applied Technology (AJEAT)
A Two-Fold Authentication Mechanism for Network Security
Author : D. Selvamani and V SelviVolume 7 No.2 July-December 2018 pp 86-90
Abstract
Security is very important90 for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a double way authentication mechanism which uses the functionality of Elliptical Curve Cryptography, Kerberos System and RSA algorithm. ECC algorithm utilized to encrypt the user information whereas RSA used to encrypt the secret key itself to ensure the more security in the networks.
Keywords
Network security, Authentication, Elliptical Curve Cryptography, RSA, Kerberos system, Bit Level, Secret key, Encryption, and Decryption
References
[1] Xuanxia Yao, et al., “A lightweight multicast authentication mechanism for small scale IoT applications,” IEEE Sensors Journal, Vol.13, No. 10, pp. 3693-3701, 2013.
[2] Jiliang Zhou, “Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks,” International Journal of Distributed Sensor Networks, Vol. 9, No. 4, pp.108968, 2013.
[3] Pawani Porambage, et al., “Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed iot applications,” International Journal of Distributed Sensor Networks, Vol.10, No.7, pp.357430, 2014.
[4] Imran Memon, et al., “Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme,” Wireless Personal Communications, Vol.84, No.2, pp.1487-1508. 2015.
[5] Mahmood, Khalid, et al., “A lightweight message authentication scheme for Smart Grid communications in power sector,” Computers & Electrical Engineering, Vol.52, pp.114-124, 2016.
[6] Kakelli Anil Kumar, Addepalli VN Krishna and K. Shahu Chatrapati, “New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks,” Journal of Information and Optimization Sciences, Vol.38, No. 2, pp.341-365. 2017.
[7] Sravani Challa, et al., “An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks,” Computers & Electrical Engineering, Vol.69, pp.534-554, 2018.
[8] Chi Cheng, et al., “Securing the Internet of Things in a quantum world,” IEEE Communications Magazine, Vol.55, No. 2, pp.116-120. 2017.
[9] Marcos A. SimplicioJr, et al., “Lightweight and escrow-less authenticated key agreement for the internet of things,” Computer Communications, Vol. 98, pp. 43-51, 2017.
[10] Han Shen, et al., “Efficient RFID authentication using elliptic curve cryptography for the internet of things,” Wireless Personal Communications, Vol. 96, No. 4, pp.5253-5266, 2017.
[11] Hui Li, et al., “Securing Offline Delivery Services by Using Kerberos Authentication,” IEEE Access, Vol. 6, pp. 40735-40746, 2018.