A Two-Fold Authentication Mechanism for Network Security

Authors

  • D. Selvamani Assistant Professor, Department of Computer Science, SIVET College, Gowrivakkam, Chennai, Tamil Nadu, India
  • V. Selvi Assistant Professor, Department of Computer Science, Mother Teresa Women’s University, Kodaikanal, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajeat-2018.7.2.1001

Keywords:

Network security, Authentication, Elliptical Curve Cryptography, RSA, Kerberos system, Bit Level, Secret key, Encryption, Decryption

Abstract

Security is very important90 for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a double way authentication mechanism which uses the functionality of Elliptical Curve Cryptography, Kerberos System and RSA algorithm. ECC algorithm utilized to encrypt the user information whereas RSA used to encrypt the secret key itself to ensure the more security in the networks.

References

X. Yao et al., "A lightweight multicast authentication mechanism for small scale IoT applications," IEEE Sensors Journal, vol. 13, no. 10, pp. 3693-3701, 2013.

J. Zhou, "Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 9, no. 4, pp. 108968, 2013.

P. Porambage et al., "Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed iot applications," International Journal of Distributed Sensor Networks, vol. 10, no. 7, pp. 357430, 2014.

I. Memon et al., "Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme," Wireless Personal Communications, vol. 84, no. 2, pp. 1487-1508, 2015.

K. Mahmood et al., "A lightweight message authentication scheme for Smart Grid communications in power sector," Computers & Electrical Engineering, vol. 52, pp. 114-124, 2016.

K. A. Kumar, A. V. N. Krishna, and K. S. Chatrapati, "New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks," Journal of Information and Optimization Sciences, vol. 38, no. 2, pp. 341-365, 2017.

S. Challa et al., "An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks," Computers & Electrical Engineering, vol. 69, pp. 534-554, 2018.

C. Cheng et al., "Securing the Internet of Things in a quantum world," IEEE Communications Magazine, vol. 55, no. 2, pp. 116-120, 2017.

M. A. SimplicioJr et al., "Lightweight and escrow-less authenticated key agreement for the internet of things," Computer Communications, vol. 98, pp. 43-51, 2017.

H. Shen et al., "Efficient RFID authentication using elliptic curve cryptography for the internet of things," Wireless Personal Communications, vol. 96, no. 4, pp. 5253-5266, 2017.

H. Li et al., "Securing Offline Delivery Services by Using Kerberos Authentication," IEEE Access, vol. 6, pp. 40735-40746, 2018.

Downloads

Published

29-08-2018

How to Cite

Selvamani, D., & Selvi, V. (2018). A Two-Fold Authentication Mechanism for Network Security. Asian Journal of Engineering and Applied Technology, 7(2), 86–90. https://doi.org/10.51983/ajeat-2018.7.2.1001