An Importance of the Authentication Mechanisms in the Networks: A Literature Survey

Authors

  • D. Selvamani Assistant Professor, Department of Computer Science, SIVET College, Gowrivakkam, Chennai, Tamil Nadu, India
  • V Selvi Assistant Professor, Department of Computer Science, Mother Teresa Women’s University, Kodaikanal, Tamil Nadu, India

DOI:

https://doi.org/10.51983/ajes-2018.7.2.2160

Keywords:

Network security, Authentication, Encryption, Decryption, Cloud, Big Data, Internet of Things, Ad Hoc Networks

Abstract

Security is very important for any kind of networks. As a main communication mode, the security mechanism for multicast is not only the measure to ensure secured communications, but also the precondition for other security services. Attacks are one of the biggest concerns for security professionals. Attackers usually gain access to a large number of computers by exploiting their vulnerabilities to set up attack armies. This paper presents a brief survey on the authentication mechanisms in the networks for ensuring the security in various domains.

References

X. Yao et al., "A lightweight multicast authentication mechanism for small scale IoT applications," IEEE Sensors Journal, vol. 13, no. 10, pp. 3693-3701, 2013.

C. Lai et al., "SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks," Computer Networks, vol. 57, no. 17, pp. 3492-3510, 2013.

S. Taghavi Zargar, J. Joshi, and D. Tipper, "A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks," IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 2046-2069, 2013.

T. Kothmayr et al., "DTLS based security and two-way authentication for the Internet of Things," Ad Hoc Networks, vol. 11, no. 8, pp. 2710-2723, 2013.

C. Hu et al., "Body area network security: a fuzzy attribute-based signcryption scheme," IEEE Journal on Selected Areas in Communications, vol. 31, no. 9, pp. 37-46, 2013.

J. Zhou, "Efficient and secure routing protocol based on encryption and authentication for wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 9, no. 4, pp. 108968, 2013.

D. He and D. Wang, "Robust biometrics-based authentication scheme for multiserver environment," IEEE Systems Journal, vol. 9, no. 3, pp. 816-823, 2015.

P. Porambage et al., "Pauthkey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications," International Journal of Distributed Sensor Networks, vol. 10, no. 7, pp. 357430, 2014.

M. A. Jan et al., "A robust authentication scheme for observing resources in the internet of things environment," in Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE 13th International Conference, IEEE, 2014.

R. Hummen et al., "Delegation-based Authentication and Authorization for the IP-based Internet of Things," in Sensing, Communication and Networking (SECON), 2014 Eleventh Annual IEEE International Conference, IEEE, 2014.

P. Porambage et al., "Two-phase authentication protocol for wireless sensor networks in distributed IoT applications," in Wireless Communications and Networking Conference (WCNC), IEEE, 2014.

S. Shin, H. Yeh, and K. Kim, "An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks," Peer-to-peer Networking and Applications, vol. 8, no. 4, pp. 674-683, 2015.

I. Memon et al., "Enhanced privacy and authentication: An efficient and secure anonymous communication for location based service using asymmetric cryptography scheme," Wireless Personal Communications, vol. 84, no. 2, pp. 1487-1508, 2015.

P. Gope and T. Hwang, "Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks," Wireless Personal Communications, vol. 82, no. 4, pp. 2231-2245, 2015.

F. Wen et al., "A secure and effective anonymous user authentication scheme for roaming service in global mobility networks," Wireless personal communications, vol. 73, no. 3, pp. 993-1004, 2013.

Q. Jiang et al., "Improvement of robust smart‐card‐based password authentication scheme," International Journal of Communication Systems, vol. 28, no. 2, pp. 383-393, 2015.

B. Chen, W. Kuo, and L. Wuu, "Robust smart‐card‐based remote user password authentication scheme," International Journal of Communication Systems, vol. 27, no. 2, pp. 377-389, 2014.

N. Kumar et al., "An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud," Peer-to-Peer Networking and Applications, vol. 9, no. 5, pp. 824-840, 2016.

Z. Yan, P. Zhang, and A. V. Vasilakos, "A security and trust framework for virtualized networks and software‐defined networking," Security and communication networks, vol. 9, no. 16, pp. 3059-3069, 2016.

S. Kumari et al., "An enhanced and secure trust‐extended authentication mechanism for vehicular ad‐hoc networks," Security and Communication Networks, vol. 9, no. 17, pp. 4255-4271, 2016.

A. Ahmed et al., "A secure routing protocol with trust and energy awareness for wireless sensor network," Mobile Networks and Applications, vol. 21, no. 2, pp. 272-285, 2016.

K. Mahmood et al., "A lightweight message authentication scheme for Smart Grid communications in power sector," Computers & Electrical Engineering, vol. 52, pp. 114-124, 2016.

C. Lai et al., "GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications," Computer Networks, vol. 99, pp. 66-81, 2016.

K. Ntalianis and N. Tsapatsoulis, "Remote authentication via biometrics: A robust video-object steganographic mechanism over wireless networks," IEEE Transactions on Emerging Topics in Computing, vol. 4, no. 1, pp. 156-174, 2016.

J. Jung et al., "Efficient and security enhanced anonymous authentication with key agreement scheme in wireless sensor networks," Sensors, vol. 17, no. 3, pp. 644, 2017.

X. Li et al., "Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks," Computer Networks, vol. 129, pp. 429-443, 2017.

K. A. Kumar et al., "New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks," Journal of Information and Optimization Sciences, vol. 38, no. 2, pp. 341-365, 2017.

P. Vijayakumar et al., "Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks," Cluster Computing, vol. 20, no. 3, pp. 2439-2450, 2017.

P. Dhillon and S. Kalra, "A lightweight biometrics based remote user authentication scheme for IoT services," Journal of Information Security and Applications, vol. 34, pp. 255-270, 2017.

J. Shen et al., "Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks," Journal of Network and Computer Applications, vol. 106, pp. 117-123, 2018.

X. Li et al., "A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments," Journal of Network and Computer Applications, vol. 103, pp. 194-204, 2018.

F. Wei et al., "A provably secure password-based anonymous authentication scheme for wireless body area networks," Computers & Electrical Engineering, vol. 65, pp. 322-331, 2018.

S. Tonyali et al., "Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled smart metering systems," Future Generation Computer Systems, vol. 78, pp. 547-557, 2018.

S. Challa et al., "An efficient ECC-based provably secure three-factor user authentication and key agreement protocol for wireless healthcare sensor networks," Computers & Electrical Engineering, vol. 69, pp. 534-554, 2018.

J. Ni, X. Lin, and X. S. Shen, "Efficient and Secure Service-Oriented Authentication Supporting Network Slicing for 5G-Enabled IoT," IEEE Journal on Selected Areas in Communications, vol. 36, no. 3, pp. 644-657, 2018.

S. K. H. Islam et al., "A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs," Future Generation Computer Systems, vol. 84, pp. 216-227, 2018.

M. M. Mansour, F. M. Salem, and E. M. Saad, "A Secure Mutual Authentication Scheme with Perfect Forward-Secrecy for Wireless Sensor Networks," in International Conference on Advanced Intelligent Systems and Informatics, Springer, Cham, 2018.

Downloads

Published

10-10-2018

How to Cite

Selvamani, D., & Selvi, V. . (2018). An Importance of the Authentication Mechanisms in the Networks: A Literature Survey. Asian Journal of Electrical Sciences, 7(2), 57–60. https://doi.org/10.51983/ajes-2018.7.2.2160