Open Access Open Access  Restricted Access Subscription Access

Network Security Analysis Supported Authentication Techniques


Affiliations
1 PIRENS Institute of Computer Technology (PICT), LONI, India
 

System Security issues square measure right now changing into essential as society is moving to advanced data age. Data security is the most extreme fundamental component in ensuring safe transmission of data through the net. It incorporates approval of access to information in an extremely organize, controlled by the system manager. The undertaking of Network security not exclusively needs ensuring the security of complete frameworks anyway of the entire system. Verification is one among the first and most usually routes that of finding out and ensuring security inside the system. Amid this paper, an undertaking has been made to dissect the various confirmation procedures, for example, Knowledge-based, Token-based and Biometric-based and so forth additionally; we tend to consider multifactor verifications by choosing a mix of above strategies and endeavor to analyze them.

Keywords

Authentication, Denial of Administration, Virtual Individual Network, Passcode, Sensible Card.
Notifications

  • AAAand Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IPMobility
  • Authentication from password to public key by Richard E. Smith
  • [https://www.alliancetechpartners.com/common-authentication-methods-used-network-security/.
  • [https://www.techrepublic.com/article/understanding-and-selecting-authentication-methods/
  • https://www.bu.edu/tech/about/security-resources/bestpractice/auth/

Abstract Views: 233

PDF Views: 78




  • Network Security Analysis Supported Authentication Techniques

Abstract Views: 233  |  PDF Views: 78

Authors

Rutuja V. Kotkar
PIRENS Institute of Computer Technology (PICT), LONI, India
Mayuri B. Dandwate
PIRENS Institute of Computer Technology (PICT), LONI, India

Abstract


System Security issues square measure right now changing into essential as society is moving to advanced data age. Data security is the most extreme fundamental component in ensuring safe transmission of data through the net. It incorporates approval of access to information in an extremely organize, controlled by the system manager. The undertaking of Network security not exclusively needs ensuring the security of complete frameworks anyway of the entire system. Verification is one among the first and most usually routes that of finding out and ensuring security inside the system. Amid this paper, an undertaking has been made to dissect the various confirmation procedures, for example, Knowledge-based, Token-based and Biometric-based and so forth additionally; we tend to consider multifactor verifications by choosing a mix of above strategies and endeavor to analyze them.

Keywords


Authentication, Denial of Administration, Virtual Individual Network, Passcode, Sensible Card.

References





DOI: https://doi.org/10.17697/ibmrd%2F2018%2Fv7i1%2F128768