An Efficient Authentication Technique to Protect IoT Networks from Impact of RPL Attacks

Author(s):  
Smita Sanjay Ambarkar ◽  
Narendra Shekokar
2017 ◽  
Vol 7 (1.2) ◽  
pp. 9 ◽  
Author(s):  
Shwetambari Kharabe ◽  
C. Nalini

Exploding growth in the field of electronic information technology, the finger vein authentication technique plays a vibrant role for personal identification and verification. In recent era, this technique is gaining popularity, as it provides a high security and convenience approach for personal authentication. Vein biometrics is an emerging methodologycomparing to other systems, due to its strengths of low forgery risk, aliveness detection and stableness over long period of time. Literatures published based on different techniques used forand authentication process are described and evaluated in this paper. These processes hadgained an outstanding promise in variety of applications and much attention among researchers to provide combine accuracy, universality and cost efficiency. This paper in brief, reviews various approaches used for finger vein segmentation and feature extraction. The reviews are based on finger vein basic principles, image acquisition methodology, pre-processing functions, segmentation, feature extraction,classification, matching and identification procedures, which are analyzed scientifically, thoroughly and comprehensively.Based on the analysis, the ideal process and procedure is identified, which will be an idyllic solution for finger vein authentication.


Author(s):  
Abinaya R

Password authentication is the most widely used authentication technique, for it is available at a low cost and easy to deploy. Many users usually set their passwords using familiar vocabulary for its convenience to remember. Passwords may be leaked from weak systems. Vulnerabilities are continuously being determined, and no longer all systems may be well timed patched to resist attacks, which give adversaries an opportunity to illegally access vulnerable systems. To overcome the vulnerabilities of password attacks, here propose a password authentication framework that is designed for secure password storage and could be easily integrated into existing authentication systems. In our framework, first, the received plain password from a client is hashed through a cryptographic hash function (e.g., SHA-512). Then, the hashed password is randomly shuffled to get a negative password. Finally, the negative password is encrypted into an Encrypted Negative Password using a symmetric-key algorithm RC5, to further improve security. The proposed hash function and encryption methodologies make it difficult to break passwords from ENPs. This proposed ENP system will be implemented for banking environment to improve security of password storage and transaction details.


2019 ◽  
Vol 65 (2) ◽  
pp. 215-223 ◽  
Author(s):  
Mudassar Ali Khan ◽  
Ikram Ud Din ◽  
Sultan Ullah Jadoon ◽  
Muhammad Khurram Khan ◽  
Mohsen Guizani ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document