Open Access   Article Go Back

Password Authentication in Wireless Networking using Neural Network Techniques

M. Dahiya1

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-9 , Page no. 119-122, Sep-2016

Online published on Sep 30, 2016

Copyright © M. Dahiya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: M. Dahiya, “Password Authentication in Wireless Networking using Neural Network Techniques,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.119-122, 2016.

MLA Style Citation: M. Dahiya "Password Authentication in Wireless Networking using Neural Network Techniques." International Journal of Computer Sciences and Engineering 4.9 (2016): 119-122.

APA Style Citation: M. Dahiya, (2016). Password Authentication in Wireless Networking using Neural Network Techniques. International Journal of Computer Sciences and Engineering, 4(9), 119-122.

BibTex Style Citation:
@article{Dahiya_2016,
author = {M. Dahiya},
title = {Password Authentication in Wireless Networking using Neural Network Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2016},
volume = {4},
Issue = {9},
month = {9},
year = {2016},
issn = {2347-2693},
pages = {119-122},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1064},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1064
TI - Password Authentication in Wireless Networking using Neural Network Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - M. Dahiya
PY - 2016
DA - 2016/09/30
PB - IJCSE, Indore, INDIA
SP - 119-122
IS - 9
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1440 1318 downloads 1307 downloads
  
  
           

Abstract

There are various mechanisms that provide security to the users and resources in Wireless Networking. Password authentication is one of the important procedure that enhance the security measures of the system. Drawbacks of traditional password authentication system like stolen, forgotten etc. are overcome by the technologies used for authentication mechanism like Neural Network approaches. In this paper, the two algorithms of Neural Network have been taken for conducting the experiment. Neural Network is an emerging field of Artificial Intelligence that works like a human brain. One is the Backpropagation algorithm which follows feed forward procedure and the second one is Hopfield Neural Network which works on auto associative properties of the network.

Key-Words / Index Term

Backpropagation algorithm; Hopfield Neural Network; Password authentication; Wireless Networking

References

[1] 802.11a: A Very-High-Speed, Highly Scalable Wireless LAN Standard, White Paper, www.proxim.com, 2002.
[2] L. Sachin, �Security in MANET: Vulnerabilities, Attacks and Solutions�, International Journal of Multidisciplinary and current research, Volume.02, Page No (62-68), Jan-Feb 2014.
[3] Shivlal Mewada, Aarti Shrivastava, Pradeep Sharma, N Purohit and S.S. Gautam" Performance Analysis of Encryption Algorithm in Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-03, Issue-03, pp (83-89), Jun -2014
[4] K. Sumedha, S. Ankur, �Network Security using Cryptographic Techniques�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume.02, Issue-12, Page No (105-107), December 2012.
[5] C. Zhen-Guo, C. Tzu-an, C. Zhen-Hua, �Feed Forward Neural Networks Training: a Comparison Between Genetic Algorithm and Back-Propagation Learning Algorithm�, International Journal of Innovative Computing , Information and Control, Volume.07, Isuue-10, Page No (5839-5850), October 2011.
[6] Neha Shukla, Meena Arora, "Prediction of Diabetes Using Neural Network & Random Forest Tree", International Journal of Computer Sciences and Engineering, Volume-04, Issue-07, Page No (101-104), Jul -2016
[7] I. Mukhopadhyay, M. Chakraborty, S. Chakrabarti, T. Chatterjee, � Back Propagation Neural Network Approach to Intrusion Detection�, IEEE International Conference on Recent Trends in Information Systems, pp (303-308), December 21th-23rd 2011, INSPEC Accession Number: 12542068.
[8] Dahiya. M, �Back Propagation Neural Network for Wireless Networking�, International Journal of Computer Science and Engineering, Volume.04, Issue-04, Page No (123-125), May 2016.
[9] ASN Chakravarthy, P S Avadhani, PESN Krishna Prasad, N. Rajeev, D. Rajasekhar Reddy, �A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network�, Advanced Computing: An International Journal (ACIJ), Volume.02, Issue-04, Page No (33-46), July 2011.
[10] Shouhong Wang and Hai Wang, �Password Authentication using Hopfield Neural Network�, IEEE Transactions on Systems, Man and Cybernetics- Part C: Applications and Reviews, Volume.38, Issue-02, Page No (265-268), March 2008.
[11] J.Suneetha and K.Sandhya Rani, "Recognition of Facial Expression Using AAM and Optimal Neural Networks", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (136-140), Apr -2016
[12] S. Humayun, Ye. Zhang, � Hopfield Neural Networks- A Survey�, AIKED�07 Proceedings of the 6th conference on 6th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Databases, Greece, pp (125-130), February 16th-19th 2007, ISBN: 978-960-8457-59-1.