Password Authentication in Wireless Networking using Neural Network Techniques
M. Dahiya1
Section:Review Paper, Product Type: Journal Paper
Volume-4 ,
Issue-9 , Page no. 119-122, Sep-2016
Online published on Sep 30, 2016
Copyright © M. Dahiya . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: M. Dahiya, “Password Authentication in Wireless Networking using Neural Network Techniques,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.9, pp.119-122, 2016.
MLA Style Citation: M. Dahiya "Password Authentication in Wireless Networking using Neural Network Techniques." International Journal of Computer Sciences and Engineering 4.9 (2016): 119-122.
APA Style Citation: M. Dahiya, (2016). Password Authentication in Wireless Networking using Neural Network Techniques. International Journal of Computer Sciences and Engineering, 4(9), 119-122.
BibTex Style Citation:
@article{Dahiya_2016,
author = {M. Dahiya},
title = {Password Authentication in Wireless Networking using Neural Network Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2016},
volume = {4},
Issue = {9},
month = {9},
year = {2016},
issn = {2347-2693},
pages = {119-122},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1064},
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1064
TI - Password Authentication in Wireless Networking using Neural Network Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - M. Dahiya
PY - 2016
DA - 2016/09/30
PB - IJCSE, Indore, INDIA
SP - 119-122
IS - 9
VL - 4
SN - 2347-2693
ER -
VIEWS | XML | |
1499 | 1353 downloads | 1400 downloads |
Abstract
There are various mechanisms that provide security to the users and resources in Wireless Networking. Password authentication is one of the important procedure that enhance the security measures of the system. Drawbacks of traditional password authentication system like stolen, forgotten etc. are overcome by the technologies used for authentication mechanism like Neural Network approaches. In this paper, the two algorithms of Neural Network have been taken for conducting the experiment. Neural Network is an emerging field of Artificial Intelligence that works like a human brain. One is the Backpropagation algorithm which follows feed forward procedure and the second one is Hopfield Neural Network which works on auto associative properties of the network.
Key-Words / Index Term
Backpropagation algorithm; Hopfield Neural Network; Password authentication; Wireless Networking
References
[1] 802.11a: A Very-High-Speed, Highly Scalable Wireless LAN Standard, White Paper, www.proxim.com, 2002.
[2] L. Sachin, �Security in MANET: Vulnerabilities, Attacks and Solutions�, International Journal of Multidisciplinary and current research, Volume.02, Page No (62-68), Jan-Feb 2014.
[3] Shivlal Mewada, Aarti Shrivastava, Pradeep Sharma, N Purohit and S.S. Gautam" Performance Analysis of Encryption Algorithm in Cloud Computing", International Journal of Computer Sciences and Engineering, Volume-03, Issue-03, pp (83-89), Jun -2014
[4] K. Sumedha, S. Ankur, �Network Security using Cryptographic Techniques�, International Journal of Advanced Research in Computer Science and Software Engineering, Volume.02, Issue-12, Page No (105-107), December 2012.
[5] C. Zhen-Guo, C. Tzu-an, C. Zhen-Hua, �Feed Forward Neural Networks Training: a Comparison Between Genetic Algorithm and Back-Propagation Learning Algorithm�, International Journal of Innovative Computing , Information and Control, Volume.07, Isuue-10, Page No (5839-5850), October 2011.
[6] Neha Shukla, Meena Arora, "Prediction of Diabetes Using Neural Network & Random Forest Tree", International Journal of Computer Sciences and Engineering, Volume-04, Issue-07, Page No (101-104), Jul -2016
[7] I. Mukhopadhyay, M. Chakraborty, S. Chakrabarti, T. Chatterjee, � Back Propagation Neural Network Approach to Intrusion Detection�, IEEE International Conference on Recent Trends in Information Systems, pp (303-308), December 21th-23rd 2011, INSPEC Accession Number: 12542068.
[8] Dahiya. M, �Back Propagation Neural Network for Wireless Networking�, International Journal of Computer Science and Engineering, Volume.04, Issue-04, Page No (123-125), May 2016.
[9] ASN Chakravarthy, P S Avadhani, PESN Krishna Prasad, N. Rajeev, D. Rajasekhar Reddy, �A Novel Approach for Authenticating Textual or Graphical Passwords Using Hopfield Neural Network�, Advanced Computing: An International Journal (ACIJ), Volume.02, Issue-04, Page No (33-46), July 2011.
[10] Shouhong Wang and Hai Wang, �Password Authentication using Hopfield Neural Network�, IEEE Transactions on Systems, Man and Cybernetics- Part C: Applications and Reviews, Volume.38, Issue-02, Page No (265-268), March 2008.
[11] J.Suneetha and K.Sandhya Rani, "Recognition of Facial Expression Using AAM and Optimal Neural Networks", International Journal of Computer Sciences and Engineering, Volume-04, Issue-04, Page No (136-140), Apr -2016
[12] S. Humayun, Ye. Zhang, � Hopfield Neural Networks- A Survey�, AIKED�07 Proceedings of the 6th conference on 6th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Databases, Greece, pp (125-130), February 16th-19th 2007, ISBN: 978-960-8457-59-1.