Open Access   Article Go Back

Authentication Protocols and Techniques: A Survey

Ambuj Prakash1 , Umesh Kumar2

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 1014-1020, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.10141020

Online published on Jun 30, 2018

Copyright © Ambuj Prakash, Umesh Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ambuj Prakash, Umesh Kumar, “Authentication Protocols and Techniques: A Survey,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1014-1020, 2018.

MLA Style Citation: Ambuj Prakash, Umesh Kumar "Authentication Protocols and Techniques: A Survey." International Journal of Computer Sciences and Engineering 6.6 (2018): 1014-1020.

APA Style Citation: Ambuj Prakash, Umesh Kumar, (2018). Authentication Protocols and Techniques: A Survey. International Journal of Computer Sciences and Engineering, 6(6), 1014-1020.

BibTex Style Citation:
@article{Prakash_2018,
author = {Ambuj Prakash, Umesh Kumar},
title = {Authentication Protocols and Techniques: A Survey},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1014-1020},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2291},
doi = {https://doi.org/10.26438/ijcse/v6i6.10141020}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.10141020}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2291
TI - Authentication Protocols and Techniques: A Survey
T2 - International Journal of Computer Sciences and Engineering
AU - Ambuj Prakash, Umesh Kumar
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1014-1020
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
856 339 downloads 198 downloads
  
  
           

Abstract

Authentication is the process of confirming the authenticity of a client to identify its validity. If the user is valid then server permits the accessibility of its assets. Many authentication techniques and protocols are available to protect the server’s assets from getting unauthorized access. This paper presents an overview of different factors, protocols and methods associated with authentication and their importance in real life scenarios. Extensible Authentication Protocol (EAP) is a framework which aims to provide a flexible authentication for wireless networks. The aim of this survey paper is to study the widely used authentication methods and their evaluation for advantages and disadvantages.

Key-Words / Index Term

authentication, authentication protocols, factors, EAP ,TLS, TTLS, MD5, LEAP, PEAP

References

[1] Yogita Borse and Irfan Siddavatam. “A Novel Secure Remote User Authentication Protocol using Three Factors”, International Journal of Computer Applications, vol. 87, no. 17, pp. 1-6, February 2014.
[2] Dwiti Pandya, Ram Narayan, Sneha Thakkar, Tanvi Madhekar and Bhushan Thakare “An Overview of Various Authentication Methods and Protocols”, International Journal of Computer Applications, vol. 131, no. 9, pp. 25-27, 2015.
[3] Khaled Baqer, Johann Bezuidenhoudt, Ross Anderson and Markus Kuhn, “SMAPs: Short Message Authentication Protocols”, pp. 119-132, 2017.
[4] JC Mitchell, A Roy, P Rowe and A Scedrov “Analysis of EAP-GPSK authentication protocol”, International Conference on Applied Cryptography and Network Security, pp. 309-327, 2008.
[5] Li Ping Du and Jian WeiGuo Ying Li, "Research on Micro-Certificate Based Security System for Internet of Things", Applied Mechanics and Materials, vol. 263, pp. 3125-3129, 2013.
[6] Sonal Fatangare and Archana Lomte, “SWAP: Secure Web Authentication Protocol on Windows Mobile App”, International Journal of Computer Science and Mobile Computing, vol. 3, no. 6, pp. 674–680, 2014.
[7] P. Pacyna and R. Chrabąszcz, "Evaluation of EAP re-authentication protocol”, 17th International Telecommunications Network Strategy and Planning Symposium (Networks), Montreal, pp. 45-49, 2016.
[8] K. Bhatele, A. Sinhal and M. Pathak, "A novel approach to the design of a new hybrid security protocol architecture," IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), Ramanathapuram, pp. 429-433, 2012.
[9] Xiumei Liu, Junjiang Liu and Guiran Chang, “nPAKE: An Improved Group PAKE Protocol”, IEEE Ninth Web Information Systems and Applications Conference, 2012.
[10] Bahareh Shojaie, Iman Saberi, Mazleena Salleh, Mahan Niknafskermani and Seyyed Morteza Alavi, “Improving EAP-TLS Performance Using Cryptographic Methods”, International conference on computer & Information Science 2012.
[11] N. Asokan, Vaitteri Niemi and Kaisa Nyberg “Man-in-the Middle in Tunneled Authentication Protocols” Nokia Research Centre, Finland, 2002.
[12] Umesh Kumar, Praveen Kumar and Sapna Gambhir, “Analysis and Literature Review of IEEE 802.1x(Authentication) Protocols”, International Journal of Engineering and Advanced Technology, vo. 3, no. 5, pp. 163-168, 2014.
[13] Umesh Kumar and Spana Gambhir, “Secured Authentication Method for Wireless Networks”, IOSR Journal of Computer Engineering, pp. 1-11, 2015.
[14] U. Kumar and S. Gambhir, "A novel approach for key distribution through fingerprint based authentication using mobile agent," 3rd International Conference on Computing for Sustainable Global Development, New Delhi, pp. 3441-3445, 2016.