Survey and analysis of modern authentication system

Anoop Kumar Singh, Sandeep Kumar, Mayank Agarwal, Sukumar Nandi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

Modern Authentication system ensures that only the entrusted entities should communicate and ensures that unauthorized user which is trying to establish some connection in order to gain login to the system by impersonating his identity should be restricted to the confidential data. Now a days, modern authentication system receives more and more attention as the data exchanged over the network is important and confidential. So it is more likely to be vulnerable to the known security threats. However the design of the secure authentication protocol is quite challenging, considering the known security threats. In this paper, various authenticated protocol are being analysed according to their pros and cons , security threats and vulnerabilities and how they will withstand the known security attack. We have analysed the mention protocols PAP, SPAP, CHAP,MSCHAP, EAP,KERBEROS.

Original languageEnglish
Title of host publication2016 International Conference on Accessibility to Digital World, ICADW 2016 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers
Pages51-56
Number of pages6
ISBN (Electronic)9781509042913
DOIs
StatePublished - 2 Jul 2016
Externally publishedYes
Event1st International Conference on Accessibility to Digital World, ICADW 2016 - Guwahati, Assam, India
Duration: 16 Dec 201618 Dec 2016

Publication series

Name2016 International Conference on Accessibility to Digital World, ICADW 2016 - Proceedings

Conference

Conference1st International Conference on Accessibility to Digital World, ICADW 2016
Country/TerritoryIndia
CityGuwahati, Assam
Period16/12/1618/12/16

ASJC Scopus subject areas

  • Computer Science Applications
  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Survey and analysis of modern authentication system'. Together they form a unique fingerprint.

Cite this