Please use this identifier to cite or link to this item:
http://dspace.dtu.ac.in:8080/jspui/handle/repository/14526
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | MITTAL, HIMANSHU | - |
dc.date.accessioned | 2016-03-11T10:51:03Z | - |
dc.date.accessioned | 2016-03-11T10:51:04Z | - |
dc.date.available | 2016-03-11T10:51:03Z | - |
dc.date.available | 2016-03-11T10:51:04Z | - |
dc.date.issued | 2016-03 | - |
dc.identifier.uri | http://dspace.dtu.ac.in:8080/jspui/handle/repository/14526 | - |
dc.description.abstract | ABSTRACT With the fast development of network technologies, increasing number of services are provided through internet instead of traditional ways. Owing to the openness of the internet, method of guarding valuable resources from unauthorized access is as essential the data/services itself. To facilitate a legal user, to access a distant server in distributed environment for utilizing various information resources and services available on the multi-server network, we propose “A Remote Authentication Methodology for Secure Communication in Distributed Network”. This scheme is based on one-way hash function, XOR function and Diffie-Hellman. It provide more security, reduce the computational and communication cost and is less complex. It uses an authentication center, that consists of multiple servers registered on it and allow the remote users to securely and efficiently get authenticated and generate session key with the desired server. The User registers only once with the authentication center and can obtain the services from multiple servers without repeating registration process on every individual server. The proposed scheme has many advantages such as no encryption, signature, verification tables, timestamps and public keys directory are needed to be maintained. Also the proposed scheme is invulnerable to the security attacks such as insider attack, man-in-the-middle attack, forward security, impersonation attack, replay attack and safe guard from many possible attacks effectively. | en_US |
dc.language.iso | en_US | en_US |
dc.relation.ispartofseries | TD 1123; | - |
dc.subject | Remote Authentication Methodology | en_US |
dc.subject | Authentication Methodology | en_US |
dc.subject | Distributed Network | en_US |
dc.subject | Secure Communication | en_US |
dc.title | A Remote Authentication Methodology for Secure Communication in Distributed Network | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | M.E./M.Tech. Computer Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
front page.pdf | 25.2 kB | Adobe PDF | View/Open | |
part-1.pdf | 261.75 kB | Adobe PDF | View/Open | |
part-2.pdf | 918.32 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.