首页    期刊浏览 2024年11月29日 星期五
登录注册

文章基本信息

  • 标题:Mutual authentication of nodes using session token with fingerprint and MAC address validation
  • 本地全文:下载
  • 作者:Amit Kumar Bairwa ; Sandeep Joshi
  • 期刊名称:Egyptian Informatics Journal
  • 印刷版ISSN:1110-8665
  • 出版年度:2021
  • 卷号:22
  • 期号:4
  • 页码:479-491
  • DOI:10.1016/j.eij.2021.03.003
  • 语种:English
  • 出版社:Elsevier
  • 摘要:AbstractSecurity has become an important issue during communication among mobile nodes in an unfavorable condition. The mobile node’s property is dynamic, so it isn’t easy to manage security policies. These difficulties present a barrier to building multigene security arrangements that accomplish both assurance and attractive network execution. The proposed work suggests the mutual authentication-based protocol, helping in the handshake between two nodes. Once they connected securely through this mechanism, they can interchange the required information. We have a monitoring node that will maintain the access list of the authorized nodes. The monitoring node will keep the nodes’ list based on the MAC address of nodes and digital signature key. The key is generated by combining the hash code of the MAC address with the variety of the user’s fingerprint file acting as a node. The combination of both will verify the entity. It involves the various subsections that include registering the user, token generation, sending and receiving messages through multiple algorithms. The proposed work is implemented using MATLAB. The analysis of the base work and the proposed work is visualized by structuring the GUI. Due to all the strength of the pattern of session token is further validated using the various online password checking tools, and the results obtained are quite impressive. Secure Hash Algorithm (SHA) is a cryptographic hashing algorithm used to decide a specific bit of information’s integrity. In the proposed method, we used different types of keys with additional entropy to check the trust level of password security. The result has been discussed using various entropy graphs that prove improvement over the existing approach.
  • 关键词:Trust;MAC address;OTP;Security;Nodes;SHA;Authentication
国家哲学社会科学文献中心版权所有