Soundness to Single Sign on Using OTP in Distributed Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
In a distributed system, there are numerous service provider. The user must be authenticated to entrance the services provided by the service provider. It is challenging to recall all secret words for users. So to clarify this problem single sign on is used which is an authentication contrivance in that permit a single license to be validated by multiple service provider. The Wang, Yu, and Qi Xie find that Chang – Lee Scheme undergoes from two attacks one of which is that the aggressor is outside service provider converses with the authenticated user twice and get the license necessary to right to use data in distributed systems. The second attack is the outsider easily receiving right to use to, use services without any license by mimicking authenticate user. This violence also associated with Hsu and Chang Scheme. To sidestep these attacks Wang, Yu, and Qi Xie employed RSA-VES. For enhancement and soundness of authentication, this paper services One Time Password to Wang, Yu, and Qi Xie Method. Now a days OTP plays important role in an authentication, so that using OTP for secure single sign on its easy to provide soundness for authentication.
Authors and Affiliations
Miss. Bhavana M. Bahikar, Prof. Praveen R. Barapatre
Use Map EstimationFor Image Sharpening
This paper presents a various paradigms for estimating a single latent sharp image given multiple blurry and/or noisy observations. Whether employing it to make an unusable image good, a good image better or givi...
Implementation of Cellular IP and Its Performance Analysis
In the current Cellular IP architecture, only one gateway serves the entire CIP network. So, the gateway is single point of failure for all the mobile hosts who rely on it to be connected to the Internet. Cellul...
Analysis and Implementation of Selective Image Encryption Technique Using Matlab
Abstract: Encryption plays a very significant role in secure transmission of digital images from one place to another. There are a number of encryption algorithms available which perform the task of encryption. How...
Weed Detection using Image Filtering in Vegetables Crops
This paper discuss about system implementation of image processing technique for weed detection and removal. The system presents a machine vision system for weed detection in vegetable crops using outdoor images. The pur...
Skill Acquisition: An E-Learning Approach
The attention of the Nigerian Government for over twenty years now has been on youth’s empowerment through skill acquisition for self-realisation and economic independence. The Government and individuals, both in the pas...