CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Design a Novel User based Authentication System that Identify by User and Device

by B. Bamleshwar Rao, Akhilesh A. Waoo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 33
Year of Publication: 2020
Authors: B. Bamleshwar Rao, Akhilesh A. Waoo
10.5120/ijca2020920858

B. Bamleshwar Rao, Akhilesh A. Waoo . Design a Novel User based Authentication System that Identify by User and Device. International Journal of Computer Applications. 175, 33 ( Nov 2020), 30-33. DOI=10.5120/ijca2020920858

@article{ 10.5120/ijca2020920858,
author = { B. Bamleshwar Rao, Akhilesh A. Waoo },
title = { Design a Novel User based Authentication System that Identify by User and Device },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2020 },
volume = { 175 },
number = { 33 },
month = { Nov },
year = { 2020 },
issn = { 0975-8887 },
pages = { 30-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number33/31665-2020920858/ },
doi = { 10.5120/ijca2020920858 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:40:11.805002+05:30
%A B. Bamleshwar Rao
%A Akhilesh A. Waoo
%T Design a Novel User based Authentication System that Identify by User and Device
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 33
%P 30-33
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Smart City is promising to improve working environments in terms of quality, competitiveness and amenities. However, new data security problems emerge as a result of the evolving capabilities of Smart Cities. One of the main problems is the use of continuous and non-invasive authentication techniques, since conventional authentication approaches have major limitations. Thus, to overcome these shortcomings, the key contribution of this paper is the design and implementation of a continuous and intelligent authentication architecture for Smart City in the IOT environment. The architecture is cloud computing focused and users are authenticated by machine learning approaches based on the behaviours. To design a modern user-based authentication method, where user and device recognition.

References
  1. Kaburu, D.M., Sansa-Otim, J., Mayanja, K. et al. A usability based approach to designing continuous user biometric authentication system. Qual User Exp 3, 8 (2018). https://doi.org/10.1007/s41233-018-0021-1
  2. Nixon K.W., Chen Y., Mao ZH., Li K. (2014) User Classification and Authentication for Mobile Device Based on Gesture Recognition. In: Pino R. (eds) Network Science and Cybersecurity. Advances in Information Security, vol 55. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-7597-2_8
  3. Sales, T., Sales, L., Almeida, H. et al. A UPnP extension for enabling user authentication and authorization in pervasive systems. J Braz Comput Soc 16, 261–277 (2010). https://doi.org/10.1007/s13173-010-0022-2
  4. Xue Q., Ju X., Zhu H., Zhu H., Li F., Zheng X. (2019) A Biometric-Based IoT Device Identity Authentication Scheme. In: Han S., Ye L., Meng W. (eds) Artificial Intelligence for Communications and Networks. AICON 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 287. Springer, Cham. https://doi.org/10.1007/978-3-030-22971-9_12
  5. Rajawat A.S., Upadhyay P., Upadhyay A. (2021) Novel Deep Learning Model for Uncertainty Prediction in Mobile Computing. In: Arai K., Kapoor S., Bhatia R. (eds) Intelligent Systems and Applications. IntelliSys 2020. Advances in Intelligent Systems and Computing, vol 1250. Springer, Cham. https://doi.org/10.1007/978-3-030-55180-3_49
  6. S. Dong, F. Farha, S. Cui, J. Ma and H. Ning, "CPG-FS: A CPU Performance Graph Based Device Fingerprint Scheme for Devices Identification and Authentication," 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), Fukuoka, Japan, 2019, pp. 266-270, doi: 10.1109/DASC/PiCom/CBDCom/CyberSciTech.2019.00056.
  7. Q. Wang et al., "VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones," IEEE INFOCOM 2019 - IEEE Conference on Computer Communications, Paris, France, 2019, pp. 2062-2070, doi: 10.1109/INFOCOM.2019.8737422.
  8. Khan R., Islam M. (2020) Cluster Based User Identification and Authentication for the Internet of Things Platform. In: Bohlouli M., Sadeghi Bigham B., Narimani Z., Vasighi M., Ansari E. (eds) Data Science: From Research to Application. CiDaS 2019. Lecture Notes on Data Engineering and Communications Technologies, vol 45. Springer, Cham. https://doi.org/10.1007/978-3-030-37309-2_14
  9. Sánchez Sánchez P.M., Huertas Celdrán A., Fernández Maimó L., Martínez Pérez G., Wang G. (2019) Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System. In: Wang G., El Saddik A., Lai X., Martinez Perez G., Choo KK. (eds) Smart City and Informatization. iSCI 2019. Communications in Computer and Information Science, vol 1122. Springer, Singapore. https://doi.org/10.1007/978-981-15-1301-5_7.
  10. Z. Dou, I. Khalil and A. Khreishah, "A Novel and Robust Authentication Factor Based on Network Communications Latency," in IEEE Systems Journal, vol. 12, no. 4, pp. 3279-3290, Dec. 2018, doi: 10.1109/JSYST.2017.2691550.
  11. M. Wachs, Q. Scheitle and G. Carle, "Push away your privacy: Precise user tracking based on TLS client certificate authentication," 2017 Network Traffic Measurement and Analysis Conference (TMA), Dublin, 2017, pp. 1-9, doi: 10.23919/TMA.2017.8002897.
  12. A. Singh Rajawat and S. Jain, "Fusion Deep Learning Based on Back Propagation Neural Network for Personalization," 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India, 2020, pp. 1-7, doi: 10.1109/IDEA49133.2020.9170693.
  13. Lavanya R., Sundarakantham K., Mercy Shalinie S., Divya R., Selvamani K. (2020) User Authentication of IoT Devices for Decentralized Architecture Using Blockchain. In: M. Thampi S. et al. (eds) Applied Soft Computing and Communication Networks. ACN 2019. Lecture Notes in Networks and Systems, vol 125. Springer, Singapore. https://doi.org/10.1007/978-981-15-3852-0_2
  14. A. S. Rajawat and A. R. Upadhyay, "Web Personalization Model Using Modified S3VM Algorithm For developing Recommendation Process," 2nd International Conference on Data, Engineering and Applications (IDEA), Bhopal, India, 2020, pp. 1-6, doi: 10.1109/IDEA49133.2020.9170701.
  15. Srinivasan Rajarajan and Ponnada Priyadarsini,” UTP: A Novel PIN Number Based User Authentication Scheme” The International Arab Journal of Information Technology, Vol. 16, No. 5, September 2019
Index Terms

Computer Science
Information Sciences

Keywords

Authentication classification approach identify by user and device Internet of Things (IoT).