Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{147355, author = {DR VENKATESAN and DR VENKATRAMANA and DR KARUNAKAR REDDY and DR SAMBASIVA RAO}, title = {AUTHENTIFICATION OF CERTIFICATE IN NETWORK BY USING UNIQUE SIGN-ON ALGORITHM.}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {5}, number = {2}, pages = {784-787}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=147355}, abstract = {A computer network is a special category of network, which make possible the users to use different network check which are provided by the check providers. In the distributed computer networks, user confirmation is an important process for protect. In the verification process, the choice is taken whether the user is authorized or illegitimate and subsequent to that allows the users to access the utilities in web. For that we are implemented new process of Single sign-on Mechanism (SSOM) is a new verification mechanism that facilitates an officially permitted user with a single sign in credential to be authenticated by many service providers in distributed computer networks. In additional to the service provider’s verification, user verification is also important to avoid bogus servers. The data exchange between a user and a service provider in the completion of the user and service provider verification and a session key is provided to preserve the security in network; that security status has demonstratively shown in this proposal is actually insecure as it fails to convene credential confidentiality and reliability of confirmation. Specifically, we present two different steps of attacks in the system. Main one is attack access a malicious service provider in internet, different types of users may communicate twice in the system. Chang and Lee method is one of the single-sign on mechanism which is obtainable by Chang and Lee for providing security in the distributed computer networks. We recognize the flaws in their protection elements to explain why attacks are possible alongside their SSOM method. Our attacks also related to another SSOM method proposed by Chuang and Hsu, which motivate the design of Chang-Lee Methods. We support the learning of the reliability of authentication as one open problem.}, keywords = {Distributed Systems, Authentication, Token, Attacks, Sign-On, and Credentials.}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry