IDEAS home Printed from https://ideas.repec.org/a/abq/ijist1/v5y2023i3p178-192.html
   My bibliography  Save this article

An Enhanced Authentication Scheme for Ensuring Network Devices Security and Performance Optimization

Author

Listed:
  • Naveed Husain

    (School of Systems and Technology, University of Management and Technology, Lahore, Pakistan)

Abstract

In the technology world, the wireless network is more flexible and adaptable compared to the wired network. Because it is easy to install and does not require cables. Also, there have been many recent advances in the area of WNs (Wireless Networks), which have undergone rapid development. WNs have emerged as a prevailing technology due to their wide range of applications in every field of life. The WNs are easily prone to security attacks since once deployed these networks are unattended and unprotected. Innetworks, authentication is a well-explored research area. Recent advancements in networks and ubiquitous devices have meant that there is a need to explore the area of authentication with a new perspective. This study explores authentication schemes and their adoption in network-connected devices. The research will study how a wide variety of devices like those in IoT, WSN, industrial IoT, and wearable healthcare devices establish authentication. The focus of the study will be on high levels of security with an algorithm that has a small footprint. The scheme will be studying the design of a lightweight and secure authentication framework for network-connected devices. The proposed scheme provides extended security features while minimizing wireless communication security challenges. The final results will validate the authenticity of this scheme.

Suggested Citation

  • Naveed Husain, 2023. "An Enhanced Authentication Scheme for Ensuring Network Devices Security and Performance Optimization," International Journal of Innovations in Science & Technology, 50sea, vol. 5(3), pages 178-192, September.
  • Handle: RePEc:abq:ijist1:v:5:y:2023:i:3:p:178-192
    as

    Download full text from publisher

    File URL: https://journal.50sea.com/index.php/IJIST/article/view/522/1033
    Download Restriction: no

    File URL: https://journal.50sea.com/index.php/IJIST/article/view/522
    Download Restriction: no
    ---><---

    More about this item

    Keywords

    ;
    ;
    ;
    ;
    ;
    ;
    ;

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:abq:ijist1:v:5:y:2023:i:3:p:178-192. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Iqra Nazeer (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.