Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/539330
Title: | Invader Identification and Delimitation Techniques in Communication Networks |
Researcher: | Chopra Aakanksha |
Guide(s): | Sharma Vivek Kumar |
Keywords: | Computer Science Computer Science Cybernetics Engineering and Technology |
University: | Jagannath University, Jaipur |
Completed Date: | 2022 |
Abstract: | Volumes of data which is accessible today is compelled to be guarded and fostered against lucid categories of attacks such as- prudent hackers, entrusted computer neophytes, sneaky venders and displeased current or former employees. Oodles of online attacks are occurring and this is imaginably the massive threat today. Previously, there was the time when information leakage was speculated to be the largest risk and which could lead to manipulating data; but, still, could be avoided. Currently, the scenario has unconditionally changed; fissure in security and the varied attack potentiality of infiltrators are maturing which is leading to high-security threats. This research aims to Identify and delimitate the entire communication devices such as desktops, laptops, smartphones, etc., from various attacks that intruders perform and to make mobile communication devices stronger, more efficient, memorable, and usable by reducing the vulnerabilities from attacks. Later with critical understanding a robust password system for communication devices is developed. For this, studied the online or offline attacks on the system and implement the same using algorithm and various gap were found between existing password schemes. A detailed review of all authentication password mechanism for desktop and smartphone systems are done. Further, proposed two techniques- Advance- Draw A-Secret (A-DAS) technique and Character Set and Direction (CSD) Technique. Simulated A-DAS scheme with participants by conducting a lab study. The Char_Set_Direction algorithm is a hybrid graphical password technique that is developed, implemented, and tested through an android mobile application in this thesis. Lastly, the data analysis was done through the user survey. Keywords- Advance- Draw A-Secret, Char-Set-Direction Technique, Character Password, Entropy Bit Space, Graphical Password Techniques, Mobile Security, Privacy, Password Space, Password Generation Time, Verification. newline |
Pagination: | |
URI: | http://hdl.handle.net/10603/539330 |
Appears in Departments: | Faculty of Engineering and Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf.pdf | Attached File | 113.39 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 40.28 kB | Adobe PDF | View/Open | |
03_content.pdf | 113.45 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 29.89 kB | Adobe PDF | View/Open | |
05_chapter1.pdf.pdf | 375.54 kB | Adobe PDF | View/Open | |
06_chapter2.pdf.pdf | 588.24 kB | Adobe PDF | View/Open | |
07_chapter3.pdf.pdf | 793.84 kB | Adobe PDF | View/Open | |
08_chapter4.pdf.pdf | 337.02 kB | Adobe PDF | View/Open | |
09_chapter5.pdf.pdf | 1.2 MB | Adobe PDF | View/Open | |
10_chapter6.pdf.pdf | 601.24 kB | Adobe PDF | View/Open | |
11_annexure.pdf | 10.42 MB | Adobe PDF | View/Open | |
80_recommendation.pdf | 235.92 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: