Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/539330
Title: Invader Identification and Delimitation Techniques in Communication Networks
Researcher: Chopra Aakanksha
Guide(s): Sharma Vivek Kumar
Keywords: Computer Science
Computer Science Cybernetics
Engineering and Technology
University: Jagannath University, Jaipur
Completed Date: 2022
Abstract: Volumes of data which is accessible today is compelled to be guarded and fostered against lucid categories of attacks such as- prudent hackers, entrusted computer neophytes, sneaky venders and displeased current or former employees. Oodles of online attacks are occurring and this is imaginably the massive threat today. Previously, there was the time when information leakage was speculated to be the largest risk and which could lead to manipulating data; but, still, could be avoided. Currently, the scenario has unconditionally changed; fissure in security and the varied attack potentiality of infiltrators are maturing which is leading to high-security threats. This research aims to Identify and delimitate the entire communication devices such as desktops, laptops, smartphones, etc., from various attacks that intruders perform and to make mobile communication devices stronger, more efficient, memorable, and usable by reducing the vulnerabilities from attacks. Later with critical understanding a robust password system for communication devices is developed. For this, studied the online or offline attacks on the system and implement the same using algorithm and various gap were found between existing password schemes. A detailed review of all authentication password mechanism for desktop and smartphone systems are done. Further, proposed two techniques- Advance- Draw A-Secret (A-DAS) technique and Character Set and Direction (CSD) Technique. Simulated A-DAS scheme with participants by conducting a lab study. The Char_Set_Direction algorithm is a hybrid graphical password technique that is developed, implemented, and tested through an android mobile application in this thesis. Lastly, the data analysis was done through the user survey. Keywords- Advance- Draw A-Secret, Char-Set-Direction Technique, Character Password, Entropy Bit Space, Graphical Password Techniques, Mobile Security, Privacy, Password Space, Password Generation Time, Verification. newline
Pagination: 
URI: http://hdl.handle.net/10603/539330
Appears in Departments:Faculty of Engineering and Technology

Files in This Item:
File Description SizeFormat 
01_title.pdf.pdfAttached File113.39 kBAdobe PDFView/Open
02_prelim pages.pdf40.28 kBAdobe PDFView/Open
03_content.pdf113.45 kBAdobe PDFView/Open
04_abstract.pdf29.89 kBAdobe PDFView/Open
05_chapter1.pdf.pdf375.54 kBAdobe PDFView/Open
06_chapter2.pdf.pdf588.24 kBAdobe PDFView/Open
07_chapter3.pdf.pdf793.84 kBAdobe PDFView/Open
08_chapter4.pdf.pdf337.02 kBAdobe PDFView/Open
09_chapter5.pdf.pdf1.2 MBAdobe PDFView/Open
10_chapter6.pdf.pdf601.24 kBAdobe PDFView/Open
11_annexure.pdf10.42 MBAdobe PDFView/Open
80_recommendation.pdf235.92 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: