A New Approach to Provide Authentication Using Acknowledgment

  • Vijay Paul SinghEmail author
  • Naveen Aggarwal
  • Muzzammil Hussain
  • Charanjeet Kour Raina
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 713)


Whenever there is communication between two nodes, there is a possibility of vulnerability. When node A communicates with node B, a lot of problems arise between them, out of which security breach is one. If data are sensitive it is essential that the data should be safely delivered to the authorized node. To handle security issues, cryptography technique is used, through which security attacks are not possible. For secure communication, there are a number of security protocols that protect from attackers. One of the cryptosystems is the public-key encryption. If attackers obtain the private key, they can easily read encrypted messages and masquerade it or perform some unknown activity which can be highly adverse for the communication. To overcome this problem, we introduce acknowledgment-based authentication in which even if the attacker knows the private key he/she could not communicate with authorized parties continuously.


Authentication Security Encryption Keys Acknowledgment Decryption 


  1. 1.
    Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)Google Scholar
  2. 2.
    Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-middle attack to the HTTPS protocol. IEEE Secur. Priv. 7(1), 78–81 (2009)CrossRefGoogle Scholar
  3. 3.
    Jonsson, J., Kaliski, B.: Public-key Cryptography Standards (PKCS)# 1: RSA Cryptography Specifications Version 2.1 (2003)Google Scholar
  4. 4.
    Forouzan, B.A., Mukhopadhyay, D.: Cryptography and Network Security (Sie). McGraw-Hill Education (2011)Google Scholar
  5. 5.
    Salomaa, A.: Public-key Cryptography. Springer Science & Business Media (2013)Google Scholar
  6. 6.
    Lowe, G.: An attack on the Needham-Schroeder public-key authentication protocol. Inf. Process. Lett. 56(3), 131–133 (1995)CrossRefGoogle Scholar
  7. 7.
    Gupta, A., Hussain, M.: Secure session key sharing using public key cryptography. In: Proceedings of the Third International Symposium on Women in Computing and Informatics. ACM (2015)Google Scholar
  8. 8.
    Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Commun. Mag. 32(9), 33–38 (1994)CrossRefGoogle Scholar
  9. 9.
    Wager, D., Schneier, B.: Analysis of the SSL 3.0 protocol. In: The Second USENIX Workshop on Electronic Commerce Proceedings, vol. 1. no. 1 (1996)Google Scholar
  10. 10.
    Singh, V.P., Hussain, M., Raina, C.K.: Authentication of base station by HDFS using trust based model in WSN. In: International Conference on Communication and Electronics Systems (ICCES). IEEE (2016)Google Scholar
  11. 11.
    Mathis, M., et al.: TCP selective acknowledgment options. No. RFC 2018 (1996)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • Vijay Paul Singh
    • 1
    Email author
  • Naveen Aggarwal
    • 1
  • Muzzammil Hussain
    • 2
  • Charanjeet Kour Raina
    • 3
  1. 1.Department of CSUIET, Panjab UniversityChandigarhIndia
  2. 2.Central University RajasthanKishangarhIndia
  3. 3.PTUKapurthalaIndia

Personalised recommendations