IDENTIFICATION AND AUTHENTICATION
Keywords:
Key words: network, DES algorithm, authentication, time synchronization, one- time password-based authentication, Security.Abstract
Annotation: One of the most common authentication schemes is simple
authentication, which is based on the use of traditional multi-factor passwords. The
procedure for simple authentication of a user on a network can be imagined as follows.
A user trying to use the network types his or her ID and password on a computer
keyboard.
References
Literature
1. https://www.researchgate.net/publication/319536428_Identification_and_Authenti
cation
2. Blessing, Moses & Olusegun, John. (2024). The Impact of Software-Defined
Networking (SDN) on Traditional Network Architectures: Opportunities and
Challenges.
3. Danish, Muhammad & Shahid, Shaheryar & Ghafar, Abdul & Hamid, Khalid &
Ali, Noman & Ghani, Amarah & Ibrar, Muhammad & Mandan, Sikandar. (2025).
Security of Next-Generation Networks: A Hybrid Approach Using ML-Algorithm
and Game Theory with SDWSN. 3. 18-36. 10.63075/wdpwrr31.