2022
DOI: 10.3390/s22020579
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Authentication Model for Secure Network Connectivity in Network Separation Technology

Abstract: Considering the increasing scale and severity of damage from recent cybersecurity incidents, the need for fundamental solutions to external security threats has increased. Hence, network separation technology has been designed to stop the leakage of information by separating business computing networks from the Internet. However, security accidents have been continuously occurring, owing to the degradation of data transmission latency performance between the networks, decreasing the convenience and usability o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 35 publications
0
0
0
Order By: Relevance
“…The investigation uses an encryption approach toward data integrity as well as authentication. The work carried out by Park et al [52] have presented distributed scheme of authentication considering multi-factor authentication based on trust score. Ruan et al [53] have presented a work towards location privacy where replicated information is used to secure the user's privacy.…”
Section: Authentication Approaches In Social Networkmentioning
confidence: 99%
“…The investigation uses an encryption approach toward data integrity as well as authentication. The work carried out by Park et al [52] have presented distributed scheme of authentication considering multi-factor authentication based on trust score. Ruan et al [53] have presented a work towards location privacy where replicated information is used to secure the user's privacy.…”
Section: Authentication Approaches In Social Networkmentioning
confidence: 99%