
Authorization and Authentication in Mobile Devices
Author(s) -
Vinay Kumar B
Publication year - 2022
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2022.41611
Subject(s) - computer science , computer security , password , authentication (law) , chip authentication program , authentication protocol , authentication server , multi factor authentication , lightweight extensible authentication protocol , challenge–response authentication , email authentication , internet privacy
With the rapid evolution of the wireless communication technology, user authorization and authentication is important in order to ensure the security of the wireless communication technology. Password play an important role in the process of authentication. In the process of authentication, the password enter by the user will be transmitted along the traffic to the authentication server in order to allow the server to grant access to the authorized user. The attackers will use the chance to attempt sniff others person password in order to perform some illegal activities by using others person password in order to perform some illegal activities by using others identitity to keep them safe from trouble. Due to the issues, there are many solutions has been proposed to improve the security of wireless communication technology. In this paper. The previously proposed solution will be used to enhance the security of the system. . For mobile apps , we need to make a clear distinction between user authentication and app authentication. User authentication is about how users prove that they are the legitimate apps users. App authentication covers how the app authenticates towards the backend . Sometimes device authentication also mentioned , is accessible to all apps running on your phone and generally easy to spoofs. Keywords: Authorization , Authentication , Cryptography , Hash Function , Face Authentication.