Académique Documents
Professionnel Documents
Culture Documents
TECHNOLOGY,ROURKELA
SUBMITTED BY:-
BHAGABAT PRASAD SAHOO
ROLL-217EC5325
M.Tech(C & N)
CONTENTS
1. INTRODUCTION
2. THEORY
3. EXPERIMENT
4. MATLAB CODE
5. OUTPUT
6. OBSERVATIONS
7. CONCLUSION
8. REFERENCES
INTRODUCTION
USER ID AUTHENTICATION AND NETWORK SECURITY
NEURAL NETWORKS
A Neural Network is consist of set of parallel and distributed processing units called
neurons. These neurons are connected by unidirectional or bidirectional links in an ordered
fashion i.e.in layers. Three kinds of layers are present in Neural Network architecture, input
layer consists of n number of inputs to the network and each input is multiply by a weight
associated with this input. The product of input and weight are summed and feed into a
network through a transfer function to generate the output.
Neural Network designing is based upon network topology, network transfer functions and
network learning algorithms.
a) Network Topology:
e.g. number of hidden layers, number of neurons in each hidden layer, types of activation
function, concept of over fitting and under fitting, interconnection within the layer.
Two important neural network topologies are Feed Forward topology and Recurrent
topology.
The proposed authentication scheme includes login and authentication procedures. The user
chooses the user Id (ID) and password (PW). These numbers are used to train the neural
network. The neural network repeats the process again and again (iterations) until the
network can remember the entire user Id and its corresponding password pairs. This
password authentication scheme is based on Back Propagation Neural Network and it
describes the verification of user Ids and passwords.
PROCEDURE:
Here we use a predefined set of user id and password combinations and prepare a neural
network for 8 users.
USER ID PASSWORD
[0 0 0] [1 1 1]
[0 0 1] [1 1 0]
[0 1 0] [1 0 1]
[0 1 1] [1 0 0]
[1 0 0] [0 1 1]
[1 0 1] [0 1 0]
[1 1 0] [0 0 1]
[1 1 1] [0 0 0]
OBSERVATION
We observe that the program gives ‘unauthorized ’ as output for all combinations except for
the correct one i.e [0 1 1] for which it gives the output ‘verified’.
CONCLUSION
From the above observation we can conclude that the MATLAB program indeed
successfully authenticates User id and password using back propagation algorithm.
REFERENCES
1) Dahiya, Menal & Gill, Sumeet. (2018). Securing Password For Wireless Device Using
Training Functions of MATLAB. International Journal of Pure and Applied Mathematics.
118. 9-19.
2) Reyhani, Shahbaz & Mahdavi, Mehregan. (2007). User Authentication Using Neural
Network in Smart Home Networks. International Journal of Smart Home.